Browse > Article
http://dx.doi.org/10.14400/JDC.2019.17.12.197

Security Vulnerability and Countermeasure on 5G Networks: Survey  

Hong, Sunghyuck (Baekseok University, Division of ICT)
Publication Information
Journal of Digital Convergence / v.17, no.12, 2019 , pp. 197-202 More about this Journal
Abstract
In line with the era of the 4th Industrial Revolution, 5G technology has become common technology, and 5G technology is evaluated as a technology that minimizes the speed and response speed compared to 4G using technologies such as network slicing and ultra-multiple access. 5G NR stands for 5G mobile communication standard, and network slicing cuts the network into parallel connections to optimize the network. In addition, the risk of hacking is increasing as data is processed in the base station unit. In addition, since the number of accessible devices per unit area increases exponentially, there is a possibility of base station attack after hacking a large number of devices in the unit area. To solve this problem, this study proposes the introduction of quantum cryptography and 5G security standardization.
Keywords
5G; Network Slicing; Base station; Quantum Cryptography; Standardization; Process;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 T. Wolf. (n.d.). Kr (Krypton). Ac - Na Landolt-Bornstein - Group III Condensed Matter, 352-352. DOI:10.1007/10332996_91
2 5G Network Planning and Optimization. (2019). 5G Explained, 255-269. DOI:10.1002/9781119275695.ch9
3 D. J. Bernstein. (n.d.). Introduction to post-quantum cryptography. Post-Quantum Cryptography, 1-14. DOI :10.1007/978-3-540-88702-7_1
4 P. Kok & B. W. Lovett. (n.d.). Quantum communication with continuous variables. Introduction to Optical Quantum Information Processing, 255-293. DOI : 10.1017/cbo9781139193658.009
5 J. Lee & Y. Kwak. (2016). 5G Standard Development: Technology and Roadmap. Signal Processing for 5G, 561-576. DOI :10.1002/9781119116493.ch23
6 5G Technology Revolution. (2017). International Journal of Modern Trends in Engineering & Research, 4(12), 135-140. DOI:10.21884/ijmter.2017.4394.2tmix
7 K. Asatani. (2018). Trends and Issues in 5G Networking and Beyond. Journal of ICT Standardization, 5(3), 203-224. DOI : 10.13052/jicts2245-800x.531   DOI
8 S. Hong, (2014). Research on Wireless Sensor Networks Security Attack and Countermeasures : Survey. Convergence Society for SMB, 4(4), 1-6
9 E. Choi. (2018). Visualization Management Convergence Access Control Model for Cloud Environments. Journal of Convergence for Information Technology, 8(5), 69-75   DOI
10 A. Petosa. (2018). Engineering the 5G Environment. 2018 IEEE 5G World Forum (5GWF). DOI :10.1109/5gwf.2018.8516930
11 E. Dahlman, S. Parkvall & J. Skold. (2018). 5G Standardization. 5G NR: The Next Generation Wireless Access Technology, 7-25. DOI :10.1016/b978-0-12-814323-0.00002-8
12 T. Yoo. (2016). Network slicing architecture for 5G network. 2016 International Conference on Information and Communication Technology Convergence (ICTC). DOI :10.1109/ictc.2016.7763354
13 S. Anamalamudi, A. R. Sangi, M. Alkatheiri, F. T. B. Muhaya & C. Liu. (2018). 5G-WLAN Security. A Comprehensive Guide to 5G Security, 143-163. DOI : 10.1002/9781119293071.ch7
14 D. Yeom. (2018). Remote Control of Network-based Modular Robot. Journal of Convergence for Information Technology, 8(5), 77-83   DOI
15 Y. Jeong. (2018). User Privacy Management Model using Multiple Group Factor based on Blockchain. Journal of Convergence for Information Technology, 8(5), 107-113 DOI : 10.22156/CS4SMB.2018.8.5.107   DOI
16 K. I. Kim, (2018). Differences Between Client's and Supplier's receptions of IT Outsourcing Risks. Journal of Convergence for Information Technology, 8(5), 237-242. DOI : 10.22156/CS4SMB.2018.8.5.237   DOI