Security and privacy vulnerabilities of 5G/6G and WiFi 6: Survey and research directions from a coexistence perspective

被引:37
作者
Ramezanpour, Keyvan [1 ]
Jagannath, Jithin [1 ]
Jagannath, Anu [1 ]
机构
[1] ANDRO Computat Solut LLC, Marconi Rosenblatt AI ML Innovat Lab, Rome, NY 13440 USA
关键词
5G; Access security; Coexistence networks; Physical layer authentication; Rogue base-station; Spectrum sharing; WiFi; PHYSICAL-LAYER AUTHENTICATION; PILOT SPOOFING ATTACK; PERFORMANCE ANALYSIS; WIRETAP CHANNELS; SECRECY CAPACITY; LDPC CODES; NETWORKS; ACCESS; SYSTEMS; DESIGN;
D O I
10.1016/j.comnet.2022.109515
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Spectrum scarcity has been a major concern for achieving the desired quality of experience (QoE) in next -generation (5G/6G and beyond) networks supporting a massive volume of mobile and IoT devices with low-latency and seamless connectivity. Hence, spectrum sharing systems have been considered as a major enabler for next-generation wireless networks in meeting QoE demands. Specifically, the 3rd generation partnership project (3GPP) has standardized coexistence of 4G LTE License Assisted Access (LAA) network with WiFi in the unlicensed 5 GHz bands, and the 5G New Radio Unlicensed (NR-U) with WiFi 6/6E in 6 GHz bands. While most current coexistence solutions and standards focus on performance improvement and QoE optimization, the emerging security challenges of such network environments have been ignored in the literature. The security framework of standalone networks (either 5G or WiFi) assumes the ownership of entire network resources from spectrum to core functions. Hence, all accesses to the network shall be authenticated and authorized within the intra-network security system and is deemed illegal otherwise. However, coexistence network environments can lead to unprecedented security vulnerabilities and breaches as the standalone networks shall tolerate unknown and out-of-network accesses, specifically in the medium access. In this paper, for the first time in literature, we review some of the critical and emerging security vulnerabilities in the 5G/WiFi coexistence network environment which have not been observed previously in standalone networks. Specifically, independent medium access control (MAC) protocols and the resulting hidden node issues can result in exploitation such as service blocking, deployment of rogue base-stations, and eavesdropping attacks. We study potential vulnerabilities in the perspective of physical layer authentication, network access security, and cross-layer authentication mechanisms. This study opens a new direction of research in the analysis and design of a security framework that can address the unique challenges of coexistence networks.
引用
收藏
页数:14
相关论文
共 88 条
[1]  
Abo-Soliman M.A., 2018, P 13 INT C AVAILABIL, P1
[2]   Security for 5G and Beyond [J].
Ahmad, Ijaz ;
Shahabuddin, Shahriar ;
Kumar, Tanesh ;
Okwuibe, Jude ;
Gurtov, Andrei ;
Ylianttila, Mika .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3682-3722
[3]   All-Digital Self-Interference Cancellation Technique for Full-Duplex Systems [J].
Ahmed, Elsayed ;
Eltawil, Ahmed M. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (07) :3519-3532
[4]   Vulnerabilities of Massive MIMO Systems to Pilot Contamination Attacks [J].
Akgun, Berk ;
Krunz, Marwan ;
Koyluoglu, O. Ozan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) :1251-1263
[5]   Nested Polar Codes for Wiretap and Relay Channels [J].
Andersson, Mattias ;
Rathi, Vishwambhar ;
Thobaben, Ragnar ;
Kliewer, Jorg ;
Skoglund, Mikael .
IEEE COMMUNICATIONS LETTERS, 2010, 14 (08) :752-754
[6]  
[Anonymous], 2010, PROC IEEE INFORM THE
[7]   A USIM compatible 5G AKA protocol with perfect forward secrecy [J].
Arkko, Jari ;
Norrman, Karl ;
Naslund, Mats ;
Sahlin, Bengt .
2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, :1205-1209
[8]  
Athanasakos M., 2020, GLOBECOM 2020 2020 I, P1
[9]  
Bai Lin, 2020, [Journal of Communications and Information Networks, 通信与信息网络学报], V5, P237
[10]  
Barker B.C., 2000, P ION NTM 2001 SESSI, P542