Survey on 5G Physical Layer Security Threats and Countermeasures

dc.contributor.authorHarvánek, Michalcs
dc.contributor.authorBolcek, Jancs
dc.contributor.authorKufa, Jancs
dc.contributor.authorPolák, Ladislavcs
dc.contributor.authorŠimka, Marekcs
dc.contributor.authorMaršálek, Romancs
dc.coverage.issue17cs
dc.coverage.volume24cs
dc.date.accessioned2024-10-14T09:03:29Z
dc.date.available2024-10-14T09:03:29Z
dc.date.issued2024-08-26cs
dc.description.abstractWith the expansion of wireless mobile networks into both the daily lives of individuals as well as into the widely developing market of connected devices, communication is an increasingly attractive target for attackers. As the complexity of mobile cellular systems grows and the respective countermeasures are implemented to secure data transmissions, the attacks have become increasingly sophisticated on the one hand, but at the same time the system complexity can open up expanded opportunities for security and privacy breaches. After an in-depth summary of possible entry points to attacks to mobile networks, this paper first briefly reviews the basic principles of the physical layer implementation of 4G/5G systems, then gives an overview of possible attacks from a physical layer perspective. It also provides an overview of the software frameworks and hardware tool-software defined radios currently in use for experimenting with 4G/5G mobile networks, and it discusses their basic capabilities. In the final part, the paper summarizes the currently most promising families of techniques to detect illegitimate base stations-the machine-learning-based, localization-based, and behavior-based methods.en
dc.formattextcs
dc.format.extent1-40cs
dc.format.mimetypeapplication/pdfcs
dc.identifier.citationSENSORS. 2024, vol. 24, issue 17, p. 1-40.en
dc.identifier.doi10.3390/s24175523cs
dc.identifier.issn1424-8220cs
dc.identifier.orcid0000-0002-6353-1859cs
dc.identifier.orcid0009-0008-0271-6543cs
dc.identifier.orcid0000-0002-3784-5707cs
dc.identifier.orcid0000-0001-7084-6210cs
dc.identifier.orcid0000-0002-7958-834Xcs
dc.identifier.orcid0000-0003-2926-5507cs
dc.identifier.other189608cs
dc.identifier.scopus56880305800cs
dc.identifier.scopus36167253100cs
dc.identifier.urihttps://hdl.handle.net/11012/249485
dc.language.isoencs
dc.publisherMDPIcs
dc.relation.ispartofSENSORScs
dc.relation.urihttps://www.mdpi.com/1424-8220/24/17/5523cs
dc.rightsCreative Commons Attribution 4.0 Internationalcs
dc.rights.accessopenAccesscs
dc.rights.sherpahttp://www.sherpa.ac.uk/romeo/issn/1424-8220/cs
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/cs
dc.subject4Gen
dc.subject5Gen
dc.subjectsecurity vulnerabilitiesen
dc.subjectPhysical Layer (PHY)en
dc.subjectmachine learningen
dc.subjecteavesdroppingen
dc.subjectjammingen
dc.subjectspoofingen
dc.subjectlocalizationen
dc.titleSurvey on 5G Physical Layer Security Threats and Countermeasuresen
dc.type.driverarticleen
dc.type.statusPeer-revieweden
dc.type.versionpublishedVersionen
eprints.grantNumberinfo:eu-repo/grantAgreement/MV0/VJ/VJ03030044cs
sync.item.dbidVAV-189608en
sync.item.dbtypeVAVen
sync.item.insts2024.10.14 11:03:29en
sync.item.modts2024.10.07 16:32:04en
thesis.grantorVysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií. Ústav radioelektronikycs
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
sensors2405523v3.pdf
Size:
1010.18 KB
Format:
Adobe Portable Document Format
Description:
file sensors2405523v3.pdf