Intrusion Detection System for 5G Device-to-Device Communication Technology in Internet of Things
Abstract
Full Text:
PDFReferences
H. Saadeh, W. Almobaideen, K. E. Sabri, and M. Saadeh, “Hybrid sdn-icn architecture
design for the internet of things,” in 2019 Sixth International Conference
on Software Defined Systems (SDS), pp. 96–101, IEEE, 2019.
P. Masek, A. Muthanna, and J. Hosek, “Suitability of manet routing protocols for
the next-generation national security and public safety systems,” in Conference
on Smart Spaces, pp. 242–253, Springer, 2015.
A. Habbal, S. I. Goudar, and S. Hassan, “A context-aware radio access technology
selection mechanism in 5g mobile network for smart city applications,” Journal
of Network and Computer Applications, vol. 135, pp. 97–107, 2019.
U. N. Kar and D. K. Sanyal, “An overview of device-to-device communication in
cellular networks,” ICT Express, 2017.
R. I. Ansari, C. Chrysostomou, S. A. Hassan, M. Guizani, S. Mumtaz, J. Rodriguez,
and J. J. Rodrigues, “5g d2d networks: Techniques, challenges, and future
prospects,” IEEE Systems Journal, 2017.
L. Wei, R. Q. Hu, Y. Qian, and G. Wu, “Energy efficiency and spectrum efficiency
of multihop device-to-device communications underlaying cellular networks,”
IEEE Transactions on Vehicular Technology, vol. 65, no. 1, pp. 367–380,
M. A. Kandi, H. Lakhlef, A. Bouabdallah, and Y. Challal, “A versatile key management
protocol for secure group and device-to-device communication in the
internet of things,” Journal of Network and Computer Applications, vol. 150,
p. 102480, 2020.
V. Yazıcı, U. C. Kozat, and M. O. Sunay, “A new control plane for 5g network
architecture with a case study on unified handoff, mobility, and routing management,”
IEEE communications magazine, vol. 52, no. 11, pp. 76–85, 2014.
J. Liu, N. Kato, J. Ma, and N. Kadowaki, “Device-to-device communication in
lte-advanced networks: A survey,” IEEE Communications Surveys & Tutorials,
vol. 17, no. 4, pp. 1923–1940, 2015.
M. Usman, A. A. Gebremariam, U. Raza, and F. Granelli, “A software-defined
device-to-device communication architecture for public safety applications in 5g
networks,” IEEE Access, vol. 3, pp. 1649–1654, 2015.
M. N. Tehrani, M. Uysal, and H. Yanikomeroglu, “Device-to-device communication
in 5g cellular networks: challenges, solutions, and future directions,” IEEE
Communications Magazine, vol. 52, no. 5, pp. 86–92, 2014.
Y. Jung, E. Festijo, and M. Peradilla, “Joint operation of routing control and
group key management for 5g ad hoc d2d networks,” in Privacy and Security in
Mobile Systems (PRISMS), 2014 International Conference on, pp. 1–8, IEEE,
J. Qiao, X. S. Shen, J. W. Mark, Q. Shen, Y. He, and L. Lei, “Enabling deviceto-
device communications in millimeter-wave 5g cellular networks,” IEEE Communications
Magazine, vol. 53, no. 1, pp. 209–215, 2015.
Z. Hashim and N. Gupta, “Futuristic device-to-device communication paradigm
in vehicular ad-hoc network,” in Information Technology (InCITe)-The Next Generation
IT Summit on the Theme-Internet of Things: Connect your Worlds, International
Conference on, pp. 209–214, IEEE, 2016.
B. Kaufman and B. Aazhang, “Cellular networks with an overlaid device to device
network,” in Signals, Systems and Computers, 2008 42nd Asilomar Conference
on, pp. 1537–1541, IEEE, 2008.
X. Lin, J. Andrews, A. Ghosh, and R. Ratasuk, “An overview of 3gpp deviceto-
device proximity services,” IEEE Communications Magazine, vol. 52, no. 4,
pp. 40–48, 2014.
W. Almobaideen and N. Al-maitah, “Ttaf: Tcp timeout adaptivity based on fast
retransmit over manet,” Journal of Networks, vol. 9, no. 12, pp. 3321–3326, 2014.
S. Riaz, H. K. Qureshi, and M. Saleem, “Performance evaluation of routing protocols
in energy harvesting d2d network,” in Computing, Electronic and Electrical
Engineering (ICE Cube), 2016 International Conference on, pp. 251–255, IEEE,
S. A. Abd, S. Manjunath, and S. Abdulhayan, “Direct device-to-device communication
in 5g networks,” in Computation System and Information Technology
for Sustainable Solutions (CSITSS), International Conference on, pp. 216–219,
IEEE, 2016.
M. S. Alnaghes and F. Gebali, “A survey on some currently existing intrusion
detection systems for mobile ad hoc networks,” in The Second International Conference
on Electrical and Electronics Engineering, Clean Energy and Green Computing
(EEECEGC2015), vol. 12, 2015.
I. Butun, S. D. Morgera, and R. Sankar, “A survey of intrusion detection systems
in wireless sensor networks,” IEEE communications surveys & tutorials, vol. 16,
no. 1, pp. 266–282, 2014.
R. Vijayanand, D. Devaraj, and B. Kannapiran, “Intrusion detection system
for wireless mesh network using multiple support vector machine classifiers
with genetic-algorithm-based feature selection,” Computers & Security, vol. 77,
pp. 304–314, 2018.
N. Marchang, R. Datta, and S. K. Das, “A novel approach for efficient usage of
intrusion detection system in mobile ad hoc networks.,” IEEE Trans. Vehicular
Technology, vol. 66, no. 2, pp. 1684–1695, 2017.
B. Subba, S. Biswas, and S. Karmakar, “Intrusion detection in mobile ad-hoc
networks: Bayesian game formulation,” Engineering Science and Technology, an
International Journal, vol. 19, no. 2, pp. 782–799, 2016.
A. Nadeem and M. P. Howarth, “An intrusion detection & adaptive response
mechanism for manets,” Ad Hoc Networks, vol. 13, pp. 368–380, 2014.
E. Anthi, L. Williams, M. Słowinska, G. Theodorakopoulos, and P. Burnap, “A
supervised intrusion detection system for smart home iot devices,” IEEE Internet
of Things Journal, vol. 6, no. 5, pp. 9042–9053, 2019.
A. Bhattacharyya, A. Banerjee, D. Bose, H. N. Saha, and D. Bhattacharya, “Different
types of attacks in mobile adhoc network,” arXiv preprint arXiv:1111.4090,
J. Han, J. Pei, and M. Kamber, Data mining: concepts and techniques. Elsevier,
M. Bramer, Principles of data mining, vol. 180. Springer, 2007.
Y. Leung, K.-Z. Chen, Y.-C. Jiao, X.-B. Gao, and K. S. Leung, “A new gradientbased
neural network for solving linear and quadratic programming problems,”
IEEE Transactions on Neural Networks, vol. 12, no. 5, pp. 1074–1083, 2001.
L. Breiman, “Random forests,” Machine learning, vol. 45, no. 1, pp. 5–32, 2001.
F. A. Narudin, A. Feizollah, N. B. Anuar, and A. Gani, “Evaluation of machine
learning classifiers for mobile malware detection,” Soft Computing, vol. 20, no. 1,
pp. 343–357, 2016.
Y. Meidan, M. Bohadana, A. Shabtai, M. Ochoa, N. O. Tippenhauer, J. D.
Guarnizo, and Y. Elovici, “Detection of unauthorized iot devices using machine
learning techniques,” arXiv preprint arXiv:1709.04647, 2017.
R. Batuwita and V. Palade, “Adjusted geometric-mean: a novel performance measure
for imbalanced bioinformatics datasets learning,” Journal of Bioinformatics
and Computational Biology, vol. 10, no. 04, p. 1250003, 2012.
J. Sengupta, S. Ruj, and S. D. Bit, “A comprehensive survey on attacks, security
issues and blockchain solutions for iot and iiot,” Journal of Network and Computer
Applications, vol. 149, p. 102481, 2020.
W. Almobaideen and D. AlKhateeb, “Cspda: Contention and stability aware
partially disjoint aomdv routing protocol,” in Cross validation2015 IEEE Jordan
Conference on Applied Electrical Engineering and Computing Technologies
(AEECT), pp. 1–6, IEEE, 2015.
M. J. Crawley, The R book. John Wiley & Sons, 2012.
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten,
“The weka data mining software: an update,” ACM SIGKDD explorations
newsletter, vol. 11, no. 1, pp. 10–18, 2009.
R. Kohavi et al., “A study of cross-validation and bootstrap for accuracy estimation
and model selection,” in Cross validation, vol. 14, pp. 1137–1145, Montreal,
Canada, 1995.
DOI: https://doi.org/10.31449/inf.v48i15.4646
This work is licensed under a Creative Commons Attribution 3.0 License.