“…The attackers can use an application on the user's device to change the contents of a token, steal confidential information, and send malicious packets to the 5G core. Other examples of attacks include Man-In-The-Middle (MITM), stolen verifier, replay, pilot contamination (e.g., non-orthogonal multiple access in 5G mm-Wave massive MIMO networks [Wang et al, 2020a]) [Osorio et al, 2020], pollution attack (e.g., in cooperative MEC caching [Yang et al, 2018]), stolen smart card (enabling offline password guessing [Shin and Kwon, 2018]), jamming (e.g., pulsed based jamming attack [Schinianakis et al, 2019]), signaling storm [Ahmad et al, 2017], byzantine, sinkhole, IMSI catchers [Chlosta et al, 2021;Mjolsnes and Olimid, 2019;Palamà et al, 2020] It is also possible to transmit multiple false PSS to the target 5G NR frame (at higher power), impersonate a BS during the RRC handshake, and conduct masquerading attacks (e.g., focusing on the mobility management entity [Moreira et al, 2018]). Besides, identifiers (e.g., MAC addresses) can be cloned or spoofed, data from the IoT deployment to the 5G BS (or 5G BS to the IoT deployment) can be captured, and node memory extracted to fraudulently use the private key [Bordel et al, 2021].…”