Abusive Adversaries in 5G and beyond IoT

Vishal Sharma*, Blesson Varghese, John McAllister, Saraju P. Mohanty

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

73 Downloads (Pure)

Abstract

5G and subsequent cellular network generations aim to extend ubiquitous connectivity of billions of Internet-of-Things (IoT) for their consumers. Security is a prime concern in this context as adversaries have evolved to become smart and often employ new attack strategies. Network defenses can be enhanced against attacks by employing behavior models for devices to detect misbehavior. One example is Abusive Modeling (AM) that is inspired by financial technologies to defend adversaries operating with unlimited resources who have no intention of self-profit apart from harming the system. This article investigates behavior modeling against abusive adversaries in the context of 5G and beyond security functions for IoT. Security threats and countermeasures are discussed to understand AM. A complexitysecurity trade-off enables a better understanding of the limitations of state-based behavior modeling and paves the way as a future direction for developing more robust solutions against AM.
Original languageEnglish
JournalIEEE Consumer Electronics Magazine
Early online date19 May 2021
DOIs
Publication statusEarly online date - 19 May 2021

Fingerprint

Dive into the research topics of 'Abusive Adversaries in 5G and beyond IoT'. Together they form a unique fingerprint.

Cite this