The purpose of this project is to demonstrate various security protocols that are designed to mitigate a wide range of threats on next-generation networks including 5G. With 5G encompassing a broad area of new use-cases such as vehicular communication, massive machine-to-machine communication in industrial IoT settings, it has become imperative to secure these networks against adversarial threats. In particular, threats on vehicular communication and M2M communication can lead to catastrophic consequences, if not dealt with at the design stage. Thus, as part of this 5G testbed development, we will first demonstrate standard security protocols such as authentication between UE and core network, encryption of payload by using prescribed modules from the standard bodies. Subsequently, we also demonstrate novel security protocols that aid in securing device-to-device communication in next generation networks. All the security protocols have been demonstrated using a network of XBee devices, Raspberry Pis and software defined radios
Demonstration of 5G AKA protocols
Demonstration of Physical- Layer Key Generation using RSSI Data from Devices
Demonstration of Physical-Layer Key Generation using I/Q Data from SDRs
Setup to Demonstrate Network Provenance Protocols
Scope
In order to capture a strong use-case for 5G networks, we have envisaged a vehicular network scenario that apply a 5G based architecture for radio access fronthaul and backhaul. Towards that end we consider a network of UEs that play the role of mobile vehicles in a given geographical area. The backhaul network is such that the core network is connected to several road side units (RSUs) and gateway nodes such that the vehicles within a given area authenticate with the core network through the gateway nodes. Upon authentication the vehicles can exchange messages with the RSU using the 5G architecture. The vehicles can also exchange messages with each other without the intervention of the RSUs thereby providing the much needed low-latency features for communication. For this setup, our project provides a number of security protocols to mitigate several threats. The main security features include
Depiction of 5G AKA between the vehicles and the
RSU under the 5G framework
Key generation mechanisms for device-to-device
setting under the 5G architecture
Framework for neighbor discovery and device-to-
device authentication under the 5G architecture
Network provenance module to mitigate integrity
threats in multi-hop communication from the UEs to
the RSU.
The main functional requirements are
Our testbed is build using a network of Raspberry Pis, Digi Xbee wireless devices, software defined radios (SDRs) and a few high-performance computing devices. The specific roles of these devices are listed below:
Before giving details on the design of the security modules, we provide the necessary details on Digi XBee devices that are used in the 5G testbed. We have used a family of radios by Digi International that has created an implementation of ZigBee standards on its chipsets called XBee. As the main deliverable, we have deployed all the security protocols by compressing the messages within the payload limit provided by the standard. We highlight that the choice of wireless devices (in terms of using XBee devices) and the radio-frequency band (in terms of using ISM band) are not the focus areas of this demonstration. Instead, the focus is on the implementation of 5G compliant authentication and other security related protocols, which could be seamlessly mounted on any off-the-shelf 5G compliant hardware platform. The XBee devices can be easily operated through standard Python modules as shown in Fig. 1 and Fig. 2. A typical architecture for interfacing a XBee device with a computing machine is also shown in Fig. 3. A sample snapshot of instructions to use the XBee devices for communicating with each other is also presented in Fig. 4 and Fig. 5.
Given that the packet structure of XBee protocol has limitations in the payload size, multiple rounds of packet transmissions were executed when using them for security protocols. The number of rounds of packet transmissions used for communication depends on the specific protocol. Such protocols included
At a high-level, the main entities of our testbed are (i) UEs, (ii) gateway nodes, and (iii) roadside units (RSUs) that play the role of gNodeBs (or base stations). The functionalities implemented in the devices depend on their roles. For instance, the UE that is capable of implementing the security protocols of the 5G testbed will have all the functional blocks. Similarly, the RSU which is capable of verifying the provenance will have all the required functional blocks. The main functional blocks of a UE include
Fig. 1: XBee devices and their interface through standard Python libraries
Fig. 2: Standard interfaces to work with XBee devices
Fig. 3: A typical architecture for interfacing a XBee device with a computing machine. In our testbed, we
have used Raspberry Pis as well as high-performance computing machines to interface with the XBee
devices.
Fig. 4: Typical instructions to interface with XBee devices for transmitting and receiving packets over the
ISM band
Fig. 5: Typical instructions to interface with XBee devices for transmitting and receiving packets over the
ISM band