5G core network security issues and attack classification from network protocol perspective

Fifth-generation technology [5G] services commercialized in 2019 have not only provided voice and data communication but also undergone significant structural changes in mobile networks to accommodate Internet-of-things devices, sensitive to latency and reliability, by adopting the latest ICT technologies, such as software-defined networking/network function virtualization, multi-access edge computing, and network slicing. However, this technological evolution poses new security challenges, such as creation of new access paths, owing to its complex inter-operation structures, security downgrading, and limitations in security visibility. To address these issues, research on 5G security threats and security architecture has been actively underway at international standards organizations, communication carriers, and universities. However, security researchers find it difficult to conduct studies on 5G security technology design and application methods owing to the relatively unknown nature of the mobile carrier network. Therefore, in this paper, we analyzed five new security issues for each 5G section, relative to 5G technical advantages, by reviewing previous studies. In addition, we classified cyber attacks against nine network protocols primarily used in the 5G core network. The result of this study is expected to be used as basic data for modeling 5G security threats.

[1]  Antonio Acien,et al.  Crowdsourcing Analysis in 5G IoT: Cybersecurity Threats and Mitigation , 2018, Mobile Networks and Applications.

[2]  Andrei Gurtov,et al.  A Comprehensive Guide to 5G Security , 2018 .

[3]  Tanesh Kumar,et al.  Overview of 5G Security Challenges and Solutions , 2018, IEEE Communications Standards Magazine.

[4]  Peng Zhang,et al.  A Survey on C-RAN Security , 2017, IEEE Access.

[5]  Antonios Argyriou,et al.  Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes , 2017, J. Netw. Comput. Appl..

[6]  Kyungho Son,et al.  Security Threats and Countermeasure Frame Using a Session Control Mechanism on VoLTE , 2015, 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA).

[7]  Felix Klaedtke,et al.  5G-ENSURE - 5G enablers for network and system security and resilience , 2016 .

[8]  Hwankuk Kim,et al.  SIP amplification attack analysis and detection in VoLTE service network , 2016, 2016 International Conference on Information Networking (ICOIN).

[9]  Yongdae Kim,et al.  Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane , 2019, 2019 IEEE Symposium on Security and Privacy (SP).