An Investigation on Open-RAN Specifications: Use Cases, Security Threats, Requirements, Discussions

Heejae Park, Tri Hai Nguyen, Laihyuk Park

Research output: Contribution to journalReview articlepeer-review

2 Scopus citations

Abstract

The emergence of various technologies such as terahertz communications, Reconfigurable Intelligent Surfaces (RIS), and AI-powered communication services will burden network operators with rising infrastructure costs. Recently, the Open Radio Access Network (O-RAN) has been introduced as a solution for growing financial and operational burdens in Beyond 5G (B5G) and 6G networks. O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs. By disaggregating conventional Base Band Units (BBUs) into O-RAN Distributed Units (O-DU) and O-RAN Centralized Units (O-CU), O-RAN offers greater flexibility for upgrades and network automation. However, this openness introduces new security challenges compared to traditional RANs. Many existing studies overlook these security requirements of the O-RAN networks. To gain deeper insights into the O-RAN system and security, this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G applications. We then delve into specifications of O-RAN security threats and requirements, aiming to mitigate security vulnerabilities effectively. By providing a comprehensive understanding of O-RAN architecture, use cases, and security considerations, this work serves as a valuable resource for future research in O-RAN and its security.

Original languageEnglish
Pages (from-to)13-41
Number of pages29
JournalCMES - Computer Modeling in Engineering and Sciences
Volume141
Issue number1
DOIs
StatePublished - 2024

Keywords

  • architecture
  • O-RAN
  • security discussions
  • security issues
  • security requirements
  • use cases

Fingerprint

Dive into the research topics of 'An Investigation on Open-RAN Specifications: Use Cases, Security Threats, Requirements, Discussions'. Together they form a unique fingerprint.

Cite this