Research

Paper

TESTING March 04, 2026

Impact of 5G SA Logical Vulnerabilities on UAV Communications: Threat Models and Testbed Evaluation

Authors

Wagner Comin Sonaglio, Ágney Lopes Roth Ferraz, Lourenço Alves Pereira Júnior

Abstract

This paper examines how logical vulnerabilities in 5G Standalone networks affect UAV command and control communication. The study looks at three attacker positions in the architecture: a malicious user equipment (UE) connected to the same logical network as the UAV, an attacker with access to the 5G core, and a compromised gNodeB. To test these scenarios, a testbed was created using Open5GS, UERANSIM, and Kubernetes. The setup simulates a UAV-GCS communication system over a 5G SA network and allows for controlled attacks on various network interfaces. The experiments reveal that attacks at different points in the architecture can disrupt UAV operations. These disruptions include manipulating control commands and terminating data sessions. The findings emphasize the need for isolation measures in the 5G user plane and integrity protection in UAV command protocols.

Metadata

arXiv ID: 2603.04662
Provider: ARXIV
Primary Category: cs.CR
Published: 2026-03-04
Fetched: 2026-03-06 14:20

Related papers

Raw Data (Debug)
{
  "raw_xml": "<entry>\n    <id>http://arxiv.org/abs/2603.04662v1</id>\n    <title>Impact of 5G SA Logical Vulnerabilities on UAV Communications: Threat Models and Testbed Evaluation</title>\n    <updated>2026-03-04T22:52:27Z</updated>\n    <link href='https://arxiv.org/abs/2603.04662v1' rel='alternate' type='text/html'/>\n    <link href='https://arxiv.org/pdf/2603.04662v1' rel='related' title='pdf' type='application/pdf'/>\n    <summary>This paper examines how logical vulnerabilities in 5G Standalone networks affect UAV command and control communication. The study looks at three attacker positions in the architecture: a malicious user equipment (UE) connected to the same logical network as the UAV, an attacker with access to the 5G core, and a compromised gNodeB. To test these scenarios, a testbed was created using Open5GS, UERANSIM, and Kubernetes. The setup simulates a UAV-GCS communication system over a 5G SA network and allows for controlled attacks on various network interfaces. The experiments reveal that attacks at different points in the architecture can disrupt UAV operations. These disruptions include manipulating control commands and terminating data sessions. The findings emphasize the need for isolation measures in the 5G user plane and integrity protection in UAV command protocols.</summary>\n    <category scheme='http://arxiv.org/schemas/atom' term='cs.CR'/>\n    <published>2026-03-04T22:52:27Z</published>\n    <arxiv:primary_category term='cs.CR'/>\n    <author>\n      <name>Wagner Comin Sonaglio</name>\n    </author>\n    <author>\n      <name>Ágney Lopes Roth Ferraz</name>\n    </author>\n    <author>\n      <name>Lourenço Alves Pereira Júnior</name>\n    </author>\n  </entry>"
}