Complex security architecture in 5G networks based on the construction of domains of trust

A. H. Zakharzhevskyy
{"title":"Complex security architecture in 5G networks based on the construction of domains of trust","authors":"A. H. Zakharzhevskyy","doi":"10.31673/2409-7292.2023.010008","DOIUrl":null,"url":null,"abstract":"The article discusses key approaches to building a security system in 5G networks. It is determined that the security architecture in 5G networks is based on the use of 3G and 4G technologies in combination with new protocols and functions. It is shown that the list of vulnerabilities of 5G networks expands due to decentralization, which creates an opportunity to attack the computing resources of local devices, which are a priori less protected than the central nodes of the network core. The concept of building trust domains, which allow building complex protection taking into account the possibility of attacks at different levels, has been studied.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2023.010008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The article discusses key approaches to building a security system in 5G networks. It is determined that the security architecture in 5G networks is based on the use of 3G and 4G technologies in combination with new protocols and functions. It is shown that the list of vulnerabilities of 5G networks expands due to decentralization, which creates an opportunity to attack the computing resources of local devices, which are a priori less protected than the central nodes of the network core. The concept of building trust domains, which allow building complex protection taking into account the possibility of attacks at different levels, has been studied.
基于信任域构建的5G网络复杂安全架构
本文讨论了构建5G网络安全体系的关键途径。确定5G网络的安全架构是基于3G和4G技术的使用,并结合新的协议和功能。研究表明,由于去中心化,5G网络的漏洞列表会扩大,这为攻击本地设备的计算资源创造了机会,这些设备的先天保护程度低于网络核心的中心节点。研究了建立信任域的概念,该概念允许在考虑不同级别攻击可能性的情况下建立复杂的保护。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信