Show simple item record

Files in this item

Thumbnail

Item metadata

dc.contributor.authorSharma, Vishal
dc.contributor.authorVarghese, Blesson
dc.contributor.authorMcAllister, John
dc.contributor.authorMohanty, Saraju
dc.date.accessioned2022-09-26T15:30:22Z
dc.date.available2022-09-26T15:30:22Z
dc.date.issued2021-05-19
dc.identifier.citationSharma , V , Varghese , B , McAllister , J & Mohanty , S 2021 , ' Abusive adversaries in 5G and beyond IoT ' , IEEE Consumer Electronics Magazine , vol. 11 , no. 4 , 9435931 , pp. 11 - 20 . https://doi.org/10.1109/MCE.2021.3079998en
dc.identifier.issn2162-2248
dc.identifier.otherPURE: 278898989
dc.identifier.otherPURE UUID: bc7ddbd6-1c2a-4991-adb7-3b5dcae2c94e
dc.identifier.otherScopus: 85107226304
dc.identifier.urihttps://hdl.handle.net/10023/26072
dc.description.abstract5G and subsequent cellular network generations aim to extend ubiquitous connectivity of billions of Internet-of-Things (IoT) for their consumers. Security is a prime concern in this context as adversaries have evolved to become smart and often employ new attack strategies. Network defenses can be enhanced against attacks by employing behavior models for devices to detect misbehavior. One example is Abusive Modeling (AM) that is inspired by financial technologies to defend adversaries operating with unlimited resources who have no intention of self-profit apart from harming the system. This article investigates behavior modeling against abusive adversaries in the context of 5G and beyond security functions for IoT. Security threats and countermeasures are discussed to understand AM. A complexitysecurity trade-off enables a better understanding of the limitations of state-based behavior modeling and paves the way as a future direction for developing more robust solutions against AM.
dc.format.extent10
dc.language.isoeng
dc.relation.ispartofIEEE Consumer Electronics Magazineen
dc.rightsCopyright © 2021 IEEE. This work has been made available online in accordance with publisher policies or with permission. Permission for further reuse of this content should be sought from the publisher or the rights holder. This is the author created accepted manuscript following peer review and may differ slightly from the final published version. The final published version of this work is available at https://doi.org/10.1109/MCE.2021.3079998.en
dc.subjectQA75 Electronic computers. Computer scienceen
dc.subject3rd-DASen
dc.subjectACen
dc.subjectNCADen
dc.subject.lccQA75en
dc.titleAbusive adversaries in 5G and beyond IoTen
dc.typeJournal articleen
dc.description.versionPostprinten
dc.contributor.institutionUniversity of St Andrews. School of Computer Scienceen
dc.identifier.doihttps://doi.org/10.1109/MCE.2021.3079998
dc.description.statusPeer revieweden
dc.identifier.urlhttps://pure.qub.ac.uk/en/publications/abusive-adversaries-in-5g-and-beyond-ioten


This item appears in the following Collection(s)

Show simple item record