Abusive adversaries in 5G and beyond IoT

Vishal Sharma, Blesson Varghese, John McAllister, Saraju Mohanty

Research output: Contribution to journalArticlepeer-review

Abstract

5G and subsequent cellular network generations aim to extend ubiquitous connectivity of billions of Internet-of-Things (IoT) for their consumers. Security is a prime concern in this context as adversaries have evolved to become smart and often employ new attack strategies. Network defenses can be enhanced against attacks by employing behavior models for devices to detect misbehavior. One example is Abusive Modeling (AM) that is inspired by financial technologies to defend adversaries operating with unlimited resources who have no intention of self-profit apart from harming the system. This article investigates behavior modeling against abusive adversaries in the context of 5G and beyond security functions for IoT. Security threats and countermeasures are discussed to understand AM. A complexitysecurity trade-off enables a better understanding of the limitations of state-based behavior modeling and paves the way as a future direction for developing more robust solutions against AM.
Original languageEnglish
Article number9435931
Pages (from-to)11 - 20
Number of pages10
JournalIEEE Consumer Electronics Magazine
Volume11
Issue number4
DOIs
Publication statusPublished - 19 May 2021

Fingerprint

Dive into the research topics of 'Abusive adversaries in 5G and beyond IoT'. Together they form a unique fingerprint.

Cite this