Testbed and Software Architecture for Enhancing Security in Industrial Private 5G Networks
- URL: http://arxiv.org/abs/2507.20873v1
- Date: Mon, 28 Jul 2025 14:24:20 GMT
- Title: Testbed and Software Architecture for Enhancing Security in Industrial Private 5G Networks
- Authors: Song Son Ha, Florian Foerster, Thomas Robert Doebbert, Tim Kittel, Dominik Merli, Gerd Scholl,
- Abstract summary: 5G networks are characterized by extremely low latency, massive device connectivity and high data transfer speeds.<n>This paper proposes a testbed and software architecture to strengthen the security of Private 5G Networks.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In the era of Industry 4.0, the growing need for secure and efficient communication systems has driven the development of fifth-generation (5G) networks characterized by extremely low latency, massive device connectivity and high data transfer speeds. However, the deployment of 5G networks presents significant security challenges, requiring advanced and robust solutions to counter increasingly sophisticated cyber threats. This paper proposes a testbed and software architecture to strengthen the security of Private 5G Networks, particularly in industrial communication environments.
Related papers
- Bridging the Security Gap: Lessons from 5G and What 6G Should Do Better [1.3505077405741583]
This paper provides a set of security recommendations for 6G networks.<n>It focuses on access and handover procedures, which often lack encryption and integrity protection.<n>It concludes with actionable recommendations to enhance the security, resilience, and robustness of 6G access and handover mechanisms.
arXiv Detail & Related papers (2025-01-19T13:44:17Z) - ACRIC: Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
Recent security incidents in safety-critical industries exposed how the lack of proper message authentication enables attackers to inject malicious commands or alter system behavior.<n>These shortcomings have prompted new regulations that emphasize the pressing need to strengthen cybersecurity.<n>We introduce ACRIC, a message authentication solution to secure legacy industrial communications.
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - Secure Integration of 5G in Industrial Networks: State of the Art, Challenges and Opportunities [2.479074862022315]
We describe the state-of-the-art and derive recommendations for the secure integration of 5G into industrial networks.<n>We identify opportunities to utilize 5G to enhance security and indicate remaining challenges.
arXiv Detail & Related papers (2024-08-29T18:00:17Z) - Autonomous Adaptive Security Framework for 5G-Enabled IoT [0.8738214980779235]
5G can provide more rapid connection speeds, lower latency, faster downloads, and capability to connect more devices.
5G-enabled IoT networks increase systems vulnerabilities to security threats due to these dynamics.
This task specifies new adaptive strategies of security intelligence with associated scenarios to meet the challenges of 5G-IoT characteristics.
arXiv Detail & Related papers (2024-06-04T13:17:04Z) - Penetration Testing of 5G Core Network Web Technologies [53.89039878885825]
We present the first security assessment of the 5G core from a web security perspective.
We use the STRIDE threat modeling approach to define a complete list of possible threat vectors and associated attacks.
Our analysis shows that all these cores are vulnerable to at least two of our identified attack vectors.
arXiv Detail & Related papers (2024-03-04T09:27:11Z) - Generative AI for Secure Physical Layer Communications: A Survey [80.0638227807621]
Generative Artificial Intelligence (GAI) stands at the forefront of AI innovation, demonstrating rapid advancement and unparalleled proficiency in generating diverse content.
In this paper, we offer an extensive survey on the various applications of GAI in enhancing security within the physical layer of communication networks.
We delve into the roles of GAI in addressing challenges of physical layer security, focusing on communication confidentiality, authentication, availability, resilience, and integrity.
arXiv Detail & Related papers (2024-02-21T06:22:41Z) - Enabling a Zero Trust Architecture in a 5G-enabled Smart Grid [0.0]
A smart grid (SG) requires a prompt and dependable connection to provide real-time monitoring through the IoT.
5G could be considered a catalyst for upgrading the existing power grid systems.
This article analyzes the Zero Trust (ZT) architecture specific to the power system of IoT and uses that knowledge to develop a security protection architecture.
arXiv Detail & Related papers (2022-10-04T16:57:33Z) - Machine Learning Assisted Security Analysis of 5G-Network-Connected
Systems [5.918387680589584]
5G networks have transitioned to software-defined infrastructures.
New technologies, like network function virtualization and software-defined networking, have been incorporated in the 5G core network (5GCN) architecture to enable this transition.
This article presents a comprehensive security analysis framework for the 5GCN.
arXiv Detail & Related papers (2021-08-07T20:07:08Z) - True-data Testbed for 5G/B5G Intelligent Network [46.09035008165811]
We build the world's first true-data testbed for 5G/B5G intelligent network (TTIN)
TTIN comprises 5G/B5G on-site experimental networks, data acquisition & data warehouse, and AI engine & network optimization.
This paper elaborates on the system architecture and module design of TTIN.
arXiv Detail & Related papers (2020-11-26T06:42:36Z) - A Comprehensive Overview on 5G-and-Beyond Networks with UAVs: From
Communications to Sensing and Intelligence [152.89360859658296]
5G networks need to support three typical usage scenarios, namely, enhanced mobile broadband (eMBB), ultra-reliable low-latency communications (URLLC) and massive machine-type communications (mMTC)
On the one hand, UAVs can be leveraged as cost-effective aerial platforms to provide ground users with enhanced communication services by exploiting their high cruising altitude and controllable maneuverability in 3D space.
On the other hand, providing such communication services simultaneously for both UAV and ground users poses new challenges due to the need for ubiquitous 3D signal coverage as well as the strong air-ground network interference.
arXiv Detail & Related papers (2020-10-19T08:56:04Z) - Smart Home, security concerns of IoT [91.3755431537592]
The IoT (Internet of Things) has become widely popular in the domestic environments.
People are renewing their homes into smart homes; however, the privacy concerns of owning many Internet connected devices with always-on environmental sensors remain insufficiently addressed.
Default and weak passwords, cheap materials and hardware, and unencrypted communication are identified as the principal threats and vulnerabilities of IoT devices.
arXiv Detail & Related papers (2020-07-06T10:36:11Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.