Ahmad, Israr * and Yau, Alvin Kok-Lim * and Ling, Mee Hong * and Keoh, Sye Loong (2020) Trust and reputation management for securing collaboration in 5g access networks: The road ahead. IEEE Access, 8. pp. 62542-62560. ISSN 2169-3536
|
Text
Ling Mee Hong_Trust and reputation management for securing.pdf - Published Version Available under License Creative Commons Attribution. Download (13MB) | Preview |
Abstract
Trust represents the belief or perception of an entity, such as a mobile device or a node, in the extent to which future actions and reactions are appropriate in a collaborative relationship. Reputation represents the network-wide belief or perception of the trustworthiness of an entity. Each entity computes and assigns a trust or reputation value, which increases and decreases with the appropriateness of actions and reactions, to another entity in order to ensure a healthy collaborative relationship. Trust and reputation management (TRM) has been investigated to improve the security of traditional networks, particularly the access networks. In 5G, the access networks are multi-hop networks formed by entities which may not be trustable, and so such networks are prone to attacks, such as Sybil and crude attacks. TRM addresses such attacks to enhance the overall network performance, including reliability, scalability, and stability. Nevertheless, the investigation of TRM in 5G, which is the next-generation wireless networks, is still at its infancy. TRM must cater for the characteristics of 5G. Firstly, ultra-densification due to the exponential growth of mobile users and data traffic. Secondly, high heterogeneity due to the different characteristics of mobile users, such as different transmission characteristics (e.g., different transmission power) and different user equipment (e.g., laptops and smartphones). Thirdly, high variability due to the dynamicity of the entities’ behaviors and operating environment. TRM must also cater for the core features of 5G (e.g., millimeter wave transmission, and device-to-device communication) and the core technologies of 5G (e.g., massive MIMO and beamforming, and network virtualization). In this paper, a review of TRM schemes in 5G and traditional networks, which can be leveraged to 5G, is presented. We also provide an insight on some of the important open issues and vulnerabilities in 5G networks that can be resolved using a TRM framework.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | next-generation networks; 5G; cooperation; trust and reputation management; artificial intelligence; |
Subjects: | H Social Sciences > HD Industries. Land use. Labor T Technology > TK Electrical engineering. Electronics Nuclear engineering |
Divisions: | Others > Non Sunway Academics Sunway University > School of Engineering and Technology [formerly School of Science and Technology until 2020] > Dept. Computing and Information Systems |
Depositing User: | Ms Yong Yee Chan |
Related URLs: | |
Date Deposited: | 22 Jul 2024 07:22 |
Last Modified: | 22 Jul 2024 07:22 |
URI: | http://eprints.sunway.edu.my/id/eprint/2831 |
Actions (login required)
View Item |