Abstract

With the advent of 5G technology, the enhanced Mobile Broadband technology is translating 5G-based Internet of Things (IoT) such as smart home/building into reality. With such advances, security must mitigate greater risks associated with faster and more accessible technology. The 5G-based IoT security analysis is crucial to IoT Technology, which will eventually expand extensively into massive machine-type communications and Ultra-Reliable Low Latency Communications. This paper analyses the countermeasures and verification methods of eavesdropping vulnerabilities within IoT devices that use the current 5G Non-Standalone (NSA) network system. The network hierarchical structure of 5G-based IoT was evaluated for vulnerability analysis, performed separately for 5G Access Stratum (AS), Non-Access Stratum (NAS), and Internet Protocol (IP) Multimedia Subsystem (IMS). AS keystream reuse, NAS null-ciphering, and IMS IPsec off vulnerabilities were tested on mobile carrier networks to validate it on the 5G NSA network as well. A countermeasure against each vulnerability was presented, and our Intrusion Detection System based on these countermeasures successfully detected the presented controlled attacks.

Highlights

  • With the introduction of 5G, the enhanced Mobile Broadband technology is transforming 5G-based Internet of Things (IoT) such as smart home and smart building into reality

  • User Equipment (UE) UE means the user terminal, and includes a smartphone, a USB modem, a computer with a built-in mobile communication module, and smart home IoT, which is one of the key services of enhanced Mobile Broadband (eMBB). evolved Node B It provides wireless interface to UE, and in 5G it is used for functions related to UE control. generation Node B It provides wireless interface to UE, and it is used for data transmission

  • Security analysis for 5G NSA networks was performed in response to security risks such as eavesdropping

Read more

Summary

Introduction

With the introduction of 5G, the enhanced Mobile Broadband (eMBB) technology is transforming 5G-based Internet of Things (IoT) such as smart home and smart building into reality. This paper describes the security analysis against eavesdropping of users’ calls likely to occur in the case of eMBB smart homes. Through the experiments of this study, it was confirmed that the vulnerabilities, i.e. Access Stratum (AS) keystream reuse [4], Non-Access Stratum (NSA) null-ciphering [5] and Internet Protocol (IP) Multimedia Subscriber (IMS) IP security (IPsec) off [6] are valid for the 5G NSA mobile carrier networks. This paper presents effective countermeasures against vulnerabilities of the 5G NSA network and describes the details of verifying them.

Background
IMS security
Related works
Reuse of AS keystream
NAS null-ciphering vulnerability
SIP register message on plaintext and optional use of IPsec
Countermeasure for AS vulnerability
Countermeasure for NAS vulnerability
Countermeasure for IMS-IPSec vulnerability
Countermeasure implementation and results
Test environment and scope
Eavesdropping scenarios on 5G NAS network
Eavesdropping scenarios on 5G IMS network
Eavesdropping attack results
Conclusion
Compliance with ethical standards
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call