Page 182 - 5G Basics - Core Network Aspects
P. 182

1                                                Core network aspects


            Appropriateness of operation may be checked by the introduction of formal method, whose requirement is
            described in [ITU-T Y.3320]. It is also important to prevent or mitigate other kinds of security breaches, e.g.,
            denial of service by e.g., filtering of packets to target functionality.
            A logically centralized controller can be a single point of failure, and can be a target of malicious attacks. It is
            therefore important to pay special attention to redundancy designs.
            The  possibilities  and  challenges  will  be  described  in  more  detail  in  forthcoming  ITU-T  X-series
            Recommendations.














































































            172
   177   178   179   180   181   182   183   184   185   186   187