2021
DOI: 10.1016/j.jisa.2021.102943
|View full text |Cite
|
Sign up to set email alerts
|

Toward securing the control plane of 5G mobile networks against DoS threats: Attack scenarios and promising solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…Such research includes securing MAC protocol and radio-control handshaking in the dynamic and sophisticated dynamic spectrum environment against the channel control against insider, credential-compromising, and dynamic jamming [17][18][19], against MAC injection and handshaking-manipulating threats [20,21], and against the threats on channel-stateinformation (CSI) feedback [22,23]. While these research use models are abstracted from the 5G protocol details and generally applicable to wireless communications, the threats apply to the concrete protocols of 5G NR RRC protocol standardized by 3GPP [24][25][26]. However, the research solutions for securing the specific 5G RRC protocol between the user and the base station have been lacking; rather, the 5G security research has focused on incorporating and implementing security on the backend core network beyond the base station, e.g., [27][28][29][30].…”
Section: Base Station Control Communication Securitymentioning
confidence: 99%
“…Such research includes securing MAC protocol and radio-control handshaking in the dynamic and sophisticated dynamic spectrum environment against the channel control against insider, credential-compromising, and dynamic jamming [17][18][19], against MAC injection and handshaking-manipulating threats [20,21], and against the threats on channel-stateinformation (CSI) feedback [22,23]. While these research use models are abstracted from the 5G protocol details and generally applicable to wireless communications, the threats apply to the concrete protocols of 5G NR RRC protocol standardized by 3GPP [24][25][26]. However, the research solutions for securing the specific 5G RRC protocol between the user and the base station have been lacking; rather, the 5G security research has focused on incorporating and implementing security on the backend core network beyond the base station, e.g., [27][28][29][30].…”
Section: Base Station Control Communication Securitymentioning
confidence: 99%