PROTOCOLS USED IN 4G AND 5G NETWORKS AND ASSESSMENT OF THEIR SECURITY EFFECTIVENESS
Abstract
This article evaluates the effectiveness of security measures used in 4G and 5G networks. It shows the vulnerability and resilience of 4G and 5G networks as a result of DDoS, Eavesdropping, Man-in-the-Middle, Signal Hijacking and Sim Cloning attacks. A brief overview of security vulnerabilities in 4G and 5G. Information about existing and possible problems in the 5G network is provided.
References
Madhusanka Liyanage, Ijoz Ahmed “A comprehensive guide to 5G security” John Wiley & Sons Ltd. - 2018.
Amitava Ghosh, Rapeepat Ratasuk, Simone Redana, Peter Rost “5G-Enabled Industrial IoT Networks” Artech House - 2022y.
Rakhmonov O. Sh., Musojonov H.M., Abdullayev A.R., “SECURITY PROTOCOLS, SAFEGUARDING THE DIGITAL FRONTIER”, Scientific Journal “SCHOLAR” 1 (30): [70-74].
URL: https://researchedu.org/index.php/openscholar/article/view/5262
Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila and A. Gurtov, "Overview of 5G Security Challenges and Solutions," in IEEE Communications Standards Magazine, vol. 2, no. 1, pp. 36-43, 2018y, URL:
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8334918&isnumber=8334903
Rakhmonov O. Sh., “Common and different aspects of security protocols used in 4G and 5G networks”, Proceedings of the international scientific and technical conference on the role of digital technologies in the development of exact sciences: problems and innovative solutions, 2024y: [318-322].
Umarov Sh., Rakhmonov O., “5G communication network capabilities and role in data protection”, International scientific and technical conference "Scientific basis of prospective application of innovative technologies in information communication", 2024: [392-397].