Page 182 - 5G Basics - Core Network Aspects
P. 182
1 Core network aspects
Appropriateness of operation may be checked by the introduction of formal method, whose requirement is
described in [ITU-T Y.3320]. It is also important to prevent or mitigate other kinds of security breaches, e.g.,
denial of service by e.g., filtering of packets to target functionality.
A logically centralized controller can be a single point of failure, and can be a target of malicious attacks. It is
therefore important to pay special attention to redundancy designs.
The possibilities and challenges will be described in more detail in forthcoming ITU-T X-series
Recommendations.
172