December 2020
·
28 Reads
·
35 Citations
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
December 2020
·
28 Reads
·
35 Citations
April 2020
·
129 Reads
Machine Learning (ML) is an important enabler for optimizing, securing and managing mobile networks. This leads to increased collection and processing of data from network functions, which in turn may increase threats to sensitive end-user information. Consequently, mechanisms to reduce threats to end-user privacy are needed to take full advantage of ML. We seamlessly integrate Federated Learning (FL) into the 3GPP 5G Network Data Analytics (NWDA) architecture, and add a Multi-Party Computation (MPC) protocol for protecting the confidentiality of local updates. We evaluate the protocol and find that it has much lower overhead than previous work, without affecting ML performance.
... We highlight 41 general threats for 5G networks, regardless of vertical applications (Dutta and Hammad, 2020). An adversary can maliciously (1) use legitimate orchestrator access to manipulate the configuration and run a compromised network function, (2) take advantage of malicious insiders attacks, (3) perform unauthorized access (e.g., to confidential data (Isaksson and Norrman, 2020) and to RFID tags (Rahimi et al., 2018)), (4) tampering, (5) perform resource exhaustion, (6) turn services unavailable, (7) analyze or (Bordel et al., 2021)), (9) perform attacks for resource shortages, (10) extract users private information using a shared service in an unauthorized manner, (11) compromise security controls, (Vidal et al., 2018). ...
December 2020