Stavros Eleftherakis, Domenico Giustiniano, Nicolas Kourtellis
{"title":"SoK:评估 5G 协议应对传统和新兴隐私与安全攻击的能力","authors":"Stavros Eleftherakis, Domenico Giustiniano, Nicolas Kourtellis","doi":"arxiv-2409.06360","DOIUrl":null,"url":null,"abstract":"Ensuring user privacy remains a critical concern within mobile cellular\nnetworks, particularly given the proliferation of interconnected devices and\nservices. In fact, a lot of user privacy issues have been raised in 2G, 3G,\n4G/LTE networks. Recognizing this general concern, 3GPP has prioritized\naddressing these issues in the development of 5G, implementing numerous\nmodifications to enhance user privacy since 5G Release 15. In this\nsystematization of knowledge paper, we first provide a framework for studying\nprivacy and security related attacks in cellular networks, setting as privacy\nobjective the User Identity Confidentiality defined in 3GPP standards. Using\nthis framework, we discuss existing privacy and security attacks in pre-5G\nnetworks, analyzing the weaknesses that lead to these attacks. Furthermore, we\nthoroughly study the security characteristics of 5G up to the new Release 19,\nand examine mitigation mechanisms of 5G to the identified pre-5G attacks.\nAfterwards, we analyze how recent 5G attacks try to overcome these mitigation\nmechanisms. Finally, we identify current limitations and open problems in\nsecurity of 5G, and propose directions for future work.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"SoK: Evaluating 5G Protocols Against Legacy and Emerging Privacy and Security Attacks\",\"authors\":\"Stavros Eleftherakis, Domenico Giustiniano, Nicolas Kourtellis\",\"doi\":\"arxiv-2409.06360\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ensuring user privacy remains a critical concern within mobile cellular\\nnetworks, particularly given the proliferation of interconnected devices and\\nservices. In fact, a lot of user privacy issues have been raised in 2G, 3G,\\n4G/LTE networks. Recognizing this general concern, 3GPP has prioritized\\naddressing these issues in the development of 5G, implementing numerous\\nmodifications to enhance user privacy since 5G Release 15. In this\\nsystematization of knowledge paper, we first provide a framework for studying\\nprivacy and security related attacks in cellular networks, setting as privacy\\nobjective the User Identity Confidentiality defined in 3GPP standards. Using\\nthis framework, we discuss existing privacy and security attacks in pre-5G\\nnetworks, analyzing the weaknesses that lead to these attacks. Furthermore, we\\nthoroughly study the security characteristics of 5G up to the new Release 19,\\nand examine mitigation mechanisms of 5G to the identified pre-5G attacks.\\nAfterwards, we analyze how recent 5G attacks try to overcome these mitigation\\nmechanisms. Finally, we identify current limitations and open problems in\\nsecurity of 5G, and propose directions for future work.\",\"PeriodicalId\":501280,\"journal\":{\"name\":\"arXiv - CS - Networking and Internet Architecture\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-09-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Networking and Internet Architecture\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2409.06360\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Networking and Internet Architecture","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.06360","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
SoK: Evaluating 5G Protocols Against Legacy and Emerging Privacy and Security Attacks
Ensuring user privacy remains a critical concern within mobile cellular
networks, particularly given the proliferation of interconnected devices and
services. In fact, a lot of user privacy issues have been raised in 2G, 3G,
4G/LTE networks. Recognizing this general concern, 3GPP has prioritized
addressing these issues in the development of 5G, implementing numerous
modifications to enhance user privacy since 5G Release 15. In this
systematization of knowledge paper, we first provide a framework for studying
privacy and security related attacks in cellular networks, setting as privacy
objective the User Identity Confidentiality defined in 3GPP standards. Using
this framework, we discuss existing privacy and security attacks in pre-5G
networks, analyzing the weaknesses that lead to these attacks. Furthermore, we
thoroughly study the security characteristics of 5G up to the new Release 19,
and examine mitigation mechanisms of 5G to the identified pre-5G attacks.
Afterwards, we analyze how recent 5G attacks try to overcome these mitigation
mechanisms. Finally, we identify current limitations and open problems in
security of 5G, and propose directions for future work.