Discover the SciOpen Platform and Achieve Your Research Goals with Ease.
Search articles, authors, keywords, DOl and etc.
Mobile devices within Fifth Generation (5G) networks, typically equipped with Android systems, serve as a bridge to connect digital gadgets such as global positioning system, mobile devices, and wireless routers, which are vital in facilitating end-user communication requirements. However, the security of Android systems has been challenged by the sensitive data involved, leading to vulnerabilities in mobile devices used in 5G networks. These vulnerabilities expose mobile devices to cyber-attacks, primarily resulting from security gaps. Zero-permission apps in Android can exploit these channels to access sensitive information, including user identities, login credentials, and geolocation data. One such attack leverages “zero-permission” sensors like accelerometers and gyroscopes, enabling attackers to gather information about the smartphone’s user. This underscores the importance of fortifying mobile devices against potential future attacks. Our research focuses on a new recurrent neural network prediction model, which has proved highly effective for detecting side-channel attacks in mobile devices in 5G networks. We conducted state-of-the-art comparative studies to validate our experimental approach. The results demonstrate that even a small amount of training data can accurately recognize 37.5% of previously unseen user-typed words. Moreover, our tap detection mechanism achieves a 92% accuracy rate, a crucial factor for text inference. These findings have significant practical implications, as they reinforce mobile device security in 5G networks, enhancing user privacy, and data protection.
A. T. Le, T. T. Hoang, B. A. Dao, A. Tsukamoto, K. Suzaki, and C. K. Pham, A real-time cache side-channel attack detection system on RISC-V out-of-order processor, IEEE Access, vol. 9, pp. 164597–164612, 2021.
A. A. Ahmed, R. A. Salim, and M. K. Hasan, Deep learning method for power side-channel analysis on chip leakages, Elektron. Elektrotech., vol. 29, no. 6, pp. 50–57, 2023.
J. Ma and J. Hu, Safe consensus control of cooperative-competitive multi-agent systems via differential privacy, Kybernetika, vol. 58, no. 3, pp. 426–439, 2022.
A. A. Ahmed, M. K. Hasan, I. Memon, A. H. M. Aman, S. Islam, T. R. Gadekallu, and S. A. Memon, Secure AI for 6G mobile devices: Deep learning optimization against side-channel attacks, IEEE Trans. Consum. Electron., vol. 70, no. 1, pp. 3951–3959, 2024.
A. K. Jakkani, P. Reddy, and J. Jhurani, Design of a novel deep learning methodology for IoT botnet based attack detection, Int. J. Recent Innov. Trends Comput. Commun., vol. 11, no. 9, pp. 4922–4927, 2023.
H. Jiang, M. Wang, P. Zhao, Z. Xiao, and S. Dustdar, A utility-aware general framework with quantifiable privacy preservation for destination prediction in LBSs, IEEE/ACM Trans. Netw., vol. 29, no. 5, pp. 2228–2241, 2021.
J. Yu, L. Lu, Y. Chen, Y. Zhu, and L. Kong, An indirect eavesdropping attack of keystrokes on touch screen through acoustic sensing, IEEE Trans. Mob. Comput., vol. 20, no. 2, pp. 337–351, 2021.
N. Gao, Y. Han, N. Li, S. Jin, and M. Matthaiou, When physical layer key generation meets RIS: Opportunities, challenges, and road ahead, IEEE Wirel. Commun., vol. 31, no. 3, pp. 355–361, 2024.
S. Mekruksavanich and A. Jitpattanakul, Deep learning approaches for continuous authentication based on activity patterns using mobile sensing, Sensors, vol. 21, no. 22, p. 7519, 2021.
L. Zhao, S. Qu, H. Xu, Z. Wei, and C. Zhang, Energy-efficient trajectory design for secure SWIPT systems assisted by UAV-IRS, Veh. Commun., vol. 45, p. 100725, 2024.
Y. Ou and L. Li, Side-channel analysis attacks based on deep learning network, Front. Comput. Sci., vol. 16, no. 2, p. 162303, 2022.
H. Pearce, V. R. Surabhi, P. Krishnamurthy, J. Trujillo, R. Karri, and F. Khorrami, Detecting hardware Trojans in PCBs using side channel loopbacks, IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 30, no. 7, pp. 926–937, 2022.
S. Picek, G. Perin, L. Mariot, L. Wu, and L. Batina, SoK: Deep learning-based physical side-channel analysis, ACM Comput. Surveys, vol. 55, no. 11, p. 227, 2023.
X. Liu, S. Wang, S. Lu, Z. Yin, X. Li, L. Yin, J. Tian, and W. Zheng, Adapting feature selection algorithms for the classification of Chinese texts, Systems, vol. 11, no. 9, p. 483, 2023.
M. M. Kataa and W. Kaur, Recognizing facial emotion in real-time using MuWNet a novel deep learning network, 2024, Asia-Pacific Journal of Information Technology and Multimedia, vol. 13, no. 1, pp. 1–20, 2024.
J. Zhu, F. Li, and J. Chen, A survey of blockchain, artificial intelligence, and edge computing for Web 3.0, Computer Science Review, vol. 54, p. 100667, 2024.
M. Li, H. Cui, C. Liu, C. Shan, X. Du, and M. Guizani, A four-dimensional space-based data multi-embedding mechanism for network services, IEEE Trans. Netw. Serv. Manag., vol. 21, no. 3, pp. 2741–2750, 2024.
H. Al-Aqrabi, A. P. Johnson, R. Hill, P. Lane, and T. Alsboui, Hardware-intrinsic multi-layer security: A new frontier for 5G enabled IIoT, Sensors, vol. 20, no. 7, p. 1963, 2020.
P. Kocher, J. Jaffe, B. Jun, and P. Rohatgi et al., Introduction to differential power analysis, J. Cryptogr. Eng., vol. 1, pp. 5–27, 2011.
M. Yang, T. Ahmed, S. Inagaki, K. Sakiyama, Y. Li, and Y. Hara-Azumi, Hardware/software cooperative design against power side-channel attacks on IoT devices, IEEE Internet Things J., vol. 11, no. 9, pp. 16758–16768, 2024.
A. R. Javed, M. O. Beg, M. Asim, T. Baker, and A. H. Al-Bayatti, AlphaLogger: Detecting motion-based side-channel attack using smartphone keystrokes, J. Ambient. Intell. Humaniz. Comput., vol. 14, no. 5, pp. 4869–4882, 2023.
T. Deng, H. Wang, D. He, N. Xiong, W. Liang, and J. Wang, Multi-dimensional fusion deep learning for side channel analysis, Electronics, vol. 12, no. 23, p. 4728, 2023.
L. Zhang, X. Xing, J. Fan, Z. Wang and S. Wang, Multilabel deep learning-based side-channel attack, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 40, no. 6, pp. 1207–1216, 2021.
614
Views
123
Downloads
0
Crossref
0
Web of Science
0
Scopus
0
CSCD
Altmetrics
The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).