The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
2021년 5월 5G 이동통신 상용화 경쟁이 치열해지면서 5G SA망과 Vo5G도 곧 상용화될 것으로 예상된다. 20G 이동통신은 20G 이동통신보다 4배 빠른 1Gbps 전송속도, 1회당 최소 XNUMX만개 기기 연결이 목표다. km2, 1G보다 10배 짧은 전송 지연 4ms를 제공합니다. 이를 충족시키기 위해서는 다양한 기술 개발이 필요했고, Massive MIMO(Multiple-Input and Multiple-Output), mmWave, Small Cell Network 등 다양한 기술이 개발되어 5G 액세스 네트워크 분야에 적용되었습니다. 그러나 코어 네트워크 영역에서는 LTE(Long Term Evolution) 코어 네트워크를 구성하는 구성 요소를 NSA(Non-Standalone) 아키텍처 그대로 활용하고, SA(Standalone) 아키텍처의 변화만 발생했다. 또한, 음성 서비스를 제공하기 위한 네트워크 영역에서는 여전히 IMS(IP Multimedia Subsystem) 인프라가 SA 아키텍처로 사용되고 있다. 여기서 문제는 5G 이동통신이 다양한 서비스를 제공하기 위해 공개적으로 진화하고 있는 반면, 보안 요소는 기존과 동일한 형태를 유지하고 있어 각종 사이버 공격에 취약하다는 점이다. 따라서 본 논문에서는 5G 음성 서비스 제공을 위한 네트워크 표준이 무엇으로 구성되어 있는지, 보안 측면에서 취약한 문제점은 무엇인지 살펴보고자 한다. 그리고 보안 이슈를 활용하여 가능한 공격 시나리오를 제안하고, 이러한 문제가 실제로 발생할 수 있는지, 그리고 대응책은 무엇인지 고민해보고자 합니다.
Hyungjin CHO
Korea Internet & Security Agency
Seongmin PARK
Korea Internet & Security Agency
Youngkwon PARK
Korea Internet & Security Agency
Bomin CHOI
Korea Internet & Security Agency
Dowon KIM
Korea Internet & Security Agency
Kangbin YIM
Soonchunhyang University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
부
Hyungjin CHO, Seongmin PARK, Youngkwon PARK, Bomin CHOI, Dowon KIM, Kangbin YIM, "Analysis against Security Issues of Voice over 5G" in IEICE TRANSACTIONS on Information,
vol. E104-D, no. 11, pp. 1850-1856, November 2021, doi: 10.1587/transinf.2021NGP0017.
Abstract: In Feb 2021, As the competition for commercialization of 5G mobile communication has been increasing, 5G SA Network and Vo5G are expected to be commercialized soon. 5G mobile communication aims to provide 20 Gbps transmission speed which is 20 times faster than 4G mobile communication, connection of at least 1 million devices per 1 km2, and 1 ms transmission delay which is 10 times shorter than 4G. To meet this, various technological developments were required, and various technologies such as Massive MIMO (Multiple-Input and Multiple-Output), mmWave, and small cell network were developed and applied in the area of 5G access network. However, in the core network area, the components constituting the LTE (Long Term Evolution) core network are utilized as they are in the NSA (Non-Standalone) architecture, and only the changes in the SA (Standalone) architecture have occurred. Also, in the network area for providing the voice service, the IMS (IP Multimedia Subsystem) infrastructure is still used in the SA architecture. Here, the issue is that while 5G mobile communication is evolving openly to provide various services, security elements are vulnerable to various cyber-attacks because they maintain the same form as before. Therefore, in this paper, we will look at what the network standard for 5G voice service provision consists of, and what are the vulnerable problems in terms of security. And We Suggest Possible Attack Scenario using Security Issue, We also want to consider whether these problems can actually occur and what is the countermeasure.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.2021NGP0017/_p
부
@ARTICLE{e104-d_11_1850,
author={Hyungjin CHO, Seongmin PARK, Youngkwon PARK, Bomin CHOI, Dowon KIM, Kangbin YIM, },
journal={IEICE TRANSACTIONS on Information},
title={Analysis against Security Issues of Voice over 5G},
year={2021},
volume={E104-D},
number={11},
pages={1850-1856},
abstract={In Feb 2021, As the competition for commercialization of 5G mobile communication has been increasing, 5G SA Network and Vo5G are expected to be commercialized soon. 5G mobile communication aims to provide 20 Gbps transmission speed which is 20 times faster than 4G mobile communication, connection of at least 1 million devices per 1 km2, and 1 ms transmission delay which is 10 times shorter than 4G. To meet this, various technological developments were required, and various technologies such as Massive MIMO (Multiple-Input and Multiple-Output), mmWave, and small cell network were developed and applied in the area of 5G access network. However, in the core network area, the components constituting the LTE (Long Term Evolution) core network are utilized as they are in the NSA (Non-Standalone) architecture, and only the changes in the SA (Standalone) architecture have occurred. Also, in the network area for providing the voice service, the IMS (IP Multimedia Subsystem) infrastructure is still used in the SA architecture. Here, the issue is that while 5G mobile communication is evolving openly to provide various services, security elements are vulnerable to various cyber-attacks because they maintain the same form as before. Therefore, in this paper, we will look at what the network standard for 5G voice service provision consists of, and what are the vulnerable problems in terms of security. And We Suggest Possible Attack Scenario using Security Issue, We also want to consider whether these problems can actually occur and what is the countermeasure.},
keywords={},
doi={10.1587/transinf.2021NGP0017},
ISSN={1745-1361},
month={November},}
부
TY - JOUR
TI - Analysis against Security Issues of Voice over 5G
T2 - IEICE TRANSACTIONS on Information
SP - 1850
EP - 1856
AU - Hyungjin CHO
AU - Seongmin PARK
AU - Youngkwon PARK
AU - Bomin CHOI
AU - Dowon KIM
AU - Kangbin YIM
PY - 2021
DO - 10.1587/transinf.2021NGP0017
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E104-D
IS - 11
JA - IEICE TRANSACTIONS on Information
Y1 - November 2021
AB - In Feb 2021, As the competition for commercialization of 5G mobile communication has been increasing, 5G SA Network and Vo5G are expected to be commercialized soon. 5G mobile communication aims to provide 20 Gbps transmission speed which is 20 times faster than 4G mobile communication, connection of at least 1 million devices per 1 km2, and 1 ms transmission delay which is 10 times shorter than 4G. To meet this, various technological developments were required, and various technologies such as Massive MIMO (Multiple-Input and Multiple-Output), mmWave, and small cell network were developed and applied in the area of 5G access network. However, in the core network area, the components constituting the LTE (Long Term Evolution) core network are utilized as they are in the NSA (Non-Standalone) architecture, and only the changes in the SA (Standalone) architecture have occurred. Also, in the network area for providing the voice service, the IMS (IP Multimedia Subsystem) infrastructure is still used in the SA architecture. Here, the issue is that while 5G mobile communication is evolving openly to provide various services, security elements are vulnerable to various cyber-attacks because they maintain the same form as before. Therefore, in this paper, we will look at what the network standard for 5G voice service provision consists of, and what are the vulnerable problems in terms of security. And We Suggest Possible Attack Scenario using Security Issue, We also want to consider whether these problems can actually occur and what is the countermeasure.
ER -