Cognitive Radio Network-Based Design and Security Challenges in 5G Communication

Author(s):  
Arvind Dhaka ◽  
Amita Nandal ◽  
Rahul Dixit

This chapter deals with the main development challenges of 5G network. The 5G terminals can be made as reconfigurable multimode and cognitive radio enabled. Such networks will have software defined radio modulation schemes. The 5G mobile networks will focus on the development of the user terminals where the terminals will have access to different wireless technologies at the same time and will combine different flows from different technologies. It is beneficial to deploy cloud-computing platforms running on general-purpose hardware, leading to a cloud-RAN system. This chapter is focused on the challenges and benefits of implementing reconfigurable signal processing algorithms on a cloud-computing platform and address various security issues with cognitive radio networks.

Author(s):  
Arvind Dhaka ◽  
Amita Nandal ◽  
Rahul Dixit

This chapter deals with the main development challenges of 5G network. The 5G terminals can be made as reconfigurable multimode and cognitive radio enabled. Such networks will have software defined radio modulation schemes. The 5G mobile networks will focus on the development of the user terminals where the terminals will have access to different wireless technologies at the same time and will combine different flows from different technologies. It is beneficial to deploy cloud-computing platforms running on general-purpose hardware, leading to a cloud-RAN system. This chapter is focused on the challenges and benefits of implementing reconfigurable signal processing algorithms on a cloud-computing platform and address various security issues with cognitive radio networks.


Author(s):  
Sachin Shetty ◽  
Danda B. Rawat

This chapter describes state-of-the art techniques to improve performance of spectrum sensing and spectrum management in Cognitive Radio Networks (CRN) by leveraging services available in cloud computing platforms. CRNs are capable of adaptive learning and reconfiguration to provide consistent communications in dynamic environments. However, ensuring adaptation and learning in CRN will require availability of large volume of data and fast processing. However, the performance and security of CRN is considerably constrained by its limited power, memory and computational capacity, it may not be able to achieve its full capability. Fortunately, the advent of cloud computing has the potential to mitigate these constraints due its vast storage and computational capacity.


Author(s):  
Paramjeet Kaur

Cloud computing is a new computing model which is widely emerging technology in the recent years is adopted by most of the IT companies and other organizations. Cloud computing enables individuals and organizations to gain access to huge computing resources without capital investment. Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Cloud computing is the internet depend technology which is providing the services to user, small and large organization on demand. Cloud computing stored the user data and maintain in the data canter of cloud provider like Amazon, Oracle, Google, Microsoft etc. However, the cloud environment is considered untrusted as it is accessed through Internet. Therefore people have security concerns on data stored in cloud environment. The major concern of cloud environment is security during upload the data on cloud server.


Author(s):  
Bharathkumar Ravichandran

In the fifth generation mobile communication architecture (5G), network functions which traditionally existed as discrete hardware entities based on custom architectures, are replaced with dynamic, scalable Virtual Network Functions (VNF) that run on general purpose (x86) cloud computing platforms, under the paradigm Network Function Virtualization (NFV). The shift towards a virtualized infrastructure poses its own set of security challenges that need to be addressed. One such challenge that we seek to address in this paper is providing integrity, authenticity and confidentiality protection for VNFs.


Author(s):  
Wagner Al Alam ◽  
Francisco Carvalho Junior

The efforts to make cloud computing suitable for the requirements of HPC applications have motivated us to design HPC Shelf, a cloud computing platform of services for building and deploying parallel computing systems for large-scale parallel processing. We introduce Alite, the system of contextual contracts of HPC Shelf, aimed at selecting component implementations according to requirements of applications, features of targeting parallel computing platforms (e.g. clusters), QoS (Quality-of-Service) properties and cost restrictions. It is evaluated through a small-scale case study employing a componentbased framework for matrix-multiplication based on the BLAS library.


2020 ◽  
Vol 2020 ◽  
pp. 1-19
Author(s):  
Nicolas Malm ◽  
Kalle Ruttik ◽  
Olav Tirkkonen

Cloud computing provides benefits in terms of equipment consolidation and power savings from higher utilization for virtualizable software. Cellular communication software faces challenges in cloud computing platforms. BSs create a specific load profile that differs from traditional cloud service loads. Cellular communication system implementations have real-time deadlines with fixed, periodic latency requirements. In this paper, we assess the suitability of an unmodified Ubuntu Linux OS running on a commodity server to operate latency-critical software using a 4G LTE BS software-defined radio implementation. Scaling of the CPU clock frequency is shown to be feasible without excessive impact on the platform’s ability to meet the 4 ms processing delay requirement imposed by the LTE standard. Measurements show the relationship between the processor’s operating frequency and the number of missed subframe processing deadlines to be nonlinear. The results obtained also indicate that a high computational capacity does not suffice to ensure satisfactory operation since fronthaul processing overhead can limit achievable performance. Use of offload-capable network interface cards is studied as a potential remedy.


Presently a days, cloud computing is a rising and method for registering in software engineering. Cloud computing is an arrangement of assets and administrations that are offered by the system or web. Distributed computing broadens different figuring methods like framework registering, appropriated processing. Today distributed computing is utilized as a part of both mechanical, research and scholastic fields. Cloud encourages its clients by giving virtual assets through web. As the field of distributed computing is spreading the new procedures are producing for cloud security. This expansion in distributed computing condition likewise expands security challenges for cloud designers. Customers or Users of cloud spare their information in the cloud subsequently the absence of security in cloud can lose the client's trust. In this paper we will discuss about on cloud database and information mining security issues in different viewpoints like multi-occupancy, flexibility, unwavering quality, accessibility on different divisions like modern and research regions, and furthermore examine existing security methods and methodologies for a safe cloud condition through enormous information ideas. What's more, this paper additionally study different parts of mechanical, training and research areas. This paper will empower scientists and experts to think about various security dangers, models and apparatuses proposed in existing distributed storage.


2019 ◽  
Vol 8 (4) ◽  
pp. 424
Author(s):  
Dr. K.SAI MANOJ

Now a days, cloud computing is an emerging and way of computing in computer science. Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed compu-ting. Today cloud computing is used in both industrial, research and academic field. Cloud facilitates its users by providing virtual resources via internet. As the field of cloud computing is spreading the new techniques are developing. This increase in cloud computing environment also increases security challenges for cloud developers. Users of cloud save their data in the cloud hence the lack of security in cloud can lose the user’s trust.In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy, elasticity, reliability, availability etc in various sectors, the paper also discuss existing security techniques and approaches for a secure cloud environment. This paper will enable researchers and professionals to know about different security threats and models and tools proposed.  


2021 ◽  
Vol 14 (4) ◽  
pp. 448-461
Author(s):  
Mohammad Mehrtak ◽  
◽  
SeyedAhmad SeyedAlinaghi ◽  
Mehrzad MohsseniPour ◽  
Tayebeh Noori ◽  
...  

Cloud computing is among the most beneficial solutions to digital problems. Security is one of the focal issues in cloud computing technology, and this study aims at investigating security issues of cloud computing and their probable solutions. A systematic review was performed using Scopus, Pubmed, Science Direct, and Web of Science databases. Once the title and abstract were evaluated, the quality of studies was assessed in order to choose the most relevant according to exclusion and inclusion criteria. Then, the full texts of studies selected were read thoroughly to extract the necessary results. According to the review, data security, availability, and integrity, as well as information confidentiality and network security, were the major challenges in cloud security. Further, data encryption, authentication, and classification, besides application programming interfaces (API), were security solutions to cloud infrastructure. Data encryption could be applied to store and retrieve data from the cloud in order to provide secure communication. Besides, several central challenges, which make the cloud security engineering process problematic, have been considered in this study.


Author(s):  
Shantanu Pal

In a cloud ecosystem, most of the data and software that users use reside on the remote server(s), which brings some new challenges for the system, especially security and privacy. At present, these security threats and attacks are the greatest concern for the service providers towards delivering a more secure cloud infrastructure. One of the major concerns is data security, implemented by the most effective means possible and the protection of stored data from unauthorized users and hackers. When considering these security issues, trust is one of the most important means to improve the system’s security and enable interoperability of current heterogeneous cloud computing platforms. The objective of this chapter is to discuss and understand the basic security and privacy challenges of a cloud computing environment as the security of cloud computing is the greatest challenge for delivering a safer cloud environment for both the service providers and the service customers. With this in mind, this chapter will introduce the risks and possible attacks in a cloud computing environment. The major goal is to specify the security risks and attacks and consider trust of cloud service users for delivering a safer and innovation business model.


Sign in / Sign up

Export Citation Format

Share Document