{"id":"https://openalex.org/W4405103894","doi":"https://doi.org/10.1109/milcom61039.2024.10773741","title":"NReplay: 5G Key Reinstallation Attack Based on NAS Layer Vulnerabilities","display_name":"NReplay: 5G Key Reinstallation Attack Based on NAS Layer Vulnerabilities","publication_year":2024,"publication_date":"2024-10-28","ids":{"openalex":"https://openalex.org/W4405103894","doi":"https://doi.org/10.1109/milcom61039.2024.10773741"},"language":"en","primary_location":{"id":"doi:10.1109/milcom61039.2024.10773741","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom61039.2024.10773741","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2024 - 2024 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055937983","display_name":"Wei Fan","orcid":"https://orcid.org/0000-0003-3786-7719"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Fan","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020497752","display_name":"Bingnan Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bingnan Shi","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007046565","display_name":"Cheng Peng","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cheng Peng","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5055937983"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":1.0638,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.78963137,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1088","last_page":"1093"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9728000164031982,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9728000164031982,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14282","display_name":"Security, Politics, and Digital Transformation","score":0.9650999903678894,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9645000100135803,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6367116570472717},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6125580072402954},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5500190258026123},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.5313898324966431}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6367116570472717},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6125580072402954},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5500190258026123},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.5313898324966431},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom61039.2024.10773741","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom61039.2024.10773741","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2024 - 2024 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.5099999904632568,"display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1995875735","https://openalex.org/W2767098552","https://openalex.org/W3046861256","https://openalex.org/W3118818495","https://openalex.org/W3176721475","https://openalex.org/W3195796154","https://openalex.org/W4200017400","https://openalex.org/W4284879254","https://openalex.org/W4287122280","https://openalex.org/W4294767953","https://openalex.org/W4296437989","https://openalex.org/W4384916707","https://openalex.org/W4385080324","https://openalex.org/W4385310508","https://openalex.org/W6776723563"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"With":[0],"the":[1,33,50,74,78,87,99,102,106,111,138],"rapid":[2],"development":[3],"of":[4,55,101,113,143],"5G":[5,34,107,116,144],"communication,":[6],"it":[7,91],"has":[8,19],"been":[9],"widely":[10],"applied":[11],"by":[12],"users":[13],"in":[14,77,98,115],"multiple":[15],"fields.":[16],"However,":[17],"this":[18],"led":[20],"to":[21,42,49,61,85,92,136],"concerns":[22],"about":[23],"security":[24,54,141],"and":[25,52,89],"privacy.":[26],"This":[27],"paper":[28],"identifies":[29],"two":[30],"vulnerabilities":[31],"within":[32],"non-access":[35],"stratum":[36],"(NAS)":[37],"layer,":[38,81],"which":[39],"could":[40],"lead":[41],"key":[43,67],"reinstallation":[44,68],"attacks,":[45],"posing":[46],"significant":[47],"risks":[48],"privacy":[51],"communication":[53,128],"user":[56],"equipment":[57],"(UE).":[58],"In":[59],"response":[60],"these":[62],"vulnerabilities,":[63],"we":[64,82,131],"design":[65],"a":[66],"attack":[69,121],"called":[70],"NReplay.":[71],"By":[72],"coercing":[73],"counter":[75],"reset":[76],"UE's":[79],"NAS":[80],"are":[83],"able":[84],"reconstruct":[86],"keystream":[88],"utilize":[90],"forge":[93],"encrypted":[94],"mess-ages,":[95],"ultimately":[96],"resulting":[97],"deregistration":[100],"victim":[103],"UE":[104],"from":[105],"network.":[108],"We":[109],"validate":[110],"feasibility":[112],"NReplay":[114],"Standalone":[117],"(SA)":[118],"network":[119],"through":[120],"experiments":[122],"con-ducted":[123],"on":[124],"three":[125],"major":[126],"mobile":[127],"operators.":[129],"Additionally,":[130],"propose":[132],"corresponding":[133],"defense":[134],"measures":[135],"enhance":[137],"overall":[139],"encryption":[140],"system":[142],"air":[145],"interface.":[146]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
