While 5G has significantly enhanced mobile network speed, reliability, and multi-device connectivity, it has also introduced potential security threats. 5G can be deployed in two main configurations: standalone (using only 5G radios and core) and non-standalone (integrating 4G LTE components). The standalone configuration fully utilizes 5G's capabilities, offering higher speeds and complete functionality as defined by the protocol. In contrast, the non-standalone setup enables faster and more cost-effective deployment by combining 5G connectivity with existing 4G infrastructure. Our contributions to this field have been made in the context of a Standalone 5G network: the application of a methodology for guiding penetration tests based on threat models as well as a testbed designed for conducting penetration tests in a 5G environment; therefore we conducted some attacks using the designed environment.

Leveraging Threat Modelling for Effective Penetration Testing in 5G Systems

Granata D.;
2024-01-01

Abstract

While 5G has significantly enhanced mobile network speed, reliability, and multi-device connectivity, it has also introduced potential security threats. 5G can be deployed in two main configurations: standalone (using only 5G radios and core) and non-standalone (integrating 4G LTE components). The standalone configuration fully utilizes 5G's capabilities, offering higher speeds and complete functionality as defined by the protocol. In contrast, the non-standalone setup enables faster and more cost-effective deployment by combining 5G connectivity with existing 4G infrastructure. Our contributions to this field have been made in the context of a Standalone 5G network: the application of a methodology for guiding penetration tests based on threat models as well as a testbed designed for conducting penetration tests in a 5G environment; therefore we conducted some attacks using the designed environment.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11367/139162
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact