earticle

논문검색

IT Marketing and Policy

Measures of Supply Chain and Risk of EU & US against 5G Security Threats

초록

영어

This study evaluates 5G supply chain security approaches across EU and US regulatory landscapes. We move beyond traditional security research by examining how encryption systems, authentication mechanisms, and network virtualization technologies interrelate within comprehensive security frameworks. Our analysis uniquely integrates operational security perspectives with strategic policy considerations, providing insight into the complex relationship between supply chain vulnerabilities and broader risk governance approaches. This research addresses growing concerns about supply chain integrity in telecommunications infrastructure while filling significant knowledge gaps left by compartmentalized analyses of isolated technical components. By systematically comparing European and American regulatory approaches, we develop evaluation criteria for assessing encryption implementations, authentication protocols, virtualization security, and supply chain integrity measures. This creates a structured assessment methodology applicable across different implementation contexts. The findings establish a foundation for enhanced risk management that balances technical security requirements with broader strategic considerations. These insights help organizations develop more resilient security architectures for critical infrastructure deployments, ultimately supporting secure service delivery across essential 5G applications.

목차

Abstract
1. Introduction
2. Related Research
3. Measures of Supply Chain Risk
3.1 5G network supply chain risk measures
3.2 Security Measures for the 5G standard
4. Conclusions
Acknowledgement
References

저자정보

  • Jin-keun Hong Professor, Division of Advanced IT, Baekseok University, Korea

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.