Intrusion Detection System for 5G Device-to-Device Communication Technology in Internet of Things
DOI:
https://doi.org/10.31449/inf.v48i15.4646Abstract
Abstract - The emergence of Internet of Things (IoT) has raised the need for high quality communications, and high performance networks. 5G cellular communication network exhibits the readiness to provide such high quality communication channels by using various advanced technologies. Device to device communications is a one of multiple technologies that have been suggested in 5G. By the employment of this technology, mobile devices can communicate with each other without the involvement of a base station (BS) which eliminates congestion, expands coverage area and increases throughput. Communicating devices set up a multi-hop path using nearby devices which act as relaying elements, or routers. However, the Self-organizing nature and the lack of centralized control of D2D make it easier to launch multiple types of attacks. In this paper, an intrusion detection system IDS is proposed using machine learning techniques. Eight types of attacks are considered to train the system for intrusion detection, then, multiple classification algorithms have been compared. Finally, a multiobjective model has been designed based on the results of comparison to secure the communication process under D2D technology. The used dataset is generated using Network Simulator NS-2.References
H. Saadeh, W. Almobaideen, K. E. Sabri, and M. Saadeh, “Hybrid sdn-icn architecture
design for the internet of things,” in 2019 Sixth International Conference
on Software Defined Systems (SDS), pp. 96–101, IEEE, 2019.
P. Masek, A. Muthanna, and J. Hosek, “Suitability of manet routing protocols for
the next-generation national security and public safety systems,” in Conference
on Smart Spaces, pp. 242–253, Springer, 2015.
A. Habbal, S. I. Goudar, and S. Hassan, “A context-aware radio access technology
selection mechanism in 5g mobile network for smart city applications,” Journal
of Network and Computer Applications, vol. 135, pp. 97–107, 2019.
U. N. Kar and D. K. Sanyal, “An overview of device-to-device communication in
cellular networks,” ICT Express, 2017.
R. I. Ansari, C. Chrysostomou, S. A. Hassan, M. Guizani, S. Mumtaz, J. Rodriguez,
and J. J. Rodrigues, “5g d2d networks: Techniques, challenges, and future
prospects,” IEEE Systems Journal, 2017.
L. Wei, R. Q. Hu, Y. Qian, and G. Wu, “Energy efficiency and spectrum efficiency
of multihop device-to-device communications underlaying cellular networks,”
IEEE Transactions on Vehicular Technology, vol. 65, no. 1, pp. 367–380,
M. A. Kandi, H. Lakhlef, A. Bouabdallah, and Y. Challal, “A versatile key management
protocol for secure group and device-to-device communication in the
internet of things,” Journal of Network and Computer Applications, vol. 150,
p. 102480, 2020.
V. Yazıcı, U. C. Kozat, and M. O. Sunay, “A new control plane for 5g network
architecture with a case study on unified handoff, mobility, and routing management,”
IEEE communications magazine, vol. 52, no. 11, pp. 76–85, 2014.
J. Liu, N. Kato, J. Ma, and N. Kadowaki, “Device-to-device communication in
lte-advanced networks: A survey,” IEEE Communications Surveys & Tutorials,
vol. 17, no. 4, pp. 1923–1940, 2015.
M. Usman, A. A. Gebremariam, U. Raza, and F. Granelli, “A software-defined
device-to-device communication architecture for public safety applications in 5g
networks,” IEEE Access, vol. 3, pp. 1649–1654, 2015.
M. N. Tehrani, M. Uysal, and H. Yanikomeroglu, “Device-to-device communication
in 5g cellular networks: challenges, solutions, and future directions,” IEEE
Communications Magazine, vol. 52, no. 5, pp. 86–92, 2014.
Y. Jung, E. Festijo, and M. Peradilla, “Joint operation of routing control and
group key management for 5g ad hoc d2d networks,” in Privacy and Security in
Mobile Systems (PRISMS), 2014 International Conference on, pp. 1–8, IEEE,
J. Qiao, X. S. Shen, J. W. Mark, Q. Shen, Y. He, and L. Lei, “Enabling deviceto-
device communications in millimeter-wave 5g cellular networks,” IEEE Communications
Magazine, vol. 53, no. 1, pp. 209–215, 2015.
Z. Hashim and N. Gupta, “Futuristic device-to-device communication paradigm
in vehicular ad-hoc network,” in Information Technology (InCITe)-The Next Generation
IT Summit on the Theme-Internet of Things: Connect your Worlds, International
Conference on, pp. 209–214, IEEE, 2016.
B. Kaufman and B. Aazhang, “Cellular networks with an overlaid device to device
network,” in Signals, Systems and Computers, 2008 42nd Asilomar Conference
on, pp. 1537–1541, IEEE, 2008.
X. Lin, J. Andrews, A. Ghosh, and R. Ratasuk, “An overview of 3gpp deviceto-
device proximity services,” IEEE Communications Magazine, vol. 52, no. 4,
pp. 40–48, 2014.
W. Almobaideen and N. Al-maitah, “Ttaf: Tcp timeout adaptivity based on fast
retransmit over manet,” Journal of Networks, vol. 9, no. 12, pp. 3321–3326, 2014.
S. Riaz, H. K. Qureshi, and M. Saleem, “Performance evaluation of routing protocols
in energy harvesting d2d network,” in Computing, Electronic and Electrical
Engineering (ICE Cube), 2016 International Conference on, pp. 251–255, IEEE,
S. A. Abd, S. Manjunath, and S. Abdulhayan, “Direct device-to-device communication
in 5g networks,” in Computation System and Information Technology
for Sustainable Solutions (CSITSS), International Conference on, pp. 216–219,
IEEE, 2016.
M. S. Alnaghes and F. Gebali, “A survey on some currently existing intrusion
detection systems for mobile ad hoc networks,” in The Second International Conference
on Electrical and Electronics Engineering, Clean Energy and Green Computing
(EEECEGC2015), vol. 12, 2015.
I. Butun, S. D. Morgera, and R. Sankar, “A survey of intrusion detection systems
in wireless sensor networks,” IEEE communications surveys & tutorials, vol. 16,
no. 1, pp. 266–282, 2014.
R. Vijayanand, D. Devaraj, and B. Kannapiran, “Intrusion detection system
for wireless mesh network using multiple support vector machine classifiers
with genetic-algorithm-based feature selection,” Computers & Security, vol. 77,
pp. 304–314, 2018.
N. Marchang, R. Datta, and S. K. Das, “A novel approach for efficient usage of
intrusion detection system in mobile ad hoc networks.,” IEEE Trans. Vehicular
Technology, vol. 66, no. 2, pp. 1684–1695, 2017.
B. Subba, S. Biswas, and S. Karmakar, “Intrusion detection in mobile ad-hoc
networks: Bayesian game formulation,” Engineering Science and Technology, an
International Journal, vol. 19, no. 2, pp. 782–799, 2016.
A. Nadeem and M. P. Howarth, “An intrusion detection & adaptive response
mechanism for manets,” Ad Hoc Networks, vol. 13, pp. 368–380, 2014.
E. Anthi, L. Williams, M. Słowinska, G. Theodorakopoulos, and P. Burnap, “A
supervised intrusion detection system for smart home iot devices,” IEEE Internet
of Things Journal, vol. 6, no. 5, pp. 9042–9053, 2019.
A. Bhattacharyya, A. Banerjee, D. Bose, H. N. Saha, and D. Bhattacharya, “Different
types of attacks in mobile adhoc network,” arXiv preprint arXiv:1111.4090,
J. Han, J. Pei, and M. Kamber, Data mining: concepts and techniques. Elsevier,
M. Bramer, Principles of data mining, vol. 180. Springer, 2007.
Y. Leung, K.-Z. Chen, Y.-C. Jiao, X.-B. Gao, and K. S. Leung, “A new gradientbased
neural network for solving linear and quadratic programming problems,”
IEEE Transactions on Neural Networks, vol. 12, no. 5, pp. 1074–1083, 2001.
L. Breiman, “Random forests,” Machine learning, vol. 45, no. 1, pp. 5–32, 2001.
F. A. Narudin, A. Feizollah, N. B. Anuar, and A. Gani, “Evaluation of machine
learning classifiers for mobile malware detection,” Soft Computing, vol. 20, no. 1,
pp. 343–357, 2016.
Y. Meidan, M. Bohadana, A. Shabtai, M. Ochoa, N. O. Tippenhauer, J. D.
Guarnizo, and Y. Elovici, “Detection of unauthorized iot devices using machine
learning techniques,” arXiv preprint arXiv:1709.04647, 2017.
R. Batuwita and V. Palade, “Adjusted geometric-mean: a novel performance measure
for imbalanced bioinformatics datasets learning,” Journal of Bioinformatics
and Computational Biology, vol. 10, no. 04, p. 1250003, 2012.
J. Sengupta, S. Ruj, and S. D. Bit, “A comprehensive survey on attacks, security
issues and blockchain solutions for iot and iiot,” Journal of Network and Computer
Applications, vol. 149, p. 102481, 2020.
W. Almobaideen and D. AlKhateeb, “Cspda: Contention and stability aware
partially disjoint aomdv routing protocol,” in Cross validation2015 IEEE Jordan
Conference on Applied Electrical Engineering and Computing Technologies
(AEECT), pp. 1–6, IEEE, 2015.
M. J. Crawley, The R book. John Wiley & Sons, 2012.
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten,
“The weka data mining software: an update,” ACM SIGKDD explorations
newsletter, vol. 11, no. 1, pp. 10–18, 2009.
R. Kohavi et al., “A study of cross-validation and bootstrap for accuracy estimation
and model selection,” in Cross validation, vol. 14, pp. 1137–1145, Montreal,
Canada, 1995.
Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika