You are on page 1of 13

Computers and Electrical Engineering 104 (2022) 108434

Contents lists available at ScienceDirect

Computers and Electrical Engineering


journal homepage: www.elsevier.com/locate/compeleceng

An optimization-based machine learning technique for smart


home security using 5G
Vidhu Kiran Sharma a, Srikanta Kumar Mohapatra a, S Shitharth b, *, Saud Yonbawi c,
Ayman Yafoz d, Sultan Alahmari e
a
Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India
b
Department of Computer Science and Engineering, Kebri Dehar University, Kebri Dehar, Ethiopia
c
Department of Software Engineering, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia
d
Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia
e
King Abdul Aziz City for Science and Technology, Riyadh, Saudi Arabia

A R T I C L E I N F O A B S T R A C T

Keywords: Generally, cellular networks are divided into discrete geographic zones where a secure routing
Mobile node protocol is important. In this study, Sailfish-based Distributed IP Mobility Management (SbDMM)
Secure routing architecture for security protocol in a smart home using 5G is suggested. Smart homes first
Cipher key
gathered data via IoT devices which are then communicated with the use of a Home Gateway
Smart homes
Mobility
(HGW). Mobile Nodes (MN) and Corresponding Nodes (CN) process data communication (CN). In
IoT application addition, the acquired data are encrypted and secured using the session key. Additionally, use an
5G network authenticated key and a cipher key to secure the routing optimization. As a result, the fitness of
Data transmission sailfish is updated in a protocol path that is optimized for securing data from attackers. The
designed framework is then implemented in Python and the obtained results are compared to
those of other methodologies in terms of execution time, confidentiality rate, efficiency, delay,
and task completion.

1. Introduction

5G is a standard fifth-generation technology for broadband cellular systems that was launched and coordinated globally in 2019 by
cellular phone providers. It supersedes 4G, 3G, and 2G and is set to offer increased download speeds, faster data transfer, and less
latency for mobile network users [1]. The planned successor of 4G networks offers connectivity in the utmost current cell phones.
Moreover, 5G networks are predicted more than 1.7 billion subscribers worldwide through 2025 [2,3]. Generally, 5G networks are the
cellular networks that are the service area divided into a minor geographical area known as cells [4]. Additionally, every wireless
device of 5G cells is connected to the telephone network and internet with radio waves by the cells of the local antenna [5]. It has the
advantage of high download speed, faster-to-connect devices, and greater bandwidth [6]. It is the faster network that improves the
services and quality of internet services [7]. By increasing bandwidth, a network of the internet has been increased that are used to
enhance the Internet Service Provider (ISP) for computer, desktop, and laptops [8]. The IoT application used for 5G is shown in Fig. 1.
Consequently, the 5G network is 100 times faster than the 4G network which generates opportunities for business and people [9]. It
has the benefits of low latency, greater bandwidth; enhance experiences, and high-speed connectivity [10]. The 5G is useful for

* Corresponding author.
E-mail address: shitharths@kdu.edu.et (S. Shitharth).

https://doi.org/10.1016/j.compeleceng.2022.108434
Received 17 May 2022; Received in revised form 30 September 2022; Accepted 17 October 2022
Available online 4 November 2022
0045-7906/© 2022 Published by Elsevier Ltd.
V. Kiran Sharma et al. Computers and Electrical Engineering 104 (2022) 108434

Fig. 1. Security of 5G network in IoT.

creating a safer, sustainable, and smarter future. Generally, Distributed Mobility Management (DMM) is used to identify the solution of
IP address and also takes the optimal route of the traffic of correspondence node and between mobile [11,12]. The main aim of the
DMM is maintenance, activity, and transparency above the IP layer. Moreover, it is one of the current alternative patterns to develop IP
mobility management for addressing the problems of centralized mobility management [13,14]. Additionally, network mobility
management is an accepted significant factor in the 5G period because of shrinkage cell coverage and fast speed [15]. Subsequently,
DMM is the flat structure that attains the best performance in fault tolerance and efficiency by reducing the distance between service
networks and the mobile device also the centralized anchor. But the DMM contains some security issues because of excessive
dependence on the layer it becomes more vulnerable.
Especially, mobility management is used to enable every mobile node for getting online regardless of location and movements. By
using the 5G era, increasing the expectation of innovative applications also overcomes and runs towards existing limitations. More­
over, mobility management is needed to emerge smart home networks that support anywhere, anytime remote access to applications
and sensors (home IoT) using user mobile devices. The smart homes of 5G networks count the DMM for allowing mobile nodes; remote
access also controls the corresponding nodes. The main issues for remote access are critical attacks that are easily controlled and access
the smart home devices. So it has essential to secure and send the user data by an optimized path, consequently, secure routing is more
important in smart homes. There are many security protocols designed to overcome the issues but still have the issues of less scal­
ability, low speed, and threats. Hence, this study designs an optimization-based machine learning technique with a DMM system for
security protocol in the smart home.
The research is structured such that Section 2 explains literature reviews based on 5G, Section 3 defines the system model and
difficulties, Section 4 describes a suggested approach and its process, Section 5 explains the results of the proposed scale model, and
Section 6 concluded the claims by obtaining better results in terms of execution time, confidentiality rate, efficiency, delay, and task
completion.
The key contribution of the developed work is detailed below,

• Secure the routing protocol involves two sections such as route initialization and route handover.
• Network operator of MN offers the SH cloud service for supporting the DMM.
• Then the subscriber of MN users of SH cloud service establishes a relationship of trust between their home network.
• Next, DMM-based mobile networks are run based on the established cloud service.
• In the initial enrolment, user HGW shares the information with an authentication key and cipher keys through CMD.
• The fitness of sailfish is updated in the CMD to secure the routing also it will enhance the confidentiality, and integrity of the data.
• Subsequently, the communication between the MGW is secured and protected using the fitness of sailfish.
• Finally, attained results of the developed techniques are compared with other existing techniques such as execution time, delay,
task completion, and so on.

2. Related works

Some recent literature survey based on the fifth generation is detailed below,
In this research [16], authors have worked on leaf control diseases and reducing agricultural hazards through intelligent farming.
They have used 5G-based IoT by using an android app. They deliver the best accuracy in detecting hazards based on wireless IoT
sensors. This article shows that fifth-generation technology is also vital in the Agri sector.
Internet is converging by versatile remote networks consequently it has encountered various difficulties and also needs different
expansions to essential mobile protocols. The research [17] proposed self-organized DMM for the mobility of next-generation protocol.
Furthermore, the developed self-organized network framework is arranged also respected through a predefined deep learning algo­
rithm, however, the attack rate is high.
In research [18] developed a new roaming network framework for the 5G network with permission blockchain through smart
contracts. Moreover, the developed framework increases the visibility of the mobile network through the activities of subscribers

2
V. Kiran Sharma et al. Computers and Electrical Engineering 104 (2022) 108434
Fig. 2. Basic system model of IoT based smart home.
3
V. Kiran Sharma et al. Computers and Electrical Engineering 104 (2022) 108434
Fig. 3. Design of smart home using 5G for security protocol.
4
V. Kiran Sharma et al. Computers and Electrical Engineering 104 (2022) 108434

visiting the network. Furthermore, the designed model allows quick payment and minimizes fraudulent transactions. But it has the
problem of a single failure of point.
The identification and authentication of device location are highly needed for verifying communication through the open channel.
The research [19] proposed a blockchain-based IoT device for accessing authenticated entities also reduce the computation cost.
Moreover, the security analysis of the developed protocol is secured against attack. Furthermore, offering better performance also
secured additional features but the threat rate is high. In research, [20] developed DMM based security protocol for offering mutual
authentication, flawless forward secrete, privacy protection, and key exchange. Thus the security of the designed model is verified with
two formal securities analysis tools. While comparing other techniques proposed protocol attains better performance but the
computation cost is high and less reliable.
Nowadays, the smart grid is one of the important techniques that monitor and control real-time electricity consumption. In this
research [21], proposed a cloud fog-based framework for processing the request which is coming from the SH. Thus the developed
technique attains better performance for quick response and low cost. All the SH offer secure communication with a 5G network but
transmission loss is occur during communication. In this research [22], developed a turbo electric nano generator-based self-powered
system for offering the possibility to realize self-sustainable and low power. Moreover, Human Machine Interfaces are utilized to
convert biomechanical energies into valuable sensory information. Thus the developed technique successfully develops different forms
of HMI containing glasses, electronic skin, gloves, touch pads, and so on. However, the price of the developed technique is high
compared to other techniques.
The internet speed is increased with the introduction of 4G and 5G network which is used for network communication, IoT
application, and so on. The study [23], developed a random neural network-based block chain model for identifying the user with a
secure key. Furthermore, attackers have easily tracked user information through confidential identity. The developed technique en­
hances security, and connectivity but the error rate is high.

3. System model and problem definition

Nowadays, smart homes are the wireless/wired network that manages the internal devices of the house through communication
among internal IoT devices, external devices, and using remote controllers. Especially, the communication of IoT devices is processed
using an external cloud server by the internet through a gateway also communicated by other devices like the user Smartphone. Secure
communication of the message of a smart home is more essential from attacks also personal privacy is more important to secure data.
Moreover, the basic system model of smart homes is shown in Fig. 2.
Additionally, the TTP is overhead for handling the user data and also avoids a single point of failure while generating attacks.
Generally, verification and authenticated public-key protocol is used to minimize the single point error through distributing burdens.
But it has the problem of error rate, less scalability, high cost, and problem in routing. There are many techniques are developed to
overcome the issues of routing security but still having the issues of attacks, threats, and less scalability because of the low-speed
network, large computation time, and problem to deliver information. These problems are motivated to design a machine learning-
based DMM framework using 5G for enhancing the security of routing.

4. Proposed methodology

In recent years, Smart Homes (SH) are more essential for securing the communication between Mobile Nodes (MN) and home IoT
devices. Moreover, the security of smart homes systematically covers data security to the channel. Furthermore, cloud computing
supports smart homes by organizing various platforms. A novel Sailfish-based DMM (SbDMM) framework is proposed to secure the
route optimization protocol. The architecture of the proposed methodology is shown in Fig. 3.
Initially, smart homes collected information using IoT devices is gathered and they are communicated with the help of Home
Gateway (HGW). The data communication is processed between Mobile Nodes (MN) and Corresponding Nodes (CN). The collected
information is communicated with two intermediary entities such as Mobility gateway (MGW) and Context Mobility Database (CMD).
As well, MN is communicated with CN through their movements and locations. Also, HGW is serving as a bridge to communicate
external MN and home IoT devices. Finally, the data are transmitted securely by the optimized path also MGW and HGW equally
authenticate each other while presenting attacks. Consequently, the fitness of sailfish [23] is updated in the optimized protocol path for
securing our data from attacks. Also, identify the best network position to transmit the data at high speed.

4.1. DMM for secure routing

It is a flat design and aims for pushing the traffic routing and function of location management to the network access level.
Moreover, MGW is a server to access the router which supports addressing the location management and allocation function.
Furthermore, MN is moved to their network also newly generate MGW did not allocate the network to the MN but performed location
updating using the old MGW. It will lead to establishing a bi-directional tunnel through MN’s intended traffic which is forwarded from
the old MGW to the new MGW. Consequently, enhanced traffic load balance is attained by data plane decentralization.

4.2. Process of SBDMM framework

Securing the routing protocol involves two sections such as route initialization (Rint )and route handover(Rhd). The network

5
V. Kiran Sharma et al. Computers and Electrical Engineering 104 (2022) 108434

Fig. 4. Route initialization phase.

operator of MN offers the SH cloud service for supporting the DMM. Then the subscriber of MN users of SH cloud service establishes a
relationship of trust between their home network. Hereafter, DMM-based mobile networks are run based on the established cloud
service. In the initial enrolment, user HGW shares the information with an authentication keyAKHC and cipher keysCKHC through CMD.
Through the first enrolment, the policy of route optimization is configured between all HGW and DMM also the DMM-based mobile
networks are secured using MGW and CMD. The fitness of sailfish is updated in the CMD to secure the routing also it will enhance the
confidentiality, and integrity of the data. Subsequently, the communication between the MGW is secured and protected using the
fitness of sailfish. MN is the significant route optimization to handover information securely by transmitting present MGW to sub­
sequent MGW. The route optimization initialization and handover phase are detailed below:

• Route initialization (Rint ) phase

The main aim of initializing route optimization is to secure data between the SH network and MN. For this purpose, the long-term
secret key is generated such asAKHC and CKHC which is pre-shared among CMD and HGW. Initially, the communication transmitted
among MN and CN that is SH IoT devices information is communicated using HGW. In this process, HGW monitors the data traffic
based on the appropriate route optimization of MN. Based on the decision it decides whether route optimization is needed or not. If
route optimization is needed means HGW starts theRint phase. Hereafter, CMD checks the policy of MN route optimization by their
processed request then the available information are gathered from the policy store like both MGW and HGW information (address of
MGW and HGW,AKHC,CKHC.SKMGW) that are associated by MN. The initialization of route optimization is detailed in Fig. 4.
Steps of Rint phase
While route optimization is needed means HGW starts the phase through sending req messgae HC Auth that contains HGW ID
andEmsg1. Moreover, HGW is used forAKHCfor encrypting the values such asHGW ID,MN ID,Ni,TSi,and hm1intoEmsg1. After that
randomly generate and prepare the nonce Ni and time stampTSi. The computing of route optimization is obtained using Eq. (1)
hm1 = hmac (AKHC , HGW ID‖ MN ID ‖‖ N1 ‖‖ TSi ‖) (1)
Generally, MN is acting as a privacy hold for MN ID is encrypted. While receiving the message, first CMD gets two secrete key­
sAKHCand CKHC overHGW ID. Then decrypt Emsg1withCKHC. Subsequently developed technique checks theHGW ID andMN ID that
valid uptoTSi and verified byCKHC. Thus the verification is satisfied means CMD continuously authenticates HGW based on the two
secrete keys.
After the verificationreq messgae HM Auth, CMD casually generatesN2 and creates the session key SKRin is computed using Eq. (2)
hm2 = hmac (AKHC , CMD ID‖ MGW ID ‖‖ MN ID ‖‖ N1 N2 ‖‖ THGW ‖) (2)
By the arrival of the message through the 5G network, HGW verifies the matches of the nonce to the original send information.
Moreover, verification is positive means CMD authentication also prevents attacks with the help of nonce.
Additionally, HGW computes SKRin and casually produces nonceN3. It generates the private key Prk also measures the corre­
sponding public keyPuk. Afterward, HGW computes the information to the MGW for checking the time stamp. They decrypt infor­
mation through the identification ofMN ID, andCMD ID. Then the request of the route optimization is allowed with CMD. By applying
the session key it is verified and successfully authenticated.
Finally, updating the fitness of sailfish is the responding layer for identifying the position and tracking the attacks present in the

6
V. Kiran Sharma et al. Computers and Electrical Engineering 104 (2022) 108434

Fig. 5. Route handover phase.

network. The main aim of sailfish optimization is hunting the prey based on the identified location and position. The purpose of using
this optimization is to secure the information from attacks or threats by identifying the position and location of attacks. Consequently,
HGW is responding through confirm messgae HM Auth. The MGW has validated by their last message also the keys are exchanged
successfully and secured. At last, confirm the message and be ready for the secure routing optimization.

• Route handover(Rhd) phase

Thus the initialized routing optimization continuously supports the MN transfer from one MGW to the next MGW. For securing the
routing, a new MGW is generated that moves the MN securely using the session key of CMD. That mainly depends on the key for
performing key exchange and mutual authentication through MN and HGW. The routing handover phase is shown in Fig. 5.
Steps of Rhd phase
The MGW transmitscontext mobility req message to the CMD and the corresponding DMM protocol which includes the address and
ID of the previous MGW. While receiving the request of the information from the MGW, CMD updates the status of networkconnec­
tionthrough setting and serving MN associate, a record of MGW, ID, and address of new MGW. Moreover, generate the timestamp and
session key usinghmac (AKHC , HGW ID ‖ MGW ID ‖‖ SK ‖‖ TSi ‖). Earlier handling the handover of MN, MGW is used to update the
request of tunneling for transmission of data traffic of MN throughMGWn − 1.
Consequently,MGWn − 1 continuously generate the time stamp and calculate the hmac value. Thus the calculation is obtained using
Eq. (3)
hm1 = hmac (MSKn− 1 , MGW ID‖ MGW ID ‖‖ TSi ‖) (3)
After that, preparing for the request of tunneling and the arrival of the message initially checks the timestamp. Whether it is positive
means request to binding update which continuously supports the routing optimization. If it is valid, create a random nonce by
computing the session key. At this stage, messages related to hmac values are handover to the MGW. Generally,req messgae HM Auth is
a received mean verify and valid the session key based on the timestamps. Thus the hmac value is correct; HGW sends the information to
the new MGW for handover MN also route optimization. Finally, the handover process is concluded by sending HGW in
confirm messgae HM Auth to the HM. Thus the designed framework successfully verifies MGW and authenticated HGW. Finally, in­
formation is secured using CMD also enhances the packet delivery rate using the 5G network.
The developed framework targets some security requirements such as mutual authentication, key exchange, privacy defense
against attacks, and perfect forward secrecy. Moreover, MGW and HGW continuously authenticate each other also secure the infor­
mation by the session key. It can protect route optimization during data transmission. The data transmission between CN and MN is
critical so a session key is employed for protecting transmission by accurate forward secrecy. Furthermore, MN identifies the attacks by
exchanging their HGW and MGW in CMD.

5. Results and discussions

In this section, for securing routing in wireless networks proposed a new DMM-based optimization framework, and implemented in
python. Initially, user information is transmitted using the MN and CN through HGW. Then encrypt the data by their private, public,

7
V. Kiran Sharma et al. Computers and Electrical Engineering 104 (2022) 108434

Table 1
Comparison of execution time.
Task Execution time (s)

BMK SO-DMM BIoT ESP Proposed

10 13 25 20 32 5
20 18 29 24 36 7
30 21 33 27 39 9
40 27 39 35 43 12
50 32 42 38 46 15

Fig. 6. Execution time comparison.

and session keys. During transmission based on the session, the key verifies the information. Once the information is matched with the
session key means to accept the request and conform to route optimization. Additionally, the fitness of sailfish is employed in the
initialization phase for identifying the position and location of the attack. Using 5G enhances the data transmission speed also attains
low execution time. Finally, the developed framework proves the efficiency by using securing routing protocol.

5.1. Performance metrics

The gained outcome of a developed SbDMM technique is compared with other existing technique metrics. Such key metrics of the
proposed approach are execution time, delay, task completion, efficiency, and confidential rate. Furthermore, the proposed secured
method efficiency is compared with various conventional methods such as Boltzmann Machine Key (BMK) technique [21], Self
Organizing DMM (SO-DMM) model [22], Blockchain-based IoT (BIoT) system [24], and Efficient and Secure Protocol using 5G (ESP)
model [25].

5.1.1. Execution time


Complete-time for secure routing information using 5G from attacks and overall data sharing time of the user is represented as
execution time. It is the ratio of no of completing time to the no of total data sharing time, and it is multiplied by 100. Thus, the
mathematical calculation of execution time is measured using Eq. (4).
( )
CT(t)
Execution time = × 100 (4)
TR(c)
Where, CT(t) is denoted as the completion time of one task and TR(c) is represented as the total time essential for completing tasks.
The comparison value is described in the Table 1.
The execution time of the proposed replica is compared with other existing techniques. Thus the comparison of BMK replica attains
13 s of execution time, and the SO-DMM technique achieved 25 s. Moreover, the execution time of the BIoT technique gained the 20 s,
and the ESP replica attains 32 s. The developed replica attained less time for execution compared to other existing techniques. Thus the
achieved execution time of the SbDMM technique is 5 s. Additionally, the comparison of execution time has illustrated in Fig. 6.

5.1.2. Delay (D)


Delay is defined as the ratio of calculation of distance by speed and calculation of packet size divided by transmission rate of
information to the user using 5G networks. The measurement of delay is obtained using Eq. (5)
( ) ( )
ds packet size
D= + × 10− 7 (5)
sp transmission rate

8
V. Kiran Sharma et al. Computers and Electrical Engineering 104 (2022) 108434

Table 2
Comparison of delay with other techniques.
Task Delay (ms)

BMK SO-DMM BIoT ESP Proposed

10 88 15 57 122 8
20 93 20 63 128 10
30 99 27 70 136 12
40 104 33 75 140 15
50 115 39 79 144 17

Fig. 7. Comparison of delay with other techniques.

Table 3
Comparison of task completion.
Task Task Completion (%)

BMK SO-DMM BIoT ESP Proposed

10 83 68 76 90 98
20 81 66 75 88 97
30 78 64 73 87 95
40 76 63 71 85 94
50 75 61 70 83 93

ds, sp are represented as distance and speed of execution time. Packet size is the size of information from the smart home and the
transmission rate is represented data transmission. Existing techniques comparison of delay is mentioned in Table 2.
The measurement of delay (D) of BMK attains88ms, SO-DMM achieved 15 ms, BIOT gained 57 ms and ESP attained the seconds of
122 ms. Furthermore, a comparison of delay with other techniques is shown in Fig. 7.
The proposed SBDMM model achieved the delay ranges as 8 ms. Attaining low delay will provide quick data processing and low
execution time.

5.1.3. Task completion (TC)


It is the ratio of no of completed tasks to the no of total tasks and it is multiplied by 100. Complete-time for communicating in­
formation to the user and the overall information collected from the IoT device which is represented as the task completion and the
comparison value is described in Table 3. The task completion is measured using Eq. (6).
( )
completed tasks
TC = × 100 (6)
total tasks
The 5G data transmission of the proposed SBDMMmodel attained 98% for completing 5 tasksand SO-DMM achieved 68%.
Moreover, the achieved value of the proposed and other techniques is shown in Fig. 8.
Additionally, the task completion range of BIoT and ESP achieved 76% and 90%. The total number of tasks performed for this
technique is 50 and the task completion time will vary depending upon the number of tasks.

9
V. Kiran Sharma et al. Computers and Electrical Engineering 104 (2022) 108434

Fig. 8. Comparison of task completion.

Table 4
Comparison of confidential rate.
Task Confidential rate (%)

BMK SO-DMM BIoT ESP Proposed

10 85 71 78 92 99.25
20 83 69 76 90 98.34
30 80 68 75 88 98
40 77 66 73 86 97.83
50 76 63 71 84 97.12

Fig. 9. Comparison of confidential rate.

5.1.4. Confidential rate


Confidential rate is termed as the difference between original information and received information during the data broadcasting
performance. The confidential rate of the developed method is compared with conventional techniques such as BMK. SO-DMM, BIoT,
and ESP are shown in Table 4. Moreover, theconfidential rate of the proposed SBDMM method has attained 99.25% for 10 tasks.
Consequently, the BMK method has attained an 85% of the confidential rate, SO-DMM has achieved a 71% confidential rate, BIoT
has accomplished a 78% confidential rate and ESP attained 92% for 10 tasks. But the proposed SBDMM system has obtained a 98.34%
of confidential rate for 20 tasks, which is illustrated in Fig. 9.
Moreover, this comparison shows that the SBDMM method has achieved a more confidential rate than the existing method.

5.1.5. Efficiency
Efficiency is one of the important parameters to demonstrate the performance in terms of calculation and communication

10
V. Kiran Sharma et al. Computers and Electrical Engineering 104 (2022) 108434

Table 5
Comparison of efficiency.
Sl. no Techniques Efficiency (%)

1 BMK 87
2 SO-DMM 98.5
3 BIoT 75
4 ESP 90
5 Proposed 99.45

Fig. 10. Comparison of efficiency.

Fig. 11. Overall performance assessment.

overheads. The efficiency of the proposed SBDMM replica is compared with previous techniques like SA-DS, encryption algorithm, and
MWO are shown in Table 5.
Moreover, the efficiency of the proposed SBDMM (99.45%) is compared with the conventional BMK (87%), SO-DMM (98.5%), BIoT
(75%), and ESP (90%) have achieved, which is illustrated in Fig. 10.
Therefore, the values demonstrate the effective performance of the proposed SBDMM model.

5.2. Discussions

From the overall result assessment, the proposed model SBDMMhas pertained to good performance by attaining less execution time
and delay and also achieving high rate in task completion, efficiency, and confidential rate. The attained performance metrics of the
proposed model are shown in Fig. 11.
Thus, the developed scheme proved that it is applicable in smart homes for communicating important information to the user by
IoT through 5G. Also, secure the routing while data transmission. Moreover, identify the attacks with the help of sailfish fitness. The
information on smart homes is collected using IoT applications. The proposed model, delay, and execution time are low compared to
other techniques. Furthermore, this technique is useful for quickly communicating information to the user with the help of user

11
V. Kiran Sharma et al. Computers and Electrical Engineering 104 (2022) 108434

mobiles, laptops and desktops also secure from threats and attacks.

6. Conclusion

Smart homes using a 5G network offer the most emerging technology that provides remote access efficiently and securely. By
integrating key exchange, authentication, and privacy, the proposed approach ensures the highest level of security. For additional
security, the data is inserted into a cipher key which generates a session key for every MN and CN. The results of the proposed model
are then compared with other methodologies to demonstrate how effectively and securely this improved the system’s execution time,
latency, job completion, confidentiality rate, and efficiency.

Statements and declarations

Ethical approval: This research does not contain any studies with animals performed by any of the authors.
Funding: No Funding.
Informed consent: Informed consent was obtained from all individual participants included in the study.
Availability of data and material: All data are available in Manuscript.
Code availability: All data are available in Manuscript – Custom Mode.

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to
influence the work reported in this paper.

Data availability

Data will be made available on request.

References

[1] Gomez-Barquero D, Gimenez JJ, Muntean GM, Xu Y, Wu Y. IEEE transactions on broadcasting special issue on: 5G media production, contribution, and
distribution. IEEE Trans Broadcast 2022;68(2):415–21.
[2] Khadidos AO, Shitharth S, Manoharan H, Yafoz A, Khadidos AO, Alyoubi KH. An intelligent security framework based on collaborative mutual authentication
model for smart city networks. IEEE Access 2022.
[3] Mafakheri B, Subramanya T, Goratti L, Riggio R. Blockchain-based infrastructure sharing in 5G small cell networks. In: Proceedings of the 14th international
conference on network and service management (CNSM). IEEE; 2018. p. 313–7.
[4] Sankaran KS, Ramprabu G, Prakash V. Importance of fifth generation wireless systems. Mob Comput 2020;37.
[5] Shitharth S, Prasad KM, Sangeetha K, Kshirsagar PR, Babu TS, Alhelou HH. An Enriched RPCO-BCNN Mechanisms for Attack Detection and Classification in
SCADA Systems. IEEE Access 2021;9:156297–312.
[6] Magsi H, Sodhro AH, Chachar FA, Abro SAK, Sodhro GH, Pirbhulal S. Evolution of 5G in internet of medical things. In: Proceedings of the international
conference on computing, mathematics and engineering technologies (iCoMET). IEEE; 2018. p. 1–7.
[7] Petrović N. Model-based approach for semantic-driven deployment of containerized applications to support future internet services and architectures. SJEE
2019;16(1):21–44.
[8] Thirumalaisamy M, Basheer S, Selvarajan S, et al. Interaction of secure cloud network and crowd computing for smart city data obfuscation. Sensors 2022.
https://doi.org/10.3390/s22197169. MDPI.
[9] Rao SK, Prasad R. Impact of 5G technologies on smart city implementation. Wirel Pers Commun 2018;100(1):161–76.
[10] Li D. 5G and intelligence medicine – how the next generation of wireless technology will reconstruct healthcare? Precis Clin Med 2019;2(4):205–8.
[11] Dias J, Rodrigues J, Soares V, Caldeira J, Korotaev V, Proença ML. Network management and monitoring solutions for vehicular networks: a survey. Electronics
2020;9(5):853.
[12] Aljeri N. Efficient ai and prediction techniques for smart 5G-enabled vehicular networks. Universitéd’Ottawa/University of Ottawa; 2020. Diss.
[13] Tuyisenge L, Ayaida M, Tohme S, Afilal LE. A mobile internal vertical handover mechanism for distributed mobility management in VANETs. Veh Commun
2020;26:100277.
[14] Bi Y, Han G, Lin C, Deng Q, Guo L, Li F. Mobility support for fog computing: an SDN approach. IEEE Commun Mag 2018;56(5):53–9.
[15] Babu S, Biswash SK. Fog computing–based node-to-node communication and mobility management technique for 5G networks. Trans Emerg Telecommun
Technol 2019;30(10):e3738.
[16] Murugamani C, Shitharth S, Hemalatha S, Kshirsagar PR, et al. Machine learning technique for precision agriculture applications in 5G-based internet of things.
Wirel Commun Mob Comput 2022. https://doi.org/10.1155/2022/6534238. Hindawi.
[17] Rajput S, Bhatia KS. Self-organizing distributed mobility management for next generation mobility protocol. J Ambient Intell Humaniz Comput 2021:1–9.
[18] Mafakheri B, Heider-Aviet A, Riggio R, Goratti L. Smart contracts in the 5G roaming architecture: the fusion of blockchain with 5G networks. IEEE Commun Mag
2021;59(3):77–83.
[19] Vivekanandan M. BIDAPSCA5G: Blockchain based internet of things (IoT) device to device authentication protocol for smart city applications using 5G
technology. Peer Peer Netw Appl 2021;14(1):403–19.
[20] Shin D, Yun K, Kim J, VirgilAstillo P, Kim JN, You I. A security protocol for route optimization in DMM-based smart home IoT networks. IEEE Access 2019;7:
142531–50.
[21] Kim J, VirgilAstillo P, You I. DMM-SEP: secure and efficient protocol for distributed mobility management based on 5G networks. IEEE Access 2020;8:
76028–42.
[22] Zhang Y, Mo Y. Dynamic optimization of chemical processes based on modified sailfish optimizer combined with an equal division method. Processes 2021;10:
1806. 9.

12
V. Kiran Sharma et al. Computers and Electrical Engineering 104 (2022) 108434

[23] Bakhsh R, Javaid N, Fatima I, Khan MI, Almejalli KA. Towards efficient resource utilization exploiting collaboration between HPF and 5G enabled energy
management controllers in smart homes. Sustainability 2018;10(10):3592.
[24] Sun Z, Zhu M, Lee C. Progress in tHE TRIBOELECTRIC HUMAN–MACHIne Interfaces (HMIs)-moving from smart gloves to AI/haptic enabled HMI in the 5G/IoT
era. Nanoenergy Adv 2021;1(1):81–120.
[25] Smys S, Wang H, AbulBasar. 5G network simulation in smart cities using neural network algorithm. J Artif Intell 2021;3(01):43–52.

Dr. Srikanta Kumar Mohapatra, working as an Associate professor at Chitkara University Institute of Engineering and Technology, Punjab. He has more than 15years
of teaching and industrial experience. He published more than 50 research articles in different journals and conferences. His research areas are Artificial Intelligence,
Machine Learning, and Computational Nanotech.

Vidhu Kiran, has completed doctorate from Maharaja Ranjit Singh Punjab Technical University, Bathinda, India. Her research activities consist of security solutions for
Internet of Things. She especially focuses on trust based mechanisms. She has published more than 25 high indexed internal journals with 3 SCI index and 8 Scopus
article on same area.

Shitharth S has completed his Ph.D in the Department of Computers Science & Engineering, Anna University. He is currently pursuing his Postdoc (Visiting) at The
University of Essex. Now, he is working as an Associate Professor at Kebri Dehar University, Ethiopia. He has published in more than 45 International Journals and 20
International & National conferences.

Saud Yonbawi, Assistant Professor at the College of Computer Science and Engineering, University of Jeddah. I received my Ph.D. in Computer Science from York of
University (2021. My research work focuses on the domains software engineering, formal methods and artificial intelligence. In particular, my research interests include
software engineering for distributed self-adaptive systems, applied formal methods, and machine learning.

Ayman Yafoz earned his Ph.D. in Computer Science from the University of Regina in Regina, Canada, in 2021. He is currently an Assistant Professor at King Abdulaziz
University’s Faculty of Computing and Information Technology in Jeddah, Saudi Arabia. His main research areas include data science, natural language processing,
machine learning, and deep learning.

Dr. Sultan Alahmari is an Assistant Research Professor at King Abdulaziz City for Science and Technology. In 2020, he completed a PhD in Computer Science from
University of York and his thesis title is Reinforcement Learning for Argumentation. His research interests in artificial intelligence especially in machine learning,
argumentation, MultiAgent systems and game theory.

13

You might also like