Intelligent Trust Ranking Security Preserving Model for B5G/6G

被引:3
|
作者
Shafi, Misbah [1 ]
Jha, Rakesh Kumar [2 ]
Jain, Sanjeev [3 ]
机构
[1] Shri Mata Vaishno Devi Univ, Dept Elect & Commun, Katra 182230, India
[2] Indian Inst Informat Technol Design & Mfg Jabalpu, Dept Elect & Commun Engn, Jabalpur 482005, India
[3] Cent Univ Jammu, Dept Comp Sci Engn, Jammu 181143, India
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2023年 / 20卷 / 03期
关键词
Security; trust ranking; attributes; machine learning; RM dataset; SVM; wireless communication network (WCN); security attacks; prediction model; PHYSICAL LAYER AUTHENTICATION; COMMUNICATION; CHALLENGES; INTERNET; SCHEME; ATTACK;
D O I
10.1109/TNSM.2023.3234319
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Trust assessment is a crucial parameter in the next generation WCN (Wireless Communication Network) for the secure collaboration of nodes with each other and the detection of the possible security menaces in the network. The trust ranking of nodes especially in the platforms of defense networks and healthcare networks is of vital importance to the security threats inside the network. In this paper, we have suggested an RM dataset based on the current possible attacks along with advanced authentication attributes for the next generation WCN (B5G/6G). Further, we proposed a trust-ranking model based on the SVM machine learning technique to define the trust ranks of the users present in the network. The model consists of five trust rankings. The fifth trust rank is defined as the highest level of trust and the first trust rank designates the lowest level of trust. The attained rank of trust determines the specific services offered to the corresponding node. The proposed prediction model based on the SVM (Support Vector Machine) algorithm maintains the triple-off balance between the computational time, accuracy, and security. The simulation results indicate that the proposed SVM-based trust ranking model intelligently identifies possible malicious threats and provides an advancement in network security.
引用
收藏
页码:3549 / 3561
页数:13
相关论文
共 50 条
  • [1] Intelligent Network Slicing for B5G and 6G: Resource Allocation, Service Provisioning, and Security
    Wang, Jiadai
    Li, Yuanhao
    Liu, Jiajia
    Kato, Nei
    IEEE WIRELESS COMMUNICATIONS, 2024, 31 (03) : 271 - 277
  • [2] Special Issue on Reconfigurable Intelligent Surface for B5G & 6G
    Zhu, Zhengyu
    Pan, Cunhua
    Wu, Qingqing
    Di Renzo, Marco
    Swindlehurst, A. Lee
    Zhao, Yajun
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2022, 24 (05) : 513 - 517
  • [3] Security among UPFs belonging to Different 5G/B5G/6G Networks
    Hsiao, Liang-Sheng
    Tsai, Kun-Lin
    Liu, Jung-Chun
    Leu, Fang-Yie
    Lu, Yu-Syuan
    Lin, I-Long
    INFORMATION SYSTEMS FRONTIERS, 2024,
  • [4] Framework for Trustworthy AI/ML in B5G/6G
    Barmpounakis, Sokratis
    Demestichas, Panagiotis
    2022 1ST INTERNATIONAL CONFERENCE ON 6G NETWORKING (6GNET), 2022,
  • [5] Evolution of optical wireless communication for B5G/6G
    Wei, Zixian
    Wang, Zhaoming
    Zhang, Jianan
    Li, Qian
    Zhang, Junping
    Fu, H. Y.
    PROGRESS IN QUANTUM ELECTRONICS, 2022, 83
  • [6] DOA Estimation in B5G/6G: Trends and Challenges
    Ruan, Ningjun
    Wang, Han
    Wen, Fangqing
    Shi, Junpeng
    SENSORS, 2022, 22 (14)
  • [7] Implementation of Switch Slicing in 5G/B5G/6G Networks
    Peng, Li-Wen
    Leu, Fang-Yie
    Susanto, Heru
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS 2024, 2024, 214 : 369 - 378
  • [8] New indoor propagation model proposed for future B5G/6G rollout
    Bagayogo, Mamadou
    Hamouda, Soumaya
    Barrak, Rim
    FREQUENZ, 2024, 78 (7-8) : 281 - 296
  • [9] Deep Tailored Dynamic Registration in B5G/6G with Lightweight Recurrent Model
    Kim, Bokkeun
    Kim, Gyeongsik
    Kim, Jin
    Raza, Syed M.
    Choo, Hyunseung
    PROCEEDINGS OF 2024 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, NOMS 2024, 2024,
  • [10] B5G/6G通信的IRS技术综述
    李刚
    王瑜新
    章秀银
    陈真
    陈艺戬
    窦建武
    杨军
    陆海涛
    电子技术应用, 2021, 47 (06) : 1 - 5+9