Analysis against Security Issues of Voice over 5G

  • CHO Hyungjin
    Information Security R&D Technology Sharing Center, Korea Internet & Security Agency
  • PARK Seongmin
    Information Security R&D Technology Sharing Center, Korea Internet & Security Agency
  • PARK Youngkwon
    Information Security R&D Technology Sharing Center, Korea Internet & Security Agency
  • CHOI Bomin
    Information Security R&D Technology Sharing Center, Korea Internet & Security Agency
  • KIM Dowon
    Information Security R&D Technology Sharing Center, Korea Internet & Security Agency
  • YIM Kangbin
    Department of Information Security Engineering, Soonchunhyang University

抄録

<p>In Feb 2021, As the competition for commercialization of 5G mobile communication has been increasing, 5G SA Network and Vo5G are expected to be commercialized soon. 5G mobile communication aims to provide 20 Gbps transmission speed which is 20 times faster than 4G mobile communication, connection of at least 1 million devices per 1 km2, and 1 ms transmission delay which is 10 times shorter than 4G. To meet this, various technological developments were required, and various technologies such as Massive MIMO (Multiple-Input and Multiple-Output), mmWave, and small cell network were developed and applied in the area of 5G access network. However, in the core network area, the components constituting the LTE (Long Term Evolution) core network are utilized as they are in the NSA (Non-Standalone) architecture, and only the changes in the SA (Standalone) architecture have occurred. Also, in the network area for providing the voice service, the IMS (IP Multimedia Subsystem) infrastructure is still used in the SA architecture. Here, the issue is that while 5G mobile communication is evolving openly to provide various services, security elements are vulnerable to various cyber-attacks because they maintain the same form as before. Therefore, in this paper, we will look at what the network standard for 5G voice service provision consists of, and what are the vulnerable problems in terms of security. And We Suggest Possible Attack Scenario using Security Issue, We also want to consider whether these problems can actually occur and what is the countermeasure.</p>

収録刊行物

参考文献 (7)*注記

もっと見る

詳細情報 詳細情報について

問題の指摘

ページトップへ