Secure 5G Positioning With Truth Discovery, Attack Detection, and Tracing

نویسندگان

چکیده

The fifth-generation (5G) cellular network is expected to provide submeter positioning accuracy without draining the battery of user equipment (UE). As a solution, ultradense (UDN) deployment and network-based were proposed. However, openness UDN vulnerability devices [e.g., access nodes (ANs)] make it easy for attackers poison such system. no existing work explores how overcome this issue. This article concentrates on jamming collusion attacks in Specifically, we design novel scheme that contains three functional modules erase influence these attacks. A truth discovery module applies clustering-based method aiming generate most approximate position value find out suspicious signals. Based neural models, further develop an attack detection tracing perceive attacked UE locate malicious or ANs. Through simulation, conduct extensive experiments illustrate effectiveness our scheme. result shows high with very simple which also implies potential proposed practical deployment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Truth Discovery with Memory Network

Truth discovery is to resolve conflicts and find the truth from multiple-source statements. Conventional methods mostly research based on the mutual effect between the reliability of sources and the credibility of statements, however, pay no attention to the mutual effect among the credibility of statements about the same object. We propose memory network based models to incorporate these two i...

متن کامل

Truth Discovery and Copying Detection in a Dynamic World

Modern information management applications often require integrating data from a variety of data sources, some of which may copy or buy data from other sources. When these data sources model a dynamically changing world (e.g., people’s contact information changes over time, restaurants open and go out of business), sources often provide out-of-date data. Errors can also creep into data when sou...

متن کامل

Practical and Secure PCM Systems via Online Attack Detection

Phase Change Memory (PCM) may become a viable alternative for the design of main memory systems in the next few years. However PCM suffers from limited write endurance. Therefore future adoption of PCM as a technology for main memory will depend on the availability of practical solutions for wear leveling that avoids uneven usage especially in the presence of potentially malicious users. First ...

متن کامل

Truth Discovery: CoTruth

. More and more people choose to obtain news online in today’s world. However, in recent times, there exists many fake claims on web. Rumor detection has been a popular topic. Recent search on truth discovery still doesn’t satisfy the realistic requirments now. As most of them focus on structured data, others proposed a new method to detect fake news with unstructured data. That is combine sour...

متن کامل

Tracing Technique for Blaster Attack

Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in differe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Internet of Things Journal

سال: 2022

ISSN: ['2372-2541', '2327-4662']

DOI: https://doi.org/10.1109/jiot.2021.3088852