chapter2
chapter2
LITERATURE REVIEW
2.0 Introduction
In this chapter, we explore past technologies used to protect networks traditionally. These are
methods that were implemented in order to protect the likes of LTE, 3G and the previous
generations. This chapter examines the evolution of mobile network security from earlier
generations to 6G.
The first generation, known as analogue FM cellular systems, debuted in 1981. This is often
referred to as 1G, lacked security as it was built with connectivity primarily in mind. 1g lacked
security by all definitions. It was susceptible to eavesdropping via Man-In-The-Middle attacks
[2]. The second generation network brought about encryption [3]. The security relied on a
single shared secret, known as the Ki in 3GPP standards, which must be securely stored both
within the network operator's infrastructure and in the subscriber's device. The Ki is a 16-octet
value that must remain confidential, accessible only to those directly involved in the
authentication process. Within the network, all subscriber IMSIs and Ki values are stored in a
network component called the Authentication Centre (AuC), typically located alongside the
HLR. The HLR/AuC is housed within the network operator's facilities, making unauthorized
physical access challenging. Additionally, Ki values are usually encrypted in the AuC, using
encryption keys that are not even available to authorized personnel, making it extremely
difficult for attackers to obtain the clear text of these secret keys.
On the subscriber side, the challenge was to securely store sensitive information, particularly
the Ki, while ensuring that no individual, including the subscriber, could access this
information. The solution needed to fulfil several requirements:
Store data in non-volatile memory to ensure it persists even when power is off.
Execute the authentication algorithm on the same platform as the Ki, so the Ki never
leaves the device.
Provide basic computing capabilities for running authentication algorithms.
Protect access to key functions with a subscriber passcode (PIN).
Restrict certain information to the operator using additional passcodes.
Be small enough to fit into handsets.
Consume minimal power.
The outcome of meeting these requirements was the creation of the Universal Integrated Circuit
Card (UICC), commonly known as the SIM card, a remarkable technological achievement that
has become integral to the success of mobile phones. [4]
The third-generation network saw the advent of security techniques like stronger encryption
algorithms, enhanced mutual authentication protocols between devices and networks, and
improved integrity protection. These innovations were designed to safeguard user data, prevent
unauthorized access, and ensure the confidentiality of communications. Additionally, the
introduction of more secure key management processes and the implementation of sophisticated
encryption methods, such as the use of KASUMI and SNOW 3G ciphers [5], significantly
bolstered the overall security of mobile communications. ”kasumi” is a block cipher used
primarily in the encryption and integrity protection of mobile communications, particularly
within 3G networks. It is an optimized and slightly modified version of the MISTY1 algorithm,
tailored to meet the performance and security requirements of mobile networks. These
measures were critical in addressing the evolving threats of the digital age, ensuring that user
data remained protected as mobile networks became more ubiquitous and integral to daily life.
After a decade in 4G, more perimeter-based approaches to network security were implemented
to address the growing complexity and diversity of network traffic. These approaches focused
on securing the boundaries of the network, such as firewalls and intrusion detection systems, to
prevent unauthorized access and protect against external threats. As mobile networks became
more interconnected and reliant on IP-based technologies, the need for robust perimeter
defences grew. This led to the deployment of advanced security gateways, deep packet
inspection [6], and network segmentation techniques to monitor and control traffic at the
network's edge. However, while perimeter security played a crucial role in safeguarding 4G
networks, it also highlighted the limitations of traditional security models in the face of
increasingly sophisticated cyber threats and the rise of mobile devices, leading to a shift toward
more holistic, zero-trust security models in later generations [7].
When the fifth generation of GSM networks (5G) was implemented in South Korea first, it not
only showcased the country’s technological prowess but also highlighted the critical importance
of advanced security measures. As 5G networks introduced faster speeds, lower latency, and the
capability to connect billions of devices, the security landscape became more complex. South
Korea’s early adoption required robust encryption protocols, sophisticated network slicing
techniques, and enhanced authentication mechanisms to safeguard against new vulnerabilities
introduced by the expanded attack surface [8]. This focus on security set a precedent for the
global rollout of 5G [9], underscoring the need for stronger, more adaptive security frameworks
to protect against the evolving threats in an increasingly interconnected digital world.
6th generation networks, offering enhanced capabilities such as terahertz (THz)
communication, holographic communication, and advanced AI-driven network management,
are often characterized with larger volumes of traffic as they expect to connect our world even
more[10]. The majority of this traffic will be the surge of IoT devices [11]. With this much
increased connectivity, security enforcement becomes ever more important [12]. A number of
approaches have been investigated on the implementation of low latency, least resource
demanding and highly efficient security practices as the edge devices in a 6g network will have
little compute resources and at the same time play very crucial roles the likes of autonomous
driving, smart cities, remote surgery among other crucial IoT applications[13].
Evidently the best features of the past generational networks has been built around encryption
but as encryption algorithms mature, their implementation may become more difficult
especially in systems with inadequate computational resources. Also, as development of
quantum computing advances, encryption as a concept may break down [14]. Recently, AI
algorithms have the ability to expertly detect network flaws, which would be useful in 6G
networks as Zero Trust Architectures may end up being implored.
Fuzzy logic is a versatile and adaptable approach to trust assessment, providing a way to
quantify uncertainty in a variety of contexts. Fuzzy logic, which is based on human decision-
making processes, introduces a truth concept that takes into account inaccuracies and
uncertainties, increasing reasoning flexibility.
The components of a fuzzy logic system include:
Fuzzification: In this first step, input and output variables, such as reliability and behaviour, are
defined using linguistic terms. This linguistic approach recognises the inherent ambiguity and
imprecision in trust-related data.
Rule Base Construction: Creating a rule base entails developing linguistic rules that connect
input variables to output and express relationships between trust factors (for example, if
reliability is high and behaviour is consistent, trust is high).
Fuzzy Inference: The system computes a degree of trust based on inputs using these rules and
fuzzy logic operators (e.g., AND, OR), taking into account the linguistic terms and associated
rules. This process allows for more nuanced and flexible evaluations.
Defuzzification: Converting the fuzzy output to a discrete value (e.g., low, medium, high trust)
makes practical use or decision making easier, ensuring that the final trust level is
understandable and actionable.
The fuzzy logic system effectively manages the inherent uncertainty and imprecision in trust
evaluation, providing an adaptive and nuanced approach to determining trust levels, especially
in complex systems such as 6G networks. The node trust in the fuzzy logic model can be
evaluated using a variety of input parameters.
In previous sections, we discussed the benefits and drawbacks of various methods. We now
apply the same analysis to fuzzy logic algorithms. Fuzzy logic algorithms have distinct
advantages and disadvantages inherent in the method. However, these characteristics can vary
significantly when fuzzy logic is combined with other methods.
Advantages of Fuzzy Logic: The fuzzy logic methodology has several advantages for
evaluating trust in 6G networks. It enables trust evaluation based on experience, plausibility,
and location accuracy, all of which are critical components in trust assessment. Furthermore,
fuzzy logic systems have found widespread use in a variety of fields, including web services,
cloud computing, and social networks, demonstrating their adaptability and utility. Furthermore,
fuzzy logic facilitates the development of classification criteria for assessing trust, resulting in a
more structured approach to trust evaluation and improved detection capabilities.
Disadvantages of Fuzzy Logic: Despite its utility in other network applications, using fuzzy
logic to assess trust in 6G networks has some drawbacks. It is difficult to precisely characterise
and interpret language variables and fuzzy rules, which may result in uncertainty and
imprecision in trust assessment. Furthermore, fuzzy logic may increase computing overhead
and complexity, affecting the real-time decision-making capabilities required for 6G networks.
Addressing these challenges and ensuring reliable and robust trust management in 6G networks
requires careful consideration, especially when fuzzy algorithms are incorporated into IoT trust
management techniques.
Investigating the Use of Fuzzy Logic Algorithms in Trust Assessment across Various Network
Environments:
1)Cloud Network
Kesarwani et al [15] proposed fuzzy logic for calculating trust values between cloud users and
service providers. The study recommends two trust-based access control models: user-based
and cloud service provider-based. These models identify trusted resources for users and grant
access based on their trust levels. The models combine elasticity and performance evaluations
to determine trust values, which control access permissions to cloud resources. The paper also
introduces subjective trust models based on user and service provider behaviour, which
improves the accuracy and reliability of trust assessments in cloud computing settings. The
results show that the proposed trust-based access control models improve security, resource
allocation, and access control in cloud computing environments.
Rahman et al [16] proposed a fuzzy-based trust evaluation framework for fog computing. Fuzzy
logic is used to assess trust based on a variety of factors, including performance, reliability,
security, price, and reputation. The framework selects fogs using a fuzzy-based filtering
algorithm that considers trust evaluation criteria such as availability, quality of service, security,
user feedback, and cost. The article emphasises the importance of continuous improvement in
trust evaluation mechanisms.
Soleymani et al [17] proposed a new trust management framework for multi-cloud
environments that incorporates fuzzy logic principles for trust calculation as well as subjective
and objective trust evaluations. The model handles ambiguity in trust-related parameters and
feedback data, enabling a more adaptable approach. The study's simulation validation confirms
the effectiveness of the components, emphasising the importance of feedback evaluation and
trust negotiation in improving trust values and security in multi-cloud environments.
2)IoT
Bernabe et al [18] proposed fuzzy logic algorithms for estimating trust values for IoT devices
across multiple dimensions. The system includes a fuzzy control system (FCS) that analyses
analogue input values and generates trust values. This model improves security by taking into
account security evidence derived from transaction data. The system employs fuzzy logic to
deal with the ambiguity and uncertainty of information in IoT environments, as well as a
lightweight and adaptable access control mechanism based on Distributed Capability-Based
Access Control (DCBAC). The system's performance is evaluated based on trust expectations,
reward requests, fuzzy trust quantification, authentication, token validation, and full trust
processing.
Hashemi [19] proposed the FDTM-IoT, a dynamic, comprehensive, and hierarchical trust model
aimed at improving routing security in IoT networks. It assesses trustworthiness across multiple
dimensions, such as service quality, peer-to-peer communication quality, and contextual
information. The model is intended to be versatile and adaptable to changing environmental
conditions. Fuzzy logic is used to handle uncertainty, which strengthens trust decisions. The
model is integrated into the Routing Protocol for Low Power and Lossy Networks (RPL)
protocol, which improves security and network performance. Performance evaluations
demonstrate the model's effectiveness in improving routing security in dynamic IoT
environments.
Yu et al [20] introduce a fuzzy attribute trust algorithm as a supplementary approach to address
trust evaluation challenges in Artificial Intelligence of Things (AIoT) networks. The fuzzy
algorithm addresses the lack of interaction records and uncertainty in AIoT environments,
allowing for a more accurate evaluation of smart terminals’ trust values. It also mitigates
mismatches between trust values and the real-time state of smart terminals. The fuzzy algorithm
is scalable and adaptable, allowing for the addition of new fuzzy factors to accommodate
different application scenarios. The model’s performance is competitive with existing
approaches, demonstrating its effectiveness in addressing trust evaluation challenges in AIoT
networks. The model’s performance, adaptability, and scalability contribute to its potential for
enhancing the trustworthiness of smart terminals in AIoT environments
3)Mobile Network
Ma et al [21] proposed a fuzzy comprehensive evaluation approach for measuring trust in
dynamic trust management scenarios. The authors suggested a trust quantification technique
that takes into account fuzziness and uncertainty in trust connections, making it more resilient
and applicable in dynamic and open network contexts. The algorithm's usefulness is proved by
simulation results, which show alignment with entity behaviour. The fuzzy comprehensive
evaluation method helps with trust management by giving a systematic and effective
methodology to assessing trust values, making it useful in decision-making processes across
industries and organisations. The research emphasises the need of taking fuzziness and
ambiguity into account when quantifying trust, as well as its contribution to trust management
techniques. The article examines the usage of credit and reputation systems in trust
quantification, which are essential parts of the process. Credit mechanisms assess an entity's
trustworthiness using behavioural data and interactions with other entities. They represent the
owner's judgement of an object on a subject following certain encounters. The reputation
system takes into account an object's level of trust in a topic over time using different credit
values. It is calculated by combining credit values from various interactions and assigning
suitable weights. The paper presents a thorough method to trust quantification that takes into
account both qualitative and quantitative characteristics, as described by fuzzy logic and credit
and reputation assessments. This multifaceted review approach improves the robustness and
accuracy of trust assessments.
Wang et al [22] use probabilistic linguistic term sets (PLTS) to improve trust scaling by offering
a more precise and adaptable approach to convey trust judgements. PLTS enables decision
makers to represent evaluation information using numerous language phrases and probabilities,
reflecting ambiguity and reluctance in trust judgements. This method contrasts with hesitant
fuzzy linguistic term sets (HFLTS), which may result in mistakes in expressing expert opinions.
PLTS also distinguishes between various recommenders' viewpoints more explicitly, preventing
poor solutions. The model's fuzzy algorithm tackles ambiguity and vagueness in decision-
making processes, allowing decision-makers to express their thoughts in linguistic words that
signify degrees of confidence or trustworthiness. Fuzzy logic helps to quantify and evaluate
subjective information, resulting in more accurate trust assessments. The model also uses the
Multi-Objective Optimisation by Ratio Analysis (MULTIMOORA) approach for decision
making, addresses context-dependent trust modelling, tackles ambiguity and uncertainty, and
creates a structural trust evaluation by breaking down trust into various building pieces. This
comprehensive method to trust modelling tackles the complexities and problems of trust
evaluation in numerous application contexts. In addition to the fuzzy logic technique, this study
applies the Multi-Objective Optimisation by Ratio Analysis (MULTIMOORA) approach to
assess trust levels. To rank the options, this robust decision-making approach uses three
subordinate orders. The combination of the MULTIMOORA technique with the fuzzy logic
algorithm creates a complete and systematic approach to trust evaluation. The fuzzy logic
algorithm deals with ambiguity and vagueness, whereas the MULTIMOORA technique
combines numerous factors to get a final rating based on the trustworthiness of the alternatives.
This study attempts to construct a comprehensive trust evaluation model that analyses many
trust-related criteria, resulting in more accurate and context-aware evaluations in multi-agent
systems and networked settings.
2.2.2 Decentralization approach
Some approaches, work very well at a network controller level by applying machine learning
algorithms [27] for detection of anomalies and dynamic trust assessment of devices on the
network based on their activities over time. In this study, exploration is focused on a novel
dynamic trust assessment model which combines the efforts of weighted sums specifically to be
deployed on edge devices to ensure that they too are just as secure as they are as fast as the
network allows them to be.
The framework is made up of several core components, each of which is essential for
monitoring, analysing, and managing IoT devices:
The actual application of this conceptual framework is writing a set of functions and classes
that replicate the behaviour of IoT devices, monitor their actions, and dynamically update their
trust scores. The system makes use of a variety of Python tools, including matplotlib for
visualisation and numpy for statistical analysis. For example, a device's behaviour might be
replicated to generate typical or abnormal usage patterns. These patterns are then analysed to
provide an anomaly score, which is fed into the trust score. Based on this trust score, the system
determines whether to provide the device full access, limited access, or complete access
restriction. The system may be evaluated in virtual scenarios where many devices are tracked
over time and their trust scores updated based on their behaviour and context. The simulation
results may be visualised to provide an understanding of the anomaly detection system's
efficacy.
2.2.6 Evaluation
Of all the methods implored, Dynamic Trust Assessment demands the least compute resources.
By combining elements from Decentralisation as well, a hybrid system can be set up which
picks the pros from each of the highlighted security approaches such as leaving dedicated
devices to do compute intensive processing tasks. These devices could be integrated with
network controllers such that machine learning algorithms could aid the dynamic trust
assessment model implemented.
2.3 Conclusion
In this study, we have thoroughly examined the evolution of network security across different
generations of mobile networks, from 1G to the forthcoming 6G systems. The progression from
basic encryption methods to advanced security measures illustrates the growing complexity and
sophistication required to safeguard network infrastructures.
As we transition into the 6G era, the challenges associated with securing vast amounts of data
and advanced technologies become increasingly apparent. Traditional security models and
encryption methods face limitations, especially given the potential impact of quantum
computing and the diverse range of devices and applications in 6G networks.
To address these emerging challenges, our research has highlighted the importance of
integrating innovative security frameworks. Among these, Dynamic Trust Assessment (DTA)
stands out as a pivotal approach. By employing Dynamic Trust Assessment, we aim to enhance
security in 6G networks through a more adaptive and context-aware approach. DTA leverages
real-time data and advanced algorithms to continuously evaluate and adjust trust levels,
providing a more responsive and resilient security posture.
In the subsequent phases of this research, we will focus on the practical implementation of DTA
within 6G networks. This will involve developing and deploying DTA models that can
dynamically assess and respond to varying security threats, leveraging insights gained from our
studies and experiments. The goal is to create a robust security framework that not only
addresses current vulnerabilities but also adapts to future challenges, ensuring a secure and
reliable 6G network infrastructure.