Skip to main content

ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach

  • Conference paper
  • First Online:
Information Security Applications (WISA 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 15499))

Included in the following conference series:

  • 9 Accesses

Abstract

In the 5G-Advanced and 6G era, the Open Radio Access Network (Open RAN) will support hardware and software interoperability between different vendors. The O-RAN Alliance, which leads the Open RAN initiative, has released standards addressing potential threats and mitigation requirements to the framework. While the standards specify Man-in-the-Middle (MitM) attacks on the E2 interface and recommend using IPsec, a Layer 3 security protocol, they do not cover defenses against Layer 2 attacks, such as Address Resolution Protocol (ARP) spoofing. This paper proposes an xApp with preventive and reactive mechanisms to protect the E2 interface from ARP spoofing in Open RAN. The xApp proactively prevents attacks through a static ARP table and continuously monitors the E2 interface to detect and react to the ARP spoofing, offering better network resilience than existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Polese, M., Bonati, L., D’Oro, S., Basagni, S., Melodia, T.: Understanding O-RAN: architecture, interfaces, algorithms, security, and research challenges. IEEE Commun. Surv. Tutor. 25(2), 1376–1411 (2023)

    Article  Google Scholar 

  2. Tiberti, W., Fina, E., Marotta, A., Cassioli, D.: Impact of man-in-the-middle attacks to the O-RAN inter-controllers interface. In: 2022 IEEE Future Networks World Forum (FNWF), pp. 367–372 (2022)

    Google Scholar 

  3. O-RAN ALLIANCE. https://specifications.o-ran.org/specifications. Accessed 02 June 2024

  4. Hung, C.-F., Chen, Y.-R., Tseng, C.-H., Cheng, S.-M.: Security threats to xApps access control and E2 interface in O-RAN. IEEE Open J. Commun. Soc. 5(1), 1197–1203 (2024)

    Article  MATH  Google Scholar 

  5. Djuitcheu, H., et al.: Exploring the implications and methodologies of securing the E2 interface. Authorea Preprints (2024)

    Google Scholar 

  6. Radhakrishnan, V.: Detection of denial of service attacks on the open radio access network intelligent controller through the E2 interface. Ph.D. thesis, Virginia Tech (2023)

    Google Scholar 

  7. Meghana, J., Subashri, T., Vimal, K.: A survey on ARP cache poisoning and techniques for detection and mitigation. In: 2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN), pp. 1–6. IEEE (2017)

    Google Scholar 

  8. Galal, A., Ghalwash, A., Nasr, M.: A new approach for detecting and mitigating address resolution protocol (ARP) poisoning. Int. J. Adv. Comput. Sci. Appl. 13(6), 377–382 (2022)

    Google Scholar 

  9. Prasad, A., Chandra, S.: Defending ARP spoofing-based MitM attack using machine learning and device profiling. In: 2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), pp. 978–982 (2022)

    Google Scholar 

  10. Hou, X., Jiang, Z., Tian, X.: The detection and prevention for ARP spoofing based on Snort. In: 2010 International Conference on Computer Application and System Modeling (ICCASM 2010) (2010)

    Google Scholar 

  11. Hijazi, S., Obaidat, M.: Address resolution protocol spoofing attacks and security approaches: a survey. Secur. Priv. 2(1) (2019)

    Google Scholar 

  12. Ortega, A., Marcos, X., Chiang, L., Abad, C.: Preventing ARP cache poisoning attacks: a proof of concept using OpenWrt. In: 2009 Latin American Network Operations and Management Symposium, pp. 1–9. IEEE (2009)

    Google Scholar 

  13. Kim, J., Park, J., Lee. J.-H.: Simulation of an ARP spoofing attack on the E2 interface in open RAN. In: IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2024) (2024)

    Google Scholar 

Download references

Acknowledgement

This work was supported by Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT) (No. RS-2021-II210796, Research on Foundational Technologies for 6G Autonomous Security-by-Design to Guarantee Constant Quality of Security).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jong-Hyouk Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kim, J., Park, J., Lee, JH. (2025). ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach. In: Lee, JH., Emura, K., Lee, S. (eds) Information Security Applications. WISA 2024. Lecture Notes in Computer Science, vol 15499. Springer, Singapore. https://doi.org/10.1007/978-981-96-1624-4_3

Download citation

  • DOI: https://doi.org/10.1007/978-981-96-1624-4_3

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-96-1623-7

  • Online ISBN: 978-981-96-1624-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics