APA Style
Yi-Hsueh Tsai, Shiang-Jiun Chen. (2025). Security Assurance for 5G Split gNB and AMF Vulnerabilities. Computing&AI Connect, 2 (Article ID: 0026). https://doi.org/Registering DOIMLA Style
Yi-Hsueh Tsai, Shiang-Jiun Chen. "Security Assurance for 5G Split gNB and AMF Vulnerabilities". Computing&AI Connect, vol. 2, 2025, Article ID: 0026, https://doi.org/Registering DOI.Chicago Style
Yi-Hsueh Tsai, Shiang-Jiun Chen. 2025. "Security Assurance for 5G Split gNB and AMF Vulnerabilities." Computing&AI Connect 2 (2025): 0026. https://doi.org/Registering DOI.
ACCESS
Research Article
Volume 2, Article ID: 2025.0026
Yi-Hsueh Tsai
yihsuehtsai@g.ntu.edu.tw
Shiang-Jiun Chen
annette@ntut.edu.tw
1 National Taipei University of Technology, Taipei, 10608, Taiwan
2 Institute for Information Industry, Taipei 105412, Taiwan
* Author to whom correspondence should be addressed
Received: 18 Feb 2025 Accepted: 13 Nov 2025 Available Online: 17 Nov 2025
As 5G networks continue to evolve and innovate, security challenges are emerging, necessitating a more rigorous assessment of their security mechanisms, particularly within core functions such as the Access and Mobility Function (AMF) and disaggregated gNodeB (gNB). 5G's virtualized architecture represents a significant increase in complexity compared to pre-4G network architectures, and its software-based architecture necessitates enhanced security. This study examines security issues within protocol design, device integration, and virtualized infrastructure, drawing on 3GPP specifications and security vulnerabilities observed in early 5G deployments. By examining the effectiveness of fundamental security measures such as encryption, integrity protection, and replay prevention, we also conduct a comprehensive and systematic assessment of 5G deployments in terms of resilience. To enhance security, this paper also explores the anomaly detection and adaptive response capabilities of automated and AI-driven threat detection systems, as well as how to enhance real-time monitoring. The goal is to address these technical vulnerabilities and practical implementation challenges systematically. The main purpose of this research is to enhance the security of 5G networks and ensure they can withstand increasingly sophisticated cyber threats.
Disclaimer: This is not the final version of the article. Changes may occur when the manuscript is published in its final format.
We use cookies to improve your experience on our site. By continuing to use our site, you accept our use of cookies. Learn more