Sequential Anomaly Detection Against Demodulation Reference Signal Spoofing in 5G NR

نویسندگان

چکیده

In fifth generation (5G) new radio (NR), the demodulation reference signal (DMRS) is employed for channel estimation as part of coherent physical uplink shared channel. However, DMRS spoofing poses a serious threat to 5G NR since inaccurate will severely degrade decoding performance. this correspondence, we propose exploit spatial sparsity structure detect spoofing, which motivated by fact that be significantly impacted if happens. We first extract solving sparse feature retrieval problem, then sequential anomaly detection method spoofing. simulation experiments, clustered delay line based model from 3GPP standards verifications. Numerical results show our outperforms both subspace dimension and energy detector methods.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

5G NR Jamming, Spoofing, and Sniffing: Threat Assessment and Mitigation

In December 2017, the Third Generation Partnership Project (3GPP) released the first set of specifications for 5G New Radio (NR), which is currently the most widely accepted 5G cellular standard. 5G NR is expected to replace LTE and previous generations of cellular technology over the next several years, providing higher throughput, lower latency, and a host of new features. Similar to LTE, the...

متن کامل

On Effectiveness of Anomaly Detection Approaches against Unseen Presentation Attacks in Face Anti-Spoofing

While face recognition systems got a significant boost in terms of recognition performance in recent years, they are known to be vulnerable to presentation attacks. Up to date, most of the research in the field of face anti-spoofing or presentation attack detection was considered as a two-class classification task: features of bona-fide samples versus features coming from spoofing attempts. The...

متن کامل

Sequential Feature Explanations for Anomaly Detection

In many applications, an anomaly detection system presents the most anomalous data instance to a human analyst, who then must determine whether the instance is truly of interest (e.g. a threat in a security setting). Unfortunately, most anomaly detectors provide no explanation about why an instance was considered anomalous, leaving the analyst with no guidance about where to begin the investiga...

متن کامل

Sequential Anomaly Detection with Noise and Limited Feedback Sequential Anomaly Detection in the Presence of Noise and Limited Feedback

This paper describes a method for detecting anomalies from sequentially observed and potentially noisy data. The proposed approach consists of two main elements: (1) filtering, or assigning a belief or likelihood to each successive measurement based upon our ability to predict it from previous noisy observations, and (2) hedging, or flagging potential anomalies by comparing the current belief a...

متن کامل

A Robust PMU Placement Method Against Spoofing Attacks; Spoofing Detection and Data Refinement

In some recent articles, the spoofing of Phasor measurement unit (PMU) GPS receiver has been highlighted as a threat to power grid protection system. Having spoofed PMU GPS signals, one can manipulate the measurements and inject bad data to power grid protection system. The previous anti spoofing methods are all based on GPS signal analysis. The mentioned methods are just able to detect spoofin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Vehicular Technology

سال: 2023

ISSN: ['0018-9545', '1939-9359']

DOI: https://doi.org/10.1109/tvt.2022.3202745