BigMac (SIC): Performance Overhead of User Plane Integrity Protection in 5G networks

被引:4
作者
Heijligenberg, Thijs [1 ]
Knips, Guido [1 ]
Boehm, Christian [2 ]
Rupprecht, David [3 ]
Kohls, Katharina [1 ]
机构
[1] Radboud Univ Nijmegen, Nijmegen, Netherlands
[2] Ruhr Univ, Bochum, Germany
[3] Radix Secur, Bochum, Germany
来源
PROCEEDINGS OF THE 16TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2023 | 2023年
关键词
5G; integrity protection; latency; performance;
D O I
10.1145/3558482.3581777
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
5G introduces a series of new security features that overcome known issues of the previous mobile generations. One of these features is integrity protection for user plane data. While this addition protects against manipulations like DNS spoofing, it also introduces extra overhead to user plane traffic. As it is optional to enable, this additional overhead can be the decision point for network operators to avoid the additional security feature. In this work, we investigate the overhead induced by different integrity protection algorithms and test the burden they add to the workload of a device. Our results indicate how visible performance differences would be on the end-devices of users, and how the performance of the algorithms differs in isolation. With these results we aim to initiate a discussion regarding the benefits of enabling user plane integrity protection and to overcome misconceptions regarding the performance impairments for end users.
引用
收藏
页码:145 / 150
页数:6
相关论文
共 19 条
[1]  
3GPP, 2022, Technical Specifications (TS) 22.186
[2]  
3GPP, 2019, Technical Specification (TS) 23.288, 3rd Generation Partnership Project (3GPP)
[3]  
Ahmad N., 2010, 2010 IEEE Symposium on Industrial Electronics and Applications (ISIEA 2010), P696, DOI 10.1109/ISIEA.2010.5679375
[4]  
[Anonymous], 2020, 3GPP TSG RAN LIST ET
[5]  
Barkan E, 2003, LECT NOTES COMPUT SC, V2729, P600
[6]  
Beierle Christof, 2021, 2021819 CRYPT EPRINT
[7]  
Biham E, 2005, LECT NOTES COMPUT SC, V3788, P443
[8]  
Dworkin M., 2016, Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption, pNIST SP 800
[9]  
Ekdahl Patrik., T SYMMETRIC CRYPTOLO
[10]  
El Hajj Ghizlane Orhanou, NEW LTE CRYPT ALG EE