Toward Vulnerability Assessment for 5G Mobile Communication Networks

Author(s):  
Shibo Luo ◽  
Jun Wu ◽  
Jianhua Li ◽  
Longhua Guo ◽  
Bei Pei
2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Yanfang Zha

The deployment of cache and computing resources in 5G mobile communication networks is considered as an important way to reduce network transmission delay and redundant content transmission and improve the efficiency of content distribution and network computing processing capacity, which has been widely concerned and recognized by academia and industry. Aiming at the development trend of cache and computing resource allocation in 5G mobile communication networks, in order to improve the efficiency of content cache and reduce network energy consumption, a 5G network cache optimization strategy based on Stackelberg game was proposed, which modeled network operators and content providers as multimaster and multislave Stackelberg game model. Providers buy base station storage space from network operators to cache popular content. In this paper, we construct the strategy space and profit function of the two sides of the game and prove the existence of Nash equilibrium solution among content providers given a set of base station rental prices of network operators. In this paper, distributed iterative algorithm is used to solve the game model, and the optimal base station pricing of network operators and the optimal base station occupancy rate of content providers are obtained.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5524
Author(s):  
Seongmin Park ◽  
Daeun Kim ◽  
Youngkwon Park ◽  
Hyungjin Cho ◽  
Dowon Kim ◽  
...  

Advances in mobile communication networks from 2G to 5G have brought unprecedented traffic growth, and 5G mobile communication networks are expected to be used in a variety of industries based on innovative technologies, fast not only in terms of extremely low latency but massive access devices. Various types of services, such as enhanced mobile broadband (eMBB), massive machine type communication (mMTC), and ultra-reliable and low latency communication (uRLLC), represent an increase in the number of attacks on users’ personal information, confidential information, and privacy information. Therefore, security assessments are essential to verify and cope with these various attacks. In this research, we (1) looked at 5G mobile communication network backgrounds and problems to investigate existing vulnerabilities and (2) assessed the current situation through evaluation of 5G security threats in real-world mobile networks in service.


Sign in / Sign up

Export Citation Format

Share Document