Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access

    ARTICLE

    Federated Network Intelligence Orchestration for Scalable and Automated FL-Based Anomaly Detection in B5G Networks

    Pablo Fernández Saura1,*, José M. Bernabé Murcia1, Emilio García de la Calera Molina1, Alejandro Molina Zarca2, Jorge Bernal Bernabé1, Antonio F. Skarmeta Gómez1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 163-193, 2024, DOI:10.32604/cmc.2024.051307 - 18 July 2024

    Abstract The management of network intelligence in Beyond 5G (B5G) networks encompasses the complex challenges of scalability, dynamicity, interoperability, privacy, and security. These are essential steps towards achieving the realization of truly ubiquitous Artificial Intelligence (AI)-based analytics, empowering seamless integration across the entire Continuum (Edge, Fog, Core, Cloud). This paper introduces a Federated Network Intelligence Orchestration approach aimed at scalable and automated Federated Learning (FL)-based anomaly detection in B5G networks. By leveraging a horizontal Federated learning approach based on the FedAvg aggregation algorithm, which employs a deep autoencoder model trained on non-anomalous traffic samples to recognize… More >

  • Open Access

    ARTICLE

    A Model Training Method for DDoS Detection Using CTGAN under 5GC Traffic

    Yea-Sul Kim1, Ye-Eun Kim1, Hwankuk Kim2,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1125-1147, 2023, DOI:10.32604/csse.2023.039550 - 26 May 2023

    Abstract With the commercialization of 5th-generation mobile communications (5G) networks, a large-scale internet of things (IoT) environment is being built. Security is becoming increasingly crucial in 5G network environments due to the growing risk of various distributed denial of service (DDoS) attacks across vast IoT devices. Recently, research on automated intrusion detection using machine learning (ML) for 5G environments has been actively conducted. However, 5G traffic has insufficient data due to privacy protection problems and imbalance problems with significantly fewer attack data. If this data is used to train an ML model, it will likely suffer… More >

  • Open Access

    ARTICLE

    Full Duplex Media Access Control Protocol for Multihop Network Computing

    J. Avila Selvi Therase1,*, S. Allwin1, A. Ahilan2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 297-309, 2023, DOI:10.32604/csse.2023.023515 - 01 June 2022

    Abstract Intelligent communication technologies beyond the network are proposed by using a new full-duplex protocol. The Media Access Control (MAC) is a data interaction network protocol, which outperforms the IEEE 802.15.4e. This research discusses the planning and execution of full-duplex (FD) pipeline MAC protocol for multihop wireless networks (MWN). The design uses a combination of Radio frequency and baseband methods to realize full-duplexing with smallest impact on cross layer functions. The execution and trial results specify that Pipeline Media Access Control (PiMAC) protocol considerably develops network implementation in terms of transmission protocol (TP) and transmission delay.… More >

  • Open Access

    ARTICLE

    Design of a Novel THz Modulator for B5G Communication

    Omar A. Saraereh*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1055-1066, 2022, DOI:10.32604/cmc.2022.030193 - 18 May 2022

    Abstract Wireless data traffic has expanded at a rate that reminds us of Moore’s prediction for integrated circuits in recent years, necessitating ongoing attempts to supply wireless systems with ever-larger data rates in the near future, despite the under-deployment of 5G networks. Terahertz (THz) communication has been considered a viable response to communication blackout due to the rapid development of THz technology and sensors. THz communication has a high frequency, which allows for better penetration. It is a fast expanding and evolving industry, driven by an increase in wireless traffic volume and data transfer speeds. A… More >

  • Open Access

    ARTICLE

    Detecting IoT Botnet in 5G Core Network Using Machine Learning

    Ye-Eun Kim1, Min-Gyu Kim2, Hwankuk Kim2,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4467-4488, 2022, DOI:10.32604/cmc.2022.026581 - 21 April 2022

    Abstract As Internet of Things (IoT) devices with security issues are connected to 5G mobile networks, the importance of IoT Botnet detection research in mobile network environments is increasing. However, the existing research focused on AI-based IoT Botnet detection research in wired network environments. In addition, the existing research related to IoT Botnet detection in ML-based mobile network environments have been conducted up to 4G. Therefore, this paper conducts a study on ML-based IoT Botnet traffic detection in the 5G core network. The binary and multiclass classification was performed to compare simple normal/malicious detection and normal/three-type More >

  • Open Access

    ARTICLE

    Game Theory-Based IoT Efficient Power Control in Cognitive UAV

    Fadhil Mukhlif1,*, Norafida Ithnin1, Omar B. Abdulghafoor2, Faiz Alotaibi3, Nourah Saad Alotaibi4

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1561-1578, 2022, DOI:10.32604/cmc.2022.026074 - 24 February 2022

    Abstract With the help of network densification, network coverage as well as the throughput can be improved via ultra-dense networks (UDNs). In tandem, Unmanned Aerial Vehicle (UAV) communications have recently garnered much attention because of their high agility as well as widespread applications. In this paper, a cognitive UAV is proposed for wireless nodes power pertaining to the IoT ground terminal. Further, the UAV is included in the IoT system as the source of power for the wireless nodes as well as for resource allocation. The quality of service (QoS) related to the cognitive node was… More >

  • Open Access

    ARTICLE

    An Optimized Algorithm for D2D-MIMO 5G Wireless Networks

    Shahid Bashir1, Imran Khan2, Fahd N. Al-Wesabi3, Nadhem Nemri3, Ammar Zahary4, Quang Ngoc Nguyen5,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3029-3044, 2021, DOI:10.32604/cmc.2021.017015 - 06 May 2021

    Abstract The device-to-device (D2D) networking technology is extended to the conventional cellular network to boost the communication efficiency of the entire network, forming a heterogeneous 5G and beyond (B5G) communication network. D2D communication in a cellular cell will boost the efficiency of the spectrum, increase the ability of the device, and reduce the communication burden of base stations through the sharing of approved cell resources, causing serious interference as well. The device-to-device (D2D) networking technology is extended to the conventional cellular network to boost the communication efficiency of the entire network, forming a heterogeneous 5G communication… More >

Displaying 1-10 on page 1 of 7. Per Page