An Extensive Classification of 5G Network Jamming Attacks

Author:

Savadatti Shreya,Kuldeep Dhariwal Sakshi,Krishnamoorthy Shruthi,Delhibabu RadhakrishnanORCID

Abstract

The paper introduces a pioneering taxonomy for 5G jamming attacks, meticulously crafted through diverse research methodologies, including literature review, case studies, incident database analysis, and network architecture assessment. This taxonomy is based on six dimensions: attack classification, attack techniques, jammer characteristics, impact and target analysis, countermeasure strategies, and security layers. It gives a full picture of what is needed to protect 5G networks from new security threats, especially jamming attacks. Real‐world case studies from regions like Ukraine, the South China Sea, and Cuba validate the taxonomy’s efficacy in analyzing varied jamming scenarios and offer practical insights into cyber threats and mitigation strategies. By looking closely at attack details, network effects, countermeasure strategies, and security layers, this research makes a big difference in improving the security of 5G networks. It gives everyone involved, the tools and knowledge they need to protect themselves from jamming attacks and make networks more resilient in a world where technology and connectivity are changing quickly. The key findings of this research include identifying key 5G network vulnerabilities to jamming attacks and presenting a detailed six‐dimensional taxonomy: attack classification, techniques, jammer characteristics, impact analysis, countermeasures, and security layers. It emphasizes the need for strong security strategies to improve 5G network resilience against evolving threats, which case studies from Cuba, the South China Sea, and Ukraine have validated.

Publisher

Wiley

Reference45 articles.

1. A comprehensive survey on core technologies and services for 5G security: taxonomies, issues, and solutions;Park;Human-centric Computing and Information Sciences,2021

2. Technologies for 5G Networks: Challenges and Opportunities

3. Survey of promising technologies for 5G networks;Le N. T.;Mobile Information Systems 2016,2016

4. 5G Network Security Issues, Challenges, Opportunities and Future Directions: A Survey

5. 5G Radio Access Network Architecture: Design Guidelines and Key Considerations

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3