Security Analysis of Critical 5G Interfaces

被引:3
作者
Mahyoub, Mohammed [1 ]
Abdulghaffar, Abdulaziz [2 ]
Alalade, Emmanuel [1 ]
Ndubisi, Ezekiel [1 ]
Matrawy, Ashraf [1 ]
机构
[1] Carleton Univ, Sch Informat Technol, Ottawa, ON K1S 5B6, Canada
[2] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON K1S 5B6, Canada
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2024年 / 26卷 / 04期
基金
加拿大自然科学与工程研究理事会;
关键词
5G mobile communication; Protocols; 3GPP; Surveys; Tutorials; Organizations; 5G; security; interfaces; STRIDE; confidentiality; integrity; authentication; replay protection; privacy; TECHNOLOGIES; 6G;
D O I
10.1109/COMST.2024.3377161
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Interfaces play a crucial role in the Fifth Generation (5G) architecture as they interconnect Network Functions (NFs) to exchange data and services. Certain interfaces are particularly critical because they are involved in the exchange of sensitive data or are exposed externally. To the best of our knowledge, no literature work analyzes the 5G security from a network architecture or interface perspective. Therefore, existing research on 5G security may not be helpful when considering a certain component of the network or a specific interface. This paper reviews the security measures recommended by the selected Standardization Development Organizations (SDOs) for critical interfaces and classifies them based on security goals. It also identifies vulnerabilities and threats to these interfaces in the absence of security measures and categorizes them based on STRIDE model and impacted traffic types.
引用
收藏
页码:2382 / 2410
页数:29
相关论文
共 93 条
[1]   Network Slicing and Softwarization: A Survey on Principles, Enabling Technologies, and Solutions [J].
Afolabi, Ibrahim ;
Taleb, Tarik ;
Samdanis, Konstantinos ;
Ksentini, Adlen ;
Flinck, Hannu .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (03) :2429-2453
[2]   Security for 5G and Beyond [J].
Ahmad, Ijaz ;
Shahabuddin, Shahriar ;
Kumar, Tanesh ;
Okwuibe, Jude ;
Gurtov, Andrei ;
Ylianttila, Mika .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3682-3722
[3]  
Ahmad I, 2017, 2017 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), P193, DOI 10.1109/CSCN.2017.8088621
[4]   Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications [J].
Amponis, George ;
Radoglou-Grammatikis, Panagiotis ;
Lagkas, Thomas ;
Mallouli, Wissam ;
Cavalli, Ana ;
Klonidis, Dimitris ;
Markakis, Evangelos ;
Sarigiannidis, Panagiotis .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2022, 2022 (01)
[5]  
[Anonymous], 2022, 23214 TS 3GPP SOPH A
[6]  
[Anonymous], 2021, 33210 TS 3GPP SOPH A
[7]  
[Anonymous], 2019, ENISA THREAT LANDSCA
[8]  
[Anonymous], 2021, 38300 TS 3GPP SOPH A
[9]  
[Anonymous], 2022, 33512 TS 3GPP SOPH A
[10]  
[Anonymous], 2020, SECURITY ALGORITHM I