Capture the RAT: Proximity-based Attacks in 5G using the Routine Activity Theory

TitleCapture the RAT: Proximity-based Attacks in 5G using the Routine Activity Theory
Publication TypeConference Paper
Year of Publication2018
AuthorsA. Nieto, A. Acien, and J. Lopez
Conference NameThe 16th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2018)
Pagination520-527
Date Published08/2018
PublisherIEEE
Conference LocationAthens, Greece
ISBN Number978-1-5386-7518-2
Abstract

The fifth generation of cellular networks (5G) will enable different use cases where security will be more critical than ever before (e.g. autonomous vehicles and critical IoT devices). Unfortunately, the new networks are being built on the certainty that security problems can not be solved in the short term. Far from reinventing the wheel, one of our goals is to allow security software developers to implement and test their reactive solutions for the capillary network of 5G devices. Therefore, in this paper a solution for analysing proximity-based attacks in 5G environments is modelled and tested using OMNET++. The solution, named CRAT, is able to decouple the security analysis from the hardware of the device with the aim to extend the analysis of proximity-based attacks to different use-cases in 5G. We follow a high-level approach, in which the devices can take the role of victim, offender and guardian following the principles of the routine activity theory. 

URLhttps://ieeexplore.ieee.org/document/8511943
DOI10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00100
Citation KeyCRAT2018
Paper File: 
https://www.nics.uma.es/sites/default/files/papers/CRAT2018.pdf

Supported by IoTest SMOG