About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Industrial Networks and Intelligent Systems. 10th EAI International Conference, INISCOM 2024, Da Nang, Vietnam, February 20–21, 2024, Proceedings

Research Article

Understanding the Security Implications in O-RAN with Abusive Adversaries

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-67357-3_16,
        author={Mark Megarry and Antonino Masaracchia and Muhammad Fahim and Vishal Sharma and Trung Q. Duong},
        title={Understanding the Security Implications in O-RAN with Abusive Adversaries},
        proceedings={Industrial Networks and Intelligent Systems. 10th EAI International Conference, INISCOM 2024, Da Nang, Vietnam, February 20--21, 2024, Proceedings},
        proceedings_a={INISCOM},
        year={2024},
        month={7},
        keywords={Security O-RAN Abusive Adversary Simulations},
        doi={10.1007/978-3-031-67357-3_16}
    }
    
  • Mark Megarry
    Antonino Masaracchia
    Muhammad Fahim
    Vishal Sharma
    Trung Q. Duong
    Year: 2024
    Understanding the Security Implications in O-RAN with Abusive Adversaries
    INISCOM
    Springer
    DOI: 10.1007/978-3-031-67357-3_16
Mark Megarry1, Antonino Masaracchia1, Muhammad Fahim1, Vishal Sharma1,*, Trung Q. Duong1
  • 1: School of Electronics, Electrical Engineering and Computer Science (EEECS), Queen’s University Belfast (QUB)
*Contact email: v.sharma@qub.ac.uk

Abstract

Open-Radio Access Network (O-RAN) is considered the next scalable solution, which aims to devolve the network into Near-real-time RIC and Non-real-time RIC to have far more flexibility in services with adaptable components. This disaggregation, however, will have broader security implications, primarily arising because of the use of legacy systems in the new architecture. Current threat models take a lighter tone towards the evaluation of security measures. Thus, strict adversarial methods must be adopted, which can consider scenarios of cyber-vandalism in such networks. Based on this ideology, the article presents security implications posed by abusive adversaries in the offloading procedures. This methodology provides a viewpoint on how an adversary forms predictive methods on when to attack the system, which is followed by mitigation mechanisms for the network to avoid it from happening. The work is based on the Markov Decision Process (MDP) and a Fuzzy Inference System (FIS), which uses Synthetic Data Augmentation for Tabular Data (SMOTE) to generate a set of metrics that can offer a high probability of attack in the transition mode to the adversary. The implications are presented using a synthetic dataset created on the backbone of the simulated scenario in NS3 and followed by mitigation strategies.

Keywords
Security O-RAN Abusive Adversary Simulations
Published
2024-07-31
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-67357-3_16
Copyright © 2024–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL