Fact-Checking 5G Security: Bridging the Gap Between Expectations and Reality

5G cellular systems are currently being deployed worldwide delivering the promised unprecedented levels of throughput and latency to hundreds of millions of users. At such scale and reach, security is crucial. Consequently, the 5G standard includes a new series of features to improve the security of...

Full description

Saved in:
Bibliographic Details
Main Authors: Oscar Lasierra, Norbert Ludant, Gines Garcia-Aviles, Esteban Municio, Guevara Noubir, Antonio Skarmeta, Xavier Costa-Perez
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Open Journal of the Communications Society
Subjects:
Online Access:https://ieeexplore.ieee.org/document/11098478/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:5G cellular systems are currently being deployed worldwide delivering the promised unprecedented levels of throughput and latency to hundreds of millions of users. At such scale and reach, security is crucial. Consequently, the 5G standard includes a new series of features to improve the security of its predecessors (i.e., 3G and 4G). In this work, we evaluate the security of currently deployed 5G commercial networks in Europe and North America. Specifically, by collecting 5G signaling traffic in the wild in several cities in Spain, Germany, France, Canada, and the USA, we i) fact-check which 5G security enhancements are implemented in current deployments, ii) provide a rich overview of the implementation status of each 5G security feature in a selection of 5G commercial networks in Europe and North America and compare it with previous results in China, iii) analyze the implications of optional features not being deployed, and iv) discuss on the still remaining 4G-inherited vulnerabilities. Our findings indicate that the rollout of 5G security features in the analyzed commercial networks is still a work in progress. On the one hand, several networks continue to rely on 4G for their core network operations, which hinders the deployment of new security features (e.g., SUCI) and, on the other hand, fully-fledged 5G deployments lack mandatory security measures such as GUTI reallocation after paging. Moreover, we find that some operators fail to provide proper temporary identifier randomization, in both 4G and 5G networks. Some of the obtained results are aligned with results previously reported from China <xref ref-type="bibr" rid="ref1">[1]</xref> and keep the European and North American studied networks vulnerable to some 4G attacks, during their migration period from 4G to 5G. Conversely, studied networks deployed in North America exhibit stronger adherence to 5G security standards, with near-complete compliance observed, in contrast to deployments in China and Europe, where comparatively lower compliance levels have been observed.
ISSN:2644-125X