{"title":"Security analysis of telecommunication networks of the 5G generation","authors":"O. Matsko","doi":"10.31673/2409-7292.2022.040003","DOIUrl":null,"url":null,"abstract":"The article examines the issues of protection in telecommunication networks of the new generation based on 5G technologies. Models of secure deployment of 5G networks, Protection of subscribers and devices, Network protection, New stack of IT protocols, Protection technologies used in 5G are considered. Inheritance of security across generations of technology is shown, comparison of LTE protection with 5G protection is made.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2022.040003","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The article examines the issues of protection in telecommunication networks of the new generation based on 5G technologies. Models of secure deployment of 5G networks, Protection of subscribers and devices, Network protection, New stack of IT protocols, Protection technologies used in 5G are considered. Inheritance of security across generations of technology is shown, comparison of LTE protection with 5G protection is made.