원문정보
초록
영어
This study evaluates 5G supply chain security approaches across EU and US regulatory landscapes. We move beyond traditional security research by examining how encryption systems, authentication mechanisms, and network virtualization technologies interrelate within comprehensive security frameworks. Our analysis uniquely integrates operational security perspectives with strategic policy considerations, providing insight into the complex relationship between supply chain vulnerabilities and broader risk governance approaches. This research addresses growing concerns about supply chain integrity in telecommunications infrastructure while filling significant knowledge gaps left by compartmentalized analyses of isolated technical components. By systematically comparing European and American regulatory approaches, we develop evaluation criteria for assessing encryption implementations, authentication protocols, virtualization security, and supply chain integrity measures. This creates a structured assessment methodology applicable across different implementation contexts. The findings establish a foundation for enhanced risk management that balances technical security requirements with broader strategic considerations. These insights help organizations develop more resilient security architectures for critical infrastructure deployments, ultimately supporting secure service delivery across essential 5G applications.
목차
1. Introduction
2. Related Research
3. Measures of Supply Chain Risk
3.1 5G network supply chain risk measures
3.2 Security Measures for the 5G standard
4. Conclusions
Acknowledgement
References
