LOAD BALANCED ATTACK DEFENSE SYSTEM WITH
LIGHTWEIGHT AUTHENTICATION AND MODIFIED
BLOCKCHAIN IN SDN FOR B5G
Ihsan H. Abdulqadder and Israa T. Aziz
Department of Computer Science, University of Kirkuk, Kirkuk, Iraq
Computer Center, University of Mosul, Mosul, Iraq
ABSTRACT
The involvement of unauthorized packets in Software Defined Networks (SDN) has raised the demand for security. These days, users can access the Internet of Things (IoT) wirelessly over long distances with the use of mobility, and handover. Due to changes in connectivity, the mobility feature is the main reason to permit unauthorized packets. This article uses handover authentication and a modified blockchain to overcome the security issue named LLModBloc. The 5G users are initially authenticated by the edge layer access points (APs) using a hash produced by the lightweight QUARK algorithm using identity and pseudo-ID. The likelihood determines the user’s handover if there are too many users connecting to the same AP. A directed acyclic graph (DAC), Harris Hawks Optimization (HHO), and two-level packet based on hexa-features are used in this work. Based on packet characteristics, the capsule network initially divides packets into three categories: normal, suspect, and malicious. Suspicious packets are analyzed using user behavior features and a Q-learning algorithm. Many packets and behavior features were examined. The proposed LLModBlocare evaluated in several metrics such as packet loss, processing time, response time, bandwidth, and latency.The results demonstrate the effectiveness of the proposed system, showing that it outperforms other approaches in terms of network-specific parameters.
KEYWORDS
Packet classification, SDN, Blockchain, Handover authentication, Lightweight Hashing, 5G
Mobile edge computing (MEC) and SDN are required to Build a robust 5G network communication [7,8]. Regarding network management flexibility, MFC, network function virtualization (NFV), and SDN are offered in the 5G and beyond network. The privacy needs in such a mix of network technologies are important. Blockchain technology, intrusion detection, factors-based authentication, and lightweight cryptography are the main security solutions [9,10].
Blockchain has emerged as a viable security option in recent years. Support for an increasing number of records is made possible by blockchain technology, which builds a chain of blocks. The purpose of this blockchain is to counteract fraudulent flows that come from 5G consumers. Additionally, the use of blockchain guarantees a decrease in the frequency of denial of service (DoS) and distributed denial of service (DDoS) assaults as well as unauthorized access [11,12]. Network performance will be destroyed by the attackers because of increased latency, resource shortages, and other factors. To identify anomalous network flows, the incoming packet_in messages are examined using the packet features. When creating a secure system, a multi-controller SDN design is desirable since single controllers in SDN have the potential to fail [13, 14]. After being collected at edge devices, the incoming packets from 5G-IoT users are sent to the switch. Packet flows must be matched in the SDN core network by OpenFlow Switches. The packet_in will be sent straight to the controller for examination if it is a new flow. Multi-controller SDN is appropriate for large-scale network settings because if an attacker joins, there will be numerous mismatched flows, which means using a single controller will fail. SDN controllers handle flow analysis to identify both normal and abnormal flow.
This study designs a 5G-SDN with MEC that only permits 5G users after authentication. There is some unusual packet flow from genuine users even when the users are authenticated. According to a report, hacked users are the main way that DDoS attack packets get into networks. As a result, to distinguish between normal and aberrant packets, the arrived packet flow must be validated. This study discusses the use of an authentication handover and a modified blockchain structure to activate network security.
1.1. Motivation
Security in the network has become more important when 5G-SDN and MEC are combined. Blockchain technology is presented to meet the security requirements in this setting. Nevertheless, the earlier research was either concerned with user authentication or with user packet analysis. For large-scale network users, 5G-SDN must focus on both, though, to ensure security. The main difficult security issues include
Secure authentication that uses cryptographic techniques to guarantee the privacy of the
security credentials.
AP will be connected by multiple users.
The list of records grows linearly when utilizing classic blockchain technology.
The packet flow properties analysis can also lead to the misclassification of a few
additional malicious packets discovered during a single scan.
This led to the construction of 5G-SDN and beyond networks with MEC, blockchain, and several controllers for packet analysis, flow rule matching, and handover authentication. The suggested
research project outlines a practical security solution for a 5G-SDN network environment in
support of this goal.
1.2. Contribution
The following summarizes this study paper’s main contributions:
Toaddress the conventional problems with blockchain, we develop a 5G-SDN
environment with customized blockchain technology as a separate layer.
The QUARK algorithm, which transforms the user identity and pseudo-identity into hashes, provides lightweight authentication with credential privacy. The blockchain is used to confirm the user’s finger vein biometric and physical unclonable function (PUF) to enhance authentication.
A unique network component known as a load monitor keeps an eye on the load at APs and balances it while granting 5G users authentication access.
The blockchain’s built-in DAG, which can store more transactions and is hence appropriate for larger network environments, allows for quicker user validation.
Harris Hawks optimization (HHO) is used to choose the best switch for flow rule
matching at switches.
This document is organized as follows: Section 2 surveys current methodologies and their limitations while addressing identified security concerns in communication networks; Section 3 delineates proposed solutions to these significant security challenges; Section 4 offers an experimental evaluation of the network design through graphical representation; and Section 5 concludes with a discourse on future search directions arising from this study.
2.LITERATURE REVIEW AND PROBLEM STATEMENT
An essential component of every large-scale network is load balancing. The purpose of load balancing is to control the network’s response to an increase in users. Each layer, the data plane, and the edge were subject to load balancing. Incoming packets are transferred to the correct switch by the data plane layer, while user handover is managed by the edge layer. Due to the diverse data types received by this network from 5G users, load balancing at the edge layer is necessary [15]. By dividing the traffic into three categories—management, internal, and external—the traffic from user equipment was evenly distributed. To balance the load, user and packet handover was enabled. By generating a distinct tag for every user based on their identification, MAC address, and standard E.164 numbering, packet forwarding was introduced [16]. A load imbalance would undoubtedly result from the targeted DoS/DDoS attack submitting an excessive number of packets with a similar protocol. As a load-balancing monitoring system, a non-cooperative game was created [17]. In this work, the aggregate message authentication code (AMAC) technique was used. Mobile device authentication was carried out by confirming both individual and collective identities. A message authentication code (MAC) was created when the signature was confirmed. The eNB received from mobile users served as validation for this MAC. However, if the user’s credentials are not unique, unauthorized individuals will be able to access the network. The controller of the switch analyzes the network traffic to determine whether any malicious packets are involved in the network. A hybrid is fuzzy with an artificial neural network (HF-ANN) and tree-based switch assignment (TBSA) was suggested [18]. The HF-ANN method uses the packet features to categorize the received packets. To counteract the flow table overloading assault, a switch assignment was done. The number of successfully transmitted packets, packet loss, and error rate are the packet features that were considered in HFANN. Attack packets were only identified at the control plane layer, which permits transmissions from both authorized and unauthorized users, significantly increasing the number of packets. A SeArch was built with an intelligent intrusion detection system (IDS) [19]. The main issue was that making accurate class predictions required a large number of training sets. The packets were then categorized using randomly chosen attributes, which may have overlooked certain important
features and failed to accurately forecast dangerous packets. The packets were also classified using techniques like SVM, decision trees, and random forest (RF) [20]. The packets were classified as either regular or attack packets based on a set of 23 attributes. The created decision tree, which is difficult to analyze, was used for the RF-based categorization. For a large network, where a vast number of packets arrived every second, this was time-consuming.
The blockchain technology was introduced for network traffic analysis [21,22]. Along with blockchain, SDN covered security provisioning based on the Markov model. Reducing the involvement of malicious packets in the network also required network entity authentication. To protect privacy, the identities of the network devices were concealed through the use of Hidden Authentication (HiAuth), which also reduced the impact of DoS attacks [23]. The foundation of this HiAuth was lightweight processing, which was created using three steps: distribution correction mechanism, data mixing, and one-time pad generation. The data was encrypted using the ChaCha lightweight method. The identities were just concealed, though, and the packet features were not examined
The main issues with security in a 5G-SDN context are discussed in this section. 5G-SDN handover is carried out based on 5G users’ mobility, with an emphasis on authentication provisioning [24,25]. Implementing a capability-based privacy-protection mechanism (CPPHA) involves generating a MAC, which is a hash of capability, count value, temporary identity, and session key. After receiving a request, the base station (BS) verifies the count value before MAC. Handover authentication was achieved if the MAC and counter value were accurate. Next, a novel method for handover authentication that minimizes re-authentication was discussed. The user asks the blockchain center directly for the integrity key during authentication. After that, the controller received updated authentication data to verify the user. Following validation, the target access point and serving AP were notified of the user’s access. Re-authentication with the following AP was lessened by detecting the user’s moving path.
It was suggested to use a neural multi-fuzzy algorithm for packet validation and user authentication in blockchain [26]. Individual user signatures, identities, and elliptic curves were generated using the linear homomorphic signature (LHS) technique. Six key packet features were retrieved and evaluated simultaneously using fuzzy logic for classification. The flow table of a distributed lightweight DDoS threat analytics and response system (DTRAS) is used to confirm the received packet. [27]. A hybrid machine learning model (SVM and SOM) and an enhanced history-based IP filtering technique (eHIPF) were then covered [28]. The SVM classifies packets as normal, malicious, or suspicious. The SOM classifier then processes the suspicious packets. Other techniques have been presented in [29-32] to overcome the issue ofunauthorized packets.
The studies suggest that there is a lack of an integrated vision of security since most of the technologies emphasize either user-provisioned token login or pack analysis but not the two [18,23,24]. As advocated by extensive studies, the integration of SDN systems within blockchain frameworks poses difficulties such as an increase in record lists while increasing network complexity leads to a decrease in processing speed [21,24]. Most of the load balancing algorithms available today use either static or heuristic methods which are not suitable for the complexities and time requirements within 5G/6G structures [15,17]. Methods such as support vector machine (SVM), random forests and HF-ANN have been utilized to classify packets, but issues arise because of their failure to account for more complex relationships among packet features resulting in misclassification. [19,28]. The inability to efficiently deal with handover authentication is one of the main issues facing 5G networks, these problems are caused by the mobility of the user as well as differences in received signal strength (RSS). Some methodologies cite the delay and resource waste arising from the need for constant authentication as an issue, with many demanding of solutions to automatically resolve this problem [23,25]. High traffic volume puts pressure on single-controller SDN frameworks which limiting their functionality and collapses the entire system [14,27]. As a result, application areas such as self-driving cars, health care, and industrial automation require new forms of communication that would allow their unreliability and new conditions to be required, which this system has not reached [24,30].
The proposed research, which is based on the analysis of packet classification, blockchain, and
handover authentication, resolves the stated issues.
3.LLMODBLOC IN 5G-SDN AND BEYOND
This section provides a detailed description of the proposed LLModBloc in 5G-SDN and beyond.
3.1. Model of the Network
The secure architecture that has been built in this research project supports users in 5G and beyond. The edge layer, blockchain layer, data plane layer, control plane layer, and application layer make up the built architecture. A collection of network entities that carry out their respective functions make up each layer. The Internet of Things users who send packets to the edge devices are the 5G users. Allow IoT users to send numerous packets to edge devices by having 𝐼𝑘 = {𝑖1 , 𝑖2 ,𝑖3 , … }. Since they are primarily utilized to forward arriving packets to nextlayer entities, edge devices often have little resources. To confirm that user credentials and flow rules match, a blockchain layer is created. For quicker validation, the updated blockchain structure is supported. Then, by choosing a switch that matches the flow rule, the issue of overload at switches is lessened. The control plane layer then analyzes the mismatched packet flow using a two-level packet validation based on hexa-features.
Figure 1 illustrates this multi-layered 5G-SDN secure architecture model. Together with the algorithms each one employs; the primary network entities are shown. This 5G-SDN architecture with a modified blockchain is meant to provide environmental security, according to the suggested approach. The anonymous attack packets on the network result in greater resource usage and longer response times. The proposed 5G-SDN architecture would certainly improve network performance by providing packet analytics to detect attack packets.
Users’ queries are first sent to the edge layer, which is where 5G APs are installed and handle offloading, or user handover. After that, the packets are sent to the data plane, where the switches check that the flow rule is being followed. Blockchain provides functionality for these two security layers. After that, the packets are categorized by feature analysis.
3.2. Authentication Handover
A verified handover is performed by confirming the user’s location, finger vein, PUF, identification, and pseudo-identity. A person’s finger vein is one biometric that can be used to identify them. These security credentials are protected by lightweight hashing generation and a one-time pad to preserve privacy. The hash values are saved in the blockchain after users have registered with their security credentials. During the authentication procedure, AP looks up the credentials on the blockchain.
The QUARK algorithm integrates sponge creation and core permutation to optimize resource usage. The sponge is produced through the processes of initiation, absorption, and squeezing. In initialization, a multiple of r, where r is the block length, is obtained by adding the identity and pseudo-identity by one bit. From the first block until the state 𝑠 = (𝑠0 , … . , 𝑠𝑏−1 ), r-bit blocks are then executed using the XOR technique. The formula for the𝑏-bit is 𝑏 = 𝑟 + 𝑐, where 𝑐 is the capacity. The final 𝑟 bits are thus obtained as an outcome ofthe squeezing process. Similarly, initialization, state update, and output prediction are used to carry out the permutation 𝑟 using the 𝑏 bit as input. The internal state (𝑋 𝑡 , 𝑌 𝑡 , 𝐿 𝑡 )is used to initialize the states created in the sponge. The identity and pseudo-identity hash result is as follows:
𝑠 = (𝑠0 , … , 𝑠𝑏−1 ) = (𝑋0 4𝑏 ,𝑋1 4𝑏 , … , 𝑌𝑏⁄2−2 4𝑏 , 𝑌𝑏⁄2−1 4𝑏 ) (1) The 5G-AP at the edge layer verifies the hashed identity and pseudo-identification. One-time pads (OTPs) are then generated using ChaCha stream cipher algorithm according to PUF, location, and finger vein. Once the vein in the finger has been transformed into binary data, a set of binary values is taken into consideration for authentication. The four-bit words a, b, c, and d are formed using these three security credentials. First, a quarter round of 32-bit integers is used to process the Chacha state as a 4×4 matrix. The following is how the matrix is written:
𝑋 = ( 𝑥0 𝑥1 𝑥2 𝑥3 𝑥4 𝑥5 𝑥6 𝑥7 𝑥8 𝑥12 𝑥9 𝑥13 𝑥10 𝑥14 𝑥11 𝑥15) (2) This matrix is represented as ( 𝑐𝑜 𝑐𝑜 𝑐𝑜 𝑐𝑜 𝑘 𝑘 𝑘 𝑘 𝑘 𝑏𝑐 𝑘 𝑏𝑐 𝑘 𝑛 𝑘 𝑛 ), the terms If n is the set of nonce values, k is the key, and bc is the block counter. The exclusive-or operator and the addition operator will be used to perform this quarter-round function 32 times. From these modified states, we get a 64-bit keystream. The 5G access point at the edge layer authenticates the generated one-time password within the blockchain. The load monitor will periodically evaluate the load at a specific AP if the user is authenticated. Using the connected users’ load, connectivity, and channel strength, this load monitor calculates a likelihood value.
The mathematical expression for the load at 𝑖 𝑡ℎAP is: 𝐴𝑃𝑖 (𝐿) = ∑ 𝐼𝑘 𝑘 𝑥 (3) The equation is utilized to determine each access pointsof individual load L, where k is the total number of Internet of Things users using that specific access point. The ratio of signal to noise (SNR), which shows if a signal is there in a channel, determines the channel’s strength. 𝐶𝑠 = 𝐵𝑙𝑜𝑔2 (1 + 𝑆𝑁𝑅) is the formula used to calculate the channel strength 𝐶𝑠 . 𝐶𝑠 = 𝐵𝑙𝑜𝑔2 (1 + 𝑆𝑁𝑅) (4) 𝐵 represents the channel’s bandwidth. These three are used to estimate a probability value, which is 𝑃𝐿 = (𝐴𝑃𝑖 (𝐿), 𝐶𝑢,𝐶𝑠 ) (5) Depending on the threshold, a threshold value between 0 and 1 is assigned to the load and channel strength. We move the user from serving AP to targeting AP based on the likelihood value. If its load is high, it will connect to the target AP; otherwise, it will stay connected to the source AP. Since the status report will be updated to reflect the target AP as soon as the authentication is successful in servicing the AP, frequent authentication during handover is not necessary. Packets are routed to various switches based on the connected access point.
3.3. Switch Selection and Flow Rule Matching
The flow table that the switches utilize is compared with the user packets. Typically, when a large number of flows come, the switches will overflow. Both a physical switch and a virtual switch make up the data plane in this 5G-SDN system. However, the virtual switch will only be established when there isn’t a single best switch to balance the flow of arriving packets. The HHO
method is used to choose the best switch, and a switch is chosen based on the estimated fitness value. Three important constraints—load degree, bandwidth, and flow entries—are used to calculate the fitness value. The mathematical formulation of the load balancing degree (𝐿𝐵𝐷) is as follows:
𝐿𝐵𝐷 = ∑ 𝑡𝑗 𝑚 𝑗 𝑚×𝐶𝑡 (6)
This degree is derived from 𝑡𝑗 , which shows how long it takes for flow 𝑗 to process, 𝑚, which is the total number of flows in the switch, and 𝐶𝑡 , which shows how long it takes for all m flows in the switch to finish. The available flow entries in a specific switch are then measured after accounting for the available bandwidth 𝐴𝐵. Every switch will have a predetermined number of flow entries; that is, the flow at switches can be permitted up to that limit; if it is exceeded, overflow happens. Each switch’s fitness value is determined by these three criteria and is provided as follows:
(𝑆1 , 𝑆2 , … , 𝑆𝑛) → (𝑓1 , 𝑓2 , … , 𝑓𝑛) (7)
Exploration and exploitation are the two stages of processing the HHO algorithm. This algorithm is based on how hawks attack rabbits in order to capture them. The Hawks 𝑋(𝑡 + 1) position vector is constructed as follows during the exploring phase:
𝑋(𝑡 + 1) = { 𝑋𝑟𝑎𝑛𝑑(𝑡) − 𝑟1 |𝑋𝑟𝑎𝑛𝑑(𝑡) − 2𝑟2𝑋(𝑡)| 𝑞 ≥ 0.5 (𝑋𝑟𝑎𝑏𝑏𝑖𝑡 (𝑡) − 𝑋𝑚(𝑡)) − 𝑟3 (𝑙𝑏 + 𝑟4 (𝑢𝑏 − 𝑙𝑏 )) 𝑞 < 0.5 (8)
Assuming that 𝑋(𝑡) represents the hawks’ position vector at time 𝑡, Equ. (8) is used to formulate the position vector for the following iteration, where 𝑋𝑟1 , 𝑟2 ,𝑟3 ,𝑟4 are defined as random integers. These random numbers have values in the interval [0,1]. Let 𝑋𝑟𝑎𝑛𝑑(𝑡) represent the hawks chosen at random from the total number of hawks𝑁, 𝑢𝑏 , and 𝑙𝑏 . represents the upper and lower bounds, and 𝑋𝑚 represents the average hawk position, which may be calculated analytically as
𝑋𝑚(𝑡) = 1 𝑁 ∑ 𝑋𝑖 (𝑡) 𝑁 𝑗=1 (9)
This rule is used to calculate the hawks’ average location. After the prey energy 𝐸 is predicted, the phase shifts from exploration to exploitation.
𝐸 = 2𝐸0 (1 − 𝑡 𝑇𝑀𝑎𝑥 ) (10)
𝑇𝑀𝑎𝑥 is the maximum number of iterations, and 𝐸0 is the prey’s energy at the beginning. In exploitation, either a soft or severe besiege is employed, depending on the energy value. Soft besiege is used when |𝐸| ≥ 0.5, while hard besiege is used for a position update if |𝐸| < 0.5. The expression for soft besiege
𝑋(𝑡 + 1)𝑆 And hard besiege 𝑋(𝑡 + 1)𝐻 is illustrated below, 𝑋(𝑡 + 1)𝑆 = ∆𝑋(𝑡) − 𝐸|𝐽𝑋𝑟𝑎𝑏𝑏𝑖𝑡 (𝑡) − 𝑋(𝑡)| (11)
𝑋(𝑡 + 1)𝐻 = 𝑋𝑟𝑎𝑏𝑏𝑖𝑡 (𝑡) − 𝐸|∆𝑋(𝑡)| (12) In this case, ∆𝑋(𝑡) = 𝑋𝑟𝑎𝑏𝑏𝑖𝑡 (𝑡) − 𝑋(𝑡),
where 𝐽 is the rabbit’s strength. The best switch selection process, which determines which switches receive the arrived flows, is described in the pseudocode above. For privacy, the flows are hashed and saved in the altered blockchain. To confirm the flow rules, every switch is linked to the blockchain. The linear blockchain structure has been replaced with a DAG one. Vertices and edges make up this DAG, with the edges directed toward.
the vertices. A cycle of blocks is not created in a modified blockchain; that is, although the blocks connect, they do not form the parent node as its edge. Assume that the built graph 𝐺 = (𝑉,𝐸) has 𝑉 vertices and 𝐸 edges [33]. The leaf nodes in DAG are sequentially labeled, and each node is represented with a distinct identity. Leaf nodes may or may not be present in every node. The nodes must preserve both the hashed packet flow and the user hash values in addition to the identification. First, the parent transactions are identified following a request for flow verification or authentication. After that, the block’s other transactions are verified. The new transaction is updated following verification. Security credential validation and flow rule verification are carried out. The packets are sent into the control plane for validation if the flow rule does not match. The appropriate application receives all of the matched flows. The SDN controllers verify the new flows from a certain user, and if the flow is unknown, a new flow rule is created and put into every switch. It is determined whether the new flows enter the data plane layer after deployment.
3.4. Based on Hexa-Features Two-Level Validation of Packets
To lessen single-point failure, the control plane layer is used with many controllers. To precisely forecast the packet’s behavior, the SDN controllers in this layer carry out two validation stages. Using the capsule network (CapsNet), miss-matched packets are classified as normal, suspicious, and malicious at the first level. The suspicious packets are then solely examined using Q-learning in the second stage, which determines if the packet is malicious or legitimate. The IP and port numbers of the source and destination, protocol, packet size, service, flow time, and flag are the features considered for first-level analysis. The second level, on the other hand, uses jitter, bandwidth, time-to-live (TTL), retransmission count, packet arrival time, and authentication score.
One type of deep learning network, known as CapsNet, makes use of loss estimations, primary capsules, and capsules in higher layers. An input matrix is used to characterize the incoming flow, and the weight values of each packet feature are assigned to it. To feed into the next layer, the first one takes the weighted values of each packet feature and stores them. In order to establish if a flow is malicious, suspicious, or normal, we add up all of the input vectors and use a weighted total. Regular packets are processed by the application layer, whereas malicious ones are dropped. We take into account the following packet characteristics: Port number and IP address: Protocol: Message size: Duration of flow and flagging service:
A convolution layer, primary capsule layer, digicaps layer, and output layer are all included in the architecture of this capsule network. The convolution layer redefines the packet features by extracting the six characteristics from each flow. The principal capsule layer then receives it as input. The summation and multiplication operations are used with the digicaps layer. The output layer is then fully connected and operated according to softmax. Consequently, this layer classifies the packet as malicious, suspicious, or normal.
CapsNet, A set of examples with different packet properties is used to train CapsNet. Based on the training results, incoming miss-matched packets are analyzed to determine their sort. If there are just malicious and legitimate packets, the packet analysis is terminated. In the second stage, any suspicious packets are analyzed using the reinforcement learning algorithm and features of user behavior. The reinforcement learning algorithm is a clever method of decision-making that defines an action according to the present situation. Each suspicious packet’s state is influenced by its jitter, bandwidth, retransmission count, TTL, authentication score, and packet arrival time. The activity of the particular user is reflected in these attributes. The totality of the features determines the user’s present condition. The related user information is gathered once it has been.
determined that the packet is suspicious. The behavior features examined in this work are Scores for authentication (𝐴𝑠 ), Packet arrival time (𝐴𝑝), Jitter(𝐽𝑒 ) ,TTL(𝑇𝑙 ), Bandwidth, and Retransmission count(𝑅𝑐 ).
Prior to making a decision, reinforcement learning learns the environment. The temporal differences that the agent measures are used to estimate the Q-values. With 𝑛 states 𝑆 represented as {𝑆1 , 𝑆2 , … . , 𝑆𝑛} and 𝑚 actions 𝑎 represented as {𝑎1 , 𝑎2 , … . , 𝑎𝑚}, a Q-table is produced. A packet’s states are determined by its behavior characteristics. The calculations of reward𝑟 will be based on the action for the relevant 𝑆. Each state is specified as 𝑆 = (𝐴𝑠 ,𝐴𝑝, 𝑇𝑙 ,𝑅𝑐 ,𝐽𝑒 ,𝐵) and their activities are classified as either normal or malevolent based on their unique characteristics. Let 𝑆𝑡Be the state that needs to act right now. 𝑎𝑡 with 𝑟𝑡 as the reward. The agents learn the policy 𝜋 in Qlearning from their surroundings, and the next state is defined as 𝑆𝑡+1 . The Bellman equation is used to define the Q-function, which can be written as
𝑄 𝜋(𝑆𝑡 , 𝑎𝑡 ) = 𝐸[𝑟𝑡+1 + 𝛾𝑟𝑡+2 + 𝛾 2 𝑟𝑡+3 … |𝑆𝑡 , 𝑎𝑡 |] (13) 𝛾 is the discount rate, then this Q-function is updated from the following as 𝑄 ∗(𝑆, 𝑎), 𝑄 ∗(𝑆, 𝑎) = 𝑄(𝑆, 𝑎) + 𝛼[𝑟(𝑆, 𝑎) + 𝛾𝑚𝑎𝑥𝑄 ′(𝑆 ′ , 𝑎 ′) − 𝑄(𝑆, 𝑎)](14)
The current state, action pair, and 𝛾𝑚𝑎𝑥𝑄 ′(𝑆 ′ , 𝑎 ′) are represented as 𝑄(𝑆, 𝑎). specifies the highest predicted reward that will be granted for the new action 𝑎 ′ and the new state 𝑆 ′ . The learning rate is denoted by 𝛼. Only when there are suspicious packets is the second level of packet analysis carried out. By analyzing the flows, the suggested SDN multi-controllers protect the network from malicious flows. In order to match the arrival of new flows in the data plane, a new rule is written and installed in switches upon identifying the malicious packets.
Figure 1. LLModBloc in 5G-SDN
4.SIMULATION ENVIRONMENT
This section examines the development of the designed 5G-SDN system paradigm. The system’s performance is assessed based on the network design. This part emphasizes the significance of the suggested research and is divided into two categories: comparative analysis and simulation environment. The effectiveness of the suggested 5G-SDN architecture is supported by this simulation system component.
4.1. Simulation Setup
The ns3.26 version of the network simulator utility implements the suggested 5G-SDN network. Network modules and technologies can be incorporated into network simulators. The Ubuntu 14.04 LTS operating system comes with this ns3.26 installed. A dual-core processor, 2GB of RAM, and 32-bit support are utilized to help the operating system. SDN controllers {𝑐𝑡1 , 𝑐𝑡2 , 𝑐𝑡3 } OpenFlow switches {𝑠𝑤1 , 𝑠𝑤2 , … , 𝑠𝑤8 } and 5G IoT users {𝑖1 ,𝑖2 , 𝑖3 , … , 𝑖50}make up the system. This arrangement of the network’s entities serves as the foundation for the network’s construction. OpenFlow switches, 5G specs, and SDN configuration modules for the SDN controller are all included.The suggested system is stacked and processed using packet analysis, flow rule verification, and authentication handover by this simulation scenario. Python code is used to run the algorithms after they have been built in the C++ programming language. To maintain network environment security, each layer is run according to the appropriate processing techniques. First, the OTP generation and lightweight QUARK algorithm are integrated into the edge layer that is connected to the blockchain for authentication. Next, a threshold probability is assigned to the 5G AP in order to balance the load at the edge layer.
Second, after being assigned to a switch chosen by the HHO algorithm, the flow rules are validated in the blockchain. After assessing the switch’s capability, this method receives the incoming packet. In order to precisely forecast the malicious packet that has entered the network, the packets are next examined using two distinct six features on two different approaches in the third step. While the malicious packet will be dropped by the network entities within the network itself, all matched flows will be sent to the appropriate service in accordance with the request. While the IoT users are either authentic or fraudulent, the basic network components—AP, validator, switches, and controllers—are regarded as trustworthy in this work. Not every authorized user submits with a typical packet; some infected users create malicious packets that utilize more resources and certainly impair network performance.
4.2. Comparative Analysis
The comparative analysis is performed to evaluate the efficacy of the proposed 5G-SDN compared to previous research. to evaluate this proposed system’s higher performance.
4.2.1. Bandwidth Consumption
The performance of bandwidth consumption in response to an increase in authentication requests is shown in Figure 2.Comparative results show that the suggested LLModBloc uses less bandwidth since it uses a modified blockchain structure that uses DAG in block generation.
Figure 2. Comparison of bandwidth consumption
4.2.2. Authentication Time
The time required to confirm a user’s identity by examining their credentials is known as the authentication time. Figure 3 displays the results of comparing the authentication time to the arrival of requests. Although the suggested LLModBloc uses computationally constrained lightweight techniques, it also protects the security credential’s secrecy. The main factor reducing the authentication time compared to the current works is the adoption of a lightweight method. Due to its flexibility, blockchain authentication speeds up authentication for larger packet requests. In LLModBloc, the average estimated time for authentication is 1 s, while in CPPHA and authentication handover, it is 1.7 s and 2.3 s, respectively. The processing time will be minimal even if the packet size is raised.
Figure 3. Comparison of authentication time
4.2.3. Delay and Response Time
One crucial performance indicator that gauges the time needed to process data is delay. Figure 4 compares the delays for proposed and current works. By using a load-balanced edge layer, switch selection, a modified blockchain, and lightweight algorithm-based authentication, the suggested LLModBloc reduces latency. Figure 5 illustrates the results of minimizing delay, which also significantly lowers response time. This is the time needed to handle a request that has arrived. The response time will be longer if there is a greater delay in packet processing.
Figure 4. Comparison of delay
Figure 5.Comparison of response time
4.2.4. Packet Loss
In a network, packet loss is a critical parameter,Figure 6 shows the results of evaluating packet loss performance to expand the number of IoT users.
Figure 6.Comparison of packet loss
4.2.5. Detection Accuracy
The precision with which malicious packets are identified as they enter the network is known as detection accuracy. This work’s primary goal is to identify malicious or regular packets in order to maintain network security.Figure 7 shows the attack prediction which determines the detection accuracy.
Figure 7.Comparison of detection accuracy
4.3. Comparison of LLModBloc with Related Literature
4.3.1. Key Features and Enhancements
The LLModBloc architecture introduces several advanced features that differentiate it from the
existing methods in the literature as given in Table 1.
Table 1.Feature differences between LLModBloc and Literature
4.3.2. Comparative Metrics
To quantify the differences, LLModBloc is compared with contemporary methods across several
performance metrics as given in Table 2.
Table 2.Metrics Comparison
4.3.3. Innovation and Performance Outcomes
The innovation and performance outcomes of the proposed work are listed below as:
Authentication Mechanism: LLModBloc interprets HiAuth and CPPHA as substandard as it is able to combine lightweight cryptographic techniques customized integrated with physical unclonable function (PUF) and finger vein biometrics without incurring an additional computational cost.
Blockchain Scalability: LLModBloc is able to eliminate the issues of conventional blockchain and nips in the bud the decentralization of a single ledger while at the same time increasing the throughput significantly, this beats the linear blockchains of HiAuth and CPPHA
Advanced Machine Learning: For packet classification CapsNet in a multi-class configuration along with Q-learning for reinforcement-based validation resolves the classification problems experienced with HF-ANN and SVM methods.
In Figures (2-7) LLModBloc has outperformed other approaches on the specific parameters like
authentication time, bandwidth utilization, detection performance and latency. These
enhancements indicate LLModBloc is fit for purpose for future proof 5G/6G specifications. The
LLModBloc’s Main Finding are the following:
4.4. Novelty of the Proposed LLModBloc
The LLModBloc is introducing new ways of doing things which makes it unique in the context of 5G/SDN network security as compared to all the other methods and solutions available today. What is new and innovative is the formation of new technologies into more advanced systems and incorporation of new frameworks that have some of the aforementioned systems adjusted to the requirements that are posed in multiservice networks. The key novelties are given in Table 3.
Table 3.Key Novelties of Proposed LLModBloc
4.5. Limitations of the Proposed LLModBloc System
While the LLModBloc system significantly enhances the security of 5G/SDN networks, it is
important to consider its limitations and potential for improvement. Addressing those issues not
only enriches the research but also makes foundations for future works. The limitations are:
Computational overhead in advanced techniques
Dependency on biometric data
Energy consumption in multi-layered processing
Initial deployment costs
5.CONCLUSION
The proposed LLModBloc presents a transformative solution for addressing critical security and efficiency challenges in SDN-enabled 5G and beyond networks. By integrating advanced features such as DAG-based blockchain, lightweight authentication mechanisms, and CapsNet-Qlearning-based packet classification, LLModBloc demonstrates higher performance in reducing bandwidth consumption, minimizing latency, enhancing detection accuracy, and ensuring robust scalability. The experimental results highlight the system’s ability to:First, significantly reduce authentication time through the use of lightweight QUARK hashing and optimized blockchain structures. Second, minimize delay and packet loss with real-time load balancing and Harris Hawks Optimization (HHO)-based switch selection. Third, enhance detection accuracy by combining deep learning and reinforcement learning for packet analysis. Forth, improve scalability by addressing blockchain limitations with a DAG-based structure.
Compared to existing methods, LLModBloc achieves higher efficiency and security, making it a practical choice for real-world applications such as IoT ecosystems, industrial automation, and critical infrastructure protection. Its ability to handle massive user connections, adapt to dynamic network conditions, and ensure low-latency communication positions it as a foundational architecture for 6G and future networks.
CONFLICTS OF INTEREST
The authors declare no conflict of interest
ACKNOWLEDGEMENTS
The authors would like to express their warm gratitude to both University of Kirkuk and University of Mosulfor their support and contributions to this research.
REFERENCES
[1] Stefan Schwarz, Blanca Ramos Elbal, Erich Zöchmann, Ljiljana MArijanovic, Stefan Pratschnere, “Dependable wireless connectivity: insights and methods for 5G and beyond”, Springer, pp 449 – 455, 2018.
[2] Xinsheng Ji, Kaizhi Huang, Liang Jin, Hongbo Tang, Caixia Liu, Zhou Zhong, Wei You, Xiaoming Xu, Hua Zhao, Jiangxing Wu, Ming Yi, “Overview of 5G security technology”, Science China Information Sciences, Springer, 2018.
[3] Muhammad Nauman Irshad, Liping Du, Imran Ali Khoso, Talha Bin Javed, Muhammad Muzamil Aslam, “A Hybrid Solution of SDN Architecture for 5G Mobile Communication to Improve Data Rate Transmission”, 28th Wireless and Optical Communications Conference (WOCC), 2019.
[4] Lu Ma, Xiangming Wen, Luhan Wang, Zhaoming Lu, Raymond Knopp, “An SDN/NFV based framework for management and deployment of service based 5G core network”, China Communications, Vol. 15, No. 10, pp. 86 – 98, 2018.
[5] Zainab Zaidi, VasillisFriderikos, Zarrar Yousaf, Simon Fletcher, Mischa Dohler, Hamid Aghvami, “Will SDN Be Part of 5G?”, IEEE Communications Surveys & Tutorials, Vol. 20, No. 4, pp. 3220 – 3258, 2018.
[6] SanhapitPhatratipakorn, PongsatomSedtheetom, “Design of SDN concept for 5G Access Network”, 19th International Symposium on Communications and Technologies (ISCIT), 2019.
[7] Bego Blanco, Jose Oscar Fajardo, loannisGiannoulakis, EnmanouliKafetzakis, Shuping Peng, Jordi JordiPérez-Romero, Irena Trajkovska, Pouria S. Khodashenas, Leonardo Goratti, Michele Paloino, Evangelos Sfakianakis, Fidel Liberal, George Xilouris, “Technology pillars in the architecture of future 5G mobile networks: NFV, MEC and SDN”, Computer Standrads& Interfaces, Elsevier, Vol. 54, No. 4, pp. 216 – 228, 2017.
[8] Rabia Khan, Pradeep Kumar, Dushantha Nalin K. Jayakody, Madhusanka Liyanage, “A survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions”, IEEE Communications Surveys & Tutorials, Vol. 22, No. 1, pp. 196 – 248, 2019.
[9] Hui Yang, Yongshen Liang, Jiaqi Yuan, Qiuyan Yao, Ao Yu, Jie Zhang, “Distributed Blockchainbased Trusted Multi-domain Collaboration for Mobile Edge Computing in 5G and beyond”, IEEE Transactions on Industrial Informatics, 2020.
[10] Pal VArga, Jozsef Peto, Attila Franko, Davi Balla, David Haja, Ferenc Janky, Gabor Soos, Daniel Ficzere, MarkoszMaliosz, Laszlo Toka, “5G support for Industrial IoT Applications-Challenges, Solutions, and Research gaps”, Sensors, MDPI, 2020.
[11] Zhedan Shao, Xiaorong Zhu, Alexander M.M. Chikuvanyanga, Hongbo Zhu, “Blockchain-Based SDN Security Guaranteeing Algorithm and Analysis Model”, International Conference on Wireless and Satellite Systems, Wireless and Satellite Systems, pp. 348 – 362, 2019.
[12] Upul Jayasinghe, Gyu Myoung Lee, Áine MacDermott, Woo Seop Rhee, “TrustChain: A Privacy Preserving Blockchain with Edge Computing”, Wireless Communication and Mobile Computing, Hindawi, 2019.
[13] Hani Alquhayz, Nasser Alalwan, Ahmed Ibrahim Alzahrani, Ali H.Al-Bayatti, Mhd Saeed Sharif, “Policy-Based Security Management System for 5G Heterogeneous Networks”, Recent Advances in Security and Privacy Issues for Internet of Things Applications, Wireless Communications and Mobile Computing, 2019.
[14] Othmane Blial, Mouad Ben Mamoun, Redouane Benaini, “An Overview on SDN Architectures with Multiple Controllers”, Journal of Computer Networks and Communications, Hindawi, 2016.
[15] Sikandar Ejaz, Zeshan Iqbal, Peer Azmat Shah, Bilal Haider Bukhari, Armughan Ali, Farhan Aadil, “Traffic Load Balancing Using Software Defined Networking (SDN) controller as Virtualized Network Function”, IEEE Access, Vol. 7, pp. 46646 – 46658, 2019.
[16] Fouad Ali Yaseen, Hamed S. Al-Raweshidy, “Smart Virtualization Packets Forwarding During Handover for Beyond 5G Networks”, IEEE Access, Vol 7, pp. 65766 – 65780, 2019.
[17] Guowei Wu, Jinlei Wang, Mohammad S. Obaidat, Lin Yao, Kuei-Fang Hsiao, “Dynamic switch migration with noncooperative game towards control plane scalability in SDN”, International Journal of Communication systems, Vol. 32, No. 7, 2019.
[18] Ihsan Abdulqadder, Deqing Zou, Israa Aziz, Bin Yuan, Weiqi Dai, “Deployment of Robust Security Scheme In SDN Based 5G Network Over NFV Enabled Cloud Environment”, IEEE Transactions on Emerging Topics in Computing, 2018. International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.1, January 2025 98
[19] Tri Gia Nguyen, Trung V. Phan, Binh T. Nguyen, Chakchai So-In, Zubair Ahmed Baig, Surasak, Sanguanpong, “SeArch: A Collaborative and Intelligent NIDS Architecture for SDN-Based Cloud IoT Networks”, IEEE Access, Vol 7, pp. 107678 – 807694, 2019.
[20] Reneilson Santos, Danilo Souza, Walter Santo, Admilson Ribeiro, Edward Moreno, “Machine learning algorithms to detect DDoS attacks in SDN”, Concurrency and Computation Practice and Experience, Wiley Online Library, 2019.
[21] Liuwei Huo, Dingde Jiang, Sheng Qi, Lei Miao, “A Blockchain-Based Security Traffic Measurement Approach to Software Defined Networking”, Mobile Networks and Application, Springer, 2020.
[22] Faizullah, Safiullah & Khan, M & Alzahrani, Ali & Khan, Imdadullah, “Permissioned BlockchainBased Security for SDN in IoT Cloud Networks”, Interfernce Conference on Advances in the Emerging Computing Technologies (AECT), 2020.
[23] Osamah Ibrahiem Abdullaziz, Li-Chun Wang, Yu-Jia Chen, “HiAuth: Hidden Authentication for Protecting Software Defined Networks”, IEEE Transactions on Network and Service Management, vol 16, No 2, pp. 618 – 631, 2019.
[24] Jin Cao, Maode Ma, Yulong Fu, Hui Li, Yinghui Zhang, “CPPHA: Capability-based PrivacyProtection Handover Authentication Mechanism for SDN-based 5G HetNets”, IEEE Transactions on Dependable and Secure Computing, 2019.
[25] Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo, “Blockchainenabled Authentication Handover with Efficient Privacy Protection In SDN-based 5G Networks”, IEEE Transactions on Network Science and Engineering, 2019.
[26] Mehran Pourvahab, Gholamhossein Ekbatanifard, “An Efficient Forensics Architecture in SoftwareDefined Networking-IoT Using Blockchain Technology”, IEEE Access, vol 7, pp. 99573 – 99588, 2019.
[27] Prabhakar Krishnan, Subhasri Duttagupta, Krinshnashree Achuthan, “SDNFV Based Threat Monitoring and Security Framework for Multi-Access Edge Computing Infrastructure”, Mobile Networks and Applications, Springer, pp. 1896 – 1923, 2019.
[28] Trng V. Phan, Minho Park, “Efficient Distributed Denial-of-Service Attack Defense in SDN-Based Cloud”, IEEE Access, Vol 7, pp. 18701 – 18714.
[29] Songma, Surasit, WatcharakornNetharn, and SiriluckLorpunmanee. “Extending Network Intrusion Detection with Enhanced Particle Swarm Optimization Techniques.” International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.4, July 2024.
[30] I. H. Abdulqadder, I. T. Aziz, and D. Zou, “DT-Block: Adaptive vertical federated reinforcement learning scheme for secure and efficient communication in 6G,” Comput. Netw., vol. 254, p. 110841, 2024.
[31] Karimy, Aziz Ullah, and P. Chandrasekhar Reddy. “Enhancing Iot Security: Anovel Approach With Federated Learning and Differential Privacy Integration.”International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.4, July 2024.
[32] I. O. Lopes, D. Zou, I. H. Abdulqadder, S. Akbar, Z. Li, F. Ruambo, and W. Pereira, “Network intrusion detection based on the temporal convolutional model,” Comput. Secur., vol. 135, p. 103465, 2023.
[33] Xu Wang, Guohua Gan, Ling-Yun Wu, “Framework and algorithms for identifying honest blocks in blockchain”, PLOS ONE, 2020.
AUTHORS
Ihsan H. Abdulqadder received a BSc. Degree in Electrical Engineering from Baghdad University, Baghdad, Iraq in 2004, M.Sc. Degree in Computer Science — Computers, Information, and Network Security from DePaul University, Chicago, USA, in 2010, Ph.D. in Cyberspace Security from Huazhong University of Science and Technology, Wuhan, Hubei, China in 2018. And a Postdoc at the University of Electronic Science and Technology of China from 2019 to 2021, has worked in many positions such as on network switching subsystems, project manager, consultant, core network engineer, trainer, and as a faculty member in a computer science department. He is currently a lecturer at the Department of Computer Science, University of Kirkuk, His research interests include security in SDN, NFV, and cloud computing in 5G/B5G and 6G core Networks.
Israa T. Aziz received her B.Tech. Degree in Computer Engineering from Mosul Technical College, Mosul, Iraq in 2007. She received her M.Tech Degree in Computer Engineering from Sam Higginbottom University of Agriculture, Technology and Sciences, Allahabad, India in 2014. She received her Ph.D. degree in Computer Engineering from Huazhong University of Science and Technology, Wuhan, China in 2020. Currently, she is a Lecturer with the University of Mosul, Mosul, Iraq. She has several national and international publications in her credit. Her research interests include computer security and smart grids security.