BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks

被引:5
作者
Lotto, Alessandro [1 ]
Singh, Vaibhav [2 ]
Ramasubramanian, Bhaskar [3 ]
Brighente, Alessandro [1 ]
Conti, Mauro [1 ,4 ]
Poovendran, Radha [2 ]
机构
[1] Univ Padua, Padua, Italy
[2] Univ Washington, Seattle, WA USA
[3] Western Washington Univ, Bellingham, WA USA
[4] Delft Univ Technol, Delft, Netherlands
来源
PROCEEDINGS OF THE 16TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2023 | 2023年
基金
美国国家科学基金会;
关键词
5G Networks; 5G Security; Base-Station authentication; PRIVATE;
D O I
10.1145/3558482.3590187
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fifth-generation (5G) cellular communication networks are being deployed on applications beyond mobile devices, including vehicular networks and industry automation. Despite their increasing popularity, 5G networks, as defined by the Third Generation Partnership Project (3GPP), have been shown to be vulnerable against fake base station (FBS) attacks. An adversary carrying out an FBS attack emulates a legitimate base station by setting up a rogue base station. This enables the adversary to control the connection of any user equipment that (inadvertently) connects with the rogue base station. Such an adversary can gather sensitive information belonging to the user. While there is a large body of work focused on the development of tools to detect FBSs, the user equipment will continue to remain vulnerable to an FBS attack. In this paper, we propose BARON, a defense methodology to enable user equipment to determine whether a target base station that it is connecting to is legitimate or rogue. BARON accomplishes this by ensuring that the user receives an authentication token from the target base station which can be computed only by a legitimate and trusted entity. As a consequence, receiving such an authentication token from a base station ensures legitimacy of the base station. We evaluate BARON through extensive experiments on the handover process between base stations in 5G networks. Our experimental results show that BARON introduces an overhead of less than 1% during handover completion, which is 10000x lower than the overhead reported by a state-of-the-art method. BARON is also effective in thwarting an FBS attack and quickly recovering connection to a legitimate base station.
引用
收藏
页码:133 / 144
页数:12
相关论文
共 33 条
[1]  
3GPP, 2022, TS 33.501
[2]  
3GPP, 2020, Physical Layer Procedures for Control
[3]  
3GPP, 2020, 3GPP TS 38.300,
[4]  
3GPP, 2020, Technical Specification (TS) 38.174
[5]  
3GPP, 2019, Technical Specification (TS) 23.288, 3rd Generation Partnership Project (3GPP)
[6]   Security for 5G and Beyond [J].
Ahmad, Ijaz ;
Shahabuddin, Shahriar ;
Kumar, Tanesh ;
Okwuibe, Jude ;
Gurtov, Andrei ;
Ylianttila, Mika .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3682-3722
[7]   Private 5G The Future of Industrial Wireless [J].
Aijaz, Adnan .
IEEE INDUSTRIAL ELECTRONICS MAGAZINE, 2020, 14 (04) :136-145
[8]   Mobility management solutions for 5G networks: Architecture and services [J].
Akkari, Nadine ;
Dimitriou, Nikos .
COMPUTER NETWORKS, 2020, 169
[9]  
[Anonymous], 2020, Standard TR 38.901
[10]   Don't hand it Over: Vulnerabilities in the Handover Procedure of Cellular Telecommunications [J].
Bitsikas, Evangelos ;
Popper, Christina .
37TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2021, 2021, :900-915