Search In this Thesis
   Search In this Thesis  
العنوان
Internet of Things and Fifth Generation Mobile Networks /
المؤلف
Kheireldeen, Hamsa Mahmoud Hosny Mahmoud.
هيئة الاعداد
باحث / همسة محمود حسني محمود خير الدين
مشرف / أنسي أحمد عبد العليم علي
مشرف / نيرة محمود صادق محمد
nayeras@yahoo.com
مناقش / نهى عثمان قرني غريب
مناقش / محمد السعيد محمود عبد الحميد نصر
الموضوع
Electrical Engineering.
تاريخ النشر
2023.
عدد الصفحات
55 p. :
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
الهندسة الكهربائية والالكترونية
تاريخ الإجازة
2/11/2023
مكان الإجازة
جامعة الاسكندريه - كلية الهندسة - الهندسة الكهربية
الفهرس
Only 14 pages are availabe for public view

from 86

from 86

Abstract

Internet of Things (IoT) in Fifth Generation (5G) communication network allows many applications, such as self-driving cars, remote surgery, flying drones, and security. Every device and user in such communication environment uses the internet to communicate. As a result, there will be various security and privacy issues in this communication. Additionally, it is prone to several attacks such as eavesdropping, denial of service, and man-in-the-middle. So, it is very important to keep the infrastructure of IoT in 5G communication network protected against these attacks.Due to the facilities that Internet of Vehicles (IoV) offers to modern transportation systems, it is an important application for Internet of Things. To connect sensors and vehicles on roads and to provide vehicles with all the communication services, fifth generation mobile communication systems serve as a platform. 5G-IoV communication has many opportunities, but this wide network has security and privacy issues that affect performance.This study provides an overview for 5G and its enabling technologies, the role of 5G in IoT and especially in IoV, the challenges in 5G-IoT network and possible countermeasures. A comprehensive simulation for Distributed Denial of Service (DDoS) attack in 5G-IoV network is introduced using OMNet++, INET, SIMU5G, VEINS and SUMO. It measures the performance of the network and analyses the results to show impact of the DDoS attack. A simple countermeasure based on setting a threshold for message length is implemented. The effectiveness of this countermeasure is shown in the results.