Abstract
mailto: 5G network makes our lives delicate and more pleasant, and its security will impact the operation of the entire society. Compared with the LTE network, 5G brings up many new security features and possesses more sophisticated and robust security mechanisms, while there are still many potential security issues with the 5G network. Therefore, the security analysis of the 5G network is highly crucial. Null security algorithm (i.e., NEA0 and NIA0) is used in normal communication, a security vulnerability that exists and has not been fully addressed in the LTE network, but in the 5G network, no studies have been performed to demonstrate whether this security vulnerability still exists so far. Therefore, in this paper, we apply a systematic approach based on the principle of model checking to verify. We conduct an in-depth analysis of the signaling interaction and security mechanism for the attach procedure in the 5G network. And then, we model UE and AMF into two synchronous communication finite-state machines, extract the desired properties from 3GPP relevant specifications, and construct an adversary model to test the system’s security. By observing the operation of state machines and analyzing relevant protocol behavior, we discover that faulty security algorithm selection could result in the acceptance of the null security algorithm (i.e., NEA0 and NIA0) on the side of the core network, and attackers can exploit this to trigger IP spoofing attacks and SUPI catching attacks on the victim UE. We analyze the root cause of these network attacks and propose an anomaly detection method to avoid these network attacks from being launched effectively.
Highlights
5G, such as the power and energy infrastructures on which we currently rely, is an infrastructure, and its security will impact the operation of the entire society
We model user equipment (UE) and AMF into two synchronous communication finite-state machines, extract the desired properties from 3GPP relevant specifications, and construct an adversary model to test the system’s security
By observing the operation of state machines and analyzing relevant protocol behavior, we discover that faulty security algorithm selection could result in the acceptance of the null security algorithm (i.e., NEA0 and NIA0) on the side of the core network, and attackers can exploit this to trigger IP spoofing attacks and SUPI catching attacks on the victim UE
Summary
5G, such as the power and energy infrastructures on which we currently rely, is an infrastructure, and its security will impact the operation of the entire society. Communications to gain access to data as they are sent or received by their target (1) We apply a systematic approach based on the principle of model checking to have a deep analysis of the signaling interaction and security mechanism for the attach procedure in the 5G network and verify that the null security algorithm (i.e., NEA0 and NIA0) is used in the normal communication in the 5G network, and it can trigger IP spoofing attacks and SUPI catching attacks (2) We analyze the root cause of these attacks and propose an anomaly detection method to avoid these network attacks being launched effectively e remainder of the paper is organized as the following: Section 2 introduces the 5G network architecture and attach procedure focusing on the NAS security mechanism and AS security mechanism.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.