2023
DOI: 10.36227/techrxiv.24069600.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Security Analysis of Critical 5G Interfaces

Mohammed Mahyoub,
AbdulAziz AbdulGhaffar,
Emmanuel Alalade
et al.

Abstract: <p>Interfaces play a crucial role in the Fifth Generation (5G) architecture as they interconnect Network Functions (NFs) to exchange data and services. Certain interfaces are particularly critical because they are involved in the exchange of sensitive data or are exposed externally. To the best of our knowledge, no literature work analyzes the 5G security from a network architecture or interface perspective. Therefore, existing research on 5G security may not be helpful when considering a certain compone… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 40 publications
0
2
0
Order By: Relevance
“…Additionally, Salazar et al [9] discuss the new cybersecurity threats introduced by 5G SBA, emphasizing the ineffectiveness of previously adopted security and privacy mechanisms in the context of 5G. Mahyoub et al [10] present a detailed 5G security analysis from the perspective of network architecture. They closely examine the critical 5G interfaces and provide a set of possible vulnerabilities and threats that would occur if no proper security mechanisms were set in place.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, Salazar et al [9] discuss the new cybersecurity threats introduced by 5G SBA, emphasizing the ineffectiveness of previously adopted security and privacy mechanisms in the context of 5G. Mahyoub et al [10] present a detailed 5G security analysis from the perspective of network architecture. They closely examine the critical 5G interfaces and provide a set of possible vulnerabilities and threats that would occur if no proper security mechanisms were set in place.…”
Section: Related Workmentioning
confidence: 99%
“…Different works on vulnerability analysis of 5G systems have identified threats to various NFs. For example, Mahyoub et al [10] examine critical 5G interfaces, providing a set of possible vulnerabilities and threats. Comprehensive vulnerabilities are also detailed in [27], categorized as shown in Table 1.…”
Section: Vulnerabilities In 5g Systemmentioning
confidence: 99%