-
221
Research on B2B business model of operators in 5G era
Published 2020-11-01Subjects: “…5G…”
Get full text
Article -
222
Research on the application of 700 MHz frequency band in 5G network optimization
Published 2022-06-01Subjects: Get full text
Article -
223
Key technologies and solutions of 5G high-speed railway wireless network
Published 2020-08-01Subjects: “…5G network…”
Get full text
Article -
224
5G architectural evolution Option4 technology analysis and deployment suggestions
Published 2022-10-01Subjects: “…5G architecture…”
Get full text
Article -
225
A solution for 5G indoor and outdoor co-frequency network interference
Published 2022-02-01“…5G indoor and outdoor deployment with the same frequency will lead to the decline of network coverage performance and user service experience.The causes of indoor and outdoor interference with the same frequency was systematically analyzed.The principle of three indoor and outdoor co-channel interference solutions, namely PRB random interference solution, indoor and outdoor beam cooperative interference solution and indoor multi beam interference solution were studied.The results show that the PRB random interference solution has the best interference suppression effect when the traffic load is about 30%.When the indoor and outdoor beam cooperation function is turned on when the adjacent area of the outdoor macro station is no-load or high load (70%), the improvement of the downlink rate is more obvious.When the indoor multi-beam function is turned on, the downlink rate is significantly higher than that of single beam.Finally, the deployment suggestions of co-channel interference control scheme were given.…”
Get full text
Article -
226
5G carrier network data collection and security management evolution ideas
Published 2020-09-01Subjects: Get full text
Article -
227
5G leading digital technology enables the rapid development of agricultural Internet
Published 2022-11-01Subjects: Get full text
Article -
228
Networking technology and implementation method based on 5G slice private line
Published 2021-10-01Subjects: “…5G network slice…”
Get full text
Article -
229
Performance and key issues of 5G multi-channel joint transceiver technology
Published 2020-07-01Subjects: “…5G multi-channel joint transceiver technology…”
Get full text
Article -
230
5G value plane, the next generation of BSS/OSS consolidated architecture
Published 2022-05-01Subjects: “…5G value plane…”
Get full text
Article -
231
Statistical-based detection of pilot contamination attack for NOMA in 5G networks
Published 2025-01-01Subjects: “…Fifth generation (5G)…”
Get full text
Article -
232
Application of 5G innovative technology in the internal logistics of the iron and steel enterprise
Published 2022-05-01Subjects: “…5G…”
Get full text
Article -
233
Performance analysis of multi-user detection of 5G overloaded sporadic system
Published 2016-08-01Get full text
Article -
234
Research and practice of software-defined security technology architecture in the 5G+ era
Published 2021-12-01“…Cloud network security has become a strong need under the background of the new infrastructure and digital economy, while cloud network integration security has been defined as an ongoing trends.Initially, three major types of problems facing 5G private network users were presented in providing overall security services, and an overall software-defined security architecture in the 5G+ era was proposed.Furthermore, the corresponding prototype system design and implementation was discussed based on this architecture.At the end, the verification shows that the software-defined security orchestration and scheduling system based on the cloud-based architecture helps to accurately solve the overall business security threats and hidden dangers of 5G private network enterprise customers in the 5G+ era, providing systematic reference value for subsequent research.…”
Get full text
Article -
235
Dual-Band MIMO Antenna Design for 5G Smartphones Mobile Communications
Published 2023-06-01Subjects: Get full text
Article -
236
Fast handover authentication scheme in 5G mobile edge computing scenarios
Published 2022-06-01“…The 5G internet of things brings the ultimate experience to users, but it also puts forward new challenges.Users’ requirements of ultra-low latency experience, access to business without sense during movement and security guarantee have attracted much attention.Mobile edge computing can meet the strict requirements of 5G with low latency, large connection and high bandwidth.As a computing paradigm with the coexistence of multi-trust domains, multi-entities and cross-trust domains are interconnected frequently.Identity authentication is particularly important for security protection.Through the research on the identity authentication mechanism under the existing edge computing paradigm, a lightweight fast handover authentication scheme based on pre-authentication was proposed.The proposed solution moved services and calculations from the cloud to the edge.Biometric fingerprint technology was used on the client side to defend against terminal theft attacks.Edge servers in different regions used pre-authentication scheme to meet fast switching requirements.The user and the edge server established a secure channel by negotiating a shared session key in real time, and the authentication scheme ensured lightweight operation with XOR and hash operation.The proposed scheme was evaluated from two aspects of security and performance.Theoretical design analysis and formal tool verification were carried out for security evaluation.The formal analysis tool, AVISPA, was used to verify the improved security of the proposed scheme in the presence of intruders.The performance was mainly evaluated from the computing cost and communication cost of the authentication scheme.The simulation results showed that the proposed scheme reduces communication cost, and the computational overhead can meet the needs of mobile terminals with limited resources.As the future work, the scheme will be improved from two aspects: one is to strengthen the scalability to ensure that users and edge servers can join and exit at any time, and the other one is to strengthen the universality of the scheme to meet the access deployment of third-party service providers.…”
Get full text
Article -
237
Research on 5G base station radiation safety and corresponding network planning
Published 2021-09-01Subjects: “…5G…”
Get full text
Article -
238
Cross-layer latency analysis for 5G NR in V2X communications.
Published 2025-01-01“…This paper introduces an analytical model for the performance evaluation of 5G NR. The developed model describes the behavior of the different layer 1 and 2 protocols involved in 5G radio communication. …”
Get full text
Article -
239
An On-Chip Planar Inverted-F Antenna at 38 GHz for 5G Communication Applications
Published 2022-01-01“…The antenna operates at a 5 G millimeter-wave center frequency of 38 GHz. …”
Get full text
Article -
240
Efficient handover authentication and secure key-updating mechanism for B5G networks
Published 2021-12-01“…In order to solve the problems of 5G network handover authentication and key update mechanism, such as lacking of forward security, being vulnerable to bypass attack and having signaling congestion, for 5G enhanced (B5G) network, an efficient handover authentication and security key-updating mechanism based on no certificate was proposed.The certificateless key agreement mechanism was introduced in the network edge side, which made the mobile terminals in-itiate the key-updating request actively and complete the whole certificateless key-updating process on the fly.The security of the key-updating mechanism was proved theoretically based on the Diffie-Hellman problem under the eCK security model.Simulation results demonstrate that the proposed mechanism not only meets the forward security of mobile terminal key management, but also has lower communication and computing overheads compared with other similar handoff authentication.…”
Get full text
Article