Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (26)
  • Open Access

    ARTICLE

    Advancing 5G Network Applications Lifecycle Security: An ML-Driven Approach

    Ana Hermosilla1,2,*, Jorge Gallego-Madrid1, Pedro Martinez-Julia3, Jordi Ortiz4, Ved P. Kafle3, Antonio Skarmeta1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1447-1471, 2024, DOI:10.32604/cmes.2024.053379 - 27 September 2024

    Abstract As 5th Generation (5G) and Beyond 5G (B5G) networks become increasingly prevalent, ensuring not only network security but also the security and reliability of the applications, the so-called network applications, becomes of paramount importance. This paper introduces a novel integrated model architecture, combining a network application validation framework with an AI-driven reactive system to enhance security in real-time. The proposed model leverages machine learning (ML) and artificial intelligence (AI) to dynamically monitor and respond to security threats, effectively mitigating potential risks before they impact the network infrastructure. This dual approach not only validates the functionality… More >

  • Open Access

    ARTICLE

    Federated Network Intelligence Orchestration for Scalable and Automated FL-Based Anomaly Detection in B5G Networks

    Pablo Fernández Saura1,*, José M. Bernabé Murcia1, Emilio García de la Calera Molina1, Alejandro Molina Zarca2, Jorge Bernal Bernabé1, Antonio F. Skarmeta Gómez1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 163-193, 2024, DOI:10.32604/cmc.2024.051307 - 18 July 2024

    Abstract The management of network intelligence in Beyond 5G (B5G) networks encompasses the complex challenges of scalability, dynamicity, interoperability, privacy, and security. These are essential steps towards achieving the realization of truly ubiquitous Artificial Intelligence (AI)-based analytics, empowering seamless integration across the entire Continuum (Edge, Fog, Core, Cloud). This paper introduces a Federated Network Intelligence Orchestration approach aimed at scalable and automated Federated Learning (FL)-based anomaly detection in B5G networks. By leveraging a horizontal Federated learning approach based on the FedAvg aggregation algorithm, which employs a deep autoencoder model trained on non-anomalous traffic samples to recognize… More >

  • Open Access

    ARTICLE

    Optical Neural Networks: Analysis and Prospects for 5G Applications

    Doaa Sami Khafaga1, Zongming Lv2, Imran Khan3,4, Shebnam M. Sefat5, Amel Ali Alhussan1,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3723-3740, 2023, DOI:10.32604/cmc.2023.039956 - 26 December 2023

    Abstract With the capacities of self-learning, acquainted capacities, high-speed looking for ideal arrangements, solid nonlinear fitting, and mapping self-assertively complex nonlinear relations, neural systems have made incredible advances and accomplished broad application over the final half-century. As one of the foremost conspicuous methods for fake insights, neural systems are growing toward high computational speed and moo control utilization. Due to the inborn impediments of electronic gadgets, it may be troublesome for electronic-implemented neural systems to make the strides these two exhibitions encourage. Optical neural systems can combine optoelectronic procedures and neural organization models to provide ways… More >

  • Open Access

    ARTICLE

    An Optimized Approach for Spectrum Utilization in mmWave Massive MIMO 5G Wireless Networks

    Elsaid Md. Abdelrahim1,2, Mona Alduailij3, Mai Alduailij3, Romany F. Mansour4,*, Osama A. Ghoneim5

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1493-1505, 2023, DOI:10.32604/csse.2023.037976 - 28 July 2023

    Abstract Massive multiple-input multiple-output (MIMO) systems that use the millimeter-wave (mm-wave) band have a higher frequency and more antennas, which leads to significant path loss, high power consumption, and server interference. Due to these issues, the spectrum efficiency is significantly reduced, making spectral efficiency improvement an important research topic for 5G communication. Together with communication in the terahertz (THz) bands, mmWave communication is currently a component of the 5G standards and is seen as a solution to the commercial bandwidth shortage. The quantity of continuous, mostly untapped bandwidth in the 30–300 GHz band has presented a rare… More >

  • Open Access

    ARTICLE

    An Intelligent Admission Control Scheme for Dynamic Slice Handover Policy in 5G Network Slicing

    Ratih Hikmah Puspita1, Jehad Ali1,*, Byeong-hee Roh2

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4611-4631, 2023, DOI:10.32604/cmc.2023.033598 - 31 March 2023

    Abstract 5G use cases, for example enhanced mobile broadband (eMBB), massive machine-type communications (mMTC), and an ultra-reliable low latency communication (URLLC), need a network architecture capable of sustaining stringent latency and bandwidth requirements; thus, it should be extremely flexible and dynamic. Slicing enables service providers to develop various network slice architectures. As users travel from one coverage region to another area, the call must be routed to a slice that meets the same or different expectations. This research aims to develop and evaluate an algorithm to make handover decisions appearing in 5G sliced networks. Rules of… More >

  • Open Access

    ARTICLE

    Machine Learning Based Classifiers for QoE Prediction Framework in Video Streaming over 5G Wireless Networks

    K. B. Ajeyprasaath, P. Vetrivelan*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1919-1939, 2023, DOI:10.32604/cmc.2023.036013 - 06 February 2023

    Abstract Recently, the combination of video services and 5G networks have been gaining attention in the wireless communication realm. With the brisk advancement in 5G network usage and the massive popularity of three-dimensional video streaming, the quality of experience (QoE) of video in 5G systems has been receiving overwhelming significance from both customers and service provider ends. Therefore, effectively categorizing QoE-aware video streaming is imperative for achieving greater client satisfaction. This work makes the following contribution: First, a simulation platform based on NS-3 is introduced to analyze and improve the performance of video services. The simulation… More >

  • Open Access

    ARTICLE

    An Enhanced Group Key-Based Security Protocol to Protect 5G SON Against FBS

    Hoonyong Park1, TaeGuen Kim1, Daniel Gerbi Duguma1, Jiyoon Kim2, Ilsun You2,*, Willy Susilo3

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1145-1165, 2023, DOI:10.32604/csse.2023.032044 - 03 November 2022

    Abstract Network operators are attempting many innovations and changes in 5G using self-organizing networks (SON). The SON operates on the measurement reports (MR), which are obtained from user equipment (UE) and secured against malware and userspace programs. However, the synchronization signal block that the UE relies on to measure the wireless environment configured by a base station is not authenticated. As a result, the UE will likely gauge the wrong wireless environment configured by a false base station (FBS) and transmit the corresponding MR to the serving base station, which poisons the data used for 5G… More >

  • Open Access

    ARTICLE

    Optimal Resource Allocation for NOMA Wireless Networks

    Fahad R. Albogamy1, M. A. Aiyashi2, Fazirul Hisyam Hashim3, Imran Khan4, Bong Jun Choi5,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3249-3261, 2023, DOI:10.32604/cmc.2023.031673 - 31 October 2022

    Abstract The non-orthogonal multiple access (NOMA) method is a novel multiple access technique that aims to increase spectral efficiency (SE) and accommodate enormous user accesses. Multi-user signals are superimposed and transmitted in the power domain at the transmitting end by actively implementing controllable interference information, and multi-user detection algorithms, such as successive interference cancellation (SIC), are performed at the receiving end to demodulate the necessary user signals. Although its basic signal waveform, like LTE baseline, could be based on orthogonal frequency division multiple access (OFDMA) or discrete Fourier transform (DFT)-spread OFDM, NOMA superimposes numerous users in… More >

  • Open Access

    ARTICLE

    Detection Collision Flows in SDN Based 5G Using Machine Learning Algorithms

    Aqsa Aqdus1, Rashid Amin1,*, Sadia Ramzan1, Sultan S. Alshamrani2, Abdullah Alshehri3, El-Sayed M. El-kenawy4

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1413-1435, 2023, DOI:10.32604/cmc.2023.031719 - 22 September 2022

    Abstract The rapid advancement of wireless communication is forming a hyper-connected 5G network in which billions of linked devices generate massive amounts of data. The traffic control and data forwarding functions are decoupled in software-defined networking (SDN) and allow the network to be programmable. Each switch in SDN keeps track of forwarding information in a flow table. The SDN switches must search the flow table for the flow rules that match the packets to handle the incoming packets. Due to the obvious vast quantity of data in data centres, the capacity of the flow table restricts… More >

  • Open Access

    ARTICLE

    Towards Fully Secure 5G Ultra-Low Latency Communications: A Cost-Security Functions Analysis

    Borja Bordel1,*, Ramón Alcarria1, Joaquin Chung2, Rajkumar Kettimuthu2, Tomás Robles1, Iván Armuelles3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 855-880, 2023, DOI:10.32604/cmc.2023.026787 - 22 September 2022

    Abstract Future components to enhance the basic, native security of 5G networks are either complex mechanisms whose impact in the requiring 5G communications are not considered, or lightweight solutions adapted to ultra-reliable low-latency communications (URLLC) but whose security properties remain under discussion. Although different 5G network slices may have different requirements, in general, both visions seem to fall short at provisioning secure URLLC in the future. In this work we address this challenge, by introducing cost-security functions as a method to evaluate the performance and adequacy of most developed and employed non-native enhanced security mechanisms in… More >

Displaying 1-10 on page 1 of 26. Per Page