مورد إلكتروني

A Model-Driven Security Analysis Approach for 5G Communications in Industrial Systems

التفاصيل البيبلوغرافية
العنوان: A Model-Driven Security Analysis Approach for 5G Communications in Industrial Systems
بيانات النشر: Institute of Electrical and Electronics Engineers Inc. 2023
تفاصيل مُضافة: Li, Xinge
Hu, Xiaoya
Zhang, Rongqing
Zhou, Chunjie
Yin, Quan
Yang, Liuqing
نوع الوثيقة: Electronic Resource
مستخلص: 5G communication network has become a major pillar in the evolution of interconnected industrial systems. However, the introduction of 5G network may lead to unknown risks in the systems. To reveal the impact of network threats on 5G-based industrial systems, a 5G network security analysis approach combining formal modeling and attack penetration is proposed. Firstly, the 5G network models based on topology and transmission events are established to cope with diverse and hidden attack routes and behaviors. Then, the attack module is integrated into the network model. With attack penetration to the models, potential vulnerabilities are exploited and quantified based on the hierarchical-topology model, and network reliability is evaluated based on the transmission-event model. The simulation results identify and quantify network vulnerabilities under various attacks, including access authentication failure, destruction of data integrity, illegal control of Network Functions (NFs), and malicious consumption of shared slicing resources. Meanwhile, a more unpredictable outcome is that there is a threshold of access probability, a, to measure the impacts of attacks against the bearer network and core network on reliability. Finally, a practical case about the impact of network security on a 5G-based coupled-tank system is discussed, which further proves the feasibility of our approach. IEEE
مصطلحات الفهرس: 5G, 5G mobile communication, Analytical models, Attack penetration, Authentication, Behavioral sciences, Formal modeling, Network topology, Reliability, Reliability assessment, Security, Security analysis, Vulnerability identification, Article
URL: https://repository.hkust.edu.hk/ir/Record/1783.1-121146
https://doi.org/10.1109/TWC.2022.3199378
http://lbdiscover.ust.hk/uresolver?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rfr_id=info:sid/HKUST:SPI&rft.genre=article&rft.issn=1536-1276&rft.volume=&rft.issue=&rft.date=2022&rft.spage=1&rft.aulast=Li&rft.aufirst=&rft.atitle=A+Model-Driven+Security+Analysis+Approach+for+5G+Communications+in+Industrial+Systems&rft.title=IEEE+Transactions+on+Wireless+Communications
http://www.scopus.com/record/display.url?eid=2-s2.0-85137586384&origin=inward
http://gateway.isiknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcAuth=LinksAMR&SrcApp=PARTNER_APP&DestLinkType=FullRecord&DestApp=WOS&KeyUT=000965534000001
الإتاحة: Open access content. Open access content
ملاحظة: English
أرقام أخرى: HNK oai:repository.hkust.edu.hk:1783.1-121146
IEEE Transactions on Wireless Communications, v. 22, (2), February 2023, article number 9865867, p. 889-902
1536-1276
1558-2248
1363080968
المصدر المساهم: HONG KONG UNIV OF SCI & TECH, THE
From OAIster®, provided by the OCLC Cooperative.
رقم الأكسشن: edsoai.on1363080968
قاعدة البيانات: OAIster