AI Driven Security Threat Analysis for 5G Cognitive Radio Short Range Applications

Authors

  • Minilal M, Meena M

Keywords:

5G, Cognitive Radio, Short range application, Security analysis, Artificial intelligence, Chaotic deep belief networks.

Abstract

With 5G technologies, cognitive radio (CR) has become a possible answer to maximize spectrum utilization and efficiency. But in the case of short range application particularly, CR also brings significant security concerns in addition to benefits. Emphasizing short range use, this paper user 5G frame works to assess the security issue with cognitive radio systems. Among the discovered security hazards are primary user emulation attack, jamming attacks, SSDF attacks etc.; driven by reputation. Chaotic Deep Belief Networks (DBN) for detection and mitigation purpose is proposed to overcome these challenges using artificial intelligence (AI) approaches. Emphasizing the need of strong security measures to ensure the integrity and dependability of communication network, the analysis considers the unique characteristics of 5G –CR spectrum and short range applications .the result shows that the proposed chaotic DBN classification approach had accuracy ranging from 92.5 % to 94.2% in the testing set and an accuracy of 95.5% on the training set.

Downloads

Download data is not yet available.

References

Pirinen, P. (2014, November). A brief overview of 5G research activities. In 1st International Conference on 5G for Ubiquitous Connectivity (pp. 17-22). IEEE.

Badoi, C. I., Prasad, N., Croitoru, V., & Prasad, R. (2011). 5G based on cognitive radio. Wireless Personal Communications, 57, 441-464.

Gandotra, P., & Jha, R. K. (2017). A survey on green communication and security challenges in 5G wireless communication networks. Journal of Network and Computer Applications, 96, 39-61.

Ahmad, W. S. H. M. W., Radzi, N. A. M., Samidi, F. S., Ismail, A., Abdullah, F., Jamaludin, M. Z., & Zakaria, M. (2020). 5G technology: Towards dynamic spectrum sharing using cognitive radio networks. IEEE access, 8, 14460-14488.

Parvin, S., Hussain, F. K., Hussain, O. K., Han, S., Tian, B., & Chang, E. (2012). Cognitive radio network security: A survey. Journal of Network and Computer Applications, 35(6), 1691-1708.

Siddikov, I., Khujamatov, K., Reypnazarov, E., & Khasanov, D. (2021, November). Crn and 5g based iot: Applications, challenges and opportunities. In 2021 international conference on information science and communications technologies (ICISCT) (pp. 1-5). IEEE.

Hlavacek, D., & Chang, J. M. (2014). A layered approach to cognitive radio network security: A survey. Computer Networks, 75, 414-436.

El-Hajj, W., Safa, H., & Guizani, M. (2011). Survey of security issues in cognitive radio networks. Journal of Internet Technology, 12(2), 181-198.

Badoi, C. I., Prasad, N., Croitoru, V., & Prasad, R. (2011). 5G based on cognitive radio. Wireless Personal Communications, 57, 441-464.

Khan, R., Kumar, P., Jayakody, D. N. K., & Liyanage, M. (2019). A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions. IEEE Communications Surveys & Tutorials, 22(1), 196-248.

Sheikhzadeh, S., Pourghasemian, M., Javan, M. R., Mokari, N., & Jorswieck, E. A. (2021). Ai-based secure NOMA and cognitive radio-enabled green communications: Channel state information and battery value uncertainties. IEEE Transactions on Green Communications and Networking, 6(2), 1037-1054.

Yuan, Y., Gehrmann, C., Sternby, J., & Barriga, L. (2022, July). Insight of Anomaly Detection with NWDAF in 5G. In 2022 International Conference on Computer, Information and Telecommunication Systems (CITS) (pp. 1-6). IEEE.

Odarchenko, R., Iavich, M., Iashvili, G., Fedushko, S., & Syerov, Y. (2023). Assessment of security KPIs for 5G network slices for special groups of subscribers. Big Data and Cognitive Computing, 7(4), 169.

Krayani, A., Farrukh, M., Baydoun, M., Marcenaro, L., Gao, Y., & Regazzoni, C. S. (2019, September). Jammer detection in M-QAM-OFDM by learning a Dynamic Bayesian Model for the Cognitive Radio. In 2019 27th European Signal Processing Conference (EUSIPCO) (pp. 1-5). IEEE.

Lilhore, U. K., Dalal, S., & Simaiya, S. (2024). A cognitive security framework for detecting intrusions in IoT and 5G utilizing deep learning. Computers & Security, 136, 103560

Downloads

Published

13.11.2024

How to Cite

Minilal M. (2024). AI Driven Security Threat Analysis for 5G Cognitive Radio Short Range Applications. International Journal of Intelligent Systems and Applications in Engineering, 12(4), 4269–4276. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/7045

Issue

Section

Research Article