The Library
A defensive strategy against beam training attack in 5G mmWave networks for manufacturing
Tools
Dinh-Van, Son, Hoang, Tiep M., Cebecioglu, Berna Bulut, Fowler, Daniel S., Mo, Yuen Kwan and Higgins, Matthew D. (2023) A defensive strategy against beam training attack in 5G mmWave networks for manufacturing. IEEE Transactions on Information Forensics and Security, 18 . pp. 2204-2217. doi:10.1109/TIFS.2023.3265341 ISSN 1556-6013.
|
PDF
WRAP-Defensive-strategy-against-beam-training-attack-networks-manufacturing-23.pdf - Accepted Version - Requires a PDF viewer. Download (4Mb) | Preview |
Official URL: http://dx.doi.org/10.1109/TIFS.2023.3265341
Abstract
Millimeter-wave (mmWave) carriers are an essential building block of fifth-generation (5G) systems. Satisfactory performance of the communications over the mmWave spectrum requires an alignment between the signal beam of the transmitter and receiver, achieved via beam training protocols. Nevertheless, beam training is vulnerable to jamming attacks, where the attacker intends to send jamming signals over different spatial directions to confuse legitimate nodes. This paper focuses on defending against this attack in smart factories where a moving Automated Guided Vehicle (AGV) communicates with a base station via a mmWave carrier. We introduce a defensive strategy to cope with jamming attacks, including two stages: jamming detection and jamming mitigation. Developed based on autoencoders, both algorithms can learn the characteristics/features of the received signals at the AGV. They can be employed consecutively before performing the downlink data transmission. In particular, once a jamming attack is identified, the jamming mitigation can be utilized to retrieve the corrupted received signal strength vector, allowing a better decision during the beam training operation. In addition, the proposed algorithm is straightforward and fully compliant with the existing beam training protocols in 5G New Radio. The numerical results show that not only the proposed defensive strategy can capture more than 80% of attack events, but it also improves the average signal-to-interference-plus-noise-ratio significantly, i.e., up to 15 dB.
Item Type: | Journal Article | ||||||
---|---|---|---|---|---|---|---|
Subjects: | T Technology > TK Electrical engineering. Electronics Nuclear engineering | ||||||
Divisions: | Faculty of Science, Engineering and Medicine > Engineering > WMG (Formerly the Warwick Manufacturing Group) | ||||||
Library of Congress Subject Headings (LCSH): | 5G mobile communication systems, Radio, Millimeter wave communication systems, Beam dynamics, Wireless communication systems -- Security measures | ||||||
Journal or Publication Title: | IEEE Transactions on Information Forensics and Security | ||||||
Publisher: | IEEE | ||||||
ISSN: | 1556-6013 | ||||||
Official Date: | 6 April 2023 | ||||||
Dates: |
|
||||||
Volume: | 18 | ||||||
Page Range: | pp. 2204-2217 | ||||||
DOI: | 10.1109/TIFS.2023.3265341 | ||||||
Status: | Peer Reviewed | ||||||
Publication Status: | Published | ||||||
Access rights to Published version: | Restricted or Subscription Access | ||||||
Date of first compliant deposit: | 24 April 2023 | ||||||
Date of first compliant Open Access: | 24 April 2023 |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |
Downloads
Downloads per month over past year