Intrusion Detection System for 5G Device-to-Device Communication Technology in Internet of Things

Ola Malkawi, Nadim Obaid, Wesam Almobaideen

Abstract


Abstract - The emergence of Internet of Things (IoT) has raised the need for high quality communications, and high performance networks. 5G cellular communication network exhibits the readiness to provide such high quality communication channels by using various advanced technologies. Device to device communications is a one of multiple technologies that have been suggested in 5G. By the employment of this technology, mobile devices can communicate with each other without the involvement of a base station (BS) which eliminates congestion, expands coverage area and increases throughput. Communicating devices set up a multi-hop path using nearby devices which act as relaying elements, or routers. However, the Self-organizing nature and the lack of centralized control of D2D make it easier to launch multiple types of attacks. In this paper, an intrusion detection system IDS is proposed using machine learning techniques. Eight types of attacks are considered to train the system for intrusion detection, then, multiple classification algorithms have been compared. Finally, a multiobjective model has been designed based on the results of comparison to secure the communication process under D2D technology. The used dataset is generated using Network Simulator NS-2.

Full Text:

PDF

References


H. Saadeh, W. Almobaideen, K. E. Sabri, and M. Saadeh, “Hybrid sdn-icn architecture

design for the internet of things,” in 2019 Sixth International Conference

on Software Defined Systems (SDS), pp. 96–101, IEEE, 2019.

P. Masek, A. Muthanna, and J. Hosek, “Suitability of manet routing protocols for

the next-generation national security and public safety systems,” in Conference

on Smart Spaces, pp. 242–253, Springer, 2015.

A. Habbal, S. I. Goudar, and S. Hassan, “A context-aware radio access technology

selection mechanism in 5g mobile network for smart city applications,” Journal

of Network and Computer Applications, vol. 135, pp. 97–107, 2019.

U. N. Kar and D. K. Sanyal, “An overview of device-to-device communication in

cellular networks,” ICT Express, 2017.

R. I. Ansari, C. Chrysostomou, S. A. Hassan, M. Guizani, S. Mumtaz, J. Rodriguez,

and J. J. Rodrigues, “5g d2d networks: Techniques, challenges, and future

prospects,” IEEE Systems Journal, 2017.

L. Wei, R. Q. Hu, Y. Qian, and G. Wu, “Energy efficiency and spectrum efficiency

of multihop device-to-device communications underlaying cellular networks,”

IEEE Transactions on Vehicular Technology, vol. 65, no. 1, pp. 367–380,

M. A. Kandi, H. Lakhlef, A. Bouabdallah, and Y. Challal, “A versatile key management

protocol for secure group and device-to-device communication in the

internet of things,” Journal of Network and Computer Applications, vol. 150,

p. 102480, 2020.

V. Yazıcı, U. C. Kozat, and M. O. Sunay, “A new control plane for 5g network

architecture with a case study on unified handoff, mobility, and routing management,”

IEEE communications magazine, vol. 52, no. 11, pp. 76–85, 2014.

J. Liu, N. Kato, J. Ma, and N. Kadowaki, “Device-to-device communication in

lte-advanced networks: A survey,” IEEE Communications Surveys & Tutorials,

vol. 17, no. 4, pp. 1923–1940, 2015.

M. Usman, A. A. Gebremariam, U. Raza, and F. Granelli, “A software-defined

device-to-device communication architecture for public safety applications in 5g

networks,” IEEE Access, vol. 3, pp. 1649–1654, 2015.

M. N. Tehrani, M. Uysal, and H. Yanikomeroglu, “Device-to-device communication

in 5g cellular networks: challenges, solutions, and future directions,” IEEE

Communications Magazine, vol. 52, no. 5, pp. 86–92, 2014.

Y. Jung, E. Festijo, and M. Peradilla, “Joint operation of routing control and

group key management for 5g ad hoc d2d networks,” in Privacy and Security in

Mobile Systems (PRISMS), 2014 International Conference on, pp. 1–8, IEEE,

J. Qiao, X. S. Shen, J. W. Mark, Q. Shen, Y. He, and L. Lei, “Enabling deviceto-

device communications in millimeter-wave 5g cellular networks,” IEEE Communications

Magazine, vol. 53, no. 1, pp. 209–215, 2015.

Z. Hashim and N. Gupta, “Futuristic device-to-device communication paradigm

in vehicular ad-hoc network,” in Information Technology (InCITe)-The Next Generation

IT Summit on the Theme-Internet of Things: Connect your Worlds, International

Conference on, pp. 209–214, IEEE, 2016.

B. Kaufman and B. Aazhang, “Cellular networks with an overlaid device to device

network,” in Signals, Systems and Computers, 2008 42nd Asilomar Conference

on, pp. 1537–1541, IEEE, 2008.

X. Lin, J. Andrews, A. Ghosh, and R. Ratasuk, “An overview of 3gpp deviceto-

device proximity services,” IEEE Communications Magazine, vol. 52, no. 4,

pp. 40–48, 2014.

W. Almobaideen and N. Al-maitah, “Ttaf: Tcp timeout adaptivity based on fast

retransmit over manet,” Journal of Networks, vol. 9, no. 12, pp. 3321–3326, 2014.

S. Riaz, H. K. Qureshi, and M. Saleem, “Performance evaluation of routing protocols

in energy harvesting d2d network,” in Computing, Electronic and Electrical

Engineering (ICE Cube), 2016 International Conference on, pp. 251–255, IEEE,

S. A. Abd, S. Manjunath, and S. Abdulhayan, “Direct device-to-device communication

in 5g networks,” in Computation System and Information Technology

for Sustainable Solutions (CSITSS), International Conference on, pp. 216–219,

IEEE, 2016.

M. S. Alnaghes and F. Gebali, “A survey on some currently existing intrusion

detection systems for mobile ad hoc networks,” in The Second International Conference

on Electrical and Electronics Engineering, Clean Energy and Green Computing

(EEECEGC2015), vol. 12, 2015.

I. Butun, S. D. Morgera, and R. Sankar, “A survey of intrusion detection systems

in wireless sensor networks,” IEEE communications surveys & tutorials, vol. 16,

no. 1, pp. 266–282, 2014.

R. Vijayanand, D. Devaraj, and B. Kannapiran, “Intrusion detection system

for wireless mesh network using multiple support vector machine classifiers

with genetic-algorithm-based feature selection,” Computers & Security, vol. 77,

pp. 304–314, 2018.

N. Marchang, R. Datta, and S. K. Das, “A novel approach for efficient usage of

intrusion detection system in mobile ad hoc networks.,” IEEE Trans. Vehicular

Technology, vol. 66, no. 2, pp. 1684–1695, 2017.

B. Subba, S. Biswas, and S. Karmakar, “Intrusion detection in mobile ad-hoc

networks: Bayesian game formulation,” Engineering Science and Technology, an

International Journal, vol. 19, no. 2, pp. 782–799, 2016.

A. Nadeem and M. P. Howarth, “An intrusion detection & adaptive response

mechanism for manets,” Ad Hoc Networks, vol. 13, pp. 368–380, 2014.

E. Anthi, L. Williams, M. Słowinska, G. Theodorakopoulos, and P. Burnap, “A

supervised intrusion detection system for smart home iot devices,” IEEE Internet

of Things Journal, vol. 6, no. 5, pp. 9042–9053, 2019.

A. Bhattacharyya, A. Banerjee, D. Bose, H. N. Saha, and D. Bhattacharya, “Different

types of attacks in mobile adhoc network,” arXiv preprint arXiv:1111.4090,

J. Han, J. Pei, and M. Kamber, Data mining: concepts and techniques. Elsevier,

M. Bramer, Principles of data mining, vol. 180. Springer, 2007.

Y. Leung, K.-Z. Chen, Y.-C. Jiao, X.-B. Gao, and K. S. Leung, “A new gradientbased

neural network for solving linear and quadratic programming problems,”

IEEE Transactions on Neural Networks, vol. 12, no. 5, pp. 1074–1083, 2001.

L. Breiman, “Random forests,” Machine learning, vol. 45, no. 1, pp. 5–32, 2001.

F. A. Narudin, A. Feizollah, N. B. Anuar, and A. Gani, “Evaluation of machine

learning classifiers for mobile malware detection,” Soft Computing, vol. 20, no. 1,

pp. 343–357, 2016.

Y. Meidan, M. Bohadana, A. Shabtai, M. Ochoa, N. O. Tippenhauer, J. D.

Guarnizo, and Y. Elovici, “Detection of unauthorized iot devices using machine

learning techniques,” arXiv preprint arXiv:1709.04647, 2017.

R. Batuwita and V. Palade, “Adjusted geometric-mean: a novel performance measure

for imbalanced bioinformatics datasets learning,” Journal of Bioinformatics

and Computational Biology, vol. 10, no. 04, p. 1250003, 2012.

J. Sengupta, S. Ruj, and S. D. Bit, “A comprehensive survey on attacks, security

issues and blockchain solutions for iot and iiot,” Journal of Network and Computer

Applications, vol. 149, p. 102481, 2020.

W. Almobaideen and D. AlKhateeb, “Cspda: Contention and stability aware

partially disjoint aomdv routing protocol,” in Cross validation2015 IEEE Jordan

Conference on Applied Electrical Engineering and Computing Technologies

(AEECT), pp. 1–6, IEEE, 2015.

M. J. Crawley, The R book. John Wiley & Sons, 2012.

M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten,

“The weka data mining software: an update,” ACM SIGKDD explorations

newsletter, vol. 11, no. 1, pp. 10–18, 2009.

R. Kohavi et al., “A study of cross-validation and bootstrap for accuracy estimation

and model selection,” in Cross validation, vol. 14, pp. 1137–1145, Montreal,

Canada, 1995.




DOI: https://doi.org/10.31449/inf.v48i15.4646

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.