Towards 5G-based IoT security analysis against Vo5G eavesdropping

نویسندگان

چکیده

Abstract With the advent of 5G technology, enhanced Mobile Broadband technology is translating 5G-based Internet Things (IoT) such as smart home/building into reality. advances, security must mitigate greater risks associated with faster and more accessible technology. The IoT analysis crucial to Technology, which will eventually expand extensively massive machine-type communications Ultra-Reliable Low Latency Communications. This paper analyses countermeasures verification methods eavesdropping vulnerabilities within devices that use current Non-Standalone (NSA) network system. hierarchical structure was evaluated for vulnerability analysis, performed separately Access Stratum (AS), Non-Access (NAS), Protocol (IP) Multimedia Subsystem (IMS). AS keystream reuse, NAS null-ciphering, IMS IPsec off were tested on mobile carrier networks validate it NSA well. A countermeasure against each presented, our Intrusion Detection System based these successfully detected presented controlled attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Step Towards Checking Security in IoT

The Internet of Things (IoT) is pervading our everyday life. As a consequence, it is crucial to formally reason about IoT systems, to understand and govern the emerging technology shifts. In a companion paper [6], we introduced IOT-LYSA, a dialect of LYSA [5, 8], within the process calculi approach to IoT [16, 18]. It has primitive constructs to describe the activity of sensors and of actuators...

متن کامل

Complex Systems Science meets 5G and IoT

We propose a new paradigm for telecommunications, and develop a framework drawing on concepts from information (i.e., different metrics of complexity) and computational (i.e., agent based modeling) theory, adapted from complex system science. We proceed in a systematic fashion by dividing network complexity understanding and analysis into different layers. Modelling layer forms the foundation o...

متن کامل

Complex protection against eavesdropping

QM-5000 is an advanced network system for complex object protection against eavesdropping. The system allows remote control of up to 10000 MRA-5Q (or older MRA-3Q) memory radio analyzers and DMC-3Q mobile communication detectors from one PC. QM5000 can control up to 200 QME (Ethernet) buses and up to 9 local COM buses. Up to 128 MRA-5Q or DMC-3Q can be connected to each bus. The QME (Ethernet) ...

متن کامل

Remote Security Surveillance by IoT Based Robot

This paper presents the control of terrorist attack throughout the world by monitoring and controlling of mobile robot via internet through Raspberry pi board. The monitoring and controlling of robotic movements through wireless network by using a web browser and accessing a webpage through an IP address. A camera is mounted on the robot to get better visibility of the objects. The programming ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computing

سال: 2021

ISSN: ['0010-485X', '1436-5057']

DOI: https://doi.org/10.1007/s00607-020-00855-0