{"title":"5G一代电信网络的安全分析","authors":"O. Matsko","doi":"10.31673/2409-7292.2022.040003","DOIUrl":null,"url":null,"abstract":"The article examines the issues of protection in telecommunication networks of the new generation based on 5G technologies. Models of secure deployment of 5G networks, Protection of subscribers and devices, Network protection, New stack of IT protocols, Protection technologies used in 5G are considered. Inheritance of security across generations of technology is shown, comparison of LTE protection with 5G protection is made.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security analysis of telecommunication networks of the 5G generation\",\"authors\":\"O. Matsko\",\"doi\":\"10.31673/2409-7292.2022.040003\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article examines the issues of protection in telecommunication networks of the new generation based on 5G technologies. Models of secure deployment of 5G networks, Protection of subscribers and devices, Network protection, New stack of IT protocols, Protection technologies used in 5G are considered. Inheritance of security across generations of technology is shown, comparison of LTE protection with 5G protection is made.\",\"PeriodicalId\":107068,\"journal\":{\"name\":\"Modern information security\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Modern information security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31673/2409-7292.2022.040003\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2022.040003","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security analysis of telecommunication networks of the 5G generation
The article examines the issues of protection in telecommunication networks of the new generation based on 5G technologies. Models of secure deployment of 5G networks, Protection of subscribers and devices, Network protection, New stack of IT protocols, Protection technologies used in 5G are considered. Inheritance of security across generations of technology is shown, comparison of LTE protection with 5G protection is made.