2019
DOI: 10.1109/access.2019.2937997
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Analysis Method for 5G Non-Access Stratum Signalling Security

Abstract: This paper proposes a systematic analysis method for 5G Non-Access Stratum Signalling security based on formal analysis, which has identified 10 new 5G protocol vulnerabilities, and an improved PKI security mechanism targeted at eliminating these vulnerabilities. Firstly, the 5G system, state transition properties and security properties were abstracted from 3GPP specifications. To mimic an attacker's behavior, a Dolev-Yao adversary model was constructed in the 5G model by empowering it with NAS signalling sec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 22 publications
(9 citation statements)
references
References 33 publications
0
9
0
Order By: Relevance
“…This is because a baseband implements numerous cellular protocols that have convoluted states; therefore, various stateful information should be considered in the analysis. Moreover, building a reference for logical bugs from the specifications is also not trivial [34], [35], [10], [33], [8]. Therefore, we invite future research in this field by introducing BASESPEC as an entry point.…”
Section: Discussionmentioning
confidence: 99%
“…This is because a baseband implements numerous cellular protocols that have convoluted states; therefore, various stateful information should be considered in the analysis. Moreover, building a reference for logical bugs from the specifications is also not trivial [34], [35], [10], [33], [8]. Therefore, we invite future research in this field by introducing BASESPEC as an entry point.…”
Section: Discussionmentioning
confidence: 99%
“…Chlosta et al [24] and Haque et al [33] exploited the Subscription Concealed Identifier (SUCI) identifier and Permanent Equipment Identifier (PEI), respectively. Security issues on 5G RRC and NAS messages were investigated [37,40] but actual experimentation is needed with a 5G SA setup to fully explore the security flaws. LTE Flaws and Misconfigurations.…”
Section: Related Workmentioning
confidence: 99%
“…Further, attacks that violate the MAC layer standards causing DoS are also easy to launch in this case. Hu et al (2019) discussed the several types of DoS attacks that can occur on the 5G network devices.…”
Section: Security Issues Of Wmcc In 5gmentioning
confidence: 99%