scholarly journals Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method

Sensors ◽  
2021 ◽  
Vol 22 (1) ◽  
pp. 9
Author(s):  
Hisham A. Kholidy

Overall, 5G networks are expected to become the backbone of many critical IT applications. With 5G, new tech advancements and innovation are expected; 5G currently operates on software-defined networking. This enables 5G to implement network slicing to meet the unique requirements of every application. As a result, 5G is more flexible and scalable than 4G LTE and previous generations. To avoid the growing risks of hacking, 5G cybersecurity needs some significant improvements. Some security concerns involve the network itself, while others focus on the devices connected to 5G. Both aspects present a risk to consumers, governments, and businesses alike. There is currently no real-time vulnerability assessment framework that specifically addresses 5G Edge networks, with regard to their real-time scalability and dynamic nature. This paper studies the vulnerability assessment in the 5G networks and develops an optimized dynamic method that integrates the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) with the hexagonal fuzzy numbers to accurately analyze the vulnerabilities in 5G networks. The proposed method considers both the vulnerability and 5G network dynamic factors such as latency and accessibility to find the potential attack graph paths where the attack might propagate in the network and quantifies the attack cost and security level of the network. We test and validate the proposed method using our 5G testbed and we compare the optimized method to the classical TOPSIS and the known vulnerability scanner tool, Nessus.

Author(s):  
Angelo Furno ◽  
Nour-Eddin El Faouzi ◽  
Rajesh Sharma ◽  
Valerio Cammarota ◽  
Eugenio Zimeo

2021 ◽  
Vol 18 (4) ◽  
pp. 1287-1293
Author(s):  
M. P. Haripriya ◽  
P. Venkadesh

The 5G mobile wireless network systems faces a lot of security issues due to the opening of network and its insecurity. The insecure network prone to various attacks and it disrupts secure data communications between legitimate users. Many works have addressed the security problems in 3G and 4G networks in efficient way through authentication and cryptographic techniques. But, the security in 5G networks during data communication was not improved. Subtractive Gradient Boost Clustered Node Authentication (SGBCNA) Method is introduced to perform secure data communication. The subtractive gradient boost clustering technique is applied to authenticate the mobile node as normal nodes and malicious nodes based on the selected features. The designed ensemble clustering model combines the weak learners to make final strong clustering results with minimum loss. Finally, the malicious nodes are eliminated and normal mobile nodes are taken for performing the secured communication in 5G networks. Simulation is carried out on factors such as authentication accuracy, computation overhead and security level with respect to a number of mobile nodes and data packets. The observed outcomes clearly illustrate that the SGBCNA Method efficiently improves node authentication accuracy, security level with minimum overhead than the state-of-the-art-methods.


2021 ◽  
Author(s):  
Long D. Nguyen ◽  
Trung Q. Duong ◽  
Hoang D. Tuan

Author(s):  
Mohamed Lahby

In recent years, the development and the deployment of different generation systems such as 3G (UMTS, Wi-Fi), 4G (LTE, WIMAX), and 5G have become a reality for different telecommunication operators. At the same time, the development of new mobile devices with multiple interfaces have shifted the behavior of users concerning the utilization of the internet. Additionally, several streaming servers are available to provide real time applications such as e-commerce transactions, video streaming, online gaming, etc. As a result, the users have the privilege to use different multimedia applications at anytime and anywhere. The major trend in Beyond 4G networks is determining the best access network for the end user in terms of quality of service (QoS) during the network selection decision. Thus, in this article, the authors investigate graph theory and the AHP approach to deal with the network selection issue. The experimental results show that the proposed policy can achieve a significant performance in terms of QoS metrics for real-time streaming than conventional algorithms.


2014 ◽  
Vol 696 ◽  
pp. 266-270
Author(s):  
Hong Li Chen

This paper briefly describes the main ideas and implementation of technology strategy of Embedded real-time system security level assessment which is important part of mechanism to system flexibility based on embedded real-time system, designs the embedded real-time system security level assessment system based on pattern matching for the characteristics of embedded real-time systems. By building security level assessment system and simulation testing environment based on RT-Linux real-time operating system, the impact of Embedded real-time system security level assessment strategy on performance of RT-Linux was tested.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 53671-53683 ◽  
Author(s):  
Pengze Guo ◽  
Ming Liu ◽  
Jun Wu ◽  
Zhi Xue ◽  
Xiangjian He

2019 ◽  
Vol 2019 ◽  
pp. 1-16
Author(s):  
Peyman Jafary ◽  
Antti Supponen ◽  
Mikko Salmenperä ◽  
Sami Repo

In an electrical distribution network, Logic Selectivity significantly reduces both the number and duration of outages. Generic Object-Oriented Substation Events (GOOSE) have a key role in the decision-making process of substation protection devices using GOOSE-based Logic Selectivity. GOOSE messages are exchanged between remote protection devices over the communication network. Secured communication with low latency and high reliability is therefore required in order to ensure reliable operation as well as meeting real-time requirement of the Logic Selectivity application. There is thus a need to evaluate feasibility of the selected communication network technology for Logic Selectivity use cases. This paper analyzes reliability of cellular 4G/LTE Internet for GOOSE communication in a Logic Selectivity application. For this purpose, experimental lab set-ups are introduced for different configurations: ordinary GOOSE communication, secured GOOSE communication by IPsec in Transport mode, and redundant GOOSE communication using the IEC 62439-3 Parallel Redundancy Protocol. In each configuration, the GOOSE retransmissions are recorded for a period of three days and the average GOOSE transmission time is measured. Furthermore, the measured data is classified into histograms and a probability value for communication reliability, based on the transmission time, is calculated. The statistical analysis shows that 4G Internet satisfies the real-time and reliability requirements for secure and highly available GOOSE-based Logic Selectivity.


2018 ◽  
Vol 46 (3) ◽  
pp. 1-6
Author(s):  
Carol Davids ◽  
Vijay K. Gurbani ◽  
Gaston Ormazabal ◽  
Andrew Rollins ◽  
Kundan Singh ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document