5G Security Threat Assessment in Real Networks

Advances in mobile communication networks from 2G to 5G have brought unprecedented traffic growth, and 5G mobile communication networks are expected to be used in a variety of industries based on innovative technologies, fast not only in terms of extremely low latency but massive access devices. Var...

Full description

Bibliographic Details
Main Authors: Seongmin Park, Daeun Kim, Youngkwon Park, Hyungjin Cho, Dowon Kim, Sungmoon Kwon
Format: Article
Language:English
Published: MDPI AG 2021-08-01
Series:Sensors
Subjects:
RRC
NAS
GTP
Online Access:https://www.mdpi.com/1424-8220/21/16/5524
id doaj-67ec337a2297454b84ba283dd94db669
record_format Article
spelling doaj-67ec337a2297454b84ba283dd94db6692021-08-26T14:19:22ZengMDPI AGSensors1424-82202021-08-01215524552410.3390/s211655245G Security Threat Assessment in Real NetworksSeongmin Park0Daeun Kim1Youngkwon Park2Hyungjin Cho3Dowon Kim4Sungmoon Kwon5Infrastructure Security Technology Team, Korea Internet & Security Agency, 9, Jinheung-gil, Naju-si 58324, KoreaInfrastructure Security Technology Team, Korea Internet & Security Agency, 9, Jinheung-gil, Naju-si 58324, KoreaInfrastructure Security Technology Team, Korea Internet & Security Agency, 9, Jinheung-gil, Naju-si 58324, KoreaInfrastructure Security Technology Team, Korea Internet & Security Agency, 9, Jinheung-gil, Naju-si 58324, KoreaInfrastructure Security Technology Team, Korea Internet & Security Agency, 9, Jinheung-gil, Naju-si 58324, KoreaInfrastructure Security Technology Team, Korea Internet & Security Agency, 9, Jinheung-gil, Naju-si 58324, KoreaAdvances in mobile communication networks from 2G to 5G have brought unprecedented traffic growth, and 5G mobile communication networks are expected to be used in a variety of industries based on innovative technologies, fast not only in terms of extremely low latency but massive access devices. Various types of services, such as enhanced mobile broadband (eMBB), massive machine type communication (mMTC), and ultra-reliable and low latency communication (uRLLC), represent an increase in the number of attacks on users’ personal information, confidential information, and privacy information. Therefore, security assessments are essential to verify and cope with these various attacks. In this research, we (1) looked at 5G mobile communication network backgrounds and problems to investigate existing vulnerabilities and (2) assessed the current situation through evaluation of 5G security threats in real-world mobile networks in service.https://www.mdpi.com/1424-8220/21/16/55245G mobile communicationnon-standalonemobile networkRRCNASGTP
collection DOAJ
language English
format Article
sources DOAJ
author Seongmin Park
Daeun Kim
Youngkwon Park
Hyungjin Cho
Dowon Kim
Sungmoon Kwon
spellingShingle Seongmin Park
Daeun Kim
Youngkwon Park
Hyungjin Cho
Dowon Kim
Sungmoon Kwon
5G Security Threat Assessment in Real Networks
Sensors
5G mobile communication
non-standalone
mobile network
RRC
NAS
GTP
author_facet Seongmin Park
Daeun Kim
Youngkwon Park
Hyungjin Cho
Dowon Kim
Sungmoon Kwon
author_sort Seongmin Park
title 5G Security Threat Assessment in Real Networks
title_short 5G Security Threat Assessment in Real Networks
title_full 5G Security Threat Assessment in Real Networks
title_fullStr 5G Security Threat Assessment in Real Networks
title_full_unstemmed 5G Security Threat Assessment in Real Networks
title_sort 5g security threat assessment in real networks
publisher MDPI AG
series Sensors
issn 1424-8220
publishDate 2021-08-01
description Advances in mobile communication networks from 2G to 5G have brought unprecedented traffic growth, and 5G mobile communication networks are expected to be used in a variety of industries based on innovative technologies, fast not only in terms of extremely low latency but massive access devices. Various types of services, such as enhanced mobile broadband (eMBB), massive machine type communication (mMTC), and ultra-reliable and low latency communication (uRLLC), represent an increase in the number of attacks on users’ personal information, confidential information, and privacy information. Therefore, security assessments are essential to verify and cope with these various attacks. In this research, we (1) looked at 5G mobile communication network backgrounds and problems to investigate existing vulnerabilities and (2) assessed the current situation through evaluation of 5G security threats in real-world mobile networks in service.
topic 5G mobile communication
non-standalone
mobile network
RRC
NAS
GTP
url https://www.mdpi.com/1424-8220/21/16/5524
work_keys_str_mv AT seongminpark 5gsecuritythreatassessmentinrealnetworks
AT daeunkim 5gsecuritythreatassessmentinrealnetworks
AT youngkwonpark 5gsecuritythreatassessmentinrealnetworks
AT hyungjincho 5gsecuritythreatassessmentinrealnetworks
AT dowonkim 5gsecuritythreatassessmentinrealnetworks
AT sungmoonkwon 5gsecuritythreatassessmentinrealnetworks
_version_ 1721190047777030144