-
- CHO Hyungjin
- Information Security R&D Technology Sharing Center, Korea Internet & Security Agency
-
- PARK Seongmin
- Information Security R&D Technology Sharing Center, Korea Internet & Security Agency
-
- PARK Youngkwon
- Information Security R&D Technology Sharing Center, Korea Internet & Security Agency
-
- CHOI Bomin
- Information Security R&D Technology Sharing Center, Korea Internet & Security Agency
-
- KIM Dowon
- Information Security R&D Technology Sharing Center, Korea Internet & Security Agency
-
- YIM Kangbin
- Department of Information Security Engineering, Soonchunhyang University
抄録
<p>In Feb 2021, As the competition for commercialization of 5G mobile communication has been increasing, 5G SA Network and Vo5G are expected to be commercialized soon. 5G mobile communication aims to provide 20 Gbps transmission speed which is 20 times faster than 4G mobile communication, connection of at least 1 million devices per 1 km2, and 1 ms transmission delay which is 10 times shorter than 4G. To meet this, various technological developments were required, and various technologies such as Massive MIMO (Multiple-Input and Multiple-Output), mmWave, and small cell network were developed and applied in the area of 5G access network. However, in the core network area, the components constituting the LTE (Long Term Evolution) core network are utilized as they are in the NSA (Non-Standalone) architecture, and only the changes in the SA (Standalone) architecture have occurred. Also, in the network area for providing the voice service, the IMS (IP Multimedia Subsystem) infrastructure is still used in the SA architecture. Here, the issue is that while 5G mobile communication is evolving openly to provide various services, security elements are vulnerable to various cyber-attacks because they maintain the same form as before. Therefore, in this paper, we will look at what the network standard for 5G voice service provision consists of, and what are the vulnerable problems in terms of security. And We Suggest Possible Attack Scenario using Security Issue, We also want to consider whether these problems can actually occur and what is the countermeasure.</p>
収録刊行物
-
- IEICE Transactions on Information and Systems
-
IEICE Transactions on Information and Systems E104.D (11), 1850-1856, 2021-11-01
一般社団法人 電子情報通信学会
- Tweet
詳細情報 詳細情報について
-
- CRID
- 1390571395581190912
-
- NII論文ID
- 130008110078
-
- ISSN
- 17451361
- 09168532
-
- 本文言語コード
- en
-
- データソース種別
-
- JaLC
- Crossref
- CiNii Articles
-
- 抄録ライセンスフラグ
- 使用不可