Secure 5G Positioning with Truth Discovery, Attack Detection and Tracing
Loading...
Access rights
openAccess
URL
Journal Title
Journal ISSN
Volume Title
A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä
This publication is imported from Aalto University research portal.
View publication in the Research portal (opens in new window)
View/Open full text file from the Research portal (opens in new window)
Other link related to publication (opens in new window)
View publication in the Research portal (opens in new window)
View/Open full text file from the Research portal (opens in new window)
Other link related to publication (opens in new window)
Authors
Li, Yilin
Liu, Shushu
Yan, Zheng
Deng, Robert H.
Date
2021-06-14
Major/Subject
Mcode
Degree programme
Language
en
Pages
10
Series
IEEE Internet of Things Journal
Abstract
The fifth-generation (5G) cellular network is expected to provide sub-meter positioning accuracy without draining the battery of user equipment. As a solution, ultra-dense network (UDN) deployment and network-based positioning were proposed. However, the openness of UDN and the vulnerability of network devices (e.g., access nodes) make it easy for attackers to poison such a positioning system. However, no existing work explores how to overcome this issue. This paper concentrates on jamming and collusion attacks in the network based positioning system. Specifically, we design a novel scheme that contains three functional modules to erase the influence of these attacks. A truth discovery module applies a clustering-based method aiming to generate the most approximate position value and find out suspicious signals. Based on neural network models, we further develop an attack detection module and an attack tracing module to perceive attacked user equipment and locate malicious or attacked access nodes. Through simulation, we conduct extensive experiments to illustrate the effectiveness of our scheme. The result shows high detection and tracing accuracy with very simple neural network models, which also implies the potential of our proposed scheme in practical deployment.Description
Publisher Copyright: IEEE
Keywords
5G mobile communication, 5G positioning, attack detection and tracing., clustering, Feature extraction, Global Positioning System, Jamming, Location awareness, neural network, Neural networks, Peer-to-peer computing, truth discovery
Other note
Citation
Li, Y, Liu, S, Yan, Z & Deng, R H 2021, ' Secure 5G Positioning with Truth Discovery, Attack Detection and Tracing ', IEEE Internet of Things Journal . https://doi.org/10.1109/JIOT.2021.3088852