Secure 5G Positioning With Truth Discovery, Attack Detection, and Tracing
نویسندگان
چکیده
The fifth-generation (5G) cellular network is expected to provide submeter positioning accuracy without draining the battery of user equipment (UE). As a solution, ultradense (UDN) deployment and network-based were proposed. However, openness UDN vulnerability devices [e.g., access nodes (ANs)] make it easy for attackers poison such system. no existing work explores how overcome this issue. This article concentrates on jamming collusion attacks in Specifically, we design novel scheme that contains three functional modules erase influence these attacks. A truth discovery module applies clustering-based method aiming generate most approximate position value find out suspicious signals. Based neural models, further develop an attack detection tracing perceive attacked UE locate malicious or ANs. Through simulation, conduct extensive experiments illustrate effectiveness our scheme. result shows high with very simple which also implies potential proposed practical deployment.
منابع مشابه
Truth Discovery with Memory Network
Truth discovery is to resolve conflicts and find the truth from multiple-source statements. Conventional methods mostly research based on the mutual effect between the reliability of sources and the credibility of statements, however, pay no attention to the mutual effect among the credibility of statements about the same object. We propose memory network based models to incorporate these two i...
متن کاملTruth Discovery and Copying Detection in a Dynamic World
Modern information management applications often require integrating data from a variety of data sources, some of which may copy or buy data from other sources. When these data sources model a dynamically changing world (e.g., people’s contact information changes over time, restaurants open and go out of business), sources often provide out-of-date data. Errors can also creep into data when sou...
متن کاملPractical and Secure PCM Systems via Online Attack Detection
Phase Change Memory (PCM) may become a viable alternative for the design of main memory systems in the next few years. However PCM suffers from limited write endurance. Therefore future adoption of PCM as a technology for main memory will depend on the availability of practical solutions for wear leveling that avoids uneven usage especially in the presence of potentially malicious users. First ...
متن کاملTruth Discovery: CoTruth
. More and more people choose to obtain news online in today’s world. However, in recent times, there exists many fake claims on web. Rumor detection has been a popular topic. Recent search on truth discovery still doesn’t satisfy the realistic requirments now. As most of them focus on structured data, others proposed a new method to detect fake news with unstructured data. That is combine sour...
متن کاملTracing Technique for Blaster Attack
Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in differe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Internet of Things Journal
سال: 2022
ISSN: ['2372-2541', '2327-4662']
DOI: https://doi.org/10.1109/jiot.2021.3088852