• Title/Summary/Keyword: 5G Mobile Networks

Search Result 130, Processing Time 0.023 seconds

Traffic Transmission Performance of Railway Communication Network based on 5G (5G 기반 철도 통신망의 트래픽 전송 성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1069-1074
    • /
    • 2021
  • Recently, mobile communication technology has new eras with supply of 5G commercial communication. 5G mobile communication service is currently supplied with city area, services will be quickly expanded to entire area of country. This mmWave based 5G mobile communication is under spreading for human communication with voice and Internet service. After completion of construction of this human communication, this technology will be expanded to industrial communications. Railway communication system is an example of this industrial communications. In this, performance of traffic transmission for railway communication network based on this 5G railway communication networks will be analyzed with computer simulations. Construction requirements of 5G railway communication networks will be suggested with this analysis results.

Bi-LSTM model with time distribution for bandwidth prediction in mobile networks

  • Hyeonji Lee;Yoohwa Kang;Minju Gwak;Donghyeok An
    • ETRI Journal
    • /
    • v.46 no.2
    • /
    • pp.205-217
    • /
    • 2024
  • We propose a bandwidth prediction approach based on deep learning. The approach is intended to accurately predict the bandwidth of various types of mobile networks. We first use a machine learning technique, namely, the gradient boosting algorithm, to recognize the connected mobile network. Second, we apply a handover detection algorithm based on network recognition to account for vertical handover that causes the bandwidth variance. Third, as the communication performance offered by 3G, 4G, and 5G networks varies, we suggest a bidirectional long short-term memory model with time distribution for bandwidth prediction per network. To increase the prediction accuracy, pretraining and fine-tuning are applied for each type of network. We use a dataset collected at University College Cork for network recognition, handover detection, and bandwidth prediction. The performance evaluation indicates that the handover detection algorithm achieves 88.5% accuracy, and the bandwidth prediction model achieves a high accuracy, with a root-mean-square error of only 2.12%.

Mobile Ultra-Broadband, Super Internet-of-Things and Artificial Intelligence for 6G Visions

  • Hamza Ali Alshawabkeh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.235-245
    • /
    • 2023
  • Smart applications based on the Network of Everything also known as Internet of Everything (IoE) are increasing popularity as network connectivity requires rise further. As a result, there will be a greater need for developing 6G technologies for wireless communications in order to overcome the primary limitations of visible 5G networks. Furthermore, implementing neural networks into 6G will bring remedies for the most complex optimizing networks challenges. Future 6G mobile phone networks must handle huge applications that require data and an increasing amount of users. With a ten-year time skyline from thought to the real world, it is presently time for pondering what 6th era (6G) remote correspondence will be just before 5G application. In this article, we talk about 6G dreams to clear the street for the headway of 6G and then some. We start with the conversation of imaginative 5G organizations and afterward underline the need of exploring 6G. Treating proceeding and impending remote organization improvement in a serious way, we expect 6G to contain three critical components: cell phones super broadband, very The Web of Things (or IoT and falsely clever (artificial intelligence). The 6G project is currently in its early phases, and people everywhere must envision and come up with its conceptualization, realization, implementation, and use cases. To that aim, this article presents an environment for Presented Distributed Artificial Intelligence as-a-Services (DAIaaS) supplying in IoE and 6G applications. The case histories and the DAIaaS architecture have been evaluated in terms of from end to end latency and bandwidth consumption, use of energy, and cost savings, with suggestion to improve efficiency.

A Study on Improving Data Poisoning Attack Detection against Network Data Analytics Function in 5G Mobile Edge Computing (5G 모바일 에지 컴퓨팅에서 빅데이터 분석 기능에 대한 데이터 오염 공격 탐지 성능 향상을 위한 연구)

  • Ji-won Ock;Hyeon No;Yeon-sup Lim;Seong-min Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.549-559
    • /
    • 2023
  • As mobile edge computing (MEC) is gaining attention as a core technology of 5G networks, edge AI technology of 5G network environment based on mobile user data is recently being used in various fields. However, as in traditional AI security, there is a possibility of adversarial interference of standard 5G network functions within the core network responsible for edge AI core functions. In addition, research on data poisoning attacks that can occur in the MEC environment of standalone mode defined in 5G standards by 3GPP is currently insufficient compared to existing LTE networks. In this study, we explore the threat model for the MEC environment using NWDAF, a network function that is responsible for the core function of edge AI in 5G, and propose a feature selection method to improve the performance of detecting data poisoning attacks for Leaf NWDAF as some proof of concept. Through the proposed methodology, we achieved a maximum detection rate of 94.9% for Slowloris attack-based data poisoning attacks in NWDAF.

Optimization of 3G Mobile Network Design Using a Hybrid Search Strategy

  • Wu Yufei;Pierre Samuel
    • Journal of Communications and Networks
    • /
    • v.7 no.4
    • /
    • pp.471-477
    • /
    • 2005
  • This paper proposes an efficient constraint-based optimization model for the design of 3G mobile networks, such as universal mobile telecommunications system (UMTS). The model concerns about finding a set of sites for locating radio network controllers (RNCs) from a set of pre-defined candidate sites, and at the same time optimally assigning node Bs to the selected RNCs. All these choices must satisfy a set of constraints and optimize an objective function. This problem is NP-hard and consequently cannot be practically solved by exact methods for real size networks. Thus, this paper proposes a hybrid search strategy for tackling this complex and combinatorial optimization problem. The proposed hybrid search strategy is composed of three phases: A constraint satisfaction method with an embedded problem-specific goal which guides the search for a good initial solution, an optimization phase using local search algorithms, such as tabu algorithm, and a post­optimization phase to improve solutions from the second phase by using a constraint optimization procedure. Computational results show that the proposed search strategy and the model are highly efficient. Optimal solutions are always obtained for small or medium sized problems. For large sized problems, the final results are on average within $5.77\%$ to $7.48\%$ of the lower bounds.

Mobile Small Cells for Further Enhanced 5G Heterogeneous Networks

  • Lee, Choong-Hee;Lee, Sung-Hyung;Go, Kwang-Chun;Oh, Sung-Min;Shin, Jae Sheung;Kim, Jae-Hyun
    • ETRI Journal
    • /
    • v.37 no.5
    • /
    • pp.856-866
    • /
    • 2015
  • A heterogeneous network (HetNet) is a network topology composed by deploying multiple HetNets under the coverage of macro cells (MCs). It can improve network throughput, extend cell coverage, and offload network traffic; for example, the network traffic of a 5G mobile communications network. A HetNet involves a mix of radio technologies and various cell types working together seamlessly. In a HetNet, coordination between MCs and small cells (SCs) has a positive impact on the performance of the networks contained within, and consequently on the overall user experience. Therefore, to improve user-perceived service quality, HetNets require high-efficiency network protocols and enhanced radio technologies. In this paper, we introduce a 5G HetNet comprised of MCs and both fixed and mobile SCs (mSCs). The featured mSCs can be mounted on a car, bus, or train and have different characteristics to fixed SCs (fSCs). In this paper, we address the technical challenges related to mSCs. In addition, we analyze the network performance under two HetNet scenarios-MCs and fSCs, and MCs and mSCs.

An Analysis of Security Vulnerabilities Using 5G NAS COUNT (5G NAS COUNT 취약점을 이용한 보안 위협 분석)

  • Kim, Min-Jae;Park, Jong-Geun;Shin, Ji-Soo;Moon, Dae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.565-573
    • /
    • 2022
  • Current mobile communication system is in the mid-process of conversion from 4G LTE to 5G network. According to the generalization of mobile communication services, personal information such as user's identifiers and location information is transmitted through a mobile communication network. The importance of security technology is growing according to the characteristics of wireless mobile communication networks, the use of wireless shared channels is inevitable, and security technology cannot be applied to all network system elements in order to satisfy the bandwidth and speed requirements. In particular, for security threat analysis, researches are being conducted on various attack types and vulnerability analysis through rogue base stations or attacker UE to make user services impossible in the case of 5G networks. In this paper, we established a 5G network testbed using open sources. And we analyzed three security vulnerabilities related to NAS COUNT and confirmed the validity of two vulnerabilities based on the testbed or analyzing the 3GPP standard.

Directional Research on 5G Networks and Game Streaming Services

  • Lee Jong Ho
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.2
    • /
    • pp.30-35
    • /
    • 2024
  • With the recent commercialization of the 5th generation mobile communication technology (5G), interest is focused on full-fledged wireless communication service products in related industries that apply the technology. In this paper, "the problems of the cloud-based video game streaming service market, which has been stagnant for a long time due to the existing 4G-based transmission delay, processing delay, and price issues, and the problems of 5G mobile communication, which began commercialization in 2019." We contains information about what type of positive changes a cloud-based video game streaming service incorporating technology will bring.

Security Threats and Potential Security Requirements in 5G Non-Public Networks for Industrial Applications

  • Park, Tae-Keun;Park, Jong-Geun;Kim, Keewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.105-114
    • /
    • 2020
  • In this paper, we address security issues in 5G non-public networks for industrial applications. In contrast to public networks that offer mobile network services to the general public, 5G non-public networks provide 5G network services to a clearly defined user organization or groups of organizations, and they are deployed on the organization's defined premises, such as a campus or a factory. The main goal of this paper is to derive security threats and potential security requirements in the case that 5G non-public networks are built for discrete and process industries according to the four deployment models of 5G-ACIA (5G Alliance for Connected Industries and Automation). In order to clarify the scope of this paper, we express the security toolbox to be applied to 5G non-public networks in the form of the defense in depth concept. Security issues related to general 5G mobile communication services are not within the scope of this paper. We then derive the security issues to consider when applying the 5G-ACIA deployment models to the industrial domain. The security issues are divided into three categories, and they are described in the order of overview, security threats, and potential security requirements.

A Comparative Study on 3D Data Performance in Mobile Web Browsers in 4G and 5G Environments

  • Nam, Duckkyoun;Lee, Daehyeon;Lee, Seunghyun;Kwon, Soonchul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.8-19
    • /
    • 2019
  • Since their emergence in 2007, smart phones have advanced up to the point that 5G mobile communication in 2019 started to be commercialized. Accordingly, now it is possible to share 3D modeling files and collaborate by means of a mobile web. As the recently commercialized 5G mobile communication network is so useful in sharing 3D modeling files and collaborating that even large-size geometry files can be transmitted at ultra high speed with ultra low transfer delay. We examines characteristics of major 3D file formats such as STL, OBJ, FBX, and glTF and compares the existing 4G LTE (Long Term Evolution) network with the 5G NR (New Radio) mobile communication network. The loading time and packets of each format were measured depending on the mobile web browser environments. We shows that in comparison with 4G LTE, the loading time of STL and OBJ file formats were reduced as much as 6.55 sec and 9.41 sec, respectively in the 5G NR and Chrome browsers. The glTF file format showed the most efficient performance in all of the 4G/5G mobile communication networks, Chrome, and Edge browsers. In the case of STL and OBJ, the traffic was relatively excessive in 5G NR and Edge browsers. The findings of this study are expected to be utilized to develop a 3D file format that reduces the loading time in a mobile web environment.