Skip to main content
Log in

A Bayesian game model and network availability model for small cells under denial of service (DoS) attack in 5G wireless communication network

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Nowadays small cells have become the integral part of 5G wireless communication network (WCN). However, the incorporation of small cells in 5G WCN creates chances for attackers to intrude into the network and this makes the network highly susceptible to attacks. Among various possible attacks, denial of service (DoS) attack is one of the most common network security attacks, and hence in this paper we consider a bandwidth spoofing attack which is a type of DoS attack that is carried out by an attacker during the communication between a macro base station and a small cell base station in a 5G WCN. We then propose a Bayesian game model to capture the interactions between the attacker and the network defender under the bandwidth spoofing attack and obtain the best strategies for defending the DoS attack. Further, since the DoS attack entails unavailability of the network, we address this issue by developing an availability model of the 5G WCN based on a stochastic reward net. Numerical results are presented which give insights into how the availability is affected by the DoS attack. The proposed model is also validated via simulation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Zou, Y. (2018). Intelligent interference exploitation for heterogeneous cellular networks against eavesdropping. IEEE Journal on Selected Areas in Communications, 36(7), 1453–1464.

    Article  Google Scholar 

  2. Gupta, A., Jha, R. K., & Gandotra, P. (2018). Bandwidth spoofing and intrusion detection system for multistage 5G wireless communication network. IEEE Transactions on Vehicular Technology, 67(1), 628–632.

    Article  Google Scholar 

  3. Xiao, K., Li, W., Kodoch, M., & Li, C. (2018). On the secrecy capacity of 5G mmWave small cell networks. IEEE Wireless Communications, 23(4), 47–51.

    Article  Google Scholar 

  4. Rappaport, T. S., Xing, Y., MacCartney, G. R., Molisch, A. F., Mellios, E., & Zhang, J. (2017). Overview of millimeter wave communications for fifth-generation (5G) wireless networks—With a focus on propagation models. IEEE Transactions on Antenna and Propagation, 65(12), 6213–6230.

    Article  Google Scholar 

  5. Zou, Y., Sun, M., Zhu, J., & Guo, H. (2018). Security—Reliability trade-off for distributed antenna systems in heterogeneous cellular networks. IEEE Transactions on Wireless Communications, 17(12), 8444–8456.

    Article  Google Scholar 

  6. Gandotra, P., & Jha, R. K. (2017). A survey on green communication and security challenges in 5G wireless communication networks. Journal of Network and Computer Applications, 96, 39–61.

    Article  Google Scholar 

  7. Ye, Q., Al-Salash, M., Caramanis, C., & Andrews, J. G. (2015). Distributed resource allocation in device-to-device enhanced cellular networks. IEEE Transactions on Communications, 63(2), 441–454.

    Article  Google Scholar 

  8. Ferrag, M. A., Maglaras, L., Argyriou, A., Kosmanos, D., & Janicke, H. (2018). Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes. Journal of Network and Computer Applications, 101, 55–82.

    Article  Google Scholar 

  9. Wu, Y., Khisti, A., Xiao, C., & Wong, K.-K. (2018). A survey of physical layer security techniques for 5G wireless networks and challenges ahead. IEEE Journal on Selected Areas in Communications, 36(4), 679–695.

    Article  Google Scholar 

  10. Fang, D., Qian, Y., & Hu, R. Q. (2017). Security for 5G mobile wireless networks. IEEE Access, 6, 4850–4874.

    Article  Google Scholar 

  11. Fang, D., Qian, Y., & Hu, R. Q. (2019). Security analysis for interference management in heterogeneous networks. Ad Hoc Networks, 84, 1–8.

    Article  Google Scholar 

  12. Zhao, N., Yu, F. R., Li, M., Yan, Q., & Leung, V. C. M. (2016). Physical layer security issues in interference—alignment-based wireless networks. IEEE Communications Magazine, 54(8), 162–168.

    Article  Google Scholar 

  13. Guo, J., Zhao, N., Yu, F. R., Liu, X., & Leung, V. C. M. (2017). Exploiting adversarial jamming signals for energy harvesting in interference networks. IEEE Transactions on Wireless Communications, 16(2), 1267–1280.

    Article  Google Scholar 

  14. Cheng, F., Gui, G., Zhao, N., Chen, Y., Tang, J., & Sari, H. (2019). UAV relaying assisted secure transmission with caching. IEEE Transactions on Communications, 67(5), 3140–3153.

    Article  Google Scholar 

  15. Geva, M., Herberg, A., & Gev, Y. (2014). Bandwidth distributed denial of service. IEEE Security & Privacy, 12(1), 54–61.

    Article  Google Scholar 

  16. Siddiqui, F., Zeadally, S., & Fowler, S. (2013). Broadband wireless technologies. In N. Chilamkurti, et al. (Eds.), Next generation wireless technology: 4G and beyond (pp. 71–103). London: Springer.

    Chapter  Google Scholar 

  17. Liu, Y., Comaniciu, C., & Man, H. (2006). A Bayesian game approach for intrusion detection in wireless ad hoc networks. In GameNets’06, October 14, 2016, Pisa, Italy.

  18. Zhou, C. V., Leckie, C., & Karunasekera, S. (2010). A survey of coordinated attacks and collaborative intrusion detection. Computers & Security, 29, 124–140.

    Article  Google Scholar 

  19. Hunt, R., & Zeadally, S. (2012). Network forensics: An analysis techniques, tools, and trends. IEEE Computer, 45(12), 36–43.

    Article  Google Scholar 

  20. Ramki, A. A., Rasoolzadegan, A., & Jafari, A. J. (2018). A systematic view on intrusion detection based on the hidden Markov model. Statistical Analysis and Data Mining, 11, 111–134.

    Article  MathSciNet  Google Scholar 

  21. Sahner, R. A., Trivedi, K. S., & Puliafito, A. (1996). Performance and reliability analysis of computer systems: An example based approach using sharpe software package. Boston, MA: Kluwer Academic Publishers.

    Book  Google Scholar 

  22. Fudenberg, D., & Tirole, J. (1991). Game theory. Cambridge, MA: The MIT Press.

    MATH  Google Scholar 

  23. Thomas, R. W., Komali, R. S., Borghetti, B. J., & Mahonen, P. (2010). A Bayesian game analysis of emulation attacks in dynamic spectrum access networks. In IEEE symposium on new frontiers in dynamic spectrum (DySPAN), Singapore.

  24. Subba, B., Biswas, S., & Karmakar, S. (2018). A game theory based multi layered intrusion detection framework for wireless sensor networks. International Journal of Wireless Information Networks, 25(4), 399–421.

    Article  Google Scholar 

  25. Tadelis, S. (2013). Game theory. Princeton, NJ: Princeton University Press.

    MATH  Google Scholar 

  26. Bosch, P., Brusilovsky, A., McLellan, R., Mullender, S., & Polakos, P. (2009). Secure base stations. Bell Labs Technical Journal, 13(4), 227–243.

    Article  Google Scholar 

  27. Trivedi, K. (2001). Probability and statistics with reliability, queuing and computer science applications (2nd ed.). New York: Wiley.

    MATH  Google Scholar 

  28. Muppala, J. K., Ciardo, G., & Trivedi, K. S. (1994). Stochastic reward nets for reliability prediction. Communications in Reliability, Maintainability and Serviceability, 1(2), 9–20.

    Google Scholar 

  29. Ge, X., Cheng, H., Guizani, M., & Han, T. (2014). 5G wireless backhaul networks: Challenges and research advances. IEEE Network, 28(6), 6–11.

    Article  Google Scholar 

  30. Avizienis, A., Laprie, J. C., & Randell, B. (2000). Fundamental concepts of dependability. In Proceedings of the 3rd IEEE information survivability workshop (pp. 7–12).

  31. Gupta, V., Dharmaraja, S., & Gong, M. (2011). Analytical modeling of TCP flows in wireless LANs. Mathematical and Computer Modelling, 63, 684–693.

    Article  Google Scholar 

Download references

Acknowledgements

One of the authors (K. C. Lalropuia) is grateful to the University Grant Commission (UGC), India, for granting him financial support through the CSIR-UGC Junior Research Fellowship (UGC-Ref. No.: 1031)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vandana Gupta.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lalropuia, K.C., Gupta, V. A Bayesian game model and network availability model for small cells under denial of service (DoS) attack in 5G wireless communication network. Wireless Netw 26, 557–572 (2020). https://doi.org/10.1007/s11276-019-02163-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-019-02163-8

Keywords

Navigation