Capture the RAT: Proximity-Based Attacks in 5G Using the Routine Activity Theory
Title | Capture the RAT: Proximity-Based Attacks in 5G Using the Routine Activity Theory |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Nieto, A., Acien, A., Lopez, J. |
Conference Name | 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech) |
Date Published | aug |
ISBN Number | 978-1-5386-7518-2 |
Keywords | 5G cellular networks, 5G devices, 5G environments, 5G mobile communication, 5G security, Analytical models, Autonomic Security, Autonomous vehicles, capillary network, Cellular networks, cellular radio, composability, CRAT, critical IoT devices, Device-to-device communication, Hardware, high-level approach, OMNET++, proactive security, proximity-based attack analysis, proximity-based cybercrime, pubcrawl, RAT, reactive solutions, resilience, Resiliency, routine activity theory, security, security analysis, security problems, security software developers, Software, telecommunication security |
Abstract | The fifth generation of cellular networks (5G) will enable different use cases where security will be more critical than ever before (e.g. autonomous vehicles and critical IoT devices). Unfortunately, the new networks are being built on the certainty that security problems cannot be solved in the short term. Far from reinventing the wheel, one of our goals is to allow security software developers to implement and test their reactive solutions for the capillary network of 5G devices. Therefore, in this paper a solution for analysing proximity-based attacks in 5G environments is modelled and tested using OMNET++. The solution, named CRAT, is able to decouple the security analysis from the hardware of the device with the aim to extend the analysis of proximity-based attacks to different use-cases in 5G. We follow a high-level approach, in which the devices can take the role of victim, offender and guardian following the principles of the routine activity theory. |
URL | https://ieeexplore.ieee.org/document/8511943 |
DOI | 10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00100 |
Citation Key | nieto_capture_2018 |
- Resiliency
- OMNET++
- proactive security
- proximity-based attack analysis
- proximity-based cybercrime
- pubcrawl
- RAT
- reactive solutions
- resilience
- high-level approach
- routine activity theory
- security
- Security analysis
- security problems
- security software developers
- Software
- telecommunication security
- 5G cellular networks
- Hardware
- Device-to-device communication
- critical IoT devices
- CRAT
- composability
- cellular radio
- Cellular networks
- capillary network
- autonomous vehicles
- Autonomic Security
- Analytical models
- 5G security
- 5G mobile communication
- 5G environments
- 5G devices