Malicious behavior detection in grant-free access mechanisms for 5G cellular networks

Document Type : Original Article

Authors

Faculty of Computer Engineering, University of Isfahan, Isfahan, Iran

Abstract

One of the services that 5G provides is URLLC. To meet the requirements of URLLC, Grant-Free access schemes have been proposed. In these schemes, the radio resources are utilized  by User Equipments without  any reservation . In these scenarios, we may see malicious behaviors such as the inclination of UEs to reduce their own latency with selfish behaviors or possibility of having misbehaving nodes that degrade the QoS of others. Therefore, detecting malicious users is important in these schemes. In this research, we seek to detect misbehaviors in K-repetition based slotted-ALOHA grant-free access scheme. In previous studies, the security of traditional MAC protocols such as ALOHA has been studied. However, the security of grant-free access based on ALOHA mechanism has not been investigated. Deep learning is considered for misbehavior detection and we employ a Long Short-Term Memory (LSTM) model to detect malicious UEs. The simulation results indicate that under stable conditions, the accuracy decreases as the number of nodes increases. Additionally, in the presence of a fixed number of nodes, as the number of malicious nodes increases, the accuracy decreases. Additionally, if malicious nodes behave properly at times and misbehave at other times, detecting such misbehavior is more difficult.

Keywords

Main Subjects


[1]  J. A. d. Peral-Rosado, R. Raulefs, J. A. López-Salcedo and G. Seco-Granados, "Survey of Cellular Mobile Radio Localization Methods: From 1G to 5G," IEEE Communications Surveys & Tutorials, vol. 20, no. 2, pp. 1124-1148, 2018.
[2]  N. H. Mahmood, R. Abreu, R. Böhnke, M. Schubert, G. Berardinelli and T. H. Jacobsen, "Uplink Grant-Free Access Solutions for URLLC services in 5G New Radio," 16th International Symposium on Wireless Communication Systems (ISWCS), pp. 607-612, 2019.
[3]  R. Abbas, T. Huang, B. ShahabM. ShirvanimoghaddamY. Li and B. Vucetic, "Grant-Free Non-Orthogonal Multiple Access: A Key Enabler for 6G-IoT," 2020.
[4] N. Ye, J. Yu, A. Wang and R. Zhang, "Help from space: grant-free massive access for satellite-based IoT in the 6G era", Digit. Commun. Netw., pp. 215-224, 2022.
[5] A. Azari, P. Popovski, G. Miao and C. Stefanovic, " Grant-Free Radio Access for Short-Packet Communications over 5G Networks", GLOBECOM 2017 - 2017 IEEE Global Communications Conference, Singapore, pp. 1-7, 2017.
[6]  H. M. Gürsu, W. Kellerer and C. Stefanović, "On Throughput Maximization of Grant-Free Access with Reliability-Latency Constraints," ICC 2019 - 2019 IEEE International Conference on Communications (ICC), Shanghai, China,, pp. 1-7, 2019.
[7]  H. YU, Z. FEI, C. CAO, M. XIAO, D. JIA and N. YE, "Analysis of irregular repetition spatially-coupled slotted ALOHA," SCIENCE CHINA Information Sciences, vol. 62, 2019.
[8]  F. Formaggio, A. Munari and F. Clazzer, "On receiver diversity for grant-free based machine type communications," Ad Hoc Networks Journal, vol. 107, 2020.
[9]  S. Moon and J.-W. Lee, "Performance Study of Repetition-Based Grant-Free Schemes in the mMTC Scenario," 2019 34th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC), JeJu, Korea (South),, pp. 1-2, 2019.
[10] B. Singh, O. Tirkkonen, Z. Li and M. A. Uusitalo, "Contention-Based Access for Ultra-Reliable Low Latency Uplink Transmissions," IEEE Wireless Communications Letters, vol. 7, pp. 182-185, 2018.
[11] P. Minero and M. Franceschetti, "Throughput of Slotted ALOHA with Encoding Rate Optimization and Multipacket Reception," IEEE INFOCOM 2009, pp. 2971-2975, 2009.
[12] A. B. Mackenzie and S. B. Wicker, "Selfish users in Aloha: A game-theoretic approach," IEEE 54th Vehicular Technology Conference, vol. 3, pp. 1354 - 1357, 2001.
[13] R. T. B. Ma, V. Misra and D. Rubenstein, "An Analysis of Generalized Slotted-Aloha Protocols," IEEE/ACM Transactions on Networking, vol. 17, pp. 936-949, 2009.
[14] C.-H. Chin, J. G. Kim and D. Lee, " Stability of Slotted Aloha with Selfish Users under Delay Constraint," KSII Transactions on Internet and Information Systems, vol. 5, pp. 542-559, 2011.
[15] P. Antoniadis, S. Fdida, C. Griffin, Y. Jin and G. Kesidis, "Distributed medium access control with conditionally altruistic users," EURASIP Journal on Wireless Communications and Networking, vol. 202 , 2013.
[16] Y. Lin, "Jamming-aware Randomized Spectrum Sharing in Cognitive Radio Communication Networks," Applied Mechanics and Materials, Vols. 513-517, pp. 834-840, 2014.
[17] F.-T. Hsu and H.-J. Su, "Throughput improvement in ALOHA networks with power capture and a cheat-proof access control," in 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Istanbul, Turkey, 2010.
[18] D. Wang, C. COMANICIU and U. TURELI, "Cooperation and Fairness for Slotted Aloha," Wireless Personal Communications, p. 13–27, 2007.
[19] Y. Jin, G. Kesidis and J. W. Jang, "A Channel Aware MAC Protocol in an ALOHA Network with Selfish Users," IEEE Journal on Selected Areas in Communications, vol. 30, pp. 128-137, 2012.
[20] W. F. Fihri, H. E. Ghazi, B. A. E. Majd and Bouanani, "A Machine Learning Approach for Backoff Manipulation Attack Detection in Cognitive Radio," IEEE Access, vol. 8, pp. 227349-227359, 2020.
[21] R. T. B. Ma, V. Misra and D. Rubenstein, "Modeling and Analysis of Generalized Slotted-Aloha MAC Protocols in Cooperative, Competitive and Adversarial Environments," IEEE International Conference on Distributed Computing Systems, pp. 62-62, 2006.
[22] S. Gyawali and Y. Qian, "Misbehavior Detection using Machine Learning in Vehicular Communication Networks," IEEE International Conference on Communications (ICC), pp. 1-6, 2019.
[23] Y. Imamverdiyev and L. Sukhostat, "Anomaly detection in network traffic using extreme learning machine," IEEE 10th International Conference on Application of Information and Communication Technologies (AICT), pp. 1-4, 2016.
[24] X. Ling, Y. Le, J. Wang and Z. Ding, "Hash Access: Trustworthy Grant-Free IoT Access Enabled by Blockchain Radio Access Networks," IEEE Network, vol. 34, pp. 54-61, 2020.
[25] N. Wang, W. Li, A. Alipour-Fanid, L. Jiao, M. Dabaghchian and K. Zeng, "Pilot Contamination Attack Detection for 5G MmWave Grant-Free IoT Networks," IEEE Transactions on Information Forensics and Security, vol. 16, pp. 658-670, 2021.
[26] G. Berardinelli, N. H. Mahmood, R. Abreu, T. Jacobsen, K. Pedersen, I. Z. Kovács and P. Mogensen, "Reliability Analysis of Uplink Grant-Free Transmission Over Shared Resources," IEEE Access, vol. 6, pp. 23602-23611, 2018.
[27] J. Zhang, L. Lu, Y. Sun, Y. Chen, J. Liang, J. Liu, H. Yang, S. Xing, Y. Wu, J. Ma, I. B. F. Murias and F. J. L. Hernando, "PoC of SCMA-Based Uplink Grant-Free Transmission in UCNC for 5G," IEEE Journal on Selected Areas in Communications, vol. 35, no. 6, pp. 1353-1362, 2017.
[28] J. D. P. -N. C. a. Y. S. H. L. Deng, "On the Asymptotic Performance of Delay-Constrained Slotted ALOHA," in 27th International Conference on Computer Communication and Networks (ICCCN), Hangzhou, China, 2018.
[29] M.VASOUJOUYBARI, E. Ataie, M. Bastam, "An MLP-based Deep Learning Approach for Detecting DDoS Attacks", Journal of Electrical Engineering of Tabriz University, vol. 52, no. 3, pp. 195-204, 1401.
[30] M. Zendedel, J. Hamidzadeh, "Improving intrusion detection in the Internet of Things network using deep learning and chaotic shrimp optimization algorithm", Journal of Electrical Engineering, University of Tabriz, vol. 53, no. 2, pp. 127-138, 2023.