期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Study on Security of 5G and Satellite Converged Communication Network 被引量:6
1
作者 YAN Xincheng TENG Huiyun +2 位作者 PING Li JIANG Zhihong ZHOU Na 《ZTE Communications》 2021年第4期79-89,共11页
The 5G and satellite converged communication network(5G SCCN)is an impor⁃tant component of the integration of satellite-terrestrial networks,the national science,and technology major projects towards 2030.Security is ... The 5G and satellite converged communication network(5G SCCN)is an impor⁃tant component of the integration of satellite-terrestrial networks,the national science,and technology major projects towards 2030.Security is the key to ensuring its operation,but at present,the research in this area has just started in our country.Based on the network char⁃acteristics and security risks,we propose the security architecture of the 5G SCCN and sys⁃tematically sort out the key protection technologies and improvement directions.In particu⁃lar,unique thinking on the security of lightweight data communication and design reference for the 5G SCCN network architecture is presented.It is expected to provide a piece of refer⁃ence for the follow-up 5G SCCN security technology research,standard evolution,and indus⁃trialization. 展开更多
关键词 5g SCCN non-terrestrial networks 5g security satellite security integration of satellite-terrestrial networks
在线阅读 下载PDF
ScalaDetect-5G:Ultra High-Precision Highly Elastic Deep Intrusion Detection System for 5G Network
2
作者 Shengjia Chang Baojiang Cui Shaocong Feng 《Computer Modeling in Engineering & Sciences》 2025年第9期3805-3827,共23页
With the rapid advancement of mobile communication networks,key technologies such as Multi-access Edge Computing(MEC)and Network Function Virtualization(NFV)have enhanced the quality of service for 5G users but have a... With the rapid advancement of mobile communication networks,key technologies such as Multi-access Edge Computing(MEC)and Network Function Virtualization(NFV)have enhanced the quality of service for 5G users but have also significantly increased the complexity of network threats.Traditional static defense mechanisms are inadequate for addressing the dynamic and heterogeneous nature of modern attack vectors.To overcome these challenges,this paper presents a novel algorithmic framework,SD-5G,designed for high-precision intrusion detection in 5G environments.SD-5G adopts a three-stage architecture comprising traffic feature extraction,elastic representation,and adaptive classification.Specifically,an enhanced Concrete Autoencoder(CAE)is employed to reconstruct and compress high-dimensional network traffic features,producing compact and expressive representations suitable for large-scale 5G deployments.To further improve accuracy in ambiguous traffic classification,a Residual Convolutional Long Short-Term Memory model with an attention mechanism(ResCLA)is introduced,enabling multi-level modeling of spatial–temporal dependencies and effective detection of subtle anomalies.Extensive experiments on benchmark datasets—including 5G-NIDD,CIC-IDS2017,ToN-IoT,and BoT-IoT—demonstrate that SD-5G consistently achieves F1 scores exceeding 99.19%across diverse network environments,indicating strong generalization and real-time deployment capabilities.Overall,SD-5G achieves a balance between detection accuracy and deployment efficiency,offering a scalable,flexible,and effective solution for intrusion detection in 5G and next-generation networks. 展开更多
关键词 5g security network intrusion detection feature engineering deep learning
在线阅读 下载PDF
An AI/ML Framework-Driven Approach for Malicious Traffic Detection in Open RAN
3
作者 Suhyeon Lee Hwankuk Kim 《Computer Modeling in Engineering & Sciences》 2025年第11期2657-2682,共26页
The open nature and heterogeneous architecture of Open Radio Access Network(Open RAN)undermine the consistency of security policies and broaden the attack surface,thereby increasing the risk of security vulnerabilitie... The open nature and heterogeneous architecture of Open Radio Access Network(Open RAN)undermine the consistency of security policies and broaden the attack surface,thereby increasing the risk of security vulnerabilities.The dynamic nature of network performance and traffic patterns in Open RAN necessitates advanced detection models that can overcome the constraints of traditional techniques and adapt to evolving behaviors.This study presents a methodology for effectively detecting malicious traffic in Open RAN by utilizing an Artificial-Intelligence/MachineLearning(AI/ML)Framework.A hybrid Transformer–Convolutional-Neural-Network(Transformer-CNN)ensemble model is employed for anomaly detection.The proposed model generates final predictions through a soft-voting technique based on the predictive outputs of the two models with distinct features.This approach improves accuracy by up to 1.06%and F1 score by 1.48%compared with a hard-voting technique to determine the final prediction.Furthermore,the proposed model achieves an average accuracy of approximately 98.3%depending on the time step,exhibiting a 1.43%increase in accuracy over single-model approaches.Unlike single-model approaches,which are prone to overfitting,the ensemble model resolves the overfitting problem by reducing the deviation in validation loss. 展开更多
关键词 O-RAN security 5g advanced security AI-RAN in 6G era AI-driven cybersecurity cyber security
在线阅读 下载PDF
TRADE-5G:A blockchain-based transparent and secure resource exchange for 5G network slicing
4
作者 El-hacen Diallo Khaldoun Al Agha Steven Martin 《Blockchain(Research and Applications)》 2025年第1期104-119,共16页
The advent of 5G technology has revolutionized network communication by introducing network slicing(NS)and virtualization to allow multiple network service providers(NSPs)to share infrastructure,thereby reducing deplo... The advent of 5G technology has revolutionized network communication by introducing network slicing(NS)and virtualization to allow multiple network service providers(NSPs)to share infrastructure,thereby reducing deployment costs and accelerating 5G adoption.While this new open marketplace enables NSPs to trade resources dynamically,it also exposes the system to security concerns,such as front-running and selfish-validation attacks,which can lead to market manipulation and strategy leakage.This paper presents TRADE-5G,a secure blockchainbased marketplace for 5G resource trading that mitigates these attacks and ensures fair,transparent resource allocation while preserving the cofidentiality of NSP strategies.Through extensive simulations,TRADE-5G demonstrates a substantial 18%improvement in user satisfaction and a 36%reduction in wasted resources compared to traditional models.Additionally,it opens new profit opportunities for NSPs through unused resources,establishing a more competitive,secure,and transparent 5G trading environment that exceeds the capabilities of traditional mobile networks. 展开更多
关键词 5g network Network slicing Blockchain Slice brokering Slicing security 5g resource marketplace Front-running attack Selfish-validation attack Privacy-preserving resource trading Decentralized infrastructure sharing Secure 5g resource allocation Blockchain in telecommunications Resource exchange in 5g 5g trading marketplace
原文传递
The technology of radio frequency fingerprint identification based on deep learning for 5G application 被引量:2
5
作者 Yun Lin Hanhong Wang Haoran Zha 《Security and Safety》 2024年第1期47-67,共21页
User Equipment(UE)authentication holds paramount importance in upholding the security of wireless networks.A nascent technology,Radio Frequency Fingerprint Identification(RFFI),is gaining prominence as a means to bols... User Equipment(UE)authentication holds paramount importance in upholding the security of wireless networks.A nascent technology,Radio Frequency Fingerprint Identification(RFFI),is gaining prominence as a means to bolster network security authentication.To expedite the integration of RFFI within fifth-generation(5G)networks,this research undertakes the creation of a comprehensive link-level simulation platform tailored for 5G scenarios.The devised platform emulates various device impairments,including an oscillator,IQ modulator,and power amplifier(PA)nonlinearities,alongside simulating channel distortions.Consequent to this,a plausibility analysis is executed,intertwining transmitter device impairments with 3rd Generation Partnership Project(3GPP)new radio(NR)protocols.Subsequently,an exhaustive exploration is conducted to assess the impact of transmitter impairments,deep neural networks(DNNs),and channel effects on RF fingerprinting performance.Notably,under a signal-to-noise ratio(SNR)of 15 d B,the deep learning approach demonstrates the capability to accurately classify 100 UEs with a commendable 91%accuracy rate.Through a multifaceted evaluation,it is ascertained that the Attention-based network architecture emerges as the optimal choice for the RFFI task,serving as the new benchmark model for RFFI applications. 展开更多
关键词 UE authentication radio frequency ngerprint identi cation 5g security deep neural networks
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部