Autonomous Adaptive Security Framework for 5G-Enabled IoT
- URL: http://arxiv.org/abs/2406.03186v1
- Date: Tue, 4 Jun 2024 13:17:04 GMT
- Title: Autonomous Adaptive Security Framework for 5G-Enabled IoT
- Authors: Habtamu Abie, Sandeep Pirbhulal,
- Abstract summary: 5G can provide more rapid connection speeds, lower latency, faster downloads, and capability to connect more devices.
5G-enabled IoT networks increase systems vulnerabilities to security threats due to these dynamics.
This task specifies new adaptive strategies of security intelligence with associated scenarios to meet the challenges of 5G-IoT characteristics.
- Score: 0.8738214980779235
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In IoT-based critical sectors, 5G can provide more rapid connection speeds, lower latency, faster downloads, and capability to connect more devices due to the introduction of new dynamics such as softwarization and virtualization. 5G-enabled IoT networks increase systems vulnerabilities to security threats due to these dynamics. Consequently, adaptive cybersecurity solutions need to be developed for 5G-enabled IoT applications to protect them against potential cyber-attacks. This task specifies new adaptive strategies of security intelligence with associated scenarios to meet the challenges of 5G-IoT characteristics. In this task we have also developed an autonomous adaptive security framework which can protect 5G-enabaled IoT dynamically and autonomously. The framework is based on a closed feedback loop of advanced analytics to monitor, analyse, and adapt to evolving threats to 5G-enanled IoT applications.
Related papers
- An Approach To Enhance IoT Security In 6G Networks Through Explainable AI [1.9950682531209158]
6G communication has evolved significantly, with 6G offering groundbreaking capabilities, particularly for IoT.
The integration of IoT into 6G presents new security challenges, expanding the attack surface due to vulnerabilities introduced by advanced technologies.
Our research addresses these challenges by utilizing tree-based machine learning algorithms to manage complex datasets and evaluate feature importance.
arXiv Detail & Related papers (2024-10-04T20:14:25Z) - Advanced Penetration Testing for Enhancing 5G Security [0.0]
This paper reviews penetration testing approaches for identifying security vulnerabilities in 5G networks.
It examines ways adversaries exploit vulnerabilities in 5G networks, covering tactics and strategies targeted at 5G features.
Our research indicates that 5G penetration testing should use a multithreaded approach for addressing current security challenges.
arXiv Detail & Related papers (2024-07-24T13:35:35Z) - Penetration Testing of 5G Core Network Web Technologies [53.89039878885825]
We present the first security assessment of the 5G core from a web security perspective.
We use the STRIDE threat modeling approach to define a complete list of possible threat vectors and associated attacks.
Our analysis shows that all these cores are vulnerable to at least two of our identified attack vectors.
arXiv Detail & Related papers (2024-03-04T09:27:11Z) - Generative AI for Secure Physical Layer Communications: A Survey [80.0638227807621]
Generative Artificial Intelligence (GAI) stands at the forefront of AI innovation, demonstrating rapid advancement and unparalleled proficiency in generating diverse content.
In this paper, we offer an extensive survey on the various applications of GAI in enhancing security within the physical layer of communication networks.
We delve into the roles of GAI in addressing challenges of physical layer security, focusing on communication confidentiality, authentication, availability, resilience, and integrity.
arXiv Detail & Related papers (2024-02-21T06:22:41Z) - DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles [61.394095512765304]
Dynamic Wireless Power Transfer (DWPT) is a novel technology that allows charging an electric vehicle while driving.
Recent advancements in quantum computing jeopardize classical public key cryptography.
We propose DynamiQS, the first post-quantum secure authentication protocol for dynamic wireless charging.
arXiv Detail & Related papers (2023-12-20T09:40:45Z) - In-situ Model Downloading to Realize Versatile Edge AI in 6G Mobile
Networks [61.416494781759326]
In-situ model downloading aims to achieve transparent and real-time replacement of on-device AI models by downloading from an AI library in the network.
A key component of the presented framework is a set of techniques that dynamically compress a downloaded model at the depth-level, parameter-level, or bit-level.
We propose a 6G network architecture customized for deploying in-situ model downloading with the key feature of a three-tier (edge, local, and central) AI library.
arXiv Detail & Related papers (2022-10-07T13:41:15Z) - Enabling a Zero Trust Architecture in a 5G-enabled Smart Grid [0.0]
A smart grid (SG) requires a prompt and dependable connection to provide real-time monitoring through the IoT.
5G could be considered a catalyst for upgrading the existing power grid systems.
This article analyzes the Zero Trust (ZT) architecture specific to the power system of IoT and uses that knowledge to develop a security protection architecture.
arXiv Detail & Related papers (2022-10-04T16:57:33Z) - Artificial Intelligence Empowered Multiple Access for Ultra Reliable and
Low Latency THz Wireless Networks [76.89730672544216]
Terahertz (THz) wireless networks are expected to catalyze the beyond fifth generation (B5G) era.
To satisfy the ultra-reliability and low-latency demands of several B5G applications, novel mobility management approaches are required.
This article presents a holistic MAC layer approach that enables intelligent user association and resource allocation, as well as flexible and adaptive mobility management.
arXiv Detail & Related papers (2022-08-17T03:00:24Z) - Machine Learning Assisted Security Analysis of 5G-Network-Connected
Systems [5.918387680589584]
5G networks have transitioned to software-defined infrastructures.
New technologies, like network function virtualization and software-defined networking, have been incorporated in the 5G core network (5GCN) architecture to enable this transition.
This article presents a comprehensive security analysis framework for the 5GCN.
arXiv Detail & Related papers (2021-08-07T20:07:08Z) - To Talk or to Work: Energy Efficient Federated Learning over Mobile
Devices via the Weight Quantization and 5G Transmission Co-Design [49.95746344960136]
Federated learning (FL) is a new paradigm for large-scale learning tasks across mobile devices.
It is not clear how to establish an effective wireless network architecture to support FL over mobile devices.
We develop a wireless transmission and weight quantization co-design for energy efficient FL over heterogeneous 5G mobile devices.
arXiv Detail & Related papers (2020-12-21T01:13:44Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.