Abstract
With the popularization of mobile communication equipment, the application scope of heterogeneous mobile networks is expanding. The diversity of network types and access methods of heterogeneous mobile networks also increases the number of security problems that exist in the network. In order to ensure the security of the heterogeneous mobile network, it is necessary to perform effective authentication and status monitoring on the mobile communication device requesting access to the heterogeneous mobile network. To this end, this paper proposes a heterogeneous mobile network access control technology based on mutual trust mechanism. Firstly, this technology designs a network system model based on mutual trust system. In this network structure, the mobile communication node needs to pass the verification of the security service system before access the network, which guarantees the security of the heterogeneous mobile network to a certain extent. In order to meet the network service quality requirements of mobile communication nodes, this paper adopts a naive Bayesian-based machine learning method to select the optimal access network in heterogeneous networks for mobile communication nodes. In order to prevent malicious nodes in abnormal state from destroying network security, this paper adopts the hidden node detection method based on hidden Markov model. The security service system is suspended to provide a trust service for the detected abnormal node, to make the security service system stop providing trust services for exception nodes and the exception nodes unable to continue using network services. In the simulation experiment, the security analysis of the algorithm and the effectiveness evaluation of the performance were carried out.
Similar content being viewed by others
References
Chen W, Gong S, Jiang X (2017) Fuzzy multiple attribute decision access scheme in heterogeneous wireless network. Multimed Tools Appl 76(19):1–17
Du Z, Wu Q, Yang P (2016) Learning with handoff cost constraint for network selection in heterogeneous wireless networks. Wirel Commun Mob Comput 16(4):441–458
Sivchenko D, Rakocevic V, Habermann J (2015) Integrated mobility and resource management for cross-network resource sharing in heterogeneous wireless networks using traffic offload policies. Wirel Netw 21(3):981–999
Farash MS, Kumari S (2016) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Netw 36(P1):152–176
Li G, Jiang Q, Shi Y et al (2016) Anonymous network information acquirement protocol for mobile users in heterogeneous wireless networks. International Journal of Network Security 18(1):193–200
Eletreby R, Yagan O, Eletreby R, et al (2017) Secure and reliable connectivity in heterogeneous wireless sensor networks: IEEE International Symposium on Information Theory. IEEE, pp. 2880–2884
Li Y, Wang C, Zhang Y et al (2016) Privacy-preserving multi-receiver signcryption scheme for heterogeneous systems. Security & Communication Networks 9(17):4574–4584
V K, Lingareddy SC (2017) A Secure Intrusion Detection System for Heterogeneous Wireless Sensor Networks. Int J Comput Appl 179(1):1–8
Xu L, Xing H, Nallanathan A et al Security-Aware Cross-Layer Resource Allocation for Heterogeneous Wireless Networks. IEEE Trans Commun 67(2):1388–1399
Kumar A, Om H (2018) Handover Authentication Scheme for Device-to-Device Outband Communication in 5G-WLAN Next Generation Heterogeneous Networks. Arab J Sci Eng 43:7961–7977
Nyangaresi VO, Abeka SO, Rodgrigues A (2018) Security Evaluation of Cellular Networks Handover Techniques. I J Computer Network and Information Security 5:45–59
Swarnkar M, Hubballi N (2016) OCPAD: One class Naive Bayes classifier for payload based anomaly detection. Expert Syst Appl 64:330–339
Li D, Hu X, Jin CJ et al (2017) Learning to Detect Traffic Incidents from Data Based on Tree Augmented Naive Bayesian Classifiers. Discret Dyn Nat Soc 2017(1):1–9
Gupta A, Kumar D, Barve A (2017) Hidden Markov Model based Credit Card Fraud Detection System with Time Stamp and IP Address. Int J Comput Appl 166(5):33–37
Wei B, Kanai K, Katto J (2016) History-based throughput prediction with Hidden Markov Model in mobile networks. IEEE International Conference on Multimedia & Expo Workshops. IEEE, pp. 1–6
Taheri Y, Garakani HG, Mohammadzadeh N (2016) A Game Theory Approach for Malicious Node Detection in MANETs. J Inf Sci Eng 32(3):559–573
Sunilkumar G, Thriveni J, Venugopal KR et al (2015) A Perspective to Adopt Continuous Dynamic Cognition for Malicious Node Detection in Heterogeneous Networks. Procedia Computer Science 46:997–1004
Acknowledgements
The authors acknowledge the 2015 Natural Science Funding Project of Excellent Young Innovative Talents Training Program of Universities in Guangdong Province (2015KQNCX227).
Author information
Authors and Affiliations
Corresponding author
Additional information
This article is part of the Topical Collection: Special Issue on Fog/Edge Networking for Multimedia Applications
Guest Editors: Yong Jin, Hang Shen, Daniele D’Agostino, Nadjib Achir, and James Nightingale
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Wang, F., Liu, S., Ni, W. et al. Heterogeneous mobile network access control technology based on mutual trust mechanism. Peer-to-Peer Netw. Appl. 12, 1489–1498 (2019). https://doi.org/10.1007/s12083-019-00771-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-019-00771-x