Empowering Security and Trust in 5G and Beyond: A Deep Reinforcement Learning Approach

Recent advances in 5G and beyond have further expanded the potential of IoT applications, bringing unprecedented levels of connectivity, speed, and low latency. However, these advances come with significant security threats that can cause widespread damage. An effective approach to addressing these...

Full description

Bibliographic Details
Main Authors: Hajar Moudoud, Soumaya Cherkaoui
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Open Journal of the Communications Society
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10243611/
_version_ 1797655679725469696
author Hajar Moudoud
Soumaya Cherkaoui
author_facet Hajar Moudoud
Soumaya Cherkaoui
author_sort Hajar Moudoud
collection DOAJ
description Recent advances in 5G and beyond have further expanded the potential of IoT applications, bringing unprecedented levels of connectivity, speed, and low latency. However, these advances come with significant security threats that can cause widespread damage. An effective approach to addressing these issues involves the integration of cutting-edge technologies like machine learning (ML), particularly deep reinforcement learning (DRL). DRL is a specialized area of ML that integrates the concepts of deep learning and reinforcement learning to create effective solutions for various tasks. In particular, DRL can facilitate the creation of intelligent security systems that can adapt to dynamic and intricate IoT applications connected to 5G and beyond networks. However, effectively implementing DRL-based intrusion detection frameworks in IoT applications connected to 5G networks poses significant challenges due to bandwidth utilization and device behavior. The data generated by IoT devices is often limited, and malicious behavior may be infrequent, making it difficult to accurately identify and train the algorithm to detect such behavior. Moreover, DRL algorithms pose a significant challenge for IoT devices constrained by limited bandwidth, as communicating large amounts of data required by DRL algorithms can cause network congestion and delay critical communications. In this article, we introduce a novel approach to improving the security of IoT applications in the 5G and beyond era by developing an intrusion detection system that employs DRL algorithms. Our approach involves a distributed Q-learning algorithm that observes the behavior of connected devices and predicts anomalous actions. Additionally, to overcome the challenges associated with bandwidth utilization and device behavior, we introduce a bandwidth allocation problem based on a reputation mechanism that allocates bandwidth to only trustworthy devices. Finally, we evaluate our proposed intrusion detection system on the selected indicators. The numerical results demonstrate that our proposed approach outperforms the referenced solutions on the selected indicators.
first_indexed 2024-03-11T17:18:05Z
format Article
id doaj.art-ec16b7479af94cd28edc50299646fb02
institution Directory Open Access Journal
issn 2644-125X
language English
last_indexed 2024-03-11T17:18:05Z
publishDate 2023-01-01
publisher IEEE
record_format Article
series IEEE Open Journal of the Communications Society
spelling doaj.art-ec16b7479af94cd28edc50299646fb022023-10-19T23:01:42ZengIEEEIEEE Open Journal of the Communications Society2644-125X2023-01-0142410242010.1109/OJCOMS.2023.331335210243611Empowering Security and Trust in 5G and Beyond: A Deep Reinforcement Learning ApproachHajar Moudoud0https://orcid.org/0000-0003-2979-0862Soumaya Cherkaoui1https://orcid.org/0000-0001-6140-770XDepartment of Computer and Software Engineering, Polytechnique Montréal, Montreal, CanadaDepartment of Computer and Software Engineering, Polytechnique Montréal, Montreal, CanadaRecent advances in 5G and beyond have further expanded the potential of IoT applications, bringing unprecedented levels of connectivity, speed, and low latency. However, these advances come with significant security threats that can cause widespread damage. An effective approach to addressing these issues involves the integration of cutting-edge technologies like machine learning (ML), particularly deep reinforcement learning (DRL). DRL is a specialized area of ML that integrates the concepts of deep learning and reinforcement learning to create effective solutions for various tasks. In particular, DRL can facilitate the creation of intelligent security systems that can adapt to dynamic and intricate IoT applications connected to 5G and beyond networks. However, effectively implementing DRL-based intrusion detection frameworks in IoT applications connected to 5G networks poses significant challenges due to bandwidth utilization and device behavior. The data generated by IoT devices is often limited, and malicious behavior may be infrequent, making it difficult to accurately identify and train the algorithm to detect such behavior. Moreover, DRL algorithms pose a significant challenge for IoT devices constrained by limited bandwidth, as communicating large amounts of data required by DRL algorithms can cause network congestion and delay critical communications. In this article, we introduce a novel approach to improving the security of IoT applications in the 5G and beyond era by developing an intrusion detection system that employs DRL algorithms. Our approach involves a distributed Q-learning algorithm that observes the behavior of connected devices and predicts anomalous actions. Additionally, to overcome the challenges associated with bandwidth utilization and device behavior, we introduce a bandwidth allocation problem based on a reputation mechanism that allocates bandwidth to only trustworthy devices. Finally, we evaluate our proposed intrusion detection system on the selected indicators. The numerical results demonstrate that our proposed approach outperforms the referenced solutions on the selected indicators.https://ieeexplore.ieee.org/document/10243611/5G and beyondintrusion detection system (IDS)deep reinforcement learning (DRL)Internet of Things (IoT)
spellingShingle Hajar Moudoud
Soumaya Cherkaoui
Empowering Security and Trust in 5G and Beyond: A Deep Reinforcement Learning Approach
IEEE Open Journal of the Communications Society
5G and beyond
intrusion detection system (IDS)
deep reinforcement learning (DRL)
Internet of Things (IoT)
title Empowering Security and Trust in 5G and Beyond: A Deep Reinforcement Learning Approach
title_full Empowering Security and Trust in 5G and Beyond: A Deep Reinforcement Learning Approach
title_fullStr Empowering Security and Trust in 5G and Beyond: A Deep Reinforcement Learning Approach
title_full_unstemmed Empowering Security and Trust in 5G and Beyond: A Deep Reinforcement Learning Approach
title_short Empowering Security and Trust in 5G and Beyond: A Deep Reinforcement Learning Approach
title_sort empowering security and trust in 5g and beyond a deep reinforcement learning approach
topic 5G and beyond
intrusion detection system (IDS)
deep reinforcement learning (DRL)
Internet of Things (IoT)
url https://ieeexplore.ieee.org/document/10243611/
work_keys_str_mv AT hajarmoudoud empoweringsecurityandtrustin5gandbeyondadeepreinforcementlearningapproach
AT soumayacherkaoui empoweringsecurityandtrustin5gandbeyondadeepreinforcementlearningapproach