Abstract
With the advent of 5G technology, the enhanced Mobile Broadband technology is translating 5G-based Internet of Things (IoT) such as smart home/building into reality. With such advances, security must mitigate greater risks associated with faster and more accessible technology. The 5G-based IoT security analysis is crucial to IoT Technology, which will eventually expand extensively into massive machine-type communications and Ultra-Reliable Low Latency Communications. This paper analyses the countermeasures and verification methods of eavesdropping vulnerabilities within IoT devices that use the current 5G Non-Standalone (NSA) network system. The network hierarchical structure of 5G-based IoT was evaluated for vulnerability analysis, performed separately for 5G Access Stratum (AS), Non-Access Stratum (NAS), and Internet Protocol (IP) Multimedia Subsystem (IMS). AS keystream reuse, NAS null-ciphering, and IMS IPsec off vulnerabilities were tested on mobile carrier networks to validate it on the 5G NSA network as well. A countermeasure against each vulnerability was presented, and our Intrusion Detection System based on these countermeasures successfully detected the presented controlled attacks.
Highlights
With the introduction of 5G, the enhanced Mobile Broadband technology is transforming 5G-based Internet of Things (IoT) such as smart home and smart building into reality
User Equipment (UE) UE means the user terminal, and includes a smartphone, a USB modem, a computer with a built-in mobile communication module, and smart home IoT, which is one of the key services of enhanced Mobile Broadband (eMBB). evolved Node B It provides wireless interface to UE, and in 5G it is used for functions related to UE control. generation Node B It provides wireless interface to UE, and it is used for data transmission
Security analysis for 5G NSA networks was performed in response to security risks such as eavesdropping
Summary
With the introduction of 5G, the enhanced Mobile Broadband (eMBB) technology is transforming 5G-based Internet of Things (IoT) such as smart home and smart building into reality. This paper describes the security analysis against eavesdropping of users’ calls likely to occur in the case of eMBB smart homes. Through the experiments of this study, it was confirmed that the vulnerabilities, i.e. Access Stratum (AS) keystream reuse [4], Non-Access Stratum (NSA) null-ciphering [5] and Internet Protocol (IP) Multimedia Subscriber (IMS) IP security (IPsec) off [6] are valid for the 5G NSA mobile carrier networks. This paper presents effective countermeasures against vulnerabilities of the 5G NSA network and describes the details of verifying them.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.