Skip to main content
Log in

Heterogeneous mobile network access control technology based on mutual trust mechanism

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

With the popularization of mobile communication equipment, the application scope of heterogeneous mobile networks is expanding. The diversity of network types and access methods of heterogeneous mobile networks also increases the number of security problems that exist in the network. In order to ensure the security of the heterogeneous mobile network, it is necessary to perform effective authentication and status monitoring on the mobile communication device requesting access to the heterogeneous mobile network. To this end, this paper proposes a heterogeneous mobile network access control technology based on mutual trust mechanism. Firstly, this technology designs a network system model based on mutual trust system. In this network structure, the mobile communication node needs to pass the verification of the security service system before access the network, which guarantees the security of the heterogeneous mobile network to a certain extent. In order to meet the network service quality requirements of mobile communication nodes, this paper adopts a naive Bayesian-based machine learning method to select the optimal access network in heterogeneous networks for mobile communication nodes. In order to prevent malicious nodes in abnormal state from destroying network security, this paper adopts the hidden node detection method based on hidden Markov model. The security service system is suspended to provide a trust service for the detected abnormal node, to make the security service system stop providing trust services for exception nodes and the exception nodes unable to continue using network services. In the simulation experiment, the security analysis of the algorithm and the effectiveness evaluation of the performance were carried out.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Chen W, Gong S, Jiang X (2017) Fuzzy multiple attribute decision access scheme in heterogeneous wireless network. Multimed Tools Appl 76(19):1–17

    Google Scholar 

  2. Du Z, Wu Q, Yang P (2016) Learning with handoff cost constraint for network selection in heterogeneous wireless networks. Wirel Commun Mob Comput 16(4):441–458

    Article  Google Scholar 

  3. Sivchenko D, Rakocevic V, Habermann J (2015) Integrated mobility and resource management for cross-network resource sharing in heterogeneous wireless networks using traffic offload policies. Wirel Netw 21(3):981–999

    Article  Google Scholar 

  4. Farash MS, Kumari S (2016) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Netw 36(P1):152–176

    Article  Google Scholar 

  5. Li G, Jiang Q, Shi Y et al (2016) Anonymous network information acquirement protocol for mobile users in heterogeneous wireless networks. International Journal of Network Security 18(1):193–200

    Google Scholar 

  6. Eletreby R, Yagan O, Eletreby R, et al (2017) Secure and reliable connectivity in heterogeneous wireless sensor networks: IEEE International Symposium on Information Theory. IEEE, pp. 2880–2884

  7. Li Y, Wang C, Zhang Y et al (2016) Privacy-preserving multi-receiver signcryption scheme for heterogeneous systems. Security & Communication Networks 9(17):4574–4584

    Article  Google Scholar 

  8. V K, Lingareddy SC (2017) A Secure Intrusion Detection System for Heterogeneous Wireless Sensor Networks. Int J Comput Appl 179(1):1–8

    Google Scholar 

  9. Xu L, Xing H, Nallanathan A et al Security-Aware Cross-Layer Resource Allocation for Heterogeneous Wireless Networks. IEEE Trans Commun 67(2):1388–1399

    Article  Google Scholar 

  10. Kumar A, Om H (2018) Handover Authentication Scheme for Device-to-Device Outband Communication in 5G-WLAN Next Generation Heterogeneous Networks. Arab J Sci Eng 43:7961–7977

    Article  Google Scholar 

  11. Nyangaresi VO, Abeka SO, Rodgrigues A (2018) Security Evaluation of Cellular Networks Handover Techniques. I J Computer Network and Information Security 5:45–59

    Article  Google Scholar 

  12. Swarnkar M, Hubballi N (2016) OCPAD: One class Naive Bayes classifier for payload based anomaly detection. Expert Syst Appl 64:330–339

    Article  Google Scholar 

  13. Li D, Hu X, Jin CJ et al (2017) Learning to Detect Traffic Incidents from Data Based on Tree Augmented Naive Bayesian Classifiers. Discret Dyn Nat Soc 2017(1):1–9

    Google Scholar 

  14. Gupta A, Kumar D, Barve A (2017) Hidden Markov Model based Credit Card Fraud Detection System with Time Stamp and IP Address. Int J Comput Appl 166(5):33–37

    Google Scholar 

  15. Wei B, Kanai K, Katto J (2016) History-based throughput prediction with Hidden Markov Model in mobile networks. IEEE International Conference on Multimedia & Expo Workshops. IEEE, pp. 1–6

  16. Taheri Y, Garakani HG, Mohammadzadeh N (2016) A Game Theory Approach for Malicious Node Detection in MANETs. J Inf Sci Eng 32(3):559–573

    MathSciNet  Google Scholar 

  17. Sunilkumar G, Thriveni J, Venugopal KR et al (2015) A Perspective to Adopt Continuous Dynamic Cognition for Malicious Node Detection in Heterogeneous Networks. Procedia Computer Science 46:997–1004

    Article  Google Scholar 

Download references

Acknowledgements

The authors acknowledge the 2015 Natural Science Funding Project of Excellent Young Innovative Talents Training Program of Universities in Guangdong Province (2015KQNCX227).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhiping Wan.

Additional information

This article is part of the Topical Collection: Special Issue on Fog/Edge Networking for Multimedia Applications

Guest Editors: Yong Jin, Hang Shen, Daniele D’Agostino, Nadjib Achir, and James Nightingale

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, F., Liu, S., Ni, W. et al. Heterogeneous mobile network access control technology based on mutual trust mechanism. Peer-to-Peer Netw. Appl. 12, 1489–1498 (2019). https://doi.org/10.1007/s12083-019-00771-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-019-00771-x

Keywords

Navigation