Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3570361.3614085acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
demonstration

From 5G to 6G: It is Time to Sniff the Communications between a Base Station and Core Networks

Published: 02 October 2023 Publication History

Abstract

Thanks to mobility and large coverage, 6G mobile networks introduce satellites and unmanned aerial vehicles as aerial base stations (ABS) in the 6G era. Instead of using a wired backhaul in 5G and its predecessor, an ABS leverages a wireless channel to a core network (CN). However, such a wireless channel design introduces new security challenges. In this paper, we present that passive attackers could sniff the ABS-CN wireless channel and identify what users are doing based on deep learning methods. We collect GTP protocol data on our testbed and use convolutional neural networks to classify 5 types of encrypted App traffic, like IG and TikTok. Experiment results proved the effectiveness of the proposed method, revealing the confidential data leakage problem on the 6G wireless ABS-CN channel.

References

[1]
Georgios Amponis, Thomas Lagkas, Maria Zevgara, Georgios Katsikas, Thanos Xirofotos, Ioannis Moscholios, and Panagiotis Sarigiannidis. 2022. Drones in B5G/6G networks as flying base stations. Drones 6, 2 (2022), 39--57.
[2]
Simon Erni, Martin Kotuliak, Patrick Leu, Marc Roeschlin, and Srdjan Capkun. 2022. AdaptOver: adaptive overshadowing attacks in cellular networks. In Proc. MobiCom '22. 743--755.
[3]
Cheng-Ying Hsieh, Yao-Wen Chang, Chien Chen, and Jyh-Cheng Chen. 2021. Design and implementation of a generic 5G user plane function development framework. In Proc. MobiCom '21. 846--848.
[4]
Guangyi Liu, Na Li, Juan Deng, Yingying Wang, Junshuai Sun, and Yuhong Huang. 2022. The SOLIDS 6G mobile network architecture: driving forces, features, and functional topology. Engineering 8, 2095 (2022), 42--59.
[5]
Zhuang Qiao, Liuqun Zhai, Shunliang Zhang, and Xiaohui Zhang. 2021. Encrypted 5G over-the-top voice traffic identification based on deep learning. In Proc. ISCC '21. 1--7.
[6]
Liuqun Zhai, Zhuang Qiao, Zhongfang Wang, and Dong Wei. 2021. Identify what you are doing: Smartphone apps fingerprinting on cellular network traffic. In Proc. ISCC '21. 1--7.

Index Terms

  1. From 5G to 6G: It is Time to Sniff the Communications between a Base Station and Core Networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ACM MobiCom '23: Proceedings of the 29th Annual International Conference on Mobile Computing and Networking
    October 2023
    1605 pages
    ISBN:9781450399906
    DOI:10.1145/3570361
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s).

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 October 2023

    Check for updates

    Author Tags

    1. 6G
    2. wireless channel
    3. sniffing attack
    4. encrypted data analysis
    5. deep learning

    Qualifiers

    • Demonstration

    Funding Sources

    • EPSRC

    Conference

    ACM MobiCom '23
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 440 of 2,972 submissions, 15%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 193
      Total Downloads
    • Downloads (Last 12 months)156
    • Downloads (Last 6 weeks)15
    Reflects downloads up to 13 Nov 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media