2022
DOI: 10.1109/access.2022.3151000
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Analysis of 5G Networks With a Focus on 5G Core Security

Abstract: After many years of work, 5G standards are still under development and the corresponding technical specifications continue to evolve on the fly. At this moment, several countries have started to deploy 5G networks, and most of them have been following a Non-Standalone (NSA) path to incorporate the existing 4G and other legacy networks. Despite all the advertisement efforts, many people still do not have a clear view on how 5G can power all the promised mission-critical applications in a secure manner. In this … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…and the entire core network control surface can even be affected. Tang et al [42] describes two security threats that exploit security vulnerabilities in the Packet Forwarding Control Protocol (PFCP) to affect the normal operation of the UPF.…”
Section: Threats On Ne Deployment Of Upf Sinkingmentioning
confidence: 99%
“…and the entire core network control surface can even be affected. Tang et al [42] describes two security threats that exploit security vulnerabilities in the Packet Forwarding Control Protocol (PFCP) to affect the normal operation of the UPF.…”
Section: Threats On Ne Deployment Of Upf Sinkingmentioning
confidence: 99%
“…Rapid response mechanisms reduce the impact of cyber attacks and enhance overall network resilience , Suomalainen et. al., 2021, Tang et. al., 2022.…”
Section: Strategic Responses To Security Challengesmentioning
confidence: 99%
“…Tang et al [39] discussed the new security features of 5GS recommended by 3GPP including those for the UE and RAN, 5G-AKA protocol, and Common API Framework (CAPIF). They analyzed the security measures related to the 5G management of the UE communications during the registration, de-registration, and mobility management process.…”
Section: B a Summary Of 5g Security Recommendationsmentioning
confidence: 99%
“…Focused on confidentiality and integrity protection in the 5G-AN interfaces using recommended cryptographic algorithms specified by 3GPP. Tang et al [39] 2022 Reviewed the new security features of 5GS recommended by 3GPP.…”
Section: B a Summary Of 5g Security Recommendationsmentioning
confidence: 99%