Author:
Kwon Sungmoon,Park Seongmin,Cho HyungJin,Park Youngkwon,Kim Dowon,Yim Kangbin
Abstract
AbstractWith the advent of 5G technology, the enhanced Mobile Broadband technology is translating 5G-based Internet of Things (IoT) such as smart home/building into reality. With such advances, security must mitigate greater risks associated with faster and more accessible technology. The 5G-based IoT security analysis is crucial to IoT Technology, which will eventually expand extensively into massive machine-type communications and Ultra-Reliable Low Latency Communications. This paper analyses the countermeasures and verification methods of eavesdropping vulnerabilities within IoT devices that use the current 5G Non-Standalone (NSA) network system. The network hierarchical structure of 5G-based IoT was evaluated for vulnerability analysis, performed separately for 5G Access Stratum (AS), Non-Access Stratum (NAS), and Internet Protocol (IP) Multimedia Subsystem (IMS). AS keystream reuse, NAS null-ciphering, and IMS IPsec off vulnerabilities were tested on mobile carrier networks to validate it on the 5G NSA network as well. A countermeasure against each vulnerability was presented, and our Intrusion Detection System based on these countermeasures successfully detected the presented controlled attacks.
Funder
Institute of Information & communications Technology Planning & Evaluation
Publisher
Springer Science and Business Media LLC
Subject
Computational Mathematics,Computational Theory and Mathematics,Computer Science Applications,Numerical Analysis,Theoretical Computer Science,Software
Reference28 articles.
1. IoT Industrial Devices, Edge of 2020 in Industrial IoT—forecast, 2020.06.01. https://iot-industrial-devices.com/edge-of-2020-in-industrial-iot-forecast/. Accessed 15 Sep 2020
2. No W (2019) Ministry of science and ICT central radio management service, number of 5G base station in, 2019.09.05
3. Wong S (2020) Number of 5G base stations in Chana 2019–2024, statista, 2020.05.27
4. Rupprecht D et al. Call me maybe: eavesdropping encrypted LTE calls with ReVoLTE. In: 29th USENIX security symposium (USENIX security 20)
5. Chlosta M et al (2019) LTE security disabled: misconfiguration in commercial networks. In: Proceedings of the 12th conference on security and privacy in wireless and mobile networks
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献