Trust and Reputation Management for Securing Collaboration in 5G Access Networks: The Road Ahead

Trust represents the belief or perception of an entity, such as a mobile device or a node, in the extent to which future actions and reactions are appropriate in a collaborative relationship. Reputation represents the network-wide belief or perception of the trustworthiness of an entity. Each entity computes and assigns a trust or reputation value, which increases and decreases with the appropriateness of actions and reactions, to another entity in order to ensure a healthy collaborative relationship. Trust and reputation management (TRM) has been investigated to improve the security of traditional networks, particularly the access networks. In 5G, the access networks are multi-hop networks formed by entities which may not be trustable, and so such networks are prone to attacks, such as Sybil and crude attacks. TRM addresses such attacks to enhance the overall network performance, including reliability, scalability, and stability. Nevertheless, the investigation of TRM in 5G, which is the next-generation wireless networks, is still at its infancy. TRM must cater for the characteristics of 5G. Firstly, ultra-densification due to the exponential growth of mobile users and data traffic. Secondly, high heterogeneity due to the different characteristics of mobile users, such as different transmission characteristics (e.g., different transmission power) and different user equipment (e.g., laptops and smartphones). Thirdly, high variability due to the dynamicity of the entities’ behaviors and operating environment. TRM must also cater for the core features of 5G (e.g., millimeter wave transmission, and device-to-device communication) and the core technologies of 5G (e.g., massive MIMO and beamforming, and network virtualization). In this paper, a review of TRM schemes in 5G and traditional networks, which can be leveraged to 5G, is presented. We also provide an insight on some of the important open issues and vulnerabilities in 5G networks that can be resolved using a TRM framework.

[1]  Rose Qingyang Hu,et al.  Security for 5G Mobile Wireless Networks , 2018, IEEE Access.

[2]  Chunhua Wang,et al.  Machine Learning and Deep Learning Methods for Cybersecurity , 2018, IEEE Access.

[3]  Mahesh K. Marina,et al.  Network Slicing in 5G: Survey and Challenges , 2017, IEEE Communications Magazine.

[4]  Octavia A. Dobre,et al.  Cooperation in 5G HetNets: Advanced Spectrum Access and D2D Assisted Communications , 2017, IEEE Wireless Communications.

[5]  Tommy Svensson,et al.  The role of small cells, coordinated multipoint, and massive MIMO in 5G , 2014, IEEE Communications Magazine.

[6]  Su Yao,et al.  Stochastic Cost Minimization Mechanism Based on Identifier Network for IoT Security , 2020, IEEE Internet of Things Journal.

[7]  Sufian Hameed,et al.  Isolating Malicious Controller(s) In Distributed Software-Defined Networks with Centralized Reputation Management , 2018, International Journal of Future Generation Communication and Networking.

[8]  Rong Yu,et al.  Distributed Reputation Management for Secure and Efficient Vehicular Edge Computing and Networks , 2017, IEEE Access.

[9]  Theodore S. Rappaport,et al.  Millimeter Wave Mobile Communications for 5G Cellular: It Will Work! , 2013, IEEE Access.

[10]  F. Richard Yu,et al.  Secure Social Networks in 5G Systems with Mobile Edge Computing, Caching, and Device-to-Device Communications , 2018, IEEE Wireless Communications.

[11]  Rashid Ali,et al.  LWA in 5G: State-of-the-Art Architecture, Opportunities, and Research Challenges , 2018, IEEE Communications Magazine.

[12]  Athanasios V. Vasilakos,et al.  Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks , 2018, IEEE Transactions on Network and Service Management.

[13]  Rodrigo Roman,et al.  Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..

[14]  Rüdiger Kapitza,et al.  EndBox: Scalable Middlebox Functions Using Client-Side Trusted Execution , 2018, 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[15]  P. Latha,et al.  Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks , 2017, Wirel. Pers. Commun..

[16]  Xiupu Zhang,et al.  High Capacity Mode Division Multiplexing Based MIMO Enabled All-Optical Analog Millimeter-Wave Over Fiber Fronthaul Architecture for 5G and Beyond , 2019, IEEE Access.

[17]  Romano Fantacci,et al.  Cognitive Spectrum Sharing: An Enabling Wireless Communication Technology for a Wide Use of Smart Systems , 2016, Future Internet.

[18]  Paul D. Mitchell,et al.  Reputation routing to avoid sybil attacks in wireless sensor networks using distributed beamforming , 2011, 2011 8th International Symposium on Wireless Communication Systems.

[19]  Victor C. M. Leung,et al.  Trust management for secure cognitive radio vehicular ad hoc networks , 2019, Ad Hoc Networks.

[20]  Amr Tolba,et al.  Trust-based neighbor selection using activation function for secure routing in wireless sensor networks , 2018, Journal of Ambient Intelligence and Humanized Computing.

[21]  Mee Hong Ling,et al.  Reinforcement learning-based trust and reputation model for cluster head selection in cognitive radio networks , 2014, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014).

[22]  Victor C. M. Leung,et al.  Blockchain-Based Decentralized Trust Management in Vehicular Networks , 2019, IEEE Internet of Things Journal.

[23]  Zibin Zheng,et al.  An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).

[24]  Dong In Kim,et al.  Incentivizing Consensus Propagation in Proof-of-Stake Based Consortium Blockchain Networks , 2019, IEEE Wireless Communications Letters.

[25]  Victor C. M. Leung,et al.  Network Slicing Based 5G and Future Mobile Networks: Mobility, Resource Management, and Challenges , 2017, IEEE Communications Magazine.

[26]  AKHIL GUPTA,et al.  A Survey of 5G Network: Architecture and Emerging Technologies , 2015, IEEE Access.

[27]  Tanesh Kumar,et al.  Overview of 5G Security Challenges and Solutions , 2018, IEEE Communications Standards Magazine.

[28]  Robert W. Heath,et al.  Secure Communications in Millimeter Wave Ad Hoc Networks , 2016, IEEE Transactions on Wireless Communications.

[29]  Mohsen Guizani,et al.  Entropy-based Fuzzy AHP Model for Trustworthy Service Provider Selection in Internet of Things , 2018, 2018 IEEE 43rd Conference on Local Computer Networks (LCN).

[30]  Shahid Mumtaz,et al.  Millimeter-Wave Massive MIMO Communication for Future Wireless Systems: A Survey , 2018, IEEE Communications Surveys & Tutorials.

[31]  Jie Zhang,et al.  MASA: Multi-Agent Subjectivity Alignment for Trustworthy Internet of Things , 2018, 2018 21st International Conference on Information Fusion (FUSION).

[32]  Godwin G. Udo Using analytic hierarchy process to analyze the information technology outsourcing decision , 2000, Ind. Manag. Data Syst..

[33]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[34]  Qiang Ye,et al.  Exploiting Secure and Energy-Efficient Collaborative Spectrum Sensing for Cognitive Radio Sensor Networks , 2016, IEEE Transactions on Wireless Communications.

[35]  Aamir Saeed Malik,et al.  Trust management system in wireless sensor networks: design considerations and research challenges , 2015, Trans. Emerg. Telecommun. Technol..

[36]  Bin Han,et al.  A Comprehensive Survey of RAN Architectures Toward 5G Mobile Communication System , 2019, IEEE Access.

[37]  Shikhamoni Nath,et al.  Can Clustering be Used to Detect Intrusion During Spectrum Sensing in Cognitive Radio Networks? , 2018, IEEE Systems Journal.

[38]  Abhimanyu Gosain,et al.  Mobile core network redimensioning for efficient resource utilization , 2017, 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[39]  Ziyan Jia,et al.  An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things , 2017, Wirel. Pers. Commun..

[40]  Leïla Azouz Saïdane,et al.  Trust management in cognitive radio networks: A survey , 2018, Int. J. Netw. Manag..

[41]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[42]  Antonio Manzalini,et al.  Horizon 2020 and Beyond: On the 5G Operating System for a True Digital Society , 2015, IEEE Vehicular Technology Magazine.

[43]  Aduwati Sali,et al.  Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS) , 2017, Comput. Commun..

[44]  Ekram Hossain,et al.  Multi-Tier Drone Architecture for 5G/B5G Cellular Networks: Challenges, Trends, and Prospects , 2017, IEEE Communications Magazine.

[45]  Navrati Saxena,et al.  Next Generation 5G Wireless Networks: A Comprehensive Survey , 2016, IEEE Communications Surveys & Tutorials.

[46]  Wolfgang Kellerer,et al.  CoMP clustering and backhaul limitations in cooperative cellular mobile access networks , 2012, Pervasive Mob. Comput..

[47]  Nadeem Javaid,et al.  Clustering Depth Based Routing for Underwater Wireless Sensor Networks , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).

[48]  Athanasios V. Vasilakos,et al.  A security and trust framework for virtualized networks and software-defined networking , 2016, Secur. Commun. Networks.

[49]  Athanasios V. Vasilakos,et al.  Security in Software-Defined Networking: Threats and Countermeasures , 2016, Mobile Networks and Applications.

[50]  Rem W. Collier,et al.  A Survey of Clustering Techniques in WSNs and Consideration of the Challenges of Applying Such to 5G IoT Scenarios , 2017, IEEE Internet of Things Journal.

[51]  Hammad Afzal,et al.  SS7 Vulnerabilities—A Survey and Implementation of Machine Learning vs Rule Based Filtering for Detection of SS7 Network Attacks , 2020, IEEE Communications Surveys & Tutorials.

[52]  Sherali Zeadally,et al.  Comparative study of trust and reputation systems for wireless sensor networks , 2013, Secur. Commun. Networks.

[53]  Qimei Cui,et al.  Evolution of Limited-Feedback CoMP Systems from 4G to 5G: CoMP Features and Limited-Feedback Approaches , 2014, IEEE Vehicular Technology Magazine.

[54]  Matthew R. McKay,et al.  Enhancing Secrecy With Multi-Antenna Transmission in Wireless Ad Hoc Networks , 2013, IEEE Transactions on Information Forensics and Security.

[55]  Qin Li,et al.  A Reputation-Based Announcement Scheme for VANETs , 2012, IEEE Transactions on Vehicular Technology.

[56]  Chunyan Miao,et al.  A Survey of Trust and Reputation Management Systems in Wireless Communications , 2010, Proceedings of the IEEE.

[57]  Lujain Dabouba,et al.  Millimeter Wave Mobile Communication for 5 G Cellular , 2017 .

[58]  Sungchang Lee,et al.  Implicit User Trust Modeling Based on User Attributes and Behavior in Online Social Networks , 2019, IEEE Access.

[59]  Ming Xiao,et al.  Performance Analysis of Interference and Eavesdropping Immunity in Narrow Beam mmWave Networks , 2018, IEEE Access.

[60]  Ji Wang,et al.  Trust-based cooperative spectrum sensing against SSDF attacks in distributed cognitive radio networks , 2016, 2016 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR 2016).