SoK: Evaluating 5G Protocols Against Legacy and Emerging Privacy and Security Attacks
- URL: http://arxiv.org/abs/2409.06360v1
- Date: Tue, 10 Sep 2024 09:30:37 GMT
- Title: SoK: Evaluating 5G Protocols Against Legacy and Emerging Privacy and Security Attacks
- Authors: Stavros Eleftherakis, Domenico Giustiniano, Nicolas Kourtellis,
- Abstract summary: We study existing privacy and security attacks in pre-5G networks, analyzing the weaknesses that lead to these attacks.
We study the security characteristics of 5G up to the new Release 19, and examine mitigation mechanisms of 5G to the identified pre-5G attacks.
- Score: 2.5554069583567487
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Ensuring user privacy remains a critical concern within mobile cellular networks, particularly given the proliferation of interconnected devices and services. In fact, a lot of user privacy issues have been raised in 2G, 3G, 4G/LTE networks. Recognizing this general concern, 3GPP has prioritized addressing these issues in the development of 5G, implementing numerous modifications to enhance user privacy since 5G Release 15. In this systematization of knowledge paper, we first provide a framework for studying privacy and security related attacks in cellular networks, setting as privacy objective the User Identity Confidentiality defined in 3GPP standards. Using this framework, we discuss existing privacy and security attacks in pre-5G networks, analyzing the weaknesses that lead to these attacks. Furthermore, we thoroughly study the security characteristics of 5G up to the new Release 19, and examine mitigation mechanisms of 5G to the identified pre-5G attacks. Afterwards, we analyze how recent 5G attacks try to overcome these mitigation mechanisms. Finally, we identify current limitations and open problems in security of 5G, and propose directions for future work.
Related papers
- Advanced Penetration Testing for Enhancing 5G Security [0.0]
This paper reviews penetration testing approaches for identifying security vulnerabilities in 5G networks.
It examines ways adversaries exploit vulnerabilities in 5G networks, covering tactics and strategies targeted at 5G features.
Our research indicates that 5G penetration testing should use a multithreaded approach for addressing current security challenges.
arXiv Detail & Related papers (2024-07-24T13:35:35Z) - UniHand: Privacy-preserving Universal Handover for Small-Cell Networks in 5G-enabled Mobile Communication with KCI Resilience [7.816521719452984]
Introducing Small Cell Networks (SCN) has significantly improved wireless link quality, spectrum efficiency and network capacity.
This work proposes a secure privacy-preserving universal HO scheme ($UniHand$) for SCNs in 5G mobile communication.
arXiv Detail & Related papers (2024-03-12T16:56:31Z) - Penetration Testing of 5G Core Network Web Technologies [53.89039878885825]
We present the first security assessment of the 5G core from a web security perspective.
We use the STRIDE threat modeling approach to define a complete list of possible threat vectors and associated attacks.
Our analysis shows that all these cores are vulnerable to at least two of our identified attack vectors.
arXiv Detail & Related papers (2024-03-04T09:27:11Z) - Security in 5G Networks -- How 5G networks help Mitigate Location Tracking Vulnerability [4.424739166856966]
Previous generation cellular networks do not enforce any encryption on this information transmitted during this process.
This paper investigates this problem in great detail and discusses how a newly introduced approach in 5G networks is helping combat this problem.
arXiv Detail & Related papers (2023-12-23T03:38:28Z) - A Survey on Privacy in Graph Neural Networks: Attacks, Preservation, and
Applications [76.88662943995641]
Graph Neural Networks (GNNs) have gained significant attention owing to their ability to handle graph-structured data.
To address this issue, researchers have started to develop privacy-preserving GNNs.
Despite this progress, there is a lack of a comprehensive overview of the attacks and the techniques for preserving privacy in the graph domain.
arXiv Detail & Related papers (2023-08-31T00:31:08Z) - Surveillance Face Presentation Attack Detection Challenge [68.06719263243806]
Face Anti-spoofing (FAS) is essential to secure face recognition systems from various physical attacks.
We collect a large-scale Surveillance High-Fidelity Mask (SuHiFiMask)
SuHiFiMask contains $10,195$ videos from $101$ subjects of different age groups, which are collected by $7$ mainstream surveillance cameras.
We organize a face presentation attack detection challenge in surveillance scenarios.
arXiv Detail & Related papers (2023-04-15T15:23:19Z) - A Comprehensive Overview on 5G-and-Beyond Networks with UAVs: From
Communications to Sensing and Intelligence [152.89360859658296]
5G networks need to support three typical usage scenarios, namely, enhanced mobile broadband (eMBB), ultra-reliable low-latency communications (URLLC) and massive machine-type communications (mMTC)
On the one hand, UAVs can be leveraged as cost-effective aerial platforms to provide ground users with enhanced communication services by exploiting their high cruising altitude and controllable maneuverability in 3D space.
On the other hand, providing such communication services simultaneously for both UAV and ground users poses new challenges due to the need for ubiquitous 3D signal coverage as well as the strong air-ground network interference.
arXiv Detail & Related papers (2020-10-19T08:56:04Z) - Blockchain-based Privacy Preservation for 5G-enabled Drone
Communications [47.852641639155664]
5G-enabled drones have potential applications in a variety of both military and civilian settings.
There are security and privacy considerations underpinning 5G-enabled drone communications.
We will review existing blockchain-based solutions after introducing the architecture for 5G-enabled drone communications and blockchain.
arXiv Detail & Related papers (2020-09-07T15:27:52Z) - Federated Learning for 6G Communications: Challenges, Methods, and
Future Directions [71.31783903289273]
We introduce the integration of 6G and federated learning and provide potential federated learning applications for 6G.
We describe key technical challenges, the corresponding federated learning methods, and open problems for future research on federated learning in the context of 6G communications.
arXiv Detail & Related papers (2020-06-04T15:17:19Z) - 5G Security and Privacy: A Research Roadmap [24.802753928579477]
5G - the latest generation of cellular networks - combines different technologies to increase capacity, reduce latency, and save energy.
We outline recent approaches supporting systematic analyses of 4G LTE and 5G protocols and their related defenses.
arXiv Detail & Related papers (2020-03-30T16:36:43Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.