Show simple item record

dc.contributor.authorAli, Hamza
dc.contributor.authorKhalid, Shaheer
dc.contributor.authorIqbal, Sadiq
dc.contributor.authorHamamreh, Jehad M.
dc.date.accessioned2024-03-20T11:22:23Z
dc.date.available2024-03-20T11:22:23Z
dc.date.issued2022
dc.identifier.citationAli, H., Khalid, S., Iqbal, S. & Hamamreh, J. M. (2022). Protecting IMSI from fake base stations exploitation and spoofers impersonation in 5G and beyond cellular networks. RS Open Journal on Innovative Communication Technologies, 3(7).en_US
dc.identifier.issn3023-5014
dc.identifier.urihttp://hdl.handle.net/20.500.12566/1978
dc.descriptionAuthors propose a novel hack-proof framework that can perfectly secure IMSI numbers, resulting in having protection against spoofing attacks. The proposed algorithm includes a mobile device (UE) and a gNodeB (BS) that communicate in the clear to authenticate each other securely.en_US
dc.description.abstractFifth-generation (5G) mobile networks require authenticated and fully secured transmissions between user devices and 5G base stations (gNodeB). In the current 5G technology standard, mobile devices cannot distinguish between a real and a fake base station (BS) by following the standard 5G security protocols. This vulnerability is a dangerous security issue identified in 5G cellular networks worldwide, where hackers and spoofers can easily impersonate or hack the valuable information of mobile users. Although 5G security protocols are enhanced to prevent such kinds of attacks, fake BSs still threaten the security of wireless communication networks. To the best of the authors’ knowledge, there is currently no security method available in the literature that can enable users to identify who is sending the connection request response. Thus, this can allow an attacker to intercept the international mobile subscriber identity (IMSI) easily in the clear. Therefore, in this work, we propose a novel hack-proof framework that can perfectly secure IMSI resulting in prevention against spoofing attacks. The proposed algorithm includes a user equipment device (UE) and a BS that communicate in the clear to securely authenticate each other in a TDD fashion. For simulation purposes, an OFDM transmission scheme is considered over a multipath wireless fading channel. The obtained results show that our proposed method works successfully without affecting the reliability of the transmitted bits compared to plain data transmission methods. More specifically, the performance results are shown to be similar to normal OFDM-based data transmission schemes conducted over general multipath fading channels, where no further degradation is caused. This indicates that the proposed method can effectively secure the IMSI of mobile user devices against active and passive attackers by providing a safe network connection between the communicating parties (UE and BS).en_US
dc.description.sponsorshipNo sponsoren_US
dc.language.isoengen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectFifth generation networken_US
dc.subjectBeşinci nesil ağtr_TR
dc.subjectBase stationen_US
dc.subjectBaz istasyonutr_TR
dc.subjectUser equipmenten_US
dc.subjectKullanıcı ekipmanıtr_TR
dc.subjectWireless communicationen_US
dc.subjectKablosuz iletişimtr_TR
dc.subject5Gen_US
dc.subjectIMSIen_US
dc.subjectXOR functionen_US
dc.subjectXOR işlevitr_TR
dc.subjectSecret keyen_US
dc.subjectGizli anahtartr_TR
dc.titleProtecting IMSI from fake base stations exploitation and spoofers impersonation in 5G and beyond cellular networksen_US
dc.typeinfo:eu-repo/semantics/articleen_US
dc.relation.publicationcategoryInternational publicationen_US
dc.identifier.volume3
dc.identifier.issue7
dc.contributor.orcid0000-0003-4435-5500 [Hamamreh, Jehad M.]
dc.contributor.abuauthorHamamreh, Jehad M.
dc.contributor.yokid291980 [Hamamreh, Jehad M.]
dc.relation.journalRS Open Journal on Innovative Communication Technologiesen_US
dc.identifier.doi10.46470/03d8ffbd.4f956b48


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record