Публікація:
Evolution of Man-in-the-Middle attacks in 5G telecommunication systems

dc.contributor.authorKotukh, Y. V.
dc.contributor.authorKhalimov, G. Z.
dc.contributor.authorDzhura, I. Y.
dc.date.accessioned2026-05-03T15:16:56Z
dc.date.issued2025
dc.description.abstractThe rapid deployment of fifth-generation (5G) networks has dramatically transformed telecommunications by enabling ultra-low latency, high bandwidth, and dynamic spectrum allocation. However, these innovations have also expanded the attack surface, introducing unprecedented security vulnerabilities. Among them, Man-in-the-Middle (MITM) attacks have evolved into complex, AI-driven, and persistent threats capable of exploiting 5G’s Service-Based Architecture (SBA), virtualized functions, and heterogeneous interoperability with LTE and Wi-Fi. A particularly critical evolution is the rise of Digital Twin attacks, where adversaries replicate devices or network elements with high fidelity, bypassing traditional authentication and maintaining long-term undetectable intrusions. This paper provides a comprehensive analysis of MITM evolution in 5G systems, including vulnerabilities across the OSI model layers, exploitation of NGAP, Diameter, and DSS signaling, and the persistent risks posed by distributed architectures. Special attention is given to quantum-era threats, such as store-now-decrypt-later scenarios and quantum-enhanced MITM at tacks undermining 5G-AKA protocols reliant on non-quantum-resistant cryptography. The study emphasizes the need for cryptographic agility, post-quantum authentication, and continuous behavioral validation mechanisms to mitigate persistent and quantum-enhanced MITM exploits. The findings highlight urgent requirements for international standardization and proactive implementation of post-quantum secure protocols in 5G infrastructures.
dc.identifier.citationKotukh Y. V. Evolution of Man-in-the-Middle attacks in 5G telecommunication systems / Y. V. Kotukh, G. Z. Khalimov, I. Y. Dzhura // Radiotekhnika : All-Ukr. Sci. Interdep. Mag. – 2025. – №222. – P. 98–107. – DOI: 10.30837/rt.2025.3.222.09.
dc.identifier.doihttps://doi.org/10.30837/rt.2025.3.222.09
dc.identifier.urihttps://openarchive.nure.ua/handle/document/34367
dc.language.isoen_US
dc.publisherХНУРЕ
dc.subject5G telecommunication systems
dc.subjectquantum computing
dc.subjectMITM attacks
dc.subjectDigital Twin
dc.subjectpost-quantum cryptography
dc.subject5G-AKA
dc.subjectnetwork slicing
dc.titleEvolution of Man-in-the-Middle attacks in 5G telecommunication systems
dc.typeArticle
dspace.entity.typePublication

Файли

Оригінальний пакунок

Зараз показано 1 - 1 з 1
Завантаження...
Зображення мініатюри
Назва:
BIT_RT_2025_N222_98-107.pdf
Розмір:
318.61 KB
Формат:
Adobe Portable Document Format

Пакунок ліцензії

Зараз показано 1 - 1 з 1
Завантаження...
Зображення мініатюри
Назва:
license.txt
Розмір:
10.74 KB
Формат:
Item-specific license agreed upon to submission
Опис: