Work item:
|
TR.sa-ran
|
Subject/title:
|
Technical Report on "Security Attacks in Radio Access Networks"
|
Status:
|
Under study
|
Approval process:
|
Agreement
|
Type of work item:
|
Technical report
|
Version:
|
New
|
Equivalent number:
|
-
|
Timing:
|
03-2026 (Medium priority)
|
Liaison:
|
3GPP SA3, GSMA FASG, ITU-R WP 5D
|
Supporting members:
|
Brazil, Canada, ZTE Corporation (China)
|
Summary:
|
Novel IMT-2020 (a.k.a ā5Gā) networks are rapidly transforming various aspects of society, providing significantly faster data speeds and lower latency. New opportunities are arising, such as telemedicine, autonomous vehicles, automated industry, and smart cities, where real-time data transmission addresses their implementation issues. IMT-2020 networks enable more connected devices, which can be a game changer for applications like manufacturing industry, agriculture, and healthcare. Furthermore, IMT-2020 provides stable and high-speed internet connections, making viable online learning and remote working, to name a few, and potentially bridging the digital divide by providing high-speed Internet to rural and underserved areas and improving response times and coordination during disasters by providing enhanced communication networks for emergency services.
However, with these opportunities, challenges come to light, especially cybersecurity issues. With more devices connected, the cyberattack surface increases. IMT-2020 devices, in particular, can be vulnerable if not properly secured. The integration of IMT-2020 infrastructure, including previous generation networks, involves components from various suppliers, which can introduce risks if some part of the supply chain is compromised. Data privacy and the potential for unauthorized access can be a concern due to the vast amount of data transmitted over IMT-2020 networks, which can be targeted for attacks that can impact from personal communications to the critical infrastructure. So, IMT-2020 is potentially a game-changer, but it's essential to address cybersecurity risks to realize its potential fully.
This technical report focuses on common security attacks that usually threatens Radio Access Networks (RANs) and connected User Equipments (UEs). This document presents a description for 28 attacks common to RAN scenarios. For each attack, there is a brief description, main vulnerabilities, related threats and possible security dimensions to address it according to the Recommendation ITU-T X.805, and suggestions of possible mitigations.
|
Comment:
|
-
|
Reference(s):
|
|
|
Historic references:
|
Contact(s):
|
|
ITU-T A.5 justification(s): |
|
|
|
First registration in the WP:
2024-09-12 17:26:26
|
Last update:
2024-09-18 08:53:05
|
|