Automated Attack and Defense Framework toward 5G Security

5G networks are currently being developed rapidly and are dedicated to connect all things of the Internet with new technologies, components and services. Due to the crucial role of 5G, as well as new architectures and designs, 5G faces a great number of security threats and demands suitable security technologies. This article proposes an automated attack and defense framework toward 5G security with the aim of providing exploratory guidance for 5G security research. We first review the security challenges of attack/defense objects from the perspective of a hierarchical structure, and then propose a hierarchical security model that supports both single-layer security and cross-layer security. According to the hierarchical model, an automated attack and defense framework based on a security knowledge graph is proposed for both known and unknown security threats of 5G and provides possible directions toward 5G security automation.

[1]  Byonghyo Shim,et al.  Ultra-Reliable and Low-Latency Communications in 5G Downlink: Physical Layer Aspects , 2017, IEEE Wireless Communications.

[2]  Eric Michael Hutchins,et al.  Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains , 2010 .

[3]  Lajos Hanzo,et al.  Physical-layer authentication for wireless security enhancement: current challenges and future developments , 2016, IEEE Communications Magazine.

[4]  Tanesh Kumar,et al.  Overview of 5G Security Challenges and Solutions , 2018, IEEE Communications Standards Magazine.

[5]  Hsiao-Hwa Chen,et al.  Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[6]  Mohsen Guizani,et al.  Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles , 2019, IEEE Internet of Things Journal.

[7]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[8]  Navrati Saxena,et al.  Next Generation 5G Wireless Networks: A Comprehensive Survey , 2016, IEEE Communications Surveys & Tutorials.

[9]  Rajasekhar Mungara,et al.  A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .

[10]  Dongwen Zhang,et al.  Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained Time Derivation of Road Segments for Smart City , 2020, IEEE Transactions on Industrial Informatics.

[11]  Abhik Roychoudhury,et al.  Angelix: Scalable Multiline Program Patch Synthesis via Symbolic Analysis , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).

[12]  Abdallah Shami,et al.  NFV: state of the art, challenges, and implementation in next generation mobile networks (vEPC) , 2014, IEEE Network.

[13]  Xiqi Gao,et al.  A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.