4.5 Article

Towards 5G-based IoT security analysis against Vo5G eavesdropping

Journal

COMPUTING
Volume 103, Issue 3, Pages 425-447

Publisher

SPRINGER WIEN
DOI: 10.1007/s00607-020-00855-0

Keywords

IoT; 5G; Eavesdropping; Vo5G; 5G NSA; 5G security; IDS

Funding

  1. Institute of Information & Communications Technology Planning & Evaluation (IITP) - Korea government (MSIT) [2019-0-00793]

Ask authors/readers for more resources

With the rise of 5G technology, IoT applications in smart home/building have become a reality, but security risks need to be addressed. This paper analyzes eavesdropping vulnerabilities in 5G networks and proposes countermeasures to mitigate them.
With the advent of 5G technology, the enhanced Mobile Broadband technology is translating 5G-based Internet of Things (IoT) such as smart home/building into reality. With such advances, security must mitigate greater risks associated with faster and more accessible technology. The 5G-based IoT security analysis is crucial to IoT Technology, which will eventually expand extensively into massive machine-type communications and Ultra-Reliable Low Latency Communications. This paper analyses the countermeasures and verification methods of eavesdropping vulnerabilities within IoT devices that use the current 5G Non-Standalone (NSA) network system. The network hierarchical structure of 5G-based IoT was evaluated for vulnerability analysis, performed separately for 5G Access Stratum (AS), Non-Access Stratum (NAS), and Internet Protocol (IP) Multimedia Subsystem (IMS). AS keystream reuse, NAS null-ciphering, and IMS IPsec off vulnerabilities were tested on mobile carrier networks to validate it on the 5G NSA network as well. A countermeasure against each vulnerability was presented, and our Intrusion Detection System based on these countermeasures successfully detected the presented controlled attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available