مورد إلكتروني
A Model-Driven Security Analysis Approach for 5G Communications in Industrial Systems
العنوان: | A Model-Driven Security Analysis Approach for 5G Communications in Industrial Systems |
---|---|
بيانات النشر: | Institute of Electrical and Electronics Engineers Inc. 2023 |
تفاصيل مُضافة: | Li, Xinge Hu, Xiaoya Zhang, Rongqing Zhou, Chunjie Yin, Quan Yang, Liuqing |
نوع الوثيقة: | Electronic Resource |
مستخلص: | 5G communication network has become a major pillar in the evolution of interconnected industrial systems. However, the introduction of 5G network may lead to unknown risks in the systems. To reveal the impact of network threats on 5G-based industrial systems, a 5G network security analysis approach combining formal modeling and attack penetration is proposed. Firstly, the 5G network models based on topology and transmission events are established to cope with diverse and hidden attack routes and behaviors. Then, the attack module is integrated into the network model. With attack penetration to the models, potential vulnerabilities are exploited and quantified based on the hierarchical-topology model, and network reliability is evaluated based on the transmission-event model. The simulation results identify and quantify network vulnerabilities under various attacks, including access authentication failure, destruction of data integrity, illegal control of Network Functions (NFs), and malicious consumption of shared slicing resources. Meanwhile, a more unpredictable outcome is that there is a threshold of access probability, a, to measure the impacts of attacks against the bearer network and core network on reliability. Finally, a practical case about the impact of network security on a 5G-based coupled-tank system is discussed, which further proves the feasibility of our approach. IEEE |
مصطلحات الفهرس: | 5G, 5G mobile communication, Analytical models, Attack penetration, Authentication, Behavioral sciences, Formal modeling, Network topology, Reliability, Reliability assessment, Security, Security analysis, Vulnerability identification, Article |
URL: | |
الإتاحة: | Open access content. Open access content |
ملاحظة: | English |
أرقام أخرى: | HNK oai:repository.hkust.edu.hk:1783.1-121146 IEEE Transactions on Wireless Communications, v. 22, (2), February 2023, article number 9865867, p. 889-902 1536-1276 1558-2248 1363080968 |
المصدر المساهم: | HONG KONG UNIV OF SCI & TECH, THE From OAIster®, provided by the OCLC Cooperative. |
رقم الأكسشن: | edsoai.on1363080968 |
قاعدة البيانات: | OAIster |
الوصف غير متاح. |