AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (6.2 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks

Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi 43600, Malaysia, and also with Imam Alkadhim University College, Department of Computer Techniques Engineering, Baghdad 10066, Iraq
Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi 43600, Malaysia
Department of Networks and Communications Engineering, College of Computer Science and Information Systems, Najran University, Najran 61441, Saudi Arabia
Institute of Computer Science and Digital Innovation, UCSI University, Kuala Lumpur 56000, Malaysia
Department of Intelligent Systems and Cyber Security, Astana IT University, Astana 20000, Kazakstan
Department of Computer Science, College of Computer Science and Engineering, Taibah University, Madinah 42353, Saudi Arabia
Department of Electrical Engineering, College of Engineering, King Faisal University, Al-Hofuf 31982, Saudi Arabia
Show Author Information

Abstract

Mobile devices within Fifth Generation (5G) networks, typically equipped with Android systems, serve as a bridge to connect digital gadgets such as global positioning system, mobile devices, and wireless routers, which are vital in facilitating end-user communication requirements. However, the security of Android systems has been challenged by the sensitive data involved, leading to vulnerabilities in mobile devices used in 5G networks. These vulnerabilities expose mobile devices to cyber-attacks, primarily resulting from security gaps. Zero-permission apps in Android can exploit these channels to access sensitive information, including user identities, login credentials, and geolocation data. One such attack leverages “zero-permission” sensors like accelerometers and gyroscopes, enabling attackers to gather information about the smartphone’s user. This underscores the importance of fortifying mobile devices against potential future attacks. Our research focuses on a new recurrent neural network prediction model, which has proved highly effective for detecting side-channel attacks in mobile devices in 5G networks. We conducted state-of-the-art comparative studies to validate our experimental approach. The results demonstrate that even a small amount of training data can accurately recognize 37.5% of previously unseen user-typed words. Moreover, our tap detection mechanism achieves a 92% accuracy rate, a crucial factor for text inference. These findings have significant practical implications, as they reinforce mobile device security in 5G networks, enhancing user privacy, and data protection.

References

【1】
【1】
 
 
Tsinghua Science and Technology
Pages 1012-1026

{{item.num}}

Comments on this article

Go to comment

< Back to all reports

Review Status: {{reviewData.commendedNum}} Commended , {{reviewData.revisionRequiredNum}} Revision Required , {{reviewData.notCommendedNum}} Not Commended Under Peer Review

Review Comment

Close
Close
Cite this article:
Ahmed AA, Hasan MK, Alqahtani A, et al. Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks. Tsinghua Science and Technology, 2025, 30(3): 1012-1026. https://doi.org/10.26599/TST.2024.9010123

3717

Views

442

Downloads

18

Crossref

9

Web of Science

17

Scopus

0

CSCD

Received: 18 March 2024
Revised: 25 June 2024
Accepted: 01 July 2024
Published: 30 December 2024
© The Author(s) 2025.

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).