5G Security Threat Assessment in Real Networks
Advances in mobile communication networks from 2G to 5G have brought unprecedented traffic growth, and 5G mobile communication networks are expected to be used in a variety of industries based on innovative technologies, fast not only in terms of extremely low latency but massive access devices. Var...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-08-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/21/16/5524 |
id |
doaj-67ec337a2297454b84ba283dd94db669 |
---|---|
record_format |
Article |
spelling |
doaj-67ec337a2297454b84ba283dd94db6692021-08-26T14:19:22ZengMDPI AGSensors1424-82202021-08-01215524552410.3390/s211655245G Security Threat Assessment in Real NetworksSeongmin Park0Daeun Kim1Youngkwon Park2Hyungjin Cho3Dowon Kim4Sungmoon Kwon5Infrastructure Security Technology Team, Korea Internet & Security Agency, 9, Jinheung-gil, Naju-si 58324, KoreaInfrastructure Security Technology Team, Korea Internet & Security Agency, 9, Jinheung-gil, Naju-si 58324, KoreaInfrastructure Security Technology Team, Korea Internet & Security Agency, 9, Jinheung-gil, Naju-si 58324, KoreaInfrastructure Security Technology Team, Korea Internet & Security Agency, 9, Jinheung-gil, Naju-si 58324, KoreaInfrastructure Security Technology Team, Korea Internet & Security Agency, 9, Jinheung-gil, Naju-si 58324, KoreaInfrastructure Security Technology Team, Korea Internet & Security Agency, 9, Jinheung-gil, Naju-si 58324, KoreaAdvances in mobile communication networks from 2G to 5G have brought unprecedented traffic growth, and 5G mobile communication networks are expected to be used in a variety of industries based on innovative technologies, fast not only in terms of extremely low latency but massive access devices. Various types of services, such as enhanced mobile broadband (eMBB), massive machine type communication (mMTC), and ultra-reliable and low latency communication (uRLLC), represent an increase in the number of attacks on users’ personal information, confidential information, and privacy information. Therefore, security assessments are essential to verify and cope with these various attacks. In this research, we (1) looked at 5G mobile communication network backgrounds and problems to investigate existing vulnerabilities and (2) assessed the current situation through evaluation of 5G security threats in real-world mobile networks in service.https://www.mdpi.com/1424-8220/21/16/55245G mobile communicationnon-standalonemobile networkRRCNASGTP |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Seongmin Park Daeun Kim Youngkwon Park Hyungjin Cho Dowon Kim Sungmoon Kwon |
spellingShingle |
Seongmin Park Daeun Kim Youngkwon Park Hyungjin Cho Dowon Kim Sungmoon Kwon 5G Security Threat Assessment in Real Networks Sensors 5G mobile communication non-standalone mobile network RRC NAS GTP |
author_facet |
Seongmin Park Daeun Kim Youngkwon Park Hyungjin Cho Dowon Kim Sungmoon Kwon |
author_sort |
Seongmin Park |
title |
5G Security Threat Assessment in Real Networks |
title_short |
5G Security Threat Assessment in Real Networks |
title_full |
5G Security Threat Assessment in Real Networks |
title_fullStr |
5G Security Threat Assessment in Real Networks |
title_full_unstemmed |
5G Security Threat Assessment in Real Networks |
title_sort |
5g security threat assessment in real networks |
publisher |
MDPI AG |
series |
Sensors |
issn |
1424-8220 |
publishDate |
2021-08-01 |
description |
Advances in mobile communication networks from 2G to 5G have brought unprecedented traffic growth, and 5G mobile communication networks are expected to be used in a variety of industries based on innovative technologies, fast not only in terms of extremely low latency but massive access devices. Various types of services, such as enhanced mobile broadband (eMBB), massive machine type communication (mMTC), and ultra-reliable and low latency communication (uRLLC), represent an increase in the number of attacks on users’ personal information, confidential information, and privacy information. Therefore, security assessments are essential to verify and cope with these various attacks. In this research, we (1) looked at 5G mobile communication network backgrounds and problems to investigate existing vulnerabilities and (2) assessed the current situation through evaluation of 5G security threats in real-world mobile networks in service. |
topic |
5G mobile communication non-standalone mobile network RRC NAS GTP |
url |
https://www.mdpi.com/1424-8220/21/16/5524 |
work_keys_str_mv |
AT seongminpark 5gsecuritythreatassessmentinrealnetworks AT daeunkim 5gsecuritythreatassessmentinrealnetworks AT youngkwonpark 5gsecuritythreatassessmentinrealnetworks AT hyungjincho 5gsecuritythreatassessmentinrealnetworks AT dowonkim 5gsecuritythreatassessmentinrealnetworks AT sungmoonkwon 5gsecuritythreatassessmentinrealnetworks |
_version_ |
1721190047777030144 |