Fake Base Station Threats in 5G Non-Public Networks

Meng Huan Lee, I-Hsien Liu, Jung Shian Li

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

With 5G technology, traditional industrial and business equipment can now be connected wirelessly in a non-public network separated from public mobile services. Benefit from features such as high bandwidth and massive machine-type communications, while being able to control their own private 5G networks. But fake base stations used by law enforcement and hackers may collect private information and cause disruptions in cell services, thus compromising the security. In this research, we will analyze existing attack methods and detection mechanisms. And look at how those threats can affect the devices and operations in 5G non-public network.

Original languageEnglish
Title of host publicationProceedings of The 2023 International Conference on Artificial Life and Robotics, ICAROB 2023
EditorsYingmin Jia, Takao Ito, Ju-Jang Lee
PublisherALife Robotics Corporation Ltd
Pages77-80
Number of pages4
ISBN (Print)9784990835088
Publication statusPublished - 2023
Event28th International Conference on Artificial Life and Robotics, ICAROB 2023 - Virtual, Online
Duration: 2023 Feb 92023 Feb 12

Publication series

NameProceedings of International Conference on Artificial Life and Robotics
ISSN (Electronic)2435-9157

Conference

Conference28th International Conference on Artificial Life and Robotics, ICAROB 2023
CityVirtual, Online
Period23-02-0923-02-12

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Vision and Pattern Recognition
  • Hardware and Architecture
  • Information Systems
  • Control and Systems Engineering
  • Electrical and Electronic Engineering
  • Modelling and Simulation

Fingerprint

Dive into the research topics of 'Fake Base Station Threats in 5G Non-Public Networks'. Together they form a unique fingerprint.

Cite this