scholarly journals Improved Handover Authentication in Fifth-Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore Elements in Mobile Healthcare Applications

2022 ◽  
Vol 2022 ◽  
pp. 1-8
Author(s):  
J. Divakaran ◽  
S. K. Prashanth ◽  
Gouse Baig Mohammad ◽  
Dr Shitharth ◽  
Sachi Nandan Mohanty ◽  
...  

Authentication is a suitable form of restricting the network from different types of attacks, especially in case of fifth-generation telecommunication networks, especially in healthcare applications. The handover and authentication mechanism are one such type that enables mitigation of attacks in health-related services. In this paper, we model an evolutionary model that uses a fuzzy evolutionary model in maintaining the handover and key management to improve the performance of authentication in nanocore technology-based 5G networks. The model is designed in such a way that it minimizes the delays and complexity while authenticating the networks in 5G networks. The attacks are mitigated using an evolutionary model when it is trained with the relevant attack datasets, and the model is validated to mitigate the attacks. The simulation is conducted to test the efficacy of the model, and the results of simulation show that the proposed method is effective in improving the handling and authentication and mitigation against various types of attacks in mobile health applications.

Telecom IT ◽  
2020 ◽  
Vol 8 (1) ◽  
pp. 1-10
Author(s):  
A. Abdellah ◽  
A. Koucheryavy

Research subject. Fifth-generation telecommunication networks are currently the determining direction of telecommunications development as a whole. At the same time, the complexity of the processes of functioning of fifth-generation telecommunication networks increases by an order of magnitude compared to existing networks. All this requires the use of new technologies, including artificial intelligence, to ensure the stable functioning of telecommunication networks. Method. System analysis. Core results. The scientific tasks for the fifth generation communication networks, in which the use of artificial intelligence seems appropriate, including machine and deep learning, are identified. Practical significance. The results of the work can be useful in the education process in the field of networks and telecommunication systems, as well as for setting new scientific tasks for PhD students.


2011 ◽  
Vol 7 (3) ◽  
pp. 241-269 ◽  
Author(s):  
Yi-Fu Ciou ◽  
Fang-Yie Leu ◽  
Yi-Li Huang ◽  
Kangbin Yim

In this paper, we propose a handover authentication mechanism, called the handover key management and authentication scheme (HaKMA for short), which as a three-layer authentication architecture is a new version of our previous work, the Diffie-Hellman-PKDS-based authentication method (DiHam for short) improving its key generation flow and adding a handover authentication scheme to respectively speed up the handover process and increase the security level for mobile stations (MSs). AAA server supported authentication is also enhanced by invoking an improved extensible authentication protocol (EAP). According to the analyses of this study the HaKMA can effectively and efficiently provide user authentication and balance data security and system performance during handover.


Author(s):  
Farooq Azam ◽  
Shahid Bashir ◽  
Muhammad Ammar Sohaib

5G (Fifth Generation) is the next generation of data network, offering faster speeds and reliable connections on smart phones and other devices than ever before. These networks are still under development and expected to operate on 28 and 38 GHz bands. However, multiple antennas required for these 5G devices will increase the overall system size. Single antenna which can switch to operate on multiple bands is the solution to this problem. A novel frequency reconfigurable antenna for 5G communication networks is presented in this paper. The antenna was designed on a Roger R5880 substrate having dielectric constant 2.2 and loss tangent 0.0009. The proposed antenna consists of simple radiator on top layer and two slots in the ground layer. The frequency re-configurability is achieved by placing three PIN diodes in each slot of the ground. The operating frequency band of antenna is controlled by switching states of PIN diodes. The proposed antenna covers a wide band from 25.6-39.3 GHz by simply switching the diodes ON/OFF. Thus it can cover 28 and 38 GHz bands that are anticipated to be the two working bands for 5G communication. The overall size of the antenna is 10x7 mm2. In addition to being small this antenna has a good gain ranging from 6.5-8.4 dB as well as 85% efficiency in the two 5G bands. All simulations have been done in CST (Computer Simulation Technology) Studio Suite. This reconfigurable antenna can find applications in future 5G communication networks.


Telecom IT ◽  
2020 ◽  
Vol 8 (1) ◽  
pp. 22-27
Author(s):  
E. Tonkikh

Research subject. The article is devoted to the analysis of the characteristics of the density of devices in fifth-generation telecommunication networks. The characteristics of the density of devices and their influence on the structure of fifth-generation telecommunication networks are considered. Method. System analysis. Core results. The scientific tasks in the field of building highdense and ultra high-dense telecommunication networks of the fifth generation and subsequent are determined. Practical relevance. The results of the article can be used by scientific and design organizations when planning the development of telecommunication networks, as well as universities in the educational process.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1387
Author(s):  
Oswaldo Sebastian Peñaherrera-Pulla ◽  
Carlos Baena ◽  
Sergio Fortes ◽  
Eduardo Baena ◽  
Raquel Barco

Cloud Gaming is a cutting-edge paradigm in the video game provision where the graphics rendering and logic are computed in the cloud. This allows a user’s thin client systems with much more limited capabilities to offer a comparable experience with traditional local and online gaming but using reduced hardware requirements. In contrast, this approach stresses the communication networks between the client and the cloud. In this context, it is necessary to know how to configure the network in order to provide service with the best quality. To that end, the present work defines a novel framework for Cloud Gaming performance evaluation. This system is implemented in a real testbed and evaluates the Cloud Gaming approach for different transport networks (Ethernet, WiFi, and LTE (Long Term Evolution)) and scenarios, automating the acquisition of the gaming metrics. From this, the impact on the overall gaming experience is analyzed identifying the main parameters involved in its performance. Hence, the future lines for Cloud Gaming QoE-based (Quality of Experience) optimization are established, this way being of configuration, a trendy paradigm in the new-generation networks, such as 4G and 5G (Fourth and Fifth Generation of Mobile Networks).


2014 ◽  
Vol 998-999 ◽  
pp. 1092-1095
Author(s):  
Qi Sheng Zhao ◽  
Xiao Ming Liu ◽  
Hui Sheng Zhu

The information security of wireless sensor networks is one of hot issues on the current research; this paper combines threshold key scheme with the management of security key sharing and group agreement and proposes dynamic key management scheme through clustering level key matrix of authentication mechanism from the cluster to node. The network is divided into different clusters, and the cluster head conducts the key authentication exchange and updates the key management with threshold key schemes, with no need of third authentication center, reduces the computing and communication costs, and promotes communication.


Author(s):  
Н.А. ЧИСТОВА ◽  
А.С. БОРОДИН ◽  
А.Е. КУЧЕРЯВЫЙ

Статья посвящена анализу возможностей сетей связи для сокращения цифрового разрыва между регионами Российской Федерации. Основным результатом статьи является установление взаимосвязи валового регионального продукта и доли занятых в сфере информатизации и связи в общем числе занятых во всех отраслях. Результаты статьи могут быть использованы заинтересованными министерствами и ведомствами при реализации программы цифровой экономики, научными и проектными организациями при планировании и проектировании сетей связи, а также университетами в учебном процессе. The article is devoted to the analysis of the capabilities of telecommunication networks with ultralow latency to reduce the digital divide between the regions of the Russian Federation. The main result of the article is to establish the relationship between the gross regional product and the share of people employed in the field of informatization and communications in the total number of people employed in all industries. The results of the article can be used by interested ministries and departments in the implementation of the digital economy program, scientific and design organizations in the planning and design of communication networks, as well as by universities in the educational process.


LastMile ◽  
2021 ◽  
Vol 98 (6) ◽  
Author(s):  
A. Ivashkin

Today, many countries around the world are actively building fifth generation mobile networks (5G/IMT-2020). The magazine Last Mile asked the director of the Republican unitary enterprise for supervision on telecommunications "BelGIE" of the Republic of Belarus (hereinafter: State Enterprise "BelGIE") A.A. Ivashkin about the situation with the implementation of the 5G network in the Republic of Belarus.


2013 ◽  
Vol 4 (3) ◽  
pp. 388-392
Author(s):  
Shanu K Rakesh ◽  
Bharat Choudhary ◽  
Rachna Sandhu

Swarm intelligence, as demonstrated by natural biological swarms, has numerous powerful properties desirable in many engineering systems, such as telecommunication. Communication network management is becoming increasingly difficult  due to the increasing size, rapidly changing topology, and complexity of communication networks. This paper describes  how biologically-inspired agents can be used to solve control problems in telecommunications. These agents, inspired by the foraging behaviour of ants, exhibit the desirable characteristics of simplicity of action and interaction. The colle ction of agents, or swarm system, deals only with local knowledge and exhibits a form of distributed control with agent communication effected through the environment. In this paper we explore the application of ant-like agents to the problem of routing in telecommunication networks.


Sign in / Sign up

Export Citation Format

Share Document