251 research outputs found
Distributed Artificial Intelligence Solution for D2D Communication in 5G Networks
Device to Device (D2D) Communication is one of the technology components of
the evolving 5G architecture, as it promises improvements in energy efficiency,
spectral efficiency, overall system capacity, and higher data rates. The above
noted improvements in network performance spearheaded a vast amount of research
in D2D, which have identified significant challenges that need to be addressed
before realizing their full potential in emerging 5G Networks. Towards this
end, this paper proposes the use of a distributed intelligent approach to
control the generation of D2D networks. More precisely, the proposed approach
uses Belief-Desire-Intention (BDI) intelligent agents with extended
capabilities (BDIx) to manage each D2D node independently and autonomously,
without the help of the Base Station. The paper includes detailed algorithmic
description for the decision of transmission mode, which maximizes the data
rate, minimizes the power consumptions, while taking into consideration the
computational load. Simulations show the applicability of BDI agents in jointly
solving D2D challenges.Comment: 10 pages,9 figure
A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks
The 5G networks have the capability to provide high compatibility for the new
applications, industries, and business models. These networks can tremendously
improve the quality of life by enabling various use cases that require high
data-rate, low latency, and continuous connectivity for applications pertaining
to eHealth, automatic vehicles, smart cities, smart grid, and the Internet of
Things (IoT). However, these applications need secure servicing as well as
resource policing for effective network formations. There have been a lot of
studies, which emphasized the security aspects of 5G networks while focusing
only on the adaptability features of these networks. However, there is a gap in
the literature which particularly needs to follow recent computing paradigms as
alternative mechanisms for the enhancement of security. To cover this, a
detailed description of the security for the 5G networks is presented in this
article along with the discussions on the evolution of osmotic and catalytic
computing-based security modules. The taxonomy on the basis of security
requirements is presented, which also includes the comparison of the existing
state-of-the-art solutions. This article also provides a security model,
"CATMOSIS", which idealizes the incorporation of security features on the basis
of catalytic and osmotic computing in the 5G networks. Finally, various
security challenges and open issues are discussed to emphasize the works to
follow in this direction of research.Comment: 34 pages, 7 tables, 7 figures, Published In 5G Enabled Secure
Wireless Networks, pp. 69-102. Springer, Cham, 201
A comprehensive survey on radio resource management in 5G HetNets: current solutions, future trends and open issues
The 5G network technologies are intended to accommodate innovative services with a large influx of data traffic with lower energy consumption and increased quality of service and user quality of experience levels. In order to meet 5G expectations, heterogeneous networks (HetNets) have been introduced. They involve deployment of additional low power nodes within the coverage area of conventional high power nodes and their placement closer to user underlay HetNets. Due to the increased density of small-cell networks and radio access technologies, radio resource management (RRM) for potential 5G HetNets has emerged as a critical avenue. It plays a pivotal role in enhancing spectrum utilization, load balancing, and network energy efficiency. In this paper, we summarize the key challenges i.e., cross-tier interference, co-tier interference, and
user association-resource-power allocation (UA-RA-PA) emerging in 5G HetNets and highlight their significance. In addition, we present a comprehensive survey of RRM schemes based on interference management (IM), UA-RA-PA and combined approaches (UA-RA-PA + IM). We introduce a taxonomy for individual (IM, UA-RA-PA) and combined approaches as a framework for systematically studying the existing schemes. These schemes are also qualitatively analyzed and compared to each other. Finally, challenges and opportunities for RRM in 5G are outlined, and design guidelines along with possible solutions
for advanced mechanisms are presented
- …