Tutorial on communication between access networks and the 5G core
LBD Silveira, HC de Resende, CB Both… - Computer Networks, 2022 - Elsevier
Abstract Fifth-generation (5G) networks enable a variety of use cases that require
differentiated connectivity, eg, Ultra-Reliable and Low-Latency Communications (URLLC) …
differentiated connectivity, eg, Ultra-Reliable and Low-Latency Communications (URLLC) …
A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services,
including in critical infrastructure sectors, it is important to review security mechanisms, risks …
including in critical infrastructure sectors, it is important to review security mechanisms, risks …
Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications
The modern communications landscape requires reliable, high-speed, high-throughput and
secure links and sessions between user equipment instances and the data network. The 5G …
secure links and sessions between user equipment instances and the data network. The 5G …
Formal-guided fuzz testing: Targeting security assurance from specification to implementation for 5g and beyond
Softwarization and virtualization in 5G and beyond necessitate thorough testing to ensure
the security of critical infrastructure and networks. This involves identifying vulnerabilities …
the security of critical infrastructure and networks. This involves identifying vulnerabilities …
5g rrc protocol and stack vulnerabilities detection via listen-and-learn
The paper proposes a protocol-independent Listen-and-Learn (LAL) based fuzzing system,
which provides a systematic solution for vulnerabilities and unintended emergent behavior …
which provides a systematic solution for vulnerabilities and unintended emergent behavior …
LSTM-Based Anomaly Detection of PFCP Signaling Attacks in 5G Networks
R Pell, M Shojafar… - IEEE Consumer …, 2024 - ieeexplore.ieee.org
Fifth-generation telecommunication networks (5G) will offer a range of new services and
support an array of new use cases beyond traditional mobile networking. This is achieved in …
support an array of new use cases beyond traditional mobile networking. This is achieved in …
Automated vulnerability testing and detection digital twin framework for 5g systems
D Dauphinais, M Zylka, H Spahic… - 2023 IEEE 9th …, 2023 - ieeexplore.ieee.org
Efficient and precise detection of vulnerabilities in 5G protocols and implementations is
crucial for ensuring the security of its application in critical infrastructures. However, with the …
crucial for ensuring the security of its application in critical infrastructures. However, with the …
5G core network control plane: Network security challenges and solution requirements
R Patil, Z Tian, M Gurusamy, J McCloud - Computer Communications, 2024 - Elsevier
The control plane of the 5G Core Network (5GCN) is essential for ensuring reliable and high-
performance 5G communication. It provides critical network services such as authentication …
performance 5G communication. It provides critical network services such as authentication …
A Vulnerability Assessment of Open-Source Implementations of Fifth-Generation Core Network Functions
F Dolente, RG Garroppo, M Pagano - Future Internet, 2023 - mdpi.com
The paper presents an experimental security assessment within two widely used open-
source 5G projects, namely Open5GS and OAI (Open-Air Interface). The examination …
source 5G projects, namely Open5GS and OAI (Open-Air Interface). The examination …
U-fuzz: Stateful fuzzing of iot protocols on cots devices
Z Shang, ME Garbelini… - 2024 IEEE Conference …, 2024 - ieeexplore.ieee.org
Internet-of-Things (IoT) devices have become widely popular and are being increasingly
utilized in both home and industrial environments. Such devices use a variety of different …
utilized in both home and industrial environments. Such devices use a variety of different …