AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (4.8 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access | Just Accepted

Deep Learning Based Side Channel Attack Detection for Mobile Devices Security in 5G Networks

Amjed A. Ahmed1,2Mohammad Kamrul Hasan3( )Ali Alqahtani4Shayla Islam5( )Bishwajeet Pandey6Leila Rzayeva6Huda Saleh Abbas7Azana Hafizah Aman3Nayef Alqahtani8

1 Center for Cyber Security, the Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi 43600, Malaysia

2 Imam Alkadhim University College, Department of Computer Techniques Engineering, Baghdad 10066, Iraq

3 Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi 43600, Malaysia

4 Department of Networks and Communications Engineering, College of Computer Science and Information Systems, Najran University, Najran 61441, Saudi Arabia

5 Institute of Computer Science and Digital Innovation, UCSI University Malaysia, Kuala Lumpur, 56000, Malaysia

6 Department of Intelligent Systems and Cyber Security, Astana IT University, Astana,20000, Kazakstan

7 Department of Computer Science The College of computer science and engineering Taibah University in Saudi Arabia, Madinah 42353, Saudi Arabia

8 Department of Electrical Engineering, College of Engineering, King Faisal University, Al-Hofuf, Al-Ahsa, 31982, Saudi Arabia

Show Author Information

Abstract

Mobile devices within Fifth Generation (5G) networks, typically equipped with Android systems, serve as a bridge to connect digital gadgets such as Global Positioning System (GPS), mobile devices, and wireless routers, which are vital in facilitating end-user communication requirements. However, the security of Android systems has been challenged by the sensitive data involved, leading to vulnerabilities in mobile devices used in 5G networks. These vulnerabilities expose mobile devices to cyber-attacks, primarily resulting from security gaps. Zero-permission apps in Android can exploit these channels to access sensitive information, including user identities, login credentials, and geolocation data. One such attack leverages “zero-permission” sensors like accelerometers and gyroscopes, enabling attackers to gather information about the smartphone’s user. This underscores the importance of fortifying mobile devices against potential future attacks. Our research focuses on a new recurrent neural network prediction model, which has proven highly effective for detecting side-channel attacks (SCAs) in mobile devices in 5G networks. We conducted state-of-the-art comparative studies to validate our experimental approach. The results demonstrate that even a small amount of training data can accurately recognize 37.5% of previously unseen user-typed words. Moreover, our tap detection mechanism achieves a 92% accuracy rate, a crucial factor for text inference. These findings have significant practical implications, as they reinforce mobile device security in 5G networks, enhancing user privacy and data protection.

Tsinghua Science and Technology
Cite this article:
Ahmed AA, Hasan MK, Alqahtani A, et al. Deep Learning Based Side Channel Attack Detection for Mobile Devices Security in 5G Networks. Tsinghua Science and Technology, 2024, https://doi.org/10.26599/TST.2024.9010123

223

Views

42

Downloads

0

Crossref

0

Web of Science

0

Scopus

0

CSCD

Altmetrics

Received: 18 March 2024
Revised: 25 June 2024
Accepted: 01 July 2024
Available online: 04 September 2024

© The author(s) 2024.

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return