Practical Guidelines to Assess Vulnerabilities in 5G Core Network and OPEN RAN

Research output: Contribution to book/Conference proceedings/Anthology/ReportConference contributionContributedpeer-review

Contributors

Abstract

Open interfaces in 5G Radio Access Network architecture facilitate flexibility, multi-vendor options, and agile development. Open RAN architecture utilizes open-source software (OSS) and proprietary products. The OSS enables numerous developers to participate in Open RAN technology and provides testing capabilities for interoperability and security assessment. Leveraging the openness of the software, developers can examine code flaws and identify overlooked vulnerabilities. To enhance the security of open-source software, particularly OpenAirInterface (OAI), we have conducted jamming and fuzzing attack tests for 5G private networks, focusing on Core and RAN networks. These threats were implemented on dedicated testbeds. The risk and impact of these threats have been elucidated to provide valuable insights into their prevention. In conclusion, our evaluations and findings will augment the technical capabilities of a resilient 5G system, encompassing reliability, availability, robustness, and security while safeguarding overall privacy.

Details

Original languageEnglish
Title of host publication2025 IEEE Wireless Communications and Networking Conference, WCNC 2025
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Number of pages6
ISBN (electronic)979-8-3503-6836-9
Publication statusPublished - 2025
Peer-reviewedYes

Conference

Title2025 IEEE Wireless Communications and Networking Conference
Subtitle6G Horizons: Bridging Beyond Wireless
Abbreviated titleWCNC 2025
Duration24 - 27 March 2025
Website
LocationAllianz MiCo Convention Centre
CityMilan
CountryItaly

External IDs

ORCID /0000-0001-8469-9573/work/186182051

Keywords

ASJC Scopus subject areas

Keywords

  • interfaces, Open RAN, open source, OpenAirInterface, security assessment