Evaluating cyber-attacks on 5G networks and comparing traditional encryption with post-quantum cryptography.

- To evaluate cyber-attacks on 5G networks and compare traditional encryption with post-quantum cryptography, the methodology involves building two distinct testbed environments: a traditional 5G setup and a post-quantum (PQ) enhanced counterpart. This architecture utilizes Open5GS for the 5G core alongside UERANSIM for user equipment (UE) and next-generation NodeB (gNB) simulation. Within the PQ testbed, the system implements TLS tunneling and post-quantum certificate-based protection to secure selected communication paths. To thoroughly assess network resilience across both environments, the evaluation executes multiple attack scenarios, including brute-force SSH, reconnaissance, UE registration spamming, reverse SSH, network repository function (NRF) poisoning, traffic analysis, rogue gNB simulation, certificate theft, and resource exhaustion.

People: Kush Manglick, Manish Paudel