Showing 221 - 240 results of 1,635 for search '"5G"', query time: 0.15s Refine Results
  1. 221
  2. 222
  3. 223
  4. 224
  5. 225

    A solution for 5G indoor and outdoor co-frequency network interference by Xirui GUO, Tao ZHANG, Qiang ZHANG, Dongyang WANG, Yan YANG

    Published 2022-02-01
    “…5G indoor and outdoor deployment with the same frequency will lead to the decline of network coverage performance and user service experience.The causes of indoor and outdoor interference with the same frequency was systematically analyzed.The principle of three indoor and outdoor co-channel interference solutions, namely PRB random interference solution, indoor and outdoor beam cooperative interference solution and indoor multi beam interference solution were studied.The results show that the PRB random interference solution has the best interference suppression effect when the traffic load is about 30%.When the indoor and outdoor beam cooperation function is turned on when the adjacent area of the outdoor macro station is no-load or high load (70%), the improvement of the downlink rate is more obvious.When the indoor multi-beam function is turned on, the downlink rate is significantly higher than that of single beam.Finally, the deployment suggestions of co-channel interference control scheme were given.…”
    Get full text
    Article
  6. 226
  7. 227
  8. 228
  9. 229

    Performance and key issues of 5G multi-channel joint transceiver technology by Yi PAN, Huihui LI, Lei ZENG, Weiwen CAI

    Published 2020-07-01
    Subjects: “…5G multi-channel joint transceiver technology…”
    Get full text
    Article
  10. 230
  11. 231
  12. 232
  13. 233
  14. 234

    Research and practice of software-defined security technology architecture in the 5G+ era by Shuo QUAN, Xuliang WANG, Zeya ZHU

    Published 2021-12-01
    “…Cloud network security has become a strong need under the background of the new infrastructure and digital economy, while cloud network integration security has been defined as an ongoing trends.Initially, three major types of problems facing 5G private network users were presented in providing overall security services, and an overall software-defined security architecture in the 5G+ era was proposed.Furthermore, the corresponding prototype system design and implementation was discussed based on this architecture.At the end, the verification shows that the software-defined security orchestration and scheduling system based on the cloud-based architecture helps to accurately solve the overall business security threats and hidden dangers of 5G private network enterprise customers in the 5G+ era, providing systematic reference value for subsequent research.…”
    Get full text
    Article
  15. 235
  16. 236

    Fast handover authentication scheme in 5G mobile edge computing scenarios by Weicheng ZHANG, Hongquan WEI, Shuxin LIU, Liming PU

    Published 2022-06-01
    “…The 5G internet of things brings the ultimate experience to users, but it also puts forward new challenges.Users’ requirements of ultra-low latency experience, access to business without sense during movement and security guarantee have attracted much attention.Mobile edge computing can meet the strict requirements of 5G with low latency, large connection and high bandwidth.As a computing paradigm with the coexistence of multi-trust domains, multi-entities and cross-trust domains are interconnected frequently.Identity authentication is particularly important for security protection.Through the research on the identity authentication mechanism under the existing edge computing paradigm, a lightweight fast handover authentication scheme based on pre-authentication was proposed.The proposed solution moved services and calculations from the cloud to the edge.Biometric fingerprint technology was used on the client side to defend against terminal theft attacks.Edge servers in different regions used pre-authentication scheme to meet fast switching requirements.The user and the edge server established a secure channel by negotiating a shared session key in real time, and the authentication scheme ensured lightweight operation with XOR and hash operation.The proposed scheme was evaluated from two aspects of security and performance.Theoretical design analysis and formal tool verification were carried out for security evaluation.The formal analysis tool, AVISPA, was used to verify the improved security of the proposed scheme in the presence of intruders.The performance was mainly evaluated from the computing cost and communication cost of the authentication scheme.The simulation results showed that the proposed scheme reduces communication cost, and the computational overhead can meet the needs of mobile terminals with limited resources.As the future work, the scheme will be improved from two aspects: one is to strengthen the scalability to ensure that users and edge servers can join and exit at any time, and the other one is to strengthen the universality of the scheme to meet the access deployment of third-party service providers.…”
    Get full text
    Article
  17. 237
  18. 238

    Cross-layer latency analysis for 5G NR in V2X communications. by Jorge Horta, Mario Siller, Salvador Villarreal-Reyes

    Published 2025-01-01
    “…This paper introduces an analytical model for the performance evaluation of 5G NR. The developed model describes the behavior of the different layer 1 and 2 protocols involved in 5G radio communication. …”
    Get full text
    Article
  19. 239

    An On-Chip Planar Inverted-F Antenna at 38 GHz for 5G Communication Applications by Syed Muhammad Ammar Ali

    Published 2022-01-01
    “…The antenna operates at a 5 G millimeter-wave center frequency of 38 GHz. …”
    Get full text
    Article
  20. 240

    Efficient handover authentication and secure key-updating mechanism for B5G networks by Qimei CUI, Wenjing ZHAO, Xiaoyang GU, Zengbao ZHU, Xiaoxuan ZHU, Xiaofeng TAO, Wei NI

    Published 2021-12-01
    “…In order to solve the problems of 5G network handover authentication and key update mechanism, such as lacking of forward security, being vulnerable to bypass attack and having signaling congestion, for 5G enhanced (B5G) network, an efficient handover authentication and security key-updating mechanism based on no certificate was proposed.The certificateless key agreement mechanism was introduced in the network edge side, which made the mobile terminals in-itiate the key-updating request actively and complete the whole certificateless key-updating process on the fly.The security of the key-updating mechanism was proved theoretically based on the Diffie-Hellman problem under the eCK security model.Simulation results demonstrate that the proposed mechanism not only meets the forward security of mobile terminal key management, but also has lower communication and computing overheads compared with other similar handoff authentication.…”
    Get full text
    Article