METHOD OF MODELING INTERFERENCE CHARACTERISTICS IN HETEROGENEOUS FIFTH GENERATION WIRELESS NETWORKS WITH DEVICE-TO-DEVICE COMMUNICATIONS

2020 ◽  
Vol 26 (3) ◽  
pp. 169-183
Author(s):  
Phudit Ampririt ◽  
Yi Liu ◽  
Makoto Ikeda ◽  
Keita Matsuo ◽  
Leonard Barolli ◽  
...  

The Fifth Generation (5G) networks are expected to be flexible to satisfy demands of high-quality services such as high speed, low latencies and enhanced reliability from customers. Also, the rapidly increasing amount of user devices and high user’s requests becomes a problem. Thus, the Software-Defined Network (SDN) will be the key function for efficient management and control. To deal with these problems, we propose a Fuzzy-based SDN approach. This paper presents and compares two Fuzzy-based Systems for Admission Control (FBSAC) in 5G wireless networks: FBSAC1 and FBSAC2. The FBSAC1 considers for admission control decision three parameters: Grade of Service (GS), User Request Delay Time (URDT) and Network Slice Size (NSS). In FBSAC2, we consider as an additional parameter the Slice Priority (SP). So, FBSAC2 has four input parameters. The simulation results show that the FBSAC2 is more complex than FBSAC1, but it has a better performance for admission control.


Electronics ◽  
2021 ◽  
Vol 10 (13) ◽  
pp. 1608
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Device-to-Device (D2D) communications will be used as an underlay technology in the Fifth Generation mobile network (5G), which will make network services of multiple Service Providers (SP) available anywhere. The end users will be allowed to access and share services using their User Equipments (UEs), and thus they will require seamless and secured connectivity. At the same time, Mobile Network Operators (MNOs) will use the UE to offload traffic and push contents closer to users relying on D2D communications network. This raises security concerns at different levels of the system architecture and highlights the need for robust authentication and authorization mechanisms to provide secure services access and sharing between D2D users. Therefore, this paper proposes a D2D level security solution that comprises two security protocols, namely, the D2D Service security (DDSec) and the D2D Attributes and Capability security (DDACap) protocols, to provide security for access, caching and sharing data in network-assisted and non-network-assisted D2D communications scenarios. The proposed solution applies Identity-based Encryption (IBE), Elliptic Curve Integrated Encryption Scheme (ECIES) and access control mechanisms for authentication and authorization procedures. We formally verified the proposed protocols using ProVerif and applied pi calculus. We also conducted a security analysis of the proposed protocols.


2019 ◽  
Vol 18 (1) ◽  
pp. 286-295 ◽  
Author(s):  
Jesper Pedersen ◽  
Alexandre Graell i Amat ◽  
Iryna Andriyanova ◽  
Fredrik Brannstrom

2017 ◽  
Vol 65 (12) ◽  
pp. 6213-6230 ◽  
Author(s):  
Theodore S. Rappaport ◽  
Yunchou Xing ◽  
George R. MacCartney ◽  
Andreas F. Molisch ◽  
Evangelos Mellios ◽  
...  

Author(s):  
Dragorad A. Milovanovic ◽  
Zoran S. Bojkovic ◽  
Dragan D. Kukolj

Machine learning (ML) has evolved to the point that this technique enhances communications and enables fifth-generation (5G) wireless networks. ML is great to get insights about complex networks that use large amounts of data, and for predictive and proactive adaptation to dynamic wireless environments. ML has become a crucial technology for mobile broadband communication. Special case goes to deep learning (DL) in immersive media. Through this chapter, the goal is to present open research challenges and applications of ML. An exploration of the potential of ML-based solution approaches in the context of 5G primary eMBB, mMTC, and uHSLLC services is presented, evaluating at the same time open issues for future research, including standardization activities of algorithms and data formats.


Symmetry ◽  
2020 ◽  
Vol 12 (4) ◽  
pp. 676 ◽  
Author(s):  
Mohammed H. Alsharif ◽  
Anabi Hilary Kelechi ◽  
Mahmoud A. Albreem ◽  
Shehzad Ashraf Chaudhry ◽  
M. Sultan Zia ◽  
...  

The standardization activities of the fifth generation communications are clearly over and deployment has commenced globally. To sustain the competitive edge of wireless networks, industrial and academia synergy have begun to conceptualize the next generation of wireless communication systems (namely, sixth generation, (6G)) aimed at laying the foundation for the stratification of the communication needs of the 2030s. In support of this vision, this study highlights the most promising lines of research from the recent literature in common directions for the 6G project. Its core contribution involves exploring the critical issues and key potential features of 6G communications, including: (i) vision and key features; (ii) challenges and potential solutions; and (iii) research activities. These controversial research topics were profoundly examined in relation to the motivation of their various sub-domains to achieve a precise, concrete, and concise conclusion. Thus, this article will contribute significantly to opening new horizons for future research directions.


Sign in / Sign up

Export Citation Format

Share Document