
Beyond-5G systems connect intelligent devices with dynamic network infrastructures where virtual functions, physical elements, and cloud services must operate in coordination. This complexity increases the exposure of devices and network components to sophisticated security threats. As consortiums and regulatory bodies define security requirements for 6G and Beyond-5G architectures, aligning product security with these standards and enabling automated validation is becoming essential.
β
This project will leverage an existing Beyond-5G testbed to design security experiments targeting access functions, core components, and orchestration mechanisms. The testbed will generate automated and semi-automated test cases exploring threat vectors such as signaling manipulation, fuzzing, resource-exhaustion attacks, and anomaly detection across the mobile network ecosystem.
β
β
ββ
The main objective is to work on standards-aware AI agent capable of translating 3GPP security specifications into actionable validation processes for Beyond-5G testbeds. The internship will begin with previous research in Keysight and consortium initiatives (e.g., Imagine-B5G and 6G-SANDBOX), combined with open-source tools (Open5GS, srsRAN, Python LLM frameworks) and Keysight technologies (LoadCore, BreakingPoint, CyPerf).
β
You will have access to the state-of-the-art Keysight Technologies laboratory and the full infrastructure needed to turn this project into a reality!You will have access to our state-of-the-art laboratory at Keysight Technologies and all the equipment you need to make this project a reality!
β
β
ββ
You are currently pursuing a degree in Computer Science or related fields (e.g., Electrical Engineering, Telecommunications).
β
- You are familiar with Python or software development for automation.
- You have experience with version control (git, git-flow, etc.).
- You are comfortable working with Linux systems.
- You have experience with large language models (prompting, fine-tuning, APIs, or autonomous agents).
- You have already participated in capture-the-flag (CTF) events, hackathons, or research competitions.
β
