Detection of Overshadowing Attack in 4G and 5G Networks

被引:0
|
作者
Dai, Jiongyu [1 ]
Saeed, Usama [1 ]
Wang, Ying [2 ]
Pan, Yanjun [3 ]
Wang, Haining [1 ]
Kornegay, Kevin T. [4 ]
Liu, Lingjia [1 ]
机构
[1] Virginia Tech, Wireless Virginia Tech, Bradley Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
[2] Stevens Inst Technol, Hoboken, NJ 07030 USA
[3] Univ Arkansas, Dept Elect Engn & Comp Sci, Fayetteville, AR 72701 USA
[4] Morgan State Univ, Dept Elect & Comp Engn, Baltimore, MD 21251 USA
关键词
5G mobile communication; Jamming; Open RAN; Downlink; Synchronization; Symbols; Computer architecture; Base stations; Accuracy; Protocols; Overshadowing; attack detection; reservoir computing; O-RAN;
D O I
10.1109/TNET.2024.3421371
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Despite the promises of current and future cellular networks to increase security, privacy, and robustness, 5G networks are designed to streamline discovery and initiate connections with limited computation and communication costs, leading to the predictability of control channels. This predictability enables signal-level attacks, particularly on unprotected initial access signals. To assess vulnerability in access control and enhance robustness in cellular networks, we present a strategic approach leveraging O-RAN architecture in this paper that detects and classifies signal-level attacks for actionable countermeasure defense. We evaluate attack scenarios of various power levels on both 4G/LTE-Advanced and 5G communication systems. We categorize the types of attack models based on the attack cost: Overshadowing and Jamming. Overshadowing represents low attack power categories with time and frequency synchronization, while Jamming represents un-targeted attacks that cause similar quality-of-service degradation as overshadowing attacks but require high power levels. Our detection strategy relies on supervised machine-learning models, specifically a Reservoir Computing (RC) based supervised learning approach that leverages physical and MAC-layer information for attack detection and classification. We demonstrate the efficacy of our detection strategy through extensive experimental evaluations using the O-RAN platform with software-defined radios (SDRs) and commercial off-the-shelf (COTS) user equipment (UEs). Empirical results show that our method can classify the change in statistics caused by most overshadowing and jamming attacks with more than 95% classification accuracy.
引用
收藏
页码:4615 / 4628
页数:14
相关论文
共 50 条
  • [21] 5G:超越4G的存在
    王雪玉
    金融科技时代, 2016, (03) : 84 - 84
  • [22] 推广5G,莫忘4G服务
    项立刚
    中国品牌, 2019, (11) : 92 - 92
  • [23] Migration and Interworking between 4G and 5G
    Suthar, Prakash
    Agarwal, Vivek
    Shetty, Rajaneesh Sudhakar
    Jangam, Anil
    2020 IEEE 3RD 5G WORLD FORUM (5GWF), 2020, : 401 - 406
  • [24] 5G Service on Your 4G Phone?
    Bleicher, Ariel
    IEEE SPECTRUM, 2014, 51 (04) : 12 - 18
  • [25] 4G and 5G technologies: A Comparative Study
    Hajlaoui, Emna
    Zaier, Aida
    Khlifi, Abdelhakim
    Ghodhbane, Jihed
    Ben Hamed, Mouna
    Sbita, Lassaad
    2020 5TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SIGNAL AND IMAGE PROCESSING (ATSIP'2020), 2020,
  • [26] Electrical Reconfigurability in Modern 4G, 4G/5G and 5G Antennas: A Critical Review of Polarization and Frequency Reconfigurable Designs
    Alhamad, Razan
    Almajali, Eqab
    Mahmoud, Soliman
    IEEE ACCESS, 2023, 11 : 29215 - 29233
  • [27] Integrating Network Function Virtualization with SDR and SDN for 4G/5G Networks
    Sun, Songlin
    Kadoch, Michel
    Gong, Liang
    Rong, Bo
    IEEE NETWORK, 2015, 29 (03): : 54 - 59
  • [28] Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks
    Fraunholz, Daniel
    Brunke, Dominik
    Dumanski, Lorenz
    Koenig, Hartmut
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2022, 2023, 13877 : 192 - 207
  • [29] A survey on authentication and access control for mobile networks: from 4G to 5G
    Shanay Behrad
    Emmanuel Bertin
    Noel Crespi
    Annals of Telecommunications, 2019, 74 : 593 - 603
  • [30] Stealthy Remote Collection of Call Statistics in 4G/5G Mobile Networks
    Chen, Kai-Wen
    Tung, Li-Ping
    Phan, Tai Tan
    Li, Chi-Yu
    2024 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, ISCC 2024, 2024,