Impact of Man-in-the-Middle Attacks to the O-RAN Inter-Controllers Interface

Walter Tiberti, Eleonora Di Fina, A. Marotta, D. Cassioli
{"title":"Impact of Man-in-the-Middle Attacks to the O-RAN Inter-Controllers Interface","authors":"Walter Tiberti, Eleonora Di Fina, A. Marotta, D. Cassioli","doi":"10.1109/FNWF55208.2022.00071","DOIUrl":null,"url":null,"abstract":"As the mobile traffic increases, mobile networks and user equipment are continuously improved to support higher data rates and newer communication protocols. This constantly evolving scenario represents a big challenge for mobile network operators which paid great effort, in the last years, towards the definition of flexible mobile network architectures able to dynamically adapt to the modern traffic scenarios. This is the mission of the Open-Radio Access Network (O-RAN) Alliance, which aims to create an open, interoperable, high-performance and low-cost architecture for the new generation of RANs. Moreover, the O-RAN architecture adopts a Security-by-Design approach, bringing the security-related aspects into consideration at the design phase. In this paper, we contribute to this general effort of securing the O-RAN, by analyzing the vulnerabilities of a critical interface in the current architecture proposed for the O-RAN: it is the communication interface between the two network controllers. We show what is the impact of Man-in-the-Middle attacks on this communication interface. Our test case has been implemented in the official O-RAN software implementation, thus our study accounts for security weaknesses related to the actual implementation of the O-RAN architecture. We also propose possible mitigation strategies to counteract such kind of attacks.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Future Networks World Forum (FNWF)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FNWF55208.2022.00071","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

As the mobile traffic increases, mobile networks and user equipment are continuously improved to support higher data rates and newer communication protocols. This constantly evolving scenario represents a big challenge for mobile network operators which paid great effort, in the last years, towards the definition of flexible mobile network architectures able to dynamically adapt to the modern traffic scenarios. This is the mission of the Open-Radio Access Network (O-RAN) Alliance, which aims to create an open, interoperable, high-performance and low-cost architecture for the new generation of RANs. Moreover, the O-RAN architecture adopts a Security-by-Design approach, bringing the security-related aspects into consideration at the design phase. In this paper, we contribute to this general effort of securing the O-RAN, by analyzing the vulnerabilities of a critical interface in the current architecture proposed for the O-RAN: it is the communication interface between the two network controllers. We show what is the impact of Man-in-the-Middle attacks on this communication interface. Our test case has been implemented in the official O-RAN software implementation, thus our study accounts for security weaknesses related to the actual implementation of the O-RAN architecture. We also propose possible mitigation strategies to counteract such kind of attacks.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
中间人攻击对O-RAN控制器间接口的影响
随着移动通信量的增加,移动网络和用户设备不断改进,以支持更高的数据速率和更新的通信协议。这种不断变化的场景对移动网络运营商来说是一个巨大的挑战,在过去的几年里,移动网络运营商为定义能够动态适应现代流量场景的灵活移动网络架构付出了巨大的努力。这是开放无线接入网(O-RAN)联盟的使命,该联盟旨在为新一代ran创建一个开放、可互操作、高性能和低成本的架构。此外,O-RAN体系结构采用了一种按设计安全(Security-by-Design)的方法,在设计阶段就考虑到与安全相关的方面。在本文中,我们通过分析当前为O-RAN提出的体系结构中的一个关键接口的漏洞,为保护O-RAN做出了贡献:它是两个网络控制器之间的通信接口。我们将展示中间人攻击对该通信接口的影响。我们的测试用例已经在官方的O-RAN软件实现中实现,因此我们的研究说明了与O-RAN架构的实际实现相关的安全弱点。我们还提出了可能的缓解策略来抵消此类攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
SliceSecure: Impact and Detection of DoS/DDoS Attacks on 5G Network Slices A Score Function Heuristic for Crosstalk- and Fragmentation-Aware Dynamic Routing, Modulation, Core, and Spectrum Allocation in SDM-EONs Machine Learning Aided Design of Sub-Array MIMO Antennas for CubeSats Based on 3D Printed Metallic Ridge Gap Waveguides A Supra-Disciplinary Open Framework of Knowledge to Address the Future Challenges of a Network of Feelings Resource Allocation with Vickrey-Dutch Auctioning Game for C-RAN Fronthaul
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1