5G core network security issues and attack classification from network protocol perspective

Hwankuk Kim

 

Department of Information Security Engineering,

Sangmyung University, 31, Sangmyengdae-gil, Cheonan-si, South Korea

rinyfeel@smu.ac.kr

 

Abstract

Fifth-generation technology [5G] services commercialized in 2019 have not only provided voice and data communication but also undergone significant structural changes in mobile networks to accommodate Internet-of-things devices, sensitive to latency and reliability, by adopting the latest ICT technologies, such as software-defined networking/network function virtualization, multi-access edge computing, and network slicing. However, this technological evolution poses new security challenges, such as creation of new access paths, owing to its complex inter-operation structures, security downgrading, and limitations in security visibility. To address these issues, research on 5G security threats and security architecture has been actively underway at international standards organizations, communication carriers, and universities. However, security researchers find it difficult to conduct studies on 5G security technology design and application methods owing to the relatively unknown nature of the mobile carrier network. Therefore, in this paper, we analyzed five new security issues for each 5G section, relative to 5G technical advantages, by reviewing previous studies. In addition, we classified cyber attacks against nine network protocols primarily used in the 5G core network. The result of this study is expected to be used as basic data for modeling 5G security threats. 

 

Keywords: 5G security, Internet of things, 5G security technology, Cyber attacks, 5G threats

 

+: Corresponding author: Hwankuk Kim
Department of Information Security Engineering, Sangmyung University, Tel: +82-(0)41-550-5101

 

Journal of Internet Services and Information Security (JISIS), 10(2): 1-15, May 2020

DOI: 10.22667/JISIS.2020.05.31.001 [pdf]