Course Hero Logo

Ii jamming jamming unlike eavesdropping and traffic

This preview shows page 9 - 11 out of 16 pages.

II.JammingJamming, unlike eavesdropping and traffic analysis, will fully interrupt legitimate user communications.Figure 5b depicts a jamming attack. The malicious node can cause deliberate intrusion, causinglegitimate users' data communications to be interrupted. Jamming can also make it impossible forapproved users to access radio services. Active attack solutions are usually detection-based.III.Dos and DDosAn adversary's network resources can be depleted by DoS attacks. DoS is a network availability breachcaused by a security attack. A DoS assault can be launched using jamming. When there are severaldistributed adversaries, a DDoS can be created. A DDoS model is shown in Figure 5c. Both DoS and DDoSare active attacks that can be used at various layers. Detection is currently used to identify DoS and DDoSattacks. DoS and DDoS will undoubtedly become a major challenge for operators as the penetration oflarge devices in 5G wireless networks increases. In 5G wireless networks, DoS and DDoS attacks will use alarge number of connected devices to target the access network. A DoS attack can be classified as eithera network infrastructure DoS attack or a device/user DoS attack, depending on the target. A DoS attackon network infrastructure can target the signalling plane, user plane, management plane, supportsystems, radio resources, logical and physical resources, and so on. DoS attacks on devices and users cantarget battery, memory, disc, Processor, radio, actuators, and sensors.
IV.MITMThe attacker secretly takes control of the communication channel between two legitimate parties in anMITM attack. The MITM attacker has the ability to intercept, alter, and overwrite communicationmessages sent between two legitimate parties. A MITM assault is depicted in Figure 5d. MITM is a formof active attack that can be launched at various levels. MITM attacks, in particular, are designed tojeopardize data security, integrity, and availability. MITM attack is one of the most common securitythreats, according to Verizon's data investigation study. False base station based MITM is an attack inwhich an attacker induces a legitimate user to build a link with a fake base transceiver station in a legacycellular network [42]. To avoid false base station-based MITM, mutual authentication between themobile device and the base station is usually used.Network security in 5G and privacy solution in a systematic wayThe new design, technologies, and use cases in 5G wireless networks introduce new security featuresand specifications. Authentication (entity authentication, message authentication), confidentiality (dataconfidentiality, privacy), availability, and honesty are the four types of security services coveredthroughout this section.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 16 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
NoProfessor
Tags
Information Security, Computer Security, Denial of service attack, man in the middle attack

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture