Secure 5G Positioning with Truth Discovery, Attack Detection and Tracing
dc.contributor | Aalto-yliopisto | fi |
dc.contributor | Aalto University | en |
dc.contributor.author | Li, Yilin | en_US |
dc.contributor.author | Liu, Shushu | en_US |
dc.contributor.author | Yan, Zheng | en_US |
dc.contributor.author | Deng, Robert H. | en_US |
dc.contributor.department | Department of Communications and Networking | en |
dc.contributor.groupauthor | Network Security and Trust | en |
dc.contributor.organization | Xidian University | en_US |
dc.contributor.organization | Singapore Management University | en_US |
dc.date.accessioned | 2021-09-02T08:46:26Z | |
dc.date.available | 2021-09-02T08:46:26Z | |
dc.date.issued | 2021-06-14 | en_US |
dc.description | Publisher Copyright: IEEE | |
dc.description.abstract | The fifth-generation (5G) cellular network is expected to provide sub-meter positioning accuracy without draining the battery of user equipment. As a solution, ultra-dense network (UDN) deployment and network-based positioning were proposed. However, the openness of UDN and the vulnerability of network devices (e.g., access nodes) make it easy for attackers to poison such a positioning system. However, no existing work explores how to overcome this issue. This paper concentrates on jamming and collusion attacks in the network based positioning system. Specifically, we design a novel scheme that contains three functional modules to erase the influence of these attacks. A truth discovery module applies a clustering-based method aiming to generate the most approximate position value and find out suspicious signals. Based on neural network models, we further develop an attack detection module and an attack tracing module to perceive attacked user equipment and locate malicious or attacked access nodes. Through simulation, we conduct extensive experiments to illustrate the effectiveness of our scheme. The result shows high detection and tracing accuracy with very simple neural network models, which also implies the potential of our proposed scheme in practical deployment. | en |
dc.description.version | Peer reviewed | en |
dc.format.extent | 10 | |
dc.format.mimetype | application/pdf | en_US |
dc.identifier.citation | Li, Y, Liu, S, Yan, Z & Deng, R H 2021, ' Secure 5G Positioning with Truth Discovery, Attack Detection and Tracing ', IEEE Internet of Things Journal . https://doi.org/10.1109/JIOT.2021.3088852 | en |
dc.identifier.doi | 10.1109/JIOT.2021.3088852 | en_US |
dc.identifier.issn | 2327-4662 | |
dc.identifier.other | PURE UUID: 8a6786a9-a726-44ce-8ed2-6c5221cedafa | en_US |
dc.identifier.other | PURE ITEMURL: https://research.aalto.fi/en/publications/8a6786a9-a726-44ce-8ed2-6c5221cedafa | en_US |
dc.identifier.other | PURE LINK: http://www.scopus.com/inward/record.url?scp=85112220926&partnerID=8YFLogxK | en_US |
dc.identifier.other | PURE FILEURL: https://research.aalto.fi/files/66880683/ELEC_Li_etal_Secure_5G_Positioning_IEEE_JIOT_2021_acceptedauthormanuscript.pdf | en_US |
dc.identifier.uri | https://aaltodoc.aalto.fi/handle/123456789/109600 | |
dc.identifier.urn | URN:NBN:fi:aalto-202109028832 | |
dc.language.iso | en | en |
dc.publisher | IEEE | |
dc.relation.ispartofseries | IEEE Internet of Things Journal | en |
dc.rights | openAccess | en |
dc.subject.keyword | 5G mobile communication | en_US |
dc.subject.keyword | 5G positioning | en_US |
dc.subject.keyword | attack detection and tracing. | en_US |
dc.subject.keyword | clustering | en_US |
dc.subject.keyword | Feature extraction | en_US |
dc.subject.keyword | Global Positioning System | en_US |
dc.subject.keyword | Jamming | en_US |
dc.subject.keyword | Location awareness | en_US |
dc.subject.keyword | neural network | en_US |
dc.subject.keyword | Neural networks | en_US |
dc.subject.keyword | Peer-to-peer computing | en_US |
dc.subject.keyword | truth discovery | en_US |
dc.title | Secure 5G Positioning with Truth Discovery, Attack Detection and Tracing | en |
dc.type | A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä | fi |
dc.type.version | acceptedVersion |