THREATS, PROBLEMS AND INFORMATION SECURITY IN 5G NETWORKS
Keywords:
Providing information, 5G security issues, security threats.Abstract
The article analyzes information security threats in 5G data networks. The threats caused by the actions of intruders in 5G networks are considered. Problems in 5G networks are described. Formulated security in 5G networks.
References
Гольдштейн Б.С., Соколов Н.А., Яновский Г.Г. Сети связи: учебник для ВУЗов. – СПб.: БХВ- Петербург, 2014. – 400 с.
Джефер Г.П. Архитектура и процедуры обеспечения безопасности для систем 5G. 2021. С. 254.
Самойлов А.С. 5G-стандарт сотовой связи. 2020. С. 196.
Тихвинский В.О., Коваль В.А. Сети мобильной связи 5G. 2021. С 401.
Тинцзинь Д. Развитие сетей 5G в России. 2021. С. 184.
Стефан П. 5G Пятое поколение мобильной связи. 2021. С.290.
Омётов А.Я., Кучерявый Е.А., Андреев С.Д. О роли беспроводных технологий связи в развитии "Интернета Вещей" // Информационные технологии и телекоммуникации. 2014. № 3(7). С. 31–40.
Lu Q., Miao Q., Fodor G., Brahmi N. Clustering schemes for D2D communications under partial/no network coverage // IEEE 79th Vehicular Technology Conference (VTC Spring). 2014. P. 1–5. doi: 10.1109/vtcspring.2014.7022860
Perrig A., Stankovic J., Wagner D. Security in wireless sensor networks // Communications of the ACM. 2004. V. 47. N 6. P. 53–57. doi: 10.1145/990680.990707
McDaniel P., McLaughin S. Security and privacy challenges in the smart grid // IEEE Security & Privacy Magazine. 2009. V. 7. N 3. P. 75–77. doi: 10.1109/msp.2009.76
Hubaux J.-P., Capkun S., Luo J. The security and privacy of smart vehicles // IEEE Security & Privacy Magazine, 2004. V. 2. N 3. P. 49–55. doi: 10.1109/msp.2004.26
Diffie W., Hellman M.E. New directions in cryptography // IEEE Transactions on Information Theory. 1976. V. 22. N 6. P. 644–654. doi: 10.1109/tit.1976.1055638
Liu D., Ning P., Li R., Establishing pairwise keys in distributed sensor networks // ACM Transactions on Information and System Security (TISSEC). 2005. V. 8. N 1. P. 41–77. doi: 10.1145/1053283.1053287
Shamir A. How to share a secret // Communications of the ACM. 1979. V. 22. N 11. P. 612–613. doi: 10.1145/359168.359176
Shamir A. Identity-based cryptosystems and signature schemes // Lecture Notes in Computer Science. 1985. V. 196. P. 47–53. doi: 10.1007/3-540-39568-7_5
Perrig A., Szewczyk R., Tygar J., Wen V., Culler D.E. SPINS: security protocols for sensor networks // Wireless Networks. 2002. V. 8. N 5. P. 521–534. doi: 10.1023/a:1016598314198
Du W., Deng J., Han Y.S., Varshney P.K., Katz J., Khalili A. A pairwise key predistribution scheme for wireless sensor networks // ACM Transactions on Information and System Security (TISSEC). 2005. V. 8. N 2. P. 228–258. doi: 10.1145/1065545.1065548
Zhu S., Setia S., Jajodia S. LEAP+: efficient security mechanisms for large-scale distributed sensor networks // ACM Transactions on Sensor Networks. 2006. V. 2. N 4. P. 500–528. doi: 10.1145/1218556.1218559
Zimmermann P. Why I wrote PGP // Part of the Original PGP User's Guide. 1991.