Browse > Article
http://dx.doi.org/10.9708/jksci.2022.27.12.131

A Study on the Authenticity Verification of UxNB Assisting Terrestrial Base Stations  

Kim, Keewon (Dept. of Computer Engineering, Mokpo National Maritime University)
Park, Kyungmin (Information Security Research Division, ETRI)
Kim, Jonghyun (Information Security Research Division, ETRI)
Park, Tae-Keun (Dept. of Computer Engineering, Dankook University)
Abstract
In this paper, to verify the authenticity of UxNB that assists terrestrial base stations, the solutions for SI (System Information) security presented in 3GPP TR 33.809 are analyzed from the perspective of UxNB. According to the definition of 3GPP (Third Generation Partnership Project), UxNB is a base station mounted on a UAV (Unmanned Aerial Vehicle), is carried in the air by the UAV, and is a radio access node that provides a connection to the UE (User Equipment). Such solutions for SI security can be classified into hash based, MAC (Message Authentication Codes) based, and digital signature based, and a representative solution for each category is introduced one by one. From the perspective of verifying the authenticity of UxNB for each solution, we compare and analyze the solutions in terms of provisioning information and update, security information leakage of UxNB, and additionally required amount of computation and transmission. As a result of the analysis, the solution for verifying the authenticity of the UxNB should minimize the secret information to be stored in the UxNB, be stored in a secure place, and apply encryption when it is updated over the air. In addition, due to the properties of the low computing power of UxNB and the lack of power, it is necessary to minimize the amount of computation and transmission.
Keywords
Mobile Communication; 3GPP standard; UxNB; System Information; Authenticity;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 K. Kim, K. Park, and T.K. Park, "Analysis of DoS Attack against Users with Spoofed RRC Connections in 5G SNPN," Journal of KIIT, Vol. 19, No. 10, pp. 79-85, Oct. 2021. DOI: 10.14801/jkiit.2021.19.10.79   DOI
2 K. Kim, J.G. Park, and T.K. Park, "Analysis of Incarceration Attacks with RRCReject and RRCRelease in 5G Standalone Non-Public Network," Journal of the Korea Society of Computer and Information, Vol. 26 No. 10, pp. 93-100, Oct. 2021. DOI: 10.9708/jksci.2021.26.10.093   DOI
3 T.K. Park, J.G. Park, and K. Kim, "Analysis of the IP Spoofing Attack Exploiting Null Security Algorithms in 5G Networks," Journal of the Korea Society of Computer and Information, Vol. 27 No. 9, pp. 113-120, Sep.2021. DOI: 10.9708/jksci.2022.27.09.000   DOI
4 K. Kim, K. Park, and T.K. Park, "Analysis of Deregistration Attacks in 5G Standalone Non-Public Network," Journal of the Korea Society of Computer and Information, Vol. 26, No. 9, pp. 81-88, Sep. 2021. DOI: 10.9708/jksci.2021.26.09.081   DOI
5 3GPP. TS 22.125 v17.6.0, "Unmanned Aerial System (UAS) Support in 3GPP; Stage 1 (Rel-17)," Mar. 2022.
6 R. Zhang, W. Zhou, and H. Hu, "Towards 5G Security Analysis against Null Security Algorithms Used in Normal Communication," Hindawi Security and Communication Networks, Vol. 2021, Article ID 4498324, Oct. 2021. DOI: 10.1155/2021/4498324   DOI
7 3GPP. TR 33.809 v0.18.0: "Study on 5G Security Enhancement against False Base Stations (FBS) (Rel-18)," Feb. 2022.
8 3GPP. TS 33.501 v17.5.0: "Security Architecture and Procedures for 5G System (Rel-17)," Mar. 2022.
9 H. Lee, J.S. Bae, S.J. Bahng, and H.S. Lee, "Standardization Trends for Operation of Unmanned Aerial Vehicles based on 5G," Electronics and Telecommunications Trends, Vol. 36, No. 4, pp.13-22, Aug. 2021. DOI: 10.22648/ETRI.2021.J.360402   DOI
10 Y. Aydin, G. K. Kurt, E. Ozdemir and H. Yanikomeroglu, "Authentication and Handover Challenges and Methods for Drone Swarms", IEEE Journal of Radio Frequency Identification, Vol. 6, pp. 220-228, Mar. 2022. DOI: 10.1109/JRFID.2022.3158392   DOI
11 R. Bajracharya; R. Shrestha; H. Jung, "Wireless Infrastructure Drone based on NR-U: A Perspective", 2021 International Conference on Information and Communication Technology Convergence (ICTC), Oct. 2021. DOI: 10.1109/ICTC52510.2021.9620869   DOI
12 A. S. Abdalla and V. Marojevic, "Communications Standards for Unmanned Aircraft Systems: The 3GPP Perspective and Research Drivers," IEEE Commun. Standards Mag., vol. 5, no. 1, pp. 70-77, Mar. 2021. DOI: 10.1109/MCOMSTD.001.2000032   DOI
13 S. Alfattani et al., "Aerial platforms with reconfigurable smart surfaces for 5G and beyond", IEEE Commun. Mag., vol. 59, no. 1, pp. 96-102, Jan. 2021. DOI: 10.1109/MCOM.001.2000350   DOI
14 Y. Aydin, G. K. Kurt, E. Ozdemir and H. Yanikomeroglu, "Group handover for drone-mounted base stations", IEEE Internet of Things Journal, vol. 8, No. 18, pp. 13876-13887, Sep. 2021. DOI: 10.1109/JIOT.2021.3068297   DOI
15 S.R. Hussain, M. Echeverria, I. Karim, O. Chowdhury, E. Bertino: "5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol," in Proc. 2019 ACM SIGSAC Conference on Computer and Communications Security, pp.669-684, Nov. 2019. DOI: 10.1145/3319535.3354263   DOI
16 H. Gao, Y. Zhang, T. Wan, J. Zhang and H. Duan, "On Evaluating Delegated Digital Signing of Broadcasting Messages in 5G," 2021 IEEE Global Communications Conference (GLOBECOM), pp. 1-7, Dec. 2021, DOI: 10.1109/GLOBECOM46510.2021.9685173   DOI