Machine learning-based detection of the man-in-the-middle attack in the physical layer of 5G networks

IF 4.3 3区 材料科学 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC
Abdullah Qasem , Ashraf Tahat
{"title":"Machine learning-based detection of the man-in-the-middle attack in the physical layer of 5G networks","authors":"Abdullah Qasem ,&nbsp;Ashraf Tahat","doi":"10.1016/j.simpat.2024.102998","DOIUrl":null,"url":null,"abstract":"<div><p>Fifth generation communication networks (5G) has received a great deal of attention from academia and industry alike, which will enable a wide variety of vertical applications by connecting heterogeneous devices and machines. Assessing availability and reliability in many circumstances and environments is critical. Researchers have recently focused on investigating and analyzing new multimedia networks with artificial intelligence (AI) technologies to achieve higher data rates and secure communication traffic between parties. User information privacy and security are of vital importance and of growing concerns that present evolving challenges to overcome in preventing attacks. Man-in-the-middle (MITM) attack is considered one of the most common attacks, where an attacker can impersonate one of the parties in a communication system to steal user data or forge the malicious data. Due to the limitation of using conventional cryptographic techniques for mobile networks and similar systems, new methods have been introduced to validate and authenticate transmitted signals dynamically, depending on the physical layer. In this paper, we present the distance-time directional delay (DTDD) model to detect the MITM attack in a variety of contexts and scenario. Indoor hotspots (InH) and urban micro-cellular (UMi) propagation environments were investigated to verify the reliability of the proposed approaches using realistic 5G millimeter-wave configurations and system setups. Simulations have been constructed based on the mmWave 5G channel simulator tool NYUSIM, in conjunction with a collection of machine learning algorithms (ML) including the extreme gradient boosting (XGBoost) and light gradient boosting machine (LGBM) as the core of the presented models and methodologies. Numerical simulations results produced a detection accuracy approaching 100% in the InH environment scenario, whereas for UMi environment scenario, a detection accuracy approaching 99% was attained.</p></div>","PeriodicalId":3,"journal":{"name":"ACS Applied Electronic Materials","volume":null,"pages":null},"PeriodicalIF":4.3000,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACS Applied Electronic Materials","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1569190X24001126","RegionNum":3,"RegionCategory":"材料科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

Fifth generation communication networks (5G) has received a great deal of attention from academia and industry alike, which will enable a wide variety of vertical applications by connecting heterogeneous devices and machines. Assessing availability and reliability in many circumstances and environments is critical. Researchers have recently focused on investigating and analyzing new multimedia networks with artificial intelligence (AI) technologies to achieve higher data rates and secure communication traffic between parties. User information privacy and security are of vital importance and of growing concerns that present evolving challenges to overcome in preventing attacks. Man-in-the-middle (MITM) attack is considered one of the most common attacks, where an attacker can impersonate one of the parties in a communication system to steal user data or forge the malicious data. Due to the limitation of using conventional cryptographic techniques for mobile networks and similar systems, new methods have been introduced to validate and authenticate transmitted signals dynamically, depending on the physical layer. In this paper, we present the distance-time directional delay (DTDD) model to detect the MITM attack in a variety of contexts and scenario. Indoor hotspots (InH) and urban micro-cellular (UMi) propagation environments were investigated to verify the reliability of the proposed approaches using realistic 5G millimeter-wave configurations and system setups. Simulations have been constructed based on the mmWave 5G channel simulator tool NYUSIM, in conjunction with a collection of machine learning algorithms (ML) including the extreme gradient boosting (XGBoost) and light gradient boosting machine (LGBM) as the core of the presented models and methodologies. Numerical simulations results produced a detection accuracy approaching 100% in the InH environment scenario, whereas for UMi environment scenario, a detection accuracy approaching 99% was attained.

基于机器学习的 5G 网络物理层中间人攻击检测
第五代通信网络(5G)受到了学术界和工业界的广泛关注,它将通过连接异构设备和机器实现各种垂直应用。评估多种情况和环境下的可用性和可靠性至关重要。最近,研究人员重点研究和分析了采用人工智能(AI)技术的新型多媒体网络,以实现更高的数据传输速率和各方之间的安全通信流量。用户信息隐私和安全至关重要,也日益受到关注,这给防范攻击带来了不断变化的挑战。中间人(MITM)攻击被认为是最常见的攻击之一,攻击者可以冒充通信系统中的一方窃取用户数据或伪造恶意数据。由于在移动网络和类似系统中使用传统加密技术的局限性,人们引入了新的方法来根据物理层动态验证和认证传输信号。在本文中,我们提出了距离-时间-定向延迟(DTDD)模型,用于检测各种环境和场景下的 MITM 攻击。我们对室内热点(InH)和城市微蜂窝(UMi)的传播环境进行了研究,利用现实的 5G 毫米波配置和系统设置验证了所提方法的可靠性。模拟以毫米波 5G 信道模拟工具 NYUSIM 为基础,结合一系列机器学习算法 (ML),包括极端梯度提升 (XGBoost) 和光梯度提升机 (LGBM),作为所提出模型和方法的核心。数值模拟结果表明,在 InH 环境场景下,检测准确率接近 100%,而在 UMi 环境场景下,检测准确率接近 99%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
7.20
自引率
4.30%
发文量
567
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信