Secure Handover Management Against False Base Station Attacks
نویسندگان
چکیده
False Base Stations attack raises concerns about data privacy during handover process in 5G networks. Broadcasting of measurement reports unveils the need security assessment since a false base station can send stronger signal to User Equipment (UE) establish connection with itself. This may cause leakage information. Thus, fundamental solution is protect encryption algorithms. In this paper, we identify vulnerabilities and simulate scenario, where deployed UEs be connected it process. order prevent this, propose secure scheme by using two algorithms; (i) Advanced Encryption Algorithm (AES)-256, (ii) Rivest Cipher 4 (RC4) Algorithm. Then, analyze computation time show legitimate
منابع مشابه
GSM Base Station Subsystem Management Application
The Faculty of Electrical Engineering and Communication of the Brno University of Technology offers several subjects focused on mobile communication networks. For practical exercises the experimental mobile network has been building at our faculty. As we do not have OMC or NMC in our network and as the low level network management is quite complex we designed the software that is useful tool fo...
متن کاملResilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation
State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...
متن کاملIdentification Protocols Secure against Reset Attacks
We provide identification protocols that are secure even when the adversary can reset the internal state and/or randomization source of the user identifying itself, and when executed in an asynchronous environment like the Internet that gives the adversary concurrent access to instances of the user. These protocols are suitable for use by devices (like smartcards) which when under adversary con...
متن کاملProvably Secure Countermeasures against Side-channel Attacks
Side-channel attacks exploit the fact that the implementations of cryptographic algorithms leak information about the secret key. In power analysis attacks, the observable leakage is the power consumption of the device, which is dependent on the processed data and the performed operations. Masking is a widely used countermeasure to thwart the powerful Differential Power Analysis (DPA) attacks. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Bitlis Eren üniversitesi fen bilimleri dergisi
سال: 2023
ISSN: ['2147-3188', '2147-3129']
DOI: https://doi.org/10.17798/bitlisfen.1285270