Impact of Man-in-the-Middle Attacks to the O-RAN Inter-Controllers Interface

Walter Tiberti, Eleonora Di Fina, A. Marotta, D. Cassioli
{"title":"Impact of Man-in-the-Middle Attacks to the O-RAN Inter-Controllers Interface","authors":"Walter Tiberti, Eleonora Di Fina, A. Marotta, D. Cassioli","doi":"10.1109/FNWF55208.2022.00071","DOIUrl":null,"url":null,"abstract":"As the mobile traffic increases, mobile networks and user equipment are continuously improved to support higher data rates and newer communication protocols. This constantly evolving scenario represents a big challenge for mobile network operators which paid great effort, in the last years, towards the definition of flexible mobile network architectures able to dynamically adapt to the modern traffic scenarios. This is the mission of the Open-Radio Access Network (O-RAN) Alliance, which aims to create an open, interoperable, high-performance and low-cost architecture for the new generation of RANs. Moreover, the O-RAN architecture adopts a Security-by-Design approach, bringing the security-related aspects into consideration at the design phase. In this paper, we contribute to this general effort of securing the O-RAN, by analyzing the vulnerabilities of a critical interface in the current architecture proposed for the O-RAN: it is the communication interface between the two network controllers. We show what is the impact of Man-in-the-Middle attacks on this communication interface. Our test case has been implemented in the official O-RAN software implementation, thus our study accounts for security weaknesses related to the actual implementation of the O-RAN architecture. We also propose possible mitigation strategies to counteract such kind of attacks.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Future Networks World Forum (FNWF)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FNWF55208.2022.00071","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

As the mobile traffic increases, mobile networks and user equipment are continuously improved to support higher data rates and newer communication protocols. This constantly evolving scenario represents a big challenge for mobile network operators which paid great effort, in the last years, towards the definition of flexible mobile network architectures able to dynamically adapt to the modern traffic scenarios. This is the mission of the Open-Radio Access Network (O-RAN) Alliance, which aims to create an open, interoperable, high-performance and low-cost architecture for the new generation of RANs. Moreover, the O-RAN architecture adopts a Security-by-Design approach, bringing the security-related aspects into consideration at the design phase. In this paper, we contribute to this general effort of securing the O-RAN, by analyzing the vulnerabilities of a critical interface in the current architecture proposed for the O-RAN: it is the communication interface between the two network controllers. We show what is the impact of Man-in-the-Middle attacks on this communication interface. Our test case has been implemented in the official O-RAN software implementation, thus our study accounts for security weaknesses related to the actual implementation of the O-RAN architecture. We also propose possible mitigation strategies to counteract such kind of attacks.
中间人攻击对O-RAN控制器间接口的影响
随着移动通信量的增加,移动网络和用户设备不断改进,以支持更高的数据速率和更新的通信协议。这种不断变化的场景对移动网络运营商来说是一个巨大的挑战,在过去的几年里,移动网络运营商为定义能够动态适应现代流量场景的灵活移动网络架构付出了巨大的努力。这是开放无线接入网(O-RAN)联盟的使命,该联盟旨在为新一代ran创建一个开放、可互操作、高性能和低成本的架构。此外,O-RAN体系结构采用了一种按设计安全(Security-by-Design)的方法,在设计阶段就考虑到与安全相关的方面。在本文中,我们通过分析当前为O-RAN提出的体系结构中的一个关键接口的漏洞,为保护O-RAN做出了贡献:它是两个网络控制器之间的通信接口。我们将展示中间人攻击对该通信接口的影响。我们的测试用例已经在官方的O-RAN软件实现中实现,因此我们的研究说明了与O-RAN架构的实际实现相关的安全弱点。我们还提出了可能的缓解策略来抵消此类攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信