Download PDFOpen PDF in browserReview: Network Security of 5G networkEasyChair Preprint 72604 pages•Date: December 23, 2021AbstractFifth-generation technology (5G) was introduced as a commercialized one in 2019 and officially by 3GPP International Telecommunication Union (ITU) is IMT-2020.In 5G, the functionalities are not limited by voice and data, and there has happened a structural change to the internet of things devices, sensitive to latency by 3GPP and reliability. However, this technological evolution poses more challenges than previous, like creating a new access path, following complex interoperation structures, security downgrading, and security visibility-related limitations. Research on 5G security threats and architecture has been actively ongoing at ISO communication carriers and universities to handle such problems. Because of the unknown nature of mobile carrier networks, security researchers find it challenging to research 5G security technology design and application process. Here various security attacks and some security treads have been discussed. It is expected to use the output as basic data for 5G modeling. Keyphrases: 5G Security, 5G security technology, Cyberattacks.
|