5G-to-Next-G: Prototyping Cellular Networks Using Software Radio
Öffentlich DepositedAs 5G networks increase in popularity, so do their security concerns. This report will be focused primarily on 5G Spoofing Attacks and proposes a way to prevent this. This is done by taking advantage of the Global User Temporary Identifier (GUTI), Random Access Control, and other aspects of 5G specifications to create a connection to a User Equipment (UE) that would accept 5G data packets and hold them from an adversary gNB. The original plan for this project was to create a 5G network and design spoofing and targeted attacks; however, several issues with the OAI software prevented this plan from materializing. Because of this, the latter part of this project shifted its focus to creating a network of sensor nodes to collect data from 5G networks that would allow for further analysis.
- This report represents the work of one or more WPI undergraduate students submitted to the faculty as evidence of completion of a degree requirement. WPI routinely publishes these reports on its website without editorial or peer review.
- Creator
- Publisher
- Identifier
- E-project-050323-153008
- 108521
- Stichwort
- Advisor
- Year
- 2023
- Date created
- 2023-05-03
- Resource type
- Major
- Source
- E-project-050323-153008
- Rights statement
- Zuletzt geändert
- 2023-06-14
Beziehungen
- In Collection:
Objekte
Artikel
Miniaturansicht | Titel | Sichtbarkeit | Embargo Release Date | Aktionen |
---|---|---|---|---|
|
MQP_5G_gNodeB_Spoofing_Attacks_0_0.pdf | Öffentlich | Herunterladen |
Permanent link to this page: https://digital.wpi.edu/show/v979v640z