enabling technologies towards 5g mobile networks

4
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Journal Articles Computer Science and Engineering, Department of 2017 Enabling Technologies towards 5G Mobile Networks Jing Zhao Google, [email protected] Yejun He Shenzhen University Jian Qiao Oracle Ben Niu Chinese Academy of Sciences Qiben Yan University of Nebraska-Lincoln, [email protected] Follow this and additional works at: hps://digitalcommons.unl.edu/csearticles is Article is brought to you for free and open access by the Computer Science and Engineering, Department of at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in CSE Journal Articles by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. Zhao, Jing; He, Yejun; Qiao, Jian; Niu, Ben; and Yan, Qiben, "Enabling Technologies towards 5G Mobile Networks" (2017). CSE Journal Articles. 190. hps://digitalcommons.unl.edu/csearticles/190

Upload: others

Post on 20-Jan-2022

6 views

Category:

Documents


0 download

TRANSCRIPT

University of Nebraska - LincolnDigitalCommons@University of Nebraska - Lincoln

CSE Journal Articles Computer Science and Engineering, Department of

2017

Enabling Technologies towards 5G MobileNetworksJing ZhaoGoogle, [email protected]

Yejun HeShenzhen University

Jian QiaoOracle

Ben NiuChinese Academy of Sciences

Qiben YanUniversity of Nebraska-Lincoln, [email protected]

Follow this and additional works at: https://digitalcommons.unl.edu/csearticles

This Article is brought to you for free and open access by the Computer Science and Engineering, Department of at DigitalCommons@University ofNebraska - Lincoln. It has been accepted for inclusion in CSE Journal Articles by an authorized administrator of DigitalCommons@University ofNebraska - Lincoln.

Zhao, Jing; He, Yejun; Qiao, Jian; Niu, Ben; and Yan, Qiben, "Enabling Technologies towards 5G Mobile Networks" (2017). CSEJournal Articles. 190.https://digitalcommons.unl.edu/csearticles/190

EditorialEnabling Technologies towards 5G Mobile Networks

Jing Zhao,1 Yejun He,2 Jian Qiao,3 Ben Niu,4 and Qiben Yan5

1Google Inc., Mountain View, CA, USA2Shenzhen University, Shenzhen, China3Oracle Inc., Mississauga, ON, Canada4Chinese Academy of Sciences, Beijing, China5University of Nebraska, Lincoln, NE, USA

Correspondence should be addressed to Jing Zhao; [email protected]

Received 9 November 2017; Accepted 9 November 2017; Published 26 November 2017

Copyright © 2017 Jing Zhao et al. &is is an open access article distributed under the Creative Commons Attribution License,which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Future ,fth-generation (5G) mobile networks denote thenext-generation mobile networks beyond the current 4Gmobile networks. &e 5G networks are provisioned by theNext Generation Mobile Networks Alliance to providemuch higher capacity and support various types of emerg-ing applications with stringent quality of service (QoS) re-quirements. &e objective of this special issue is to solicit thestate-of-the-art research contributions that present key andemerging results on 5G-enabling technologies to optimizespectrum e9ciency and provide heightened security andprivacy.

&is special issue o:ers a selected and articulated overviewof the examined topics. It contains nine papers, and the detailswere listed as follows:

Sha,q et al. proposed a feature selection algorithmnamed “WMI_ACC,” which ,lters most of the features withWMI metric. It further used a wrapper method to selectfeatures forML classi,ers with accuracy (ACC)metric.&eirproposed algorithm can achieve 99% Bow accuracy results,which is very promising.

Mani et al. investigated channel estimation methods formultitaper GFDM (MGFDM) systems with and withoutdiscrete Fourier transform (DFT). &e performance of theMMSE estimator is proved to provide a better estimate of thechannel response in both cases of with and without DFT.

Zhang et al. proposed an e9cient and privacy-aware powerinjection (EPPI) scheme suitable for advanced metering in-frastructure and 5G smart grid network slice. &roughoutthe EPPI system, both the gateway and the utility companycannot know individual bids, and hence, user privacy ispreserved.

Instead of focusing on the security architecture in theupper layer, Liu et al. investigated the secure transmissionfor a basic channel model in the heterogeneous network, thatis, two-way relay channels. Two di:erent approaches havebeen introduced and proved to be secure under three dif-ferent adversarial models.

Zhao et al. described a billing scheme against freeriders with several cryptographic tools, namely, the en-cryption scheme, signature scheme, and hash function.&e proposed scheme is privacy preserving, so the chargingwill not disclose the locations and routine routes of eachvehicle.

Liu et al. analyzed 5G development and its signi,cantshift from a strategy policy to a user-oriented developmentshowing the coplay of technology and society in China.&eyproposed a hybrid routing protocol TOHRP and a distrib-uted channel assignment algorithm LBCA in the multi-channel environment.

Cruz et al. described a peer-to-peer (P2P) network that isdesigned to support video on demand (VoD) services. &isnetwork is based on a video-,le-sharing mechanism thatclassi,es peers according to the window (segment of the ,le)that they are downloading.

Fan et al. proposed an ultralightweight mutual au-thentication protocol, named “ULMAP,” which uses Bit andXOR operations to complete the mutual authentication andprevent the denial-of-service (DOS) attack. &ey also usedthe subkey and subindex number into the key update processto achieve the forward security. Experiment results are alsoinvolved to show its lightweight, economical, practical, andresistance to the synchronization attack.

HindawiMobile Information SystemsVolume 2017, Article ID 7401863, 2 pageshttps://doi.org/10.1155/2017/7401863

Fu et al. analyzed the intrusion detection requirements ofIoT networks and proposed a uniform intrusion detectionmethod for the vast heterogeneous IoTnetworks based on anautomata model. &e proposed method can detect and re-port the possible IoT attacks with three types: Jam-attack,False-attack, and Reply-attack automatically.

&e guest editors hope the information provided in thisspecial issue is useful and o:ers stimulation to the newdevelopment of 5G. Finally, we would like to thank theauthors for an excellent contribution of their research worksas well as we also very warmly acknowledge the reviewers foran excellent contribution of their valuable review results.

Jing ZhaoYejun HeJian QiaoBen Niu

Qiben Yan

2 Mobile Information Systems

Submit your manuscripts athttps://www.hindawi.com

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttp://www.hindawi.com

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation http://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 201

Applied Computational Intelligence and Soft Computing

 Advances in 

Artificial Intelligence

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Electrical and Computer Engineering

Journal of

Hindawi Publishing Corporation

http://www.hindawi.com Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Advances in

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 201

RoboticsJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Modelling & Simulation in EngineeringHindawi Publishing Corporation http://www.hindawi.com Volume 2014

The Scientific World JournalHindawi Publishing Corporation http://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014