enabling technologies towards 5g mobile networks
TRANSCRIPT
University of Nebraska - LincolnDigitalCommons@University of Nebraska - Lincoln
CSE Journal Articles Computer Science and Engineering, Department of
2017
Enabling Technologies towards 5G MobileNetworksJing ZhaoGoogle, [email protected]
Yejun HeShenzhen University
Jian QiaoOracle
Ben NiuChinese Academy of Sciences
Qiben YanUniversity of Nebraska-Lincoln, [email protected]
Follow this and additional works at: https://digitalcommons.unl.edu/csearticles
This Article is brought to you for free and open access by the Computer Science and Engineering, Department of at DigitalCommons@University ofNebraska - Lincoln. It has been accepted for inclusion in CSE Journal Articles by an authorized administrator of DigitalCommons@University ofNebraska - Lincoln.
Zhao, Jing; He, Yejun; Qiao, Jian; Niu, Ben; and Yan, Qiben, "Enabling Technologies towards 5G Mobile Networks" (2017). CSEJournal Articles. 190.https://digitalcommons.unl.edu/csearticles/190
EditorialEnabling Technologies towards 5G Mobile Networks
Jing Zhao,1 Yejun He,2 Jian Qiao,3 Ben Niu,4 and Qiben Yan5
1Google Inc., Mountain View, CA, USA2Shenzhen University, Shenzhen, China3Oracle Inc., Mississauga, ON, Canada4Chinese Academy of Sciences, Beijing, China5University of Nebraska, Lincoln, NE, USA
Correspondence should be addressed to Jing Zhao; [email protected]
Received 9 November 2017; Accepted 9 November 2017; Published 26 November 2017
Copyright © 2017 Jing Zhao et al. &is is an open access article distributed under the Creative Commons Attribution License,which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Future ,fth-generation (5G) mobile networks denote thenext-generation mobile networks beyond the current 4Gmobile networks. &e 5G networks are provisioned by theNext Generation Mobile Networks Alliance to providemuch higher capacity and support various types of emerg-ing applications with stringent quality of service (QoS) re-quirements. &e objective of this special issue is to solicit thestate-of-the-art research contributions that present key andemerging results on 5G-enabling technologies to optimizespectrum e9ciency and provide heightened security andprivacy.
&is special issue o:ers a selected and articulated overviewof the examined topics. It contains nine papers, and the detailswere listed as follows:
Sha,q et al. proposed a feature selection algorithmnamed “WMI_ACC,” which ,lters most of the features withWMI metric. It further used a wrapper method to selectfeatures forML classi,ers with accuracy (ACC)metric.&eirproposed algorithm can achieve 99% Bow accuracy results,which is very promising.
Mani et al. investigated channel estimation methods formultitaper GFDM (MGFDM) systems with and withoutdiscrete Fourier transform (DFT). &e performance of theMMSE estimator is proved to provide a better estimate of thechannel response in both cases of with and without DFT.
Zhang et al. proposed an e9cient and privacy-aware powerinjection (EPPI) scheme suitable for advanced metering in-frastructure and 5G smart grid network slice. &roughoutthe EPPI system, both the gateway and the utility companycannot know individual bids, and hence, user privacy ispreserved.
Instead of focusing on the security architecture in theupper layer, Liu et al. investigated the secure transmissionfor a basic channel model in the heterogeneous network, thatis, two-way relay channels. Two di:erent approaches havebeen introduced and proved to be secure under three dif-ferent adversarial models.
Zhao et al. described a billing scheme against freeriders with several cryptographic tools, namely, the en-cryption scheme, signature scheme, and hash function.&e proposed scheme is privacy preserving, so the chargingwill not disclose the locations and routine routes of eachvehicle.
Liu et al. analyzed 5G development and its signi,cantshift from a strategy policy to a user-oriented developmentshowing the coplay of technology and society in China.&eyproposed a hybrid routing protocol TOHRP and a distrib-uted channel assignment algorithm LBCA in the multi-channel environment.
Cruz et al. described a peer-to-peer (P2P) network that isdesigned to support video on demand (VoD) services. &isnetwork is based on a video-,le-sharing mechanism thatclassi,es peers according to the window (segment of the ,le)that they are downloading.
Fan et al. proposed an ultralightweight mutual au-thentication protocol, named “ULMAP,” which uses Bit andXOR operations to complete the mutual authentication andprevent the denial-of-service (DOS) attack. &ey also usedthe subkey and subindex number into the key update processto achieve the forward security. Experiment results are alsoinvolved to show its lightweight, economical, practical, andresistance to the synchronization attack.
HindawiMobile Information SystemsVolume 2017, Article ID 7401863, 2 pageshttps://doi.org/10.1155/2017/7401863
Fu et al. analyzed the intrusion detection requirements ofIoT networks and proposed a uniform intrusion detectionmethod for the vast heterogeneous IoTnetworks based on anautomata model. &e proposed method can detect and re-port the possible IoT attacks with three types: Jam-attack,False-attack, and Reply-attack automatically.
&e guest editors hope the information provided in thisspecial issue is useful and o:ers stimulation to the newdevelopment of 5G. Finally, we would like to thank theauthors for an excellent contribution of their research worksas well as we also very warmly acknowledge the reviewers foran excellent contribution of their valuable review results.
Jing ZhaoYejun HeJian QiaoBen Niu
Qiben Yan
2 Mobile Information Systems
Submit your manuscripts athttps://www.hindawi.com
Computer Games Technology
International Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Distributed Sensor Networks
International Journal of
Advances in
FuzzySystems
Hindawi Publishing Corporationhttp://www.hindawi.com
Volume 2014
International Journal of
ReconfigurableComputing
Hindawi Publishing Corporation http://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 201
Applied Computational Intelligence and Soft Computing
Advances in
Artificial Intelligence
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Advances inSoftware EngineeringHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Electrical and Computer Engineering
Journal of
Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014
Advances in
Multimedia
International Journal of
Biomedical Imaging
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Advances in
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 201
RoboticsJournal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Computational Intelligence and Neuroscience
Industrial EngineeringJournal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Modelling & Simulation in EngineeringHindawi Publishing Corporation http://www.hindawi.com Volume 2014
The Scientific World JournalHindawi Publishing Corporation http://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Human-ComputerInteraction
Advances in
Computer EngineeringAdvances in
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014