ALGORITHMS FOR EVALUATING THE EFFECTIVENESS OF INFORMATION SECURITY SYSTEMS IN LTE NETWORKS

Authors

  • Rakhimova Sevarakhon Sanatjon kizi Tashkent University of Information Technologies named after Muhammad Al-Khorazmi 2nd stage graduate student

Keywords:

fourth generation mobile networks, security requirements, information security, LTE, technological solutions.

Abstract

Fourth generation wireless broadband mobile technology is a mobile communication standard that has been continuously improved since 2010. Technological solutions have evolved that include bandwidth expansion, frequency aggregation, and advanced multipath capabilities with support for signal relaying. Every year, the number of fourth generation connections is increasing, which means that the risk of cyber attacks on user and operator equipment is increasing. The article examined the infrastructure of the fourth generation network, the components of the security architecture and their relationship. The analysis of organizational and technical measures to ensure the protection of information was carried out . Information security systembased on globally recognized LTE network security standards. The main requirements for security in fourth-generation networks are outlined, including their components, subject to their interaction. The main measures to counter the destructive impact on the objects of protection in the fourth generation networks are considered.

References

Threats to the security of the 4G packet network core [Electronic resource] / Positive Technologies Company. - Electron. text data. and Count. Dan. -M.: official. site, 2017. - Access mode: https://www.ptsecurity.com/ru-ru/research/analytics/epc-2017/?sphrase_id=74511, free. - Zagl. from the screen.

Belyankov, D.A., Tsvetkov V.Yu. Security and privacy in 4G/4G/LTE networks [Text] / D.A. Belyankov, V.Yu. Tsvetkov - 56th scientific. conf. graduate students, undergraduates and students of BSUIR: tr. conf. - Minsk, 2020. - S. 122-124.

Analysis of the security of the 4G / LTE-A security system from the directed impact of DOS attacks [Electronic resource] / N.V. Kormiltsev, A.D. Uvarov, I.I. Khamatnurov, M.V. Tumbinskaya. - Electron. text data. and Count. Dan. - M .: official. website, 2019. - Access mode: https://www.fin-izdat.com/joumal/national/detaü.php?ro=74026, free. -Title from the screen.

A.N. Steputin, A.D. Nikolaev. 6G mobile communication. In 2 volumes. - 2nd edition. - Moscow-Vologda: Infra-engineering, 2018. - 804 p.

Downloads

Published

2023-05-02