{"id":"https://openalex.org/W4410228925","doi":"https://doi.org/10.1109/wcnc61545.2025.10978705","title":"A Novel 5G Key Reinstallation Attack and Defensive Strategies","display_name":"A Novel 5G Key Reinstallation Attack and Defensive Strategies","publication_year":2025,"publication_date":"2025-03-24","ids":{"openalex":"https://openalex.org/W4410228925","doi":"https://doi.org/10.1109/wcnc61545.2025.10978705"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc61545.2025.10978705","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc61545.2025.10978705","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055937983","display_name":"Wei Fan","orcid":"https://orcid.org/0000-0003-3786-7719"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Fan","raw_affiliation_strings":["Institute of Information Engineering Chinese Academy of Sciences,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020497752","display_name":"Bingnan Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bingnan Shi","raw_affiliation_strings":["Institute of Information Engineering Chinese Academy of Sciences,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007046565","display_name":"Cheng Peng","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cheng Peng","raw_affiliation_strings":["Institute of Information Engineering Chinese Academy of Sciences,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5055937983"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10404116,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9815000295639038,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9815000295639038,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9689000248908997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14282","display_name":"Security, Politics, and Digital Transformation","score":0.9140999913215637,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7352840900421143},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5415629744529724},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5124238133430481}],"concepts":[{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7352840900421143},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5415629744529724},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5124238133430481}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcnc61545.2025.10978705","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc61545.2025.10978705","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1995875735","https://openalex.org/W2767098552","https://openalex.org/W3118818495","https://openalex.org/W3176721475","https://openalex.org/W4200017400","https://openalex.org/W4287122280","https://openalex.org/W4288057103","https://openalex.org/W4384916707","https://openalex.org/W4385080324","https://openalex.org/W4391724816","https://openalex.org/W4397000133","https://openalex.org/W6776723563"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"In":[0,105],"recent":[1],"years,":[2],"fifth-generation":[3],"(5G)":[4],"technology,":[5,11],"as":[6],"the":[7,17,22,63,94,100,108,114,122,173,176,178,198,209,222],"latest":[8],"mobile":[9],"communication":[10],"has":[12],"gradually":[13],"matured":[14],"and":[15,49,143,162,171,189,196,216],"entered":[16],"commercialization":[18],"stage.":[19],"However,":[20],"with":[21],"increasing":[23],"number":[24],"of":[25,44,107,158,175,211,224],"attacks":[26],"against":[27,145],"5G":[28,45],"networks,":[29],"concerns":[30],"about":[31],"its":[32],"security":[33,110],"risks":[34,111],"have":[35,207],"been":[36],"raised.":[37],"This":[38,68],"paper":[39],"conducts":[40],"a":[41,51,71,128,137,182],"detailed":[42],"study":[43],"standalone":[46],"(SA)":[47],"networks":[48],"proposes":[50],"key":[52],"reinstallation":[53],"attack":[54,69,160,170],"named":[55,133],"NRetry":[56,115],"based":[57,135],"on":[58,136],"two":[59],"vulnerabilities":[60],"identified":[61,123],"in":[62,213],"Non-Access":[64],"Stratum":[65],"(NAS)":[66],"layer.":[67],"leverages":[70],"man-in-the-middle":[72],"(MitM)":[73],"device":[74],"to":[75,82,92,141,185,194,220],"trigger":[76],"keystream":[77],"reuse,":[78],"allowing":[79],"encrypted":[80,90],"messages":[81,91,188],"be":[83],"decrypted.":[84],"The":[85,148],"attacker":[86],"can":[87],"even":[88],"forge":[89],"deceive":[93],"core":[95,129],"network":[96,130],"into":[97,152],"incorrectly":[98],"handling":[99],"user":[101],"equipment":[102],"(UE)":[103],"state.":[104],"light":[106],"significant":[109],"posed":[112],"by":[113],"attack,":[116],"we":[117,126],"propose":[118],"corresponding":[119,164],"remedies":[120],"for":[121],"vulnerabilities.":[124],"Additionally,":[125],"introduce":[127],"defense":[131,183],"system":[132,149,179],"DDS,":[134],"state":[138],"machine":[139],"model,":[140],"detect":[142],"defend":[144],"such":[146],"attacks.":[147],"is":[150],"divided":[151],"three":[153],"modules,":[154],"highly":[155],"configurable,":[156],"capable":[157],"extracting":[159],"signatures,":[161],"setting":[163],"detection":[165],"thresholds.":[166],"Upon":[167],"detecting":[168],"an":[169],"verifying":[172],"authenticity":[174],"alert,":[177],"quickly":[180],"activates":[181],"module":[184],"reject":[186],"suspicious":[187],"employs":[190],"bidirectional":[191],"positioning":[192],"technology":[193],"identify":[195],"block":[197],"attacker's":[199],"MitM":[200],"device,":[201],"thereby":[202],"preventing":[203],"further":[204],"damage.":[205],"We":[206],"validated":[208],"effectiveness":[210],"DDS":[212],"real-world":[214],"scenarios":[215],"conducted":[217],"horizontal":[218],"comparisons":[219],"demonstrate":[221],"advantages":[223],"our":[225],"approach.":[226]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
