Sale!

Simulation Codes of A New Security Design for Protecting IMSI

97 £

This simulation code package generates and produces the figures in the paper titled “Protecting IMSI from Fake Base Stations Exploitation and Spoofers Impersonation in 5G and Beyond Cellular Networks”

Article link: https://doi.org/10.46470/03d8ffbd.4f956b48

Article PDF: Protecting IMSI from Fake Base Stations Exploitation and Spoofers Impersonation in 5G and Beyond Cellular Networks · RS Open Journal on Innovative Communication Technologies (pubpub.org)

  Contact us

Description

Simulation Codes of A New Security Design for Protecting IMSI in 5G and beyond.

Article link: https://doi.org/10.46470/03d8ffbd.4f956b48 

Article PDF: Protecting IMSI from Fake Base Stations Exploitation and Spoofers Impersonation in 5G and Beyond Cellular Networks · RS Open Journal on Innovative Communication Technologies (pubpub.org)

Protecting IMSI from Fake Base Stations Exploitation and Spoofers Impersonation in 5G and Beyond Cellular Networks

Protecting IMSI
Protecting IMSI in 5G and beyond networks.
Article PDF: Protecting IMSI from Fake Base Stations Exploitation and Spoofers Impersonation in 5G and Beyond Cellular Networks · RS Open Journal on Innovative Communication Technologies (pubpub.org)

Summary: Fifth-generation (5G) mobile networks require authenticated and fully secured transmissions between user devices and 5G base stations (gNodeB). In the current 5G technology standard, mobile devices cannot distinguish between a real and a fake base station (BS) by following the standard 5G security protocols. This vulnerability is a dangerous security issue identified in 5G cellular networks worldwide, where hackers and spoofers can easily impersonate or hack the valuable information of mobile users. Although 5G security protocols are enhanced to prevent such kinds of attacks, fake BSs still threaten the security of wireless communication networks. To the best of the authors’ knowledge, there is currently no security method available in the literature that can enable users to identify who is sending the connection request response. Thus, this can allow an attacker to intercept the international mobile subscriber identity (IMSI) easily in the clear. Therefore, in this work, we propose a novel hack-proof framework that can perfectly secure IMSI resulting in prevention against spoofing attacks. The proposed algorithm includes a user equipment device (UE) and a BS that communicate in the clear to securely authenticate each other in a TDD fashion. For simulation purposes, an OFDM transmission scheme is considered over a multipath wireless fading channel. The obtained results show that our proposed method works successfully without affecting the reliability of the transmitted bits compared to plain data transmission methods. More specifically, the performance results are shown to be similar to normal OFDM-based data transmission schemes conducted over general multipath fading channels, where no further degradation is caused. This indicates that the proposed method can effectively secure the IMSI of mobile user devices against active and passive attackers by providing a safe network connection between the communicating parties (UE and BS).

Contributions of the Proposed Security Scheme:

1) The proposed framework makes the 5G mobile network more secure by establishing the secret key identifier between the UE and the legitimate BS.

2) The authentication process uses the XOR function to encode IMSI with the secret key during transmission between the UE and BS in a 5G cellular network.

3) The proposed design of generating secret keys and identifying the BS and UE as legitimate parties while ensuring the safety, privacy, confidentiality, and establishing authenticity between UE and BS assures its novelty.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Refund Policy

We firmly believe in and stand behind our product 100%, but we understand that it might not meet the needs of everyone all of the time. If you are unhappy with your purchase, or you have an issue that we are unable to resolve that makes the system unusable, we will be happy to consider offering a refund.
  • Refunds will be offered at our sole discretion and must meet all of the following conditions fully:
  • You are within the first 24 hours of the purchase of the product.
  • Your issue(s) comes from not being able to install the product properly or get the product to perform its basic functions.
  • You have attempted to resolve your issue(s) with our support team.
  • No refunds will be granted after the first 24 hours of the original purchase whatsoever.
  • Issues caused by 3rd party products, or other software will not provide grounds for a refund.
  • Refund requests for renewal subscription orders will not be entertained.

*PS: RS Products’s purchased with discount or sale offer are non-refundable

General Inquiries

There are no inquiries yet.