Automated Attack and Defense Framework toward 5G Security

被引:34
|
作者
Sun, Yanbin [1 ]
Tian, Zhihong [2 ]
Li, Mohan [1 ]
Zhu, Chunsheng [3 ,4 ]
Guizani, Nadra [5 ]
机构
[1] Guangzhou Univ, Guangzhou, Peoples R China
[2] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou, Peoples R China
[3] Southern Univ Sci & Technol, SUSTech Inst Future Networks, Shenzhen, Peoples R China
[4] Peng Cheng Lab, PCL Res Ctr Networks & Commun, Shenzhen, Peoples R China
[5] Washington State Univ, Sch Elect Engn & Comp Sci, Pullman, WA 99164 USA
来源
IEEE NETWORK | 2020年 / 34卷 / 05期
基金
中国国家自然科学基金;
关键词
5G mobile communication; Security; Software; Physical layer; Protocols; Internet of Things; Wireless communication; WIRELESS NETWORKS;
D O I
10.1109/MNET.011.1900635
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
5G networks are currently being developed rapidly and are dedicated to connect all things of the Internet with new technologies, components and services. Due to the crucial role of 5G, as well as new architectures and designs, 5G faces a great number of security threats and demands suitable security technologies. This article proposes an automated attack and defense framework toward 5G security with the aim of providing exploratory guidance for 5G security research. We first review the security challenges of attack/defense objects from the perspective of a hierarchical structure, and then propose a hierarchical security model that supports both single-layer security and cross-layer security. According to the hierarchical model, an automated attack and defense framework based on a security knowledge graph is proposed for both known and unknown security threats of 5G and provides possible directions toward 5G security automation.
引用
收藏
页码:247 / 253
页数:7
相关论文
共 50 条
  • [21] On Security Against Pollution Attacks in Network Coding Enabled 5G Networks
    Vasudevan, Vipindev Adat
    Tselios, Christos
    Politis, Ilias
    IEEE ACCESS, 2020, 8 : 38416 - 38437
  • [22] A Security Architecture for 5G Networks
    Arfaoul, Ghada
    Bisson, Pascal
    Blom, Rolf
    Borgaonkar, Ravishankar
    Englund, Hakan
    Felix, Edith
    Klaedtke, Felix
    Nakarmi, Prajwol Kumar
    Naslund, Mats
    O'Hanlon, Piers
    Papay, Juri
    Suomalainen, Jani
    Surridge, Mike
    Wary, Jean-Philippe
    Zahariev, Alexander
    IEEE ACCESS, 2018, 6 : 22466 - 22479
  • [23] The Security Aspect of 5G Fronthaul
    Wong, Marcus
    Prasad, Anand
    Soong, Anthony C. K.
    IEEE WIRELESS COMMUNICATIONS, 2022, 29 (02) : 116 - 122
  • [24] Active Computing Toward 5G Internet of Things
    Liu, Chunpeng
    Meng, Wei-Xiao
    Li, Cheng
    Ma, Maode
    IEEE WIRELESS COMMUNICATIONS, 2022, 29 (02) : 124 - 130
  • [25] 5G and the Future of Security in ICT
    Soldani, David
    2019 29TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2019,
  • [26] Necessity of Automated Vulnerability Assessment in Healthcare with the Emergence of 5G
    Khushal, Mahima
    Asif, Waqar
    2021 IEEE INTERNATIONAL SMART CITIES CONFERENCE (ISC2), 2021,
  • [27] 5G Wireless Security and Privacy: Architecture and Flexible Mechanisms
    Fang, Dongfeng
    Qian, Yi
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2020, 15 (02): : 58 - 64
  • [28] Physical Layer Security for Beyond 5G: Ultra Secure Low Latency Communications
    Yerrapragada, Anil Kumar
    Eisman, Taylor
    Kelley, Brian
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2021, 2 (02): : 2232 - 2242
  • [29] Review On The IT Security Attack And Defense
    Krit, Salah-ddine
    Haimoud, Elbachir
    2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [30] Session Management for Security Systems in 5G Standalone Network
    Park, Seongmin
    Kwon, Sungmoon
    Park, Youngkwon
    Kim, Dowon
    You, Ilsun
    IEEE ACCESS, 2022, 10 : 73421 - 73436