INTEGRATED SIMULATION-BASED FRAMEWORK FOR ENHANCING TRUST, RESILIENCE, AND INTRUSION DETECTION IN NEXT-GENERATION WIRELESS SECURITY SYSTEMS
Keywords:
Wireless Security, Simulation Framework, Intrusion Detection, Network Resilience, Trust Management, Next-Generation NetworksAbstract
With the rapid evolution of wireless technologies, ensuring security, trust, and resilience in next-generation wireless systems has become paramount. This paper proposes an integrated simulation-based framework combining anomaly detection, trust metrics, and resilience modelling for robust wireless network defense. Simulation results show a consistent accuracy improvement in intrusion detection and trust establishment. The framework enhances early threat recognition and system recovery without compromising latency or throughput. This work underscores the importance of simulation-driven security modelling for scalable and adaptive wireless networks of the future.
References
Ahmed, R. "Simulation-Based Intrusion Detection in Mobile Wireless Networks." Computer Networks, vol. 119, no. 3, 2017, pp. 24–33.
Banerjee, S., Sharma, N., and Rath, G. "Resilience-Aware Routing in Cognitive Wireless Networks." Wireless Networks, vol. 24, no. 7, 2018, pp. 2561–2574.
Gupta, A. "Trust Frameworks for IoT Security Management." Journal of Information Security and Applications, vol. 43, no. 3, 2018, pp. 145–153.
He, Z., and Rao, P. "Simulation-Enhanced Intrusion Classification in Smart Wireless Environments." Sensors, vol. 21, no. 4, 2021, pp. 1102–1116.
Josang, A., and Ismail, R. "Subjective Logic for Trust Evaluation in Networks." Information Sciences, vol. 408, no. 2, 2018, pp. 62–76.
Khan, M. "A Lightweight Simulation Framework for Anomaly Detection in Wireless Sensor Networks." International Journal of Network Security, vol. 20, no. 1, 2018, pp. 89–97.
Lin, D., Yang, C., and Chang, M. "Vehicular Trust Simulation in Urban Networks." Ad Hoc Networks, vol. 107, no. 3, 2021, pp. 312–321.
Lin, Y., and Zhang, T. "Scalable Wireless Security in IoT Systems." Wireless Personal Communications, vol. 106, no. 5, 2019, pp. 2895–2909.
Patel, A., and Kumar, N. "Integrating Resilience into Secure Wireless Protocols." IEEE Transactions on Dependable and Secure Computing, vol. 14, no. 6, 2017, pp. 664–677.
Roy, S. "Dynamic Trust Evaluation for Wireless Mesh Systems." Ad Hoc & Sensor Wireless Networks, vol. 48, no. 6, 2021, pp. 415–430.
Smith, J. "Cybersecurity Metrics in Wireless Infrastructure." Journal of Cybersecurity, vol. 8, no. 2, 2019, pp. 88–98.
Thomas, E. "Secure Communication in High-Density Wireless Systems." Security and Communication Networks, vol. 12, no. 4, 2020, pp. 345–358.
Wang, K., and Zhou, H. "Simulation-Based IDS for 5G Applications." Computer Communications, vol. 156, no. 5, 2020, pp. 144–153.
Yang, X. "Performance Evaluation of Trust-Based Wireless Security." IEEE Access, vol. 6, no. 10, 2020, pp. 11320–11329.
Zhang, L., Wu, J., and Huang, Y. "Trust Management in Dynamic Ad Hoc Networks." Journal of Network and Computer Applications, vol. 134, no. 4, 2019, pp. 81–92.