Tutorial on communication between access networks and the 5G core

LBD Silveira, HC de Resende, CB Both… - Computer Networks, 2022 - Elsevier
Abstract Fifth-generation (5G) networks enable a variety of use cases that require
differentiated connectivity, eg, Ultra-Reliable and Low-Latency Communications (URLLC) …

A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas

P Scalise, M Boeding, M Hempel, H Sharif… - Future Internet, 2024 - mdpi.com
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services,
including in critical infrastructure sectors, it is important to review security mechanisms, risks …

Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications

G Amponis, P Radoglou-Grammatikis, T Lagkas… - EURASIP Journal on …, 2022 - Springer
The modern communications landscape requires reliable, high-speed, high-throughput and
secure links and sessions between user equipment instances and the data network. The 5G …

Formal-guided fuzz testing: Targeting security assurance from specification to implementation for 5g and beyond

J Yang, S Arya, Y Wang - IEEE Access, 2024 - ieeexplore.ieee.org
Softwarization and virtualization in 5G and beyond necessitate thorough testing to ensure
the security of critical infrastructure and networks. This involves identifying vulnerabilities …

5g rrc protocol and stack vulnerabilities detection via listen-and-learn

J Yang, Y Wang, TX Tran, Y Pan - 2023 IEEE 20th Consumer …, 2023 - ieeexplore.ieee.org
The paper proposes a protocol-independent Listen-and-Learn (LAL) based fuzzing system,
which provides a systematic solution for vulnerabilities and unintended emergent behavior …

LSTM-Based Anomaly Detection of PFCP Signaling Attacks in 5G Networks

R Pell, M Shojafar… - IEEE Consumer …, 2024 - ieeexplore.ieee.org
Fifth-generation telecommunication networks (5G) will offer a range of new services and
support an array of new use cases beyond traditional mobile networking. This is achieved in …

Automated vulnerability testing and detection digital twin framework for 5g systems

D Dauphinais, M Zylka, H Spahic… - 2023 IEEE 9th …, 2023 - ieeexplore.ieee.org
Efficient and precise detection of vulnerabilities in 5G protocols and implementations is
crucial for ensuring the security of its application in critical infrastructures. However, with the …

5G core network control plane: Network security challenges and solution requirements

R Patil, Z Tian, M Gurusamy, J McCloud - Computer Communications, 2024 - Elsevier
The control plane of the 5G Core Network (5GCN) is essential for ensuring reliable and high-
performance 5G communication. It provides critical network services such as authentication …

A Vulnerability Assessment of Open-Source Implementations of Fifth-Generation Core Network Functions

F Dolente, RG Garroppo, M Pagano - Future Internet, 2023 - mdpi.com
The paper presents an experimental security assessment within two widely used open-
source 5G projects, namely Open5GS and OAI (Open-Air Interface). The examination …

U-fuzz: Stateful fuzzing of iot protocols on cots devices

Z Shang, ME Garbelini… - 2024 IEEE Conference …, 2024 - ieeexplore.ieee.org
Internet-of-Things (IoT) devices have become widely popular and are being increasingly
utilized in both home and industrial environments. Such devices use a variety of different …