Towards 5G-based IoT security analysis against Vo5G eavesdropping
نویسندگان
چکیده
Abstract With the advent of 5G technology, enhanced Mobile Broadband technology is translating 5G-based Internet Things (IoT) such as smart home/building into reality. advances, security must mitigate greater risks associated with faster and more accessible technology. The IoT analysis crucial to Technology, which will eventually expand extensively massive machine-type communications Ultra-Reliable Low Latency Communications. This paper analyses countermeasures verification methods eavesdropping vulnerabilities within devices that use current Non-Standalone (NSA) network system. hierarchical structure was evaluated for vulnerability analysis, performed separately Access Stratum (AS), Non-Access (NAS), Protocol (IP) Multimedia Subsystem (IMS). AS keystream reuse, NAS null-ciphering, IMS IPsec off were tested on mobile carrier networks validate it NSA well. A countermeasure against each presented, our Intrusion Detection System based these successfully detected presented controlled attacks.
منابع مشابه
A Step Towards Checking Security in IoT
The Internet of Things (IoT) is pervading our everyday life. As a consequence, it is crucial to formally reason about IoT systems, to understand and govern the emerging technology shifts. In a companion paper [6], we introduced IOT-LYSA, a dialect of LYSA [5, 8], within the process calculi approach to IoT [16, 18]. It has primitive constructs to describe the activity of sensors and of actuators...
متن کاملComplex Systems Science meets 5G and IoT
We propose a new paradigm for telecommunications, and develop a framework drawing on concepts from information (i.e., different metrics of complexity) and computational (i.e., agent based modeling) theory, adapted from complex system science. We proceed in a systematic fashion by dividing network complexity understanding and analysis into different layers. Modelling layer forms the foundation o...
متن کاملComplex protection against eavesdropping
QM-5000 is an advanced network system for complex object protection against eavesdropping. The system allows remote control of up to 10000 MRA-5Q (or older MRA-3Q) memory radio analyzers and DMC-3Q mobile communication detectors from one PC. QM5000 can control up to 200 QME (Ethernet) buses and up to 9 local COM buses. Up to 128 MRA-5Q or DMC-3Q can be connected to each bus. The QME (Ethernet) ...
متن کاملRemote Security Surveillance by IoT Based Robot
This paper presents the control of terrorist attack throughout the world by monitoring and controlling of mobile robot via internet through Raspberry pi board. The monitoring and controlling of robotic movements through wireless network by using a web browser and accessing a webpage through an IP address. A camera is mounted on the robot to get better visibility of the objects. The programming ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computing
سال: 2021
ISSN: ['0010-485X', '1436-5057']
DOI: https://doi.org/10.1007/s00607-020-00855-0