Show simple item record

Files in this item

Thumbnail

Item metadata

dc.contributor.authorSharma, Vishal
dc.contributor.authorVarghese, Blesson
dc.contributor.authorMcAllister, John
dc.contributor.authorMohanty, Saraju
dc.date.accessioned2022-09-26T15:30:22Z
dc.date.available2022-09-26T15:30:22Z
dc.date.issued2021-05-19
dc.identifier278898989
dc.identifierbc7ddbd6-1c2a-4991-adb7-3b5dcae2c94e
dc.identifier85107226304
dc.identifier.citationSharma , V , Varghese , B , McAllister , J & Mohanty , S 2021 , ' Abusive adversaries in 5G and beyond IoT ' , IEEE Consumer Electronics Magazine , vol. 11 , no. 4 , 9435931 , pp. 11 - 20 . https://doi.org/10.1109/MCE.2021.3079998en
dc.identifier.issn2162-2248
dc.identifier.urihttps://hdl.handle.net/10023/26072
dc.description.abstract5G and subsequent cellular network generations aim to extend ubiquitous connectivity of billions of Internet-of-Things (IoT) for their consumers. Security is a prime concern in this context as adversaries have evolved to become smart and often employ new attack strategies. Network defenses can be enhanced against attacks by employing behavior models for devices to detect misbehavior. One example is Abusive Modeling (AM) that is inspired by financial technologies to defend adversaries operating with unlimited resources who have no intention of self-profit apart from harming the system. This article investigates behavior modeling against abusive adversaries in the context of 5G and beyond security functions for IoT. Security threats and countermeasures are discussed to understand AM. A complexitysecurity trade-off enables a better understanding of the limitations of state-based behavior modeling and paves the way as a future direction for developing more robust solutions against AM.
dc.format.extent10
dc.format.extent854868
dc.language.isoeng
dc.relation.ispartofIEEE Consumer Electronics Magazineen
dc.subjectQA75 Electronic computers. Computer scienceen
dc.subject3rd-DASen
dc.subjectACen
dc.subjectNCADen
dc.subject.lccQA75en
dc.titleAbusive adversaries in 5G and beyond IoTen
dc.typeJournal articleen
dc.contributor.institutionUniversity of St Andrews. School of Computer Scienceen
dc.identifier.doi10.1109/MCE.2021.3079998
dc.description.statusPeer revieweden
dc.identifier.urlhttps://pure.qub.ac.uk/en/publications/abusive-adversaries-in-5g-and-beyond-ioten


This item appears in the following Collection(s)

Show simple item record