Detailed Information

Cited 0 time in webofscience Cited 2 time in scopus
Metadata Downloads

Analysis against Security Issues of Voice over 5G

Full metadata record
DC Field Value Language
dc.contributor.authorCho, Hyungjin-
dc.contributor.authorPark, Seongmin-
dc.contributor.authorPark, Youngkwon-
dc.contributor.authorChoi, Bomin-
dc.contributor.authorKim, Dowon-
dc.contributor.authorYim, Kangbin-
dc.date.accessioned2021-12-07T05:40:05Z-
dc.date.available2021-12-07T05:40:05Z-
dc.date.issued2021-01-01-
dc.identifier.issn0916-8532-
dc.identifier.issn1745-1361-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/20047-
dc.description.abstractIn Feb 2021, As the competition for commercialization of 5G mobile communication has been increasing, 5G SA Network and Vo5G are expected to be commercialized soon. 5G mobile communication aims to provide 20 Gbps transmission speed which is 20 times faster than 4G mobile communication, connection of at least 1 million devices per 1 km(2), and 1 ms transmission delay which is 10 times shorter than 4G. To meet this, various technological developments were required, and various technologies such as Massive MIMO (Multiple-Input and Multiple-Output), mmWave, and small cell network were developed and applied in the area of 5G access network. However, in the core network area, the components constituting the LTE (Long Term Evolution) core network are utilized as they are in the NSA (Non-Standalone) architecture, and only the changes in the SA (Standalone) architecture have occurred. Also, in the network area for providing the voice service, the IMS (IP Multimedia Subsystem) infrastructure is still used in the SA architecture. Here, the issue is that while 5G mobile communication is evolving openly to provide various services, security elements are vulnerable to various cyber-attacks because they maintain the same form as before. Therefore, in this paper, we will look at what the network standard for 5G voice service provision consists of, and what are the vulnerable problems in terms of security. And We Suggest Possible Attack Scenario using Security Issue, We also want to consider whether these problems can actually occur and what is the countermeasure.-
dc.format.extent7-
dc.language영어-
dc.language.isoENG-
dc.publisherOxford University Press-
dc.titleAnalysis against Security Issues of Voice over 5G-
dc.typeArticle-
dc.publisher.location일본-
dc.identifier.doi10.1587/transinf.2021NGP0017-
dc.identifier.scopusid2-s2.0-85119451671-
dc.identifier.wosid000716561600007-
dc.identifier.bibliographicCitationIEICE Transactions on Information and Systems, v.E104D, no.11, pp 1850 - 1856-
dc.citation.titleIEICE Transactions on Information and Systems-
dc.citation.volumeE104D-
dc.citation.number11-
dc.citation.startPage1850-
dc.citation.endPage1856-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.subject.keywordAuthor5G voice communication-
dc.subject.keywordAuthorvoice over 5G-
dc.subject.keywordAuthormobile network-
dc.subject.keywordAuthorIMS-
dc.subject.keywordAuthorSIP-
dc.subject.keywordAuthor5G security-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Yim, Kang bin photo

Yim, Kang bin
College of Software Convergence (Department of Information Security Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE