Abstract
In the 5G-Advanced and 6G era, the Open Radio Access Network (Open RAN) will support hardware and software interoperability between different vendors. The O-RAN Alliance, which leads the Open RAN initiative, has released standards addressing potential threats and mitigation requirements to the framework. While the standards specify Man-in-the-Middle (MitM) attacks on the E2 interface and recommend using IPsec, a Layer 3 security protocol, they do not cover defenses against Layer 2 attacks, such as Address Resolution Protocol (ARP) spoofing. This paper proposes an xApp with preventive and reactive mechanisms to protect the E2 interface from ARP spoofing in Open RAN. The xApp proactively prevents attacks through a static ARP table and continuously monitors the E2 interface to detect and react to the ARP spoofing, offering better network resilience than existing methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Polese, M., Bonati, L., D’Oro, S., Basagni, S., Melodia, T.: Understanding O-RAN: architecture, interfaces, algorithms, security, and research challenges. IEEE Commun. Surv. Tutor. 25(2), 1376–1411 (2023)
Tiberti, W., Fina, E., Marotta, A., Cassioli, D.: Impact of man-in-the-middle attacks to the O-RAN inter-controllers interface. In: 2022 IEEE Future Networks World Forum (FNWF), pp. 367–372 (2022)
O-RAN ALLIANCE. https://specifications.o-ran.org/specifications. Accessed 02 June 2024
Hung, C.-F., Chen, Y.-R., Tseng, C.-H., Cheng, S.-M.: Security threats to xApps access control and E2 interface in O-RAN. IEEE Open J. Commun. Soc. 5(1), 1197–1203 (2024)
Djuitcheu, H., et al.: Exploring the implications and methodologies of securing the E2 interface. Authorea Preprints (2024)
Radhakrishnan, V.: Detection of denial of service attacks on the open radio access network intelligent controller through the E2 interface. Ph.D. thesis, Virginia Tech (2023)
Meghana, J., Subashri, T., Vimal, K.: A survey on ARP cache poisoning and techniques for detection and mitigation. In: 2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN), pp. 1–6. IEEE (2017)
Galal, A., Ghalwash, A., Nasr, M.: A new approach for detecting and mitigating address resolution protocol (ARP) poisoning. Int. J. Adv. Comput. Sci. Appl. 13(6), 377–382 (2022)
Prasad, A., Chandra, S.: Defending ARP spoofing-based MitM attack using machine learning and device profiling. In: 2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), pp. 978–982 (2022)
Hou, X., Jiang, Z., Tian, X.: The detection and prevention for ARP spoofing based on Snort. In: 2010 International Conference on Computer Application and System Modeling (ICCASM 2010) (2010)
Hijazi, S., Obaidat, M.: Address resolution protocol spoofing attacks and security approaches: a survey. Secur. Priv. 2(1) (2019)
Ortega, A., Marcos, X., Chiang, L., Abad, C.: Preventing ARP cache poisoning attacks: a proof of concept using OpenWrt. In: 2009 Latin American Network Operations and Management Symposium, pp. 1–9. IEEE (2009)
Kim, J., Park, J., Lee. J.-H.: Simulation of an ARP spoofing attack on the E2 interface in open RAN. In: IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2024) (2024)
Acknowledgement
This work was supported by Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT) (No. RS-2021-II210796, Research on Foundational Technologies for 6G Autonomous Security-by-Design to Guarantee Constant Quality of Security).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kim, J., Park, J., Lee, JH. (2025). ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach. In: Lee, JH., Emura, K., Lee, S. (eds) Information Security Applications. WISA 2024. Lecture Notes in Computer Science, vol 15499. Springer, Singapore. https://doi.org/10.1007/978-981-96-1624-4_3
Download citation
DOI: https://doi.org/10.1007/978-981-96-1624-4_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-96-1623-7
Online ISBN: 978-981-96-1624-4
eBook Packages: Computer ScienceComputer Science (R0)