Utilize este identificador para referenciar este registo:
http://hdl.handle.net/10071/35077
Autoria: | Farkhari, Hamed |
Orientação: | Sebastião, Pedro Joaquim Amaro Campos, Luís Miguel Serra da Costa |
Data: | 30-Jul-2025 |
Título próprio: | AI based cybersecurity enhancement in 5G networks |
Referência bibliográfica: | Farkhari, H. (2024). AI based cybersecurity enhancement in 5G networks [Tese de doutoramento, Iscte - Instituto Universitário de Lisboa]. Repositório Iscte. http://hdl.handle.net/10071/35077 |
Resumo: | In today’s interconnected landscape, cybersecurity is an indispensable pillar of technological advancement, while cyber threats evolve at a pace equivalent to the systems they are trying to compromise. The emergence of increasingly sophisticated attack vectors challenges traditional security paradigms, requiring innovative approaches to detect and mitigate threats. Among these threats, attacks targeting wireless communications are particularly concerning, as they have the potential to compromise critical infrastructures and essential services across various sectors. As communication networks become more complex, Artificial Intelligence (AI) and Machine Learning (ML) have emerged as essential tools for security analysis and threat identification. These technologies enable the implementation of real-time monitoring and adaptive response mechanisms, which are crucial to protecting modern wireless systems. However, the implementation of effective security measures without compromising operational efficiency presents significant challenges, particularly in resource-constrained environments. The integration of fifth Generation (5G) wireless technology into Unmanned Aerial Vehicles (UAVs) exemplifies these challenges, improving the capabilities of these platforms through faster communication, low latency, and high reliability. Despite these advantages, reliance on advanced wireless communications makes UAVs vulnerable to jamming attacks, a critical threat that can compromise their operations. Jamming occurs when signals are emitted to block or degrade the control and data links of UAVs. In UAV applications such as surveillance, goods delivery, and disaster management, jamming can cause significant issues, including loss of control, failure to complete missions, and compromise of data integrity. These threats are especially critical in sectors such as defense and public security, where UAVs play a strategic role. Detecting jamming in UAVs is particularly challenging due to their mobility, dynamic environments, and the complexity of the high-frequency spectrum associated with 5G. Malicious actors may employ advanced techniques, such as intelligent spoofing and jamming, to exploit specific communication frequencies or channels, further complicating detection efforts. Effective jamming identification methods are heavily based on artificial intelligence-based approaches, including real-time spectral analysis and advanced anomaly detection. AI facilitates the analysis of large volumes of network data to identify patterns indicative of jamming, even when the interference is subtle or adaptive. By leveraging ML models, UAV systems can classify and predict potential jamming threats in real time. Jamming into UAVs has the potential to compromise missions and pose significant security risks. Therefore, proactive detection and mitigation strategies are essential to protect UAV operations and maintain confidence in 5G-enabled applications. Ensuring resilience against jamming not only protects UAVs but also promotes the broader adoption of 5G in critical systems, fostering safe and sustainable progress in the era of wireless communications. |
Designação do Departamento: | Departamento de Ciências e Tecnologias da Informação |
Designação do grau: | Doutoramento em Ciências e Tecnologias da Informação |
Arbitragem científica: | yes |
Acesso: | Acesso Aberto |
Aparece nas coleções: | T&D-TD - Teses de doutoramento |
Ficheiros deste registo:
Ficheiro | Descrição | Tamanho | Formato | |
---|---|---|---|---|
phd_hamed_farkhari.pdf | 16,97 MB | Adobe PDF | Ver/Abrir |
Este registo está protegido por Licença Creative Commons