{"title":"Complex security architecture in 5G networks based on the construction of domains of trust","authors":"A. H. Zakharzhevskyy","doi":"10.31673/2409-7292.2023.010008","DOIUrl":null,"url":null,"abstract":"The article discusses key approaches to building a security system in 5G networks. It is determined that the security architecture in 5G networks is based on the use of 3G and 4G technologies in combination with new protocols and functions. It is shown that the list of vulnerabilities of 5G networks expands due to decentralization, which creates an opportunity to attack the computing resources of local devices, which are a priori less protected than the central nodes of the network core. The concept of building trust domains, which allow building complex protection taking into account the possibility of attacks at different levels, has been studied.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2023.010008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The article discusses key approaches to building a security system in 5G networks. It is determined that the security architecture in 5G networks is based on the use of 3G and 4G technologies in combination with new protocols and functions. It is shown that the list of vulnerabilities of 5G networks expands due to decentralization, which creates an opportunity to attack the computing resources of local devices, which are a priori less protected than the central nodes of the network core. The concept of building trust domains, which allow building complex protection taking into account the possibility of attacks at different levels, has been studied.