Exploit Vulnerabilities in 4G and 5G Cellular Access Network

Authors

  • Ahmed M. Elbadry Kamal Electronics and Communications Engineering, Arab Academy for Science, Technology and Maritime Transport, Alexandria Governate 5528341, Egypt
  • Mohamed Saad Zaghloul Electronics and Communications Engineering, Arab Academy for Science, Technology and Maritime Transport, Alexandria Governate 5528341, Egypt
  • Waleed K. Badawi Electronics and Communications Engineering, Arab Academy for Science, Technology and Maritime Transport, Alexandria Governate 5528341, Egypt
  • Roshdy A. Abdelrassoul Electronics and Communications Engineering, Arab Academy for Science, Technology and Maritime Transport, Alexandria Governate 5528341, Egypt

DOI:

https://doi.org/10.37934/araset.53.2.252262

Keywords:

Attacks, security, wireless, 5G

Abstract

Portable gadgets back different specialized highlights and administrations for up-and-coming 2G, 3G, 4G and 5G systems.  For illustration, these determinations contain physical layer rate sorts, radio convention data, security calculations, carrier conglomeration groups, and benefit sorts such as GSM-R, Voice over LTE, Within the setting of portable security standardization, these organize determinations and administrations are alluded to as gadget capabilities and are traded with the organize amid the gadget enrolment stage. In this article, we investigate data around indicated gadget capabilities for 4G and 5G gadgets and their part in building up a secure interface between the gadget and the arrange. Our inquire about comes about appear the plausibility of the gadget being traded with the carrier some time recently the confirmation step without any ensures and not affirmed by the carrier.  Therefore, we display three unused sorts of assaults that misuse data approximately the capabilities of unprotected gadgets in future 5G systems: Character assaults, sending assaults, and battery deplete assaults against versatile gadgets. Conduct verification of concept assaults utilizing reasonable equipment and computer program arrangements to survey their effect on commercial 4G gadgets and systems. We have detailed the distinguished vulnerabilities to pertinent benchmarks bodies and given countermeasures to relieve assaults against gadget capabilities in up-and-coming 5G systems. 

Downloads

Download data is not yet available.

Author Biographies

Ahmed M. Elbadry Kamal, Electronics and Communications Engineering, Arab Academy for Science, Technology and Maritime Transport, Alexandria Governate 5528341, Egypt

ahmedelbadry0242@gmail.com

Mohamed Saad Zaghloul, Electronics and Communications Engineering, Arab Academy for Science, Technology and Maritime Transport, Alexandria Governate 5528341, Egypt

dr_mszaghloul@yahoo.com

Waleed K. Badawi, Electronics and Communications Engineering, Arab Academy for Science, Technology and Maritime Transport, Alexandria Governate 5528341, Egypt

waleedbadawi@aast.edu

Roshdy A. Abdelrassoul, Electronics and Communications Engineering, Arab Academy for Science, Technology and Maritime Transport, Alexandria Governate 5528341, Egypt

roshdy.aa@gmail.com

Published

2024-10-07

Issue

Section

Articles