Skip to main content
Top

Open Access 2023 | Open Access | Book

Cover of the book

5G and Beyond

Editors: Bharat Bhushan, Sudhir Kumar Sharma, Raghvendra Kumar, Ishaani Priyadarshini

Publisher: Springer Nature Singapore

Book Series : Springer Tracts in Electrical and Electronics Engineering

insite
SEARCH

About this book

This open-access book aims to highlight the coming surge of 5G network-based applications and predicts that the centralized networks and their current capacity will be incapable of meeting the demands. The book emphasizes the benefits and challenges associated with the integration of 5G networks with varied applications. Further, the book gathers and investigates the most recent 5G-based research solutions that handle security and privacy threats while considering resource-constrained wireless devices. The information, applications, and recent advances discussed in this book will serve to be of immense help to practitioners, database professionals, and researchers.

Table of Contents

Frontmatter

Open Access

Chapter 1. Evolution of Next-Generation Communication Technology
Abstract
In this technological era of wireless communication, various Internet devices and Wi-Fi zone play a significant role in the fast growth of data usage. The communication of people has been revolutionized by mobile communication systems. The rapid increase in the number of users, higher data rate, and requirement for higher bandwidth and voluminous data has become a challenge for Internet service providers. All these requirements are expected to be met by the next-generation communication network. The evolution of next-generation communication technology aims to emphasize the user terminal development that will provide access to various technologies and combine several flows from numerous technologies. In this paper, the authors have provided a detailed overview of the various wireless communication technologies and how it can be enhanced in future. A comparative study of the different generations of communication technologies has been done which includes 1G which has contented the elementary mobile voice, and 2G which has familiarized us with capacity and coverage. The quest continued with 3G for high-speed data that in turn provided a true experience to mobile bandwidth with 4G and finally the next-generation communication technology—5G. The varied variety of telecommunication services such as advanced mobile services, with the help of mobile and fixed networks, can be accessed with the help of the Fourth Generation (4G). The technology in the Fifth Generation (5G) is more advanced, and intelligent and it interconnects with the entire world. Moreover, in this paper, the authors have discussed the various issues and challenges faced in the existing cellular network, the limitation of conventional cellular systems, and the reason for the need for next-generation communication technology. Also, a detailed study on 5G network communication has been deliberated.
Riya Sil, Ritwesh Chatterjee

Open Access

Chapter 2. Third Industrial Revolution: 5G Wireless Systems, Internet of Things, and Beyond
Abstract
Commercial 5G mobile communication installations are currently ongoing. A variety of reasons, notably rising business and consumer needs as well as the advent of much more cheap equipment, are driving 5G and IoT growth. Substantial carrier investments in 5G networks, frequency, and infrastructure, as well as the adoption of international standards, are indeed assisting in driving development and increasing investor interest in IoT. Today’s modern 5G mobile cellular systems are emerging beyond current 4G technology, which will remain to fulfill diverse applications. 5G, which is expected to last a long time, may meet present needs like intelligent power applications while also forecasting future use cases like self-driving automobiles. Mobile operators would need to guarantee to ensure its added versatility simultaneously present as well as future use cases need as companies oversee the growth of technology. Cautious providers would control their expenditures to assure customer service as infrastructures migrate to 5G. The majority of 5G use case scenarios fall into three broad segments: improved mobile broadband (eMBB), enormous IoT, as well as critical communications, within each set of performance, and bandwidth, including delay needs. While 4G would remain to be utilized for so many consumers and commercial IoT scenarios, 5G offers IoT features that 4G as well as other networks do not. This would include 5G's capacity to accommodate a massive amount of fixed and portable IoT systems with variable speeds, capacity, and service level needs. As the Internet of Things develops, the adaptability of 5G would become increasingly more important for organizations wanting to satisfy the stringent needs of vital connectivity. Because of 5G's ultra-reliability as well as reduced latency, self-driving vehicles, intelligent power infrastructures, better industrial automation, and some other demanding technologies are becoming a possibility. While 5G increases Internet bandwidth, cloud services, machine intelligence, as well as cloud technologies would all assist to manage huge data quantities created by IoT. Additional 5G advancements, like low latency, and non-public networking, including the core of 5G, would eventually help realize the goals of an IoT network that is worldwide and capable of sustaining connectivity that is larger in size.
Anwesha Das, Aninda Chowdhury, Riya Sil

Open Access

Chapter 3. Network Architectures and Protocols for Efficient Exploitation of Spectrum Resources in 5G
Abstract
With the emergence of 5G technology with its enhanced architecture, there are unprecedented possibilities in terms of Quality of Service (QoS), data rate, latency, and capacity. This chapter throws light on different aspects of 5G technology and associated technological innovations. It has support for user diversity, devise diversity, and other dimensions. It focuses on the architecture of 5G technology, its underlying mechanisms, support for Device-to-Device (D2D) communication, Multiple-Input Multiple-Output (MIMO) enhancements, advanced interference management, enhanced utility of ultra-dense networks, spectrum sharing, and cloud technologies associated with 5G networks. It also proposes a methodology with spectrum broker with underlying components with delay-aware and energy-efficient approach to leverage 5G base stations leading to the reduction of energy consumption. The concept of queueing delays is considered while proposing the scheme for delay-sensitive communications with energy efficiency. The spectrum broker has mechanisms to achieve this. Simulation study with the proposed scheme shows the energy efficiency of the proposed scheme when compared with the state of the art. This chapter not only provides the required know-how on different technologies but also provides the simulation study that may trigger further investigation into the resource management in 5G networks.
Kande Archana, V. Kamakshi Prasad, M. Ashok, G. R. Anantha Raman

Open Access

Chapter 4. Wireless Backhaul Optimization Algorithm in 5G Communication
Abstract
A wireless backhaul optimization approach using a delay jitter is suggested to handle the wireless backhaul issue for 5G dynamic heterogeneous situations. First, the delay and delay jitter issues in 5G dynamic heterogeneous situations are carefully evaluated, optimization indicators are defined, and the fundamental backhaul model is further built. Then, considering the optimization action needs, include delay constraints to create better model 1; examine network overload, relax channel number allocation variables to construct improved model 2, and present a matching hierarchical method for a quick solution. The simulation results reveal that the suggested approach has improved delay jitter performance compared with three kinds of current wireless backhaul optimization algorithms.
Astha Sharma, Mukesh Soni, Abhaya Nand, Suryabhan Pratap Singh, Sumit Kumar

Open Access

Chapter 5. Security Attacks and Vulnerability Analysis in Mobile Wireless Networking
Abstract
Security of data is very important while providing communication either by the wired or wireless medium. It is a very challenging issue in the world and the wireless mobile network makes it more challenging. In a wireless mobile network, there is a cluster of self-contained, self-organized networks that form a temporarily multi-hop peer-to-peer radio network, lacking any use of the pre-determined organization. As these networks are mobile and wireless connection links are used to connect these networks through each other, many of the times these kinds of networks are accomplished of self-manage, self-define, and self-configure. Due to their dynamic nature, wireless mobile networks/systems do not have a fixed infrastructure and, due to this, it is more vulnerable to many types of hostile attacks. Different kinds of security attacks that are present in wireless mobile networks are stated in the paper with their spotting and precaution techniques. Furthermore, the paper deliberates on the various types of mobile networks along with their numerous challenges and issues. Moreover, the paper defines the need and goals of security in wireless mobile networks as well as many security attacks along with their detection or prevention methods.
Ayasha Malik, Bharat Bhushan, Surbhi Bhatia Khan, Rekha Kashyap, Rajasekhar Chaganti, Nitin Rakesh

Open Access

Chapter 6. Utilities of 5G Communication Technologies for Promoting Advancement in Agriculture 4.0: Recent Trends, Research Issues and Review of Literature
Abstract
The ultrafast 5G network will play a significant role in the farming industry over the upcoming couple of years, serving to boost crop yield and quality while requiring minimal labour. Farmers will be more informed to make smart decisions regarding irrigation by using smart and precision farming. The introduction of 5G will significantly alter the farming characteristics and agriculture practices in this era of Agriculture 4.0. 5G network’s IoT-based cloud computing service offers smart farming solutions that are both flexible and resourceful. This will permit the seamless operation of various unmanned agricultural devices during ploughing, sowing seed and managing phases of crop farming, resulting in secure, dependable, environment-friendly and energy-efficient operations, as well as the creation of unmanned farms. This paper examines the need for and role of smart and precision farming in the agricultural sector incorporating 5G applications in precision farming in the present era of Agriculture 4.0, such as real-time monitoring, data analytics, cloud repositories, virtual consultation and predictive maintenance and also discusses upcoming opportunities. 5G-based IoT solutions focusing towards Ultra-Reliable Low Latency Communication (URLLC) like automated control and self-driven vehicles to support rapid response times and higher dependability will diminish communication delays in time-sensitive agriculture applications and non-public networks to allocate part of frequency spectrum on demand, network slicing alternatives are also discussed here.
Parijata Majumdar, Diptendu Bhattacharya, Sanjoy Mitra

Open Access

Chapter 7. Security Attacks and Countermeasures in 5G Enabled Internet of Things
Abstract
The use of previous generation networks like 4G was vastly used in the Internet of Things (IoT) devices. The constant need to grow and develop just so the network can fulfill the requirement of IoT devices is still going on. The exponential growth of the data services substantially challenged the security and the networks of IoT because they were run by the mobile internet requiring high bit rate, low latency, high availability, and performances within various networks. The IoT integrates several sensors and data to provide services and a communication standard. Fifth Generation Communication System (5G) enabled IoT devices to allow the seamless connectivity of billions of interconnected devices. Cellular connections have become a central part of the society that powers our daily lives. Numerous security issues have come to light because of the exponential expansion of 5G technologies and the adaptation of the slow counterpart of IoT devices. Network services without security and privacy pose a threat to the infrastructure and sometimes endanger human lives. Analyzing security threats and mitigation is a crucial and fundamental part of the IoT ecosystem. Authorization of data, confidentiality, trust, and privacy of 5G enabled IoT devices are the most challenging parts of the system. And to provide a solution to these, we need a robust system to handle cyberattacks and prevent vulnerabilities by countermeasures. This paper includes a comprehensive discussion of 5G, IoT fundamentals, the layered architecture of 5G IoT, security attacks and their mitigation, current research, and future directions for 5G enabled IoT infrastructure.
A. K. M. Bahalul Haque, Tasfia Nausheen, Abdullah Al Mahfuj Shaan, Saydul Akbar Murad

Open Access

Chapter 8. Energy Efficiency and Scalability of 5G Networks for IoT in Mobile Wireless Sensor Networks
Abstract
A widespread deployment of 5G technology with the Internet of Things (IoT) will be there in future years. The implementation of 5G technology perhaps becomes fortuitous for IoT as IoT has different variants of applications in the field of tracking data, and security systems. It is also applicable to applications like smart cities and smart buildings etc. Further, the introduction of the new frequency band in the present communication system gardened the interest of researchers in the area of optimization of energy in a mobile environment with dense traffic. This paper aims to represent the basics of 5G system along with IoT implementations. Also different techniques for energy efficiency are comparatively analyzed with their pros and cons for mobile wireless sensor networks.
Smriti Sachan, Rohit Sharma, Amit Sehgal

Open Access

Chapter 9. Security Services for Wireless 5G Internet of Things (IoT) Systems
Abstract
The Internet of Things (IoT) is an emerging field that has evolved in recent past years and tends to have a major effect on our lives in the coming future. The development of communication techniques is very rapid and tends to achieve many innovative results. With the invention of 5th Generation mobile networks, i.e., 5G, it is becoming an exciting and challenging topic of interest in the field of wireless communication. 5G networks have the ability to connect millions or billions of nodes without affecting the quality of throughput and latency. The 5G technology can develop a truly digital society in which every device may be connected through the Internet. IoT is an emerging technology in which everything can be connected and communicated via the Internet, the term everything may include computing devices, humans, software, platforms, and solutions. The development of this technology leads to the advent of a number of solutions that are helpful for humankind, for example, smart retailing creation of smart cities, smart farming, intelligent transport systems, smart eco-systems, etc. While IoT is a revolutionary technology in the progression of the Internet, it still has some significant challenges for implementation like ensuring security, performance issues, quality of support and saving of energy, etc. Furthermore, the paper elaborates on the motivation of combining two technology together named IoT and 5G for better communication. Additionally, the paper illustrates the basic architecture of IoT enabling 5G and discussed various solutions to provide communication. Moreover, the paper also discussed the various challenges and research gaps of 5G-IoT technology.
Ayasha Malik, Veena Parihar, Bharat Bhushan, Rajasekhar Chaganti, Surbhi Bhatia, Parma Nand Astya

Open Access

Chapter 10. Securing the IoT-Based Wireless Sensor Networks in 5G and Beyond
Abstract
The previous contribution uses the k-means procedure to create clusters. It converts into a chain route when the threshold content goes beyond the energy of the devices in the system. The information transmitter fuel includes the power of the machine circuitry and the magnitude of facts communication and blowout. The vibrancy helps in communication circuitry. The knowledge packages ship to the destination. The architecture has two stages. The groups form during the clustering stage. The Optimal CBR method uses the k-means procedure to construct groups. It selects the cluster head based on the Euclidean length and device fuel. The verge posted by the group head to the individual set associates is the characteristic weight above which the machine transmits the data to the head. When two-thirds of the devices are lifeless, the instruments use the greedy procedure to construct a chain-like multiple-hop methodology to reach the base station. A beacon transmission is sent by the base station to the active devices in the chaining stage (when the energy of the nodes is lower). The base station creates the path using multiple-hop chain routing and the greedy technique. The devices send the notification to the base station using the chain track. The proposed work increases security by 9.67% when transmitting data and by 11.38% (device getting compromised).
N. Ambika

Open Access

Chapter 11. 5G and Internet of Things—Integration Trends, Opportunities, and Future Research Avenues
Abstract
The Fifth Generation Communication System (5G) has revolutionized data (voice, text, and hybrid) transmission and communication. Advanced communication protocol and sophisticated technology open up the opportunity to integrate 5G with other state-of-the-art technologies. Similarly, the Internet of Things combines sensors, actuators, and other devices that network together to collect contextual and environmental data for application-specific purposes. Nowadays, the applications of IoT need a fast data transfer to ensure smooth service. 5G has the potential to achieve this function for IoT. However, the energy-efficient architecture and easy-to-manage 5G-enabled IoT are still developing. Hence, the potential vulnerability issues of 5G-enabled IoT architecture need to be studied. In this paper, firstly, we have comprehensively discussed the fundamental architecture and characteristics of the 5G ecosystem. Later, the paper comprehensively outlined the characteristics and layered architecture of the internet of things. Then, this chapter also explores the requirements of 5G-enabled IoT, Blockchain-based 5G IoT, and 5G with artificial intelligence. Followed by this discussion, the chapter investigates the opportunities of 5G IoT in different domains. Finally, this paper investigates and analyzes the research gaps, challenges, and probable solutions comprehensively in a tabular format.
A. K. M. Bahalul Haque, Md. Oahiduzzaman Mondol Zihad, Md. Rifat Hasan

Open Access

Chapter 12. Post-Quantum Cryptographic Schemes for Security Enhancement in 5G and B5G (Beyond 5G) Cellular Networks
Abstract
5G is the fifth generation of broadband cellular network and beyond 5G can be the 6G, which will be the sixth generation of broadband cellular network. Even though studies about 5G are still evolving, 6G has become a hot topic for cellular researchers these days. The expansion in the field of 5G and 6G is still in infancy stage as many problems still need to be solved. Out of these, security of data transmission is a premier concern. Therefore, cybersecurity is becoming increasingly important for these cellular networks. This paper is focused upon providing the in-depth overview of 5G and B5G networks. The paper aims to evaluate the insights of the security services of 6G networks and outlines various data security techniques used by 5G networks. The paper also provides introduction to quantum computing for cryptography and evaluates various post-quantum cryptography techniques. Finally, some novel research trends and directions in correlation of security of 5G and beyond 5G networks are listed to guide further research in the area.
Saurabh Bhatt, Bharat Bhushan, Tanya Srivastava, V. S. Anoop

Open Access

Chapter 13. Enhanced Energy Efficiency and Scalability in Cellular Networks for Massive IoT
Abstract
The significant expansion of cellular networks has increased their potential to support a wide range of use cases beyond their original purpose of providing broadband access. One such development is using cellular networks to support the Internet of Things (IoT), called Cellular IoT (CIoT). The growth of CIoT is an important trend in the evolution of cellular networks, it leads to broader and more comprehensive ecosystem circumstances. The extensive IoT business evolution is transforming a diverse sector, including health, smart cities, security, and agriculture. Nevertheless, a large scale with very different characteristics and use cases struggle with connectivity challenges due to the unique traffic features of massive IoT and the tremendous density of IoT devices. This study aims to identify the critical obstacles that hinder the widespread deployment of IoT over cellular networks and suggest an innovative algorithm to mitigate them effectively. We discovered that the primary challenges revolve around three specific areas: connection setup, network resource management, and energy consumption. In this regard, we investigate the integration of massive Machine-Type Communication (mMTC) into cellular networks, focusing on the performance of Narrowband IoT (NB-IoT) in supporting mMTC.
Husam Rajab, Tibor Cinkler

Open Access

14. Correction to: Wireless Backhaul Optimization Algorithm in 5G Communication
Astha Sharma, Mukesh Soni, Abhaya Nand, Suryabhan Pratap Singh, Sumit Kumar
Metadata
Title
5G and Beyond
Editors
Bharat Bhushan
Sudhir Kumar Sharma
Raghvendra Kumar
Ishaani Priyadarshini
Copyright Year
2023
Publisher
Springer Nature Singapore
Electronic ISBN
978-981-9936-68-7
Print ISBN
978-981-9936-67-0
DOI
https://doi.org/10.1007/978-981-99-3668-7