Adam Ali Husseinat

and 3 more

Currently, the 5th generation mobile networks, known as 5G, have been standardized by the 3rd generation partnership project (3GPP) and are already being used commercially. The system is characterized by its flexibility and heterogeneity in mobile cellular communication and networking. Simultaneously, the issue of 5G security has emerged swiftly with the utilization of cloud and non-3GPP networks in the 5G communications network. Extensive research has been carried out on system vulnerabilities and attacks, but there is a relatively new and understudied area known as handover vulnerabilities and their security solutions. Handover refers to the process of transferring connections from one network to another or from a base station to another within the same network. It is important to ensure that any proposed solution for handover vulnerabilities in 5G networks maintains the key characteristics of low latency and network availability. Several security solutions have been suggested, but they involve a trade-off between the additional communication overhead they introduce to the system and the system's requirement for low latency. Our study proposes a new and comprehensive model leveraging the unique physical layer characteristics of the users to enhance the security of the Xn-based handover in 5G networks. We have validated our solution using Scyther tools, which demonstrate that our approach ensures secure communication during the handover process without introducing any additional overhead to the existing system. Furthermore, our solution does not introduce any complexity that could negatively impact the low latency of the system.