With 5G technologies, cognitive radio (CR) has become a possible answer to maximise spectrum utilization and efficiency. But in the case of short-range applications particularly, CR also brings significant security concerns in addition to benefits. Emphasizing short-range uses, this paper uses 5G's framework to assess the security issues with cognitive radio systems. Among the discovered security hazards are main user emulation attacks, jamming attacks, spectrum sensing, Byzantine attacks, etc., driven by reputation. Chaotic Deep Belief Networks (DBN) for detection and mitigating purpose is proposed to overcome these challenges using artificial intelligence (AI) approaches. Emphasizing the need of strong security measures to ensure the integrity and dependability of communication networks, the analysis considers the unique characteristics of 5G-CR spectrum and short-range applications. The results shows that the proposed Chaotic DBN ranging from 92.5% to 94.2%, the DBN Classification approach had an accuracy of 95.5% on the training set.
F. Salahdine, T. Han, and N. Zhang, “Security in5Gand beyond recent advances and future challenges,” SECURITY AND PRIVACY, vol. 6, no. 1, Sep. 2022, doi: 10.1002/spy2.271.
M. N. Alanazi, “5G Security Threat Landscape, AI and Blockchain,” Wireless Personal Communications, vol. 133, no. 3, pp. 1467–1482, Dec. 2023, doi: 10.1007/s11277-023-10821-6.
K. Aravindhan, S. K. B. Sangeetha, K. Periyakaruppan, E. Manoj, R. Sivani, and S. Ajithkumar, “Smart Charging Navigation for VANET Based Electric Vehicles,” 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 1588–1591, Mar. 2021, doi: 10.1109/icaccs51430.2021.9441842.
S. O. Oruma and S. Petrovic, “Security Threats to 5G Networks for Social Robots in Public Spaces: A Survey,” IEEE Access, vol. 11, pp. 63205–63237, 2023, doi: 10.1109/access.2023.3288338.
A. Ahad et al., “A Comprehensive review on 5G-based Smart Healthcare Network Security: Taxonomy, Issues, Solutions and Future research directions,” Array, vol. 18, p. 100290, Jul. 2023, doi: 10.1016/j.array.2023.100290.
H. B. Salameh, S. Abdel-Razeq, and H. Al-Obiedollah, “Integration of Cognitive Radio Technology in NOMA-Based B5G Networks: State of the Art, Challenges, and Enabling Technologies,” IEEE Access, vol. 11, pp. 12949–12962, 2023, doi: 10.1109/access.2023.3242645.
M. Mahyoub, A. AbdulGhaffar, E. Alalade, E. Ndubisi, and A. Matrawy, “Security Analysis of Critical 5G Interfaces,” IEEE Communications Surveys & Tutorials, vol. 26, no. 4, pp. 2382–2410, 2024, doi: 10.1109/comst.2024.3377161.
L. K. Das, “Research on security threats posed by legacy RATs (Radio access technologies) in 5G networks”, (2023).
H. N. Fakhouri, S. Alawadi, F. M. Awaysheh, I. B. Hani, M. Alkhalaileh, and F. Hamad, “A Comprehensive Study on the Role of Machine Learning in 5G Security: Challenges, Technologies, and Solutions,” Electronics, vol. 12, no. 22, p. 4604, Nov. 2023, doi: 10.3390/electronics12224604.
K. Patel, A. Vadher, M. Patel, J. Thaker, and A. Bhise, “AI-Based Security System for 5G Enabled IoT,” 2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE), pp. 1–7, Feb. 2024, doi: 10.1109/ic-etite58242.2024.10493287.
M. Kandasamy, N. Yuvaraj, R. A. Raja, N. V. Kousik, M. R. Tf, and A. S. Kumar, “QoS Design using Mmwave Backhaul Solution for Utilising Underutilised 5G Bandwidth In GHz Transmission,” 2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS), Feb. 2023, doi: 10.1109/icais56108.2023.10073756.
A. S. Abdalla and V. Marojevic, “End-to-End O-RAN Security Architecture, Threat Surface, Coverage, and the Case of the Open Fronthaul,” IEEE Communications Standards Magazine, vol. 8, no. 1, pp. 36–43, Mar. 2024, doi: 10.1109/mcomstd.0001.2200047.
H. Chen, J. Liu, J. Wang, and Y. Xun, “Towards secure intra-vehicle communications in 5G advanced and beyond: Vulnerabilities, attacks and countermeasures,” Vehicular Communications, vol. 39, p. 100548, Feb. 2023, doi: 10.1016/j.vehcom.2022.100548.
S. Sheikhzadeh, M. Pourghasemian, M. R. Javan, N. Mokari, and E. A. Jorswieck, “AI-Based Secure NOMA and Cognitive Radio-Enabled Green Communications: Channel State Information and Battery Value Uncertainties,” IEEE Transactions on Green Communications and Networking, vol. 6, no. 2, pp. 1037–1054, Jun. 2022, doi: 10.1109/tgcn.2021.3135479.
A. Majeed et al., “Deep Learning-Based Symptomizing Cyber Threats Using Adaptive 5G Shared Slice Security Approaches,” Future Internet, vol. 15, no. 6, p. 193, May 2023, doi: 10.3390/fi15060193.
Shahid, M. F. (2021). Data-driven Approach Based on Deep Learning and Probabilistic Models for PHY-layer Security in AI-enabled Cognitive Radio IoT (Doctoral dissertation, Queen Mary University of London).
U. K. Lilhore, S. Dalal, and S. Simaiya, “A cognitive security framework for detecting intrusions in IoT and 5G utilizing deep learning,” Computers & Security, vol. 136, p. 103560, Jan. 2024, doi: 10.1016/j.cose.2023.103560.
E. Konstantopoulou, N. Sklavos, and I. Ognjanovic, “Securing Public Safety Mission-Critical 5G Communications of Smart Cities,” Internet of Everything for Smart City and Smart Healthcare Applications, pp. 61–74, Aug. 2023, doi: 10.1007/978-3-031-34601-9_4.
Jazyah, Y. H. (2023). 5G Security, Challenges, Solutions, and Authentication. International Journal of Advances in Soft Computing & Its Applications, 15(3).
Y. Sun, X. Jia, X. Han, M. Xie, and L. Zhang, “Physical layer security‐oriented energy‐efficient resource allocation and trajectory design for UAV jammer over 5G millimeter wave cognitive relay system,” Transactions on Emerging Telecommunications Technologies, vol. 35, no. 1, Dec. 2023, doi: 10.1002/ett.4915.
D. C. G. Valadares, N. C. Will, Á. Á. C. C. Sobrinho, A. C. D. Lima, I. S. Morais, and D. F. S. Santos, “Security Challenges and Recommendations in 5G-IoT Scenarios,” Advanced Information Networking and Applications, pp. 558–573, 2023, doi: 10.1007/978-3-031-29056-5_48.
J. Boodai, A. Alqahtani, and M. Frikha, “Review of Physical Layer Security in 5G Wireless Networks,” Applied Sciences, vol. 13, no. 12, p. 7277, Jun. 2023, doi: 10.3390/app13127277.
M. P. Geetha and D. Karthika Renuka, “Deep learning architecture towards consumer buying behaviour prediction using multitask learning paradigm,” Journal of Intelligent & Fuzzy Systems, vol. 46, no. 1, pp. 1341–1357, Jan. 2024, doi: 10.3233/jifs-231116.
Sumathi, S., & Ganesh Kumar, P. (2019). Syntactic and Semantic based similarity measurement for Plagiarism Detection. Int J Innovat Technol Explor Eng, 9, 155-159.
CRediT Author Statement
The authors confirm contribution to the paper as follows:
Conceptualization: Anand Babu R, Girish Ramakrishna, Geetha M P, Rakesh Podaralla and Keerthana K P;
Methodology: Anand Babu R, Girish Ramakrishna and Geetha M P;
Software: Girish Ramakrishna and Geetha M P;
Data Curation: Rakesh Podaralla and Keerthana K P;
Writing- Original Draft Preparation: Anand Babu R, Girish Ramakrishna, Geetha M P, Rakesh Podaralla and Keerthana K P;
Visualization: Anand Babu R, Girish Ramakrishna and Geetha M P;
Investigation: Girish Ramakrishna and Geetha M P;
Supervision: Rakesh Podaralla and Keerthana K P;
Validation: Anand Babu R, Girish Ramakrishna and Geetha M P;
Writing- Reviewing and Editing: Anand Babu R, Girish Ramakrishna, Geetha M P, Rakesh Podaralla and Keerthana K P;
All authors reviewed the results and approved the final version of the manuscript.
Acknowledgements
The authors would like to thank to the reviewers for nice comments on the manuscript.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of data and materials
Data sharing is not applicable to this article as no new data were created or analysed in this study.
Author information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Corresponding author
Anand Babu R
Department of Artificial Intelligence and Machine Learning, Panimalar Engineering College (Autonomous), Chennai, Tamil Nadu, India.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this article
Anand Babu R, Girish Ramakrishna, Geetha M P, Rakesh Podaralla and Keerthana K P, “Securing Short Range Applications in 5G Cognitive Radio Using an AI-Based Analysis of Security Threats”, Journal of Machine and Computing, pp. 1288-1300, April 2025, doi: 10.53759/7669/jmc202505101.