qSIM 기반 5G 상용망과 차세대 M-BcN 연동 보안 기법 연구

Vol. 35, No. 3, pp. 639-647, 6월. 2025
10.13089/JKIISC.2025.35.3.639, Full Text:
Keywords: KCMVP, Authentication Protocol, 5G security, Quantum Security
Abstract

With the Ministry of National Defense promoting digital transformation based on 5G to advance smart defense innovation, research and development efforts are underway to enable interoperability between commercial 5G networks and the Military Broadband Convergence Network (M-BcN). In commercial 5G networks, security measures are limited to mutual authentication between the USIM and the 5G core network and protection of the wireless section, which does not ensure end-to-end security up to the M-BcN. Furthermore, because commercial 5G networks employ foreign cryptographic algorithms such as AES in compliance with international standards, they cannot satisfy defense security requirements that mandate the use of cryptographic algorithms subject to national verification and evaluation. Therefore, to enable secure access to the M-BcN via commercial 5G networks, an identification and authentication mechanism based on verified cryptographic algorithms is required. In this context, this paper proposes a secure mobile work environment using a user identification and authentication protocol based on qSIM, a KCMVP-certified cryptographic module.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
김찬혁, 이옥연, 김형엽, 위한샘, "Study on Security Mechanisms for Interworking Between qSIM-Based 5G Networks and Next-Generation M-BcN," Journal of The Korea Institute of Information Security and Cryptology, vol. 35, no. 3, pp. 639-647, 2025. DOI: 10.13089/JKIISC.2025.35.3.639.

[ACM Style]
김찬혁, 이옥연, 김형엽, and 위한샘. 2025. Study on Security Mechanisms for Interworking Between qSIM-Based 5G Networks and Next-Generation M-BcN. Journal of The Korea Institute of Information Security and Cryptology, 35, 3, (2025), 639-647. DOI: 10.13089/JKIISC.2025.35.3.639.