Detailed Information

Cited 0 time in webofscience Cited 2 time in scopus
Metadata Downloads

Analysis against Security Issues of Voice over 5G

Authors
Cho, HyungjinPark, SeongminPark, YoungkwonChoi, BominKim, DowonYim, Kangbin
Issue Date
1-Jan-2021
Publisher
Oxford University Press
Keywords
5G voice communication; voice over 5G; mobile network; IMS; SIP; 5G security
Citation
IEICE Transactions on Information and Systems, v.E104D, no.11, pp 1850 - 1856
Pages
7
Journal Title
IEICE Transactions on Information and Systems
Volume
E104D
Number
11
Start Page
1850
End Page
1856
URI
https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/20047
DOI
10.1587/transinf.2021NGP0017
ISSN
0916-8532
1745-1361
Abstract
In Feb 2021, As the competition for commercialization of 5G mobile communication has been increasing, 5G SA Network and Vo5G are expected to be commercialized soon. 5G mobile communication aims to provide 20 Gbps transmission speed which is 20 times faster than 4G mobile communication, connection of at least 1 million devices per 1 km(2), and 1 ms transmission delay which is 10 times shorter than 4G. To meet this, various technological developments were required, and various technologies such as Massive MIMO (Multiple-Input and Multiple-Output), mmWave, and small cell network were developed and applied in the area of 5G access network. However, in the core network area, the components constituting the LTE (Long Term Evolution) core network are utilized as they are in the NSA (Non-Standalone) architecture, and only the changes in the SA (Standalone) architecture have occurred. Also, in the network area for providing the voice service, the IMS (IP Multimedia Subsystem) infrastructure is still used in the SA architecture. Here, the issue is that while 5G mobile communication is evolving openly to provide various services, security elements are vulnerable to various cyber-attacks because they maintain the same form as before. Therefore, in this paper, we will look at what the network standard for 5G voice service provision consists of, and what are the vulnerable problems in terms of security. And We Suggest Possible Attack Scenario using Security Issue, We also want to consider whether these problems can actually occur and what is the countermeasure.
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Yim, Kang bin photo

Yim, Kang bin
College of Software Convergence (Department of Information Security Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE