Attack modeling and intrusion detection system for 5G wireless communication network

被引:13
|
作者
Gupta, Akhil [1 ]
Jha, Rakesh Kumar [1 ]
Jain, Sanjeev [2 ]
机构
[1] Shri Mata Vaishno Devi Univ, Dept Elect & Commun Engn, Katra, Jammu & Kashmir, India
[2] Shri Mata Vaishno Devi Univ, Dept Comp Sci & Engn, Katra, Jammu & Kashmir, India
关键词
5G; bandwidth spoofing; game theory; hidden Markov model; intrusion detection system;
D O I
10.1002/dac.3237
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Research has been going around the globe to overcome the challenges that are associated with the increase in the number of users, such as interference management, load sharing, and increased capacity. 5G is emerging as a budding prospect for fulfilling demand and overcoming these challenges. For meeting the increased demands, new technologies such as relays in device-to-device communication and small cell access points have been introduced. However, these introductions have opened up security issues in the 5G wireless communication networks. This article focuses on security issues of the 5G wireless communication networks and analyzes the effect of a bandwidth spoofing attack using game theory on the small cell access point in 5G wireless communication network. This article also proposes an adaptive intrusion detection system using a hidden Markov Model for detecting an intrusion on small cell access point in a 5G wireless communication networks.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] 5G SUCI Catcher: Attack and Detection
    Barraud, Lorens
    Caccavale, Francesco
    Peyrat, Jean-Baptiste
    Malouli, Wissam
    Capdevielle, Veronique
    Khalife, Hicham
    Cavalli, Ana Rosa
    2023 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE, CLOUDCOM 2023, 2023, : 285 - 290
  • [32] Next Generation ITS Implementation Aspects in 5G Wireless Communication Network
    Gajewski, Slawomir
    2017 15TH INTERNATIONAL CONFERENCE ON ITS TELECOMMUNICATIONS (ITST), 2017,
  • [33] Cyber-Attack Detection and Mitigation Using SVM for 5G Network
    Alshunaifi, Sulaiman Yousef
    Mishra, Shailendra
    AlShehri, Mohammed Abdul Rahman
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 31 (01): : 13 - 28
  • [34] Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining
    Huang, Jen-Yan
    Liao, I-En
    Chung, Yu-Fang
    Chen, Kuen-Tzung
    INFORMATION SCIENCES, 2013, 231 : 32 - 44
  • [35] Detection of Data Symbol in a Massive MIMO Systems for 5G Wireless Communication
    Duangsuwan, Sarun
    Jamjareegulgarn, Punyawi
    2017 INTERNATIONAL ELECTRICAL ENGINEERING CONGRESS (IEECON), 2017,
  • [36] A Bayesian game model and network availability model for small cells under denial of service (DoS) attack in 5G wireless communication network
    Lalropuia, K. C.
    Gupta, Vandana
    WIRELESS NETWORKS, 2020, 26 (01) : 557 - 572
  • [37] A Bayesian game model and network availability model for small cells under denial of service (DoS) attack in 5G wireless communication network
    K. C. Lalropuia
    Vandana Gupta
    Wireless Networks, 2020, 26 : 557 - 572
  • [38] Queueing system with preemptions for modeling network slicing in 5G
    Ivanova, Dania, V
    Zhbankova, Elena A.
    Markova, Ekaterina, V
    Gaidamaka, Yuliya, V
    VESTNIK TOMSKOGO GOSUDARSTVENNOGO UNIVERSITETA-UPRAVLENIE VYCHISLITELNAJA TEHNIKA I INFORMATIKA-TOMSK STATE UNIVERSITY JOURNAL OF CONTROL AND COMPUTER SCIENCE, 2023, (65): : 36 - 46
  • [39] Spoofing Attack Detection in Mm-Wave and Massive MIMO 5G Communication
    Wang, Ning
    Tang, Jie
    Zeng, Kai
    2019 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2019,
  • [40] Wireless Network Evolution Toward 5G Network
    Adachi, Fumiyuki
    2016 21ST OPTOELECTRONICS AND COMMUNICATIONS CONFERENCE (OECC) HELD JOINTLY WITH 2016 INTERNATIONAL CONFERENCE ON PHOTONICS IN SWITCHING (PS), 2016,