Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security 2019
DOI: 10.1145/3319535.3354263
|View full text |Cite
|
Sign up to set email alerts
|

5GReasoner

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 89 publications
(30 citation statements)
references
References 28 publications
0
30
0
Order By: Relevance
“…When T L instead of T R is used, non-existent users are created, that have a smaller load value than the T R extracted ones. These errors can have substantial impact [0-1] min,TR [2][3][4] min,TR [5][6][7][8] min,TR [9][10][11][12][13][14][15][16] min,TR [17][18][19][20][21][22][23][24][25][26][27][28][29][30][31][32] min,TR min,TR [0-1] min,TL [2][3][4] min,TL [5][6][7][8] min,TL [9][10][11][12][13][14][15][16] min,TL [17][18][19][20]…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…When T L instead of T R is used, non-existent users are created, that have a smaller load value than the T R extracted ones. These errors can have substantial impact [0-1] min,TR [2][3][4] min,TR [5][6][7][8] min,TR [9][10][11][12][13][14][15][16] min,TR [17][18][19][20][21][22][23][24][25][26][27][28][29][30][31][32] min,TR min,TR [0-1] min,TL [2][3][4] min,TL [5][6][7][8] min,TL [9][10][11][12][13][14][15][16] min,TL [17][18][19][20]…”
Section: Discussionmentioning
confidence: 99%
“…Nevertheless, several works have shown that RNTIs can be mapped to other identifiers like TMSI, allowing an adversary to track and localize users within a cell [15,16], and even to eavesdrop and decipher a user's signaling and data traffic [17]. Most of the protocol vulnerabilities of 5G NR and LTE assume knowledge of the RNTIs [18]. In practice, a timer monitors the user inactivity: when it exceeds a given threshold, the user-RNTI association is released and the same RNTI can be re-assigned to another user.…”
Section: Introductionmentioning
confidence: 99%
“…The formal verification of 5G network protocols has been approached through various models. Basin et al [13] model the Authentication and Key Agreement Protocols (5G-AKA) of 5GS, while Hussain et al [14] analyze several NAS and RRC protocols. Yang et al [15] present a formal model of the Authentication and Key Management for Application (AKMA) service used for establishing authenticated communication between users and application functions.…”
Section: Related Workmentioning
confidence: 99%
“…To analyze the security and reliability of the communication network efficiently and conveniently, the researchers designed a systematic approach based on the principle of the model checking method and used it to discover the design weaknesses resulting in attacks having security implications in the communication network. We lucubrate the work of literature [4,6,13] and summarize the operation flow of this approach. Figure 3 shows the operation flow of this approach.…”
Section: Applied Systematic Approachmentioning
confidence: 99%
“…ey identified ten new 5G protocol vulnerabilities for 5G nonaccess stratum signaling security and proposed a defense method utilizing the existing publicprivate key pair adopted by 3GPP. Afterward, Hussain et al [6] employed this approach to verify 5G NAS layer procedures (i.e., initial registration, deregistration, paging, configuration update, handover, and service request procedures) and the corresponding RRC layer procedures against relevant security and privacy properties. ey discovered 11 design weaknesses resulting in attacks having security and privacy implications in the 5G network.…”
Section: Introductionmentioning
confidence: 99%