Towards 5G Security Analysis against Null Security Algorithms Used in Normal Communication
Table 1
Major LTE protocol exploits, threats, and their impact on 5G.
LTE protocol exploit
Threat
Impact on 5G
IMSI catching
Privacy threat, location leaks, SS7 leaks, etc. [1–6]
Potential for IMSI/SUPI catching in some protocol edge cases, such as when an unauthenticated emergency call is maliciously triggered
Device fingerprinting using exposed device capabilities
Identification attacks, bidding down attacks, and battery draining attacks [7]
Exploiting unprotected device capabilities’ information identification attacks, bidding down attacks, and battery drain attacks against cellular devices
Silent GSM downgrade using preauthentication messages from a malicious base station broadcasting a Mobile Country and Network Code (MCC-MNC) of a network with no public key provisioned in the USIM
DoS of 5G mobile devices caused by malicious base stations broadcasting a valid MCC-MNC combination for a network with no public key provisioned in the USIM