Automated Attack and Defense Framework toward 5G Security

被引:37
作者
Sun, Yanbin [1 ]
Tian, Zhihong [2 ]
Li, Mohan [1 ]
Zhu, Chunsheng [3 ,4 ]
Guizani, Nadra [5 ]
机构
[1] Guangzhou Univ, Guangzhou, Peoples R China
[2] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou, Peoples R China
[3] Southern Univ Sci & Technol, SUSTech Inst Future Networks, Shenzhen, Peoples R China
[4] Peng Cheng Lab, PCL Res Ctr Networks & Commun, Shenzhen, Peoples R China
[5] Washington State Univ, Sch Elect Engn & Comp Sci, Pullman, WA 99164 USA
来源
IEEE NETWORK | 2020年 / 34卷 / 05期
基金
中国国家自然科学基金;
关键词
5G mobile communication; Security; Software; Physical layer; Protocols; Internet of Things; Wireless communication; WIRELESS NETWORKS;
D O I
10.1109/MNET.011.1900635
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
5G networks are currently being developed rapidly and are dedicated to connect all things of the Internet with new technologies, components and services. Due to the crucial role of 5G, as well as new architectures and designs, 5G faces a great number of security threats and demands suitable security technologies. This article proposes an automated attack and defense framework toward 5G security with the aim of providing exploratory guidance for 5G security research. We first review the security challenges of attack/defense objects from the perspective of a hierarchical structure, and then propose a hierarchical security model that supports both single-layer security and cross-layer security. According to the hierarchical model, an automated attack and defense framework based on a security knowledge graph is proposed for both known and unknown security threats of 5G and provides possible directions toward 5G security automation.
引用
收藏
页码:247 / 253
页数:7
相关论文
共 15 条
[1]   Next Generation 5G Wireless Networks: A Comprehensive Survey [J].
Agiwal, Mamta ;
Roy, Abhishek ;
Saxena, Navrati .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03) :1617-1655
[2]   Overview of 5G Security Challenges and Solutions [J].
Ahmad, Ijaz ;
Kumar, Tanesh ;
Liyanage, Madhusanka ;
Okwuibe, Jude ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE Communications Standards Magazine, 2018, 2 (01) :36-43
[3]  
[Anonymous], 2015, 5G White Paper
[4]  
[Anonymous], CISC VIS NETW IND GL
[5]   Security in wireless sensor networks [J].
Du, Xiaojiang ;
Chen, Hsiao-Hwa .
IEEE WIRELESS COMMUNICATIONS, 2008, 15 (04) :60-66
[6]   A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks [J].
Du, Xiaojiang ;
Guizani, Mohsen ;
Xiao, Yang ;
Chen, Hsiao-Hwa .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1223-1229
[7]   NFV: State of the Art, Challenges, and Implementation in Next Generation Mobile Networks (vEPC) [J].
Hawilo, Hassan ;
Shami, Abdallah ;
Mirahmadi, Maysam ;
Asal, Rasool .
IEEE NETWORK, 2014, 28 (06) :18-26
[8]  
Hutchins E, 2011, PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, P113
[9]   ULTRA-RELIABLE AND LOW-LATENCY COMMUNICATIONS IN 5G DOWNLINK: PHYSICAL LAYER ASPECTS [J].
Ji, Hyoungju ;
Park, Sunho ;
Yeo, Jeongho ;
Kim, Younsun ;
Lee, Juho ;
Shim, Byonghyo .
IEEE WIRELESS COMMUNICATIONS, 2018, 25 (03) :124-130
[10]   Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges [J].
Liu, Yiliang ;
Chen, Hsiao-Hwa ;
Wang, Liangmin .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (01) :347-376