Security Vulnerabilities in 5G Non-Stand-Alone Networks: A Systematic Analysis and Attack Taxonomy

Mohamad Saalim Wani,Michael Rademacher,Thorsten Horstmann,Mathias Kretschmer
DOI: https://doi.org/10.3390/jcp4010002
2024-01-02
Journal of Cybersecurity and Privacy
Abstract:5G networks, pivotal for our digital mobile societies, are transitioning from 4G to 5G Stand-Alone (SA) networks. However, during this transition, 5G Non-Stand-Alone (NSA) networks are widely used. This paper examines potential security vulnerabilities in 5G NSA networks. Through an extensive literature review, we identify known 4G attacks that can theoretically be applied to 5G NSA. We organize these attacks into a structured taxonomy. Our findings reveal that 5G NSA networks may offer a false sense of security, as most security and privacy improvements are concentrated in 5G SA networks. To underscore this concern, we implement three attacks with severe consequences and successfully validate them on various commercially available smartphones. Notably, one of these attacks, the IMSI Leak, consistently exposes user information with no apparent security mitigation in 5G NSA networks. This highlights the ease of tracking individuals on current 5G networks.
computer science, information systems, interdisciplinary applications, software engineering
What problem does this paper attempt to address?
The purpose of this paper is to address the potential security vulnerabilities in 5G Non-Standalone (5G NSA) networks by systematically analyzing known 4G attack methods and identifying which attacks can be applied to 5G NSA networks. Specifically: 1. **Research Background**: With the global rollout of 5G technology, many operators have adopted the 5G NSA model to transition to fully standalone 5G networks. However, during this transition period, 5G NSA networks have not fully implemented new security mechanisms, which may lead to security risks. 2. **Main Objectives**: Through a literature review, the paper identifies known 4G attack methods and assesses whether these attacks are applicable to 5G NSA networks. The authors have established a structured attack classification system to better understand the security threats faced by current 5G NSA networks. 3. **Empirical Research**: The paper not only conducts theoretical analysis but also implements three attacks with severe consequences and verifies the effectiveness of these attacks on various commercial smartphones. One of the attacks (IMSI leakage attack) demonstrates the issue of user information being easily exposed in 5G NSA networks. 4. **Core Findings**: The research reveals that 5G NSA networks may give users a false sense of security because most enhanced security features are concentrated in 5G Standalone (5G SA) networks. Additionally, the paper provides some recommendations for private 5G network deployers to address potential security risks. In summary, the core purpose of this paper is to systematically analyze 4G attack methods and apply them to 5G NSA networks, revealing the security vulnerabilities present in current 5G NSA networks and providing countermeasures for relevant stakeholders.