As 5G emerges as a backbone of many military systems and missions it is critical to ensure network integrity. Many DoD missions, including those in an expeditionary environment require the use of an already existing 5G network that may not be deployed and managed by the United States. Therefore, a light-weight portable system that can verify the integrity of a third party 5G network is needed. We propose a two-faceted approach to assess both security and vulnerabilities of the 5G network. The first part obtains security configuration parameters including and beyond the physical layer (PHY) to assess the types of security and authentication employed by the 5G network. This is implemented with a 5G modem connecting to the network as a UE and receiving configuration parameters through the initial attach as well as subsequent communication. The second part delivers known exploits against the network and measures network resilience to produce a vulnerability assessment. This is implemented with a base station unit as well as a Software Defined Radio (SDR) functioning as an arbitrary waveform generator to carry out jamming, denial-of-service, man-in-the-middle and fuzzing attacks.
Benefit: We have experience Transitioning and Commercializing our technology: In the last 10 years, we have won 5 Phase III contracts with over $185M in ceiling. Additionally, we have received nearly $45M in additional investment and sales from SBIRs which has resulted in an increased workforce from 42 to over 100 employees and expanding our office locations from 3 to 7. We have been researching communication signals for over 20 years, providing capability to operational users as well as support and sustainment of fielded system enabling 3G and 4G communications signals intelligence. We are currently working with Air Force customer to build and enhance their 5G capabilities. Anticipated
Benefits: Black River Systems will develop concepts, algorithms, and the accompanying system needed to exploit 5G end user devices and its supporting infrastructure. At the end of Phase I, we will have an innovative proof of concept vulnerability detection reporting capability evaluated though modeling, simulation, emulation, and possible closed 5G network exploration. Over the course of the Phase II, we will iteratively design and test a fieldable prototype which will illustrate the ability of this system to work in a real-world setting (TRL 6). During this phase we will explore algorithm improvements, different employment strategies, and variations in CONOPS to fine tune the efficiency and effectiveness of this system. In Phase III this technology will be matured for field operation. Our strategy for commercialization is to share our research and development, starting in its infancy, with our Air Force, Army, and Navy customers and mature it to present a proof of concept to showcase the resultant demonstration. This will enable our customer to continue maturation and transition through a Phase III initiative. Then we will investigate and pursue ventures into the commercial marketplace to integrate a commercial capability to support the defense and protection of commercial 5G networks including internet of things (IoT). Potential Commercial Application and Market Size: 5G networks over the next several years will become the predominant cellular wireless networks available and with the increased capability will dominate the air waves. The potential marked size for this capability is extremely large as Manufacturing, Medical, Agriculture, Transportation, Infrastructure, industries including consumers (wearables, phones, light bulbs, thermostats, outlets, cars, etc.) adopt IoT technology. A capability that measures and determine the vulnerabilities of a 5G network work would have large potential in both government and commercial markets. This will not only enable our forces to analyze and possibly exploit adversary networks but also allow the U.S. and our allies to analyze our own 5G networks for potential vulnerabilities.
Keywords: Vulnerability Assessment, Vulnerability Assessment, 3GPP 5G NR, Expeditionary Environment, 5g Network Evaluation, Network Security Analysis, Resilience Verification, 5G, Third Party Network Evaluation