The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Pada Feb 2021, Memandangkan persaingan untuk pengkomersilan komunikasi mudah alih 5G semakin meningkat, Rangkaian SA 5G dan Vo5G dijangka akan dikomersialkan tidak lama lagi. Komunikasi mudah alih 5G bertujuan untuk menyediakan kelajuan penghantaran 20 Gbps yang 20 kali lebih pantas daripada komunikasi mudah alih 4G, sambungan sekurang-kurangnya 1 juta peranti setiap 1 km2, dan kelewatan penghantaran 1 ms iaitu 10 kali lebih pendek daripada 4G. Untuk memenuhi ini, pelbagai perkembangan teknologi diperlukan, dan pelbagai teknologi seperti Massive MIMO (Multiple-Input dan Multiple-Output), mmWave dan rangkaian sel kecil telah dibangunkan dan digunakan dalam bidang rangkaian akses 5G. Walau bagaimanapun, dalam kawasan rangkaian teras, komponen yang membentuk rangkaian teras LTE (Evolusi Jangka Panjang) digunakan kerana ia berada dalam seni bina NSA (Bukan Bersedia), dan hanya perubahan dalam seni bina SA (Standalone) telah berlaku. Juga, dalam kawasan rangkaian untuk menyediakan perkhidmatan suara, infrastruktur IMS (IP Multimedia Subsystem) masih digunakan dalam seni bina SA. Di sini, isunya ialah sementara komunikasi mudah alih 5G berkembang secara terbuka untuk menyediakan pelbagai perkhidmatan, elemen keselamatan terdedah kepada pelbagai serangan siber kerana ia mengekalkan bentuk yang sama seperti sebelum ini. Oleh itu, dalam makalah ini, kita akan melihat apakah standard rangkaian untuk penyediaan perkhidmatan suara 5G, dan apakah masalah yang terdedah dari segi keselamatan. Dan Kami Mencadangkan Senario Serangan Berkemungkinan menggunakan Isu Keselamatan, Kami juga ingin mempertimbangkan sama ada masalah ini sebenarnya boleh berlaku dan apakah tindakan balasnya.
Hyungjin CHO
Korea Internet & Security Agency
Seongmin PARK
Korea Internet & Security Agency
Youngkwon PARK
Korea Internet & Security Agency
Bomin CHOI
Korea Internet & Security Agency
Dowon KIM
Korea Internet & Security Agency
Kangbin YIM
Soonchunhyang University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Salinan
Hyungjin CHO, Seongmin PARK, Youngkwon PARK, Bomin CHOI, Dowon KIM, Kangbin YIM, "Analysis against Security Issues of Voice over 5G" in IEICE TRANSACTIONS on Information,
vol. E104-D, no. 11, pp. 1850-1856, November 2021, doi: 10.1587/transinf.2021NGP0017.
Abstract: In Feb 2021, As the competition for commercialization of 5G mobile communication has been increasing, 5G SA Network and Vo5G are expected to be commercialized soon. 5G mobile communication aims to provide 20 Gbps transmission speed which is 20 times faster than 4G mobile communication, connection of at least 1 million devices per 1 km2, and 1 ms transmission delay which is 10 times shorter than 4G. To meet this, various technological developments were required, and various technologies such as Massive MIMO (Multiple-Input and Multiple-Output), mmWave, and small cell network were developed and applied in the area of 5G access network. However, in the core network area, the components constituting the LTE (Long Term Evolution) core network are utilized as they are in the NSA (Non-Standalone) architecture, and only the changes in the SA (Standalone) architecture have occurred. Also, in the network area for providing the voice service, the IMS (IP Multimedia Subsystem) infrastructure is still used in the SA architecture. Here, the issue is that while 5G mobile communication is evolving openly to provide various services, security elements are vulnerable to various cyber-attacks because they maintain the same form as before. Therefore, in this paper, we will look at what the network standard for 5G voice service provision consists of, and what are the vulnerable problems in terms of security. And We Suggest Possible Attack Scenario using Security Issue, We also want to consider whether these problems can actually occur and what is the countermeasure.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.2021NGP0017/_p
Salinan
@ARTICLE{e104-d_11_1850,
author={Hyungjin CHO, Seongmin PARK, Youngkwon PARK, Bomin CHOI, Dowon KIM, Kangbin YIM, },
journal={IEICE TRANSACTIONS on Information},
title={Analysis against Security Issues of Voice over 5G},
year={2021},
volume={E104-D},
number={11},
pages={1850-1856},
abstract={In Feb 2021, As the competition for commercialization of 5G mobile communication has been increasing, 5G SA Network and Vo5G are expected to be commercialized soon. 5G mobile communication aims to provide 20 Gbps transmission speed which is 20 times faster than 4G mobile communication, connection of at least 1 million devices per 1 km2, and 1 ms transmission delay which is 10 times shorter than 4G. To meet this, various technological developments were required, and various technologies such as Massive MIMO (Multiple-Input and Multiple-Output), mmWave, and small cell network were developed and applied in the area of 5G access network. However, in the core network area, the components constituting the LTE (Long Term Evolution) core network are utilized as they are in the NSA (Non-Standalone) architecture, and only the changes in the SA (Standalone) architecture have occurred. Also, in the network area for providing the voice service, the IMS (IP Multimedia Subsystem) infrastructure is still used in the SA architecture. Here, the issue is that while 5G mobile communication is evolving openly to provide various services, security elements are vulnerable to various cyber-attacks because they maintain the same form as before. Therefore, in this paper, we will look at what the network standard for 5G voice service provision consists of, and what are the vulnerable problems in terms of security. And We Suggest Possible Attack Scenario using Security Issue, We also want to consider whether these problems can actually occur and what is the countermeasure.},
keywords={},
doi={10.1587/transinf.2021NGP0017},
ISSN={1745-1361},
month={November},}
Salinan
TY - JOUR
TI - Analysis against Security Issues of Voice over 5G
T2 - IEICE TRANSACTIONS on Information
SP - 1850
EP - 1856
AU - Hyungjin CHO
AU - Seongmin PARK
AU - Youngkwon PARK
AU - Bomin CHOI
AU - Dowon KIM
AU - Kangbin YIM
PY - 2021
DO - 10.1587/transinf.2021NGP0017
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E104-D
IS - 11
JA - IEICE TRANSACTIONS on Information
Y1 - November 2021
AB - In Feb 2021, As the competition for commercialization of 5G mobile communication has been increasing, 5G SA Network and Vo5G are expected to be commercialized soon. 5G mobile communication aims to provide 20 Gbps transmission speed which is 20 times faster than 4G mobile communication, connection of at least 1 million devices per 1 km2, and 1 ms transmission delay which is 10 times shorter than 4G. To meet this, various technological developments were required, and various technologies such as Massive MIMO (Multiple-Input and Multiple-Output), mmWave, and small cell network were developed and applied in the area of 5G access network. However, in the core network area, the components constituting the LTE (Long Term Evolution) core network are utilized as they are in the NSA (Non-Standalone) architecture, and only the changes in the SA (Standalone) architecture have occurred. Also, in the network area for providing the voice service, the IMS (IP Multimedia Subsystem) infrastructure is still used in the SA architecture. Here, the issue is that while 5G mobile communication is evolving openly to provide various services, security elements are vulnerable to various cyber-attacks because they maintain the same form as before. Therefore, in this paper, we will look at what the network standard for 5G voice service provision consists of, and what are the vulnerable problems in terms of security. And We Suggest Possible Attack Scenario using Security Issue, We also want to consider whether these problems can actually occur and what is the countermeasure.
ER -