IDENTIFICATION AND ANALYSIS OF ATTACKS USING RECOVERED RADIO NETWORK TEMPORARY IDENTIFIERS ON 5G USER EQUIPMENT
Loading...
Authors
Schindler, Thomas M.
Subjects
5G
Man-in-the-Middle
MiTM
Cellular-Radio Network Temporary Identifier
C-RNTI
Denial of Service
DoS
Subscription Permanent Identifier
SUPI
Man-in-the-Middle
MiTM
Cellular-Radio Network Temporary Identifier
C-RNTI
Denial of Service
DoS
Subscription Permanent Identifier
SUPI
Advisors
Bollmann, Chad A.
Hale, Britta
Date of Issue
2022-12
Date
Publisher
Monterey, CA; Naval Postgraduate School
Language
Abstract
The next cellular network, 5G, will drastically increase the number of devices on a network. The increase in devices will provide a bigger attack surface for potential intruders and offer a pivot point to get inside networks once exploited. Researchers have already discovered how to de-anonymize the messages in the physical downlink control channel to recover Radio Network Temporary Identifiers (RNTI). Analysis of the 5G protocols identified potential vulnerabilities when an RNTI is known. A potential attacker is now able to recover RNTIs, making attacks on 5G devices inevitable. Additional research conducted into protocol vulnerabilities was completed and found possible vulnerabilities in some of the 5G protocols. This thesis examined how the aggregated results of prior work can be utilized to attack individual pieces of user equipment. Cyber security professionals will benefit from this research by understanding how these attacks will be carried out in order to identify defenses against them.
Type
Thesis
Description
Series/Report No
Department
Computer Science (CS)
Organization
Identifiers
NPS Report Number
Sponsors
Funding
Format
Citation
Distribution Statement
Approved for public release. Distribution is unlimited.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
