Toward a Multi-Layer Defence Framework for Securing Near-Real-Time Operations in Open RAN

Abstract

Securing the near-real-time (near-RT) control operations in Open Radio Access Networks (Open RAN) is increasingly critical, yet remains insufficiently addressed, as new runtime threats target the control loop while the system is operational. In this paper, we propose a multi-layer defence framework designed to enhance the security of near-RT RAN Intelligent Controller (RIC) operations. We classify operational-time threats into three categories—message-level, data-level, and control logic-level—and design and implement a dedicated detection and mitigation component for each: a signature-based E2 message inspection module performing structural and semantic validation of signalling exchanges, a telemetry poisoning detector based on temporal anomaly scoring using an LSTM network, and a runtime xApp attestation mechanism based on an execution-time hash challenge–response. The framework is evaluated on an Open RAN testbed comprising FlexRIC and a commercial RAN emulator, demonstrating effective detection rates, low latency overheads, and practical integration feasibility. Results indicate that the proposed safeguards can operate within near-RT time constraints while significantly improving protection against runtime attacks, introducing less than 80 ms overhead for a network with 500 User Equipment (UEs). Overall, this work lays the foundation for deployable, layered, and policy-driven runtime security architectures for the near-RT RIC control loop in Open RAN, and provides an extensible framework into which future mitigation policies and threat-specific modules can be integrated.

Publication DOI: https://doi.org/10.1109/OJCOMS.2025.3650736
Divisions: College of Engineering & Physical Sciences > School of Computer Science and Digital Technologies
College of Engineering & Physical Sciences
College of Engineering & Physical Sciences > School of Computer Science and Digital Technologies > Software Engineering & Cybersecurity
Aston University (General)
Funding Information: This work has been supported in part by the ORAN-TWIN-X Subproject through CHEDDAR: Communications Hub for Empowering Distributed Cloud Computing Applications and Research funded by the U.K. Engineering and Physical Sciences Research Council (EPSRC) under Grant EP/Y037421/1 and Grant EP/X040518/1, and in part by the Abu Dhabi University’s Office of Sponsored Programs in the United Arab Emirates under Grant 19300795.
Additional Information: Copyright © 2026 The Authors. This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
Uncontrolled Keywords: E2 message inspection,KPM poisoning detection,Open RAN,near-RT RIC,runtime security,xApp attestation,Computer Networks and Communications
Last Modified: 16 Feb 2026 17:39
Date Deposited: 10 Feb 2026 11:57
Full Text Link:
Related URLs: https://ieeexpl ... cument/11322785 (Publisher URL)
http://www.scop ... tnerID=8YFLogxK (Scopus URL)
PURE Output Type: Article
Published Date: 2026-01-13
Published Online Date: 2026-01-02
Accepted Date: 2025-12-24
Authors: Alimohammadi, Hamed
Mayhoub, Samara (ORCID Profile 0000-0001-7629-0532)
Chatzimiltis, Sotiris
Shojafar, Mohammad
Bhutta, Muhammad Nasir Mumtaz

Download

[img]

Version: Published Version

License: Creative Commons Attribution


Export / Share Citation


Statistics

Additional statistics for this record