半双工攻击:D2D通信中一种有效的攻击模型

Misbah Shafi, R. Jha
{"title":"半双工攻击:D2D通信中一种有效的攻击模型","authors":"Misbah Shafi, R. Jha","doi":"10.1109/COMSNETS48256.2020.9027360","DOIUrl":null,"url":null,"abstract":"The visualization of future generation Wireless Communication Network (WCN) redirects the presumption of onward innovations, the fulfillment of user demands in the form of high data rates, energy efficiency, low latency, and long-range services. To content these demands, various technologies such as massive MIMO (Multiple Input Multiple Output), UDN (Ultra Dense Network), spectrum sharing, D2D (Device to Device) communication were improvised in the next generation WCN. In comparison to previous technologies, these technologies exhibit flat architecture, the involvement of clouds in the network, centralized architecture incorporating small cells which creates vulnerable breaches initiating menaces to the security of the network. The half-duplex attack is another threat to the WCN, where the resource spoofing mechanism is attained in the downlink phase of D2D communication. Instead of triggering an attack on both uplink and downlink, solely downlink is targeted by the attacker. This scheme allows the reduced failed attempt rate of the attacker as compared to the conventional attacks. The analysis is determined on the basis of Poisson's distribution to determine the probability of failed attempts of half duplex attack in contrast to a full duplex attack.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Half-Duplex Attack: An Effectual Attack Modelling in D2D Communication\",\"authors\":\"Misbah Shafi, R. Jha\",\"doi\":\"10.1109/COMSNETS48256.2020.9027360\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The visualization of future generation Wireless Communication Network (WCN) redirects the presumption of onward innovations, the fulfillment of user demands in the form of high data rates, energy efficiency, low latency, and long-range services. To content these demands, various technologies such as massive MIMO (Multiple Input Multiple Output), UDN (Ultra Dense Network), spectrum sharing, D2D (Device to Device) communication were improvised in the next generation WCN. In comparison to previous technologies, these technologies exhibit flat architecture, the involvement of clouds in the network, centralized architecture incorporating small cells which creates vulnerable breaches initiating menaces to the security of the network. The half-duplex attack is another threat to the WCN, where the resource spoofing mechanism is attained in the downlink phase of D2D communication. Instead of triggering an attack on both uplink and downlink, solely downlink is targeted by the attacker. This scheme allows the reduced failed attempt rate of the attacker as compared to the conventional attacks. The analysis is determined on the basis of Poisson's distribution to determine the probability of failed attempts of half duplex attack in contrast to a full duplex attack.\",\"PeriodicalId\":265871,\"journal\":{\"name\":\"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMSNETS48256.2020.9027360\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMSNETS48256.2020.9027360","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

下一代无线通信网络(WCN)的可视化重新引导了向前创新的假设,以高数据速率、能源效率、低延迟和远程服务的形式满足用户需求。为了满足这些需求,在下一代WCN中,大量MIMO(多输入多输出)、UDN(超密集网络)、频谱共享、D2D(设备到设备)通信等各种技术应运而生。与以前的技术相比,这些技术表现出扁平的架构,网络中涉及云,集中的架构结合了小单元,这造成了易受攻击的破坏,对网络安全构成了威胁。半双工攻击是WCN的另一个威胁,在D2D通信的下行链路阶段实现了资源欺骗机制。攻击者不会同时对上行链路和下行链路发起攻击,而是只对下行链路发起攻击。与传统攻击相比,该方案可以降低攻击者的失败尝试率。分析是根据泊松分布来确定半双工攻击与全双工攻击失败的概率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Half-Duplex Attack: An Effectual Attack Modelling in D2D Communication
The visualization of future generation Wireless Communication Network (WCN) redirects the presumption of onward innovations, the fulfillment of user demands in the form of high data rates, energy efficiency, low latency, and long-range services. To content these demands, various technologies such as massive MIMO (Multiple Input Multiple Output), UDN (Ultra Dense Network), spectrum sharing, D2D (Device to Device) communication were improvised in the next generation WCN. In comparison to previous technologies, these technologies exhibit flat architecture, the involvement of clouds in the network, centralized architecture incorporating small cells which creates vulnerable breaches initiating menaces to the security of the network. The half-duplex attack is another threat to the WCN, where the resource spoofing mechanism is attained in the downlink phase of D2D communication. Instead of triggering an attack on both uplink and downlink, solely downlink is targeted by the attacker. This scheme allows the reduced failed attempt rate of the attacker as compared to the conventional attacks. The analysis is determined on the basis of Poisson's distribution to determine the probability of failed attempts of half duplex attack in contrast to a full duplex attack.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信