A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication


DongGyun Chu, Jinho Yoo, Journal of Information Processing Systems Vol. 20, No. 1, pp. 38-52, Feb. 2024  

10.3745/JIPS.03.0192
Keywords: 5G Mobile Networks, Security Requirements, Security Threats
Fulltext:

Abstract

The 5G is the 5th generation mobile network that provides enhanced mobile broadband, ultra-reliable & low latency communications, and massive machine-type communications. New services can be provided through multi-access edge computing, network function virtualization, and network slicing, which are key technologies in 5G mobile communication. However, these new technologies provide new attack paths and threats. In this paper, we analyzed the overall threats of 5G mobile communication through a literature review. First, defines 5G mobile communication, analyzes its features and technology architecture, and summarizes possible security issues. Addition, it presents security threats from the perspective of user devices, radio access network, multiaccess edge computing, and core networks that constitute 5G mobile communication. After that, security requirements for threat factors were derived through literature analysis. The purpose of this study is to conduct a fundamental analysis to examine and assess the overall threat factors associated with 5G mobile communication. Through this, it will be possible to protect the information and assets of individuals and organizations that use 5G mobile communication technology, respond to various threat situations, and increase the overall level of 5G security.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Chu, D. & Yoo, J. (2024). A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication. Journal of Information Processing Systems, 20(1), 38-52. DOI: 10.3745/JIPS.03.0192.

[IEEE Style]
D. Chu and J. Yoo, "A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication," Journal of Information Processing Systems, vol. 20, no. 1, pp. 38-52, 2024. DOI: 10.3745/JIPS.03.0192.

[ACM Style]
DongGyun Chu and Jinho Yoo. 2024. A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication. Journal of Information Processing Systems, 20, 1, (2024), 38-52. DOI: 10.3745/JIPS.03.0192.