5G Security Threat Assessment in Real Networks
Abstract
:1. Introduction
- -
- We divided 5G NSA security threats into radio access network (RAN) and core network (CN) to create an attack tree and develop 15 test cases that can be applied to real networks.
- -
- We verified the developed 15 test cases on the actual three mobile carriers’ networks and identifies eight valid vulnerabilities.
- -
- Of these eight valid vulnerabilities, we proposed equipment PKG software patches or configuration changes for five and relevant countermeasures for the remaining three.
2. Background
2.1. 5G NSA Arthitecture
- User equipment (UE): User terminals and includes smartphones, USB modems, computers with built-in mobile communication modules.
- Evolved node B (eNB): Provides wireless interface to UE and is used for functions related to UE control in 5G.
- Next generation node B (gNB): Provides wireless interface to UE and is used for data transmission.
- Mobility management entity (MME): Manages authentication and connection status, and active status for UE.
- Home subscriber server (HSS): A central database that manages key information and subscriber profile for authentication for each UE. When an UE accesses the network, it delivers relevant key information and subscriber profile for UE authentication to MME.
- Serving gateway (S-GW): Routes and delivers user packets between the base-station and P-GWs, and plays a role of anchoring point when the UE performs handover between eNBs or gNBs.
- Packet data network gateway (P-GW): Connects the UE to an external packet data network (PDN). It acts as a channel for delivery packets between the UE and the PDN, and performs functions such as charging according to data usage and allocating IP address to the UE.
2.2. 5G NSA Attachment Procedure
2.2.1. 5G NSA NAS Security Setup Procedure
2.2.2. 5G NSA EPS Session Establishment Procedure
- (S5 GTP-U tunnel creation) Figure 4 shows the procedure to create S5 GTP-U tunnel represented in a sequence diagram. UE IP is allocated in PGW first, followed by S5 GTP-U tunnel creation between SGW and PGW.
- (eNB DBR and S1 GTP-U tunnel creation) Figure 5 shows the procedure to create eNB DRB and S1 GTP-U tunnels represented in a sequence diagram. Where, DRB is formed between a terminal and eNB, and then S1 bearer is formed between eNB and SGW.
3. Related Work
4. Security Challenges
4.1. 5 Types of RAN Security Threats
- Type.R1. Information Leak: Information leak involves threats such as paging sniffing and IMSI cracking. Paging sniffing is a method of passive scanning all kinds of information by exploiting the broadcasting of paging messages transmitted from wireless base stations to terminals. The attacker can install a software defined radio (SDR) device that can receive radio frequency (RF) signals near the target victim and find out the victim’s SAE-temporary mobile subscriber identity (S-TMSI) or paging cycle. Additionally, the attacker can calculate paging frame index (PFI) using the identified paging cycle and reduce the number of candidates for the victim’s IMSI to 8 at most using the calculated PFI. The attacker sends IMSI paging where the 8 IMSI candidates are inserted to the victim and observes the responses to intercept the victim’s IMSI [21].
- Type.R2. User DoS: Radio resource control (RRC) connection DoS, RRC reject DoS, and RRC release DoS are available for target-type user DoS. Among them, RRC connection DoS is a security threat using the victim’s S-TMSI that was found through the aforementioned information leak attack. Unlike the core network, wireless base stations do not have authentication procedures for terminals, which can be exploited to continuously interfere with the victim’s wireless access. The attacker inserts the victim’s S-TMSI value into the RRC connection request message used in wireless access by the terminal, and sends the message to the base-station accessed by the victim. On this occasion, the base-station disconnects the victim’s RRC connection but makes RRC connection with the attacker, which is disconnected in the course of attempting security setup from the attacker’s terminal. After this, it would not be a problem if the victim’s terminal made a normal RRC connection successfully, but the attacker keeps sending the manipulated RRC connection request message and the victim will not be able to get the service continuously [5].
- Type.R3. Base-Station DoS: A typical case of target-type network device DoS in a wireless network is a wireless base-station resource depletion. At the time of the first RRC connection, the terminal performs Random Access that creates a random ID and sends RRC connection request. An attacker can exploit this to attempt RRC connection and transfer even NAS attach request using the victim’s IMSI. When requesting authentication and waiting for the response in the core network, the attacker can perform Random Access again, repeat the above process, and keep increasing the number of RRC connection in the base-station [5].
- Type.R4. Eavesdropping: In principle, eavesdropping on wireless networks is impossible due to AS security settings between terminals and base stations. However, there can be a case that involves extracting AS Security Keystream and decoding. Voice traffic in mobile communication consists of real-time transport protocol (RTP) protocol, which is delivered using a voice bearer, unlike a data bearer in wireless sections. Because quality of service (QoS) must be guaranteed, a voice bearer is not a default bearer but a dedicated bearer where a separated QoS class identifier (QCI) is applied. A total of 4 elements are used when creating keystream for ciphering in AS security procedure: count, direction, length, and bearer ID. Three of these four elements, except bearer ID, do not act as critical variables in creating the keystream. In particular, bearer ID (DRB ID) is allocated when a base-station creates voice bearer, and a manufacturer’s base-station may have a problem of allocating the same DRB ID within the same RRC connection. In order to exploit this problem, an attacker keeps the victims’ ciphered voice communication using a sniffer. Not long after the victims’ calls are ended, the attacker attempts to make a voice call to one of the victims, and keeps the plan-text and cyber-text of the call using a sniffer when the call is made. On this occasion, the attacker applies the plane-text and ciphered-text of the second call to XOR logic to extract keystream, and the extracted keystream can be used to decode the first call because these calls was made in the same RRC connection and used the same DRB ID. 3GPP TS 33.401 recommends the use of different DRB IDs in other bearers to prevent a DRB ID from being reused in a base station [22].
- Type.R5. Unauthorized Data Use: Two bearers, a default bearer and a dedicated bearer, created in a terminal have to be used for permitted purposes, but the attacker can use them differently from the original purpose to use the data without permission. It is possible to have data communication between terminals without paying any communication fee using a dedicated bearer. Especially, caller spoofing is also possible by utilizing direct communication properly [23].
4.2. 6 Types of Core Network Security Threats
- Type.C1. Information Leak: Information on 5G NSA core networks can be largely divided into information on EPC equipment to process the data and information on IMS equipment to provide various services. Because EPC equipment communicates using GTP protocol and IMS equipment communicates using session initiation protocol (SIP) protocol, the attacker can select a protocol suitable for the desired information. GTP protocol is divided into GTP-C used between core network equipment, and GTP-U that delivers data traffic in the user terminal through a tunnel between the base station and PGW. In order to find out the IP information of the EPC equipment, the attacker can use a packet injection method that loads an echo request, GTP-C message for health check between core network equipment, on the data payload to send. When running Android debug bridge (ADB) command in Android terminal using a program called Packit, a packet is created, and when sending the packet to the IP band identified through Tracert in tethering status, the GTP-C packet is injected and transmitted to the mobile communication network. PGW checks this and sends echo response, where the attacker can identify that the source IP of that message is PGW IP [24].
- Type.C2. IP Depletion: The packet injection method described earlier to provoke information leak threat is called GTP-in-GTP, and the attacker can deplete IP Pools allocated to terminals in the core network through the same method. While GTP-C echo request that plays a role of ping is used to acquire IP for core network equipment, GTP-C Create Session Request is injected and sent to the core network to allocate the IP to the terminal. The attacker can increase the terminal number in the create session request sequentially so that PGW allocates multiple IPs. If PGW allocates all of available IPs, create session requests from normal terminals would be rejected, and all of terminals accessing that core network could not communicate [24].
- Type.C3. DoS: An attacker can send an attach-request message continuously to access the 5G NSA network by configuring multiple terminals as botnets and repeating airplane mode on/off. This may cause excessive traffic load on a certain mobile carrier’s core network. One attach request can create maximum eight GTP-C messages, which brings 8 times the amount of traffic to the CN function in the core network in proportion to one malicious manipulation done by the attacker [25].
- Type.C4. NAS Manipulation: Of NAS protocol messages for signaling between terminals and core network, attach-request messages used in the initial attaching step do not have their ciphering or integrity guaranteed. Therefore, an attacker can install a rogue base-station near the victim to steal and manipulate those messages. In particular, an attach request-message has UE network capability field that can set ciphering or integrity for all data received or transmitted by the terminal. An attacker can manipulate values in EEA that is a field to transmit ciphering algorithm selected by the terminal, and EIA that is a field to transmit integrity verification algorithm selected by the terminal, within the UE network capability field. 3GPP technical specification (TS.) 33.401 defines the essential use of integrity verification algorithm in terminals but defines the selective use of ciphering algorithm. In fact, the test results conducted by Ruhr university in Germany in 2019 on five European countries and 12 carriers showed that four of 12 carriers do not even allow the use of integrity that must be used [6].
- Type.C5. Eavesdropping: Voice communication on a 5G network uses IMS network and initiates session through SIP protocol according to 3GPP standard. Therefore, security in SIP protocol is very important and done mainly through internet protocol security (IPSec) security associations (SAs). However, IPSec SAs is also selectively done by 5G network operators, and supporting voice over LTE (VoLTE) does not mean supporting all IPSec because of its significant impact on the terminal performance. The Samsung Galaxy S10 model, a recently released 5G terminal, also supports IPSec, but there is a problem in which the setting in question can be turned off through a hidden menu. If an attacker can remotely access the victim’s hidden menu and change the IPSec setting, the victim’s call will communicate without ciphering. If EEA field is changed through NAS manipulation described above and NAS ciphering algorithm is not used, wireless communication in AS section is non-ciphered either. In this situation, an attacker can sniff wireless traffic in the form of man in the middle (MitM) and eavesdrop on the unencrypted victim’s voice traffic as it is [26].
- Type.C6. Spoofing: IP spoofing is a typical network attack. If an attacker changes the IP of data traffic transmitted from every 5G network to the victim’s IP and sends the data traffic, its responses are all delivered to the victim, which can cause invalid charging and even DoS. Additionally, SIP or MMS spoofing can be abused for voice phishing. When the “from” header that indicates the outgoing number in the SIP packet header is falsified, the incoming terminal displays that falsified number [24,27].
5. Security Threat Test Cases
5.1. RAN Test Cases
5.2. CN Test Cases
6. Test Tool Implementation and Test Environments
6.1. Tool Development
6.2. Test Environment
7. Test Results and Mitigation in Real Networks
8. Countermeasures and Future Work
8.1. Countermeasures through Standardization
8.2. Technical Countermeasures
Algorithm 1. Scanning traffic detection algorithm. |
Data: (1) Value of Identification a IP Packet N(P) (2) Destination Port of the IP Packet DP(P), Destination Port of Payload in the IP Packet DP(Pin) (3) two protocols Gc, Gu, and the Destination Ports of these two protocols DP(Gc), DP(Gu) (4) Value of Upper 2Bytes of Payload in the IP Packet UB(Pin) (5) Flags Header’s values of GTP-C Echo Request messages F(Gce) (6) Payload’s Length in the IP Packet L(Pin), Value of Message Length Header of Payload in the IP Packet ML(Pin) Result: Scanning Detection Result of the IP Packet from 5G UE to 5G EPC SD(P) DP (Gc) = 2123; // GTP-C Port Number DP (Gu) = 2152; // GTP-U Port Number F (Gce) = 4001; // Flag if DP (P) == DP (Gu)&&DP (Pin) == DP (Gc) then UB(Pin) = Value of Upper 2Bytes of Payload; if UB(Pin) == F (Gce) then L(Pin) = Payload’s Lengths; ML(Pin) = Value of Message Length Header of Payload; SD(P) = 0; if L(Pin) == 21&&ML(Pin) == 9 then SD(P) = 1; else end if else end if else end if return SD(P) and N(P); |
Algorithm 2. Resource exhaustion traffic detection algorithm. |
Data: (1) Value of Identification a IP Packet N(P) (2) Destination Port of the IP Packet DP(P), Destination Port of Payload in the IP Packet DP(Pin) (3) two protocols Gc, Gu, and the Destination Ports of these two protocols DP(Gc), DP(Gu) (4) Value of Upper 2Bytes of Payload in the IP Packet UB(Pin), Value of Upper 12th 1Byte of Payload in the IP Packet UB12(Pin) (5) Flags Header’s value of GTP-C Create Session Request messages F(Gcc), Spare Header’s value of GTP-C Create Session Request message S(Gcc) (6) Payload’s Length in the IP Packet L(Pin), Value of Message Length Header of Payload in the IP Packet ML(Pin), Message Length of Create Session Request message in the IP Packet MLc(Pin) Result: Resource Exhaustion Detection Result of the IP Packet from 5G UE to 5G EPC RED(P) DP (Gc) = 2123; // GTP-C Port Number DP (Gu) = 2152; // GTP-U Port Number F (Gcc) = 4820; S (Gcc) = 0; if DP (P) == DP (Gu)&&DP (Pin) == DP (Gc) then UB(Pin) = Value of Upper 2Bytes of Payload; UB12(Pin) = Value of Upper 12th 1Byte of Payload; if UB(Pin) == F (Gcc)&&UB12(Pin) == S (Gcc) then L(Pin) = Payload’s Lengths; ML(Pin) = Value of Message Length Header of Payload; MLc(Pin) = L(Pin) − 12; RED(P) = 0; if L(Pin) < 280&&L(Pin) > 200&&ML(Pin) == MLc (Pin) then RED(P) = 1; else end if else end if else end if return RED(P) and N(P); |
9. Concluding Remarks
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- International Telecommunication Union Radiocommunication. Minimum Requirements Related to Technical Performance for IMT-2020 Radio Interface(s); Report ITU-R M.2410-0, 2017.11; International Telecommunication Union Radiocommunication: Geneva, Switzerland, 2017. [Google Scholar]
- International Telecommunication Union Radiocommunication. Detailed Specifications of the Terrestrial Radio Interfaces of International Mobile Telecommunications-2020 (IMT-2020); Recommendation ITU-R M.2150-0, 2021.02; International Telecommunication Union Radiocommunication: Geneva, Switzerland, 2021. [Google Scholar]
- Gartner. Gartner Forecasts Worldwide 5G Network Infrastructure Revenue to Reach $4.2 Billion in 2020. 22 August 2019. Available online: https://www.gartner.com/en/newsroom/press-releases/2019-08-22-gartner-forecasts-worldwide-5g-network-infrastructure (accessed on 17 August 2021).
- Mind Commerce. 5G Security Market: Technologies, Solutions, and Market Outlook 2018–2023; Mind Commerce: Seattle, WA, USA, 2018. [Google Scholar]
- Kim, H.; Lee, J.; Lee, E.; Kim, Y. Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane. In Proceedings of the 2019 IEEE Symposium on Security & Privacy (SP), San Francisco, CA, USA, 19–23 May 2019. [Google Scholar]
- Chlosta, M.; Rupprecht, D.; Holz, T.; Pöpper, C. LTE security disabled: Misconfiguration in commercial networks. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ‘19), Association for Computing Machinery, New York, NY, USA, 15–17 May 2019; pp. 261–266. [Google Scholar]
- Third Generation Partnership Project. Intra-Domain Connection of Radio Access Network (RAN) Nodes to Multiple Core Network (CN) Nodes. TS 23.236, 9 July 2020. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=825 (accessed on 17 August 2021).
- Stojanovski, S.; Vedrine, A. Mobile Terminated Communication Method and Related Devices. U.S. Patent 9,906,947, 27 February 2018. [Google Scholar]
- Third Generation Partnership Project. 3GPP Evolved Packet System (EPS); Evolved General Packet Radio Service (GPRS) Tunnelling Protocol for Control Plane (GTPv2-C). Stage 3, TS 29.274. 29 June 2021. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=1692 (accessed on 17 August 2021).
- Third Generation Partnership Project. System Architecture for the 5G System (5GS). TS 23.501. 24 June 2021. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144 (accessed on 17 August 2021).
- Third Generation Partnership Project. 5G System; Technical Realization of Service Based Architecture. Stage 3, TS 29.500. 29 June 2021. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3338 (accessed on 17 August 2021).
- Hao, Y. Investigation and Technological Comparison of 4G and 5G Networks. J. Comput. Commun. 2021, 9, 36–43. [Google Scholar] [CrossRef]
- Third Generation Partnership Project. General Packet Radio Service (GPRS) Enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) Access. TS 23.401. 24 June 2021. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=849 (accessed on 17 August 2021).
- Third Generation Partnership Project. 3GPP System Architecture Evolution (SAE); Security Architecture. TS 33.401. 10 July 2020. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2296 (accessed on 17 August 2021).
- Third Generation Partnership Project. Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 1: EEA3 and EIA3 specifications. TS 35.221. 10 July 2020. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2399 (accessed on 17 August 2021).
- Third Generation Partnership Project. NR; Radio Resource Control (RRC); Protocol specification. TS 38.331. 6 July 2021. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3197 (accessed on 17 August 2021).
- Third Generation Partnership Project. Non-Access-Stratum (NAS) Protocol for Evolved Packet System (EPS). Stage 3. TS 24.301. 28 June 2021. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=1072 (accessed on 17 August 2021).
- Third Generation Partnership Project. E-UTRA (Evolved Universal Terrestrial Radio Access)—NR Dual Connectivity (EN-DC) of LTE 1 down Link (DL)/1 Up Link (UL) and 1 NR band. TR 37.863-01-01. 17 July 2020. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3304 (accessed on 17 August 2021).
- Third Generation Partnership Project. Security Architecture and Procedures for 5G System. TS 33.501. 5 July 2021. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3169 (accessed on 17 August 2021).
- Ahmad, I.; Kumar, T.; Liyanage, M.; Okwuibe, J.; Ylianttila, M.; Gurtov, A. Overview of 5G Security Challenges and Solutions. IEEE Commun. Stand. Mag. 2018, 2, 36–43. [Google Scholar] [CrossRef] [Green Version]
- Hussain, S.R.; Echeverria, M.; Chowdhury, O.; Li, N.; Bertino, E. Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information. In Proceedings of the 26nd Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 24–27 February 2019. [Google Scholar]
- Rupprecht, D.; Kohls, K.; Holz, T.; Pöpper, C. Call me maybe: Eavesdropping encrypted LTE calls with ReVoLTE. In Proceedings of the 29th USENIX Security Symposium, Online Conference, 12–14 August 2020. [Google Scholar]
- Kim, H.; Kim, D.; Kwon, M.; Han, H.; Jang, Y.; Han, D.; Kim, T.; Kim, Y. Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Denver, CO, USA, 12–16 October 2015. [Google Scholar]
- Park, S.; Kim, S.; Son, K.; Kim, H.; Park, J.; Yim, K. Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment. Int. J. Web Grid Serv. 2017, 13, 3–24. [Google Scholar] [CrossRef]
- Jang, W.; Kim, S.K.; Oh, J.H.; Im, C.T. Session-based detection of signaling DoS on LTE mobile networks. J. Adv. Comput. Netw. 2014, 2, 159–162. [Google Scholar] [CrossRef]
- Park, S.; Cho, H.; Park, Y.; Choi, B.; Kim, D.; Yim, K. Security Problems of 5G Voice Communication. In Information Security Applications; You, I., Ed.; WISA: Jeju Island, Korea, 2020. [Google Scholar]
- Park, S.; Kim, S.; Son, K.; Kim, H. Security threats and countermeasure frame using a session control mechanism on volte. In Proceedings of the 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), Krakow, Poland, 4–6 November 2015; pp. 532–537. [Google Scholar]
Segment | 2018 | 2019 | 2020 | 2021 |
---|---|---|---|---|
5G | 612.9 | 2211.4 | 4176.0 | 6805.6 |
2G | 1503.1 | 697.5 | 406.5 | 285.2 |
3G | 5578.4 | 3694.0 | 2464.3 | 1588.0 |
LTE and 4G | 20,454.7 | 19,322.4 | 18,278.2 | 16,352.7 |
Small cells | 4785.6 | 5378.4 | 5858.1 | 6473.1 |
Mobile Core | 4599.0 | 4621.0 | 4787.3 | 5009.5 |
Total | 37,533.6 | 35,924.7 | 35,970.5 | 36,484.1 |
Segment | 4G | 5G Non-StandAlone | 5G StandAlone | |
---|---|---|---|---|
Launching date | 11 July | 18 December | 20 August (USA) ~ongoing | |
Peak data rate (Downlink) | 1 Gbps | 20 Gbps | 20 Gbps | |
Latency | 10 ms | 1~10 ms | 1 ms | |
RAN (Radio Access Network) | User Equipment | Smart phone | Smart phone, Internet of Things, Cyber Physical System | Internet of Everything, Autonomous Vehicle |
RAN type | Single RAN (eNB) | Hybrid RAN (eNB/gNB) | SDRAN (gNB) | |
Control protocol | RRC, NAS | RRC, NAS | RRC, NAS | |
User protocol | PDCP | PDCP | PDCP | |
CN (Core Network) | CN type | Centralized (EPC) | Centralized (5G Enabled EPC) | Distributed (5GC) |
Control protocol | GTP-C | GTP-C | HTTP/2 | |
User protocol | GTP-U | GTP-U | GTP-U |
Index | Test Case | Vulnerability Description |
---|---|---|
TC. R1 | RRC connection DoS | According to the standard, it is defined not to verify subscriber ID in base-stations, so access is allowed when sending RRC connection request with a victim’s ID. |
TC. R2 | RRC security mode command | There is threat of avoiding authentication when a base station ignores authentication value (MAC) from the terminal for received RRC Security mode command and sends RRC Security mode complete, thus it is processed normally in the base-station. |
TC. R3 | RRC connection reconfiguration | There is a threat of avoiding authentication when a base station ignores authentication value (MAC) from the terminal for received RRC Connection reconfiguration and sends RRC Connection reconfiguration complete, thus it is processed normally in the base-station. |
Index | Test Case | Vulnerability Description |
---|---|---|
TC.C-CP1 | NAS Integrity Spoofing [6] | Avoiding the verification of NAS message integrity by changing the EIA field in UE Network Capability of victim’s attach request to 0. |
TC.C-CP2 | NAS Ciphering Spoofing [6] | There is a threat of eavesdropping when ciphering is not used by changing the EEA field in UE Network Capability of victim’s attach request to 0. |
TC.C-CP3 | NAS Security mode command [5] | There is threat of avoiding authentication when MME ignores authentication value (MAC) from the terminal for received Security mode command and sends Security mode complete, thus it is processed normally in the MME. |
TC.C-CP4 | NAS Attach accept [5] | There is threat of avoiding authentication, when MME ignores authentication value (MAC) from the terminal for received Attach Accept and sends attach mode complete, thus it is processed normally in the MME. |
Index | Test Case | Vulnerability Description |
---|---|---|
TC.C-UP1 | EPC scanning [24] | EPC equipment IP can be identified through the response message received after injecting GTP-C echo request into the user data and sending it to CN. |
TC.C-UP2 | UE IP depletion [24] | Causing IP resource depletion that can be allocated by PGW when injecting Create Session Request that contains random NISIDN into the user data and transmitting the request. |
TC.C-UP3 | Targeted create session request [24] | Causing DoS by newly allocating the victim’s IP when injecting Create Session Request that contains the victim’s NISIDN into the user data and transmitting the request. |
TC.C-UP4 | Delete Session request [24] | Causing DoS by deleting the victim’s GTP session when injecting Delete Session Request that contains the victim’s NISIDN into the user data and transmitting the request. |
TC.C-UP5 | SIP de-register request [27] | Causing voice service DoS by deleting the victim’s SIP Registration when transmitting SIP de-Register Request that contains the victim’s MSISND. |
TC.C-UP6 | SIP bye request [27] | Causing voice communication termination by deleting the victim’s SIP Invite when transmitting SIP Bye Request that contains the victim’s MSISND. |
TC.C-UP7 | SIP message request [27] | Causing SMS phishing with the outgoing number when transmitting SIP Message Request that contains the victim’s MSISND. |
TC.C-UP8 | MMS request [27] | Causing MMS phishing with the outgoing number when transmitting MMS Request that contains the victim’s MSISND. |
Test Cases | Security Challenge Types | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
RAN | CN | ||||||||||
R1 | R2 | R3 | R4 | R5 | C1 | C2 | C3 | C4 | C5 | C6 | |
TC. R1 | - | √ | √ | - | - | - | - | - | - | - | - |
TC. R2 | √ | - | - | √ | √ | - | - | - | - | - | - |
TC. R3 | √ | - | - | √ | √ | - | - | - | - | - | - |
TC.C-CP1 | - | - | - | - | - | - | - | - | √ | - | - |
TC.C-CP2 | - | - | - | - | - | - | - | - | - | √ | - |
TC.C-CP3 | - | - | - | - | - | - | - | - | √ | - | - |
TC.C-CP4 | - | - | - | - | - | - | - | - | √ | - | - |
TC.C-UP1 | - | - | - | - | - | √ | - | √ | - | - | - |
TC.C-UP2 | - | - | - | - | - | - | √ | - | - | - | - |
TC.C-UP3 | - | - | - | - | - | - | - | √ | - | - | - |
TC.C-UP4 | - | - | - | - | - | - | - | √ | - | - | - |
TC.C-UP5 | - | - | - | - | - | - | - | √ | - | - | - |
TC.C-UP6 | - | - | - | - | - | - | - | √ | - | - | - |
TC.C-UP7 | - | - | - | - | - | - | - | - | - | - | √ |
TC.C-UP8 | - | - | - | - | - | - | - | - | - | - | √ |
Index | Test Case | Operator A | Operator B | Operator C |
---|---|---|---|---|
TC. R1 | RRC Connection DoS | O | O | X |
TC. R2 | RRC Security mode command | X | O | X |
TC. R3 | RRC Connection reconfiguration | X | O | X |
TC.C-CP1 | NAS Integrity Spoofing | O | O | O |
TC.C-CP2 | NAS Ciphering Spoofing | O | O | O |
TC.C-CP3 | NAS Security mode command | O | O | X |
TC.C-CP4 | NAS Attach accept | O | O | X |
TC.C-UP1 | EPC Scanning | X | O | X |
TC.C-UP2 | UE IP Depletion | X | X | X |
TC.C-UP3 | Targeted Create Session Request | X | X | X |
TC.C-UP4 | Delete Session Request | X | X | X |
TC.C-UP5 | SIP de-Register Request | X | X | X |
TC.C-UP6 | SIP Bye Request | X | X | X |
TC.C-UP7 | SIP Message Request | X | X | X |
TC.C-UP8 | MMS Request | X | X | X |
Test Case | Root Cause | Vulnerability Mitigation |
---|---|---|
RRC Connection DoS | Design Flaw | Security Guide Standardization |
RRC Security mode command | Implementation Flaw | eNB Software PKG Patch |
RRC Connection reconfiguration | Implementation Flaw | eNB Software PKG Patch |
NAS Integrity Spoofing | Implementation Flaw | MME Configuration alteration |
NAS Ciphering Spoofing | Design Flaw | Security Guide Standardization |
NAS Security mode command | Implementation Flaw | MME Software PKG Patch |
NAS Attach accept | Implementation Flaw | MME Software PKG Patch |
EPC Scanning | Design Flaw | Intrusion Detection System |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Park, S.; Kim, D.; Park, Y.; Cho, H.; Kim, D.; Kwon, S. 5G Security Threat Assessment in Real Networks. Sensors 2021, 21, 5524. https://doi.org/10.3390/s21165524
Park S, Kim D, Park Y, Cho H, Kim D, Kwon S. 5G Security Threat Assessment in Real Networks. Sensors. 2021; 21(16):5524. https://doi.org/10.3390/s21165524
Chicago/Turabian StylePark, Seongmin, Daeun Kim, Youngkwon Park, Hyungjin Cho, Dowon Kim, and Sungmoon Kwon. 2021. "5G Security Threat Assessment in Real Networks" Sensors 21, no. 16: 5524. https://doi.org/10.3390/s21165524
APA StylePark, S., Kim, D., Park, Y., Cho, H., Kim, D., & Kwon, S. (2021). 5G Security Threat Assessment in Real Networks. Sensors, 21(16), 5524. https://doi.org/10.3390/s21165524