Automated Attack and Defense Framework toward 5G Security

被引:34
|
作者
Sun, Yanbin [1 ]
Tian, Zhihong [2 ]
Li, Mohan [1 ]
Zhu, Chunsheng [3 ,4 ]
Guizani, Nadra [5 ]
机构
[1] Guangzhou Univ, Guangzhou, Peoples R China
[2] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou, Peoples R China
[3] Southern Univ Sci & Technol, SUSTech Inst Future Networks, Shenzhen, Peoples R China
[4] Peng Cheng Lab, PCL Res Ctr Networks & Commun, Shenzhen, Peoples R China
[5] Washington State Univ, Sch Elect Engn & Comp Sci, Pullman, WA 99164 USA
来源
IEEE NETWORK | 2020年 / 34卷 / 05期
基金
中国国家自然科学基金;
关键词
5G mobile communication; Security; Software; Physical layer; Protocols; Internet of Things; Wireless communication; WIRELESS NETWORKS;
D O I
10.1109/MNET.011.1900635
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
5G networks are currently being developed rapidly and are dedicated to connect all things of the Internet with new technologies, components and services. Due to the crucial role of 5G, as well as new architectures and designs, 5G faces a great number of security threats and demands suitable security technologies. This article proposes an automated attack and defense framework toward 5G security with the aim of providing exploratory guidance for 5G security research. We first review the security challenges of attack/defense objects from the perspective of a hierarchical structure, and then propose a hierarchical security model that supports both single-layer security and cross-layer security. According to the hierarchical model, an automated attack and defense framework based on a security knowledge graph is proposed for both known and unknown security threats of 5G and provides possible directions toward 5G security automation.
引用
收藏
页码:247 / 253
页数:7
相关论文
共 50 条
  • [41] DSM Attack Resistant Slice Selection in 5G
    Sathi, Vipin N.
    Murthy, C. Siva Ram
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (07) : 1469 - 1473
  • [42] 5G Security: Analysis of Threats and Solutions
    Ahmad, Ijaz
    Kumar, Tanesh
    Liyanage, Madhusanka
    Okwuibe, Jude
    Ylianttila, Mika
    Gurtov, Andrei
    2017 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), 2017, : 193 - 199
  • [43] Detection of Overshadowing Attack in 4G and 5G Networks
    Dai, Jiongyu
    Saeed, Usama
    Wang, Ying
    Pan, Yanjun
    Wang, Haining
    Kornegay, Kevin T.
    Liu, Lingjia
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, 32 (06) : 4615 - 4628
  • [44] IRS-Assisted Physical Layer Security for 5G Enabled Industrial Internet of Things
    Ali, Bakhtiar
    Mirza, Jawad
    Alvi, Sajid Hussain
    Khan, Mohammad Zubair
    Javed, Muhammad Awais
    Noorwali, Abdulfattah
    IEEE ACCESS, 2023, 11 : 21354 - 21363
  • [45] 5G
    Shankaranarayanan N.K.
    Ghosh A.
    2017, Institute of Electrical and Electronics Engineers Inc., United States (21) : 8 - 10
  • [46] Integration of VANET and 5G Security: A review of design and implementation issues
    Hussain, Rasheed
    Hussain, Fatima
    Zeadally, Sherali
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 843 - 864
  • [47] A Preliminary Security Assessment of 5G V2X
    Lautenbach, Aljoscha
    Nowdehi, Nasser
    Olovsson, Tomas
    Zaragatzky, Romi
    2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING), 2019,
  • [48] A Survey on Security Aspects for 3GPP 5G Networks
    Cao, Jin
    Ma, Maode
    Li, Hui
    Ma, Ruhui
    Sun, Yunqing
    Yu, Pu
    Xiong, Lihui
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 170 - 195
  • [49] Toward the Integration and Convergence Between 5G and TSN Technologies and Architectures for Industrial Communications: A Survey
    Sasiain, Jorge
    Franco, David
    Atutxa, Asier
    Astorga, Jasone
    Jacob, Eduardo
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2025, 27 (01): : 259 - 321
  • [50] Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks
    Ahmed, Amjed A.
    Hasan, Mohammad Kamrul
    Alqahtani, Ali
    Islam, Shayla
    Pandey, Bishwajeet
    Rzayeva, Leila
    Abbas, Huda Saleh
    Aman, Azana Hafizah Mohd
    Alqahtani, Nayef
    TSINGHUA SCIENCE AND TECHNOLOGY, 2025, 30 (03): : 1012 - 1026