AI Driven Security Threat Analysis for 5G Cognitive Radio Short Range Applications
Keywords:
5G, Cognitive Radio, Short range application, Security analysis, Artificial intelligence, Chaotic deep belief networks.Abstract
With 5G technologies, cognitive radio (CR) has become a possible answer to maximize spectrum utilization and efficiency. But in the case of short range application particularly, CR also brings significant security concerns in addition to benefits. Emphasizing short range use, this paper user 5G frame works to assess the security issue with cognitive radio systems. Among the discovered security hazards are primary user emulation attack, jamming attacks, SSDF attacks etc.; driven by reputation. Chaotic Deep Belief Networks (DBN) for detection and mitigation purpose is proposed to overcome these challenges using artificial intelligence (AI) approaches. Emphasizing the need of strong security measures to ensure the integrity and dependability of communication network, the analysis considers the unique characteristics of 5G –CR spectrum and short range applications .the result shows that the proposed chaotic DBN classification approach had accuracy ranging from 92.5 % to 94.2% in the testing set and an accuracy of 95.5% on the training set.
Downloads
References
Pirinen, P. (2014, November). A brief overview of 5G research activities. In 1st International Conference on 5G for Ubiquitous Connectivity (pp. 17-22). IEEE.
Badoi, C. I., Prasad, N., Croitoru, V., & Prasad, R. (2011). 5G based on cognitive radio. Wireless Personal Communications, 57, 441-464.
Gandotra, P., & Jha, R. K. (2017). A survey on green communication and security challenges in 5G wireless communication networks. Journal of Network and Computer Applications, 96, 39-61.
Ahmad, W. S. H. M. W., Radzi, N. A. M., Samidi, F. S., Ismail, A., Abdullah, F., Jamaludin, M. Z., & Zakaria, M. (2020). 5G technology: Towards dynamic spectrum sharing using cognitive radio networks. IEEE access, 8, 14460-14488.
Parvin, S., Hussain, F. K., Hussain, O. K., Han, S., Tian, B., & Chang, E. (2012). Cognitive radio network security: A survey. Journal of Network and Computer Applications, 35(6), 1691-1708.
Siddikov, I., Khujamatov, K., Reypnazarov, E., & Khasanov, D. (2021, November). Crn and 5g based iot: Applications, challenges and opportunities. In 2021 international conference on information science and communications technologies (ICISCT) (pp. 1-5). IEEE.
Hlavacek, D., & Chang, J. M. (2014). A layered approach to cognitive radio network security: A survey. Computer Networks, 75, 414-436.
El-Hajj, W., Safa, H., & Guizani, M. (2011). Survey of security issues in cognitive radio networks. Journal of Internet Technology, 12(2), 181-198.
Badoi, C. I., Prasad, N., Croitoru, V., & Prasad, R. (2011). 5G based on cognitive radio. Wireless Personal Communications, 57, 441-464.
Khan, R., Kumar, P., Jayakody, D. N. K., & Liyanage, M. (2019). A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions. IEEE Communications Surveys & Tutorials, 22(1), 196-248.
Sheikhzadeh, S., Pourghasemian, M., Javan, M. R., Mokari, N., & Jorswieck, E. A. (2021). Ai-based secure NOMA and cognitive radio-enabled green communications: Channel state information and battery value uncertainties. IEEE Transactions on Green Communications and Networking, 6(2), 1037-1054.
Yuan, Y., Gehrmann, C., Sternby, J., & Barriga, L. (2022, July). Insight of Anomaly Detection with NWDAF in 5G. In 2022 International Conference on Computer, Information and Telecommunication Systems (CITS) (pp. 1-6). IEEE.
Odarchenko, R., Iavich, M., Iashvili, G., Fedushko, S., & Syerov, Y. (2023). Assessment of security KPIs for 5G network slices for special groups of subscribers. Big Data and Cognitive Computing, 7(4), 169.
Krayani, A., Farrukh, M., Baydoun, M., Marcenaro, L., Gao, Y., & Regazzoni, C. S. (2019, September). Jammer detection in M-QAM-OFDM by learning a Dynamic Bayesian Model for the Cognitive Radio. In 2019 27th European Signal Processing Conference (EUSIPCO) (pp. 1-5). IEEE.
Lilhore, U. K., Dalal, S., & Simaiya, S. (2024). A cognitive security framework for detecting intrusions in IoT and 5G utilizing deep learning. Computers & Security, 136, 103560
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.