scholarly journals Policy-Based Security Management System for 5G Heterogeneous Networks

2019 ◽  
Vol 2019 ◽  
pp. 1-14
Author(s):  
Hani Alquhayz ◽  
Nasser Alalwan ◽  
Ahmed Ibrahim Alzahrani ◽  
Ali H. Al-Bayatti ◽  
Mhd Saeed Sharif

Advances in mobile phone technology and the growth of associated networks have been phenomenal over the last decade. Therefore, they have been the focus of much academic research, driven by commercial and end-user demands for increasingly faster technology. The most recent generation of mobile network technology is the fifth generation (5G). 5G networks are expected to launch across the world by 2020 and to work with existing 3G and 4G technologies to provide extreme speed despite being limited to wireless technologies. An alternative network, Y-Communication (Y-Comm), proposes to integrate the current wired and wireless networks, attempting to achieve the main service requirements of 5G by converging the existing networks and providing an improved service anywhere at any time. Quality of service (QoS), vertical handover, and security are some of the technical concerns resulting from this heterogeneity. In addition, it is believed that the Y-Comm convergence will have a greater influence on security than was the case with the previous long-term evolution (LTE) 4G networks and with future 5G networks. The purpose of this research is to satisfy the security recommendations for 5G mobile networks. This research provides a policy-based security management system, ensuring that end-user devices cannot be used as weapons or tools of attack, for example, IP spoofing and man-in-the-middle (MITM) attacks. The results are promising, with a low disconnection rate of less than 4% and 7%. This shows the system to be robust and reliable.

2021 ◽  
Vol 1 (1) ◽  
Author(s):  
Ngombo Armando ◽  
Rui Almeida ◽  
José Marcelo Fernandes ◽  
Jorge Sá Silva ◽  
Fernando Boavida

AbstractThe next generation of mobile networks, widely known as 5G, was designed to respond to the next 10 years’ communication challenges. 5G will be an essential structure on which all types of electronic communications will rely. Built on the emerging 5G technology, we developed a vertical solution for blended learning environments within a Portuguese national project scope. The project aims to propose an integrated demonstration of a set of products capable of being part and providing services in the future 5G networks framework. To this end, we adopted a bottom-up approach to design and develop a product named 5GOpenclasses, where we leveraged FIWARE middleware to manage all entities. This paper presents the architecture, technological platform, associated data structures, and end-user applications of 5GOpenclasses. We also present the design of innovative location-based service for blended learning environments. This paper is the first step of the proposed product towards its quantitative evaluation when running Over-the-Top on both 4G and 5G networks. Although successful unit tests were carried out in what concerns the functional outcome, the integration tests for quantitative results depend on the availability of other project components.


2020 ◽  
Vol 1 (1) ◽  
pp. 141-157
Author(s):  
Brunilde Sanso ◽  
Lorela Cano ◽  
Antonio Capone

Infrastructure sharing for mobile networks has been a prolific research topic for more than three decades now. The key driver for Mobile Network Operators to share their network infrastructure is cost reduction. Spectrum sharing is often studied alongside infrastructure sharing although on its own it is a vast research topic outside the scope of this survey. Instead, in this survey we aim to provide a complete picture of infrastructure sharing both over time and in terms of research branches that have stemmed from it such as performance evaluation, resource management etc. We also put an emphasis on the relation between infrastructure sharing and the decoupling of infrastructure from services, wireless network virtualization and multi-tenancy in 5G networks. Such a relation reflects the evolution of infrastructure sharing over time and how it has become a commercial reality in the context of 5G.


Author(s):  
Weston Mwashita ◽  
Marcel Ohanga Odhiambo

This research work presents a power control mechanism developed for ProSe-enabled sensors so that the sensors can be smoothly integrated into the fifth generation (5G) of mobile networks. It is strongly anticipated that 5G networks will provide an enabling environment for the 21st century innovations like the internet of things (IoT). Sensors are pivotal in IoT. The proposed power control mechanism involves an open loop power control (OLPC) mechanism that a ProSe-enabled sensor has to use to establish communication with a base station (BS) and a closed loop power control (CLPC) the BS then has use to establish transmit power levels for devices to be involved in a device to device (D2D) communication depending on the prevailing channel conditions. The results obtained demonstrate that the developed scheme does not adversely affect the quality of service (QoS) of a 5G mobile network.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 441
Author(s):  
K R.R Mohan ◽  
G Vennela ◽  
M Sai Kumar ◽  
Ch Satya Srinivas ◽  
A Harsha

Cloud radio access network is an adaptable mobile network architecture with exponential development of portable traffic and the prerequisites of up and coming administrations are further pushing the cut-off points on current versatile systems; subsequently, overall research interests have moved toward 5G world that view which can address many challenges that mobile operators confront while attempting to support ever-growing end-user’s needs towards 5th generation of mobile networks. Be that as it may, 5G systems are most certainly not to be sent until 2020; subsequently, there is a requirement for answers for address expanding requests of current systems, without acquiring colossal expenses on administrators. This paper proposes on-request organization of portable little cells, utilizing either client versatile handsets or remote radio units and non-aware power utilization of different hosts and virtual machines.  


Author(s):  
Nataliia Tsymbalenko

The subject of research-theoretical concepts of economic security managementof universities. The purpose of the article. The study of the essence of the economicsecurity management system of the university and the definition of its main tasks,the formulation of principles of economic security management of the university.Methodology. The dialectical method, methods of analysis and synthesis, methodsof structural-logical and semantic analysis were used to study and summarizescientific papers on the research topic. The results of the work. The essence of theuniversity’s economic security management system has been reviewed. The maintasks of the control system have been identified. A definition of the university’seconomic security system has been proposed. Principles of management of economicsecurity of the university have been formulated. These are: scientific andorganizational and social principles. Conclusions. The proposed principles allow totake into account the economic role and social mission of universities in managingeconomic security.


2018 ◽  
Author(s):  
Phanidra Palagummi ◽  
Vedant Somani ◽  
Krishna M. Sivalingam ◽  
Balaji Venkat

Networking connectivity is increasingly based on wireless network technologies, especially in developing nations where the wired network infrastructure is not accessible to a large segment of the population. Wireless data network technologies based on 2G and 3G are quite common globally; 4G-based deployments are on the rise during the past few years. At the same time, the increasing high-bandwidth and low-latency requirements of mobile applications has propelled the Third Generation Partnership Project (3GPP) standards organization to develop standards for the next generation of mobile networks, based on recent advances in wireless communication technologies. This standard is called the Fifth Generation (5G) wireless network standard. This paper presents a high-level overview of the important architectural components, of the advanced communication technologies, of the advanced networking technologies such as Network Function Virtualization and other important aspects that are part of the 5G network standards. The paper also describes some of the common future generation applications that require low-latency and high-bandwidth communications.


Healthcare ◽  
2021 ◽  
Vol 9 (7) ◽  
pp. 854
Author(s):  
Dalia Almaghaslah ◽  
Abdulrhman Alsayari ◽  
Saleh Ali Alyahya ◽  
Rana Alshehri ◽  
Khawlah Alqadi ◽  
...  

Introduction: Design thinking, an innovative problem-solving approach, has gained wide popularity in healthcare disciplines. The aim of this work is to improve outpatients’ experiences in hospital pharmacies in two hospitals in Asir region, Saudi Arabia. Methods: The design thinking approach, adopted from Stanford University’s D-School, was used in this study. Results: Several problems were identified: lack of comfortable environment in the pharmacies’ waiting area, lack of a queue management system, and workflow inefficiencies related to ordering and supplies of medicines. A prototype was proposed to overcome these challenges. Discussion and Conclusion: The design thinking approach helped in identifying end-user (patients visiting outpatient pharmacies) values and desires and provided an understanding of their struggles. It also proposed tailored solutions that could improve patients’ experiences while using the services of the outpatient pharmacies.


Network ◽  
2021 ◽  
Vol 1 (2) ◽  
pp. 75-94
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to the edge for quick, seamless, and secure access. After being granted access to a service, the end-user will be able to cache and share data with other users. However, security measures should be in place for SP not only to secure the provisioning and access of those services but also, should be able to restrict what the end-users can do with the accessed data in or out of coverage. This can be facilitated by federated service authorization and access control mechanisms that restrict the caching and sharing of data accessed by the UE in different security domains. In this paper, we propose a Data Caching and Sharing Security (DCSS) protocol that leverages federated authorization to provide secure caching and sharing of data from multiple SPs in multiple security domains. We formally verify the proposed DCSS protocol using ProVerif and applied pi-calculus. Furthermore, a comprehensive security analysis of the security properties of the proposed DCSS protocol is conducted.


2013 ◽  
Vol 18 (4) ◽  
pp. 343-395 ◽  
Author(s):  
Kristian Beckers ◽  
Isabelle Côté ◽  
Stephan Faßbender ◽  
Maritta Heisel ◽  
Stefan Hofbauer

Sensors ◽  
2021 ◽  
Vol 21 (13) ◽  
pp. 4510
Author(s):  
Josip Lorincz ◽  
Zvonimir Klarin ◽  
Julije Ožegović

In today’s data networks, the main protocol used to ensure reliable communications is the transmission control protocol (TCP). The TCP performance is largely determined by the used congestion control (CC) algorithm. TCP CC algorithms have evolved over the past three decades and a large number of CC algorithm variations have been developed to accommodate various network environments. The fifth-generation (5G) mobile network presents a new challenge for the implementation of the TCP CC mechanism, since networks will operate in environments with huge user device density and vast traffic flows. In contrast to the pre-5G networks that operate in the sub-6 GHz bands, the implementation of TCP CC algorithms in 5G mmWave communications will be further compromised with high variations in channel quality and susceptibility to blockages due to high penetration losses and atmospheric absorptions. These challenges will be particularly present in environments such as sensor networks and Internet of Things (IoT) applications. To alleviate these challenges, this paper provides an overview of the most popular single-flow and multy-flow TCP CC algorithms used in pre-5G networks. The related work on the previous examinations of TCP CC algorithm performance in 5G networks is further presented. A possible implementation of TCP CC algorithms is thoroughly analysed with respect to the specificities of 5G networks, such as the usage of high frequencies in the mmWave spectrum, the frequent horizontal and vertical handovers, the implementation of the 5G core network, the usage of beamforming and data buffering, the exploitation of edge computing, and the constantly transmitted always-on signals. Moreover, the capabilities of machine learning technique implementations for the improvement of TCPs CC performance have been presented last, with a discussion on future research opportunities that can contribute to the improvement of TCP CC implementation in 5G networks. This survey paper can serve as the basis for the development of novel solutions that will ensure the reliable implementation of TCP CC in different usage scenarios of 5G networks.


Sign in / Sign up

Export Citation Format

Share Document