The coming generation in mobile networks is the fifth generation (5G), which appears to be the promoter of the upcoming digital world. 5G is defined by a single piece of cellular access technology or a combination of advanced access technologies. Rather, 5G is a true network assembler that provides consistent support for a slew of novel network topologies. Prior generations provide as a suitable starting point and give support for the security architecture for 5G security. Through authentication and cryptography techniques, many works have tackled the security issues in 3G and 4G networks in an effective manner. However, security of 5G networks while data transmission was not improved. The IoT aware Quadratic Discriminant Analysis (QDA) Node Authentication Method is proposed in order to achieve safe data communication in the 5G network. The suggested method performs feature selection using Quadratic Discriminant Analysis to identify relevant properties of mobile nodes such as trust value, residual energy level, and node cooperativeness. Simulation can be used to test the data packets, the number of mobile nodes in a security level, the computation overhead, and the authentication accuracy. The observed output clearly demonstrates that the Quadratic Discriminant Analysis Method significantly enhances the authentication accuracy of each node and the security level with less overhead than state-of-the-art-methods.
Cybersecurity is the practice of protecting our systems, networks, and programmes from cyber attackers and it aims to access, alter, or destroy sensitive information that affects normal processes. Cybersecurity specialists are constantly searching for new, cutting-edge strategies, where the various methods that cybercriminals can use to attack. According to the Cyber Security & Infrastructure Security Agency (CISA), “Cyber security is the art of protecting networks, devices and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity and availability of information”. Cybersecurity protects against theft and loss of all forms of data, including sensitive data, protected health information (PHI), personally identifiable information (PII), intellectual property, personal information, data, and systems used by governments and businesses hence it is essential. One of the most important aspects of cybersecurity is End-user Protection. All software and hardware used by end users must be scanned at regular intervals as there can be malicious threats. The attackers do not fall behind as a result of the advancement of new cyber security systems. They use improved hacking methods and target the weaknesses of numerous companies worldwide. Aside from other things, many people are still very concerned about cyber security. At present cyber security faces, many challenges and this study focuses on user security for the most recent technologies that encountered difficulties. Keywords— Cyber Security, Cyber Attacks, Defects, Technologies, Hacking.
The 5G mobile wireless network systems faces a lot of security issues due to the opening of network and its insecurity. The insecure network prone to various attacks and it disrupts secure data communications between legitimate users. Many works have addressed the security problems in 3G and 4G networks in efficient way through authentication and cryptographic techniques. But, the security in 5G networks during data communication was not improved. Subtractive Gradient Boost Clustered Node Authentication (SGBCNA) Method is introduced to perform secure data communication. The subtractive gradient boost clustering technique is applied to authenticate the mobile node as normal nodes and malicious nodes based on the selected features. The designed ensemble clustering model combines the weak learners to make final strong clustering results with minimum loss. Finally, the malicious nodes are eliminated and normal mobile nodes are taken for performing the secured communication in 5G networks. Simulation is carried out on factors such as authentication accuracy, computation overhead and security level with respect to a number of mobile nodes and data packets. The observed outcomes clearly illustrate that the SGBCNA Method efficiently improves node authentication accuracy, security level with minimum overhead than the state-of-the-art-methods.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.