POSTER: Towards Secure 5G Infrastructures for Production Systems
- URL: http://arxiv.org/abs/2401.13306v1
- Date: Wed, 24 Jan 2024 09:01:02 GMT
- Title: POSTER: Towards Secure 5G Infrastructures for Production Systems
- Authors: Martin Henze, Maximilian Ortmann, Thomas Vogt, Osman Ugus, Kai Hermann, Svenja Nohr, Zeren Lu, Sotiris Michaelides, Angela Massonet, Robert H. Schmitt,
- Abstract summary: We present approaches to prevent attacks through authentication and redundant communication.
We also present approaches to detect anomalies and jamming, and respond to detected attacks through device exclusion and accountability measures.
- Score: 1.856919806607829
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: To meet the requirements of modern production, industrial communication increasingly shifts from wired fieldbus to wireless 5G communication. Besides tremendous benefits, this shift introduces severe novel risks, ranging from limited reliability over new security vulnerabilities to a lack of accountability. To address these risks, we present approaches to (i) prevent attacks through authentication and redundant communication, (ii) detect anomalies and jamming, and (iii) respond to detected attacks through device exclusion and accountability measures.
Related papers
- Secure Physical Layer Communications for Low-Altitude Economy Networking: A Survey [76.36166980302478]
The Low-Altitude Economy Networking (LAENet) is emerging as a transformative paradigm.
Physical layer communications in the LAENet face growing security threats due to inherent characteristics of aerial communication environments.
This survey comprehensively reviews existing secure countermeasures for physical layer communication in the LAENet.
arXiv Detail & Related papers (2025-04-12T09:36:53Z) - An Approach to Technical AGI Safety and Security [72.83728459135101]
We develop an approach to address the risk of harms consequential enough to significantly harm humanity.
We focus on technical approaches to misuse and misalignment.
We briefly outline how these ingredients could be combined to produce safety cases for AGI systems.
arXiv Detail & Related papers (2025-04-02T15:59:31Z) - AI and Semantic Communication for Infrastructure Monitoring in 6G-Driven Drone Swarms [0.0]
Traditional infrastructure monitoring systems face critical bottlenecks-5G networks lack the latency and reliability for large-scale drone coordination.
We propose a 6G-enabled drone swarm system that integrates ultra-reliable, low-latency communications, edge AI, and semantic communication to automate inspections.
arXiv Detail & Related papers (2025-02-26T17:05:35Z) - Security Analysis of 5G NR Device-to-Device Sidelink Communications [7.044125601403848]
This paper presents the first comprehensive security analysis of NR V2X sidelink.
We identify vulnerabilities across critical procedures and demonstrate plausible attack.
We propose mitigation strategies to enhance the security of 5G sidelink communications.
arXiv Detail & Related papers (2025-02-23T16:55:32Z) - Bridging the Security Gap: Lessons from 5G and What 6G Should Do Better [1.3505077405741583]
This paper provides a set of security recommendations for 6G networks.
It focuses on access and handover procedures, which often lack encryption and integrity protection.
It concludes with actionable recommendations to enhance the security, resilience, and robustness of 6G access and handover mechanisms.
arXiv Detail & Related papers (2025-01-19T13:44:17Z) - Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
We propose Authenticated Cyclic Redundancy Integrity Check (ACRIC)
ACRIC preserves backward compatibility without requiring additional hardware and is protocol agnostic.
We show that ACRIC offers robust security with minimal transmission overhead ( 1 ms)
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - Secure Integration of 5G in Industrial Networks: State of the Art, Challenges and Opportunities [2.7082111912355877]
We describe the state-of-the-art and derive recommendations for the secure integration of 5G into industrial networks.
We identify opportunities to utilize 5G to further enhance security and indicate remaining challenges.
arXiv Detail & Related papers (2024-08-29T18:00:17Z) - Securing Distributed Network Digital Twin Systems Against Model Poisoning Attacks [19.697853431302768]
Digital twins (DTs) embody real-time monitoring, predictive, and enhanced decision-making capabilities.
This study investigates the security challenges in distributed network DT systems, which potentially undermine the reliability of subsequent network applications.
arXiv Detail & Related papers (2024-07-02T03:32:09Z) - A Survey on Security of Ultra/Hyper Reliable Low Latency Communication: Recent Advancements, Challenges, and Future Directions [22.82467063401074]
Ultra-reliable low latency communication (URLLC) is an innovative service offered by fifth-generation (5G) wireless systems.
PLS techniques have emerged as a powerful alternative to the complex cryptography-based security approaches for facilitating secure URLLC.
arXiv Detail & Related papers (2024-04-11T23:39:39Z) - A Zero Trust Framework for Realization and Defense Against Generative AI
Attacks in Power Grid [62.91192307098067]
This paper proposes a novel zero trust framework for a power grid supply chain (PGSC)
It facilitates early detection of potential GenAI-driven attack vectors, assessment of tail risk-based stability measures, and mitigation of such threats.
Experimental results show that the proposed zero trust framework achieves an accuracy of 95.7% on attack vector generation, a risk measure of 9.61% for a 95% stable PGSC, and a 99% confidence in defense against GenAI-driven attack.
arXiv Detail & Related papers (2024-03-11T02:47:21Z) - Detectors for Safe and Reliable LLMs: Implementations, Uses, and Limitations [76.19419888353586]
Large language models (LLMs) are susceptible to a variety of risks, from non-faithful output to biased and toxic generations.
We present our efforts to create and deploy a library of detectors: compact and easy-to-build classification models that provide labels for various harms.
arXiv Detail & Related papers (2024-03-09T21:07:16Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Artificial Intelligence Empowered Multiple Access for Ultra Reliable and
Low Latency THz Wireless Networks [76.89730672544216]
Terahertz (THz) wireless networks are expected to catalyze the beyond fifth generation (B5G) era.
To satisfy the ultra-reliability and low-latency demands of several B5G applications, novel mobility management approaches are required.
This article presents a holistic MAC layer approach that enables intelligent user association and resource allocation, as well as flexible and adaptive mobility management.
arXiv Detail & Related papers (2022-08-17T03:00:24Z) - Safe Perception -- A Hierarchical Monitor Approach [0.0]
We propose a novel hierarchical monitoring approach for AI-based perception systems.
It can reliably detect detection misses, and at the same time has a very low false alarm rate.
arXiv Detail & Related papers (2022-08-01T13:09:24Z) - Adversarial Attacks On Multi-Agent Communication [80.4392160849506]
Modern autonomous systems will soon be deployed at scale, opening up the possibility for cooperative multi-agent systems.
Such advantages rely heavily on communication channels which have been shown to be vulnerable to security breaches.
In this paper, we explore such adversarial attacks in a novel multi-agent setting where agents communicate by sharing learned intermediate representations.
arXiv Detail & Related papers (2021-01-17T00:35:26Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.