Extracting and ranking for the threats of the radio access network layer of the 5th generation mobile network base on risk analysis

Document Type : Original Article

Authors

1 Invited Professor of Telecommunication Engineering at Qom University of Technology, Qom, Iran, https://orcid.org/0000-0002-5982-5440

2 Associated professor, ICT Research Institute, Iran Telecommunication Research Center (ITRC), Tehran, Iran, https://orcid.org/0000-0001-9852-5451

3 PHD Student, Imam Husein university, Tehran, Iran, https://orcid.org/0000-0002-7130-8825

10.22091/jemsc.2026.11966.1237

Abstract

The fifth generation of mobile networks (5G) offers new and advanced services such as virtual/augmented reality (AR/VR), high-quality video streaming, remote surgery, Internet of Things (IoT), and smart cars with stringent requirements. In this article, we review the 5G architecture and then focus on the Radio Access Network (RAN) architecture, and collect the threats, vulnerabilities, and security solutions provided by researchers and academic authorities in this field. In this article, we also rank RAN threats in the 5G network. To rank threats, we assign a score to each threat by introducing a risk criterion, and finally, we analyze the risk by assessing the impact/severity and probability of success of the threats on the 5G network, so that we can provide a good ranking for the threats. The results of our studies and analyses in this article inform 5G network operators which threats should be prioritized. The results of this paper will guide to secure the 5G network and deploy security solutions.

Keywords

Main Subjects


Abbas, N., Zhang, Y., Taherkordi, A., & Skeie, T. (2018). Mobile edge computing: A survey. IEEE Internet of Things Journal, 5(1), 450–465. https://doi.org/10.1109/JIOT.2017.2750180
Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M., & Gurtov, A. (2018). Overview of 5G security challenges and solutions. IEEE Communications Standards Magazine, 2(1), 36–43. https://doi.org/10.1109/MCOMSTD.2018.1700063
Amiriara, H., & Zahabi, M. R. (2023). A low complexity near-optimal detector based on teaching–learning algorithm for massive MIMO. Journal of Engineering Management and Soft Computing (JEMSC), 9(17), 35–49. https://doi.org/10.22091/jemsc.2024.8730.1167
Batalla, J. M., et al. (2020). Security risk assessment for 5G networks: National perspective. IEEE Wireless Communications, 27(4), 16–22. https://doi.org/10.1109/MWC.001.1900524
Borgaonkar, R., & Shaik, A. (2021). Mirage: 5G IMSI-catcher [Conference presentation]. Black Hat USA 2021. https://i.blackhat.com/USA21/Wednesday-Handouts/us-21-5G-IMSI-Catchers-Mirage.pdf
Chen, C.-L., Chiang, M.-L., Hsieh, H.-C., Liu, C.-C., & Deng, Y.-Y. (2020). A lightweight mutual authentication with wearable device in location-based mobile edge computing. Wireless Personal Communications, 113, 575–598. https://doi.org/10.1007/s11277-020-07240-2
European Telecommunications Standards Institute. (2016). Mobile edge computing (MEC); Framework and reference architecture (ETSI GS MEC 003 V1.1.1). https://www.etsi.org/deliver/etsi_gs/MEC/001_099/003/01.01.01_60/gs_MEC003v010101p.pdf
European Union Agency for Cybersecurity (ENISA) (2020). ENISA threat landscape for 5G networks. Publications Office of the European Union. https://doi.org/10.2824/802229
European Union Agency for Cybersecurity (ENISA). (2023). ENISA threat landscape. Publications Office of the European Union. https://doi.org/10.2824/782573
Farooqui, M. N. I., Arshad, J., & Khan, M. M. (2022). A layered approach to threat modeling for 5G-based systems. Electronics, 11(12), Article 1819. https://doi.org/10.3390/electronics11121819
Gao, Y., Ranasinghe, D. C., Al‑Sarawi, S. F., Kavehei, O., & Abbott, D. (2016). Emerging physical unclonable functions with nanotechnology. IEEE Access, 4, 61–80. https://doi.org/10.1109/ACCESS.2015.2503432
Hamoud, O. N., Kenaza, T., & Challal, Y. (2017). Security in device-to-device communications: A survey. IET Networks, 7(1), 14–22. https://doi.org/10.1049/iet-net.2017.0119
Hao, P., Wang, X., & Shen, W. (2018). A collaborative PHY‑aided technique for end‑to‑end IoT device authentication. IEEE Access, 6, 42279–42293. https://doi.org/10.1109/ACCESS.2018.2859781
Huang, W., Shuai, B., Zhang, R., Xu, M., Xu, Y., Yu, Y., & Antwi, E. (2020). A new system risk definition and system risk analysis approach based on improved risk field. IEEE Transactions on Reliability, 69(4), 1437–1452. https://doi.org/10.1109/TR.2019.2946571
Idowu-Bismark, O., Kennedy, O., Husbands, R., & Adedokun, M. (2019). 5G wireless communication network architecture and its key enabling technologies. International Review of Aerospace Engineering (I.RE.AS.E.), 12(2), 70–82.
Islam, N., Das, S., & Chen, Y. (2017). On‑device mobile phone security exploits machine learning. IEEE Pervasive Computing, 16(2), 92–96. https://doi.org/10.1109/MPRV.2017.26
Javed, A. R., Beg, M. O., Asim, M., Baker, T., & Al‑Bayatti, A. H. (2023). AlphaLogger: Detecting motion‑based side‑channel attacks using smartphone keystrokes. Journal of Ambient Intelligence and Humanized Computing, 14, 4869–4882. https://doi.org/10.1007/s12652-020-01770-0
Krupp, B., Sridhar, N., & Zhao, W. (2017). SPE: Security and privacy enhancement framework for mobile devices. IEEE Transactions on Dependable and Secure Computing, 14(4), 433–446. https://doi.org/10.1109/TDSC.2015.2465965
Kuhestani, A., Sebtonabi, M. A., Rajabi, R., & Keshavarzi, M. R. (2024). Secure medical image transmission for healthcare applications using cooperative relaying based on physical layer security. Journal of Engineering Management and Soft Computing, 10(18), 213–237. https://doi.org/10.22091/jemsc.2024.11195.1199
Kumar, T., Porambage, P., Ahmad, I., Liyanage, M., Harjula, E., & Ylianttila, M. (2018). Securing gadget-free digital services. Computer, 51(11), 66–77. https://doi.org/10.1109/MC.2018.2876017
Liyanage, M., Braeken, A., Shahabuddin, S., & Ranaweera, P. (2023). Open RAN security: Challenges and opportunities. Journal of Network and Computer Applications, 214, Article 103621. https://doi.org/10.1016/j.jnca.2023.103621
Mach, P., & Bečvář, Z. (2017). Mobile edge computing: A survey on architecture and computation offloading. IEEE Communications Surveys & Tutorials, 19(3), 1628–1656. https://doi.org/10.1109/COMST.2017.2682318
Mimran, D., et al. (2021). Evaluating the security of open radio access networks. IEEE Communications Surveys & Tutorials, 23(2), 1162–1187. https://doi.org/10.1109/COMST.2021.3062210
Mushtaq, M., Akram, A., Bhatti, M. K., Rais, R. N. B., Lapotre, V., & Gogniat, G. (2018). Run‑time detection of Prime+Probe side‑channel attack on AES encryption algorithm. In Proceedings of the IEEE Global Information Infrastructure and Networking Symposium (GIIS) (pp. 1–5). IEEE. https://doi.org/10.1109/GIIS.2018.8635767
Porambage, P., Okwuibe, J., Liyanage, M., Ylianttila, M., & Taleb, T. (2018). Survey on multi-access edge computing for Internet of Things realization. IEEE Communications Surveys & Tutorials, 20(4), 2961–2991. https://doi.org/10.1109/COMST.2018.2849509
Ragheb, M., Kuhestani, A., Kazemi, M., Ahmadi, H., & Hanzo, L. (2024). RIS‑aided secure millimeter‑wave communication under RF‑chain impairments. IEEE Transactions on Vehicular Technology, 73(1), 952–963. https://doi.org/10.1109/TVT.2023.3307451
Ragheb, M., Kuhestani, A., & Safavi Hemami, S. M. (2022). Joint beamforming and artificial noise design in secure millimeter‑wave communications with the aid of intelligent reflecting surfaces. Journal of Iranian Association of Electrical and Electronics Engineers, 19(3), 55–62. https://doi.org/10.52547/jiaeee.19.3.55
Ragheb, M., Safavi Hemami, S. M., Kuhestani, A., Ng, D. W. K., & Hanzo, L. (2021). On the physical layer security of untrusted millimeter wave relaying networks: A stochastic geometry approach. IEEE Transactions on Information Forensics and Security, 17, 53–68. https://doi.org/10.1109/TIFS.2021.3131028
Rahman, A., Hassanain, E., & Hossain, M. S. (2017). Towards a secure mobile edge computing framework for Hajj. IEEE Access, 5, 11768–11781. https://doi.org/10.1109/ACCESS.2017.2716782
Ranaweera, P., Jurcut, A. D., Liyanage, M., & Liyanage, M. (2021). Survey on multi-access edge computing security and privacy. IEEE Communications Surveys & Tutorials, 23(2), 1078–1124. https://doi.org/10.1109/COMST.2021.3062546
Rezaeizadeh, S., & Bekran, M. (2023). Minimum variance beamforming based on covariance matrix reconstruction using orthogonal vectors. Journal of Engineering Management and Soft Computing (JEMSC), 9(16), 90–107.
Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680–698. https://doi.org/10.1016/j.future.2016.11.009
Sabbagh, M., Fei, Y., Wahl, T., & Ding, A. A. (2018). SCADET: A side‑channel attack detection tool for tracking Prime+Probe. In Proceedings of the International Conference on Computer‑Aided Design (ICCAD) (pp. 1–8). Association for Computing Machinery. https://doi.org/10.1145/3240765.3240844
Wang, H.-M., Zheng, T.-X., Yuan, J., Towsley, D., & Lee, M. H. (2016). Physical layer security in heterogeneous cellular networks. IEEE Transactions on Communications, 64(3), 1204–1219. https://doi.org/10.1109/TCOMM.2016.2519402
Wang, S., Zhao, Y., Xu, J., Yuan, J., & Hsu, C.-H. (2019). Edge server placement in mobile edge computing. Journal of Parallel and Distributed Computing, 127, 160–168. https://doi.org/10.1016/j.jpdc.2018.06.008
Wang, X., et al. (2018). Deep learning‑based classification and anomaly detection of side‑channel signals. In Proceedings of SPIE – Cyber Sensing (Vol. 10630, Article 1063006). SPIE. https://doi.org/10.1117/12.2311329
Xiao, K., Li, W., Kadoch, M., & Li, C. (2018). On the secrecy capacity of 5G mmWave small cell networks. IEEE Wireless Communications, 25(4), 47–51. https://doi.org/10.1109/MWC.2018.1700383
Yang, S., et al. (2019). Security situation assessment for massive MIMO systems for 5G communications. Future Generation Computer Systems, 98, 25–34. https://doi.org/10.1016/j.future.2019.03.03
Yu, P., Cao, J., Ma, M., Li, H., Niu, B., & Li, F. (2019). Quantum-resistance authentication and data transmission scheme for NB‑IoT in 3GPP 5G networks. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1–7). IEEE. https://doi.org/10.1109/WCNC.2019.8885686
CAPTCHA Image