Machine learning-based digital twin for predictive modeling in wind turbines

M Fahim, V Sharma, TV Cao, B Canberk… - IEEE Access, 2022 - ieeexplore.ieee.org
Wind turbines are one of the primary sources of renewable energy, which leads to a
sustainable and efficient energy solution. It does not release any carbon emissions to pollute …

A survey on the handover management in 5G-NR cellular networks: aspects, approaches and challenges

A Haghrah, MP Abdollahi, H Azarhava… - EURASIP Journal on …, 2023 - Springer
With the purpose of providing higher data rate and ultra-reliable and low-latency
communications for the users, employing the small cells in the upcoming Fifth-Generation …

An efficient edge computing management mechanism for sustainable smart cities

QV Khanh, VH Nguyen, QN Minh, AD Van… - … Informatics and Systems, 2023 - Elsevier
Since ancient times, humanity has envisioned a world where people and things connect and
interact. The advent of generation mobile systems, the so-called 5 G in the early century, has …

Handover management in vehicle communication: applications, techniques, issues, and challenges: a review

HH Qasim, HZ Abidin, SAC Abdullah - Bulletin of Electrical Engineering …, 2024 - beei.org
Abstract Vehicle-to-everything (V2X) communication is an emerging technology that
facilitates communication among vehicles and numerous environmental entities. However, it …

Challenges and Opportunities in Mobile Network Security for Vertical Applications: A Survey

Á Sobrinho, M Vilarim, A Barbosa… - ACM Computing …, 2024 - dl.acm.org
Ensuring the security of vertical applications in fifth-generation (5G) mobile communication
systems and previous generations is crucial. These systems must prioritize maintaining the …

Seamless group handover authentication protocol for vehicle networks: Services continuity

Y Bi, K Fan, Z Zeng, K Yang, H Li, Y Yang - Computer Networks, 2024 - Elsevier
The advantages of low latency, high reliability and high bandwidth of dense cellular network
support real-time sensing, decision making and regulation of vehicular network. Network …

[HTML][HTML] Fake Base Station Detection and Link Routing Defense

J Kim, J Kim, SY Chang - Electronics, 2024 - mdpi.com
Fake base stations comprise a critical security issue in mobile networking. A fake base
station exploits vulnerabilities in the broadcast message announcing a base station's …

Authentication and Key Agreement Algorithm for Handover of Next‐Generation High‐Speed Railway

Y Chen, W Liu, W Zhang - Security and Communication …, 2023 - Wiley Online Library
In order to solve the problems that the handover key in the handover authentication protocol
of 5 G‐R wireless communication system under the next‐generation high‐speed railway …

[LIBRO][B] Physical Layer Security With Unmanned Aerial Vehicles for Advanced Wireless Networks

AS Abdalla - 2023 - search.proquest.com
Unmanned aerial vehicles (UAVs) are emerging as enablers for supporting many
applications and services, such as precision agriculture, search and rescue, temporary …

[PDF][PDF] An Enhanced Group Key-Based Security Protocol to Protect 5G SON Against FBS.

H Park, TG Kim, DG Duguma, J Kim… - … Systems Science & …, 2023 - cdn.techscience.cn
Network operators are attempting many innovations and changes in 5G using self-
organizing networks (SON). The SON operates on the measurement reports (MR), which are …