<  Retour au portail Polytechnique Montréal

Empowering security and trust in 5G and beyond : a deep reinforcement learning approach

Hajar Moudoud et Soumaya Cherkaoui

Article de revue (2023)

Document en libre accès dans PolyPublie et chez l'éditeur officiel
[img]
Affichage préliminaire
Libre accès au plein texte de ce document
Version officielle de l'éditeur
Conditions d'utilisation: Creative Commons: Attribution (CC BY)
Télécharger (3MB)
Afficher le résumé
Cacher le résumé

Abstract

Recent advances in 5G and beyond have further expanded the potential of IoT applications, bringing unprecedented levels of connectivity, speed, and low latency. However, these advances come with significant security threats that can cause widespread damage. An effective approach to addressing these issues involves the integration of cutting-edge technologies like machine learning (ML), particularly deep reinforcement learning (DRL). DRL is a specialized area of ML that integrates the concepts of deep learning and reinforcement learning to create effective solutions for various tasks. In particular, DRL can facilitate the creation of intelligent security systems that can adapt to dynamic and intricate IoT applications connected to 5G and beyond networks. However, effectively implementing DRL-based intrusion detection frameworks in IoT applications connected to 5G networks poses significant challenges due to bandwidth utilization and device behavior. The data generated by IoT devices is often limited, and malicious behavior may be infrequent, making it difficult to accurately identify and train the algorithm to detect such behavior. Moreover, DRL algorithms pose a significant challenge for IoT devices constrained by limited bandwidth, as communicating large amounts of data required by DRL algorithms can cause network congestion and delay critical communications. In this article, we introduce a novel approach to improving the security of IoT applications in the 5G and beyond era by developing an intrusion detection system that employs DRL algorithms. Our approach involves a distributed Q-learning algorithm that observes the behavior of connected devices and predicts anomalous actions. Additionally, to overcome the challenges associated with bandwidth utilization and device behavior, we introduce a bandwidth allocation problem based on a reputation mechanism that allocates bandwidth to only trustworthy devices. Finally, we evaluate our proposed intrusion detection system on the selected indicators. The numerical results demonstrate that our proposed approach outperforms the referenced solutions on the selected indicators.

Mots clés

internet of things; security; intrusion detection; behavioral sciences; 5G mobile communication; bandwidth; reliability

Sujet(s): 2500 Génie électrique et électronique > 2507 Systèmes de télécommunications
2500 Génie électrique et électronique > 2509 Systèmes de contrôle
2700 Technologie de l'information > 2714 Mathématiques de l'informatique
Département: Département de génie informatique et génie logiciel
URL de PolyPublie: https://publications.polymtl.ca/56517/
Titre de la revue: IEEE Open Journal of the Communications Society (vol. 4)
Maison d'édition: IEEE
DOI: 10.1109/ojcoms.2023.3313352
URL officielle: https://doi.org/10.1109/ojcoms.2023.3313352
Date du dépôt: 02 nov. 2023 15:35
Dernière modification: 30 avr. 2024 01:20
Citer en APA 7: Moudoud, H., & Cherkaoui, S. (2023). Empowering security and trust in 5G and beyond : a deep reinforcement learning approach. IEEE Open Journal of the Communications Society, 4, 2410-2420. https://doi.org/10.1109/ojcoms.2023.3313352

Statistiques

Total des téléchargements à partir de PolyPublie

Téléchargements par année

Provenance des téléchargements

Dimensions

Actions réservées au personnel

Afficher document Afficher document