Open Access iconOpen Access

ARTICLE

crossmark

A Probabilistic Trust Model and Control Algorithm to Protect 6G Networks against Malicious Data Injection Attacks in Edge Computing Environments

Borja Bordel Sánchez1,*, Ramón Alcarria2, Tomás Robles1

1 Department of Computer Systems, Universidad Politécnica de Madrid, Madrid, 28031, Spain
2 Department of Geospatial Engineering, Universidad Politécnica de Madrid, Madrid, 28031, Spain

* Corresponding Author: Borja Bordel Sánchez. Email: email

(This article belongs to the Special Issue: Advanced Security for Future Mobile Internet: A Key Challenge for the Digital Transformation)

Computer Modeling in Engineering & Sciences 2024, 141(1), 631-654. https://doi.org/10.32604/cmes.2024.050349

Abstract

Future 6G communications are envisioned to enable a large catalogue of pioneering applications. These will range from networked Cyber-Physical Systems to edge computing devices, establishing real-time feedback control loops critical for managing Industry 5.0 deployments, digital agriculture systems, and essential infrastructures. The provision of extensive machine-type communications through 6G will render many of these innovative systems autonomous and unsupervised. While full automation will enhance industrial efficiency significantly, it concurrently introduces new cyber risks and vulnerabilities. In particular, unattended systems are highly susceptible to trust issues: malicious nodes and false information can be easily introduced into control loops. Additionally, Denial-of-Service attacks can be executed by inundating the network with valueless noise. Current anomaly detection schemes require the entire transformation of the control software to integrate new steps and can only mitigate anomalies that conform to predefined mathematical models. Solutions based on an exhaustive data collection to detect anomalies are precise but extremely slow. Standard models, with their limited understanding of mobile networks, can achieve precision rates no higher than 75%. Therefore, more general and transversal protection mechanisms are needed to detect malicious behaviors transparently. This paper introduces a probabilistic trust model and control algorithm designed to address this gap. The model determines the probability of any node to be trustworthy. Communication channels are pruned for those nodes whose probability is below a given threshold. The trust control algorithm comprises three primary phases, which feed the model with three different probabilities, which are weighted and combined. Initially, anomalous nodes are identified using Gaussian mixture models and clustering technologies. Next, traffic patterns are studied using digital Bessel functions and the functional scalar product. Finally, the information coherence and content are analyzed. The noise content and abnormal information sequences are detected using a Volterra filter and a bank of Finite Impulse Response filters. An experimental validation based on simulation tools and environments was carried out. Results show the proposed solution can successfully detect up to 92% of malicious data injection attacks.

Keywords


Cite This Article

APA Style
Sánchez, B.B., Alcarria, R., Robles, T. (2024). A probabilistic trust model and control algorithm to protect 6G networks against malicious data injection attacks in edge computing environments. Computer Modeling in Engineering & Sciences, 141(1), 631-654. https://doi.org/10.32604/cmes.2024.050349
Vancouver Style
Sánchez BB, Alcarria R, Robles T. A probabilistic trust model and control algorithm to protect 6G networks against malicious data injection attacks in edge computing environments. Comput Model Eng Sci. 2024;141(1):631-654 https://doi.org/10.32604/cmes.2024.050349
IEEE Style
B.B. Sánchez, R. Alcarria, and T. Robles, “A Probabilistic Trust Model and Control Algorithm to Protect 6G Networks against Malicious Data Injection Attacks in Edge Computing Environments,” Comput. Model. Eng. Sci., vol. 141, no. 1, pp. 631-654, 2024. https://doi.org/10.32604/cmes.2024.050349



cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 548

    View

  • 253

    Download

  • 0

    Like

Share Link