Visible to the public Exposing the Security Weaknesses of Fifth Generation Handover Communication

TitleExposing the Security Weaknesses of Fifth Generation Handover Communication
Publication TypeConference Paper
Year of Publication2019
AuthorsSharma, Aditya, Jain, Aaditya, Sharma, Ila
Conference Name2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
Keywords5G handover, handover key mechanism, Human Behavior, inter-gNB handover, key hierarchy, Metrics, policy-based governance, pubcrawl, resilience, Resiliency, Security weakness, security weaknesses
AbstractWith the development of Fifth Generation (5G) mobile telecommunication technology, the Third Generation Partnership Project (3GPP) is attempting to fulfill the increasing security demands of IoT-based applications. 3GPP has published the study report of the 5G handover architecture and security functions. In this work, we discuss the 5G handover key mechanism with its key hierarchy. In addition, the Xn-based, N2-based intra/inter AMF handover mechanism in 5G communication network is analyzed and identify the security weaknesses such as false base-station and Denial-of-Service (DoS) attack. Moreover, the handover mechanism suffers from authentication complexity due to high bandwidth consumption. From these security issues, all the future session keys will be compromised and secure connection between mobile/ user equipment and target basestation will not be established.
DOI10.1109/ICCCNT45670.2019.8944864
Citation Keysharma_exposing_2019