Survey on 5G Physical Layer Security Threats and Countermeasures
dc.contributor.author | Harvánek, Michal | cs |
dc.contributor.author | Bolcek, Jan | cs |
dc.contributor.author | Kufa, Jan | cs |
dc.contributor.author | Polák, Ladislav | cs |
dc.contributor.author | Šimka, Marek | cs |
dc.contributor.author | Maršálek, Roman | cs |
dc.coverage.issue | 17 | cs |
dc.coverage.volume | 24 | cs |
dc.date.accessioned | 2024-10-14T09:03:29Z | |
dc.date.available | 2024-10-14T09:03:29Z | |
dc.date.issued | 2024-08-26 | cs |
dc.description.abstract | With the expansion of wireless mobile networks into both the daily lives of individuals as well as into the widely developing market of connected devices, communication is an increasingly attractive target for attackers. As the complexity of mobile cellular systems grows and the respective countermeasures are implemented to secure data transmissions, the attacks have become increasingly sophisticated on the one hand, but at the same time the system complexity can open up expanded opportunities for security and privacy breaches. After an in-depth summary of possible entry points to attacks to mobile networks, this paper first briefly reviews the basic principles of the physical layer implementation of 4G/5G systems, then gives an overview of possible attacks from a physical layer perspective. It also provides an overview of the software frameworks and hardware tool-software defined radios currently in use for experimenting with 4G/5G mobile networks, and it discusses their basic capabilities. In the final part, the paper summarizes the currently most promising families of techniques to detect illegitimate base stations-the machine-learning-based, localization-based, and behavior-based methods. | en |
dc.format | text | cs |
dc.format.extent | 1-40 | cs |
dc.format.mimetype | application/pdf | cs |
dc.identifier.citation | SENSORS. 2024, vol. 24, issue 17, p. 1-40. | en |
dc.identifier.doi | 10.3390/s24175523 | cs |
dc.identifier.issn | 1424-8220 | cs |
dc.identifier.orcid | 0000-0002-6353-1859 | cs |
dc.identifier.orcid | 0009-0008-0271-6543 | cs |
dc.identifier.orcid | 0000-0002-3784-5707 | cs |
dc.identifier.orcid | 0000-0001-7084-6210 | cs |
dc.identifier.orcid | 0000-0002-7958-834X | cs |
dc.identifier.orcid | 0000-0003-2926-5507 | cs |
dc.identifier.other | 189608 | cs |
dc.identifier.scopus | 56880305800 | cs |
dc.identifier.scopus | 36167253100 | cs |
dc.identifier.uri | https://hdl.handle.net/11012/249485 | |
dc.language.iso | en | cs |
dc.publisher | MDPI | cs |
dc.relation.ispartof | SENSORS | cs |
dc.relation.uri | https://www.mdpi.com/1424-8220/24/17/5523 | cs |
dc.rights | Creative Commons Attribution 4.0 International | cs |
dc.rights.access | openAccess | cs |
dc.rights.sherpa | http://www.sherpa.ac.uk/romeo/issn/1424-8220/ | cs |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | cs |
dc.subject | 4G | en |
dc.subject | 5G | en |
dc.subject | security vulnerabilities | en |
dc.subject | Physical Layer (PHY) | en |
dc.subject | machine learning | en |
dc.subject | eavesdropping | en |
dc.subject | jamming | en |
dc.subject | spoofing | en |
dc.subject | localization | en |
dc.title | Survey on 5G Physical Layer Security Threats and Countermeasures | en |
dc.type.driver | article | en |
dc.type.status | Peer-reviewed | en |
dc.type.version | publishedVersion | en |
eprints.grantNumber | info:eu-repo/grantAgreement/MV0/VJ/VJ03030044 | cs |
sync.item.dbid | VAV-189608 | en |
sync.item.dbtype | VAV | en |
sync.item.insts | 2024.10.14 11:03:29 | en |
sync.item.modts | 2024.10.07 16:32:04 | en |
thesis.grantor | Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií. Ústav radioelektroniky | cs |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- sensors2405523v3.pdf
- Size:
- 1010.18 KB
- Format:
- Adobe Portable Document Format
- Description:
- file sensors2405523v3.pdf