Compound Transmission Security for Mobile Cloud Computing Using Spread Spectrum Technique

Authors

  • Vikram Patalbansi Research Scholar, Department of Computer Engineering, Pacific Academy of Higher Education and Research University (PAHER), Udaipur, India
  • Jayshree Jain Professor, Department of Computer Engineering, Pacific Academic Higher Education and Research University, Udaipur, India
  • G. Prasnna Laxmi Professor, School of Computer Science and Engineering, Sandip University, Nashik, Maharashtra India

DOI:

https://doi.org/10.37591/jomccmn.v10i3.733

Keywords:

5th generation network, mobile network security, Spread Spectrum technique, FHSS security algorithm, packet cryptography, RC5

Abstract

By accessing data stored in remote data centres, "mobile cloud computing" provides users with IT services tailored to their specific needs. It also provides the infrastructure to support hosting for pervasive applications in the corporate, scientific, and consumer spheres. The cloud or data centre server cannot automatically lease the appropriate amount of services based on the needs of the users. So, Mobile Cloud Computing (MCC) consists of three sub-modules viz. Mobile Computing, Wireless Communication Networks, and Cloud Computing. While keeping least costs to a minimum and offloading to cloud infrastructures, the following are the basic ideas that will form the basis of the proposed study on the secure scheduling of resources in mobile cloud computing. In our research study, we are using 5G Cellular Technology as a mode of wireless communication. When offloading and retrieving data from a cloud data centre, the 5th generation of mobile communications is expected to spur innovation in vertical sectors. These verticals generate many use cases with different requirements that future 5G networks must efficiently handle. Network slicing may be a logical way to support a large range of vertical-specific services on single network architecture. This study introduces network slicing for 5G systems. The key elements that enable network slicing are summarised first. Next, we introduce the ONF's SDN architecture and demonstrate its slicing tools. Although such a design enables network slicing, it lacks key functionalities that NFV can provide. Thus, we examine ETSI's SDN-NFV architecture proposal. We also show an SDN-NFV scenario for network slice realization. FHSS systems safeguard wireless communication from jamming and unwanted signal reception. The jammer or unwanted receiver must not know the spreading code to achieve such themes. Unencrypted M-sequences cannot spread code securely. Hidden frequency hopping, an encryption mechanism applied to spreading codes, is proposed to improve FHSS security. All spread spectrum data transmission systems can use the proposed encryption security algorithm, which is dependable. FHSS's multi-user detection makes multiuser interference important to study. Thus, optimum pair "key-input" selection is provided to reduce interference below the specified constant threshold. It is essential to have architecture in place that can automatically handle resource allocation policies and a scheduling algorithm. Next, we will talk about some approaches to security algorithms during wireless communication mode offloading and retrieving data from the cloud server. Finally, we summarise the open research issues to encourage further research.

References

Bhardwaj A. 5G for military communications. Procedia Comput Sci. 2020 Jan 1; 171: 2665–74.

Haseeb Awan. (2023 Apr 20). Everything You Need to Know About 5G Security. [Online]. Efani. Available from: https://www.efani.com/blog/5g-security

Salahdine F, Han T, Zhang N. Security in 5G and beyond recent advances and future challenges. Secur Priv. 2023 Jan; 6(1): e271.

Alliance NG. 5G white paper. Next generation mobile networks, white paper. 2015 Feb 17.

Stolic M, Connary JA, Yan W, Mukherjee A, Salaheldin M, Piasecki R. 5G Automation Architecture. CISCO; 2020. pp. 1-29.

Sahni I, Kaur A. A Systematic Literature Review on 5G Security. arXiv preprint arXiv:2212.03299. 2022 Dec 6.

devmaster. (2019). 5G Architecture and Security Technical Report - 04Dec18. [Online]. Scribd. Available from: https://www.scribd.com/document/424593915/5G-Architecture-and-Security-Technical-Report-04Dec18

Ordonez-Lucena J, Ameigeiras P, Lopez D, Ramos-Munoz JJ, Lorca J, Folgueira J. Network slicing for 5G with SDN/NFV: Concepts, architectures, and challenges. IEEE Commun Mag. 2017 May 12; 55(5): 80–7.

Zhan W, Tao Z. Research on 5G mobile communication network security technology. In J Phys: Conf Ser. 2020 Sep 1; 1634(1): 012055. IOP Publishing.

Ylianttila M, Kantola R, Gurtov A, Mucchi L, Oppermann I, Yan Z, Nguyen TH, Liu F, Hewa T, Liyanage M, Ijaz A. 6G white paper: Research challenges for trust, security and privacy. arXiv preprint arXiv:2004.11665. 2020 Apr 24.

Fang D, Qian Y, Hu RQ. Security for 5G mobile wireless networks. IEEE Access. 2017 Dec 4; 6: 4850–74.

Ericsson. (2023). A guide to 5G network security insight report. [Online]. Available from: https://www.ericsson.com/en/security/a-guide-to-5g-network-security

Craiger JP. 802.11, 802.1 x, and Wireless Security. SANS Institute InfoSec Reading Room. 2002 Jun 23.

Li Y, Guo W, Meng X, Xia W. Charging wireless sensor network security technology based on encryption algorithms and dynamic model. Int J Distrib Sens Netw. 2020 Feb; 16(3): 1550147720901999.

Liu F, Jiang Y. Knowledge-Enhanced Compressed Measurements for Detection of Frequency-Hopping Spread Spectrum Signals Based on Task-Specific Information and Deep Neural Networks. Entropy. 2022 Dec 21; 25(1): 11.

Ghanem S. Decoding and measurement of frequency‐hopping spread spectrum signals using an adaptive algorithm‐based compressive sensing. Int J Commun Syst. 2021 Feb; 34(3): e4675.

Ristić VB, Todorović BM, Stojanović NM. Frequency hopping spread spectrum: History, principles and applications. Vojnotehnički glasnik/Military Technical Courier. 2022 Oct 10; 70(4): 856–76.

Ebrahimzadeh A, Falahati A. Frequency hopping spread spectrum security improvement with encrypted spreading codes in a partial band noise jamming environment. J Inf Secur. 2013 Jan 30; 4(1): 1–6.

Wolfram. (2023). Diffie-Hellman Protocol. [Online]. Wolfram Research, Inc. Available from: https://mathworld.wolfram.com/Diffie-HellmanProtocol.html

Wang C, Zhang Y, Wei K, Yu Q, Fan F. Optimal Constructions of Low-Hit-Zone Frequency-Hopping Sequence Sets via Cyclotomy. IEEE Access. 2023 Feb 14; 11: 24128–36.

Fang D, Qian Y. 5G wireless security and privacy: Architecture and flexible mechanisms. IEEE Veh Technol Mag. 2020 Mar 30; 15(2): 58–64.

Costa DG, Figuerêdo S, Oliveira G. Cryptography in wireless multimedia sensor networks: A survey and research directions. Cryptography. 2017 Jan 5; 1(1): 4.

Wu K, Zhang JA, Huang X, Guo YJ. Integrating secure communications into frequency hopping MIMO radar with improved data rate. IEEE Trans Wirel Commun. 2022 Jan 12; 21(7): 5392–405.

Arfaoui G, Bisson P, Blom R, Borgaonkar R, Englund H, Félix E, Klaedtke F, Nakarmi PK, Näslund M, O’Hanlon P, Papay J. A security architecture for 5G networks. IEEE Access. 2018 Apr 17; 6: 22466–79.

Ji X, Huang K, Jin L, Tang H, Liu C, Zhong Z, You W, Xu X, Zhao H, Wu J, Yi M. Overview of 5G security technology. Sci China Inf Sci. 2018 Aug; 61(8): 081301.

Campanile L, Gribaudo M, Iacono M, Marulli F, Mastroianni M. Computer network simulation with ns-3: A systematic literature review. Electronics. 2020 Feb 5; 9(2): 272.

Solaija MS, Salman H, Arslan H. Towards a unified framework for physical layer security in 5G and beyond networks. IEEE Open J Veh Technol. 2022 Jun 15; 3: 321–43.

Han K, Ma M, Li X, Feng Z, Hao J. An efficient handover authentication mechanism for 5G wireless network. In 2019 IEEE Wireless Communications and Networking Conference (WCNC). 2019 Apr 15; 1–8.

Khan R, Kumar P, Jayakody DN, Liyanage M. A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions. IEEE Commun Surv Tutor. 2019 Aug 8; 22(1): 196–248.

Lei Z, Yang P, Zheng L. Detection and frequency estimation of frequency hopping spread spectrum signals based on channelized modulated wideband converters. Electronics. 2018 Aug 30; 7(9): 170.

Published

2024-01-11