5G Security
In this presentation
Why 5G causes COVID
Why 5G was created by the Government to spy on us
Why Birds are Government drones
In this Presentation
Overview of 5G
Security Vulnerabilities in 5G
What is 5G?
magic!
5G Components
Radio Access Network (RAN)/New Radio (NR)
Core Network (called "the core")
User Equipment (UE, just phones)
5th Generation
Previous was 4G LTE
Increased Speeds and decreased latency
New Core network with security features
Many new uses
Edge computing
IoT
Industrial
SA vs NSA
5G Radio Access Network
Also known as RAN
Massively Multiple Input Multiple Output
Multiple frequencies (with multipath resolution)
OFDM with higher multiplexing
5G Core
10 Network Functions
NRF, NSSF, NEF, PCF, UDM, UDR, AUSF, SMF, UPF, AMF
Many Network Interfaces
Can be broken down into control and user planes
NRF
Network Repository Function
Stores all NFs an operator has
Provides and API for NFs to communicate
Like the phone book of the NFs
PCF
Policy Control Function
Implements policies
Allows for control of speed to priority, etc
NSSF
Network Slicing Selection Function
Slice network up
Implemented with SDNs
UDM/UDR
Unified Data Management/User Data Repository
UDR is the database of the 5G
UDM accesses the UDR to get information
AUSF
Authentication Server Function
Carries out the new key agreement
AMF contacts the AUSF
SMF
Session Management Function
Creates sessions to data network
Questions
5G Security
Three Major Vulnerabilties
Authentication and Key Management (AKA), SUPI/SUCI
Fake Base Stations/IMSI Catchers
Compromised Network Functions
SUPI/SUCI
Subscription Permanent Identifier
Subscription Concealed Identifier
During attach, SUPI is exposed
Fake Base Stations
IMSI Catchers
MiTM
DOS/DDOS
Compromised NFs
Fake AMF
PFCP exploitation
Rouge Core
Questions?
Made with Slides.com