2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 2018
DOI: 10.1109/dasc/picom/datacom/cyberscitec.2018.00100
|View full text |Cite
|
Sign up to set email alerts
|

Capture the RAT: Proximity-Based Attacks in 5G Using the Routine Activity Theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Other general solutions address the security of SDMN [Liyanage et al, 2015;Bouras et al, 2017a], security policies [Zhao et al, 2021b;Batalla et al, 2020], security schemes (models or protocols) [Ksentini and Frangoudis, 2020;Chaikalis et al, 2020;Dutta and Hammad, 2020;Angelogianni et al, 2020;Ghafoor et al, 2021;Settembre, 2021;Sharma et al, 2020a;Wazid et al, 2021;Ghosh et al, 2019;Kiyemba Edris et al, 2020;Preuß Mattsson and Nakarmi, 2021;Sun et al, 2019;Shang et al, 2019;Cho et al, 2019;Hsu et al, 2020b,a;Kim et al, 2020;Haddar et al, 2019;Boubakri et al, 2017;Namiot and Sneps-Sneppe, 2021;Letafati et al, 2020;Al-Musawi et al, 2020;Krzywiecki et al, 2021;Zhang et al, 2021;Su, 2021;Boubakri et al, 2019;Ren et al, 2022], security architectures (or frameworks) [Vijay and Umadevi, 2019;Siddiqui et al, 2016;Mantas et al, 2021;Monir Mansour, 2019;Kecskés et al, 2021;Kunz and Zhang, 2018;Mars et al, 2019;Nieto et al, 2018;…”
Section: Smart Agriculturementioning
confidence: 99%
See 1 more Smart Citation
“…Other general solutions address the security of SDMN [Liyanage et al, 2015;Bouras et al, 2017a], security policies [Zhao et al, 2021b;Batalla et al, 2020], security schemes (models or protocols) [Ksentini and Frangoudis, 2020;Chaikalis et al, 2020;Dutta and Hammad, 2020;Angelogianni et al, 2020;Ghafoor et al, 2021;Settembre, 2021;Sharma et al, 2020a;Wazid et al, 2021;Ghosh et al, 2019;Kiyemba Edris et al, 2020;Preuß Mattsson and Nakarmi, 2021;Sun et al, 2019;Shang et al, 2019;Cho et al, 2019;Hsu et al, 2020b,a;Kim et al, 2020;Haddar et al, 2019;Boubakri et al, 2017;Namiot and Sneps-Sneppe, 2021;Letafati et al, 2020;Al-Musawi et al, 2020;Krzywiecki et al, 2021;Zhang et al, 2021;Su, 2021;Boubakri et al, 2019;Ren et al, 2022], security architectures (or frameworks) [Vijay and Umadevi, 2019;Siddiqui et al, 2016;Mantas et al, 2021;Monir Mansour, 2019;Kecskés et al, 2021;Kunz and Zhang, 2018;Mars et al, 2019;Nieto et al, 2018;…”
Section: Smart Agriculturementioning
confidence: 99%
“…Solutions in using 5G and other networks (e.g., Wi-Fi). Bhuyan et al, 2021;Ksentini and Frangoudis, 2020;Gonzalez et al, 2020;Liyanage et al, 2018;Wang and Yan, 2015;Tahir et al, 2020;Azzaoui et al, 2020;Nieto et al, 2017Nieto et al, , 2018Zhang and Lin, 2017;Compagno et al, 2017;Dik and Berger, 2021;Benzaid and Taleb, 2020;Zhao et al, 2021a;Bitsikas and Pöpper, 2021;Chaudhary et al, 2020;Gao et al, 2021;Sood et al, 2021;Cao et al, 2020;Ding et al, 2022b;Wu et al, 2018;Shi and Sagduyu, 2021;Sullivan et al, 2021;Mei et al, 2018;Gebremariam et al, 2021;Ginzboorg and Niemi, 2016;Rotinsulu and Fitri Sari, 2018;Vassilakis et al, 2017;Ar-joune and Faruque, 2020]. An adversary can maliciously (1) use legitimate orchestrator access to manipulate the configuration and run a compromised network function, (2) take advantage of malicious insiders attacks, (3) perform unauthorized access (e.g., to confidential data [Isaksson and Norrman, 2020] and to RFID tags [Rahimi et al, 2018]), (4) tampering, (5) perform resource exhaustion, (6) turn services unavailable, ( 7) analyze or modify traffic, (8) perform data leakage (e.g., capturing valuable personal information [Bordel et al, 2021;Annessi et al, 2018;Vreman and Maggio, 2019]), (…”
Section: Item Description Item Descriptionmentioning
confidence: 99%
“…routine activity theory [6]). This must be adapted to the cybersecurity context and also consider the scenarios where this is possible (e.g., proximity-based attacks [25]). Some factors that can influence this feature are, for example, the past actions (e.g., probability of re-offending) and the level of education to identify the specific threat to which the victim is exposed.…”
Section: Exposurementioning
confidence: 99%