博碩士論文 105582006 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:52 、訪客IP:18.221.11.166
姓名 莊淑閔(Shu-Min C)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 建置安全的5G智慧工廠實證研究
(Securing 5G Smart Factory: Establishing a secure 5G smart factory empirical study)
相關論文
★ 具多重樹狀結構之可靠性群播傳輸★ 在嵌入式行動裝置上設計與開發跨平台Widget
★ 在 ARM 架構之嵌入式系統上實作輕量化的手持多媒體播放裝置圖形使用者介面函式庫★ 基於網路行動裝置所設計可擴展的服務品質感知GStreamer模組
★ 針對行動網路裝置開發可擴展且跨平台之GSM/HSDPA引擎★ 於單晶片多媒體裝置進行有效率之多格式解碼管理
★ IMS客戶端設計與即時通訊模組研發:個人資訊交換模組與即時訊息模組實作★ 在可攜式多媒體裝置上實作人性化的嵌入式小螢幕網頁瀏覽器
★ 以IMS為基礎之及時語音影像通話引擎的實作:使用開放原始碼程式庫★ 電子書嵌入式開發: 客制化下載服務實作, 資料儲存管理設計
★ 於數位機上盒實現有效率訊框參照處理與多媒體詮釋資料感知的播放器設計★ 具數位安全性的電子書開發:有效率的更新模組與資料庫實作
★ 適用於異質無線寬頻系統的新世代IMS客戶端軟體研發★ 在可攜式數位機上盒上設計並實作重配置的圖形使用者介面
★ Friendly GUI design and possibility support for E-book Reader based Android client★ Effective GUI Design and Memory Usage Management for Android-based Services
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 (2028-7-1以後開放)
摘要(中) 5G 技術與智慧工廠的結合帶來製造業數位轉型的新時代。智慧工廠利用 5G 網路和其他先進技術,如工業物聯網(IIoT)、人工智慧(AI)和邊緣運算,並優化生產流程與提高效率並且推動創新。然而,隨著智慧工廠越來越多感測器節點的連接和數位化,智慧工廠也變得更容易受到網路安全威脅和干擾。因此,本論文研究主軸的本質是確保 5G 智慧工廠的安全和彈性,以保持運營的連續性,並保護有價值的資產,以及防範潛在風險。
我們生活中越來越依賴無線通訊技術,像是4G和5G。這些技術的不斷發展,以應對日益增長的需求,帶來各種垂直領域的創新的應用。然而,隨著新功能和技術的引入,也帶來新的資訊安全風險和威脅。
本論文旨在建置一個安全的5G智慧工廠實證研究,探討在智慧工廠環境中利用5G與工業物聯網(IIoT)技術來提高生產效率,同時解決IIoT設備的弱點及不斷演變的安全威脅。本論文建置非侵入式智慧感應器系統和5G邊緣運算閘道器,以及部署5G智慧工廠的資通安全主動偵測與防護系統,作為5G智慧工廠之設備電力與振動監測、用電安全、預知保養的需求與資通安全防護。利用非侵入式智慧感應器系統和5G邊緣運算閘道器鑑別機械故障與設備健康狀態並進行預知維護和保養,因此減輕對生產流程造成的干擾並減少日後維護監測系統所需的時間與人力資源。智慧工廠的主動偵測與防護系統的實證方式以機器學習建立智慧工廠網路的行為樣態,具備自動部署與威脅偵測能力。此外論文也分析IIoT和5G網路的攻擊與威脅,並提出相應的5G智慧工廠緩解措施。
本論文方法論為ABCD方法,以Active Scanner(弱點資訊主動式探測)、Behavior Mesh Monitor(網路行為監控)、Correlation in Defense(異質網路的關聯防禦)、Dynamic Honeypot(建構虛擬誘捕環境)的框架縮寫,建立安全的5G智慧工廠之場域實證。資料來源來自實際5G智慧工廠運作所產生的數據,進行分析與驗證。研究結果顯示,在5G智慧工廠中,透過分析智慧感測器所擷取的資料來鑑別機械故障與設備健康狀態,採用時域訊號特徵(time-domain signal features)進行分析,而故障形態診斷的正確性達到90%。另在主動偵測與防護系統可偵測網路異常和設備異常行為,偵測率可達90%以上與智慧工廠設備辨識率可達93%。未來,可以將ABCD方法應用於 5G 智慧工廠安全與其他相關議題,包括5G專網整合與應用。
歸納本論文的研究重點在於建立攻擊場景以利用系統漏洞並實證研究結果。我們發現工業物聯網(IIoT)網路中存在多個弱點,駭客可以利用這些弱點來攻擊並造成智慧工廠的資通安全問題。同時,我們對行動通訊系統進行深入研究與驗證,實際對5G行動電信業者所即存的訊令協定漏洞進行國際漫遊與簡訊滲透測試,亦透過利用MITRE ATT&CK框架,對5G行動網路的威脅和攻擊進行實證建模。在本論文中,實證5G行動網路的技術漏洞並提出5G行動網路的緩解措施方案。
本論文的重要性在於實證5G獨立組網(SA)與智慧工廠的工業物聯網(IIoT)的安全影響以及建置非侵入式智慧感應器系統和5G邊緣運算閘道器,用電力作為感測參數,不須要多sensor設備與部線,智慧型感測資料發送器就是採用電流感應電源幫發送器內的充電電池充電,不用額外供電即可提供發送器運作所需的電量,作為5G智慧工廠之設備電力與振動監測達到預知保養的需求與資通安全防護。本論文實證 5G 智慧工廠和工業物聯網所產生的工控安全與行動通訊軟體協定的威脅風險,並提出5G 智慧工廠主動偵測與防護的方法,以達成本論文的目標:建置安全的 5G 智慧工廠實證研究。
摘要(英) The convergence of 5G technology and smart factory has marked a new era of industrial transformation. Smart factories leverage the power of 5G networks and cutting-edge technologies like the Industrial Internet of Things (IIoT) and artificial intelligence (AI), and edge computing to optimize production processes, enhance efficiency, and drive innovation. However, as smart factories become increasingly connected and digitized, they also become more vulnerable to cybersecurity threats and disruptions. Therefore, ensuring the security and resilience of 5G-enabled smart factories is paramount to maintaining operational continuity, protecting valuable assets, and safeguarding against potential risks.
Wireless communications, such as 4G and 5G, play a crucial role in our daily lives, making security a critical concern. These technologies have evolved significantly to meet our growing demands, incorporating new features and advancements. However, this evolution also introduces new security threats and vulnerabilities. This dissertation examines the security threats and weaknesses present in 5G-IIoT smart factories, which continue to evolve with both legacy and modern wireless communication software components and paradigms.
Wireless communications, including 4G and 5G, are integral to our daily lives, making security a critical concern. While these technologies have evolved significantly to meet growing demands and incorporate new features, they also introduce new security threats and vulnerabilities. This dissertation examines the evolving security threats and weaknesses in 5G-IIoT smart factories, focusing on both legacy and modern wireless communication software components and paradigms.This dissertation takes an initial step toward addressing industrial needs by presenting a general method for identifying novel security issues in 5G smart factories, specifically at the intersection of IIoT and 5G communication. This contribution is based on an analysis of IIoT and smart factory security incidents, as well as emerging trends in 5G technologies and attacker capabilities.
Establishes a wireless, non-intrusive smart sensor system and a 5G edge computing gateway, alongside deploying active detection and protection systems for the cybersecurity of 5G smart factories. These systems meet the needs of monitoring equipment power and vibration, ensuring electrical safety, predictive maintenance, and cybersecurity protection. By using non-intrusive smart sensor systems and 5G edge computing gateways to identify mechanical faults and assess equipment health, predictive maintenance and upkeep can be performed, reducing production disruptions and decreasing the time and human resources required for future maintenance and monitoring.
The empirical approach to active detection and protection systems in smart factories employs machine learning to establish behavioral patterns in smart factory networks, featuring automatic deployment and threat detection capabilities. Furthermore, the dissertation analyzes attacks and threats to IIoT and 5G networks, proposing corresponding mitigation measures for 5G smart factories.The dissertation′s methodology involves an in-depth analysis of the security and resilience properties of 5G-enabled smart factories. By conducting real-world experiments, we identify previously unknown vulnerabilities impacting 5G security.
The methodology follows the ABCD approach, which stands for Active Scanner (active vulnerability information detection), Behavior Mesh Monitor (network behavior monitoring), Correlation in Defense (correlated defense of heterogeneous networks), and Dynamic Honeypot (construction of virtual honeypot environments). This framework establishes a secure 5G smart factory field trial. Data sources come from raw data generated by the actual operation of 5G smart factories, which are analyzed and verified. The research results show that in 5G smart factories, by analyzing data captured by smart sensors to identify mechanical faults and assess equipment health, fault pattern diagnosis accuracy can reach 90% through the analysis of time-domain signal features. Additionally, the active detection and protection system can detect network anomalies and abnormal equipment behavior, achieving a detection rate of over 90% and an equipment identification rate of 93%.
This dissertation involved constructing attacks to exploit vulnerabilities, demonstrating the practicality of our findings. Various security issues were uncovered in each system analyzed, and several defense and mitigation solutions were presented to address these issues. The summary of this resaerch results is as follows: First, several security issues in IIoT networks that can be exploited by network adversaries were identified. Second, security weaknesses in signaling protocols of mobile communication systems were uncovered. Additionally, a MITRE ATT&CK framework was presented to model the threats and attacks on 5G mobile networks.Throughout this dissertation, numerous technical vulnerabilities affecting 5G-enabled smart factory were uncovered and addressed. Crucially, a versatile approach for conducting impactful security research where 5G Stand Alone (SA) networks intersect with the Industrial Internet of Things (IIoT) in smart factory was introduced and verified. The primary objective are to develop a Proactive Detection and Defense platform and validate its performance and security features in a reproducible test environment.
關鍵字(中) ★ 5G 網路
★ 工業物聯網(IIoT)
★ 非侵入式智慧感應器系統
★ 邊緣運算閘道器
★ 機器學習
★ 5G 資通安全
關鍵字(英) ★ 5G Smart Factory
★ 5G security
★ Industrial Internet of Things
★ Mobile edge computing gateway
★ Wireless Non-intrusive smart sensor system
★ Machine Learning
論文目次 中文摘要 i
Abstract iii
Acknowledgements v
Chapter 1. Introduction 1
1.1 An Emergent Need and Research Goals 1
1.1.1 An Emergent Need 2
1.1.2 Research Objectives 3
1.2 Chapter Structure and Methodology 5
1.3 Contributions of Research 10
Chapter 2. Challenges And Related Works of Securing 5G Smart Factory 13
2.1 Industrial Internet of Things (IIoT) 15
2.2 Private 5G Network and Challenges 20
2.3 3GPP 5G Security for Vertical Application 25
2.3.1 eMBB Application Scenario 30
2.3.2 URLLC Application Scenario 33
2.3.3 mMTC application Scenarios 34
2.4 Cybersecurity Challenges in 5G and IIoT based Smart Factory 39
2.4.1 Cybersecurity Issues of IIoT 39
2.4.2 Security Measures at the Network Layer 40
2.4.3 Security Measures at the Data Layer 41
2.4.4 Smart Factory and AI Applications 42
2.5 Security Applications of Edge Computing Gateway 45
2.5.1 Network Anomaly Detection 45
2.5.2 Securing Edge Gateway 46
2.6 5G Security and Challenges 47
2.6.1 Overall of Mobile Network Security 48
2.6.2 Network Security for 5G Communication 49
2.6.3 5G Security Assessment Standard 52
2.7 Vulnerabilities of Legacy Mobile Networks Signaling 54
2.8 Comparative Analysis of 5G Private Networks and Testbeds 58
Chapter 3 Non-intrusive Intelligent Smart Sensor System and 5G Edge Computing Gateway for Smart Factory 61
3.1 System Architecture and Implementation 62
3.2 Wireless Non-intrusive Intelligent Sensor System 63
3.3 5G Edge Computing Gateway 68
3.3.1 Edge Computing Gateway 68
3.3.2 Intelligent Self-Protection Modules for Edge Computing gateway 69
3.4 Predictive Maintenance of Smart Factory 72
3.5 Result of Experiments in IIoT Factory 77
Chapter 4 5G Smart Factory Testbed 79
4.1 5G Smart Factory Testbed of Intelligent Machinery Technology Center 79
4.1.1 Coverages of the Serving Cell 82
4.1.2 IMTC Network Performance and System Reliability 84
4.1.3 KPI of Throughput, Latency and Reliability 87
4.2 5G Smart Factory of FFG Hsinchu Plant 89
Chapter 5 Proactive Detection and Defense Deployment of IMTC 93
5.1 Active Detection of OT Domain Vulnerability Information 94
5.2 Proactive Detection and Defense Platform and Deployment 105
5.2.1 Proactive Detection and Defense Deployment 106
5.3 Threat Intelligence Joint Defense Platform 107
5.4 Deployment of Frontend Information Perception Devices 116
5.5 Heterogeneous Device Clustering Model 121
5.6 Active Detection Techniques for OT Environments 126
5.7 Threat Risk Detection 129
5.7.1 LSTM Learning Models 129
5.7.2 Data Pipeline 131
5.7.3 Detection Line 134
5.8 Abnormal Activity Monitoring 136
5.8.1 Individual Indicator Definitions 136
5.8.2 Group Indicator Detection Method 141
5.9 Heterogeneous Information Accommodation 144
5.10 Threat Model of Abnormal Behavior 145
Chapter 6 5G Network Security Assurance and Penetration Testing 148
6.1 5G Stand Alone (SA) Network And Multi-access Edge Computing (MEC) Testbed 148
6.2 Kill Chain for 5G Standalone (SA) and Results 153
6.2.1 OAM and UDM Attack Script 154
6.2.2 Result of OAM and UDM Attack for 5G SA 156
6.3 5G MEC Applications Threats and Result 159
6.4 User Plane Function Packet Reflection Vulnerability in 5G Networks and Mitigation 164
6.4.1 User Plane Function (UPF) Packet Reflection Vulnerability in 5G Network 164
6.4.2 Mitigation Strategies and Pseudocode Implementations 171
6.6 Mobile Communication Penetration Test 174
6.6.1 SS7 Penetration Testing 177
6.7 Distributed Detection of Low-Rate Distributed Denial of Service (LSDDoS) Attacks by Using 5G Security Analysis Network Function 193
6.7.1 Coordination of Backend GSAF and Frontend LSAFs 194
6.7.2 The implementation of GSAF and LSAF in 5G Network 195
6.7.3 Cooperative Behavior (LSDDoS) Detection 197
6.7.4 Security Application Function (SAF) System Architecture and Diagram 198
Chapter 7 Conclusion 203
7.1 Research Summary 203
7.2 Summary of Key Contributions 206
7.3 Future Work in 5G Smart Factory and IIoT Security 207
Bibliography 209
Abbreviations and Acronyms 216
參考文獻 [1] M. Gartner, Market Trend: 5G in Manufacturing Use Cases published: 31 May 2023
[2] A. Aijaz, “Private 5G: The future of industrial wireless,” IEEE Ind. Electron. Mag., vol. 14, no. 4, pp. 136–145, Dec. 2020.
[3] E. Sisinni, A. Saifullah, S. Han, U. Jennehag, and M. Gidlund, “Industrial Internet of Things: Challenges, oppor-tunities, and directions,” IEEE Trans. Ind. Informat., vol. 14, no. 11, pp. 4724–4734, Nov. 2018.
[4] H. Viswanathan and P. E. Mogensen, “Communications in the 6G era,” IEEE Access, vol. 8, pp. 57 063–57074, 2020.A. Ghosh, A. Maeder, M. Baker, and D. Chandramouli, “5G evolution: A view on 5G cellular technology beyond 3GPP release 15,” IEEE Access, vol. 7, pp. 127 639–127651, 2019.
[5] M. Gundall et al., “Introduction of a 5G-enabled architecture for the realization of Industry 4.0 use cases,” IEEE Access, vol. 9, pp. 25 508– 25521, 2021.
[6] F. Tariq, M. R. A. Khandaker, K. -K. Wong, M. A. Imran, M. Bennis, and M. Debbah, “A speculative study on 6G,” IEEE Wireless Commun., vol. 27, no. 4, pp. 118–125, Aug. 2020.
[7] M. Giordani, M. Polese, M. Mezzavilla, S. Rangan, and M. Zorzi, “Toward 6G networks: Use cases and tech-nologies,” IEEE Commun. Mag., vol. 58, no. 3, pp. 55–61, Mar. 2020.
[8] G. Gui, M. Liu, F. Tang, N. Kato, and F. Adachi, “6G: Opening new horizons for integration of comfort, securi-ty, and intelligence,” IEEE Wireless Commun., vol. 27, no. 5, pp. 126–132, Oct. 2020.
[9] H. Tataria, M. Shafi, A. F. Molisch, M. Dohler, H. Sjöland, and F. Tufvesson, “6G wireless systems: Vision, re-quirements, challenges, insights, and opportunities,” Proc. IEEE, vol. 109, no. 7, pp. 1166–1199, Jul. 2021.
[10] K. B. Letaief, W. Chen, Y. Shi, J. Zhang, and Y. A. Zhang, “The roadmap to 6G: AI empowered wireless net-works,” IEEE Commun. Mag., vol. 57, no. 8, pp. 84–90, Aug. 2019.
[11] Z. Zhang et al., “6G wireless networks: Vision, requirements, architecture, and key technologies,” IEEE Veh. Technol. Mag., vol. 14, no. 3, pp. 28–41, Sep. 2019.
[12] 3GPP: Study on Channel Model for Frequencies From 0.5 to 100 GHz (Release 16), 3GPP TR 38.901, Version 16.1.0, Jan. 2020.
[13] I. Rodriguez et al., “5G swarm production: Advanced industrial manufacturing concepts enabled by wireless au-tomation,” IEEE Commun. Mag., vol. 59, no. 1, pp. 48–54, Jan. 2021.
[14] P. O’Donovan, K. Leahy, K. Bruton, and D. T. J. O’Sullivan, “An industrial big data pipeline for data-driven analytics maintenance applicationsin large-scale smart manufacturing facilities,” J. Big Data, vol. 2, no. 1,p. 25, Nov. 2015. [Online]. Available: https://doi.org/10.1186/s40537-015-0034-z
[15] T. Qu, S. P. Lei, Z. Z.Wang, D. X. Nie, X. Chen, and G. Q. Huang, “IoTbased real-time production logistics synchronization system under smart cloud manufacturing,” Int. J. Adv. Manuf. Technol., vol. 84, no. 1, pp. 147–164, Apr. 2016. [Online].Available: https://doi.org/10.1007/s00170-015-7220-1
[16] S. G. Pease et al., “An intelligent real-time cyber-physical toolset for energy and process prediction and optimi-sation in the future industrial internet of things,” Future Gener. Comput. Syst., vol. 79, pp. 815–829, 2018. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0167739X1630382X
[17] T. H. Szymanski, “Supporting consumer services in a deterministic industrial internet core network,” IEEE Commun. Mag., vol. 54, no. 6, pp. 110–117, Jun. 2016.
[18] X. Jia, Q. Feng, T. Fan, and Q. Lei, “Rfid technology and its applications in internet of things (IoT),” in Proc. 2nd Int. Conf. Consum. Electron., Commun. Netw., 2012, pp. 1282–1285.
[19] M. C. Domingo, “An overview of the internet of things for people with disabilities,” J. Netw. Comput. Appl., vol. 35, no. 2, pp. 584–596, 2012.
[20] L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,”Comput. Netw., vol. 54, no. 15, pp. 2787–2805, 2010.
[21] International Electrotechnical Commission (IEC), IoT 2020: Smart and Secure IoT Platform. IEC, Switzerland, 2016.
[22] D. Ismail, M. Rahman, and A. Saifullah, “Low-power wide-area networks: Opportunities, challenges, and di-rections,” in Proc. WorkshopProgram 19th Int. Conf. Distrib. Comput. Netw., 2018, pp. 8:1–8:6.
[23] GSMA. (2016, Oct.). 3gpp low power wide area technologies.[Online]. Available: https://www.gsma.com/iot/wp-content/uploads/2016/10/3GPP-Low-Power-Wide-Area-Technologies-GSMA-White-Paper.pdf
[24] A. Al-Fuqaha, A. Khreishah, M. Guizani, A. Rayes, and M. Mohammadi,Toward better horizontal integration among IoT services,” IEEE Commun. Mag., vol. 53, no. 9, pp. 72–79, Sep. 2015.
[25] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M.Ayyash, “Internet of things: A survey on ena-bling technologies, protocols, and applications,” IEEE Commun. Surv. Tut., vol. 17, no. 4,pp. 2347–2376, Fourthquarter 2015.
[26] [Online]https://fieldcommgroup.org/sites/dfault/files/plant_of_the_year/PotY_2009_Mitsubishi_Chem.pdf
[27] T. Rault, A. Bouabdallah, and Y. Challal, “Energy efficiency in wireless sensor networks: A top-down survey,” vol. 67, pp. 104–122, 2014.
[28] 3GPP. (2016, Jun.), Standardization of NB-IOT completed [Online] Available: http://www.3gpp.org/news-events/3gpp-news/1785-nb_iot_complete
[29] A.-R. Sadeghi, C. Wachsmann, and M. Waidner, “Security and privacy challenges in industrial internet of things,” in Proc. 52nd Annu. Des. Autom. Conf., 2015, p. 54.
[30] A. W. Atamli and A. Martin, “Threat-based security analysis for the internet of things,” in Proc. IEEE Int. Workshop Secure Internet Things, 2014, pp. 35–43.
[31] Z.-K. Zhang, M. C. Y. Cho, C.-W. Wang, C.-W. Hsu, C.-K. Chen, andS. Shieh, “IoT security: Ongoing chal-lenges and research opportunities,”in Proc. IEEE 7th Int. Conf. Service-Oriented Comput. Appl., 2014, pp. 230–234.
[32] R. Drath and A. Horch, “Industrie 4.0: Hit or Hype?” IEEE Ind. Electron.Mag., vol. 8, no. 2, pp. 56–48, June 2014.
[33] ITU-R, “IMT Vision – Framework and Overall Objectives of the Future Development of IMT for 2020 and Be-yond,” International Telecommunication Union (ITU), Recommendation ITU-R M.2083-0,Sept. 2015. [Online] https://www.itu.int/dms pubrec/itu-r/rec/m/R-REC-M.2083-0-201509-I!!PDF-E.pdf
[34] A. Aijaz and M. Sooriyabandara, “The Tactile Internet for Industries: A Review,” Proc. IEEE, vol. 107, no. 2, pp. 414–435, 2018.
[35] 3GPP, “Study on Positioning Use cases Stage 1 (Release 16),” 3rd Generation Partnership Research (3GPP), TR 22.872, Sept. 2018, v16.1.0.[Online]. https://www.3gpp.org/ftp/Specs/archive/22 series/22.872/
[36] 5G-ACIA white paper “5G Non-Public Networks for Industrial Scenarios”, https://www.5g-acia.org/fileadmin/5G-ACIA/Publikationen/5G-ACIA_White_Paper_5G_for_Non-Public_Networks_for_Industrial_Scenarios /WP_5G_NPN_2019_01.pdf, July 2019.
[37] 3GPP, “Network sharing; Architecture and functional description,” 3rd Generation Partnership Research (3GPP), TS 23.251, Sept. 2018, v15.1.0, https://www.3gpp.org/ftp/Specs/archive/23 series/23.251/
[38] 3GPP, “Study on Enhancement of 5G System (5GS) for Vertical and Local Area Network (LAN) Services (Re-lease 16),” 3rd Generation Partnership Research (3GPP), TR 23.734, June 2019, v16.2.0.
[39] Harbor Research, “The Private LTE Opportunity for Industrial and Commercial IoT,” Report, July 2017. https://harborresearch.com/private-lte-opportunity/
[40] 3GPP, “Study on NR-based Access to Unlicensed Spectrum,” 3rd Generation Partnership Research (3GPP), TR 38.889, Dec. 2018, v16.0.0. https://www.3gpp.org/ftp/Specs/archive/38 series/38.889/
[41] 3GPP, “Study on NR Industrial Internet of Things (IoT); (Release 16),” 3rd Generation Partnership Research (3GPP), TR 38.825, March 2019, v16.0.0. https://www.3gpp.org/ftp/Specs/archive/
[42] X. Foukas, G. Patounas, A. Elmokashfi, and M. K. Marina, “Network Slicing in 5G: Survey and Challenges,” IEEE Commun. Mag., vol. 55, no. 5, pp. 94–100, 2017.
[43] A. Kaloxylos, “A Survey and an Analysis of Network Slicing in 5G Networks,” IEEE Commun. Standards Mag., vol. 2, no. 1, pp. 60–65, 2018.
[44] I. Afolabi et al., “Network Slicing and Softwarization: A Survey on Principles, Enabling Technologies, and So-lutions,” IEEE Commun.SurveysTuts., vol. 20, no. 3, pp. 2429–2453, 2018.
[45] F. Ansah, M. Majumder, H. de Meer, and J. Jasperneite, “Network Slicing: An Industry Perspective,” in IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2019, pp.1367–1370.
[46] A. L. Swindlehurst, E. Ayanoglu, P. Heydari, and F. Capolino, “Millimeter-wave massive mimo: The next wireless revolution?” IEEE Communications Magazine, vol. 52, no. 9, pp. 56–62, 2014.
[47] N. Docomo, “DOCOMO 5G white paper, 5G radio access: Requirements, concept and technologies,” White Paper, Jul, 2014.
[48] F. Boccardi, R. W. Heath, A. Lozano, T. L. Marzetta, and P. Popovski, “Five disruptive technology directions for 5G,” IEEE Communications Magazine, vol. 52, no. 2, pp. 74–80, 201
[49] 3rd Generation Partnership Research (3GPP), Technical Specification Group Services and System Aspects, “3GPP system architecture evolution (SAE) - security architecture (Release 14),” 3GPP TS 33.401, V14.5.0, Jan. 2018.
[50] 3GPP TS 33.501, “Security architecture and procedures for 5G system”. [online] https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3169
[51] 3GPP TR 38.913 Study on scenarios and requirements for next generation access technologies, [online] https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2996
[52] 3GPP TR 38.811 Study on New Radio (NR) to support non-terrestrial networks.[online] https://www.3gpp.org/ftp/Specs/archive/38_series/38.811/
[53] 3GPP TR 38.813 New frequency range for NR (3.3-4.2 GHz), [online] https://www.3gpp.org/ftp/Specs/archive/38_series/38.813/
[54] Ericsson, Security standards and their role in 5G, [online] https://www.ericsson.com/en/blog/2020/6/security-standards-role-in-5g
[55] Ericsson, Security considerations of Open RAN. [online] Available at: https://www.ericsson.com/en/security/security-considerations-of-open-ra
[56] 3GPP TS 38.861 Study on high power UE (power class 2) for one NR FDD band [online]https://www.3gpp.org/ftp/Specs/archive/38_series/38.861
[57] 3GPP TR 23.724 Study on Cellular Internet of Things (CIoT) support and evolution for the 5G System (5GS) [online]https://www.3gpp.org/ftp/Specs/archive/23_series/23.724
[58] B. Zhang, J. Yuan, Q. Qiu, X. J. Li, and F. Zhang, “Research on 5G security technology and development,” in Proceedings of "5G +" China Mobile Science and Technology Association,pp. 1–5, Beijing, China, 2019.
[59] J. Zhang, Y. Zhao, B. Chen, F. Hu, and K. Zhu, “Research on edge computing data security and privacy pro-tection,” Journalof Communications, vol. 39, no. 3, pp. 1–21, 2018
[60] China Mobile 5G Joint Innovation Center, 5G Slicing Security White Paper for Vertical Industries, China Mo-bile 5G Joint Innovation Center, 2018
[61] I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila,and A. Gurtov, “Overview of 5G security chal-lenges and solutions,” IEEE Communications Standards Magazine, vol. 2,no. 1, pp. 36–43, 2018
[62] M. A. Ferrag, L. Maglaras, A. Argyriou, D. Kosmanos, and H. Janicke, “Security for 4G and 5G cellular net-works: a surveyof existing authentication and privacy-preserving schemes,” Journal of Network and Computer Applications, vol. 101,pp. 55–82, 201
[63] A. K. Das, S. Zeadally, and M. Wazid, “Lightweight authentication protocols for wearable devices,” Computers & Electrical Engineering, vol. 63, pp. 196–208, 2017
[64] Y. Wang, W. Chu, S. Fields, C. Heinemann, and Z. Reiter,“Detection of intelligent intruders in wireless sensor networks,”Future Internet, vol. 8, no. 4, p. 2, 2016
[65] A. L. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intru-sion detection,” IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153–1176, 2016.
[66] Sisinni E, Saifullah A, Han S, Jennehag U, Gidlund M (2018) Industrial Internet of things: Challenges, oppor-tunities, and directions. IEEE Transactions on Industrial Informatics 14(11):4724-4734.
[67] Gebremichael T, Ledwaba LP, Eldefrawy MH, Hancke GP, Pereira N, Gidlund M, Akerberg J (2020) Security and privacy in the industrial internet of things: current standards and future challenges. IEEE Access, 8:152351-152366.
[68] Vitturi S, Zunino C, Sauter T (2019) Industrial communication systems and their future challenges: Next-generation ethernet, IIoT, and 5G. Proceedings of the IEEE, 107(6):944-961.
[69] Tange K, De Donno M, Fafoutis X, Dragoni N (2020) A systematic survey of industrial internet of things secu-rity: Requirements and fog computing opportunities. IEEE Communications Surveys & Tutorials, 22(4):2489-2520.
[70] Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things security: A survey. Journal of Network and Computer Applications, 88:10-28.
[71] Ogonji MM, Okeyo G, Wafula JM (2020) A survey on privacy and security of Internet of things. Computer Science Review, 38:100312.
[72] Kouicem DE, Bouabdallah A, Lakhlef H (2018) Internet of things security: A top-down survey. Computer Net-works, 141:199-221.
[73] Xu H, Yu W, Griffith D, Golmie N (2018) A survey on industrial Internet of things: A cyber-physical systems perspective. IEEE Access, 6:78238- 78259.
[74] Sisinni E, Saifullah A, Han S, Jennehag U, Gidlund M (2018) Industrial Internet of things: Challenges, oppor-tunities, and directions. IEEE Transactions on Industrial Informatics 14(11):4724-4734.
[75] Tange K, De Donno M, Fafoutis X, Dragoni N (2020) A systematic survey of industrial internet of things secu-rity: Requirements and fog computing opportunities. IEEE Communications Surveys & Tutorials, 22(4):2489-2520.
[76] Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things security: A survey. Journal of Network and Computer Applications, 88:10-28.
[77] Ogonji MM, Okeyo G, Wafula JM (2020) A survey on privacy and security of Internet of things. Computer Science Review, 38:100312.
[78] Sicari S, Rizzardi A, Coen-Porisini A (2020) 5G in the internet of things era: An overview on security and pri-vacy challenges. Computer Networks, 179:107345.
[79] Khan R, Kumar P, Jayakody DNK, Liyanage M (2019) A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions. IEEE Communications Surveys & Tutorials, 22(1):196-248.
[80] Ahmad I, Kumar T, Liyanage M, Okwuibe J, Ylianttila M, Gurtov A (2018) Overview of 5G security challeng-es and solutions. IEEE Communications Standards Magazine, 2(1):36-43.
[81] Wang Y, Pan Z, Yuan X, Yang C, Gui W (2020) A novel deep learning based fault diagnosis approach for chemical process with extended deep belief network. ISA Transactions 96:457-467.
[82] Xu Y, Sun Y, Liu X, Zheng Y (2019) A digital-twin-assisted fault diagnosis using deep transfer learning. IEEE Access 7:19990-19999.
[83] Naik B, Obaidat, MS, Nayak J, Pelusi D, Vijayakumar P, Islam SH (2019) Intelligent secure ecosystem based on Metaheuristic and functional link neural network for edge of things. IEEE Transactions on Industrial Infor-matics, 16(3):1947-1956.
[84] Tian Z, Luo C, Qiu J, Du X, Guizani M (2019) A distributed deep learning system for web attack detection on edge devices. IEEE Transactions on Industrial Informatics, 16(3):1963-1971.
[85] Tian Z, Shi W, Wang Y, Zhu C, Du X, Su S, Guizani N (2019) Realtime lateral movement detection based on evidence reasoning network for edge computing environment. IEEE Transactions on Industrial Informatics, 15(7):4285-4294.
[86] Yang C, Shi Z, Zhang H, Wu J, Shi X (2019) Multiple attacks detection in cyber-physical systems using ran-dom finite set theory. IEEE transactions on cybernetics, 50(9):4066-4075.
[87] Krithivasan K, Pravinraj S, VS SS (2020) Detection of cyberattacks in industrial control systems using en-hanced principal component analysis and hypergraph-based convolution neural network (EPCA-HG-CNN). IEEE Transactions on Industry Applications, 56(4):4394-4404.
[88] Hu Y, Li H, Luan TH, Yang A, Sun L, Wang Z, Wang R (2020) Detecting stealthy attacks on industrial control systems using a permutation entropy-based method. Future Generation Computer Systems, 108:1230-1240.
[89] Wu H, Tian H, Fan S, Ren J (2020) Data age aware scheduling for wireless powered mobile-edge computing in industrial internet of things. IEEE Transactions on Industrial Informatics, 17(1):398-408.
[90] Li X, Wan J, Dai HN, Imran M, Xia M, Celesti A (2019) A hybrid computing solution and resource scheduling strategy for edge computin in smart manufacturing. IEEE Transactions on Industrial Informatics,5(7):4225-4234.
[91] Deng S, Xiang Z, Zhao P, Taheri J, Gao H, Yin J, Zomaya AY (2020) Dynamical resource allocation in edge for trustable Internet-of-Things systems: A reinforcement learning method. IEEE Transactions on Industrial In-formatics, 16(9):6103-6113.
[92] Zhang G, Chen Y, Shen Z, Wang L (2018) Distributed energy management for multiuser mobile-edge compu-ting systems with energy harvesting devices and QoS constraints. IEEE Internet of Things Journal,6(3):4035-4048.
[93] Messaoud S, Bradai A, Moulay E (2019) Online GMM clustering and mini-batch gradient descent based opti-mization for Industrial IoT 4.0.IEEE Transactions on Industrial Informatics, 16(2):1427-1435.
[94] Xiang H, Yan S, Peng M. (2020) A realization of fog-RAN slicing via deep reinforcement learning. IEEE Transactions on Wireless Communications, 19(4):2515-2527
[95] Qu K, Zhuang W, Ye Q, Shen X, Li X, Rao J (2020) Dynamic flow migration for embedded services in SDN/NFV-enabled 5G core networks. IEEE Transactions on Communications, 68(4):2394-2408.
[96] Estrada-Solano F, Caicedo OM, Da Fonseca NL (2019) Nelly: Flow detection using incremental learning at the server side of SDN-based datacenters. IEEE Transactions on Industrial Informatics, 16(2):1362-1372.
[97] Ravi N, Shalinie SM (2020) Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud ar-chitecture. IEEE Internet of ThingsJournal, 7(4):3559-3570.
[98] Fang L, Zhao B, Li Y, Liu Z, Ge C, Meng W (2020) Countermeasure based on smart contracts and AI against DoS/DDoS attack in 5G circumstances. IEEE Network, 34(6):54-61.
[99] Saharkhizan M, Azmoodeh A, Dehghantanha A, Choo KKR, Parizi RM (2020). An ensemble of deep recurrent neural networks for detecting IoT cyber attacks using network traffic. IEEE Internet of Things Journal,7(9):8852-8859.
[100] Maimó LF, Celdrán AH, Pérez MG, Clemente FJG, Pérez GM (2019) Dynamic management of a deep learn-ing-based anomaly detection system for 5G networks. Journal of Ambient Intelligence and Humanized Compu-ting 10(8):3083-3097.
[101] Hassan MM, Gumaei A, Huda S, Almogren A (2020) Increasing the trustworthiness in the industrial IoT net-works through a reliable cyberattack detection model. IEEE Transactions on Industrial Informatics, 16(9):6154-6162.
[102] Diro AA, Chilamkurti N (2017) Distributed attack detection scheme using deep learning approach for Internet of things. Future Generation Computer Systems 82:761-768.
[103] Z. Zhou, X. Chen, E. Li, L. Zeng, K. Luo, and J. Zhang, “Edge intelligence: Paving the last mile of artificial intelligence with edge computing,” Proceedings of the IEEE, 107(8), pp.1738- 1762, 2019.
[104] S. Deng, H. Zhao, W. Fang, J. Yin, S. Dustdar, and A.Y. Zomaya, “Edge intelligence: The confluence of edge computing and artificial intelligence,” IEEE Internet of Things Journal, 7(8), pp.7457-7469, 2020.
[105] G. Plastiras, M. Terzi, C. Kyrkou, and T. Theocharidcs, “Edge intelligence: Challenges and opportunities of near-sensor machine learning applications,” In 2018 IEEE 29th international conference on application-specific systems, architectures and processors (asap), pp. 1-7, IEEE, 2018.
[106] Z. Zhou, X. Chen, E. Li, L. Zeng, K. Luo, and J. Zhang, “Edge intelligence: Paving the last mile of artificial intelligence with edge computing,” Proceedings of the IEEE, 107(8), pp.1738- 1762, 2019.
[107] E. Li, Z. Zhou, and X. Chen, “Edge intelligence: On-demand deep learning model co-inference with device-edge synergy,” In Proceedings of the 2018 Workshop on Mobile Edge Communications, pp. 31-36, 2018.
[108] X. Zhang, Y. Wang, S. Lu, L. Liu, L. and W. Shi, “OpenEI: An open framework for Edge computing gatway ” In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp. 1840-1851, IEEE, 2019
[109] J. Zhang and K.B. Letaief, “Mobile edge intelligence and computing for the internet of vehicles,” Proceedings of the IEEE, 108(2), pp.246-261, 2019.
[110] Y. Liu, M. Peng, G. Shou, Y. Chen, and S. Chen, “Toward edge intelligence: Multiaccess edge computing for 5G and Internet of Things,” IEEE Internet of Things Journal, 7(8), pp.6722-6747, 2020.
[111] K.P. Seng and L.M. Ang, “Embedded intelligence: state-of-the- art and research challenges,” IEEE Access, 10, pp.59236-59258, 2022.
[112] S. Xu, Y. Qian, and R.Q. Hu, “Edge intelligence assisted gateway defense in cyber security,” IEEE Network, 34(4), pp.14-19, 2020.
[113] S. Xu, Y. Qian, and R.Q. Hu, “Data-driven edge intelligence for robust network anomaly detection,” IEEE Transactions on Network Science and Engineering, 7(3), pp.1481-1492, 2019.
[114] S. Rajendran, S.K. Mathivanan, P. Jayagopal, K.P. Janaki,B.A.M.M. Bernard, S. Pandy, and M.S. Somana-than, “Emphasizing privacy and security of edge intelligence with machine learning for healthcare,” Internation-al Journal of Intelligent Computing and Cybernetics, 2021.
[115] Y. Li, Y. Yu, W. Susilo, Z. Hong, and M. Guizani, “Security and privacy for edge intelligence in 5G and be-yond networks: Challenges and solutions,” IEEE Wireless Communications, 28(2), pp.63-69, 2021.
[116] C. Dehury, S.N. Srirama, P.K. Donta, and S. Dustdar, “Securing clustered edge intelligence with blockchain,” IEEE Consumer Electronics Magazine, 2022.
[117] Y. An, F.R. Yu, J. Li, J. Chen, and V.C. Leung, “Edge intelligence (EI)-enabled HTTP anomaly detection framework for the Internet of Things (IoT),” IEEE Internet of Things Journal, 8(5), pp.3554-3566, 2020.
[118] P. Zhang, X. Yang, J. Chen, and Y. Huang, “A Survey of Testing for 5G: Solutions, Opportunities, and Chal-lenges,” China Communications, vol. 16, no. 1, pp. 69–85, 2019.
[119] M. Liyanage, I. Ahmad, A. B. Abro, A. Gurtov, and M. Ylianttila, A Comprehensive Guide to 5G Security. Wiley Publishing, 2018.
[120] G. Maier and M. Reisslein, “Transport SDN at the Dawn of the 5G Era,” 2019.
[121] S. Sarraf, “5G Emerging Technology and Affected Industries: Quick Survey,” American Scientific Research Journal for Engineering, Technology, and Sciences (ASRJETS), vol. 55, no. 1, pp. 75–82, 2019.
[122] S. Li, L. Da Xu, and S. Zhao, “5G Internet of Things: A Survey,” Journal of Industrial Information Integration, 2018.
[123] R. Ahmed, A. K. Malviya, M. J. Kaur, and V. P. Mishra, “Comprehensive Survey of Key Technologies Ena-bling 5G-IoT,” Available at SSRN 3351007, 2019.
[124] M. Chen, Y. Qian, S. Mao, W. Tang, and X. Yang, “Software-Defined Mobile Networks Security,” Mobile Networks and Applications, vol. 21, no. 5, pp. 729–743, 2016.
[125] P. Gandotra and R. K. Jha, “A survey on green communication and security challenges in 5G wireless commu-nication networks,” Journal of Network and Computer Applications, vol. 96, pp. 39–61, 2017.
[126] A. K. Rangisetti and B. R. Tamma, “Software Defined Wireless Networks: A Survey of Issues and Solutions,” Wireless Personal Communications, vol. 97, no. 4, pp. 6019–6053, 2017.
[127] A. Y. Ding, J. Crowcroft, S. Tarkoma, and H. Flinck, “Software Defined Networking for Security Enhance-ment in Wireless Mobile Networks,” Computer Networks, vol. 66, pp. 94–101, 2014.
[128] G. Choudhary and V. Sharma, “A Survey on the Security and the Evolution of Osmotic and Catalytic Compu-ting for 5G Networks,” in 5G Enabled Secure Wireless Networks. Springer, 2019, pp. 69–102.
[129] D. Rupprecht, A. Dabrowski, T. Holz, E. Weippl, and C. P¨opper, “On Security Research towards Future Mo-bile Network Generations,” IEEE Communications Surveys & Tutorials, 2018.
[130] I. Alsmadi and D. Xu, “Security of Software Defined Networks: A, Survey,” computers & security, vol. 53, pp. 79–108, 2015.
[131] Q. Yan, F. R. Yu, Q. Gong, and J. Li, “Software-Defined Networking (SDN) and Distributed Denial of Ser-vice (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges,” IEEE Communications Surveys & Tutorials, vol. 18, no. 1, pp.602–622, 2016.
[132] W. Yang and C. Fung, “A Survey On Security In Network Function Virtualization,” in NetSoft Conference and Workshops (NetSoft), 2016 IEEE. IEEE, 2016, pp. 15–19.
[133] H. Jang, J. Jeong, H. Kim, and J.-S. Park, “A Survey on Interfaces to Network Security Functions in Network Virtualization,” in Advanced Information Networking and Applications Workshops (WAINA), 2015 IEEE 29th International Conference on. IEEE, 2015, pp. 160–163.
[134] T. Dargahi, A. Caponi, M. Ambrosin, G. Bianchi, and M. Conti,A Survey on the Security of Stateful SDN Data Planes,” IEEE Communications Surveys & Tutorials, vol. 19, no. 3, pp. 1701–1725,2017.
[135] P. Singh, P. Pawar, and A. Trivedi, “Physical Layer Security Approaches in 5G Wireless Communication Net-works,” in 2018 First International Conference on Secure Cyber Computing and Communication(ICSCCC). IEEE, 2019, pp. 477–482.
[136] S. K. Mohapatra, B. R. Swain, and P. Das, “Comprehensive Survey of Possible Security Issues on 4G Net-works,” International Journal of Network Security & Its Applications, vol. 7, no. 2, p. 61, 2015.
[137] J. Arkko, K. Norrman, M. Näslund and B. Sahlin, "A usim compatible 5g aka protocol with perfect forward se-crecy," in IEEE Trustcom/BigDataSE/ISPA, vol. 1, pp. 1205– 1209, 2015.
[138] A. Koutsos, "The 5g-aka authentication protocol privacy," in IEEE European Symposium on Security and Pri-vacy (EuroS P), Stockholm, Sweden, pp. 464–479, 2019.
[139] L. Wang, J. Liu, M. Chen, G. Gui and H. Sari, "Optimization-based access assignment scheme for physical-layer security in d2d communications underlying a cellular network," IEEE Transaction Vehicular Technology, vol. 67, no. 7, pp. 5766–5777, 2018.
[140] M.A. Rahman and E. Al-Shaer, "Automated syndissertation of distributed network access controls: a formal framework with refinement," IEEE Transaction Parallel Distributed System, vol. 28, no. 2, pp. 416–430, 2017.
[141] M. Khan, P. Ginzboorg, K. Jarvinen and V. Niemi, "Defeating the downgrade attack on identity privacy in 5g," In International Conference on Research in Security Standardisation, Darmstadt, vol. 11322, pp. 95-119, 2018.
[142] M.C. Dacier, H. König, R. Cwalinski, F. Kargl and S. Dietrich, "Security challenges and opportunities of soft-ware-defined networking," IEEE Security and Privacy, vol. 15, no. 2, pp. 96–100, 2017.
[143] A. R. Prasad, "3gpp 5g security," Journal of ICT Standardization, vol. 6, no. 2, pp. 137-158, 2018.
[144] C. Li and B. Palanisamy, "Privacy in internet of things: from principles to technologies," IEEE Internet Things Journal, vol. 6, no. 1, pp. 488–505, 2019.
[145] K. Yan, W. Shen, Q. Jin and H. Lu, "Emerging privacy issues and solutions in cyber-enabled sharing services: from multiple perspectives," IEEE Access, vol. 7, pp. 26031–26059, 2019.
[146] P.F. Scott, "Secrecy and surveillance: lessons from the law of imsi catchers," International Review of Law, Computers and Technology, vol. 33, no. 3, pp. 349-371, 2019.
[147] A. Braeken, M. Liyanage, P. Kumar and J. Murphy, "Novel 5g authentication protocol to improve the re-sistance against active attacks and malicious serving networks," IEEE Journals & Magazine, vol. 7, pp. 64040 - 64052, 2019.
[148] W. Shafik, S. M. Matinkhah, M. N. Sanda, and F. Shokoor, “Internet of things-based energy efficiency optimi-zation model in fog smart cities,” International Journal on Informatics Visualization, vol. 5, no. 2, pp. 105–112, 2021.
[149] W. Shafik and S. M. Matinkhah, “Unmanned aerial vehicles analysis to social networks performance,” CSI Journal on Computer Science and Engineering, vol. 18, no. 2, pp. 24-31, 2021.
[150] F. Pan, Z. Pang, M. Luvisotto, M. Xiao and H. Wen, "Physical-layer security for industrial wireless control sys-tems: basics and future directions," IEE Industrial. Electronic Magazine, vol. 12, no. 4, pp. 18–27, 2018.
[151] W. Shafik, S. M. Matinkhah and S. "Dimensional fast machine learning algorithm for mobile unmanned aerial vehicle base stations," International Journal of Advances in Applied Sciences, 2252, no. 8814, pp. 8814, 2020.
[152] M. Frustaci, P. Pace, G. Aloi and G. Fortino, "Evaluating critical security issues of the iot world: present and future challenges," IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2483–2495, 2018.
[153] J. Pacheco, D. Ibarra, A. Vijay and S. Hariri, "IoT security framework for smart water system," in IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), Hammamet, Tunisia, pp. 1285– 1292, 2017.
[154] S. R. Hussain, M. Echeverria, A. Singla, O. Chowdhury and E. Bertino, "Insecure connection bootstrapping in cellular networks," Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Net-works, Miami, Florida, pp. 1-11, 2019.
[155] Peter Rost, Albert Banchs, Ignacio Berberana, Markus Breitbach, MarkDoll, Heinz Droste, Christian Mann-weiler, Miguel A Puente, Konstantinos Samdanis, and Bessem Sayadi. Mobile network architecture evolution toward 5g. IEEE Communications Magazine, 54(5):84–91, 2016.
[156] Tobias Engel. Locating mobile phones using signalling system 7. In 25th Chaos communication congress, 2008.
[157] Tobias Engel, Day Day, Room Saal, and Track Hacking. Locating mobile phones using ss7. In 25th Chaos Communication Congress, 2009.
[158] Tobias Engel. SS7: Locate. track. manipulate. In FTP: http://events.ccc.de/congress/2014/Fahrplan/system/attachments/2553/or iginal/31c3-ss7-locate-track-manipulate. pdf, 2014.
[159] Karsten Nohl and Luca Melette. Defending mobile phones. In The 28th Chaos Communication Congress, 2011.
[160] Roger Piqueras Jover. Security analysis of sms as a second factor of authentication:The challenges of multifactor authentication based on sms,including cellular security deciencies, ss7 exploits, and sim swapping.Queue, 18(4):37–60, 2020.
[161] Positive Technologies. Ss7 network security analysis report.https://positive-tech.com/knowledge-base/research/ss7-network-securityanalysis-2020/. Accessed: 2021-15-02.Function (IWF) between MAP based and Diameter based interfaces. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=1704.
[162] Assaf Klinger. Technical report on ss7 vulnerabilities and mitigationmeasures for digital nancial services transactions. https://www.itu.int/en/ITU/extcoop/figisymposium/Documents/ITU_SIT_WG_Technical%20report%20on%20the%20SS7%20vulnerabilities%20and%20their%20impact%20on%20DFS%20transactions_f.pdf. Accessed: 2021-15-02.
[163] Global System for Mobile Communications (GSMA). IMEI Database. https://imeidb.gsma.com/imei/index#. Accessed: 2020-10-12.
[164] 3rd Generation Partnership Research (3GPP). TS 33.210: Network Domain Security (NDS); IP network layer security. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId= 2279
[165] 3rd Generation Partnership Research (3GPP). TS 29.305: InterWorking Function (IWF) between MAP based and Diameter based interfaces. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=1704.
[166] 3rd Generation Partnership Research (3GPP). TR 29.805: InterWorking Function (IWF) between MAP based and Diameter based interfaces. https://portal.3gpp.org/desktopmodules/Specifications/ SpecificationDe-tails.aspx?specificationId=1741.
[167] Bill Welch. Exploiting the weaknesses of SS7. Network Security, 2017(1):17–19, 2017. Elsevier.
[168] Dan Forsberg, Gu¨nther Horn, Wolf-Dietrich Moeller, and Valtteri Niemi.LTE security. John Wiley & Sons, 2012.
[169] Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Yuanjie Li, and Songwu Lu. New security threats caused by IMS-based SMS service in 4G LTE networks. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pages 1118–1130, 2016.
[170] Sergey Mashukov. Diameter Security: An Auditor’s Viewpoint. Journal of ICT Standardization, 5(1):53–68, 2017. River Publishers.
[171] Hsin Yi Chen “Domain-specific Threat Modeling for Mobile Communication Systems”, Master’s Dissertation, July 14, 2021 Aalto University
[172] A. Zaidi et al., “Cellular IoT evolution for industry digitalization,” Ericsson White Paper, GFMC-19, vol. 17, 2019.
[173] M. Ehret and J. Wirtz, “Unlocking value from machines: Business models and the industrial Internet of Things,” J. Marketing Manage., vol. 33,nos. 1/2, pp. 111–130, 2017.
[174] H. Viswanathan and P. E. Mogensen, “Communications in the 6G era,” IEEE Access, vol. 8, pp. 57 063–57074, 2020
[175] E. Manavalan and K. Jayakrishna, ‘‘A review of Internet of Things (IoT) embedded sustainable supply chain for industry 4.0 requirements,’’ Comput. Ind. Eng., vol. 127, pp. 925–953, Jan. 2019.
[176] Theodore J Williams. The purdue enterprise reference architecture. Computers in industry, 24(2):141–158,1994.
[177] Nokia, “Embrace Industry 4.0 with digitalization” https://www.nokia.com/networks/private-wireless/#embrace-industry-4-0-operations.
[178] Ericsson, “5G Business Potential from Industry Digitalization”, July, 2018 https://www.itu.int/en/ITU-D/Regional-Pres-ence/Europe/Documents/Events/2018/5GHungary/S4%20Sylvana%20Apicella%205G%20Business%20Potential%20from%20Industry%20Digitalization%20Rev.A%20External.pdf
[179] Checkpoint, “ICS Security Best Practices”,https://www.checkpoint.com/cyber-hub/network-security/what-is-industrial-control-systems-ics-security/ics-security-best-practices/
[180] Packt, ”The Purdue model for Industrial control systems ” https://subscription.packtpub.com/book/security/9781788395151/1/ch01lvl1sec10/the-purdue-model-for-industrial-control-systems
[181] ENISA. ENISA threat landscape for 5G Networks, 2020. https://www. enisa.europa.eu/publications/enisa-threat-landscape-for-5g-networks.Accessed 17.06.2021.
[182] MITRE FiGHT (5G Hierarchy of Threats) knowledge base of adversary Tactics and Techniques, https://fight.mitre.org/
[183] Trend Micro and Telecom Technology Center (TTC), “How a Packet Reflection Vulnerability Could Allow At-tackers to Infiltrate Internal 5G Networks” June, 2023
指導教授 吳曉光(Eric Hsiao-kuang Wu) 審核日期 2024-7-22
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明