Real Time Feature Impact Optimization (RFIO) Based Deep Neural Network Model for Improved 5G-Iot Security

Authors

  • G. Ramasubramanian Research Scholar, Faculty of Arts and Science Vinayaka Missions Research Foundation, Salem, Tamil nadu State-636308
  • S. Rajaprakash Professor,Department of Computer Science and Engineering,Aarupadaiveedu Institute of Technology, Vinayaka Missions Research Foundation,Paiyanoor, Chengalpattu District. Tamil Nadu State-613104

Keywords:

5G-IoT Networks, wireless networks, Intrusion attack, Intrusion detection, RFIO, RFIO-DNN

Abstract

The problem of data security in 5G-IoT network has been well studied. The support of rapid communication provided by the network has been used by various sectors. The security threat has been identified in the same frequency as it supports the communication. Towards handling such intrusion threats, there exist numerous techniques which address specific problem and consider only limited factors of communication. This inclined their performance against security towards different threats. To address this issue, an efficient Real-time Feature Impact Optimization (RFIO) based DNN model (RFIO-DNN)  is presented in this article. The method uses multiple standard data sets for the evaluation of the methods in restricting different threats. To start with, the data sets are merged and normalized to a single entity using Feature Level Fuzzy Normalizer. Second the method applies Feature Impact Optimization (RFIO) algorithm towards feature selection. Using the features selected, the method trains the deep neural network. At the test phase, the neurons of the network compute Feature Level Trust (FLT) and Transmission Level Trust Weight (TLTW).   Using these values, the output layer neuron computes Multi Constraint Trust Weight (MCTW) according to the IoT devices present in the transmission route. Incoming data are classified with MCTW towards intrusion detection. 

Downloads

Download data is not yet available.

References

A. Pathak, I. Al-Anbagi and H. J. Hamilton, "An Adaptive QoS and Trust-Based Lightweight Secure Routing Algorithm for WSNs," in IEEE Internet of Things Journal, vol. 9, no. 23, pp. 23826-23840, 1 Dec.1, 2022, doi: 10.1109/JIOT.2022.3189832.

S. Verma, S. Zeadally, S. Kaur and A. K. Sharma, "Intelligent and Secure Clustering in Wireless Sensor Network (WSN)-Based Intelligent Transportation Systems," in IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 8, pp. 13473-13481, Aug. 2022, doi: 10.1109/TITS.2021.3124730.

A. Ahmed, S. Abdullah, M. Bukhsh, I. Ahmad and Z. Mushtaq, "An Energy-Efficient Data Aggregation Mechanism for IoT Secured by Blockchain," in IEEE Access, vol. 10, pp. 11404-11419, 2022, doi: 10.1109/ACCESS.2022.3146295.

M. Bin-Yahya, O. Alhussein and X. Shen, "Securing Software-Defined WSNs Communication via Trust Management," in IEEE Internet of Things Journal, vol. 9, no. 22, pp. 22230-22245, 15 Nov.15, 2022, doi: 10.1109/JIOT.2021.3102578.

M. Nouman, U. Qasim, H. Nasir, A. Almasoud, M. Imran and N. Javaid, "Malicious Node Detection Using Machine Learning and Distributed Data Storage Using Blockchain in WSNs," in IEEE Access, vol. 11, pp. 6106-6121, 2023, doi: 10.1109/ACCESS.2023.3236983.

Z. Yu, Y. Liu, G. Xie, R. Li, S. Liu and L. T. Yang, "TCE-IDS: Time Interval Conditional Entropy- Based Intrusion Detection System for Automotive Controller Area Networks," in IEEE Transactions on Industrial Informatics, vol. 19, no. 2, pp. 1185-1195, Feb. 2023, doi: 10.1109/TII.2022.3202539.

K. Sood, M. R. Nosouhi, D. D. N. Nguyen, F. Jiang, M. Chowdhury and R. Doss, "Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 965-979, 2023, doi: 10.1109/TIFS.2022.3233777.

M. Shafi, R. K. Jha and S. Jain, "LGTBIDS: Layer-Wise Graph Theory-Based Intrusion Detection System in Beyond 5G," in IEEE Transactions on Network and Service Management, vol. 20, no. 1, pp. 658-671, March 2023, doi: 10.1109/TNSM.2022.3197921.

Z. Zhao, Q. Du and H. Song, "Traffic Load Learning Towards Early Detection of Intrusion in Industrial mMTC Networks," in IEEE Transactions on Industrial Informatics, vol. 19, no. 7, pp. 8441-8451, July 2023, doi: 10.1109/TII.2022.3218722.

H. Whitworth, S. Al-Rubaye, A. Tsourdos and J. Jiggins, "5G Aviation Networks Using Novel AI Approach for DDoS Detection," in IEEE Access, vol. 11, pp. 77518-77542, 2023, doi: 10.1109/ACCESS.2023.3296311.

D. D. N. Nguyen, K. Sood, Y. Xiang, L. Gao, L. Chi and S. Yu, "Toward IoT Node Authentication Mechanism in Next Generation Networks," in IEEE Internet of Things Journal, vol. 10, no. 15, pp. 13333-13341, 1 Aug.1, 2023, doi: 10.1109/JIOT.2023.3262822.

T. Ye, G. Li, I. Ahmad, C. Zhang, X. Lin and J. Li, "FLAG: Few-Shot Latent Dirichlet Generative Learning for Semantic-Aware Traffic Detection," in IEEE Transactions on Network and Service Management, vol. 19, no. 1, pp. 73-88, March 2022, doi: 10.1109/TNSM.2021.3131266.

Y. He, M. Kong, C. Du, D. Yao and M. Yu, "Communication Security Analysis of Intelligent Transportation System Using 5G Internet of Things From the Perspective of Big Data," in IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 2, pp. 2199-2207, Feb. 2023, doi: 10.1109/TITS.2022.3141788.

M. Lefoane, I. Ghafir, S. Kabir and I. -U. Awan, "Unsupervised Learning for Feature Selection: A Proposed Solution for Botnet Detection in 5G Networks," in IEEE Transactions on Industrial Informatics, vol. 19, no. 1, pp. 921-929, Jan. 2023, doi: 10.1109/TII.2022.3192044.

Gopalakrishnan Subburayalu, Hemanand Duraivelu, Arun Prasath Raveendran, Rajesh Arunachalam, Deepika Kongara & Chitra Thangavel (2023) Cluster Based Malicious Node Detection System for Mobile Ad-Hoc Network Using ANFIS Classifier, Journal of Applied Security Research, 18:3, 402-420, DOI: 10.1080/19361610.2021.2002118

Satyanarayana, P., Diwakar, G., Subbayamma, B. V., Phani Sai Kumar, N. V., Arun, M., & Gopalakrishnan, S. (2023). Comparative analysis of new meta-heuristic-variants for privacy preservation in wireless mobile adhoc networks for IoT applications. Computer Communications, 198, 262–281. https://doi.org/10.1016/j.comcom.2022.12.006

Downloads

Published

11.01.2024

How to Cite

Ramasubramanian, G. ., & Rajaprakash, S. . (2024). Real Time Feature Impact Optimization (RFIO) Based Deep Neural Network Model for Improved 5G-Iot Security. International Journal of Intelligent Systems and Applications in Engineering, 12(11s), 199–204. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4437

Issue

Section

Research Article