Half-Duplex Attack: An Effectual Attack Modelling in D2D Communication

04/08/2021
by   Misbah Shafi, et al.
0

The visualization of future generation Wireless Communication Network WCN redirects the presumption of onward innovations, the fulfillment of user demands in the form of high data rates, energy efficiency, low latency, and long-range services. To content these demands, various technologies such as massive MIMO Multiple Input Multiple Output, UDN Ultra Dense Network, spectrum sharing, D2D Device to Device communication were improvised in the next generation WCN. In comparison to previous technologies, these technologies exhibit flat architecture, the involvement of clouds in the network, centralized architecture incorporating small cells which creates vulnerable breaches initiating menaces to the security of the network. The half-duplex attack is another threat to the WCN, where the resource spoofing mechanism is attained in the downlink phase of D2D communication. Instead of triggering an attack on both uplink and downlink, solely downlink is targeted by the attacker. This scheme allows the reduced failed attempt rate of the attacker as compared to the conventional attacks. The analysis is determined on the basis of Poissons distribution to determine the probability of failed attempts of half duplex attack in contrast to a full duplex attack

READ FULL TEXT

page 1

page 3

research
04/08/2021

A Survey on Security Issues of 5G NR: Perspective of Artificial Dust and Artificial Rain

5G NR (New Radio) incorporates concepts of novel technologies such as sp...
research
04/08/2021

AR Based Half-Duplex Attack in Beyond 5G networks

With the evolution of WCN (Wireless communication networks), the absolut...
research
07/14/2022

Artificial Dust Based Attack Modelling: A Threat to the Security of Next Generation WCN

This paper introduces a systematic and novel mechanism for devising a se...
research
06/08/2018

Asynchronous Downlink Massive MIMO Networks: A Stochastic Geometry Approach

Massive multiple-input multiple-output (MIMO) is recognized as a promisi...
research
04/13/2021

Joint Secure Design of Downlink and D2D Cooperation Strategies for Multi-User Systems

This work studies the role of inter-user device-to-device (D2D) cooperat...
research
07/17/2023

TorMult: Introducing a Novel Tor Bandwidth Inflation Attack

The Tor network is the most prominent system for providing anonymous com...

Please sign up or login with your details

Forgot password? Click here to reset