PROTOCOLS USED IN 4G AND 5G NETWORKS AND ASSESSMENT OF THEIR SECURITY EFFECTIVENESS

Authors

  • Rakhmonov Ozodbek Shavkatjon ugli

Abstract

This article evaluates the effectiveness of security measures used in 4G and 5G networks. It shows the vulnerability and resilience of 4G and 5G networks as a result of DDoS, Eavesdropping, Man-in-the-Middle, Signal Hijacking and Sim Cloning attacks. A brief overview of security vulnerabilities in 4G and 5G. Information about existing and possible problems in the 5G network is provided.

References

Madhusanka Liyanage, Ijoz Ahmed “A comprehensive guide to 5G security” John Wiley & Sons Ltd. - 2018.

Amitava Ghosh, Rapeepat Ratasuk, Simone Redana, Peter Rost “5G-Enabled Industrial IoT Networks” Artech House - 2022y.

Rakhmonov O. Sh., Musojonov H.M., Abdullayev A.R., “SECURITY PROTOCOLS, SAFEGUARDING THE DIGITAL FRONTIER”, Scientific Journal “SCHOLAR” 1 (30): [70-74].

URL: https://researchedu.org/index.php/openscholar/article/view/5262

Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila and A. Gurtov, "Overview of 5G Security Challenges and Solutions," in IEEE Communications Standards Magazine, vol. 2, no. 1, pp. 36-43, 2018y, URL:

https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8334918&isnumber=8334903

Rakhmonov O. Sh., “Common and different aspects of security protocols used in 4G and 5G networks”, Proceedings of the international scientific and technical conference on the role of digital technologies in the development of exact sciences: problems and innovative solutions, 2024y: [318-322].

Umarov Sh., Rakhmonov O., “5G communication network capabilities and role in data protection”, International scientific and technical conference "Scientific basis of prospective application of innovative technologies in information communication", 2024: [392-397].

Downloads

Submitted

2024-11-21

Published

2024-11-17