Research Article
Towards 5G Security Analysis against Null Security Algorithms Used in Normal Communication
Table 2
Required data for anomaly detection.
| | Type | Field | Description |
| | User information | SUPI | Identification of UE | | MSISDN (Mobile Station ISDN) | Phone number of UE | | User IP version | IP version of UE | | User IPv4 | IPv4 address of UE | | User IPv6 | IPv6 address of UE | | Tracking area identity (TAI) list | Base station list in which UE can access for analyzing the UE location |
| | NAS message information | Attach request time | Time of the Attach Request message | | Attach reject cause | Cause of the Attach Reject message | | Attach request type | Type of Attach Request | | 1.5GS attach | | 2.combined 5GS/SUPI attach | | 6.5GS emergency attach | | Security Mode Command Time | Time of the Security Mode Command message | | Security Mode reject cause | Cause of the security mode reject message | | UE network capability | NEA, NIA configurations of UE | | Selected NEA/NIA | Selected NEA/NIA mode by AMF |
|
|