Towards 5G-based IoT security analysis against Vo5G eavesdropping
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kwon, Sungmoon | - |
dc.contributor.author | Park, Seongmin | - |
dc.contributor.author | Cho, HyungJin | - |
dc.contributor.author | Park, Youngkwon | - |
dc.contributor.author | Kim, Dowon | - |
dc.contributor.author | Yim, Kangbin | - |
dc.date.accessioned | 2021-09-10T05:50:30Z | - |
dc.date.available | 2021-09-10T05:50:30Z | - |
dc.date.issued | 2021-03 | - |
dc.identifier.issn | 0010-485X | - |
dc.identifier.issn | 1436-5057 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/18951 | - |
dc.description.abstract | With the advent of 5G technology, the enhanced Mobile Broadband technology is translating 5G-based Internet of Things (IoT) such as smart home/building into reality. With such advances, security must mitigate greater risks associated with faster and more accessible technology. The 5G-based IoT security analysis is crucial to IoT Technology, which will eventually expand extensively into massive machine-type communications and Ultra-Reliable Low Latency Communications. This paper analyses the countermeasures and verification methods of eavesdropping vulnerabilities within IoT devices that use the current 5G Non-Standalone (NSA) network system. The network hierarchical structure of 5G-based IoT was evaluated for vulnerability analysis, performed separately for 5G Access Stratum (AS), Non-Access Stratum (NAS), and Internet Protocol (IP) Multimedia Subsystem (IMS). AS keystream reuse, NAS null-ciphering, and IMS IPsec off vulnerabilities were tested on mobile carrier networks to validate it on the 5G NSA network as well. A countermeasure against each vulnerability was presented, and our Intrusion Detection System based on these countermeasures successfully detected the presented controlled attacks. | - |
dc.format.extent | 23 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Springer Verlag | - |
dc.title | Towards 5G-based IoT security analysis against Vo5G eavesdropping | - |
dc.type | Article | - |
dc.publisher.location | 오스트리아 | - |
dc.identifier.doi | 10.1007/s00607-020-00855-0 | - |
dc.identifier.scopusid | 2-s2.0-85098670088 | - |
dc.identifier.wosid | 000604463600002 | - |
dc.identifier.bibliographicCitation | Computing (Vienna/New York), v.103, no.3, pp 425 - 447 | - |
dc.citation.title | Computing (Vienna/New York) | - |
dc.citation.volume | 103 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 425 | - |
dc.citation.endPage | 447 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordAuthor | IoT | - |
dc.subject.keywordAuthor | 5G | - |
dc.subject.keywordAuthor | Eavesdropping | - |
dc.subject.keywordAuthor | Vo5G | - |
dc.subject.keywordAuthor | 5G NSA | - |
dc.subject.keywordAuthor | 5G security | - |
dc.subject.keywordAuthor | IDS | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.