xAntenna: Open RAN Security
XorIDA-based security for Open RAN O-DU and O-CU interfaces. Control plane data is split so no single vendor component sees complete signaling.
The Problem
Open RAN disaggregates the radio access network across multiple vendors, but this creates new attack surfaces at the interfaces between vendor components.
The O-DU/O-CU interface carries sensitive control plane signaling including subscriber identity, handover data, and resource allocation. Each vendor component has full visibility into the traffic it processes.
Nation-state actors target supply chain vulnerabilities in RAN equipment. With Open RAN, the attack surface expands from one vendor to many, each with potential backdoors.
The Old Way
The PRIVATE.ME Solution
xAntenna splits control plane data via XorIDA at the O-DU/O-CU boundary. Each vendor component receives one share — enough to perform its function but not enough to reconstruct complete signaling.
Control plane messages are XorIDA-split before crossing vendor boundaries. xLink M2M provides DID-authenticated communication between components. xBoot ensures firmware integrity on each component.
Even if one vendor component is compromised, the attacker gets zero usable information. Reconstruction requires cooperation of multiple independent vendor components.
The New Way
How It Works
xAntenna combines XorIDA split-plane with xLink M2M authentication, xBoot firmware integrity, and threshold reconstruction across vendor components.
Use Cases
Split control plane data across Open RAN vendor components.
O-RANPrevent supply chain attacks via vendor-component data isolation.
Supply ChainProtect subscriber identity and handover data at vendor interfaces.
SignalingxBoot-verified firmware on every Open RAN component.
FirmwareIntegration
import { RANGuard } from '@private.me/xantenna'; const guard = await RANGuard.create({ components: [odu_did, ocu_did, ric_did], threshold: { k: 2, n: 3 } });
Security Properties
| Property | Mechanism | Guarantee |
|---|---|---|
| Control plane | XorIDA split | ✓ Per-vendor isolation |
| Firmware | xBoot verification | ✓ Triple integrity check |
| Identity | DID per-component | ✓ Ed25519 mutual auth |
| Transport | xLink M2M | ✓ Encrypted inter-component |
Verifiable Data Protection
Every operation in this ACI produces a verifiable audit trail via xProve. HMAC-chained integrity proofs let auditors confirm that data was split, stored, and reconstructed correctly — without accessing the data itself.
Read the xProve white paper →
Ready to deploy xAntenna?
Talk to Ren, our AI sales engineer, or book a live demo with our team.
Ship Proofs, Not Source
xAntenna generates cryptographic proofs of correct execution without exposing proprietary algorithms. Verify integrity using zero-knowledge proofs — no source code required.
- Tier 1 HMAC (~0.7KB)
- Tier 2 Commit-Reveal (~0.5KB)
- Tier 3 IT-MAC (~0.3KB)
- Tier 4 KKW ZK (~0.4KB)
Use Cases
Deployment Options
SaaS Recommended
Fully managed infrastructure. Call our REST API, we handle scaling, updates, and operations.
- Zero infrastructure setup
- Automatic updates
- 99.9% uptime SLA
- Enterprise SLA available
SDK Integration
Embed directly in your application. Runs in your codebase with full programmatic control.
npm install @private.me/xantenna- TypeScript/JavaScript SDK
- Full source access
- Enterprise support available
On-Premise Upon Request
Enterprise CLI for compliance, air-gap, or data residency requirements.
- Complete data sovereignty
- Air-gap capable deployment
- Custom SLA + dedicated support
- Professional services included
Enterprise On-Premise Deployment
While xAntenna is primarily delivered as SaaS or SDK, we build dedicated on-premise infrastructure for customers with:
- Regulatory mandates — HIPAA, SOX, FedRAMP, CMMC requiring self-hosted processing
- Air-gapped environments — SCIF, classified networks, offline operations
- Data residency requirements — EU GDPR, China data laws, government mandates
- Custom integration needs — Embed in proprietary platforms, specialized workflows
Includes: Enterprise CLI, Docker/Kubernetes orchestration, RBAC, audit logging, and dedicated support.