Published December 25, 2024
| Version v2
Journal article
Open
ASSESSMENT OF THE LEVEL OF SECURITY AVAILABLE IN 4G AND 5G MOBILE COMMUNICATION NETWORKS
Creators
- 1. Associate Professor of Information Security Department at the Fergana branch of TUIT
- 2. Assistant teacher of Information Security Department at the Fergana branch of TUIT
Description
This paper evaluates security tolerance in 4G and 5G networks. It shows the vulnerability and resilience of 4G and 5G networks to DDoS, Eavesdropping, Man-in-the-Middle, Signal Hijacking and Sim Cloning attacks. Information about existing and possible problems in the 5G network will be provided. The results of the security work that can be implemented in 5G and its tolerance with existing security measures are shown
Files
final_53_592-294-297-Umarov.pdf
Files
(852.5 kB)
Name | Size | Download all |
---|---|---|
md5:0f421614b641ec1f3bdcacb28ea5dadd
|
852.5 kB | Preview Download |
Additional details
References
- Dilshodov, A., & Khaitboev, E. (2023). Software Defined Networking (SDN) and OPENFLOW protocol in 5G network. Engineering problems and innovations .
- Larry Peterson, Oguz Sunay, 5G mobile networks: A systems approach, Springer Nature Switzerland AG, 2022.
- Rakhmonov O. Sh., "Protocols used in 4G and 5G networks and assessment of their security effectiveness", The Journal of Multidisciplinary bulletin, Vol. 07 No. 10 (2024) [31-35].
- URL: https://sirpublishers.org/index.php/jomb/article/view/939
- Rakhmonov O. Sh., "Common and different aspects of security protocols used in 4G and 5G networks", Proceedings of the international scientific and technical conference on the role of digital technologies in the development of exact sciences: problems and innovative solutions, 2024y: 318-322.
- Umarov, S. (2024). Practical Significance of Industrial Information Systems in Modern Science. Miasto Przyszłości, 53, 815-818.
- Umarov Sh., Rakhmonov O., "5G communication network capabilities and role in data protection", International scientific and technical conference "Scientific basis of prospective application of innovative technologies in information communication", 2024, [392-397].
- Madaminov, HX, Valiyev, HN, & qizi Valiyeva, MO (2021, October). 5G NETWORK. ANALYSIS OF NETWORK INFORMATION SECURITY ISSUES. In "ONLINE-CONFERENCES" PLATFORM (pp. 56-59).
- Turdimatov, M., Mukhtarov, F., Ibrokhimov, N., Umarov, S., Mirzayev, J., & Rakhmatov, R. (2024, November). Mathematical approximator based on basic spline approximation. In E3S Web of Conferences (Vol. 508, p. 04010). EDP Sciences.
- Rakhmanov, son of OS, Musojonov, son of HM, & Abdullayev, son of AR. (2023). SECURITY PROTOCOLS, SAFEGUARDING THE DIGITAL FRONTIER. SCHOLAR, 1 (30), 70–74. Retrieved from https://researchedu.org/index.php/openscholar/article/view/5262
- Мухториддинов, М., Акбаров, Н., & Умаров, Ш. (2023, October). Machine learning for network security and anomaly detection. In Conference on Digital Innovation:" Modern Problems and Solutions"