BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Northeastern University College of Engineering - ECPv6.16.2//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Northeastern University College of Engineering
X-ORIGINAL-URL:https://coe.northeastern.edu
X-WR-CALDESC:Events for Northeastern University College of Engineering
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240805T140000
DTEND;TZID=America/New_York:20240805T150000
DTSTAMP:20260524T094211
CREATED:20240820T181432Z
LAST-MODIFIED:20240820T181432Z
UID:45107-1722866400-1722870000@coe.northeastern.edu
SUMMARY:Joshua Groen PhD Proposal Review
DESCRIPTION:Name:\nJoshua Groen \n\nTitle:\nOptimizing and Securing Open RAN with Experimental System Validation \nDate:\n8/5/2024 \nTime:\n2:00:00 PM \nLocation:\nISEC232; \nCommittee Members:\nProf. Kaushik Chowdhury (Advisor)\nProf. Stratis Ioannidis\nProf Engin Kirda\nDr. Christopher Morrell \nAbstract:\n5G and beyond cellular networks promise remarkable advancements in bandwidth\, latency\, and connectivity\, with the emergence of Open Radio Access Network (Open RAN) representing a pivotal direction. O-RAN inherently supports machine learning (ML) for network operation control\, with RAN Intelligence Controllers (RICs) utilizing ML models developed by third-party vendors based on key performance indicators (KPIs) from geographically dispersed base stations or user equipment (UE). Realistic and robust datasets are crucial for developing these ML models. We collect a comprehensive 5G dataset using real-world cell phones across diverse scenarios and replicate this traffic within a full-stack srsRAN-based O-RAN framework on Colosseum\, the world’s largest radio frequency (RF) emulator. This process produces a robust\, O-RAN compliant KPI dataset reflecting real-world conditions\, enabling the training of ML models for traffic slice classification with high accuracy. \nThe O-RAN paradigm introduces cloud-based\, multi-vendor\, open\, and intelligent architectures\, enhancing network observability and reconfigurability. However\, this also expands the threat surface\, exposing components and ML infrastructure to cyberattacks. We examine O-RAN security\, focusing on specifications\, architectures\, and intelligence proposed by the O-RAN Alliance. We identify threats\, propose solutions\, and experimentally demonstrate their effectiveness in defending O-RAN systems against cyberattacks\, offering a holistic and practical perspective on O-RAN security. \nWe investigate the impact of encryption on two key O-RAN interfaces: the E2 interface and the Open Fronthaul\, using a full-stack O-RAN ALLIANCE compliant implementation within the Colosseum network emulator and a production-ready Open RAN and 5G-compliant private cellular network. Our findings provide quantitative insights into the latency and throughput impacts of encryption protocols\, and we propose four fundamental principles for security by design within Open RAN systems. \nFinally\, we address the security of Time-Sensitive Networking (TSN) in O-RAN. The O-RAN framework encourages multi-vendor solutions but increases the exposure of the open fronthaul (FH) to security risks\, especially when deployed over third-party networks. Synchronization is crucial for reliable 5G links\, with attacks on synchronization mechanisms posing significant threats. We demonstrate the impact of spoofing and replay attacks on Precision Time Protocol (PTP) synchronization\, causing catastrophic failures in a production-ready O-RAN and 5G-compliant private cellular network. To counter these threats\, we design an ML-based monitoring solution detecting various malicious attacks with over 97.5% accuracy\, and outline additional security measures for the O-RAN environment.
URL:https://coe.northeastern.edu/event/joshua-groen-phd-proposal-review/
END:VEVENT
END:VCALENDAR