As the mobile traffic increases, mobile networks and user equipment are continuously improved to support higher data rates and newer communication protocols. This constantly evolving scenario represents a big challenge for mobile network operators which paid great effort, in the last years, towards the definition of flexible mobile network architectures able to dynamically adapt to the modern traffic scenarios. This is the mission of the Open-Radio Access Network (O-RAN) Alliance, which aims to create an open, interoperable, high-performance and low-cost architecture for the new generation of RANs. Moreover, the O-RAN architecture adopts a Security-by-Design approach, bringing the security-related aspects into consideration at the design phase. In this paper, we contribute to this general effort of securing the O-RAN, by analyzing the vulnerabilities of a critical interface in the current architecture proposed for the O-RAN: it is the communication interface between the two network controllers. We show what is the impact of Man-in-the-Middle attacks on this communication interface. Our test case has been implemented in the official O-RAN software implementation, thus our study accounts for security weaknesses related to the actual implementation of the O-RAN architecture. We also propose possible mitigation strategies to counteract such kind of attacks.
Impact of Man-in-the-Middle Attacks to the O-RAN Inter-Controllers Interface
Tiberti W.;Di Fina E.;Marotta A.;Cassioli D.
2022-01-01
Abstract
As the mobile traffic increases, mobile networks and user equipment are continuously improved to support higher data rates and newer communication protocols. This constantly evolving scenario represents a big challenge for mobile network operators which paid great effort, in the last years, towards the definition of flexible mobile network architectures able to dynamically adapt to the modern traffic scenarios. This is the mission of the Open-Radio Access Network (O-RAN) Alliance, which aims to create an open, interoperable, high-performance and low-cost architecture for the new generation of RANs. Moreover, the O-RAN architecture adopts a Security-by-Design approach, bringing the security-related aspects into consideration at the design phase. In this paper, we contribute to this general effort of securing the O-RAN, by analyzing the vulnerabilities of a critical interface in the current architecture proposed for the O-RAN: it is the communication interface between the two network controllers. We show what is the impact of Man-in-the-Middle attacks on this communication interface. Our test case has been implemented in the official O-RAN software implementation, thus our study accounts for security weaknesses related to the actual implementation of the O-RAN architecture. We also propose possible mitigation strategies to counteract such kind of attacks.Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.