{"title":"A Systematic Security Analysis for Beyond 5G Non-Access Stratum Protocol from the Perspective of Network Coexistence","authors":"Zhiwei Cui, Baojiang Cui, Jie Xu, Junsong Fu","doi":"10.1007/s10796-025-10586-2","DOIUrl":null,"url":null,"abstract":"<p>The Beyond 5G (B5G) network promotes the development of all sectors of society and greatly changes our lives. To provide subscribers with better security and privacy protection, the 3rd Generation Partnership Project (3GPP) has enhanced the Non-Access Stratum (NAS) protocol for B5G. It is crucial to analyze the security of NAS protocol and confirm whether it achieves security goals. However, previous work mainly considered the issues in B5G standard, while overlooking the fact that 4G and B5G networks coexist in actual mobile network operators. In this paper, we provide the first systematic security analysis model for B5G NAS protocol under the assumption of network coexistence. We identified 9 protocol vulnerabilities, including one never reported before. This new vulnerability could be exploited to track the target user. We have reported the novel vulnerability to the GSM Association (GSMA) and obtained a tracking number CVD-2022-0058.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"35 1","pages":""},"PeriodicalIF":6.9000,"publicationDate":"2025-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Systems Frontiers","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s10796-025-10586-2","RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The Beyond 5G (B5G) network promotes the development of all sectors of society and greatly changes our lives. To provide subscribers with better security and privacy protection, the 3rd Generation Partnership Project (3GPP) has enhanced the Non-Access Stratum (NAS) protocol for B5G. It is crucial to analyze the security of NAS protocol and confirm whether it achieves security goals. However, previous work mainly considered the issues in B5G standard, while overlooking the fact that 4G and B5G networks coexist in actual mobile network operators. In this paper, we provide the first systematic security analysis model for B5G NAS protocol under the assumption of network coexistence. We identified 9 protocol vulnerabilities, including one never reported before. This new vulnerability could be exploited to track the target user. We have reported the novel vulnerability to the GSM Association (GSMA) and obtained a tracking number CVD-2022-0058.
期刊介绍:
The interdisciplinary interfaces of Information Systems (IS) are fast emerging as defining areas of research and development in IS. These developments are largely due to the transformation of Information Technology (IT) towards networked worlds and its effects on global communications and economies. While these developments are shaping the way information is used in all forms of human enterprise, they are also setting the tone and pace of information systems of the future. The major advances in IT such as client/server systems, the Internet and the desktop/multimedia computing revolution, for example, have led to numerous important vistas of research and development with considerable practical impact and academic significance. While the industry seeks to develop high performance IS/IT solutions to a variety of contemporary information support needs, academia looks to extend the reach of IS technology into new application domains. Information Systems Frontiers (ISF) aims to provide a common forum of dissemination of frontline industrial developments of substantial academic value and pioneering academic research of significant practical impact.