Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks

被引:3
作者
Ahmed, Amjed A. [1 ]
Hasan, Mohammad Kamrul [1 ]
Alqahtani, Ali [2 ]
Islam, Shayla [3 ]
Pandey, Bishwajeet [4 ]
Rzayeva, Leila [4 ]
Abbas, Huda Saleh [5 ]
Aman, Azana Hafizah Mohd [1 ]
Alqahtani, Nayef [6 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Ctr Cyber Secur, Bangi 43600, Malaysia
[2] Najran Univ, Coll Comp Sci & Informat Syst, Dept Networks & Commun Engn, Najran 61441, Saudi Arabia
[3] UCSI Univ, Inst Comp Sci & Digital Innovat, Kuala Lumpur 56000, Malaysia
[4] Astana IT Univ, Dept Intelligent Syst & Cyber Secur, Astana 20000, Kazakhstan
[5] Taibah Univ, Coll Comp Sci & Engn, Dept Comp Sci, Madinah 42353, Saudi Arabia
[6] King Faisal Univ, Coll Engn, Dept Elect Engn, Al Hufuf 31982, Saudi Arabia
来源
TSINGHUA SCIENCE AND TECHNOLOGY | 2025年 / 30卷 / 03期
关键词
Recurrent neural networks; 5G mobile communication; Passwords; Side-channel attacks; Predictive models; Mobile handsets; Mobile security; Sensors; Safety; Security; Fifth Generation (5G) networks; smartphone; information leakage; Side-Channel Attack (SCA); deep learning;
D O I
10.26599/TST.2024.9010123
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices within Fifth Generation (5G) networks, typically equipped with Android systems, serve as a bridge to connect digital gadgets such as global positioning system, mobile devices, and wireless routers, which are vital in facilitating end-user communication requirements. However, the security of Android systems has been challenged by the sensitive data involved, leading to vulnerabilities in mobile devices used in 5G networks. These vulnerabilities expose mobile devices to cyber-attacks, primarily resulting from security gaps. Zero-permission apps in Android can exploit these channels to access sensitive information, including user identities, login credentials, and geolocation data. One such attack leverages "zero-permission" sensors like accelerometers and gyroscopes, enabling attackers to gather information about the smartphone's user. This underscores the importance of fortifying mobile devices against potential future attacks. Our research focuses on a new recurrent neural network prediction model, which has proved highly effective for detecting side-channel attacks in mobile devices in 5G networks. We conducted state-of-the-art comparative studies to validate our experimental approach. The results demonstrate that even a small amount of training data can accurately recognize 37.5% of previously unseen user-typed words. Moreover, our tap detection mechanism achieves a 92% accuracy rate, a crucial factor for text inference. These findings have significant practical implications, as they reinforce mobile device security in 5G networks, enhancing user privacy, and data protection.
引用
收藏
页码:1012 / 1026
页数:15
相关论文
共 35 条
[1]  
Ahmed Amjed Abbas, 2023, 2023 33rd International Telecommunication Networks and Applications Conference, P325, DOI 10.1109/ITNAC59571.2023.10368560
[2]  
Ahmed Amjed Abbas, 2023, 2023 33rd International Telecommunication Networks and Applications Conference, P57, DOI 10.1109/ITNAC59571.2023.10368563
[3]   Secure AI for 6G Mobile Devices: Deep Learning Optimization Against Side-Channel Attacks [J].
Ahmed, Amjed Abbas ;
Hasan, Mohammad Kamrul ;
Memon, Imran ;
Aman, Azana Hafizah Mohd ;
Islam, Shayla ;
Gadekallu, Thippa Reddy ;
Memon, Sufyan Ali .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) :3951-3959
[4]   Deep Learning Method for Power Side-Channel Analysis on Chip Leakages [J].
Ahmed, Amjed Abbas ;
Salim, Rana Ali ;
Hasan, Mohammad Kamrul .
ELEKTRONIKA IR ELEKTROTECHNIKA, 2023, 29 (06) :50-57
[5]   Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT [J].
Al-Aqrabi, Hussain ;
Johnson, Anju P. ;
Hill, Richard ;
Lane, Phil ;
Alsboui, Tariq .
SENSORS, 2020, 20 (07)
[6]  
Amjed A. A., 2024, Int. J. Comput. Digital Syst., V16, P341
[7]   A Real-Time Cache Side-Channel Attack Detection System on RISC-V Out-of-Order Processor [J].
Anh-Tien Le ;
Trong-Thuc Hoang ;
Ba-Anh Dao ;
Tsukamoto, Akira ;
Suzaki, Kuniyasu ;
Cong-Kha Pham .
IEEE ACCESS, 2021, 9 (164597-164612) :164597-164612
[8]   Multi-Dimensional Fusion Deep Learning for Side Channel Analysis [J].
Deng, Tuo ;
Wang, Huanyu ;
He, Dalin ;
Xiong, Naixue ;
Liang, Wei ;
Wang, Junnian .
ELECTRONICS, 2023, 12 (23)
[9]  
Felt A. P., 2011, P 1 ACM WORKSH SEC P, P3
[10]   When Physical Layer Key Generation Meets RIS: Opportunities, Challenges, and Road Ahead [J].
Gao, Ning ;
Han, Yu ;
Li, Nannan ;
Jin, Shi ;
Matthaiou, Michail .
IEEE WIRELESS COMMUNICATIONS, 2024, 31 (03) :355-361