Loading…

Optimizing the Energy Efficiency in 5G Security Systems for Intrusion Detection with an Emphasis on DDOS Assaults

In response to the rising demand for new and existing use cases of energy efficiency, the telecoms sector is going through a dramatic shift toward 5G technology. High data speeds, extensive coverage provided by dense base station deployment, higher capacity, improved Quality of Service (QoS), and ex...

Full description

Saved in:
Bibliographic Details
Published in:Engineering proceedings 2023-10, Vol.56 (1), p.324
Main Authors: Umar Danjuma Maiwada, Kamaluddeen Usman Danyaro, Aliza Bt Sarlan, Aminu Aminu Muazu, Abubakar Rufai Garba
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:In response to the rising demand for new and existing use cases of energy efficiency, the telecoms sector is going through a dramatic shift toward 5G technology. High data speeds, extensive coverage provided by dense base station deployment, higher capacity, improved Quality of Service (QoS), and extremely low latency are required for 5G wireless networks. New deployment methods, networking architectures, processing technologies, and storage solutions must be created to satisfy the anticipated service requirements of 5G technologies. These developments further increase the need to secure the security of 5G systems and their functionality as well as energy efficiency problems. Indeed, 5G system security is the target of intense efforts by developers and academics in this industry. Significant security concerns for 5G networks have been identified with extensive research. Attackers can make use of vulnerabilities like traffic and the flow base by introducing malicious code and performing other nefarious deeds to take advantage of the system. On 5G networks, attack techniques such as model node map (MNmap), power depletion assaults, and Man-in-the-Middle (MiTM) assaults can be effectively used. However, this study analyses 5G technology’s current energy efficiency problems. We recommend an unusual intrusion detection system (IDS) that makes use of Traffic Volume methods. Considering this investigation, we propose an enhancing training process by including statistical analysis on Distributed Denial-of-Service (DDoS) threats, which is how prior research recommended using OMNET and NS-3 on IDS for optimization. Additionally, the methodology for incorporating the suggested intrusion detection systems within a typical 5G architecture is presented by our research using NETSIM. The paper also offers a planned system’s correction method, providing a useful implementation after completing analysis.
ISSN:2673-4591
DOI:10.3390/ASEC2023-15258