Online Schedule Randomization to Mitigate Timing Attacks in 5G Periodic URLLC Communications

نویسندگان

چکیده

Ultra-reliable low-latency communication (URLLC) in 5G networks is designed to support time-critical applications such as industrial control systems (ICSs), where user equipment (UEs) communicate with a base station (BS) very high reliability and low latency. Most of these communications ICSs are periodic associated hard deadlines. To provide reliable service while satisfying the deadlines, BS usually reserves slots frequencies precomputes schedule for UEs. The same repeats over time, which makes predictable. However, an attacker can exploit this aspect launch timing attacks disrupting specific communication, thereby, undermining safety system. mitigate attacks, we present online strategy that randomizes scheduled time without violating flow We use Kullback-Leibler divergence measure randomness schedules generated by our reference hypothetical truly random strategy. perform security analysis proposed using Prediction Probability predictability schedules. evaluate performance against state-of-the-art baseline, show performs better than baseline across all parameter settings.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Tor security against timing and traffic analysis attacks with fair randomization

The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...

متن کامل

Run-Time Randomization to Mitigate Tampering

The problem of defending software against tampering by a malicious host is not expected to be solved soon. Rather than trying to defend against the first attack, randomization tries to minimize the impact of a successful attack. Unfortunately, widespread adoption of this technique is hampered by its incompatibility with the current software distribution model, which requires identical physical ...

متن کامل

Securing Statically-verified Communications Protocols Against Timing Attacks

We present a federated analysis of communication protocols which considers both security properties and timing. These are not entirely independent observations of a protocol; by using timing observations of an executing protocol it is possible to calculate encryption keys which were intended to be secret or to deduce derived information about the nature of the communication even in the presence...

متن کامل

Joint Scheduling of URLLC and eMBB Traffic in 5G Wireless Networks

Emerging 5G systems will need to efficiently support both broadband traffic (eMBB) and ultra-low-latency (URLLC) traffic. In these systems, time is divided into slots which are further sub-divided into minislots. From a scheduling perspective, eMBB resource allocations occur at slot boundaries, whereas to reduce latency URLLC traffic is pre-emptively overlapped at the minislot timescale, result...

متن کامل

Introduction to Ultra Reliable and Low Latency Communications in 5G

New wave of the technology revolution, often referred to as the fourth industrial revolution, is changing the way we live, work, and communicate with each other. These days, we are witnessing the emergence of unprecedented services and applications requiring lower latency, better reliability massive connection density, and improved energy efficiency. In accordance with this trend and change, in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Sensor Networks

سال: 2023

ISSN: ['1550-4859', '1550-4867']

DOI: https://doi.org/10.1145/3600093