All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Survey on 5G Physical Layer Security Threats and Countermeasures

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26220%2F24%3APU152149" target="_blank" >RIV/00216305:26220/24:PU152149 - isvavai.cz</a>

  • Result on the web

    <a href="https://www.mdpi.com/1424-8220/24/17/5523" target="_blank" >https://www.mdpi.com/1424-8220/24/17/5523</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.3390/s24175523" target="_blank" >10.3390/s24175523</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Survey on 5G Physical Layer Security Threats and Countermeasures

  • Original language description

    With the expansion of wireless mobile networks into both the daily lives of individuals as well as into the widely developing market of connected devices, communication is an increasingly attractive target for attackers. As the complexity of mobile cellular systems grows and the respective countermeasures are implemented to secure data transmissions, the attacks have become increasingly sophisticated on the one hand, but at the same time the system complexity can open up expanded opportunities for security and privacy breaches. After an in-depth summary of possible entry points to attacks to mobile networks, this paper first briefly reviews the basic principles of the physical layer implementation of 4G/5G systems, then gives an overview of possible attacks from a physical layer perspective. It also provides an overview of the software frameworks and hardware tool-software defined radios currently in use for experimenting with 4G/5G mobile networks, and it discusses their basic capabilities. In the final part, the paper summarizes the currently most promising families of techniques to detect illegitimate base stations-the machine-learning-based, localization-based, and behavior-based methods.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>imp</sub> - Article in a specialist periodical, which is included in the Web of Science database

  • CEP classification

  • OECD FORD branch

    20202 - Communication engineering and systems

Result continuities

  • Project

    <a href="/en/project/VJ03030044" target="_blank" >VJ03030044: Robust 5G networks</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2024

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    SENSORS

  • ISSN

    1424-8220

  • e-ISSN

    1424-3210

  • Volume of the periodical

    24

  • Issue of the periodical within the volume

    17

  • Country of publishing house

    CH - SWITZERLAND

  • Number of pages

    40

  • Pages from-to

    1-40

  • UT code for WoS article

    001311579300001

  • EID of the result in the Scopus database

    2-s2.0-85203867786