Machine learning-based digital twin for predictive modeling in wind turbines
Wind turbines are one of the primary sources of renewable energy, which leads to a
sustainable and efficient energy solution. It does not release any carbon emissions to pollute …
sustainable and efficient energy solution. It does not release any carbon emissions to pollute …
A survey on the handover management in 5G-NR cellular networks: aspects, approaches and challenges
With the purpose of providing higher data rate and ultra-reliable and low-latency
communications for the users, employing the small cells in the upcoming Fifth-Generation …
communications for the users, employing the small cells in the upcoming Fifth-Generation …
An efficient edge computing management mechanism for sustainable smart cities
Since ancient times, humanity has envisioned a world where people and things connect and
interact. The advent of generation mobile systems, the so-called 5 G in the early century, has …
interact. The advent of generation mobile systems, the so-called 5 G in the early century, has …
Handover management in vehicle communication: applications, techniques, issues, and challenges: a review
Abstract Vehicle-to-everything (V2X) communication is an emerging technology that
facilitates communication among vehicles and numerous environmental entities. However, it …
facilitates communication among vehicles and numerous environmental entities. However, it …
Challenges and Opportunities in Mobile Network Security for Vertical Applications: A Survey
Ensuring the security of vertical applications in fifth-generation (5G) mobile communication
systems and previous generations is crucial. These systems must prioritize maintaining the …
systems and previous generations is crucial. These systems must prioritize maintaining the …
Seamless group handover authentication protocol for vehicle networks: Services continuity
The advantages of low latency, high reliability and high bandwidth of dense cellular network
support real-time sensing, decision making and regulation of vehicular network. Network …
support real-time sensing, decision making and regulation of vehicular network. Network …
[HTML][HTML] Fake Base Station Detection and Link Routing Defense
Fake base stations comprise a critical security issue in mobile networking. A fake base
station exploits vulnerabilities in the broadcast message announcing a base station's …
station exploits vulnerabilities in the broadcast message announcing a base station's …
Authentication and Key Agreement Algorithm for Handover of Next‐Generation High‐Speed Railway
Y Chen, W Liu, W Zhang - Security and Communication …, 2023 - Wiley Online Library
In order to solve the problems that the handover key in the handover authentication protocol
of 5 G‐R wireless communication system under the next‐generation high‐speed railway …
of 5 G‐R wireless communication system under the next‐generation high‐speed railway …
[LIBRO][B] Physical Layer Security With Unmanned Aerial Vehicles for Advanced Wireless Networks
AS Abdalla - 2023 - search.proquest.com
Unmanned aerial vehicles (UAVs) are emerging as enablers for supporting many
applications and services, such as precision agriculture, search and rescue, temporary …
applications and services, such as precision agriculture, search and rescue, temporary …
[PDF][PDF] An Enhanced Group Key-Based Security Protocol to Protect 5G SON Against FBS.
Network operators are attempting many innovations and changes in 5G using self-
organizing networks (SON). The SON operates on the measurement reports (MR), which are …
organizing networks (SON). The SON operates on the measurement reports (MR), which are …