Intrusion detection techniques for mobile cloud computing in heterogeneous 5G

被引:85
|
作者
Gai, Keke [1 ]
Qiu, Meikang [1 ]
Tao, Lixin [1 ]
Zhu, Yongxin [2 ]
机构
[1] Pace Univ, Dept Comp Sci, New York, NY 10038 USA
[2] Shanghai Jiao Tong Univ, Sch Microelect, Shanghai 200240, Peoples R China
基金
美国国家科学基金会;
关键词
intrusion detection; mobile cloud computing; security; heterogeneous; 5G; PERFORMANCE; SYSTEM; VIRTUALIZATION; PROTECTION; ATTACKS;
D O I
10.1002/sec.1224
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile cloud computing is applied in multiple industries to obtain cloud-based services by leveraging mobile technologies. With the development of the wireless networks, defending threats from wireless communications have been playing a remarkable role in the Web security domain. Intrusion detection system (IDS) is an efficient approach for protecting wireless communications in the Fifth Generation (5G) context. In this paper, we identify and summarize the main techniques being implemented in IDSs and mobile cloud computing with an analysis of the challenges for each technique. Addressing the security issue, we propose a higher level framework of implementing secure mobile cloud computing by adopting IDS techniques for applying mobile cloud-based solutions in 5G networks. On the basis of the reviews and synthesis, we conclude that the implementation of mobile cloud computing can be secured by the proposed framework because it will provide well-protected Web services and adaptable IDSs in the complicated heterogeneous 5G environment. Copyright (C) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:3049 / 3058
页数:10
相关论文
共 50 条
  • [21] A 5g network-oriented mobile edge computing offloading strategy and cloud computing network security
    Yuxue, Yang
    Huifeng, Yang
    Jing, Wang
    Ruiying, Liu
    Xiangqian, Nie
    Engineering Intelligent Systems, 2021, 29 (02): : 109 - 116
  • [22] Understanding 5G Performance on Heterogeneous Computing Architectures
    Wang, Chengke
    Nie, Hao
    Wang, Weiguo
    Guo, Junchen
    Zhang, Pengyu
    Chen, Yulong
    Zhu, Shunmin
    He, Yuan
    Xu, Chenren
    IEEE COMMUNICATIONS MAGAZINE, 2025, 63 (03) : 107 - 113
  • [23] Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud
    Saleh A. Alghamdi
    International Journal of Information Security, 2022, 21 : 469 - 488
  • [24] Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues
    Shamshirband, Shahab
    Fathi, Mahdis
    Chronopoulos, Anthony T.
    Montieri, Antonio
    Palumbo, Fabio
    Pescape, Antonio
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
  • [25] The automatic positioning method for defect data of 5G mobile communication based on cloud computing
    Fang, Chen
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2022, 15 (01) : 63 - 77
  • [26] Intercloud and HetNet for Mobile Cloud Computing in 5G Systems: Design Issues, Challenges, and Optimization
    Carvalho, Glaucio H. S.
    Woungang, Isaac
    Anpalagan, Alagan
    Jaseemuddin, Muhammad
    Hossain, Ekram
    IEEE NETWORK, 2017, 31 (03): : 80 - 89
  • [27] Communication-Efficient Offloading for Mobile-Edge Computing in 5G Heterogeneous Networks
    Zhou, Ping
    Shen, Ke
    Kumar, Neeraj
    Zhang, Yin
    Hassan, Mohammad Mehedi
    Hwang, Kai
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13): : 10237 - 10247
  • [28] Leveraging 5G and cloud computing for outlier detection in IoT environments: A KNN approach
    Mary, S. A. Sahaaya Arul
    Basha, H. Anwar
    Mohanraj, G.
    Kiruthikaa, R.
    Saranya, N.
    INTERNET TECHNOLOGY LETTERS, 2025, 8 (02)
  • [29] The Edge Computing Cloud Architecture Based on 5G Network for Industrial Vision Detection
    Lu, Tielin
    Fan, Zitian
    Lei, Yue
    Shang, Yujia
    Wang, Chunxi
    2021 IEEE 6TH INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS (ICBDA 2021), 2021, : 328 - 332
  • [30] THE NEED FOR MOBILE EDGE COMPUTING IN 5G NETWORKS
    Singh, Bhawna
    Journal of the Institute of Telecommunications Professionals, 2022, 16 : 23 - 30