Signalling Security Analysis: Is HTTP/2 Secure in 5G Core Network?

The incoming 5G mobile network owns many advanced features. In the core network respect, 5G features Control and User Plane Separation (CUPS), Service Based Architecture (SBA), Network Slicing (NS) and Access Agnostic. To get all those new features realized, a new 5G system architecture and protocol stack have been designed. 5G adopts HTTP/2 as application layer protocol which means all the network entities in control plane will communicate with each using HTTP/2. However, HTTP/2 may cause new problems in the totally new designed Service-based Architecture (SBA). In this paper, we present a comprehensive study on HTTP/2 to be used in 5G core network and introduce the possible vulnerabilities and security problems. Firstly, based on the technology standards released by 3GPP, we give an overview of 5G architecture—Service based architecture; secondly, we introduce the new features of HTTP/2 protocol; thirdly, we evaluate the security problems that may occur in 5G core network.

[1]  Anant V. Nimkar,et al.  Man-in-the-middle attack in HTTP/2 , 2017, 2017 International Conference on Intelligent Computing and Control (I2C2).

[2]  A. Benjebbour,et al.  Design considerations for a 5G network architecture , 2014, IEEE Communications Magazine.

[3]  Xiqi Gao,et al.  Cellular architecture and key technologies for 5G wireless communication networks , 2014, IEEE Communications Magazine.

[4]  Tanesh Kumar,et al.  5G security: Analysis of threats and solutions , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).

[5]  AKHIL GUPTA,et al.  A Survey of 5G Network: Architecture and Emerging Technologies , 2015, IEEE Access.

[6]  Elisa Bertino,et al.  LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE , 2018, NDSS.

[7]  Jeffrey G. Andrews,et al.  What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.

[8]  A.R. Modarressi,et al.  Signaling System No.7: a tutorial , 1990, IEEE Communications Magazine.

[9]  Andreas Kunz,et al.  Overview of 5G security in 3GPP , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).

[10]  Roberto Peon,et al.  HPACK: Header Compression for HTTP/2 , 2015, RFC.

[11]  Security challenges and opportunities for 5 G mobile networks , 2017 .

[12]  Huaiyu Dai,et al.  A Survey on Low Latency Towards 5G: RAN, Core Network and Caching Solutions , 2017, IEEE Communications Surveys & Tutorials.

[13]  Martin Thomson,et al.  Hypertext Transfer Protocol Version 2 (HTTP/2) , 2015, RFC.

[14]  Hu Aiqun,et al.  FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[15]  IMT Vision – Framework and overall objectives of the future development of IMT for 2020 and beyond M Series Mobile , radiodetermination , amateur and related satellite services , 2015 .