Attacks Against Mobility Prediction in 5G Networks
- URL: http://arxiv.org/abs/2402.19319v1
- Date: Thu, 29 Feb 2024 16:24:19 GMT
- Title: Attacks Against Mobility Prediction in 5G Networks
- Authors: Syafiq Al Atiiq, Yachao Yuan, Christian Gehrmann, Jakob Sternby, Luis
Barriga
- Abstract summary: We show that there are potential mobility attacks that can compromise the accuracy of these predictions.
In a semi-realistic scenario with 10,000 subscribers, we demonstrate that an adversary equipped with the ability to hijack cellular mobile devices can significantly reduce the prediction accuracy from 75% to 40%.
While a defense mechanism largely depends on the attack and the mobility types in a particular area, we prove that a basic KMeans clustering is effective in distinguishing legitimate and adversarial UEs.
- Score: 2.1374208474242815
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The $5^{th}$ generation of mobile networks introduces a new Network Function
(NF) that was not present in previous generations, namely the Network Data
Analytics Function (NWDAF). Its primary objective is to provide advanced
analytics services to various entities within the network and also towards
external application services in the 5G ecosystem. One of the key use cases of
NWDAF is mobility trajectory prediction, which aims to accurately support
efficient mobility management of User Equipment (UE) in the network by
allocating ``just in time'' necessary network resources. In this paper, we show
that there are potential mobility attacks that can compromise the accuracy of
these predictions. In a semi-realistic scenario with 10,000 subscribers, we
demonstrate that an adversary equipped with the ability to hijack cellular
mobile devices and clone them can significantly reduce the prediction accuracy
from 75\% to 40\% using just 100 adversarial UEs. While a defense mechanism
largely depends on the attack and the mobility types in a particular area, we
prove that a basic KMeans clustering is effective in distinguishing legitimate
and adversarial UEs.
Related papers
- Graph Neural Networks for O-RAN Mobility Management: A Link Prediction Approach [0.6839513244334282]
Mobility performance has been a key focus in cellular networks up to 5G.
This article proposes a proactive HO framework for mobility management in O-RAN.
We explore various categories of Graph Neural Networks (GNNs) for link prediction and analyze the complexity of applying them to the mobility management domain.
arXiv Detail & Related papers (2025-02-04T09:44:41Z) - Smooth Handovers via Smoothed Online Learning [48.953313950521746]
We first analyze an extensive dataset from a commercial mobile network operator (MNO) in Europe with more than 40M users, to understand and reveal important features and performance impacts on HOs.
Our findings highlight a correlation between HO failures/delays, and the characteristics of radio cells and end-user devices.
We propose a realistic system model for smooth and accurate HOs that extends existing approaches by incorporating device and cell features on HO optimization.
arXiv Detail & Related papers (2025-01-14T13:16:33Z) - TIMESAFE: Timing Interruption Monitoring and Security Assessment for Fronthaul Environments [25.43682473591802]
We show how a spoofing attack is able to cause a production-ready O-RAN and 5G-compliant private cellular base station to catastrophically fail within 2 seconds of the attack.
To counter this, we design a Machine Learning-based monitoring solution capable of detecting various malicious attacks with over 97.5% accuracy.
arXiv Detail & Related papers (2024-12-17T16:13:37Z) - FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids [53.2306792009435]
FaultGuard is the first framework for fault type and zone classification resilient to adversarial attacks.
We propose a low-complexity fault prediction model and an online adversarial training technique to enhance robustness.
Our model outclasses the state-of-the-art for resilient fault prediction benchmarking, with an accuracy of up to 0.958.
arXiv Detail & Related papers (2024-03-26T08:51:23Z) - Artificial Intelligence Empowered Multiple Access for Ultra Reliable and
Low Latency THz Wireless Networks [76.89730672544216]
Terahertz (THz) wireless networks are expected to catalyze the beyond fifth generation (B5G) era.
To satisfy the ultra-reliability and low-latency demands of several B5G applications, novel mobility management approaches are required.
This article presents a holistic MAC layer approach that enables intelligent user association and resource allocation, as well as flexible and adaptive mobility management.
arXiv Detail & Related papers (2022-08-17T03:00:24Z) - Cybersecurity Threats in Connected and Automated Vehicles based
Federated Learning Systems [7.979659145328856]
Federated learning (FL) aims at training an algorithm across decentralized entities holding their local data private.
Most cyber defense techniques depend on highly reliable and connected networks.
This paper explores falsified information attacks, which target the FL process that is ongoing at the RSU.
arXiv Detail & Related papers (2021-02-26T01:39:16Z) - Adversarial Attacks on Deep Learning Based Power Allocation in a Massive
MIMO Network [62.77129284830945]
We show that adversarial attacks can break DL-based power allocation in the downlink of a massive multiple-input-multiple-output (maMIMO) network.
We benchmark the performance of these attacks and show that with a small perturbation in the input of the neural network (NN), the white-box attacks can result in infeasible solutions up to 86%.
arXiv Detail & Related papers (2021-01-28T16:18:19Z) - Deep-Mobility: A Deep Learning Approach for an Efficient and Reliable 5G
Handover [0.0]
5G cellular networks are being deployed all over the world and this architecture supports ultra-dense network (UDN) deployment.
Small cells have a very important role in providing 5G connectivity to the end users.
In contrast to any traditional handover improvement scheme, we develop a 'Deep-Mobility' model by implementing a deep learning neural network (DLNN) to manage network mobility.
arXiv Detail & Related papers (2021-01-17T00:31:37Z) - Defence against adversarial attacks using classical and quantum-enhanced
Boltzmann machines [64.62510681492994]
generative models attempt to learn the distribution underlying a dataset, making them inherently more robust to small perturbations.
We find improvements ranging from 5% to 72% against attacks with Boltzmann machines on the MNIST dataset.
arXiv Detail & Related papers (2020-12-21T19:00:03Z) - Long Short Term Memory Networks for Bandwidth Forecasting in Mobile
Broadband Networks under Mobility [6.112377814215607]
We introduce HINDSIGHT++, an open-source framework for bandwidth forecasting experimentation in MBB networks.
We primarily focus on bandwidth forecasting for Fifth Generation (5G) networks.
In particular, we leverage 5Gophers, the first open-source attempt to measure network performance on operational 5G networks in the US.
arXiv Detail & Related papers (2020-11-20T18:59:27Z) - Measurement-driven Security Analysis of Imperceptible Impersonation
Attacks [54.727945432381716]
We study the exploitability of Deep Neural Network-based Face Recognition systems.
We show that factors such as skin color, gender, and age, impact the ability to carry out an attack on a specific target victim.
We also study the feasibility of constructing universal attacks that are robust to different poses or views of the attacker's face.
arXiv Detail & Related papers (2020-08-26T19:27:27Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.