Evolution of Man-in-the-Middle attacks in 5G telecommunication systems

Authors

DOI:

https://doi.org/10.30837/rt.2025.3.222.09

Keywords:

5G telecommunication systems, MITM attacks, Digital Twin, post-quantum cryptography, 5G-AKA, network slicing, quantum computing

Abstract

The rapid deployment of fifth-generation (5G) networks has dramatically transformed telecommunications by enabling ultra-low latency, high bandwidth, and dynamic spectrum allocation. However, these innovations have also expanded the attack surface, introducing unprecedented security vulnerabilities. Among them, Man-in-the-Middle (MITM) attacks have evolved into complex, AI-driven, and persistent threats capable of exploiting 5G’s Service-Based Architecture (SBA), virtualized functions, and heterogeneous interoperability with LTE and Wi-Fi. A particularly critical evolution is the rise of Digital Twin attacks, where adversaries replicate devices or network elements with high fidelity, bypassing traditional authentication and maintaining long-term undetectable intrusions. This paper provides a comprehensive analysis of MITM evolution in 5G systems, including vulnerabilities across the OSI model layers, exploitation of NGAP, Diameter, and DSS signaling, and the persistent risks posed by distributed architectures. Special attention is given to quantum-era threats, such as store-now-decrypt-later scenarios and quantum-enhanced MITM attacks undermining 5G-AKA protocols reliant on non-quantum-resistant cryptography. The study emphasizes the need for cryptographic agility, post-quantum authentication, and continuous behavioral validation mechanisms to mitigate persistent and quantum-enhanced MITM exploits. The findings highlight urgent requirements for international standardization and proactive implementation of post-quantum secure protocols in 5G infrastructures.

References

Al Zami, M. B., Shaon, S., Quy, V. K., & Nguyen, D. C. Digital twin in industries: A comprehensive survey // IEEE Access. 2025. https://doi.org/10.48550/arXiv.2412.00209

Baseri Y., Chouhan V., & Ghorbani A. Cybersecurity in the quantum era: Assessing the impact of quantum computing on infrastructure. arXiv preprint. 2025. https://doi.org/10.48550/arXiv.2404.10659

Devi P., Rai Bharti M., & Gautam D. A survey on physical layer security for 5G/6G communications over dif-ferent fading channels: Approaches, challenges, and future directions // Vehicular Communications. 2025. Vol. 53. P. 100891. https://doi.org/10.1016/j.vehcom.2025.100891

Hamroun C., Fladenmuller A., Pariente M., & Pujolle G. Intrusion detection in 5G and Wi-Fi networks: A sur-vey of current methods, challenges, and perspectives // IEEE Access. 2025. Vol. 13. P. 40950–40976. https://doi.org/10.1109/ACCESS.2025.3546338

Haq A. U., Khan M. A., Rahman A. U., Ali G., & Khan A. Need of UAVs and physical layer security in next-generation non-terrestrial wireless networks: Potential challenges and open issues // IEEE Open Journal of Vehicular Technology. 2025. https://doi.org/10.36227/techrxiv.173626712.22689317/v1

Hoang D. B., & Farahmandian S. Security of software-defined infrastructures with SDN, NFV, and cloud com-puting technologies // Guide to Security in SDN and NFV: Challenges, Opportunities, and Applications. 2017. P. 3–32. Springer. https://doi.org/10.1007/978-3-319-64653-4_1

Khalimov G., Kotukh Y., Kolisnyk M., & Khalimova S., Sievierinov O. LINE: Cryptosystem based on linear equations for logarithmic signatures // Cryptology ePrint Archive: Report 2024/697. 2024. https://ia.cr/2024/697

Khalimov G., Kotukh Y., Kolisnyk M., Khalimova S., Sievierinov O., & Korobchynskyi M. Digital signature scheme based on linear equations // K. Arai (Ed.). Advances in Information and Communication. FICC 2025. Lecture Notes in Networks and Systems. 2025. Vol. 1285. Springer. https://doi.org/10.1007/978-3-031-84460-7_46

Khalimov G., Kotukh Y., Kolisnyk M., Khalimova S., Sievierinov O., & Volkov O. SIGNLINE: Digital signa-ture scheme based on linear equations cryptosystem // 2024 4th International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME). P. 1–9. IEEE.

https://doi.org/10.1109/ICECCME62383.2024.10796704

Kotukh Y., Severinov E., Vlasov O., Tenytska A., & Zarudna E. Some results of development of cryptographic transformations schemes using non-abelian groups // Radiotekhnika. 2021. No 204. P. 66–72.

Kotukh Y., & KhalimovG. Hard problems for non-abelian group cryptography // Fifth International Scientific and Technical Conference “Computer and Information Systems and Technologies”. 2021. https://doi.org/10.30837/csitic52021232176

Kotukh Y., Khalimov G., Dzhura I., & Hivrenko H. Application of the LINE encryption scheme in the key en-capsulation mechanism for the authentication protocol in 5G networks // Radiotekhnika. 2024. No 219. P. 36–45. https://doi.org/10.30837/rt.2024.4.219.04

Kotukh Y., Khalimov G., Korobchynskyi M., Rudenko M., Liubchak V., Matsyuk S., & Chashchyn M. Re-search horizons in group cryptography in the context of post-quantum cryptosystems development // Radiotekhnika. 2024. No 216. P. 62–72. https://doi.org/10.30837/rt.2024.1.216.05

Kotukh Y., & Khalimov G. Towards practical cryptoanalysis of systems based on word problems and logarith-mic signatures // Information security: Problems and prospects. 2022. P. 55–60.

MitraR. N., & Marina M. K. 5G mobile networks security landscape and major risks // The Wiley 5G REF: Se-curity. 2021. Wiley. https://doi.org/10.1002/9781119471509.w5GRef217

OtoomS. Risk auditing for digital twins in cyber physical systems: A systematic review // Journal of Cyber Se-curity and Risk Auditing. 2025.Vol. 1(1). P. 22–35. https://doi.org/10.63180/jcsra.thestap.2025.1.3

Wehbe N., Alameddine H. A., Pourzandi M., Bou-Harb E., & Assi C. A security assessment of HTTP/2 usage in 5G service-based architecture // IEEE Communications Magazine. 2022. Vol. 61(1). P. 48–54. https://doi.org/10.1109/MCOM.001.2100739

Khalimov G., & Kotukh Y. (2025). Cryptographic strengthening of MST3 cryptosystem via automorphism group of Suzuki function fields // arXiv preprint arXiv:2504.07318. https://arxiv.org/abs/2504.07318

Khalimov G., & Kotukh Y. (2025). MST3 encryption improvement with three-parameter group of Hermitian function field. arXiv preprint arXiv:2504.15391. https://arxiv.org/abs/2504.15391

Khalimov G., & Kotukh Y. (2025). Advanced MST3 encryption scheme based on generalized Suzuki 2-groups. arXiv preprint arXiv:2504.11804. https://arxiv.org/abs/2504.11804

Khalimov G., & Kotukh Y. (2025). Improved MST3 encryption scheme based on small Ree groups. arXiv pre-print arXiv:2504.10947. https://arxiv.org/abs/2504.10947

Khalimov G., Kotukh Y., & Khalimova S. (2020). Encryption scheme based on the automorphism group of the Ree function field // IEEE 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS). 2020. P. 1–8.

Khalimov G., Didmanidze I., Sievierinov O., Kotukh Y., & Shonia O. Encryption scheme based on the auto-morphism group of the Suzuki function field // IEEE International Conference on Problems of Infocommunications, Science and Technology (PIC S&T 2020). P. 383–387.

Khalimov G., Kotukh Y., & Khalimova S. Improved encryption scheme based on the automorphism group of the Ree function field // IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS). 2021.

Khalimov G., Kotukh Y., & Khalimova S. MST3 cryptosystem based on the automorphism group of the Hermi-tian function field // IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T 2019). P. 865–868.

Khalimov G., Kotukh Y., Didmanidze I., Sievierinov O., Khalimova S., & Vlasov A. (2021). Towards three-parameter group encryption scheme for MST3 cryptosystem improvement // IEEE 5th World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). 2021. P. 204–211.

Khalimov G., Kotukh Y., Didmanidze I., & Khalimova S. (2021). Encryption scheme based on small Ree groups // Proceedings of the 2021 7th International Conference on Computer Technology Applications (ICCTA ’21). P. 33–37.

Published

2025-09-18

How to Cite

Kotukh, Y., Khalimov, G., & Dzhura , I. (2025). Evolution of Man-in-the-Middle attacks in 5G telecommunication systems. Radiotekhnika, (222), 98–107. https://doi.org/10.30837/rt.2025.3.222.09

Issue

Section

Articles