THREATS, PROBLEMS AND INFORMATION SECURITY IN 5G NETWORKS

Authors

  • Gafurov A.Sh. TUIT named after Muhammad al-Khwarizmi, Assistant of the Department of Technologies of mobile communication, E-mail: gafurovasror686@gmail.com

Keywords:

Providing information, 5G security issues, security threats.

Abstract

The article analyzes information security threats in 5G data networks. The threats caused by the actions of intruders in 5G networks are considered. Problems in 5G networks are described. Formulated security in 5G networks.

References

Гольдштейн Б.С., Соколов Н.А., Яновский Г.Г. Сети связи: учебник для ВУЗов. – СПб.: БХВ- Петербург, 2014. – 400 с.

Джефер Г.П. Архитектура и процедуры обеспечения безопасности для систем 5G. 2021. С. 254.

Самойлов А.С. 5G-стандарт сотовой связи. 2020. С. 196.

Тихвинский В.О., Коваль В.А. Сети мобильной связи 5G. 2021. С 401.

Тинцзинь Д. Развитие сетей 5G в России. 2021. С. 184.

Стефан П. 5G Пятое поколение мобильной связи. 2021. С.290.

Омётов А.Я., Кучерявый Е.А., Андреев С.Д. О роли беспроводных технологий связи в развитии "Интернета Вещей" // Информационные технологии и телекоммуникации. 2014. № 3(7). С. 31–40.

Lu Q., Miao Q., Fodor G., Brahmi N. Clustering schemes for D2D communications under partial/no network coverage // IEEE 79th Vehicular Technology Conference (VTC Spring). 2014. P. 1–5. doi: 10.1109/vtcspring.2014.7022860

Perrig A., Stankovic J., Wagner D. Security in wireless sensor networks // Communications of the ACM. 2004. V. 47. N 6. P. 53–57. doi: 10.1145/990680.990707

McDaniel P., McLaughin S. Security and privacy challenges in the smart grid // IEEE Security & Privacy Magazine. 2009. V. 7. N 3. P. 75–77. doi: 10.1109/msp.2009.76

Hubaux J.-P., Capkun S., Luo J. The security and privacy of smart vehicles // IEEE Security & Privacy Magazine, 2004. V. 2. N 3. P. 49–55. doi: 10.1109/msp.2004.26

Diffie W., Hellman M.E. New directions in cryptography // IEEE Transactions on Information Theory. 1976. V. 22. N 6. P. 644–654. doi: 10.1109/tit.1976.1055638

Liu D., Ning P., Li R., Establishing pairwise keys in distributed sensor networks // ACM Transactions on Information and System Security (TISSEC). 2005. V. 8. N 1. P. 41–77. doi: 10.1145/1053283.1053287

Shamir A. How to share a secret // Communications of the ACM. 1979. V. 22. N 11. P. 612–613. doi: 10.1145/359168.359176

Shamir A. Identity-based cryptosystems and signature schemes // Lecture Notes in Computer Science. 1985. V. 196. P. 47–53. doi: 10.1007/3-540-39568-7_5

Perrig A., Szewczyk R., Tygar J., Wen V., Culler D.E. SPINS: security protocols for sensor networks // Wireless Networks. 2002. V. 8. N 5. P. 521–534. doi: 10.1023/a:1016598314198

Du W., Deng J., Han Y.S., Varshney P.K., Katz J., Khalili A. A pairwise key predistribution scheme for wireless sensor networks // ACM Transactions on Information and System Security (TISSEC). 2005. V. 8. N 2. P. 228–258. doi: 10.1145/1065545.1065548

Zhu S., Setia S., Jajodia S. LEAP+: efficient security mechanisms for large-scale distributed sensor networks // ACM Transactions on Sensor Networks. 2006. V. 2. N 4. P. 500–528. doi: 10.1145/1218556.1218559

Zimmermann P. Why I wrote PGP // Part of the Original PGP User's Guide. 1991.

Downloads

Published

2022-12-25