2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring) 2022
DOI: 10.1109/vtc2022-spring54318.2022.9860373
|View full text |Cite
|
Sign up to set email alerts
|

Deep Learning-based Intra-slice Attack Detection for 5G-V2X Sliced Networks

Abstract: Connected and Automated Vehicles (CAVs) represent one of the main verticals of 5G to provide road safety, road traffic efficiency, and user convenience. As a key enabler of 5G, Network Slicing (NS) aims to create Vehicle-to-Everything (V2X) network slices with different network requirements on a shared and programmable physical infrastructure. However, NS has generated new network threats that might target CAVs leading to road hazards. More specifically, such attacks may target either the inner functioning of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…Specifically, intra-slice attacks in which the attacker(s) and the target(s) belong to the same V2X Network Slice (V2X-NS), while inter-slice attacks in which the attacker(s) and/or the target(s) belong to different V2X-NSs. The authors in [18] proposed a DL-based approach to detect V2X network slicing attacks, such as end-to-end from vehicles to the core network. However, the paper only focuses on intra-slice V2X attacks and does not consider inter-slice.…”
Section: Related Workmentioning
confidence: 99%
“…Specifically, intra-slice attacks in which the attacker(s) and the target(s) belong to the same V2X Network Slice (V2X-NS), while inter-slice attacks in which the attacker(s) and/or the target(s) belong to different V2X-NSs. The authors in [18] proposed a DL-based approach to detect V2X network slicing attacks, such as end-to-end from vehicles to the core network. However, the paper only focuses on intra-slice V2X attacks and does not consider inter-slice.…”
Section: Related Workmentioning
confidence: 99%
“…For example, one virtual network could be optimized for high-bandwidth video streaming, while another could be designed to prioritize low-latency communications for safety-critical applications. The connectivity needs are ever-increasing, so it is demanding rapid action towards consideration of the network capacity in the existing infrastructure, especially with the advent of the IoT [1]. Every few years, new technology emerges and adds traffic to the network.…”
Section: Introductionmentioning
confidence: 99%