2023
DOI: 10.1016/j.jnca.2023.103621
|View full text |Cite
|
Sign up to set email alerts
|

Open RAN security: Challenges and opportunities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 58 publications
(8 citation statements)
references
References 56 publications
0
7
0
1
Order By: Relevance
“…In this section, results of measured throughput are shown for some parameter settings and compared with the maximum throughput calculated using (3). The measurements are done with about one-meter distance between the base station antennas and the modem antennas.…”
Section: ) Measured Throughputmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, results of measured throughput are shown for some parameter settings and compared with the maximum throughput calculated using (3). The measurements are done with about one-meter distance between the base station antennas and the modem antennas.…”
Section: ) Measured Throughputmentioning
confidence: 99%
“…The consequence is an incomplete control over the network infrastructure they have invested in. Addressing this challenge, a new paradigm known as open RAN has recently emerged, capturing substantial attention from academia as well as industry [3]. Open RAN solutions promote virtualized RAN where disaggregated components communicate via standardized interfaces.…”
mentioning
confidence: 99%
“…Consequently, internal attackers can perform man-in-the-middle attacks and jeopardize the policy integrity of the Non-RT RIC. Unauthorized policy changes and access can severely impact RAN performance and functionality [4], [10]. • O1 Interface : The O1 interface allows the SMO and the Near-RT RIC to access resources and services.…”
Section: A Threats To O-ran Transport Interfacementioning
confidence: 99%
“…The official O-RAN documentation [4], [5] enumerates a range of potential threats to O-RAN components and interfaces, including U-plane, S-Plane, and C-Plane attacks between O-RU and O-DU [6], malicious base station attacks against O-RU [7], malicious xApps attacks on Near-RT RIC [8], threats arising from the lack of authentication in SMO and O1 [9], and threats to the A1 interface between Non-RT RIC and Near-RT RIC [10]. These threats have been discussed from the O-RAN architecture and components perspectives.…”
Section: Introductionmentioning
confidence: 99%
“…Espera-se que os componentes da RAN aberta sejam implementados baseados em software de código-fonte aberto e, por isso, herdem as vulnerabilidades conhecidas pela comunidade pelo uso desse tipo de software [Liyanage et al, 2023]. A O-RAN Software Community 2 (OSC) é responsável pela implementação das especificações O-RAN em código aberto.…”
Section: Software De Código-fonte Abertounclassified