Security and Privacy in Mobile Networks

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Cybersecurity".

Deadline for manuscript submissions: closed (30 April 2024) | Viewed by 2412

Special Issue Editors


E-Mail Website
Guest Editor
1. CableLabs, Louisville, CO 80027, USA
2. School of Computer Science, Carleton University, Ottawa, ON K1S 5B6, Canada
Interests: network security; network measurement

E-Mail Website
Guest Editor
Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing 100084, China
Interests: network security; network measurement

Special Issue Information

Dear Colleagues,

Since the first commercial deployment of 2G networks in the 1990s, mobile networks have evolved from 2G/GSM, 3G/UMTS, 4G/LTE to 5G. Each generation of mobile networks introduced new security enhancement. Yet, some fundamental security design flaws in mobile networks remain unaddressed. For example, broadcasting messages in all generations of mobile networks, including the latest 5G networks, lack authenticity, allowing an adversary to impersonate legitimate mobile networks to attack their subscribers. Further, new functional features and architecture evolvement in each generation of mobile networks also introduced new security risks. Particularly, 5G adopted a new architecture for the mobile core networks, namely Service-Based Architecture (SBA), introducing a new set of attacking surfaces. In addition, new technologies such as Artificial Intelligence, utilized by 5G to improve network performance and intelligence, also introduce privacy concerns since large amounts of user data are being collected for AI model training, analytics, and security monitoring. Both old and new security and privacy risks in mobile networks need to be addressed to protect this critical global communication infrastructure and billions of mobile subscribers.

This Special Issue aims to present the latest research advances in security and privacy research and standard development of mobile networks. Any topics related to the security and privacy of any components (including user equipment, radio access networks, and core networks) of 4G and 5G networks are welcome.

Dr. Tao Wan
Prof. Dr. Haixin Duan
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • 5G security
  • LTE security
  • privacy
  • cellular network security
  • mobile network security
  • radio access network security
  • core network security
  • IMS security
  • VoLTE security
  • VoWiFi security

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

24 pages, 893 KiB  
Article
A Vulnerability Assessment of Open-Source Implementations of Fifth-Generation Core Network Functions
by Filippo Dolente, Rosario Giuseppe Garroppo and Michele Pagano
Future Internet 2024, 16(1), 1; https://0-doi-org.brum.beds.ac.uk/10.3390/fi16010001 - 19 Dec 2023
Viewed by 2169
Abstract
The paper presents an experimental security assessment within two widely used open-source 5G projects, namely Open5GS and OAI (Open-Air Interface). The examination concentrates on two network functions (NFs) that are externally exposed within the core network architecture, i.e., the Access and Mobility Management [...] Read more.
The paper presents an experimental security assessment within two widely used open-source 5G projects, namely Open5GS and OAI (Open-Air Interface). The examination concentrates on two network functions (NFs) that are externally exposed within the core network architecture, i.e., the Access and Mobility Management Function (AMF) and the Network Repository Function/Network Exposure Function (NRF/NEF) of the Service-Based Architecture (SBA). Focusing on the Service-Based Interface (SBI) of these exposed NFs, the analysis not only identifies potential security gaps but also underscores the crucial role of Mobile Network Operators (MNOs) in implementing robust security measures. Furthermore, given the shift towards Network Function Virtualization (NFV), this paper emphasizes the importance of secure development practices to enhance the integrity of 5G network functions. In essence, this paper underscores the significance of scrutinizing security vulnerabilities in open-source 5G projects, particularly within the core network’s SBI and externally exposed NFs. The research outcomes provide valuable insights for MNOs, enabling them to establish effective security measures and promote secure development practices to safeguard the integrity of 5G network functions. Additionally, the empirical investigation aids in identifying potential vulnerabilities in open-source 5G projects, paving the way for future enhancements and standard releases. Full article
(This article belongs to the Special Issue Security and Privacy in Mobile Networks)
Show Figures

Figure 1

Back to TopTop