The 5G protocol lacks a robust base station (BS) authentication mechanism during the initial bootstrapping phase, leaving it susceptible to threats such as fake BSs, spoofed broadcasts, and large-scale manipulation of System Information Blocks (SIBs). Despite real-world 5G deployments increasingly relying on multi-BS communication and user multi-connectivity, existing solutions incur high communication overheads, rely on centralized trust, and lack accountability and long-term breach resiliency. Given the inevitability of BS compromise and the severe impact of forged SIBs as the root of trust (e.g., fake alerts, tracking, false roaming), distributed trust, verifiable forgery detection, and audit logging are essential, yet remain largely unexplored in 5G authentication. These challenges are further amplified by the emergence of quantum-capable adversaries. While integration of NIST PQC standards is widely viewed as a path toward long-term security and future-proofing 5G authentication, their feasibility under strict packet size, latency, and broadcast constraints has not been systematically studied. This work presents, to our knowledge, the first comprehensive network-level performance characterization of integrating NIST-PQC standards and conventional digital signatures into 5G BS authentication, showing that direct PQC adoption is impractical due to protocol constraints, delays, and large signature sizes. To address these challenges, we propose BORG, a future-proof authentication framework based on a hierarchical identity-based threshold signature with fail-stop properties. BORG distributes trust across multiple BSs, enables post-mortem forgery detection, and provides tamper-evident, post-quantum secure audit logging, while maintaining compact signatures, avoiding fragmentation, and incurring minimal UE overhead, as shown in our 5G testbed implementation.
翻译:5G协议在初始引导阶段缺乏稳健的基站(BS)认证机制,使其易受伪基站、欺骗性广播及大规模系统信息块(SIB)篡改等威胁。尽管实际5G部署日益依赖多基站通信与用户多连接技术,现有解决方案仍存在通信开销高、依赖中心化信任、缺乏可审计性与长期违规弹性等问题。考虑到基站被攻破的必然性以及作为信任根源的伪造SIB所造成的严重影响(例如虚假警报、跟踪、非法漫游),分布式信任、可验证伪造检测与审计日志记录至关重要,但这些在5G认证领域仍基本未被探索。量子计算攻击能力的出现进一步放大了这些挑战。虽然业界普遍认为集成NIST后量子密码(PQC)标准是实现长期安全与未来验证5G认证的途径,但其在严格数据包大小、延迟和广播约束下的可行性尚未得到系统研究。本研究首次全面评估了在网络层面将NIST-PQC标准与传统数字签名集成至5G基站认证的性能特征,结果表明直接采用PQC方案因协议约束、延迟及大签名尺寸而不可行。为解决这些挑战,我们提出BORG——一个基于具备故障停止特性的分层基于身份的阈值签名框架,可实现未来验证认证。BORG将信任分布至多个基站,支持事后伪造检测,并提供防篡改、后量子安全的审计日志记录,同时保持紧凑的签名尺寸、避免数据包分片,并通过5G测试床验证其仅产生极低的用户设备(UE)开销。