MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) 2022
DOI: 10.1109/milcom55135.2022.10017753
|View full text |Cite
|
Sign up to set email alerts
|

5G-Enabled Defence-in-Depth for Multi-domain Operations

Abstract: In many civil and military use cases, 5G can be a segment of a more complex end-to-end solution. In such a configuration, properly using the 5G security mechanisms to achieve defence-in-depth and compliance with zero-trust architecture is challenging. In our paper, we discuss the existing 5G security mechanisms related to the connection of trusted and untrusted non-3GPP access networks (wireless and wired), 5G roaming, and the 3GPP approach to support Uncrewed Aerial Services, which provides authentication bet… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…In the second phase, attacks can exploit misconfigurations and information gained from system infiltration, such as the maximum number of sessions supported by V-UPF and the activation of security controls to launch the attacks. To this end, our adversary model includes attacks targeting the data plane, such as attacks that aim to break V-UPF, H-UPF, and GTP-U data traffic passing through the N9 reference point (between H-UPF and V-UPF) [23], or GTP-C passing through the N4 reference point (between H-SMF and H-UPF) [24] or even the N6 reference point between 6G-V2X application and H-UPF [25]. These can critically impact 6G-V2X services such as MEC-assisted services and applications.…”
Section: Adversary Modelmentioning
confidence: 99%
“…In the second phase, attacks can exploit misconfigurations and information gained from system infiltration, such as the maximum number of sessions supported by V-UPF and the activation of security controls to launch the attacks. To this end, our adversary model includes attacks targeting the data plane, such as attacks that aim to break V-UPF, H-UPF, and GTP-U data traffic passing through the N9 reference point (between H-UPF and V-UPF) [23], or GTP-C passing through the N4 reference point (between H-SMF and H-UPF) [24] or even the N6 reference point between 6G-V2X application and H-UPF [25]. These can critically impact 6G-V2X services such as MEC-assisted services and applications.…”
Section: Adversary Modelmentioning
confidence: 99%
“…Consequently, V-MNO should promptly allocate for CAVs a 5G-V2X-NS with features similar to that the H-MNO uses. However, this may result in several vulnerabilities, such as non-timely synchronization of security policies and misconfigurations on both the H-MNO and V-MNO sides, which could be exploited to launch attacks on the data plane [5][6][7]. In addition to 5G security solutions, other security services should be deployed to prevent, detect, and mitigate 5G-V2X NS attacks at cross borders.…”
Section: Architecturementioning
confidence: 99%
“…According to Equation (6), the total sum of selected security services' resources for a given 5G-V2X-NS i should not exceed the maximum available resources Γ max in i. Also, Equation (7) indicates that the total sum of tolerable impact of selected security services for 5G-V2X-NS i should not exceed the maximum tolerable impact Λ max on i. m j=1 (x j * Γ(sr j )) ≤ Γmax, x j = 0, 1, 2, 3, ..l;…”
Section: Actionsmentioning
confidence: 99%
See 1 more Smart Citation