Home > Published Issues > 2024 > Volume 19, No. 7, 2024 >
JCM 2024 Vol.19(7): 308-316
Doi: 10.12720/jcm.19.7.308-316

Spoofing Attack Detection in 5G Network

Monika Singh1,2,* and Navin Kumar3
1Amrita School of Engineering, Amrita Vishwa Vidyapeetham (University), Bengaluru, Karnataka, India
2 Department of Electronics and Communication Engineering, CMR Institute of Technology, Bengaluru, Karnataka, India
3 Department of Electronics and Communication Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham (University), Bengaluru, Karnataka, India
Email: monika.singh@cmrit.ac.in (M.S.); navin_kum3@yahoo.com (N.K.)
*Corresponding author

Manuscript received November 8, 2023; revised January 21, 2024; accepted February 6, 2024; published July 16, 2024.

Abstract—Spoofing Attack (SA) is a challenging issue in mobile wireless communication especially with huge traffic in 5G and beyond where attacker inserts counterfeit data with false identification to intercept a valid transmission. Detection and corrective action become very important in these cases. A potential method to prevent identity spoofing threats is channel-based Physical-Layer (PL) privacy. It is of interest to a broad spectrum of people and organizations engaged in network administration and computer security. In this work, channel-based SA identification method is proposed to prevent serious consequences. The Physical Layer (PL) properties are utilized in order to detect SA. As a unique channel feature, the Prime Elements of a Digital Channel Representation (PE-DCR) are identified. In this work, a detection method is developed which is built on PEDCR to detect SA in stable and varying radio surroundings. The challenge of SA detection is changed into a 1st-Class Categorization (1-CC) issue for the changing radio setting where the channel covariance is fluctuating. An active detection system based on Bidirectional Long Short-Term Memory (BiLSTM) Neural Networks (NN) as Back Propagation Forward Scheme (BPFS) is proposed to effectively manage this issue. Results from simulations validate the viability of the proposed detection methods. The proposed method achieved detection accuracy of 80%.

Keywords—spoofing attacks identification, bidirectional long short-term memory, 5G

Cite: Monika Singh and Navin Kumar, “Spoofing Attack Detection in 5G Network," Journal of Communications, vol. 19, no. 7, pp. 308-316, 2024.

Copyright © 2024 by the authors. This is an open access article distributed under the Creative Commons Attribution License (CC BY-NC-ND 4.0), which permits use, distribution and reproduction in any medium, provided that the article is properly cited, the use is non-commercial and no modifications or adaptations are made.