Professional Documents
Culture Documents
2404.15076v1
2404.15076v1
2404.15076v1
© 2024 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including
reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, 1
or reuse of any copyrighted component of this work in other works.
✦
arXiv:2404.15076v1 [eess.SY] 23 Apr 2024
Abstract—The next generation of cellular networks will be character- Near-RT Sec 2: Sec 3: Sec 4 & 5: Sec 6:
ized by openness, intelligence, virtualization, and distributed computing. RIC Background Platforms Results Cost of
The Open Radio Access Network (Open RAN) framework represents Security
• 2.1 Principles: • E2 Interface • E2 Interface Framework
a significant leap toward realizing these ideals, with prototype deploy-
E2
• Disaggregation • 3.1 Environment • 4.1 SACK
• Virtualization • 3.2 Experiments Latency
ments taking place in both academic and industrial domains. While • RIC
• 6.1 Sufficient
• 4.2 Packet Size Compute
it holds the potential to disrupt the established vendor lock-ins, Open • Open Interfaces
Latency
CU Resources
RAN’s disaggregated nature raises critical security concerns. Safe- • 4.3 Throughput
guarding data and securing interfaces must be integral to Open RAN’s • 6.2 Specific
DU • 2.2 Network Encryption
design, demanding meticulous analysis of cost/benefit tradeoffs. Security • Open Fronthaul • Open Fronthaul Algorithm
In this paper, we embark on the first comprehensive investigation • 5.1 Packet Size
Fronthaul
• 3.3 Environment
Latency • 6.3 IO
Open
into the impact of encryption on two pivotal Open RAN interfaces: the • 3.4 Experiments
• 2.3 Network • 5.2 Throughput Bottlenecks
E2 interface, connecting the base station with a near-real-time RAN Delays & Latency
Intelligent Controller, and the Open Fronthaul, connecting the Radio • 5.3 MTU Size • 6.4 MTU Size
Unit to the Distributed Unit. Our study leverages a full-stack O-RAN RU .pcap
best practices and identifying threats and their countermea- 2) Interfaces Enabling gNB Disaggregation: The second
sures [4–6, 11–13]. For example, O-RAN WG11: Security Work category encompasses interfaces that are essential for sup-
Group has developed an extensive threat analysis for O- porting the disaggregation of gNBs. One of the key inter-
RAN systems and recommendations to secure them. More faces within this category is the Open Fronthaul interface for
specifically, O-RAN WG3: The Near-Real-Time RIC and E2 the 7.2 split of the 3GPP stack. This interface—defined by the
Interface Work Group is working on identifying threats and O-RAN ALLIANCE—serves as a critical link between the
guidance to secure the E2 open interface with confidential- Radio Unit (RU) and the DU, managing the transmission of
ity, integrity, replay protection, and data origin authentica- time-sensitive data in substantial volumes, such as In-phase
tion mechanisms [12]. In contrast, at the time of writing, and Quadrature (IQ) samples. For this class, we examine the
the widely adopted Open Fronthaul interface O-RAN stan- cost of securing the Open Fronthaul interface with MACsec.
dards call for no encryption mechanism because of the high The main contributions of our work are as follows:
bandwidth and strict latency requirements. Nonetheless,
there are works in the literature that suggest using Media • We conduct the first-ever experimental analysis of adding
Access Control Security (MACsec) for this interface [8, 14]. O-RAN-compliant encryption to the O-RAN E2 and Open
MACsec can be used to prevent a host of threats to this Fronthaul interfaces using Colosseum and a private 5G O-
interface, including: inserting traffic, network intrusion, and RAN-compliant testbed. Specifically, we extend our previ-
man-in-the-middle attacks. However, prior work does not ous study [20] that analyzes the impact of adding security
consider an actual implementation of MACsec for the Open to the E2 interface with IPsec and report, for the first time,
Fronthaul nor analyze its overhead cost. an experimental analysis of the effects of adding security
Motivation. Although the examples above demonstrate with MACsec to the O-RAN Open Fronthaul interface.
• We showcase the validity of our results through live
traction and desire to make O-RAN secure by addressing
a variety of threats, to the best of our knowledge there has experimentation that sheds light into the performance of O-
been no systematic study to identify and measure the cost RAN interfaces when the proposed security measures are
that security has on O-RAN open interfaces. It is vital that deployed. Additionally, we validate at-scale a theoretical
an informed and risk-based approach is taken to adequately framework for calculating the total network delay when
address security concerns in O-RAN, while recognizing that adding security protocols to distributed functional units. We
any method for enhancing security, such as adding encryp- extend these results by developing a general framework for
tion, comes at a performance cost [11]. Our goal in this paper understanding the cost of encryption in O-RAN with the
is to (i) understand if such a cost is tolerable (motivating goal of enabling researchers and engineers to build secure-
a rapid adoption of security protocols that can be used by-design O-RAN systems.
• We develop two separate O-RAN emulation environ-
without impacting performance and normal operations of
the network); and (ii) identify which elements contribute ments and will publicly release the set of tools and datasets
the most to such costs informing system architects on how used to analyze the impact of adding security to Open
to design security systems for O-RAN that are practical and Interfaces upon acceptance of this paper.
• We derive insights and identify four key principles that
sustainable.
To derive practical insights, it is essential for security system designers should be aware of to build future O-
studies to rely on empirical data obtained from the ex- RAN systems that are secure by design. These principles are:
ecution of security algorithms on O-RAN hardware and sufficient compute resources must be provisioned, specific
software components. This approach enables accurate mea- protocol implementations and encryption algorithms matter
surement of how security mechanisms impact resource uti- greatly, user space and kernel space I/O bottlenecks must be
lization, processing latency, and data rates. For this reason, addressed, and the network Maximum Transmission Unit
we leverage the broad and public availability of O-RAN (MTU) size should be optimized.
testbeds [15–19] to thoroughly test and analyze the effects of The rest of the paper’s organization is shown in Fig. 1.
encryption on a variety of O-RAN interfaces. We distinguish Section 2 gives a brief overview of key O-RAN principles.
between two primary categories of interfaces within our Section 3 describes our emulation environments. Our exper-
study, offering specific examples of each to provide a clear imental procedures and results are detailed in Section 4 for
framework for our analysis. This approach allows us to the E2 interface and in Section 5 for the Open Fronthaul
delve into the unique characteristics and requirements of interface. We provide additional analysis of our results in
each interface type, aiding in a more precise evaluation of Section 6 and conclude the paper in Section 7.
the impact of security measures.
1) RIC Data Interfaces: This category comprises interfaces
that the RICs utilize for both receiving and transmitting 2 BACKGROUND
data. The O-RAN architecture features two RICs, executing
control loops with a near-real-time scale (10 ms to 1 s) and The goal of this section is to provide background that
a non-real-time scale (beyond 1 s). Notable examples of will be useful later, when we delve into the details of the
interfaces for the RICs include E2, O1, and A1. For our anal- security assessment study. We first provide a brief overview
ysis, we specifically focus on the impact of adding Internet of O-RAN shown in Fig. 2, and its foundational principles
Protocol security (IPsec) to the E2 interface by extending our (Sec. 2.1), and then introduce network security protocols
prior works and findings in [7, 20], as it plays a pivotal role that will be used in this work (Sec. 2.2). Finally, we give an
in facilitating the exchange of packets between the near-RT overview of the types of delay in packet switched networks
RIC and the Central Units (CUs)/Distributed Units (DUs). (Sec. 2.3).
3
Service Management and Orchestration Fig. 2, the near-RT RIC interfaces with the CUs and DUs of
the distributed gNBs. On the contrary, since the non-RT RIC
Non-RT RIC rApp
operates with latency timescales of 1s or greater, the cost of
A1 securing it (in terms of overhead and latency) is incremental
UE Near-RT RIC and marginal.
UE UE xApp 1 xApp N • Open Interfaces: While decoupling hardware and soft-
E2 O1 ware creates an open environment for faster development, it
also introduces the need for interoperable interfaces. These
data over the E2 interface and handles control loops on TABLE 1: O-RAN Interface security functions (C: Confiden-
a time scale between 10 ms and 1 s, using plug-and-play tiality; I: Integrity: A: Authentication; R: Replay protection)
components called xApps. The non-RT RIC collects data via and protocols specified by O-RAN ALLIANCE WGs 4, 5 &
the O1 interface and operates at time scales higher than 1 11.
second using rApps, and is embedded in the Service Man-
agement and Orchestration (SMO) framework. Although
both RICs play a vital role in the lifecycle management
of O-RAN systems, in this paper, we focus on the near- 2.2 Network Security Protocols
RT RIC only. The near-RT RIC is the most sensitive to There are many useful models to describe the set of network
latency and overhead introduced by security mechanisms security services. Here we focus on the four functions used
due to its stringent operational time scale and its tight by O-RAN ALLIANCE WG 11: Confidentiality, Integrity, Au-
coordination with controlled gNBs. Indeed, as illustrated in thentication, and Replay Protection. Confidentiality ensures
4
the payload of the message cannot be read while the data is devices connected over physical ports and no other security
in transit. Integrity guarantees the content of the message functions.
is not changed in transit. Authentication, in this context, One of the primary differences between all these proto-
guarantees the endpoints of a conversation are who they say cols is the way in which SAs are established. However, this
they are. Finally, Replay Protection ensures a pre-recorded happens infrequently; for TLS and IPsec by default the SAs
message cannot be sent as a new message in the future. expire after 8 hours, and for MACsec the SA expires after
There are a wide range of protocols used to provide these 1 hour. While this re-authentication time is configurable,
network security functions at various layers of the network the default values used in the majority of applications, on
protocol stack. In this paper, we consider: Transport Layer the order of a few hours, are considered secure. It should
Security (TLS), which operates at the transport layer, IPsec, be noted that very frequent (on the order of seconds) re-
which operates at the network layer, and MACsec, which authentication greatly reduces throughput. Additionally, all
operates at the data link layer. While each protocol can three protocols allow re-authentication before the current
provide similar general security functions, there are also SA expires, guaranteeing continuous operation. Because this
distinctions among them. establishment happens very infrequently, it has a negligible
TLS [27] is a widely used transport layer security pro- impact on overhead and resource utilization. For this reason,
tocol that provides authentication during the initial hand- we do not deeply analyze the initial handshake or SA
shake process, and offers confidentiality by using a suite of establishment in this article. On the other hand, there are
algorithms to encrypt the transport layer payload. TLS also numerous differences in the encryption algorithms used and
provides integrity and replay protection through the use of security services provided which, as we will show, have a
a message authentication code to prevent replay attacks. significant impact on performance and resource utilization.
Newer releases of TLS (e.g., TLS 1.3) have faster Security
Association (SA) establishment when compared to previous 2.3 The Latency Cost of Security
versions of TLS and IPsec. After the initial SA is established,
TLS adds about 25-40 Bytes of overhead to each packet. To properly evaluate how security impacts network perfor-
IPsec works at the network layer and offers several mance, it is important first to understand how the different
modes of operation. The primary security modes are Au- security mechanisms affect the way data flows through the
thentication Header (AH) [28], which provides integrity, network. Specifically, since security adds overhead (both in
authentication, and replay attack protection; and Encap- terms of data and procedures), we need to establish a model
sulating Security Payload (ESP) [29], which additionally that captures the effect that security has on total delay. In
provides encryption. In practice, ESP is almost exclusively packet-switched networks, there are four primary sources
used and the O-RAN ALLIANCE has mandated its use. of delay at each node along the path: queuing delay (Dque ),
IPsec can also operate in either transport or tunnel mode. propagation delay (Dprop ), transmission delay (Dtrans ), and
Tunnel mode creates a new Internet Protocol (IP) header for nodal processing delay (Dproc ) [33]. The total delay can be
each packet and protects the integrity of both the data and expressed as
the original IP header [30]. On the contrary, transport mode Dtotal = Dque + Dprop + Dtrans + Dproc . (1)
only secures the network layer payload. O-RAN specifica-
tions mandate the support of tunnel mode, while support • Queuing Delay: This delay considers the duration that
for transport mode is optional. Even though IPsec uses packets spend in the processing queue at each interface
a slightly different handshake to establish SAs compared along the end-to-end path. In our test environment, there
to TLS, it still offers all the same security functions and is almost no competing traffic, allowing us to safely assume
utilizes the same cryptographic functions as TLS after the Dque = 0. In more complex networks, this assumption may
SA is established. When using ESP and tunnel mode, IPsec not hold.
adds at least 57 Bytes of overhead to each packet. However, To analyze queuing delay further, we model the network
in practice this is often higher because the cryptographic nodes using an M/M/1 queue with packet arrivals forming
functions are block ciphers, requiring a fixed-size input. a Poisson process. Then the average queuing delay is given
1
MACsec [31], is used for securing point-to-point con- by Dque = µ−λ − µ1 where λ is the traffic arrival rate and µ
nections at the data link layer. MACsec offers two modes: is the queue service rate. The difference between unsecured
encryption on or off. Both modes provide integrity, re- or Plain Text (PT) and secured or Cipher Text (CT) delays
play protection, and authentication, but only the encryp- depends on the overhead added by encryption, denoted
tion on mode offers confidentiality. Unlike TLS and IPsec, as ϵ. The value of ϵ is protocol-specific, but typically falls
the MACsec standard specifies a single cryptographic within the range of 60 Bytes (480 bits) or less. The difference
1 1
algorithm, AES128-GCM, though implementations using in queuing delay is given by ∆Dque = µ−(λ+ϵ) − µ−λ . When
AES256-GCM are available. MACsec adds a fixed 32-byte µ − λ ≫ ϵ, the approximation ∆Dque ≈ 0 is valid. Even in
header to all packets. However, similar to the other encryp- significantly more congested networks, the queuing delay
tion protocols, MACsec uses AES for confidentiality, which remains largely unaffected by the presence or absence of
is a block cipher. Therefore, when encryption is enabled the encryption. To illustrate, in our network supporting µ = 10
overhead may be larger than 32 Bytes. Another security pro- Gbps speeds, this approximation holds (i.e., ∆Dque ≤ 1 µs)
tocol that operates at the data link layer is IEEE 802.1x [32], when the arrival rate λ ≤ 9.78 Gbps.
which provides a standard for port-based authentication on • Propagation Delay: The propagation delay is strictly a
Local Area Networks (LANs). 802.1x only provides periodic function of the physical length and propagation speed of
authentication (a common default is every 60 minutes) of the link. The propagation speed depends on the link type
5
but is typically on the order of 2 × 108 m/s [33]. For our We utilize the srsRAN-based SCOPE [17] framework to
environment, we assume a length of 100m giving Dprop = implement a softwarized RAN for both the gNB and mul-
0.05 µs. This will change for other systems but will remain tiple User Equipments (UEs). SCOPE extends srsLTE (now
constant regardless of encryption. srsRAN) version 20.04 by adding an E2 interface, several
• Transmission Delay: The transmission delay is a function open APIs to facilitate run-time reconfiguration of the gNB,
of the packet size (in bits), L, and the link transmission and additional data collection tools. We utilize the ColO-
rate, R, which is defined as Dtrans = L/R. For any given RAN [18] framework for the near-RT RIC implementation.
system, R is fixed but L will increase with encryption. ColO-RAN offers a minimal version of the O-RAN Software
Table 2 lists the calculated transmission delays, with and Community (OSC) near-RT RIC (Bronze release) tailored to
without encryption, based on the average packet length of execute on Colosseum via an LXC-packaged set of Docker
the three types of packets we observe and describe in detail containers. In particular, it provides an E2 interface imple-
in Sec. 3.1.1. mentation compliant with O-RAN specifications that can be
Packet Type Plain Text Cypher Text
used to interface with the RAN nodes for data collection and
control. ColO-RAN also offers an extensible xApp template
SACK 62 B : 0.0496µs 138 B : 0.1104µs
Short E2AP 195 B : 0.1560µs 255 B : 0.2040µs that collects basic Key Performance Metrics (KPMs) from
Long E2AP 1425 B : 1.140µs 1485 B : 1.188µs the gNB and can send control actions to it.
To secure the E2 interface, we add the strongSwan [34]
TABLE 2: Calculated transmission delay for 3 types of open source IPsec-based VPN to both the SCOPE and ColO-
packets with and without encryption. RAN LXCs. The full IPsec configuration is described in para-
graph 3.1.1. We also add several simple scripts to automate
• Processing Delay: Typically, this is defined as the time data collection on E2 interface performance which we make
required for intermediate nodes to inspect the packet header open source for public use and further research.
and determine the appropriate path for the packet, whether
at layer 2 for switching or layer 3 for routing. This time
can also encompass other factors, such as bit-level error- Slice A
checking [33]. It’s important to note that while the fronthaul Near-RT
network is expected to function as a pure layer-2 network E2 Slice B
RIC
(i.e., no routing involved), the E2 interface can be deployed
over a layer-3 network, necessitating routing at certain in- gNB Slice C
termediate nodes.
In our analysis, we include the encryption delay within Fig. 3: O-RAN testbed used to study security in the E2
the processing delay, as the cryptographic functions are interface, consisting of three UEs, a gNB, and the near-RT
integral to passing the payload to lower or higher layers RIC. Each component is implemented in an LXC on top of
in the network stack. Notably, this encryption delay occurs an SRN within Colosseum.
only at the sending and receiving nodes. Intermediate nodes
do not need to engage in cryptographic operations because
the Ethernet and IP headers are sent in PT. 3.1.1 E2 Experimental Setup
Our experimental system (see Fig. 3) is composed of up
3 O-RAN S ECURITY E VALUATION P LATFORMS to twelve blocks: 10 UEs, a gNB, and the near-RT RIC.
Each block is implemented through LXC on separate SRNs.
In this section, we describe the interface security evaluation
The UEs are connected to the gNB over an emulated
RF channelRU
platforms we used in this work. Specifically, the E2 interface .pcap
where each UE is assigned to one of three
implementation is illustrated in Sec. 3.1, and the Open
unique slices representing the three main use cases for 5G:
Fronthaul interface implementation is described in Sec. 3.2.
enhanced Mobile Brodband (eMMB), Ultra Reliable Low
The results obtained on both platforms will be presented in
Latency Communications (URLLC), and massive Machine
Secs. 4 and 5.
Type Communications (mMTC) [35]. Each slice has its own
traffic pattern generated from real world 5G traffic traces
3.1 E2 Interface as described in [36]. First, we use a variety of applications
We extensively use Colosseum [15], the world’s largest to generate traffic for each network slice. For eMBB, we
wireless network emulator with hardware in-the-loop, to stream videos, browse the Internet, and transfer large files.
evaluate the E2 interface. Colosseum supports experimental For URLLC, we conduct both voice phone calls, video chat,
research through virtualized protocol stacks, enabling users and utilize real time AR applications. For mMTC we capture
to test full-protocol solutions at scale, with real hardware de- texts and background traffic from all apps when the phone
vices, in realistic emulated RF environments with complex is not actively being used. This is not the typical example
channel interactions. The key building blocks for deploying of mMTC traffic, such as IoT applications. However, it does
full protocol stacks are 128 Standard Radio Nodes (SRNs). fit nicely in the fundamental definition of mMTC because
Each SRN consists of a 48-core Intel Xeon E5-2650 CPU with it is low throughput, latency tolerant communication from
an NVIDIA Tesla k40m GPU connected to a USRP X310 numerous applications. Next, we built a traffic generator
Software-defined Radio (SDR). Users can instantiate custom tool to replay the traffic between the UE and gNB. The traffic
protocol stacks by deploying Linux Containers (LXCs) on generator emulates the original traffic by reading the length
the bare-metal SRNs. field for each packet and sending a random byte string of
6
4 E2 E XPERIMENTAL R ESULTS
Fig. 7: CDF of Open Fronthaul packet length, highlighting
the three types of packets observed: C-plane, U-plane with 4.1 SACK Analysis
PRB 0-11, and U-plane with all PRBs. Fig. 8 shows the distribution of delay times for both PT
and CT SACKs. It is immediately clear that encryption
adds approximately 22 µs of delay on average. However,
Specifically, we leverage a private 5G network deployed it is essential for O-RAN researchers, engineers, and system
at Northeastern University (part of the X-Mili project) [19], architects to fully understand both the cause and the impact
including 8 ARC nodes with a dedicated Core Network of any extra overhead.
(CN) and fronthaul infrastructure. The fronthaul infras-
tructure features a Dell S5248F-ON switch, with a Qulsar
QG-2 acting as a grandmaster clock. The latter distributes
Precision Time Protocol (PTP) and SyncE synchronization
to the DU and the RU. In our setup, the RU is a Foxconn
4T4R unit operating in the 3.7 − 3.8 GHz band, and we
use Commercial Off-the-Shelf (COTS) 5G UEs from OnePlus
(AC Nord 2003) [42].
While the code base for the DU is open and potentially
extensible to embed MACsec, the RU comes with a closed-
source FPGA-based termination for the fronthaul interface.
This prevents us from directly enabling MACsec in our Fig. 8: SACK delay distribution with and without encryp-
Open Fronthaul environment. Therefore, we adopt a trace- tion.
based approach and configure a port of the fronthaul switch
to mirror the fronthaul traffic to a server running a packet The SACK packet is ideal for an initial analysis because
capture. We built an emulation environment in our lab using the packet size is fixed (PT=62 B, CT=138 B) and the total de-
two desktop computers with Intel i9-13900K CPUs with lay we observe in our experiments is very tightly grouped,
NVIDIA Mellanox ConnectX-4 Lx NICs directly connected as seen in Fig. 8. The total average delay we observe for the
over a 10 Gbps Ethernet link. We leverage a Python script PT SACK is 61.12 µs, while the CT SACK is 82.64 µs. From
to re-play the original pcap file captured on the real Open Fig. 4, we can see that the total delay for a SACK can be
SACK
Fronthaul. In this way, we can properly emulate the original expressed as Dtotal = 2 × Dprop + Dtrans + Dproc . Given
Open Fronthaul capture and observe the impact of adding the total delay, the transmission delays in Table 2, and the
any encryption. The Linux kernel natively supports MAC- calculated propagation delay (Sec. 2.3), we can calculate the
sec. We use the Ubuntu commands provided in documenta- average processing delay; for the PT SACK it is 60.97 µs
tion [43] to configure MACsec. while the CT SACK is 82.64 µs. In Colosseum, encryption
on the E2 link adds approximately 22 µs of delay to small
packets. However, the near-RT RIC is designed to operate
3.2.1 Open Fronthaul Experimental Setup
on scales from 10 ms to 1 s. These results show that for the
We capture all the traffic traversing our Open Fronthaul E2 Interface, with low traffic load (≤ 200kbps) and small
described in Sec. 3.2 for over 20 minutes for several dif- packets (≤ 138B ), encryption has no meaningful impact
ferent traffic loads. In our environment, the Open Fronthaul on E2 interface traffic.
uses the eCPRI protocol to send both C-plane and U-plane
messages. There are two network options to use eCPRI; the
first uses the full network stack (UDP over IP), while the 4.2 Packet Size Analysis
second is designed for point-to-point networks and only Our initial results examining the SACK over the E2 interface
uses the MAC layer. Our system is the second; our traffic (Sec. 4.1) show that the processing delay accounts for at least
only contains an Ethernet header with the eCPRI header 99.75% of the total delay for the 62 Byte SACK, regardless
and payload. While eCPRI supports payloads of up to 8192 of encryption. In other words, the delay for short packets
Bytes, we consistently observe a maximum frame length of is dominated by the processing delay. Given the calculated
7678 Bytes on the wire as shown in Fig. 7. propagation and transmission delays, it is likely that pro-
Currently, the O-RAN ALLIANCE specifications do not cessing delay dominates in equation (1) for larger packets
call for any security on the Open Fronthaul (C, U, S) planes. as well. However, since it is not possible to know the exact
However, there are known vulnerabilities to not securing start times for transmitting the long X2AP packets based
the Open Fronthaul [9, 10]. For this reason, there is a on the traces (and we do not have any SACK for the Open
8
Fig. 9: Processing delay as a function of packet size for PT Fig. 10: Measured throughput and CPU utilization (in blue)
and CT traffic over the E2 Interface. as a function of attempted transmission rate for CT traffic
(IPsec) over the E2 Interface while using AES256-CBC.
Fig. 11: Processing delay as a function of packet size over Fig. 12: Actual CT throughput (red) and CPU utiliza-
the Open Fronthaul. tion (blue) for different attempted transmission rates using
MACsec.
Fig. 13: Open Fronthaul processing delay as a function of Fig. 14: MTU size impacts throughput (red) and delay (blue)
attempted transmission rate. in our deployed system using MACsec with encryption. A
larger MTU provides better performance.
MTU size for the distributed RU and DU. [7] J. Groen, S. D’Oro, U. Demir, L. Bonati, M. Polese, T. Melodia,
and K. Chowdhury, “Implementing and Evaluating Security in
O-RAN: Interfaces, Intelligence, and Platforms,” arXiv preprint
arXiv:2304.11125, 2023.
7 C ONCLUSIONS [8] J. Y. Cho and A. Sergeev, “Secure Open Fronthaul Interface for
5G stands as a critical strategic technology, offering en- 5G Networks,” in Proceedings of the 16th International Conference on
Availability, Reliability and Security, ser. ARES 21. New York, NY,
hanced performance and data-driven intelligent capabilities USA: Association for Computing Machinery, 2021.
[13]. O-RAN, driven by its open interfaces and adaptable [9] W. Tiberti, E. Di Fina, A. Marotta, and D. Cassioli, “Impact of Man-
RICs, plays a pivotal role in harnessing these capabilities. It in-the-Middle Attacks to the O-RAN Inter-Controllers Interface,”
in 2022 IEEE Future Networks World Forum (FNWF), 2022, pp. 367–
empowers the customization of radio resource management 372.
through powerful ML-driven xApps/rApps while exposing [10] S.-H. Liao, C.-W. Lin, F. A. Bimo, and R.-G. Cheng, “Development
valuable telemetry. Given the paramount importance of of C-Plane DoS Attacker for O-RAN FHI,” in Proceedings of the 28th
safeguarding O-RAN’s open links, this article conducts a Annual International Conference on Mobile Computing And Network-
ing, ser. MobiCom ’22, 2022, p. 850–852.
comprehensive experimental and theoretical analysis of the [11] J. Boswell and S. Poretsky, “Security considerations of Open
E2 and Open Fronthaul interfaces, aligning with O-RAN RAN,” Stockholm: Ericsson, 2020.
specifications [12, 21, 23, 24, 26], using the world’s largest [12] O-RAN Working Group 3, “Near-Real-time RAN Intelligent
Controller Architecture & E2 General Aspects and Principles,”
emulator, Colosseum [15] and a private, 5G and O-RAN
ORAN.WG3.E2GAP-v02.02, Tech. Rep., July 2022.
compliant network. [13] D. of Defense, “5G Strategy Implementation Plan,” Department
We implement various security protocols (IPsec for E2, of Defense, Tech. Rep., December 2020, accessed: 2024-02-15.
MACsec for Open Fronthaul) and employ diverse encryp- [Online]. Available: https://apps.dtic.mil/sti/pdfs/AD1118833.
pdf
tion techniques to assess their impact on critical network [14] D. Dik and M. S. Berger, “Transport security considerations for
performance metrics. Our analysis covers key parameters the open-ran fronthaul,” in 2021 IEEE 4th 5G World Forum (5GWF),
like processing delay and throughput, accompanied by 2021, pp. 253–258.
[15] L. Bonati, P. Johari, M. Polese, S. D’Oro, S. Mohanti, M. Tehrani-
detailed quantitative insights. Notably, we find that the
Moayyed, D. Villa, S. Shrivastava, C. Tassie, K. Yoder et al., “Colos-
cost of securing O-RAN for the E2 interface remains low, seum: Large-scale wireless experimentation through hardware-in-
while MACsec is more likely to exert a significant impact the-loop network emulation,” in 2021 IEEE International Sympo-
on the Open Fronthaul interface. We conclude that system sium on Dynamic Spectrum Access Networks (DySPAN). IEEE, 2021,
pp. 105–113.
designers must ensure O-RAN disaggregated nodes possess [16] L. Bonati, M. Polese, S. D’Oro, S. Basagni, and T. Melodia, “Open-
sufficient computing resources, make judicious protocol and RAN Gym: An Open Toolbox for Data Collection and Experimen-
encryption algorithm selections, optimize I/O bottlenecks, tation with AI in O-RAN,” in 2022 IEEE Wireless Communications
and manage local MTU settings with an understanding of and Networking Conference (WCNC). IEEE, 2022, pp. 518–523.
[17] L. Bonati, S. D’Oro, S. Basagni, and T. Melodia, “SCOPE: An
the end-to-end network MTU. open and softwarized prototyping platform for NextG systems,”
Although significant progress has been made, there is in Proceedings of the 19th Annual International Conference on Mobile
still substantial work to fully comprehend O-RAN security Systems, Applications, and Services, 2021, pp. 415–426.
[18] M. Polese, L. Bonati, S. D’Oro, S. Basagni, and T. Melodia, “ColO-
and the associated costs. Ensuring security in a multi- RAN: Developing machine learning-based xApps for open RAN
vendor xApp environment is a largely open problem with closed-loop control on programmable experimental platforms,”
possible hidden expenses. One potential solution is adopt- IEEE Transactions on Mobile Computing, 2022.
ing a zero-trust approach [5, 13], which presents a promis- [19] D. Villa, I. Khan, F. Kaltenberger, N. Hedberg, R. S. da Silva,
A. Kelkar, C. Dick, S. Basagni, J. M. Jornet, T. Melodia, M. Polese,
ing framework but has yet to be implemented. Continued and D. Koutsonikolas, “An Open, Programmable, Multi-vendor
efforts are required to shape the future of secure O-RAN 5G O-RAN Testbed with NVIDIA ARC and OpenAirInterface,”
systems. 2023.
[20] J. Groen, B. Kim, and K. Chowdhury, “The Cost of Securing O-
RAN,” in IEEE International Conference on Communications (ICC),
2023.
R EFERENCES [21] O-RAN Working Group 4, “O-RAN Fronthaul Control, User and
[1] M. Polese, L. Bonati, S. D’oro, S. Basagni, and T. Melodia, “Under- Synchronization Plane Specification v12,” O-RAN.WG4.CUS.0-
standing O-RAN: Architecture, Interfaces, Algorithms, Security, R003-v12.00, Tech. Rep., June 2023.
and Research Challenges,” IEEE Communications Surveys & Tutori- [22] P. S. Upadhyaya, A. S. Abdalla, V. Marojevic, J. H. Reed, and V. K.
als, 2023. Shah, “Prototyping Next-Generation O-RAN Research Testbeds
[2] O-RAN Working Group 1, “O-RAN Architecture Description with SDRs,” arXiv preprint arXiv:2205.13178, 2022.
5.00,” ORAN.WG1.O-RAN-Architecture-Description-v05.00, Tech. [23] O-RAN Working Group 11, “Security Requirements Speci-
Rep., July 2021. fications,” O-RAN.WG11.Security-Requirements-Specification.O-
[3] J. Thaliath, S. Niknam, S. Singh, R. Banerji, N. Saxena, H. S. R003-v06.00, Tech. Rep., June 2023.
Dhillon, J. H. Reed, A. K. Bashir, A. Bhat, and A. Roy, “Predic- [24] ——, “Security Protocols Specifications,” ORAN.WG11.Security-
tive Closed-Loop Service Automation in O-RAN Based Network Protocols-Specifications-v04.00, Tech. Rep., July 2022.
Slicing,” IEEE Communications Standards Magazine, vol. 6, no. 3, pp. [25] O-RAN Working Group 4, “O-RAN Management Plane Specifica-
8–14, Sep. 2022. tion 12.0,” O-RAN.WG4.MP.0-R003-v12.00, Tech. Rep., June 2023.
[4] C. Shen, Y. Xiao, Y. Ma, J. Chen, C.-M. Chiang, S. Chen, and Y. Pan, [26] O-RAN Working Group 5, “Transport specification,”
“Security Threat Analysis and Treatment Strategy for ORAN,” ORAN.WG5.Transport.0-v01.00, Tech. Rep., March 2020.
in 2022 24th International Conference on Advanced Communication [27] E. Rescorla, “The Transport Layer Security (TLS) Protocol Version
Technology (ICACT). IEEE, 2022, pp. 417–422. 1.3,” Aug 2018. [Online]. Available: https://www.rfc-editor.org/
[5] K. Ramezanpour and J. Jagannath, “Intelligent zero trust architec- rfc/rfc8446.txt
ture for 5G/6G networks: Principles, challenges, and the role of [28] “IP Authentication Header,” Dec 2005. [Online]. Available:
machine learning in the context of O-RAN,” Computer Networks, p. https://www.rfc-editor.org/rfc/rfc4303.txt
109358, 2022. [29] “IP Encapsulating Security Payload (ESP),” Dec 2005. [Online].
[6] A. S. Abdalla, P. S. Upadhyaya, V. K. Shah, and V. Marojevic, Available: https://www.rfc-editor.org/rfc/rfc4303.txt
“Toward Next Generation Open Radio Access Networks–What O- [30] S. Frankel, K. Kent, R. Lewkowski, A. D. Orebaugh, R. W. Ritchey,
RAN Can and Cannot Do!” IEEE Network, 2022.
13
and S. R. Sharma, “Guide to IPsec VPNs:.” NIST Special Publication, Utku Demir is a Postdoctoral Research Fellow
2005. at Northeastern University, where he is sup-
[31] “IEEE Standard for Local and metropolitan area networks-Media ported by the Roux Institute’s Experiential AI
Access Control (MAC) Security,” IEEE Std 802.1AE-2018 (Revision program. He received his PhD from the Univer-
of IEEE Std 802.1AE-2006), pp. 1–239, 2018. sity of Rochester in 2020. His research interests
[32] “IEEE Standard for Local and Metropolitan Area Networks–Port- lie in the areas of wireless communications, mo-
Based Network Access Control,” IEEE Std 802.1X-2020 (Revision bile networks, signal processing, and machine
of IEEE Std 802.1X-2010 Incorporating IEEE Std 802.1Xbx-2014 and learning.
IEEE Std 802.1Xck-2018), pp. 1–289, 2020.
[33] J. F. Kurose and K. W. Ross, Computer Networking: A Top-Down
Approach, Seventh Eddition, 2017.
[34] strongSwan, “Strongswan.” [Online]. Available: https://www.
strongswan.org/
[35] V. K. Choyi, A. Abdel-Hamid, Y. Shah, S. Ferdi, and A. Brusilovsky,
Leonardo Bonati is an Associate Research Sci-
“Network slice selection, assignment and routing within 5G Net-
entist at Northeastern University. He received
works,” in 2016 IEEE Conference on Standards for Communications
his Ph.D. from Northeastern University in 2022.
and Networking (CSCN), 2016, pp. 1–7.
His research focuses on softwarized NextG sys-
[36] J. Groen, M. Belgiovine, U. Demir, B. Kim, and K. Chowdhury,
tems.
“TRACTOR: Traffic Analysis and Classification Tool for Open
RAN,” arXiv preprint arXiv:2312.07896, 2023.
[37] R. Stewart, “Stream control transmission protocol (RFC 4960),”
Tech. Rep., 2007.
[38] M. Dworkin, E. Barker, J. Nechvatal, J. Foti, L. Bassham, E. Roback,
and J. Dray, “Advanced Encryption Standard (AES),” 2001-11-26
2001.
[39] Q. Dang, “Secure hash standard,” 2015-08-04 2015.
[40] A. Kelkar and C. Dick, “NVIDIA Aerial GPU Hosted AI-on-5G,”
in IEEE 4th 5G World Forum (5GWF), October 2021, pp. 64–69. Davide Villa is a Ph.D. candidate at Northeast-
[41] OpenAirInterface Software Alliance. [Online]. Available: https: ern University. He received his B.S. in Com-
//openairinterface.org puter Engineering and his M.S. in Embedded
[42] OnePlus. [Online]. Available: https://www.oneplus.com/us/ Computing Systems from University of Pisa
nord-specs and Sant’Anna School of Advanced Studies in
[43] S. Dubroca, “manpage: IP-macsec - macsec device configuration,” 2015 and 2018, respectively. His research inter-
2019. [Online]. Available: https://manpages.ubuntu.com/ ests focus on 5G-and-beyond cellular networks,
manpages/jammy/en/man8/ip-macsec.8.html software-defined networking, O-RAN, and chan-
[44] D. McGrew and J. Viega, “The Galois/counter mode of operation nel modeling.
(GCM),” submission to NIST Modes of Operation Process, vol. 20, pp.
0278–0070, 2004.
[45] “IKEv2 Cipher Suites :: strongSwan Documentation,”
2023. [Online]. Available: https://docs.strongswan.org/docs/
5.9/config/IKEv2CipherSuites.html Michele Polese is a Research Assistant Profes-
[46] S. Ullah, J. Choi, and H. Oh, “IPsec for high speed network sor at Northeastern University. He obtained his
links: Performance analysis and enhancements,” Future Generation Ph.D. from the University of Padova in 2020. His
Computer Systems, vol. 107, pp. 112–125, 2020. research focuses on architectures for wireless
[47] S. Gallenmüller, P. Emmerich, F. Wohlfart, D. Raumer, and networks.
G. Carle, “Comparison of frameworks for high-performance
packet IO,” in 2015 ACM/IEEE Symposium on Architectures for
Networking and Communications Systems (ANCS), 2015, pp. 29–38.
Joshua Groen is a Ph.D. candidate at North- Tommaso Melodia is the William Lincoln Smith
eastern University. Previously he worked in the Professor at Northeastern University, the direc-
US Army Regional Cyber Center – Korea as the tor of the Institute for the Wireless Internet of
Senior Network Engineer. He received his BSE Things, and the director of research for the
(’07) and MS (’17) in Electrical Engineering re- PAWR Project Office. He received his PhD from
spectively from Arizona State University and the the Georgia Institute of Technology in 2007. His
University of Wisconsin. His research interests research focuses on wireless networked sys-
include wireless communications, security, and tems.
machine learning.