Abstract
5G communication network has become a major pillar in the evolution of interconnected industrial systems. However, the introduction of 5G network may lead to unknown risks in the systems. To reveal the impact of network threats on 5G-based industrial systems, a 5G network security analysis approach combining formal modeling and attack penetration is proposed. Firstly, the 5G network models based on topology and transmission events are established to cope with diverse and hidden attack routes and behaviors. Then, the attack module is integrated into the network model. With attack penetration to the models, potential vulnerabilities are exploited and quantified based on the hierarchical-topology model, and network reliability is evaluated based on the transmission-event model. The simulation results identify and quantify network vulnerabilities under various attacks, including access authentication failure, destruction of data integrity, illegal control of Network Functions (NFs), and malicious consumption of shared slicing resources. Meanwhile, a more unpredictable outcome is that there is a threshold of access probability, <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$\alpha $ </tex-math></inline-formula> , to measure the impacts of attacks against the bearer network and core network on reliability. Finally, a practical case about the impact of network security on a 5G-based coupled-tank system is discussed, which further proves the feasibility of our approach.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.