期刊文献+
共找到191篇文章
< 1 2 10 >
每页显示 20 50 100
Secure Channel Estimation Using Norm Estimation Model for 5G Next Generation Wireless Networks
1
作者 Khalil Ullah Song Jian +4 位作者 Muhammad Naeem Ul Hassan Suliman Khan Mohammad Babar Arshad Ahmad Shafiq Ahmad 《Computers, Materials & Continua》 SCIE EI 2025年第1期1151-1169,共19页
The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile networks.These networks are sufficiently scaled to interconnect billions of user... The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile networks.These networks are sufficiently scaled to interconnect billions of users and devices.Researchers in academia and industry are focusing on technological advancements to achieve highspeed transmission,cell planning,and latency reduction to facilitate emerging applications such as virtual reality,the metaverse,smart cities,smart health,and autonomous vehicles.NextG continuously improves its network functionality to support these applications.Multiple input multiple output(MIMO)technology offers spectral efficiency,dependability,and overall performance in conjunctionwithNextG.This article proposes a secure channel estimation technique in MIMO topology using a norm-estimation model to provide comprehensive insights into protecting NextG network components against adversarial attacks.The technique aims to create long-lasting and secure NextG networks using this extended approach.The viability of MIMO applications and modern AI-driven methodologies to combat cybersecurity threats are explored in this research.Moreover,the proposed model demonstrates high performance in terms of reliability and accuracy,with a 20%reduction in the MalOut-RealOut-Diff metric compared to existing state-of-the-art techniques. 展开更多
关键词 Next generation networks massive mimo communication network artificial intelligence 5g adversarial attacks channel estimation information security
在线阅读 下载PDF
Enhancing Bandwidth Allocation Efficiency in 5G Networks with Artificial Intelligence
2
作者 Sarmad K.Ibrahim Saif A.Abdulhussien +1 位作者 Hazim M.ALkargole Hassan H.Qasim 《Computers, Materials & Continua》 2025年第9期5223-5238,共16页
The explosive growth of data traffic and heterogeneous service requirements of 5G networks—covering Enhanced Mobile Broadband(eMBB),Ultra-Reliable Low Latency Communication(URLLC),and Massive Machine Type Communicati... The explosive growth of data traffic and heterogeneous service requirements of 5G networks—covering Enhanced Mobile Broadband(eMBB),Ultra-Reliable Low Latency Communication(URLLC),and Massive Machine Type Communication(mMTC)—present tremendous challenges to conventional methods of bandwidth allocation.A new deep reinforcement learning-based(DRL-based)bandwidth allocation system for real-time,dynamic management of 5G radio access networks is proposed in this paper.Unlike rule-based and static strategies,the proposed system dynamically updates itself according to shifting network conditions such as traffic load and channel conditions to maximize the achievable throughput,fairness,and compliance with QoS requirements.By using extensive simulations mimicking real-world 5G scenarios,the proposed DRL model outperforms current baselines like Long Short-Term Memory(LSTM),linear regression,round-robin,and greedy algorithms.It attains 90%–95%of the maximum theoretical achievable throughput and nearly twice the conventional equal allocation.It is also shown to react well under delay and reliability constraints,outperforming round-robin(hindered by excessive delay and packet loss)and proving to be more efficient than greedy approaches.In conclusion,the efficiency of DRL in optimizing the allocation of bandwidth is highlighted,and its potential to realize self-optimizing,Artificial Intelligence-assisted(AI-assisted)resource management in 5G as well as upcoming 6G networks is revealed. 展开更多
关键词 5g bandwidth allocation DRL for 5g AI-based resource management QoS optimization for 5g networks dynamic spectrum allocation SON
在线阅读 下载PDF
Intelligent Management of Resources for Smart Edge Computing in 5G Heterogeneous Networks Using Blockchain and Deep Learning
3
作者 Mohammad Tabrez Quasim Khair Ul Nisa +3 位作者 Mohammad Shahid Husain Abakar Ibraheem Abdalla Aadam Mohammed Waseequ Sheraz Mohammad Zunnun Khan 《Computers, Materials & Continua》 2025年第7期1169-1187,共19页
Smart edge computing(SEC)is a novel paradigm for computing that could transfer cloud-based applications to the edge network,supporting computation-intensive services like face detection and natural language processing... Smart edge computing(SEC)is a novel paradigm for computing that could transfer cloud-based applications to the edge network,supporting computation-intensive services like face detection and natural language processing.A core feature of mobile edge computing,SEC improves user experience and device performance by offloading local activities to edge processors.In this framework,blockchain technology is utilized to ensure secure and trustworthy communication between edge devices and servers,protecting against potential security threats.Additionally,Deep Learning algorithms are employed to analyze resource availability and optimize computation offloading decisions dynamically.IoT applications that require significant resources can benefit from SEC,which has better coverage.Although access is constantly changing and network devices have heterogeneous resources,it is not easy to create consistent,dependable,and instantaneous communication between edge devices and their processors,specifically in 5G Heterogeneous Network(HN)situations.Thus,an Intelligent Management of Resources for Smart Edge Computing(IMRSEC)framework,which combines blockchain,edge computing,and Artificial Intelligence(AI)into 5G HNs,has been proposed in this paper.As a result,a unique dual schedule deep reinforcement learning(DS-DRL)technique has been developed,consisting of a rapid schedule learning process and a slow schedule learning process.The primary objective is to minimize overall unloading latency and system resource usage by optimizing computation offloading,resource allocation,and application caching.Simulation results demonstrate that the DS-DRL approach reduces task execution time by 32%,validating the method’s effectiveness within the IMRSEC framework. 展开更多
关键词 Smart edge computing heterogeneous networks blockchain 5g network internet of things artificial intelligence
在线阅读 下载PDF
Analysis of Feasible Solutions for Railway 5G Network Security Assessment
4
作者 XU Hang SUN Bin +1 位作者 DING Jianwen WANG Wei 《ZTE Communications》 2025年第3期59-70,共12页
The Fifth Generation of Mobile Communications for Railways(5G-R)brings significant opportunities for the rail industry.However,alongside the potential and benefits of the railway 5G network are complex security challe... The Fifth Generation of Mobile Communications for Railways(5G-R)brings significant opportunities for the rail industry.However,alongside the potential and benefits of the railway 5G network are complex security challenges.Ensuring the security and reliability of railway 5G networks is therefore essential.This paper presents a detailed examination of security assessment techniques for railway 5G networks,focusing on addressing the unique security challenges in this field.In this paper,various security requirements in railway 5G networks are analyzed,and specific processes and methods for conducting comprehensive security risk assessments are presented.This study provides a framework for securing railway 5G network development and ensuring its long-term sustainability. 展开更多
关键词 railway 5g network 5g-R information security risk assessment penetration testing
在线阅读 下载PDF
5G network planning in connecting urban areas for trains service using a genetic algorithm
5
作者 Evangelos D.Spyrou Vassilios Kappatos 《High-Speed Railway》 2025年第2期155-162,共8页
The adoption of 5G for Railways(5G-R)is expanding,particularly in high-speed trains,due to the benefits offered by 5G technology.High-speed trains must provide seamless connectivity and Quality of Service(QoS)to ensur... The adoption of 5G for Railways(5G-R)is expanding,particularly in high-speed trains,due to the benefits offered by 5G technology.High-speed trains must provide seamless connectivity and Quality of Service(QoS)to ensure passengers have a satisfactory experience throughout their journey.Installing base stations along urban environments can improve coverage but can dramatically reduce the experience of users due to interference.In particular,when a user with a mobile phone is a passenger in a high speed train traversing between urban centres,the coverage and the 5G resources in general need to be adequate not to diminish her experience of the service.The utilization of macro,pico,and femto cells may optimize the utilization of 5G resources.In this paper,a Genetic Algorithm(GA)-based approach to address the challenges of 5G network planning for 5G-R services is presented.The network is divided into three cell types,macro,pico,and femto cells—and the optimization process is designed to achieve a balance between key objectives:providing comprehensive coverage,minimizing interference,and maximizing energy efficiency.The study focuses on environments with high user density,such as high-speed trains,where reliable and high-quality connectivity is critical.Through simulations,the effectiveness of the GA-driven framework in optimizing coverage and performance in such scenarios is demonstrated.The algorithm is compared with the Particle Swarm Optimisation(PSO)and the Simulated Annealing(SA)methods and interesting insights emerged.The GA offers a strong balance between coverage and efficiency,achieving significantly higher coverage than PSO while maintaining competitive energy efficiency and interference levels.Its steady fitness improvement and adaptability make it well-suited for scenarios where wide coverage is a priority alongside acceptable performance trade-offs. 展开更多
关键词 High speed train 5g network planning genetic algorithm
在线阅读 下载PDF
ScalaDetect-5G:Ultra High-Precision Highly Elastic Deep Intrusion Detection System for 5G Network
6
作者 Shengjia Chang Baojiang Cui Shaocong Feng 《Computer Modeling in Engineering & Sciences》 2025年第9期3805-3827,共23页
With the rapid advancement of mobile communication networks,key technologies such as Multi-access Edge Computing(MEC)and Network Function Virtualization(NFV)have enhanced the quality of service for 5G users but have a... With the rapid advancement of mobile communication networks,key technologies such as Multi-access Edge Computing(MEC)and Network Function Virtualization(NFV)have enhanced the quality of service for 5G users but have also significantly increased the complexity of network threats.Traditional static defense mechanisms are inadequate for addressing the dynamic and heterogeneous nature of modern attack vectors.To overcome these challenges,this paper presents a novel algorithmic framework,SD-5G,designed for high-precision intrusion detection in 5G environments.SD-5G adopts a three-stage architecture comprising traffic feature extraction,elastic representation,and adaptive classification.Specifically,an enhanced Concrete Autoencoder(CAE)is employed to reconstruct and compress high-dimensional network traffic features,producing compact and expressive representations suitable for large-scale 5G deployments.To further improve accuracy in ambiguous traffic classification,a Residual Convolutional Long Short-Term Memory model with an attention mechanism(ResCLA)is introduced,enabling multi-level modeling of spatial–temporal dependencies and effective detection of subtle anomalies.Extensive experiments on benchmark datasets—including 5G-NIDD,CIC-IDS2017,ToN-IoT,and BoT-IoT—demonstrate that SD-5G consistently achieves F1 scores exceeding 99.19%across diverse network environments,indicating strong generalization and real-time deployment capabilities.Overall,SD-5G achieves a balance between detection accuracy and deployment efficiency,offering a scalable,flexible,and effective solution for intrusion detection in 5G and next-generation networks. 展开更多
关键词 5g security network intrusion detection feature engineering deep learning
在线阅读 下载PDF
Ensemble Encoder-Based Attack Traffic Classification for Secure 5G Slicing Networks
7
作者 Min-Gyu Kim Hwankuk Kim 《Computer Modeling in Engineering & Sciences》 2025年第5期2391-2415,共25页
This study proposes an efficient traffic classification model to address the growing threat of distributed denial-of-service(DDoS)attacks in 5th generation technology standard(5G)slicing networks.The proposed method u... This study proposes an efficient traffic classification model to address the growing threat of distributed denial-of-service(DDoS)attacks in 5th generation technology standard(5G)slicing networks.The proposed method utilizes an ensemble of encoder components from multiple autoencoders to compress and extract latent representations from high-dimensional traffic data.These representations are then used as input for a support vector machine(SVM)-based metadata classifier,enabling precise detection of attack traffic.This architecture is designed to achieve both high detection accuracy and training efficiency,while adapting flexibly to the diverse service requirements and complexity of 5G network slicing.The model was evaluated using the DDoS Datasets 2022,collected in a simulated 5G slicing environment.Experiments were conducted under both class-balanced and class-imbalanced conditions.In the balanced setting,the model achieved an accuracy of 89.33%,an F1-score of 88.23%,and an Area Under the Curve(AUC)of 89.45%.In the imbalanced setting(attack:normal 7:3),the model maintained strong robustness,=achieving a recall of 100%and an F1-score of 90.91%,demonstrating its effectiveness in diverse real-world scenarios.Compared to existing AI-based detection methods,the proposed model showed higher precision,better handling of class imbalance,and strong generalization performance.Moreover,its modular structure is well-suited for deployment in containerized network function(NF)environments,making it a practical solution for real-world 5G infrastructure.These results highlight the potential of the proposed approach to enhance both the security and operational resilience of 5G slicing networks. 展开更多
关键词 5g slicing networks attack traffic classification ensemble encoders autoencoder AI-based security
在线阅读 下载PDF
Key Agreement and Management Scheme Based on Blockchain for 5G-Enabled Vehicular Networks
8
作者 Wang Zhihua Wang Shuaibo +4 位作者 Wang Haofan Li Jiaze Yao Yizhe Wang Yongjian Yang Xiaolong 《China Communications》 2025年第3期270-287,共18页
5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large nu... 5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large number of devices,thus realizing richer application scenarios and constructing 5G-enabled vehicular networks.However,due to the vulnerability of wireless communication,vehicle privacy and communication security have become the key problems to be solved in vehicular networks.Moreover,the large-scale communication in the vehicular networks also makes the higher communication efficiency an inevitable requirement.In order to achieve efficient and secure communication while protecting vehicle privacy,this paper proposes a lightweight key agreement and key update scheme for 5G vehicular networks based on blockchain.Firstly,the key agreement is accomplished using certificateless public key cryptography,and based on the aggregate signature and the cooperation between the vehicle and the trusted authority,an efficient key updating method is proposed,which reduces the overhead and protects the privacy of the vehicle while ensuring the communication security.Secondly,by introducing blockchain and using smart contracts to load the vehicle public key table for key management,this meets the requirements of vehicle traceability and can dynamically track and revoke misbehaving vehicles.Finally,the formal security proof under the eck security model and the informal security analysis is conducted,it turns out that our scheme is more secure than other authentication schemes in the vehicular networks.Performance analysis shows that our scheme has lower overhead than existing schemes in terms of communication and computation. 展开更多
关键词 blockchain certificateless public key cryptography 5g vehicular networks key agreement key management
在线阅读 下载PDF
Learning-Based Delay Sensitive and Reliable Traffic Adaptation for DC-PLC and 5G Integrated Multi-Mode Heterogeneous Networks
9
作者 Tian Gexing Wang Ruiqiuyu +6 位作者 Pan Chao Zhou Zhenyu Yang Junzhong Zhao Chenkai Chen Bei Yang Sen Shahid Mumtaz 《China Communications》 2025年第4期65-80,共16页
Low-carbon smart parks achieve selfbalanced carbon emission and absorption through the cooperative scheduling of direct current(DC)-based distributed photovoltaic,energy storage units,and loads.Direct current power li... Low-carbon smart parks achieve selfbalanced carbon emission and absorption through the cooperative scheduling of direct current(DC)-based distributed photovoltaic,energy storage units,and loads.Direct current power line communication(DC-PLC)enables real-time data transmission on DC power lines.With traffic adaptation,DC-PLC can be integrated with other complementary media such as 5G to reduce transmission delay and improve reliability.However,traffic adaptation for DC-PLC and 5G integration still faces the challenges such as coupling between traffic admission control and traffic partition,dimensionality curse,and the ignorance of extreme event occurrence.To address these challenges,we propose a deep reinforcement learning(DRL)-based delay sensitive and reliable traffic adaptation algorithm(DSRTA)to minimize the total queuing delay under the constraints of traffic admission control,queuing delay,and extreme events occurrence probability.DSRTA jointly optimizes traffic admission control and traffic partition,and enables learning-based intelligent traffic adaptation.The long-term constraints are incorporated into both state and bound of drift-pluspenalty to achieve delay awareness and enforce reliability guarantee.Simulation results show that DSRTA has lower queuing delay and more reliable quality of service(QoS)guarantee than other state-of-the-art algorithms. 展开更多
关键词 DC-PLC and 5g integration multi-mode heterogeneous networks traffic adaptation traffic admission control traffic partition
在线阅读 下载PDF
基于多维参数采样判决机制的LTE-5G网络恶意节点检出算法
10
作者 王来兵 《伊犁师范大学学报(自然科学版)》 2024年第4期69-76,共8页
为解决以LTE-5G(Long Term Evolution-5G)为代表的新一代移动通信技术存在的网络恶意节点检出效率较低、流量查证识别能力较弱等不足,提出了一种基于多维参数采样判决机制的LTE-5G网络恶意节点检出算法.首先,针对网络恶意节点行为所产... 为解决以LTE-5G(Long Term Evolution-5G)为代表的新一代移动通信技术存在的网络恶意节点检出效率较低、流量查证识别能力较弱等不足,提出了一种基于多维参数采样判决机制的LTE-5G网络恶意节点检出算法.首先,针对网络恶意节点行为所产生的外溢流量特点,根据节点时域抽样特性及指纹特点,设计了多维参数采样判决机制,该机制通过采样鉴权序列定向匹配节点时域特征并筛除不符合特征的疑似恶意节点,从而达到较高的检测效果.其次,为进一步清除潜伏状态的恶意节点,结合微分机制,构建黑洞数据鉴权阈值,通过该阈值控制网络清洗流量,仅将高于该阈值的疑似节点予以清洗处理,从而降低误判情形,改善因节点离线而导致网络传输性能出现下降的现象.仿真实验表明,与当前常用的基于神经网络的加权投票鉴权机制的数据清洗方案和基于鲸鱼-狮子联合优化机制的数据清洗方案相比,本文算法具有更高的网络传输带宽和恶意节点检出率,以及更低的网络节点离线频次,在实践中具有较高的推广价值. 展开更多
关键词 lte-5g网络 多维特征 采样鉴权 黑洞清洗 流量挖掘
在线阅读 下载PDF
基于LTE专网与5G公网冗余融合的车地通信方案 被引量:5
11
作者 雷彬 白轩 《铁路通信信号工程技术》 2025年第1期98-104,共7页
结合丽江有轨电车1号线,对LTE专网通信与5G公网通信冗余融合的通信方案进行详细研究分析。丽江1号线使用LTE专网作为信号系统车-地无线通信数据传输的主用通道,5G公网作为备用通道,负责信号系统中列车与地面信号设备之间数据报文的发送... 结合丽江有轨电车1号线,对LTE专网通信与5G公网通信冗余融合的通信方案进行详细研究分析。丽江1号线使用LTE专网作为信号系统车-地无线通信数据传输的主用通道,5G公网作为备用通道,负责信号系统中列车与地面信号设备之间数据报文的发送和接收,实现信号系统地面控制中心、车站、车辆基地、轨旁和车载信号设备之间的数据信息传输,保证信号系统通信业务数据正常。详细论述LTE专网与5G公网融合通信方案,对城市轨道交通行业数据通信技术未来的发展提供了重要的参考。 展开更多
关键词 城市轨道交通 数据通信技术 信号系统 车-地无线通信 LTE专网 5g公网
在线阅读 下载PDF
Modeling and Comprehensive Review of Signaling Storms in 3GPP-Based Mobile Broadband Networks:Causes,Solutions,and Countermeasures
12
作者 Muhammad Qasim Khan Fazal Malik +1 位作者 Fahad Alturise Noor Rahman 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期123-153,共31页
Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important a... Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important and scarce network resources such as bandwidth and processing power.There have been several reports of these control signaling turning into signaling storms halting network operations and causing the respective Telecom companies big financial losses.This paper draws its motivation from such real network disaster incidents attributed to signaling storms.In this paper,we present a thorough survey of the causes,of the signaling storm problems in 3GPP-based mobile broadband networks and discuss in detail their possible solutions and countermeasures.We provide relevant analytical models to help quantify the effect of the potential causes and benefits of their corresponding solutions.Another important contribution of this paper is the comparison of the possible causes and solutions/countermeasures,concerning their effect on several important network aspects such as architecture,additional signaling,fidelity,etc.,in the form of a table.This paper presents an update and an extension of our earlier conference publication.To our knowledge,no similar survey study exists on the subject. 展开更多
关键词 Signaling storm problems control signaling load analytical modeling 3gPP networks smart devices diameter signaling mobile broadband data access data traffic mobility management signaling network architecture 5g mobile communication
在线阅读 下载PDF
Towards a Low-Altitude Aerial Intelligent Network: Vision, Challenges, and Key Technologies
13
作者 Huang Yuhong Ding Haiyu +6 位作者 Chen Weiyan Kong Luting Deng Wei Li Xin Liu Yang Wang Guizhen Liu Liang 《China Communications》 2025年第9期1-21,共21页
The large-scale development of the lowaltitude economy imposes increasingly stringent requirements on the supporting information infrastructure,necessitating the establishment of a low-altitude intelligent network(LAI... The large-scale development of the lowaltitude economy imposes increasingly stringent requirements on the supporting information infrastructure,necessitating the establishment of a low-altitude intelligent network(LAIN)with wide-area communication,high-precision navigation,and efficient supervision capabilities.Benefiting from its broad coverage,high reliability,and large bandwidth,the 5G cellular network serves as a critical foundation for LAIN construction.However,conventional cellular networks are primarily designed for two-dimensional terrestrial scenarios,and thus face significant limitations in coverage and interference resistance within complex three-dimensional low-altitude environments.To address the unique demands of LAIN applications,key challenges must be tackled,including achieving seamless three-dimensional coverage,mitigating interference in multi-dimensional network deployments,and ensuring stringent requirements for service quality and security supervision.This paper proposes an integrated LAIN architecture characterized by the convergence of communication,navigation,sensing,and management,enhanced with artificial intelligence and security mechanisms to improve overall system intelligence and resilience.Furthermore,this paper conducts an in-depth analysis of the critical challenges in LAIN deployment,explores enabling technologies to address these issues,and offers insights into the future development direction of low-altitude intelligent networks. 展开更多
关键词 cellular network 5g 5g-A low-altitude aerial intelligent network low-altitude economy mobile communication
在线阅读 下载PDF
A reconstruction and recovery network-based channel estimation in high-speed railway wireless communications
14
作者 Qingmiao Zhang Yuhao Zhao +1 位作者 Hanzhi Dong Junhui Zhao 《Digital Communications and Networks》 2025年第2期505-513,共9页
The integration of high-speed railway communication systems with 5G technology is widely recognized as a significant development.Due to the considerable mobility of trains and the complex nature of the environment,the... The integration of high-speed railway communication systems with 5G technology is widely recognized as a significant development.Due to the considerable mobility of trains and the complex nature of the environment,the wireless channel exhibits non-stationary characteristics and fast time-varying characteristics,which presents significant hurdles in terms of channel estimation.In addition,the use of massive MIMO technology in the context of 5G networks also leads to an increase in the complexity of estimation.To address the aforementioned issues,this paper presents a novel approach for channel estimation in high mobility scenarios using a reconstruction and recovery network.In this method,the time-frequency response of the channel is considered as a two-dimensional image.The Fast Super-Resolution Convolution Neural Network(FSRCNN)is used to first reconstruct channel images.Next,the Denoising Convolution Neural Network(DnCNN)is applied to reduce the channel noise and improve the accuracy of channel estimation.Simulation results show that the accuracy of the channel estimation model surpasses that of the standard channel estimation method,while also exhibiting reduced algorithmic complexity. 展开更多
关键词 High-speed railway Channel estimation OFDM system 5g Convolution neural network
在线阅读 下载PDF
Research on the Practical Strategy of 5G Mobile Communication Technology in Power Communication
15
作者 Wanshen Peng 《Journal of Electronic Research and Application》 2025年第3期119-124,共6页
With the acceleration of the intelligent transformation of power systems,the requirements for communication technology are increasingly stringent.The application of 5G mobile communication technology in power communic... With the acceleration of the intelligent transformation of power systems,the requirements for communication technology are increasingly stringent.The application of 5G mobile communication technology in power communication is analyzed.In this study,5G technology features,application principles,and practical strategies are discussed,and methods such as network slicing,customized deployment,edge computing collaborative application,communication equipment integration and upgrading,and multi-technology collaboration and complementation are proposed.It aims to effectively improve the efficiency,reliability,and security of power communication,solve the problem that traditional communication technology is difficult to meet the diversified needs of power business,and achieve the effect of optimizing the power communication network and supporting the intelligent development of the power system. 展开更多
关键词 5g mobile communication technology Electric power communication network slicing Edge computing Multi-technology collaboration
在线阅读 下载PDF
Handover management in beyond 5G HetNet topologies with unbalanced user distribution
16
作者 Abdussamet Hatipoglu Mehmet Akif Yazici +2 位作者 Mehmet Basaran Mine Ardanuc Lutfiye Durak-Ata 《Digital Communications and Networks》 2025年第2期465-472,共8页
The increase in user mobility and density in modern cellular networks increases the risk of overloading certain base stations in popular locations such as shopping malls or stadiums,which can result in connection loss... The increase in user mobility and density in modern cellular networks increases the risk of overloading certain base stations in popular locations such as shopping malls or stadiums,which can result in connection loss for some users.To combat this,the traffic load of base stations should be kept as balanced as possible.In this paper,we propose an efficient load balancing-aware handover algorithm for highly dynamic beyond 5G heterogeneous networks by assigning mobile users to base stations with lighter loads when a handover is performed.The proposed algorithm is evaluated in a scenario with users having different levels of mobility,such as pedestrians and vehicles,and is shown to outperform the conventional handover mechanism,as well as another algorithm from the literature.As a secondary benefit,the overall energy consumption in the network is shown to be reduced with the proposed algorithm. 展开更多
关键词 Beyond 5g Handover management Load balancing Markov chain Poisson point process Poisson hole process Ultra-dense heterogeneous network
在线阅读 下载PDF
Advancing 5G Network Applications Lifecycle Security:An ML-Driven Approach
17
作者 Ana Hermosilla Jorge Gallego-Madrid +3 位作者 Pedro Martinez-Julia Jordi Ortiz Ved P.Kafle Antonio Skarmeta 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1447-1471,共25页
As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof pa... As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security. 展开更多
关键词 network application network function virtualization machine learning SECURITY 5g
在线阅读 下载PDF
Channel assignment and power allocation for throughput improvement with PPO in B5G heterogeneous edge networks
18
作者 Xiaoming He Yingchi Mao +3 位作者 Yinqiu Liu Ping Ping Yan Hong Han Hu 《Digital Communications and Networks》 SCIE CSCD 2024年第1期109-116,共8页
In Beyond the Fifth Generation(B5G)heterogeneous edge networks,numerous users are multiplexed on a channel or served on the same frequency resource block,in which case the transmitter applies coding and the receiver u... In Beyond the Fifth Generation(B5G)heterogeneous edge networks,numerous users are multiplexed on a channel or served on the same frequency resource block,in which case the transmitter applies coding and the receiver uses interference cancellation.Unfortunately,uncoordinated radio resource allocation can reduce system throughput and lead to user inequity,for this reason,in this paper,channel allocation and power allocation problems are formulated to maximize the system sum rate and minimum user achievable rate.Since the construction model is non-convex and the response variables are high-dimensional,a distributed Deep Reinforcement Learning(DRL)framework called distributed Proximal Policy Optimization(PPO)is proposed to allocate or assign resources.Specifically,several simulated agents are trained in a heterogeneous environment to find robust behaviors that perform well in channel assignment and power allocation.Moreover,agents in the collection stage slow down,which hinders the learning of other agents.Therefore,a preemption strategy is further proposed in this paper to optimize the distributed PPO,form DP-PPO and successfully mitigate the straggler problem.The experimental results show that our mechanism named DP-PPO improves the performance over other DRL methods. 展开更多
关键词 B5g Heterogeneous edge networks PPO Channel assignment Power allocation THROUgHPUT
在线阅读 下载PDF
Information Centric Networking Based Cooperative Caching Framework for 5G Communication Systems
19
作者 R.Mahaveerakannan Thanarajan Tamilvizhi +2 位作者 Sonia Jenifer Rayen Osamah Ibrahim Khalaf Habib Hamam 《Computers, Materials & Continua》 SCIE EI 2024年第9期3945-3966,共22页
The demands on conventional communication networks are increasing rapidly because of the exponential expansion of connected multimedia content.In light of the data-centric aspect of contemporary communication,the info... The demands on conventional communication networks are increasing rapidly because of the exponential expansion of connected multimedia content.In light of the data-centric aspect of contemporary communication,the information-centric network(ICN)paradigm offers hope for a solution by emphasizing content retrieval by name instead of location.If 5G networks are to meet the expected data demand surge from expanded connectivity and Internet of Things(IoT)devices,then effective caching solutions will be required tomaximize network throughput andminimize the use of resources.Hence,an ICN-based Cooperative Caching(ICN-CoC)technique has been used to select a cache by considering cache position,content attractiveness,and rate prediction.The findings show that utilizing our suggested approach improves caching regarding the Cache Hit Ratio(CHR)of 84.3%,Average Hop Minimization Ratio(AHMR)of 89.5%,and Mean Access Latency(MAL)of 0.4 s.Within a framework,it suggests improved caching strategies to handle the difficulty of effectively controlling data consumption in 5G networks.These improvements aim to make the network run more smoothly by enhancing content delivery,decreasing latency,and relieving congestion.By improving 5G communication systems’capacity tomanage the demands faced by modern data-centric applications,the research ultimately aids in advancement. 展开更多
关键词 Information-centric networking caching schemes 5g communication non-negative matrix factorization(NMF) weighted clustering algorithm
在线阅读 下载PDF
基于联合编码误差消除机制的LTE-5G数据传输算法 被引量:2
20
作者 范晖 夏清国 黄健 《计算机工程与设计》 北大核心 2018年第5期1247-1253,共7页
针对当前LTE-5G网络数据优化传输算法存在的误码扩散严重,且其传输过程中易受信道噪声干扰的问题,提出基于联合编码误差消除机制的LTE-5G网络数据优化传输算法。基于信道误码率性能排序,构建误差分组生成机制,利用一级、二级误差分组的... 针对当前LTE-5G网络数据优化传输算法存在的误码扩散严重,且其传输过程中易受信道噪声干扰的问题,提出基于联合编码误差消除机制的LTE-5G网络数据优化传输算法。基于信道误码率性能排序,构建误差分组生成机制,利用一级、二级误差分组的误差扩散特性,采用回溯方式优化信源-信道交互期间的传输误差;基于分组误差块排序的等级特性,构建分级映射降噪规则,优化信号预发射过程,减缓信源编码中存在的误码扩散现象。仿真结果表明,与当前自适应数据压缩传输优化算法(adaptive data compression transmission algorithm,ADCT)、分支误差优化传输算法(branch error optimal transmission algorithm,BEOT)相比,所提算法具有更强的抗噪性能与更低的传输误码率。 展开更多
关键词 lte-5g网络 联合编码 分级映射 误差扩散 误差分组 信源-信道交互 信道误码
在线阅读 下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部