The networks are evolving drastically since last few years in order to meet user requirements. For example, the 5G is offering most of the available spectrum under one umbrella. In this work, we will address the resource allocation problem in fifth-generation (5G) networks, to be exact in the Cloud Radio Access Networks (C-RANs). The radio access network mechanisms involve multiple network topologies that are isolated based on the spectrum bands and it should be enhanced with numerous access technology in the deployment of 5G network. The C-RAN is one of the optimal technique to combine all the available spectral bands. However, existing C-RAN mechanisms lacks the intelligence perspective on choosing the spectral bands. Thus, C-RAN mechanism requires an advanced tool to identify network topology to allocate the network resources for substantial traffic volumes. Therefore, there is a need to propose a framework that handles spectral resources based on user requirements and network behavior. In this work, we introduced a new C-RAN architecture modified as multitier Heterogeneous Cloud Radio Access Networks in a 5G environment. This architecture handles spectral resources efficiently. Based on the simulation analysis, the proposed multitier H-CRAN architecture with improved control unit in network management perspective enables augmented granularity, end-to-end optimization, and guaranteed quality of service by 15 percentages over the existing system.Trans Emerging Tel Tech. 2019;30:e3627.wileyonlinelibrary.com/journal/ett spectrum like WiFi. 2 The advanced antennas with multiple input and multiple output technologies can be adopted in the evolving 5G to provide higher data rate. 3,4 The colossal requirements of future 5G networks cannot be accomplished by the existing radio access networks (RANs), wherein the base band units (BBUs) and radio units are consolidated. 2 Meanwhile, the cloud-enabled services in 5G ecosystem cater heterogeneous communication framework utilizing advanced virtualization techniques. The network virtualization stimulates multiservice and multitenancy for efficient network operations and service provisions, which, in turn, offers new-fangled service-oriented and edge-cloud 5G architectures with enhanced Quality of Experience (QoE). 5 Thus, the current RAN architectures need to be further extended with various virtualization techniques to develop Cloud RAN (C-RAN). Cloud RANs abutments the correlation of Access Points (APs) to the pool of BBU via a troop of transport links in the Control Unit (CU), 6 which conquers the limitations in the traditional RAN. 7 However, C-RAN requires an intelligent technique to recognize the topology of the network in the mobility stage and to locate the resources, as the vast traffic volume created by the sampled radio signals are directly transported to the CU. 8 The next-generation networks are expected to learn consistently based on the varied user behavior and spectral stability that depends on both the user's environment and network behavior. 9 Thereby, sea...
The Internet of Things (IoT) is a network of interconnected objects, in which every object in the world seeks to communicate and exchange information actively. This exponential growth of interconnected objects increases the demand for wireless spectrum. However, providing wireless channel access to every communicating object while ensuring its guaranteed quality of service (QoS) requirements is challenging and has not yet been explored, especially for IoT-enabled mission-critical applications and services. Meanwhile, Cognitive Radio-enabled Internet of Things (CR-IoT) is an emerging field that is considered the future of IoT. The combination of CR technology and IoT can better handle the increasing demands of various applications such as manufacturing, logistics, retail, environment, public safety, healthcare, food, and drugs. However, due to the limited and dynamic resource availability, CR-IoT cannot accommodate all types of users. In this paper, we first examine the availability of a licensed channel on the basis of its primary users' activities (e.g., traffic patterns). Second, we propose a priority-based secondary user (SU) call admission and channel allocation scheme, which is further based on a priority-based dynamic channel reservation scheme. The objective of our study is to reduce the blocking probability of higher-priority SU calls while maintaining a sufficient level of channel utilization. The arrival rates of SU calls of all priority classes are estimated using a Markov chain model, and further channels for each priority class are reserved based on this analysis. We compare the performance of the proposed scheme with the greedy non-priority and fair proportion schemes in terms of the SU call-blocking probability, SU call-dropping probability, channel utilization, and throughput. Numerical results show that the proposed priority scheme outperforms the greedy non-priority and fair proportion schemes.
One of the most promising application areas of the Industrial Internet of Things (IIoT) is Vehicular Ad hoc NETworks (VANETs). VANETs are largely used by Intelligent Transportation Systems (ITS) to provide smart and safe road transport. To reduce the network burden, Software Defined Networks (SDNs) acts as a remote controller. Motivated by the need for greener IIoT solutions, this paper proposes an energy-efficient end-to-end security solution for Software Defined Vehicular Networks (SDVN). Besides SDN's flexible network management, network performance, and energy-efficient end-toend security scheme plays a significant role in providing green IIoT services. Thus, the proposed SDVN provides lightweight end-to-end security. The end-to-end security objective is handled in two levels: i) In RSU-based Group Authentication (RGA) scheme, each vehicle in the RSU range receives a group id-key pair for secure communication and ii) In private-Collaborative Intrusion Detection System (p-CIDS), SDVN detects the potential intrusions inside the VANET architecture using collaborative learning that guarantees privacy through a fusion of differential privacy and homomorphic encryption schemes. The SDVN is simulated in NS2 & MATLAB, and results show increased energy efficiency with lower communication and storage overhead than existing frameworks. In addition, the p-CIDS detects the intruder with an accuracy of 96.81% in the SDVN.
Abstract-Millions of devices are going to participate in 5G producing a huge space for security threats. The 5G specification goals require rigid and robust security protocol against such threats. Quantum cryptography is a recently emerged term in which we test the robustness of security protocols against Quantum computers. Therefore, in this paper, we propose a security protocol called Quantum Key GRID for Authentication and Key Agreement (QKG-AKA) scheme for the dynamic security association. This scheme is efficiently deployed in Long Term Evolution (LTE) architecture without any significant modifications in the underlying base system. The proposed QKG-AKA mechanism is analyzed for robustness and proven safe against quantum computers. The simulation results and performance analysis show drastic improvement regarding security and key management over existing schemes.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.