Conference System of NULES of Ukraine, GLOBAL AND REGIONAL PROBLEMS OF INFORMATIZATION IN SOCIETY AND NATURE USING 2021

Font Size: 
ADAPTATION OF SECURITY MECHANISMS IN 5G WIRELESS NETWORKS TO EXISTING METHODS AND MEANS OF PREVIOUS STANDARDS
Сергій Юрійович Даков, Іван Іванович Перхоменко

Last modified: 11-05-2021

Abstract


The main feature of the 5G network is the slicing of the network. This concept provides network resource efficiency, deployment flexibility, and support for the rapid growth of additional OTT applications and services. Cutting a network involves dividing the 5G physical architecture into several virtual networks or layers. Each network layer (fragment) includes control layer functions, user traffic layer functions and a radio access network. Isolation of slices is an important requirement that allows you to apply the basic concept of slicing the network for the simultaneous coexistence of several fragments in one infrastructure. This property is achieved by the fact that the performance of each slice should not affect the performance of the other. The architecture of network fragments expands in two main aspects: slice protection (cyberattacks or malfunctions affect only the target slice and have a limited impact on the life cycle of other existing ones) and slice privacy (private information about each slice, such as user statistics) is not shared fragments). In 5G, the interaction of user equipment with data networks is established using PDU sessions. Multiple PDU sessions can be active at the same time to connect to different networks. In this case, different sessions can be created using different network functions, following the concept of network slicing. The concept of "network architecture", which is developed on hardware solutions, loses its relevance. It would be more appropriate to call it a 5G system or platform, because it is implemented using software solutions.
Keywords: authentication, cellular network, wireless network, cybersecurity

Keywords


автентифікація, стільникова мережа, бездротова мережа, кібербезпека