Security and Protocol Exploit Analysis of the 5G Specifications

09/18/2018
by   Roger Piqueras Jover, et al.
0

The Third Generation Partnership Project (3GPP) released its first 5G security specifications in March 2018. This paper reviews the 5G security architecture, requirements and main processes and evaluates them in the context of known and new protocol exploits. Although the security has been enhanced when compared to previous generations, our analysis identifies some unrealistic system assumptions that are critical for security as well as a number protocol edge cases that render 5G systems vulnerable to adversarial attacks. For example, null encryption and null authentication are supported and can be used in valid system configurations and certain key security functions are still left outside of the scope of the specifications. Moreover, the entire 5G security architecture relies on the assumption of impractical carrier and roaming agreements and the management of public keys from all global operators. As a result, existing threats such as International Mobile Subscriber Identity (IMSI) catchers are prevented only if the serving network enforces optional security features and if the UE knows the public key of every single network operator. The comparison with 4G LTE protocol exploits reveals that the 5G security specifications, as of Release 15, do not fully address the user privacy and network availability concerns, where one edge case can compromise the privacy, security and availability of 5G users and services.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/17/2019

The current state of affairs in 5G security and the main remaining security challenges

The first release of the 5G protocol specifications, 3rd Generation Part...
research
10/15/2022

Assessing the Solid Protocol in Relation to Security Privacy Obligations

The Solid specification aims to empower data subjects by giving them dir...
research
09/04/2023

Fortifying Public Safety: A Dynamic Role-Based Access Control Paradigm for Cloud-Centric IoT

The evolution of communication technologies, exemplified by the Internet...
research
11/20/2018

Security management for backhaul-aware 5G-V2X

Security is a primary concern for the networks aiming at the utilization...
research
11/25/2021

Security Threats and Cellular Network Procedures for Unmanned Aircraft Systems

This paper discusses cellular network security for unmanned aircraft sys...
research
01/22/2023

SPEC5G: A Dataset for 5G Cellular Network Protocol Analysis

5G is the 5th generation cellular network protocol. It is the state-of-t...
research
03/20/2023

Attacks Against Security Context in 5G Network

The security context used in 5G authentication is generated during the A...

Please sign up or login with your details

Forgot password? Click here to reset