Securing Open RAN: A Survey of Cryptographic Challenges and Emerging Solutions for 5G
By: Ryan Barker, Fatemeh Afghah
Potential Business Impact:
Makes 5G phone networks safer from hackers.
The advent of Open Radio Access Networks (O-RAN) introduces modularity and flexibility into 5G deployments but also surfaces novel security challenges across disaggregated interfaces. This literature review synthesizes recent research across thirteen academic and industry sources, examining vulnerabilities such as cipher bidding-down attacks, partial encryption exposure on control/user planes, and performance trade-offs in securing O-RAN interfaces like E2 and O1. The paper surveys key cryptographic tools -- SNOW-V, AES-256, and ZUC-256 -- evaluating their throughput, side-channel resilience, and adaptability to heterogeneous slices (eMBB, URLLC, mMTC). Emphasis is placed on emerging testbeds and AI-driven controllers that facilitate dynamic orchestration, anomaly detection, and secure configuration. We conclude by outlining future research directions, including hardware offloading, cross-layer cipher adaptation, and alignment with 3GPP TS 33.501 and O-RAN Alliance security mandates, all of which point toward the need for integrated, zero-trust architectures in 6G.
Similar Papers
Zero-Trust Strategies for O-RAN Cellular Networks: Principles, Challenges and Research Directions
Cryptography and Security
Makes phone networks safer from hackers.
Q-RAN: Quantum-Resilient O-RAN Architecture
Cryptography and Security
Protects phone networks from future computer code-breaking.
Efficient Resource Management for Secure and Low-Latency O-RAN Communication
Cryptography and Security
Makes cell towers work better and safer.