The increasing dependence of modern society on wireless technologies has highlighted new vulnerabilities in next-generation networks such as 5G. Jamming is one of the most critical threats that can efficiently compromise a physical channel, even though data transmitted on those channels are encrypted. This work investigates the vulnerabilities of the Physical Uplink Shared Channel (PUSCH) in 5G New Radio (NR), showing the feasibility of a stealth jamming attack that takes advantage of compromised User Equipment (UE). The core of the approach is a reactive and user-selective jammer that exploits Downlink Control Information (DCI) data leaked from a backdoored UE to interfere, in frequency and time, with the allocated resources on the Uplink (UL) slots assigned to that device. By injecting white noise into the targeted PUSCH resources, the system remains undetectable while progressively degrading link performance. We implement our methodology within a reproducible and fully open-source 5G-NR testbed environment, integrating and extending the software stacks srsRAN4G, Open5GS, and free5GRAN, along with Ettus USRP B210 devices. Experimental results demonstrate that the proposed approach, synchronized with the same 5G-NR cell, can degrade UL throughput, eventually causing excessive retransmissions and leading to a radio link failure, followed by a resource control release.This highlights the limitations of existing 5G security strategies at the physical and MAC layers, showing that DCI encryption alone is not enough to ensure communication resilience. The results emphasize the importance of secure-by-design mechanisms in next-generation mobile network deployments and UE hardware.

Alaimo, R., Tinnirello, I., Garlisi, D. (2025). Exploiting DCI Leakage: A Stealthy 5G Uplink Jamming Attack Using Compromised UE. In 2025 IEEE International Conference on Omni-layer Intelligent systems (COINS) (pp. 1-6). IEEE [10.1109/COINS65080.2025.11125746].

Exploiting DCI Leakage: A Stealthy 5G Uplink Jamming Attack Using Compromised UE

Alaimo R.;Tinnirello I.;Garlisi D.
2025-01-01

Abstract

The increasing dependence of modern society on wireless technologies has highlighted new vulnerabilities in next-generation networks such as 5G. Jamming is one of the most critical threats that can efficiently compromise a physical channel, even though data transmitted on those channels are encrypted. This work investigates the vulnerabilities of the Physical Uplink Shared Channel (PUSCH) in 5G New Radio (NR), showing the feasibility of a stealth jamming attack that takes advantage of compromised User Equipment (UE). The core of the approach is a reactive and user-selective jammer that exploits Downlink Control Information (DCI) data leaked from a backdoored UE to interfere, in frequency and time, with the allocated resources on the Uplink (UL) slots assigned to that device. By injecting white noise into the targeted PUSCH resources, the system remains undetectable while progressively degrading link performance. We implement our methodology within a reproducible and fully open-source 5G-NR testbed environment, integrating and extending the software stacks srsRAN4G, Open5GS, and free5GRAN, along with Ettus USRP B210 devices. Experimental results demonstrate that the proposed approach, synchronized with the same 5G-NR cell, can degrade UL throughput, eventually causing excessive retransmissions and leading to a radio link failure, followed by a resource control release.This highlights the limitations of existing 5G security strategies at the physical and MAC layers, showing that DCI encryption alone is not enough to ensure communication resilience. The results emphasize the importance of secure-by-design mechanisms in next-generation mobile network deployments and UE hardware.
2025
Settore INFO-01/A - Informatica
979-8-3315-2037-3
979-8-3315-2038-0
Alaimo, R., Tinnirello, I., Garlisi, D. (2025). Exploiting DCI Leakage: A Stealthy 5G Uplink Jamming Attack Using Compromised UE. In 2025 IEEE International Conference on Omni-layer Intelligent systems (COINS) (pp. 1-6). IEEE [10.1109/COINS65080.2025.11125746].
File in questo prodotto:
File Dimensione Formato  
Exploiting_DCI_Leakage_A_Stealthy_5G_Uplink_Jamming_Attack_Using_Compromised_UE_compressed.pdf

Solo gestori archvio

Tipologia: Versione Editoriale
Dimensione 288.62 kB
Formato Adobe PDF
288.62 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10447/690723
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact