Evolution of Man-in-the-Middle attacks in 5G telecommunication systems
DOI:
https://doi.org/10.30837/rt.2025.3.222.09Keywords:
5G telecommunication systems, MITM attacks, Digital Twin, post-quantum cryptography, 5G-AKA, network slicing, quantum computingAbstract
The rapid deployment of fifth-generation (5G) networks has dramatically transformed telecommunications by enabling ultra-low latency, high bandwidth, and dynamic spectrum allocation. However, these innovations have also expanded the attack surface, introducing unprecedented security vulnerabilities. Among them, Man-in-the-Middle (MITM) attacks have evolved into complex, AI-driven, and persistent threats capable of exploiting 5G’s Service-Based Architecture (SBA), virtualized functions, and heterogeneous interoperability with LTE and Wi-Fi. A particularly critical evolution is the rise of Digital Twin attacks, where adversaries replicate devices or network elements with high fidelity, bypassing traditional authentication and maintaining long-term undetectable intrusions. This paper provides a comprehensive analysis of MITM evolution in 5G systems, including vulnerabilities across the OSI model layers, exploitation of NGAP, Diameter, and DSS signaling, and the persistent risks posed by distributed architectures. Special attention is given to quantum-era threats, such as store-now-decrypt-later scenarios and quantum-enhanced MITM attacks undermining 5G-AKA protocols reliant on non-quantum-resistant cryptography. The study emphasizes the need for cryptographic agility, post-quantum authentication, and continuous behavioral validation mechanisms to mitigate persistent and quantum-enhanced MITM exploits. The findings highlight urgent requirements for international standardization and proactive implementation of post-quantum secure protocols in 5G infrastructures.
References
Al Zami, M. B., Shaon, S., Quy, V. K., & Nguyen, D. C. Digital twin in industries: A comprehensive survey // IEEE Access. 2025. https://doi.org/10.48550/arXiv.2412.00209
Baseri Y., Chouhan V., & Ghorbani A. Cybersecurity in the quantum era: Assessing the impact of quantum computing on infrastructure. arXiv preprint. 2025. https://doi.org/10.48550/arXiv.2404.10659
Devi P., Rai Bharti M., & Gautam D. A survey on physical layer security for 5G/6G communications over dif-ferent fading channels: Approaches, challenges, and future directions // Vehicular Communications. 2025. Vol. 53. P. 100891. https://doi.org/10.1016/j.vehcom.2025.100891
Hamroun C., Fladenmuller A., Pariente M., & Pujolle G. Intrusion detection in 5G and Wi-Fi networks: A sur-vey of current methods, challenges, and perspectives // IEEE Access. 2025. Vol. 13. P. 40950–40976. https://doi.org/10.1109/ACCESS.2025.3546338
Haq A. U., Khan M. A., Rahman A. U., Ali G., & Khan A. Need of UAVs and physical layer security in next-generation non-terrestrial wireless networks: Potential challenges and open issues // IEEE Open Journal of Vehicular Technology. 2025. https://doi.org/10.36227/techrxiv.173626712.22689317/v1
Hoang D. B., & Farahmandian S. Security of software-defined infrastructures with SDN, NFV, and cloud com-puting technologies // Guide to Security in SDN and NFV: Challenges, Opportunities, and Applications. 2017. P. 3–32. Springer. https://doi.org/10.1007/978-3-319-64653-4_1
Khalimov G., Kotukh Y., Kolisnyk M., & Khalimova S., Sievierinov O. LINE: Cryptosystem based on linear equations for logarithmic signatures // Cryptology ePrint Archive: Report 2024/697. 2024. https://ia.cr/2024/697
Khalimov G., Kotukh Y., Kolisnyk M., Khalimova S., Sievierinov O., & Korobchynskyi M. Digital signature scheme based on linear equations // K. Arai (Ed.). Advances in Information and Communication. FICC 2025. Lecture Notes in Networks and Systems. 2025. Vol. 1285. Springer. https://doi.org/10.1007/978-3-031-84460-7_46
Khalimov G., Kotukh Y., Kolisnyk M., Khalimova S., Sievierinov O., & Volkov O. SIGNLINE: Digital signa-ture scheme based on linear equations cryptosystem // 2024 4th International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME). P. 1–9. IEEE.
https://doi.org/10.1109/ICECCME62383.2024.10796704
Kotukh Y., Severinov E., Vlasov O., Tenytska A., & Zarudna E. Some results of development of cryptographic transformations schemes using non-abelian groups // Radiotekhnika. 2021. No 204. P. 66–72.
Kotukh Y., & KhalimovG. Hard problems for non-abelian group cryptography // Fifth International Scientific and Technical Conference “Computer and Information Systems and Technologies”. 2021. https://doi.org/10.30837/csitic52021232176
Kotukh Y., Khalimov G., Dzhura I., & Hivrenko H. Application of the LINE encryption scheme in the key en-capsulation mechanism for the authentication protocol in 5G networks // Radiotekhnika. 2024. No 219. P. 36–45. https://doi.org/10.30837/rt.2024.4.219.04
Kotukh Y., Khalimov G., Korobchynskyi M., Rudenko M., Liubchak V., Matsyuk S., & Chashchyn M. Re-search horizons in group cryptography in the context of post-quantum cryptosystems development // Radiotekhnika. 2024. No 216. P. 62–72. https://doi.org/10.30837/rt.2024.1.216.05
Kotukh Y., & Khalimov G. Towards practical cryptoanalysis of systems based on word problems and logarith-mic signatures // Information security: Problems and prospects. 2022. P. 55–60.
MitraR. N., & Marina M. K. 5G mobile networks security landscape and major risks // The Wiley 5G REF: Se-curity. 2021. Wiley. https://doi.org/10.1002/9781119471509.w5GRef217
OtoomS. Risk auditing for digital twins in cyber physical systems: A systematic review // Journal of Cyber Se-curity and Risk Auditing. 2025.Vol. 1(1). P. 22–35. https://doi.org/10.63180/jcsra.thestap.2025.1.3
Wehbe N., Alameddine H. A., Pourzandi M., Bou-Harb E., & Assi C. A security assessment of HTTP/2 usage in 5G service-based architecture // IEEE Communications Magazine. 2022. Vol. 61(1). P. 48–54. https://doi.org/10.1109/MCOM.001.2100739
Khalimov G., & Kotukh Y. (2025). Cryptographic strengthening of MST3 cryptosystem via automorphism group of Suzuki function fields // arXiv preprint arXiv:2504.07318. https://arxiv.org/abs/2504.07318
Khalimov G., & Kotukh Y. (2025). MST3 encryption improvement with three-parameter group of Hermitian function field. arXiv preprint arXiv:2504.15391. https://arxiv.org/abs/2504.15391
Khalimov G., & Kotukh Y. (2025). Advanced MST3 encryption scheme based on generalized Suzuki 2-groups. arXiv preprint arXiv:2504.11804. https://arxiv.org/abs/2504.11804
Khalimov G., & Kotukh Y. (2025). Improved MST3 encryption scheme based on small Ree groups. arXiv pre-print arXiv:2504.10947. https://arxiv.org/abs/2504.10947
Khalimov G., Kotukh Y., & Khalimova S. (2020). Encryption scheme based on the automorphism group of the Ree function field // IEEE 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS). 2020. P. 1–8.
Khalimov G., Didmanidze I., Sievierinov O., Kotukh Y., & Shonia O. Encryption scheme based on the auto-morphism group of the Suzuki function field // IEEE International Conference on Problems of Infocommunications, Science and Technology (PIC S&T 2020). P. 383–387.
Khalimov G., Kotukh Y., & Khalimova S. Improved encryption scheme based on the automorphism group of the Ree function field // IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS). 2021.
Khalimov G., Kotukh Y., & Khalimova S. MST3 cryptosystem based on the automorphism group of the Hermi-tian function field // IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T 2019). P. 865–868.
Khalimov G., Kotukh Y., Didmanidze I., Sievierinov O., Khalimova S., & Vlasov A. (2021). Towards three-parameter group encryption scheme for MST3 cryptosystem improvement // IEEE 5th World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). 2021. P. 204–211.
Khalimov G., Kotukh Y., Didmanidze I., & Khalimova S. (2021). Encryption scheme based on small Ree groups // Proceedings of the 2021 7th International Conference on Computer Technology Applications (ICCTA ’21). P. 33–37.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).


