5G communication security test method and system

A communication security and testing system technology, applied in the field of wireless communication security, can solve the problems of complex challenges, inability to test, no hardware platform test device, etc., to achieve stable and reliable performance, improved security, and a wide range of applications.

Pending Publication Date: 2021-06-22
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF11 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The security issues of 5G in terms of terminal access identity authentication, 5G terminal security, network slicing, Internet of Things, and Internet of Vehicles are all different from the requirements of the 3G / 4G era, so the challenges faced will be more complex
The paper carried out a software system simulation, but there is no actual hardware platform test device, and it cannot be tested in a real physical environment
[0008] Existing technologies on 5G communications mainly involve improvement schemes for security protection of 5G communications. Existing technologies cannot implement comprehensive and effective security tests for the entire 5G communications security system, and cannot provide security evaluation solutions for large-scale applications of 5G communications.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • 5G communication security test method and system
  • 5G communication security test method and system
  • 5G communication security test method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific illustrations.

[0045] In order to comprehensively and efficiently test the security of 5G communication security, this solution simulates the security threat simulation attack according to the interface type of the test object and the test project requirements, and sends the security threat simulation attack to the test object in the normal working state. This simulates the situation where the object under test is attacked by a security threat;

[0046] At the same time, evaluate whether the security protection system of the test object is perfect and effective according to the reaction of the test object after being attacked and the effect of the attack.

[0047] Accordingly, this solution provides a 5G communication security test system to realize the above-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a 5G communication security test method and system, and the method comprises the steps: simulating a security threat simulation attack according to the interface type of a test object and test project requirements, and transmitting the security threat simulation attack to a to-be-tested object in a normal working state; and testing the communication security of the to-be-tested object based on the sent security threat simulation attack. According to the scheme, simulation attacks can be carried out on the 5G terminal, the communication network, the communication facility and the communication equipment, and the safety of 5G communication is tested. Through a 5G security test, whether the 5G communication equipment and the communication infrastructure have security holes or not, and whether the problems of information leakage, unauthorized access, signaling attack, signal interference, communication hijacking and the like exist or not can be found.

Description

technical field [0001] The invention relates to the field of information network security, in particular to wireless communication security technology. Background technique [0002] With the rapid development of 5G technology, China has gradually entered the stage of full-scale commercial use of 5G communications. Operators have launched 5G mobile communication services in major cities, and more and more people are gradually using mobile terminal devices with 5G communication functions. [0003] As a key information infrastructure and an important cornerstone of digital transformation, 5G communication opens up a new situation for the Internet of Everything, but it also brings new security challenges and risks, which has become a common problem facing the world. The security issues of 5G in terms of terminal access identity authentication, 5G terminal security, network slicing, Internet of Things, and Internet of Vehicles are different from those in the 3G / 4G era, so the ch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24H04W12/121
CPCH04L63/1408H04L63/1433H04L63/20H04L41/145
Inventor 吴炬肖容杨晓炯
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products