scholarly journals Detecting Cyber-Attacks on Wireless Mobile Networks Using Multicriterion Fuzzy Classifier with Genetic Attribute Selection

2015 ◽  
Vol 2015 ◽  
pp. 1-13 ◽  
Author(s):  
El-Sayed M. El-Alfy ◽  
Feras N. Al-Obeidat

With the proliferation of wireless and mobile network infrastructures and capabilities, a wide range of exploitable vulnerabilities emerges due to the use of multivendor and multidomain cross-network services for signaling and transport of Internet- and wireless-based data. Consequently, the rates and types of cyber-attacks have grown considerably and current security countermeasures for protecting information and communication may be no longer sufficient. In this paper, we investigate a novel methodology based on multicriterion decision making and fuzzy classification that can provide a viable second-line of defense for mitigating cyber-attacks. The proposed approach has the advantage of dealing with various types and sizes of attributes related to network traffic such as basic packet headers, content, and time. To increase the effectiveness and construct optimal models, we augmented the proposed approach with a genetic attribute selection strategy. This allows efficient and simpler models which can be replicated at various network components to cooperatively detect and report malicious behaviors. Using three datasets covering a variety of network attacks, the performance enhancements due to the proposed approach are manifested in terms of detection errors and model construction times.

2020 ◽  
Vol 17 (1) ◽  
pp. 51-70
Author(s):  
Jesús Calle-Cancho ◽  
José-Manuel Mendoza-Rubio ◽  
José-Luis González-Sánchez ◽  
David Cortés-Polo ◽  
Javier Carmona-Murillo

The number of mobile subscribers, as well as the data traffic generated by them, is increasing exponentially with the growth of wireless smart devices and the number of network services that they can support. This significant growth is pushing mobile network operators towards new solutions to improve their network performance and efficiency. Thus, the appearance of Software Defined Networking (SDN) can overcome the limitations of current deployments through decoupling the network control plane from the data plane, allowing higher flexibility and programmability to the network. In this context, the process of handling user mobility becomes an essential part of future mobile networks. Taking advantage of the benefits that SDN brings, in this article we present a novel mobility management solution. This proposal avoids the use of IP-IP tunnels and it adds the dynamic flow management capability provided by SDN. In order to analyse performance, an analytical model is developed to compare it with NB-DMM (Network-based DMM), one of the main DMM (Distributed Mobility Management) solutions. Additionally, performance is also evaluated with an experimental testbed. The results allow handover latency in real scenarios and numerical investigations to be measured, and also show that SR-DMM achieves better efficiency in terms of signaling and routing cost than NB-DMM solution.


Author(s):  
Lokesh Jain ◽  
Harish Kumar

Information dissemination in agricultural sector for its growth using information and communication technology (ICT) as a tool is need of the hour. This can be achieved using information systems. ICT benefits are helpful in exchange and dissemination of information among farming stakeholders. By using the latest tool of mobile technology, farmers can get the current information related to their farming jobs around the clock and at any location, as the mobile network have touched every part/location of the India. Using the features of the mobile-phones like GPS etc. one can get the localized information. Only need is to structure the abundant information available across the various organizations. So, a mobile based agricultural information system framework ‘mAgIDS' has been proposed employing the hybrid mobile application architecture approach. Client-server architecture using the location Application Programming Interface (API) has been proposed. Inference mechanism of the system has implemented on the basis of improved fuzzy rule promotion technique.


Author(s):  
Lokesh Jain ◽  
Harish Kumar

Information dissemination in agricultural sector for its growth using information and communication technology (ICT) as a tool is need of the hour. This can be achieved using information systems. ICT benefits are helpful in exchange and dissemination of information among farming stakeholders. By using the latest tool of mobile technology, farmers can get the current information related to their farming jobs around the clock and at any location, as the mobile network have touched every part/location of the India. Using the features of the mobile-phones like GPS etc. one can get the localized information. Only need is to structure the abundant information available across the various organizations. So, a mobile based agricultural information system framework ‘mAgIDS' has been proposed employing the hybrid mobile application architecture approach. Client-server architecture using the location Application Programming Interface (API) has been proposed. Inference mechanism of the system has implemented on the basis of improved fuzzy rule promotion technique.


2021 ◽  
Vol 2021 ◽  
pp. 1-14 ◽  
Author(s):  
Tsu-Yang Wu ◽  
Lei Yang ◽  
Zhiyuan Lee ◽  
Chien-Ming Chen ◽  
Jeng-Shyang Pan ◽  
...  

A multiserver environment can improve the efficiency of mobile network services more effectively than a single server in managing the increase in users. Because of the large number of users, the security of users’ personal information and communication information is more important in a multiserver environment. Recently, Wang et al. proposed a multiserver authentication scheme based on biometrics and proved the security of their scheme. However, we first demonstrate that their scheme is insecure against a known session-specific temporary information attacks, user impersonation attacks, and server impersonation attacks. To solve the security weakness, we propose an improved scheme based on Wang et al.’s scheme. The security of our improved scheme is also validated based on the formal security analysis, Burrows–Abadi–Needham (BAN) logic, ProVerif, and informal security analysis. Security and performance comparisons prove the security and efficiency of our scheme.


Author(s):  
Marija Skulysh ◽  
Catherina Domracheva

The trend of mobile networks 5G is growing with the increase in the number of users and the speed of transmission. Many operators are turning to small cellular and internal coverage of telecommunication network services. Due to the emergence of software-specific network technologies and virtualization of network functions, the ISP can deploy its networks more flexibly and dynamically. In addition to changing the model for deploying a wireless mobile network, it also determines the tendency for micro-operators to develop (μO). Communication operators can provide regional network services through public buildings, shopping malls or industrial facilities. In addition, localized network services are provided and bandwidth consumption is reduced. The distributed μO architecture meets the computing requirements for applications, data, and services from the cloud data center to the peripheral network devices or the micro-data center μO. The μO service model is able to reduce network latency in response to applications with a low latency for the future 5G boundary computing environment. This article discusses the design of the micro-operator 5G and proposes a mechanism for redirecting flows based on the decision tree (DTBFR) to redirect traffic flows to neighboring service nodes. The DTBFR mechanism allows different microcontrollers to share network resources and accelerate the development of border computing in the future.


Entropy ◽  
2019 ◽  
Vol 21 (11) ◽  
pp. 1077
Author(s):  
Denis Horvath ◽  
Juraj Gazda ◽  
Eugen Slapak ◽  
Taras Maksymyuk

Attempts to develop flexible on-demand drone-assisted mobile network deployment are increasingly driven by cost-effective and energy-efficient innovations. The current stage opens up a wide range of theoretical discussions on the management of swarm processes, networks and other integrated projects. However, dealing with these complex issues remains a challenging task, although heuristic approaches are usually utilized. This article introduces a model of autonomous and adaptive drones that provide the function of aerial mobile base stations. Its particular goal is to analyze post-disaster recovery if the network failure takes place. We assume that a well-structured swarm of drones can re-establish the connection by spanning the residual functional, fixed infrastructure, and providing coverage of the target area. Our technique uses stochastic Langevin dynamics with virtual and adaptive forces that bind drones during deployment. The system characteristics of the swarms are a priority of our focus. The assessment of parametric sensitivity with the insistence on the manifestation of adaptability points to the possibility of improving the characteristics of the swarms in different dynamic situations.


2018 ◽  
Author(s):  
Phanidra Palagummi ◽  
Vedant Somani ◽  
Krishna M. Sivalingam ◽  
Balaji Venkat

Networking connectivity is increasingly based on wireless network technologies, especially in developing nations where the wired network infrastructure is not accessible to a large segment of the population. Wireless data network technologies based on 2G and 3G are quite common globally; 4G-based deployments are on the rise during the past few years. At the same time, the increasing high-bandwidth and low-latency requirements of mobile applications has propelled the Third Generation Partnership Project (3GPP) standards organization to develop standards for the next generation of mobile networks, based on recent advances in wireless communication technologies. This standard is called the Fifth Generation (5G) wireless network standard. This paper presents a high-level overview of the important architectural components, of the advanced communication technologies, of the advanced networking technologies such as Network Function Virtualization and other important aspects that are part of the 5G network standards. The paper also describes some of the common future generation applications that require low-latency and high-bandwidth communications.


Author(s):  
Praveen Kumar Dwivedi ◽  
Surya Prakash Tripathi

Background: Fuzzy systems are employed in several fields like data processing, regression, pattern recognition, classification and management as a result of their characteristic of handling uncertainty and explaining the feature of the advanced system while not involving a particular mathematical model. Fuzzy rule-based systems (FRBS) or fuzzy rule-based classifiers (mainly designed for classification purpose) are primarily the fuzzy systems that consist of a group of fuzzy logical rules and these FRBS are unit annexes of ancient rule-based systems, containing the "If-then" rules. During the design of any fuzzy systems, there are two main objectives, interpretability and accuracy, which are conflicting with each another, i.e., improvement in any of those two options causes the decrement in another. This condition is termed as Interpretability –Accuracy Trade-off. To handle this condition, Multi-Objective Evolutionary Algorithms (MOEA) are often applied within the design of fuzzy systems. This paper reviews the approaches to the problem of developing fuzzy systems victimization evolutionary process Multi-Objective Optimization (EMO) algorithms considering ‘Interpretability-Accuracy Trade-off, current research trends and improvement in the design of fuzzy classifier using MOEA in the future scope of authors. Methods: The state-of-the-art review has been conducted for various fuzzy classifier designs, and their optimization is reviewed in terms of multi-objective. Results: This article reviews the different Multi-Objective Optimization (EMO) algorithms in the context of Interpretability -Accuracy tradeoff during fuzzy classification. Conclusion: The evolutionary multi-objective algorithms are being deployed in the development of fuzzy systems. Improvement in the design using these algorithms include issues like higher spatiality, exponentially inhabited solution, I-A tradeoff, interpretability quantification, and describing the ability of the system of the fuzzy domain, etc. The focus of the authors in future is to find out the best evolutionary algorithm of multi-objective nature with efficiency and robustness, which will be applicable for developing the optimized fuzzy system with more accuracy and higher interpretability. More concentration will be on the creation of new metrics or parameters for the measurement of interpretability of fuzzy systems and new processes or methods of EMO for handling I-A tradeoff.


2018 ◽  
Vol 10 (10) ◽  
pp. 3626 ◽  
Author(s):  
Yousaf Zikria ◽  
Sung Kim ◽  
Muhammad Afzal ◽  
Haoxiang Wang ◽  
Mubashir Rehmani

The Fifth generation (5G) network is projected to support large amount of data traffic and massive number of wireless connections. Different data traffic has different Quality of Service (QoS) requirements. 5G mobile network aims to address the limitations of previous cellular standards (i.e., 2G/3G/4G) and be a prospective key enabler for future Internet of Things (IoT). 5G networks support a wide range of applications such as smart home, autonomous driving, drone operations, health and mission critical applications, Industrial IoT (IIoT), and entertainment and multimedia. Based on end users’ experience, several 5G services are categorized into immersive 5G services, intelligent 5G services, omnipresent 5G services, autonomous 5G services, and public 5G services. In this paper, we present a brief overview of 5G technical scenarios. We then provide a brief overview of accepted papers in our Special Issue on 5G mobile services and scenarios. Finally, we conclude this paper.


Network ◽  
2021 ◽  
Vol 1 (2) ◽  
pp. 75-94
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to the edge for quick, seamless, and secure access. After being granted access to a service, the end-user will be able to cache and share data with other users. However, security measures should be in place for SP not only to secure the provisioning and access of those services but also, should be able to restrict what the end-users can do with the accessed data in or out of coverage. This can be facilitated by federated service authorization and access control mechanisms that restrict the caching and sharing of data accessed by the UE in different security domains. In this paper, we propose a Data Caching and Sharing Security (DCSS) protocol that leverages federated authorization to provide secure caching and sharing of data from multiple SPs in multiple security domains. We formally verify the proposed DCSS protocol using ProVerif and applied pi-calculus. Furthermore, a comprehensive security analysis of the security properties of the proposed DCSS protocol is conducted.


Sign in / Sign up

Export Citation Format

Share Document