Linked e-resources

Details

Intro
Preface
Organization
Contents
5G Advanced and 6G Security
Attacks Against Security Context in 5G Network
1 Introduction
2 Background
2.1 USIM
2.2 5G Registration Procedure
2.3 5G Security Context
3 Modeling the Fast Registration Procedure in ProVerif
3.1 Security Assumptions
3.2 Security Goals
3.3 Overview of ProVerif
3.4 Formalizing Security Goals
3.5 ProVerif Model of the Fast Registration Procedure
4 Vulnerabilities
5 Attacks
5.1 Attack Model
5.2 Experimental Setup
5.3 Impersonation Using the Security Context in USIM

5.4 Impersonation Using the Security Context in Baseband Chip
5.5 Other Attacks
6 Countermeasures
7 Related Work
8 Conclusion
References
A Systematic Approach to Security Management in the MonB5G Architecture
1 Introduction
2 Threats Related to the Network Slicing Ecosystem
3 Related Work on Network Slicing Security
4 Management Decomposition in the MonB5G Architecture
4.1 SOSS Role in NS Runtime Management
4.2 DOSS Role in NS Runtime Management
4.3 IDMO Role in NS Runtime Management
4.4 GOSS Role in NS Runtime Management

4.5 IOSS Role in NS Runtime Management
5 Network Slicing Security Mechanisms in the MonB5G Architecture
5.1 Usage of SOSS Mechanisms for Security
5.2 Usage of DOSS Mechanisms for Security
5.3 Usage of IDMO Mechanisms for Security
5.4 Usage of IOSS Mechanisms for Security
5.5 Usage of GOSS Mechanisms for Security
6 Examples of the Usage of the Approach
6.1 DDoS Attack on the NS User Plane
6.2 Attack on the NS Control Plane
6.3 DDoS Attack on the Management Plane
6.4 Situation Awareness
7 Conclusions
References
A Study on 5G Security Activities in Japan

1 Introduction
2 5G Security Guideline
2.1 Security Threat Analysis
2.2 Security Measure Requirements
3 Toward Local 5G Deployment
4 Local 5G Security Guideline
5 Conclusion
References
Spatial Multiplexing Techniques and Multifrequency Cells for Massive Machine-type Communications in Future 6G Networks
1 Introduction
2 State of the Art
3 Multifrequency Cells and Spatial Multiplexing for 6G mMTC
3.1 Device Clusters and Analog One-bit Modulation
3.2 Native 6G Cells
4 Experimental Validation: Simulation Results
5 Security Challenges and Considerations

6 Conclusions and Future Works
References
Building and Utilizing Small-Scale Testbed for Research on 5G SA Network-Related Security Vulnerabilities
1 Introduction
2 Related Work
2.1 5G Testbed
2.2 Security Threats in 5G NSA Networks
3 Background
3.1 5G SA System Architecture
3.2 5G SA Registration Procedure and PDU Session Establishment
4 5G SA Network Testbed Toolkits
4.1 5G SA Core
4.2 5G SA RAN and UE
5 Testbeds Build
6 Consideration
7 Conclusion
References
AI for Security
Parameters Transfer Framework for Multi-domain Fake News Detection

Browse Subjects

Show more subjects...

Statistics

from
to
Export