An optimized deep networks for securing 5g communication system

被引:0
作者
Naveena, Ambidi [1 ]
Lakshmi, Maddala Vijaya [1 ]
Lakshmi, Meeniga Vijaya [2 ]
机构
[1] G Narayanamma Inst Technol & Sci, Dept ETE, Hyderabad 500104, India
[2] G Narayanamma Inst Technol & Sci, Dept ECE, Hyderabad 500104, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2023年 / 26卷 / 06期
关键词
Cellular communication; Malicious user; Confidential rate; Energy consumption; Packet loss; Throughput ratio; PHYSICAL-LAYER SECURITY; CHALLENGES; INTERNET; SCHEME;
D O I
10.1007/s10586-022-03806-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, cellular applications rule the digital world with their betterment. However, security is the primary concern for a better communication range during the communication process. If the messages are hacked, data overhead and collisions occur. So, the present research work has aimed to design the novel Buffalo-based Autoencoder Security Framework (BbASF) developed in the Orthogonal-Frequency-Division- Multiplexing (OFDM) channel. Consequently, the function of the designed model is checked with the Denial of Service (DoS)-CICIDS dataset. The planned model is tested in the python environment. After that, the communication parameters were validated and compared with other schemes. The presented approach has earned the finest outcome in all performance assessments than the compared models. Furthermore, it has reduced the packet loss to the desired level, 2.2e-6. In addition, the presented novel BbASF is good at forecasting malicious behavior; it has earned the best attack detection score of 99.6%. Hence, the present model efficiently predicts malicious features and enriches communication facilities.
引用
收藏
页码:4015 / 4029
页数:15
相关论文
共 32 条
[1]   UAV-ASSISTED ATTACK PREVENTION, DETECTION, AND RECOVERY OF 5G NETWORKS [J].
Abdalla, Aly Sabri ;
Powell, Keith ;
Marojevic, Vuk ;
Geraci, Giovanni .
IEEE WIRELESS COMMUNICATIONS, 2020, 27 (04) :40-47
[2]   Security for 5G and Beyond [J].
Ahmad, Ijaz ;
Shahabuddin, Shahriar ;
Kumar, Tanesh ;
Okwuibe, Jude ;
Gurtov, Andrei ;
Ylianttila, Mika .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3682-3722
[3]   Intelligence and security in big 5G-oriented IoNT: An overview [J].
Al-Turjman, Fadi .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 :357-368
[4]   Cloud to cloud data migration using self sovereign identity for 5G and beyond [J].
Aruna, M. G. ;
Hasan, Mohammad Kamrul ;
Islam, Shayla ;
Mohan, K. G. ;
Sharan, Preeta ;
Hassan, Rosilah .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (04) :2317-2331
[5]   A Survey on Security Aspects for 3GPP 5G Networks [J].
Cao, Jin ;
Ma, Maode ;
Li, Hui ;
Ma, Ruhui ;
Sun, Yunqing ;
Yu, Pu ;
Xiong, Lihui .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01) :170-195
[6]  
Dutta Ashutosh, 2020, 2020 IEEE 3rd 5G World Forum (5GWF), P109, DOI 10.1109/5GWF49715.2020.9221122
[7]  
Furqan Haji M., 2021, IEEE Open Journal of the Communications Society, V2, P287, DOI 10.1109/OJCOMS.2021.3054066
[8]  
Han K, 2019, INT C INDOOR POSIT, P1, DOI DOI 10.1109/ipin.2019.8911751
[9]   D2D communication mode selection and resource allocation in 5G wireless networks [J].
Hou, Gang ;
Chen, Lizhu .
COMPUTER COMMUNICATIONS, 2020, 155 :244-251
[10]   Graph-Based Intrusion Detection System for Controller Area Networks [J].
Islam, Riadul ;
Refat, Rafi Ud Daula ;
Yerram, Sai Manikanta ;
Malik, Hafiz .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (03) :1727-1736