Search papers, labs, and topics across Lattice.
This paper investigates the impact of logical vulnerabilities in 5G Standalone (SA) networks on UAV command and control communication by simulating attacks from three different attacker positions: malicious UE, compromised 5G core, and compromised gNodeB. A testbed using Open5GS, UERANSIM, and Kubernetes was created to emulate a UAV-GCS communication system over a 5G SA network. The experiments demonstrate that attackers can disrupt UAV operations by manipulating control commands and terminating data sessions, highlighting the need for enhanced security measures.
A compromised 5G network can hijack or disable UAVs, revealing a major security gap in current UAV communication protocols.
This paper examines how logical vulnerabilities in 5G Standalone networks affect UAV command and control communication. The study looks at three attacker positions in the architecture: a malicious user equipment (UE) connected to the same logical network as the UAV, an attacker with access to the 5G core, and a compromised gNodeB. To test these scenarios, a testbed was created using Open5GS, UERANSIM, and Kubernetes. The setup simulates a UAV-GCS communication system over a 5G SA network and allows for controlled attacks on various network interfaces. The experiments reveal that attacks at different points in the architecture can disrupt UAV operations. These disruptions include manipulating control commands and terminating data sessions. The findings emphasize the need for isolation measures in the 5G user plane and integrity protection in UAV command protocols.