5G Wireless Commsys

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/363554360

Secure Chaos of 5G Wireless Communication System Based on IOT


Applications

Article in International Journal of Online and Biomedical Engineering (iJOE) · September 2022
DOI: 10.3991/ijoe.v18i12.33817

CITATIONS READS

67 1,129

2 authors:

Haider TH. Salim Alrikabi Hussein tuama Hazim


Wasit University University of Misan
112 PUBLICATIONS 2,389 CITATIONS 15 PUBLICATIONS 364 CITATIONS

SEE PROFILE SEE PROFILE

All content following this page was uploaded by Haider TH. Salim Alrikabi on 27 September 2022.

The user has requested enhancement of the downloaded file.


Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications

Secure Chaos of 5G Wireless Communication System


Based on IOT Applications
https://doi.org/10.3991/ijoe.v18i12.33817

Haider TH. Salim ALRikabi1(*), Hussein Tuama Hazim2


Electrical Engineering Department, College of Engineering, Wasit University, Wasit, Iraq
1

2
Electrical Engineering Department, College of Engineering, University of Misan, Misan, Iraq
hdhiyab@uowasit.edu.iq

Abstract—This research is aimed at planning the manner in which the secure


5G communication can be controlled based on traffic floods. To accomplish
excellent administration execution of organization observing and 5G directing
calculation is inescapable, dynamic steering in actual organization equipment
isn’t reasonable for practical plans of action. Accordingly, to bring down func-
tional and capital consumption, we propose a strategy called versatile steering
made do with the help of 5G Quality of Service and MANET (Mobile specially
appointed Network). A practical 5G steering model which will help with fulfill-
ing the needs of the customers and simultaneously gives huge investment funds
in item cost and convenience was presented in this paper. To perform versatile 5G
steering, we planned geography in a virtualized climate. We customized CHAOS
for network traffic flood the board which goes about as a consistent northward
API in 5G directing. Network traffic is infused dynamically from 1MB up to
10MB (connect b/w) in a progressive way for similar organization traffic with
10 organization occurrences. In conclusion, we performed versatile 5G steering
applying the control hypothetical method with the assistance of CHAOS and
MANET calculations. By looking at two directing situations, we noticed a prom-
inent distinction in throughput for controlling organization traffic applications in
MANETs. Network traffic flood data is refreshed after clockwork.

Keywords—network traffic, 5G, MANET, routing, CHAOS, topology, layers,


security, IoT

1 Introduction

In recent times, the provision of optimum network capacity to end-users has become
imperative for service providers because of the increased presence and use of services
and applications that are dependent on bandwidth. The management of capacity in con-
ventional networks is time and resource-consuming as it needs more planning and time
[1]. This problem can be solved by the proposed CHAOS algorithm because it can
reduce and increase resources. Through network functions (NF’s), extra storage, CPU,
and bandwidth can be provided; the request for these additional provisions can be made
through VIM (virtual infrastructure manager) and assigned to NF’s. The modification

iJOE ‒ Vol. 18, No. 12, 2022 89


Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications

of parameters such as storage, CPU, and bandwidth within conventional networks can
be achieved by fully replacing the physical device as noted by the author in [2]. One of
the advantages offered by adaptive 5G routing is the reduction of cost for the service
provider as it minimizes the required capital investment for maintaining the network
devices. Experts and researchers have provided software-defined and virtualization
approaches that are aimed at reducing the budget allocated for the maintenance of sys-
tems. To decrease the budget for system maintenance in IT departments virtualization
and software-defined techniques are introduced. Researchers in the area of networking
have made available several solutions that can solve numerous complex problems that
exist in conventional networking as noted by the authors in [3, 4]. There is a wide
range of routing problems associated with multimedia communications, but 5G routing
happens to be one of the most difficult. The use conventional networks cannot be used
in attaining certain 5G routing-specific goals such as finding an alternative route for
unwanted traffic [5, 6]. For certain goals to be achieved and tasks accomplished there
is a need for network flexibility and programmability [7–9]. The proposed CHAOS
can be incorporated into networking so that the tasks can be achieved by the network.
The adaptive network must be implemented so that the best path needed for 5G routing
can be achieved. With the use of adaptive 5G routing, an optimal throughput as well
as desirable 5G parameters can be achieved. Another benefit of adaptive routing is its
ability to enhance the utilization of link bandwidth, thereby resulting in performance
enhancement of multimedia applications [10–13]. Adaptive routing can also assist in
improving link bandwidth utilization which in turn enhances performance for multime-
dia applications as shown in Figures 1 and 2.

Fig. 1. It has shown the use cases of 5G communication on IoT-based networks [14]

Control layer: In networking, the control layer is a layer that is disconnected


from the networking infrastructure. Within the control layer, is embedded a controller

90 http://www.i-joe.org
Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications

through which a centralized view is provided. Also, through the provided centralized
view, underlying devices can be managed and configured while automated network
policies are programmed. The main component of a network is its traffic controller,
through which, flows are installed into network devices. Through the use of protocols
like OpenFlow, optimal paths are installed in forwarding devices by the controllers
[15–17].
Forwarding layer: This is the layer that is also referred to as the infrastructure layer
because it is made up of all the network devices. With the help of this layer, data can be
transferred to and from clients via several protocols installed by the traffic controller of
the network. Network devices like switches or routers make up the forwarding plane.
A wide range of tasks can be executed by such devices on data packets like prioritizing,
outright blocking of packets, dropping, etc. [18, 19].
Application layer: the application layer is made up of numerous kinds of services
and applications. This layer allows the management of applications like IDS, firewalls,
and load balancers. Given the fact that the programming model of the 5G architecture is
naturally open, applications are enabled to provide some details to the traffic controller
of the network. This in turn aids the network to have greater flexibility, resilience, and
organization. When considering the components of this layer, applications that provide
direct support to forwarding plan operations like the process of routing in the control
plane are not included.

Fig. 2. Different types of uncontrolled communication and routing traffic


on the 5G network [20]

To accurately predict the existence of malicious and harmful users, the primary
user spectrum occupancy identification process is to be developed. A huge number of
harmful users will be used to analyze the accuracy of prediction. The use of MANETs
is employed to enable the designing of an automatic reconfiguration of the cognitive
features [21]. The cognitive techniques used in this work, make utility of the spectrum

iJOE ‒ Vol. 18, No. 12, 2022 91


Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications

that has not been used in military architectures. The MANET is designed with several
cognitive features that are found in every layer. The different objectives of the design
are; application-based, routing-based, and topology-based. Also, the steps involved in
the design include design hierarchy, place platforms, design paths, design topology,
manager checks, and design MAC schedules [22–24].

1.1 Problem statement

This research is aimed at solving and analyzing the following key issues:

• Why has the network traffic control’s topology not been found, which has to be a
control network traffic overflow problem which can be formulated through the use
of multi-objective 5G routing optimization?
• How is video streaming in-network presented by the 5G routing performance deg-
radation with the cell-blocking differentiation and dropping between the numerous
stages of the MANET network topology?
• What are the different available protocols associated with mobile ad hoc networks
used for the control of network traffic and enhancement of 5G?
• In what way does the 5G network enhance the secondary users as a channel reserva-
tion scheme? Also, an analysis of the location of the cooperative spectrum sensing
used in MANET for controlling network traffic and resulting 5G is carried out.
• How is the quality of services enhanced by routing through the assistance of the
incorporated CHAOS algorithm and MANET algorithm?

1.2 Aim of study

In this study, the MANET and CHAOS have been used to create a virtualized testbed
that is employed in testing the network traffic integration, routing of 5G network, and
implementation of adaptive 5G routing subsequent to the acquisition of the network
traffic stubs. The testbed which was built enables network set-up and is designed with a
Client-Server scenario that is separated using four MANETs (Mobile Ad-hoc Network).
For CHAOS and MANET to be integrated, network management and orchestration are
required. In addition, one of the requirements for the interaction between the controller
and virtual network functions (VNF) is the management of the network through the
use of MANET and CHAOS techniques. This way, the efficient operation of MANET
can be achieved. Thus, the use of Python programming was employed in programming
the proposed system through the two aforementioned frameworks. The heterogeneous
MANET network is responsible for ensuring the 5G’s quality of services. The process-
ing of both algorithms is done in a time sense which does not affect the performance
of MANET system. With this model, the quality of 5G’s service in MANET can be
attained such as control of network traffic, MANET blocking probability, and termina-
tion probability of secondary uses. Secondary users will be used in enhancing the 5G
quality of service with the proposal of channel reservation of schemes. An analysis of
the location of the cooperative spectrum sensing is done in MANET for the control of
network traffic and the resultant 5G network.

92 http://www.i-joe.org
Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications

2 Background

The review of related literature begins with the discussion of the joint implemen-
tation of 5G and CHAOS so that automated networks can be achieved as shown in
Figure 3. In this work, adaptive routing is applied in multimedia communications so
that 5G constraints can be eliminated [25]. In Software-defined networking, the concept
of transparency is supported, thereby leading to the programming of network devices.
Thus, when the northbound and southbound API are configured in 5G, it allows the
functionality of a 5G-enabled NFV network. One of the key requirements of NFV and
SDN networks’ design is services such as the management and orchestration of net-
works. Thus, the management of the network is important for the implementation of
adaptive routing. The use of 5G routing can be employed as a network management
tool that allows the control of network traffic, as well as the application of control the-
ory in networking. The author of the study [17], applied the control-theoretic approach
to the joint operation of SDN and NFV networks, where the use of RINA was employed
in the management of VNF nodes. In the study conducted by the authors in [18], the
CPU load of two VNF instances was monitored, and they ensured that a balance was
achieved for the traffic load for the different VNFs. This study is focused on imple-
menting a technique that is similar to that used by the authors in [26]; this is aimed at
improving the throughput for multimedia communications through the implementation
of the adaptive routing concept. The development of the northbound SDN API has
received attention from a few authors. In [19], the researchers introduced and built an
NBI architecture which is defined by the guidelines and principles of the Open Net-
working Foundation (ONF). In [20], the demonstrated Quite a few papers have been
published regarding the development of northbound SDN API. The authors in [27]
have developed an NBI architecture that follows principles and guidelines provided
by the Open Networking Foundation (ONF). The work done by [28] focused on NBI
design which uses REST services, being the most preferred option for northbound API
in SDN. Also, the authors highlighted and discussed the problems associated with the
use of REST API.

iJOE ‒ Vol. 18, No. 12, 2022 93


Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications

Fig. 3. Physical communication with the implementation of 5G framework using radio links
and optical fiber [28]

The authors in the study [29] and [30] focused on the use of SDN for 5G provi-
sioning. In the two articles, the authors demonstrated that the application layer plays a
critical role in SDN when used for 5G routing. The authors used a certain framework
in their study to showcase the flexibility that can be derived from the SDN applica-
tion layer. The use of network monitoring services can be employed in 5G routing as
achieved in [31] and [32]. The key objective of this article is the provision of optimum
link bandwidth for video streaming applications. Similarly, the researcher in [32] had
similar objectives but achieved them using an idea different from the one used by other
authors; they used NFV as the monitoring system for their work. In [33] 5G parameters
were considered in calculating the optimal route for data transfer, while later priority
flows were installed in the network. Similarly, NFV was as a routing function used in
the study [34], in which several routes were created, and the classification of packets
was done according to ipv4 and ipv6. The work done in this paper is in part related to
[35], where an optimal routing function is obtained to improve the general throughput
by making use of network monitoring. However, the current work is distinguished by
the fact that it is focused on providing a single application where the adaptive 5G rout-
ing is implemented as shown in Figure 4.

94 http://www.i-joe.org
Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications

Fig. 4. Prioritizing the security concerns on 5G networks with the scale on board [36]

3 Methodology

In this study, the adaptive 5G routing has been deployed in a virtualized topology
for network overflow of traffic through the use of both CHAOS and MANET algo-
rithms. Adaptive 5G routing is a method or routing that is also referred to as dynamic
routing and is capable of establishing the best routes for data packets based on certain
cond tions. Implementing adaptive routing is made easy when MANET and CHAOS
are implemented. The possibility of determining the best routing path and directing
packets using the same path is attributed to the open nature of MANET. Use of several
parameters can be employed in calculating adaptive routing including, usage of CPU,
hop counts, bandwidth, as well as other limitations of networking. When these are
calculated, an optimal route can be found. In the testbed which has been created in this
study, packets that are highly prioritized are forwarded towards the direction of the
best path, which is the shortest route, while packets of low priority will be able to have
an alternative route. Also, the mechanism of adaptive routing is only enhanced for the
needed applications, which in the case of this study is the MANET application. In this
work, the function of the virtual network was used as a service together with 5G routing
for MANET application for the development of a control-theoretic approach that sup-
ports adaptive 5G routing for MANET application for the proposed topology. For this
idea to be executed, MANET and CHAOS must be managed properly. Figure 5 shows
the diagram approach.

iJOE ‒ Vol. 18, No. 12, 2022 95


Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications

Fig. 5. Flow diagram of approach being followed

Every 5G routing can be viewed as a layer of communication, and the operation of


CHAOS is reliant on the standards of layered recursive networking, and as such, all the
routing is carried out and assembled into a single layer, which is made up of several
clustered 5G routing where a repetitive process is needed for the various scope to cre-
ate a channel of communication. For instance, considering Figure 6, whereby services
will be delivered by 5G (shared state) for N – level 5G. One of the ways through which
network traffic can be controlled is through the provision of services to the lower 5G
levels that have the primary responsibility of carrying out recursive communication.
Individual layers do not possess their separate protocols, but the policies and configura-
tions vary based on the 5G quality of service. A collection of 5G is known as a Distri-
bution Application Facility (DAF) which carries out almost the same tasks and employs
shared states. The shared states of 5G shared include a wide range of network traffic
controlling application entities (App1 and App2), that is capable of executing a given
function on different levels like multi-host, single host, or network level. The use of 5G
can be employed in the provision of different services like streaming network packets,
implementation of routing algorithms, and other network-related applications. One of
the requirements for the interaction between different applications is low-level data
transfer which can be derived from internal python-based Application Programming
Interfaces (APIs). Figure 6 shows the Division of 5G routing on different levels with
shared states for security areas.

96 http://www.i-joe.org
Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications

Fig. 6. Division of 5G routing on different levels with shared states for security area

In this work, MANET has been combined with CHAOS to provide a better set-up for
conventional routing. Figure 7 shows the MANET and CHAOS algorithms used for the
network alongside a controller and several networking devices like MANET and other
heterogeneous devices whereby the two can be differentiated by the forwarding layer
and control layer. In the case of this study, a centralized network view which is obtained
by the controller makes use of the Link Layer Discovery Protocol to perform the cal-
culation of the shortest route between nodes. After the calculation of the shortest path,
flows are generated by a controller, and the flows are installed in the MANET through
the use of a variety of network protocols. It should be noted that two hops of 5G routing
are required by the network traffic to arrive at a server. In the same fashion, two hops of
adaptive 5G routing using the MANET and CHAOS are required by network traffic to
arrive at a server. Thus, the same route taken to arrive at the server is used to block the
overflow of network traffic. At the same time, the use of the network from MANET and
CHAOS to inject traffic requires just a short time in 5G routing for MANET to network
traffic so that the path can be shared. The metrics of 5G defense security architecture
with low, medium, and best for communication for controlling the CHAOS traffic over-
flow with variable network bandwidth are shown in Figures 7 and 8.

iJOE ‒ Vol. 18, No. 12, 2022 97


Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications

Fig. 7. The metrics of 5G defense security architecture with low, medium, and best for commu-
nication for controlling the CHAOS traffic overflow with variable network bandwidth

Fig. 8. The abstract CHAOS security model is being used in this work

Here, the transfer of network traffic segments has been carried out according to the
link bandwidth that has been estimated. Thus, the bitrate of all transferred network
packets is not affected by network traffic due to the shared link of 5G routing. The
injection of network traffic varies from 1 MB to 10 MB successively for the same
network traffic. It is through this process that downloading bitrate is provided to each
segment by a MANET network; the segments are subjected to the processes of moni-
toring and recording. Therefore, in this study, it was hypothesized that the bitrate under
the considered network decreases as a result of 5G shared links which results in lower
network traffic and high use of bandwidth.

4 Results

Using the methodology described above, the 5G routing successfully executed the
shortest path routing algorithm through the use of LLDP protocol. The use 5G rout-
ing enabled the addition of certain flows in a python programming language which is
responsible for the duplication of every traffic emanating from the interface and for-
warding it to another interface. CHAOS and MANET algorithms’ flows are duplicated

98 http://www.i-joe.org
Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications

by the representation. The configuration of python programming is done in a manner


that allows it to generate an alert file anytime the number of incoming packets received
by the network traffic increases; the incoming packets emerge from a source port of the
HTTP server. Thus, the proposed system can identify all its incoming packets from the
HTTP server with a particular port number and source IP. The system is also able to
detect segments of network traffic using the port number of the 5G routing. A service
is launched by the 5G controller where the published even is retrieved through the
creation of a subscribed event. Therefore, the use of MANET and CHAOS stub algo-
rithms was employed in the communication layer that was generated. The information
of network traffic overflow is updated every 1 sec and then transferred to the 5G routing
controller. Figure 9 shows the quality of service related to time with bandwidth (Mbits),
in the red line, shows high bandwidth [video] and green line explains high bandwidth
[average] and in blue line explains low bandwidth [HTTP], and the purple explain low
bandwidth [average]. Figure 10 shows without quality of service related to time with
bandwidth.

Fig. 9. A graphical representation of network traffic bandwidth allowing different types


of metrics in M-bits with QoS disabled for 5G communication

iJOE ‒ Vol. 18, No. 12, 2022 99


Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications

Fig. 10. A graphical representation of network traffic bandwidth allowing different types of
metrics in M-bits with QoS disabled for 5G communication

Fig. 11. This graphical representation explains the total networking traffic instances
on the x-axis while the allowed traffic bitrate on the y-axis using for analysis of CHAOS
with max-bitrate

100 http://www.i-joe.org
Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications

Fig. 12. This graphical representation displays the allowed traffic instances with CHAOS and
5G communication routing enabled on all segments of network traffic

Figure 11 explains graphical representation explains the total networking traffic


instances on the x-axis while the allowed traffic bitrate on the y-axis using for analysis
of CHAOS with max-bitrate, and Figure 12 explains graphical representation displays
the allowed traffic instances with CHAOS and 5G communication routing enables on
all segments of network traffic.

5 Discussion

The 5G routing for a certain topology has been implemented in this work, and this
has been done in a real-time network, where it is implemented based on CHAOS and
MANET algorithms. An alternative route for 5G routing through which low-priority
traffic can be directed rather than the shortest optimal route is calculated. It is believed
that implementing the Alternate routing with the support of an algorithm will cause a
gradual throughput increase in multimedia communication as shown in Table 1.

Table 1. The comparison between different algorithms for real-time 5G wireless


communication with existing research
Article Algorithm Security Threshold
[37] Mid-Band and High-Band mmWave 96.57%
[38] Orthogonal Frequency-Division Multiplexing 98.17%
(OFDM)
Proposed Mobile Ad-Hoc Network (MANET) 98.63%

Finally, segments of network traffic control are detected using layer three and layer
four information in the proposed application. In the proposed approach, the CHAOS is

iJOE ‒ Vol. 18, No. 12, 2022 101


Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications

well configured on various levels so that incoming packets from 5G routing network
can be identified. This is avoided by installing a mechanism known as deep packet
inspection in the proposed system. This way, the overflow of network traffic can be
detected in the video segments depending on the payload. The study is concluded by
enlisting the major contributions of this work as follows:

• Deriving an optimal route through which the overflow of network traffic can be con-
trolled through the calculation of the 5G constraints such as bandwidth, CPU load,
delay, and priority for the control of network traffic overflow.
• Implementation of alternate path algorithm for unwanted traffic.
• Initialization of CHAOS mode in any network under consideration such as MANET.

6 Conclusion
In this research, the limitations and challenges of conventional networking and
MANETS have been discussed in this work. Also, the paper discusses how the pro-
posed CHAOS algorithm can be used in addressing the challenges. The concept of
adaptive 5G routing has been proposed in this study and can be applied in several mul-
timedia applications where the provision of Quality of Service (5G) and revoking extra
network traffic are the main objectives. The experimental results revealed that one of
the ways through which an optimal dedicated path can be created for a certain service
or application is by implementing an adaptive 5G routing. Doing this can also help in
achieving network traffic segments of higher bitrate, approximately 10% more than that
in a shared path using CHAOS. Thus, it is concluded that both algorithms are capable
of enhancing the overall throughput of the network traffic. In addition, it was observed
that when 5G routing is used as a network management tool, it allows the implemen-
tation of a theoretic approach to control CHAOS. At the moment, about all 5G con-
trollers utilize REST service to establish communication between a controller and
network applications. The overflow of network traffic can be minimized by executing
5G-enabled networks coupled with the application of CHAOS. Furthermore, numerous
multimedia service providers can benefit from the implementation of the adaptive 5G
routing in the real network. No limitations were recorded during the implementation of
the proposed approach in a real-time network. Also, the optimal path was calculated,
considering all the 5G parameters. Optimal 5G routing can be achieved by considering
optimal 5G routing limitations such as delay, error rate, CPU load in the future, etc.

7 References
[1] N. Akhtar, I. Matta, and Y. Wang, “Managing NFV using SDN and control theory,” in
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 2016,
pp. 1113–1118: IEEE. https://doi.org/10.1109/NOMS.2016.7502972
[2] P. Juluri, and D. Medhi, “Cache’n dash: Efficient caching for dash,” ACM SIGCOMM
Computer Communication Review, vol. 45, no. 4, pp. 599–600, 2015. https://doi.
org/10.1145/2829988.2790015

102 http://www.i-joe.org
Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications

[3] J. Batalle, J. F. Riera, E. Escalona, and J. A. Garcia-Espin, “On the implementation of NFV
over an OpenFlow infrastructure: Routing function virtualization,” in 2013 IEEE SDN for
Future Networks and Services (SDN4FNS), 2013, pp. 1–6: IEEE. https://doi.org/10.1109/
SDN4FNS.2013.6702546
[4] H. ALRikabi, and N. Alseelawi, “A novel method of multimodal medical image fusion
based on hybrid approach of NSCT and DTCWT,” International Journal of Online and
Biomedical Engineering, vol. 18, no. 3, 2022. https://doi.org/10.3991/ijoe.v18i03.28011
[5] H. T. Salim, A. H. M. Alaidi, A. S. Abdalrada, and F. T. Abed, “Analysis the efficient energy
prediction for 5G wireless communication technologies,” International Journal of Emerging
Technologies in Learning (iJET), vol. 14, no. 08, pp. 23–37, 2019. https://doi.org/10.3991/
ijet.v14i08.10485
[6] A. Strelnitskiy, V. Shokalo, E. Yagudina, and M. K. Abdul-Hussein, “Method of calculating
the detection zone boundaries of the Rayleigh Wi-Fi wireless channel with quasi-static fad-
ing,” Radioelectronics Communications Systems, vol. 55, no. 10, pp. 452–457, 2012. https://
doi.org/10.3103/S0735272712100032
[7] J. Lima, and E. B. Rodrigues, “Quality of service control in software-defined 5G net­works,”
in 2021 IEEE International Conference on Automation/XXIV Congress of the Chilean Asso-
ciation of Automatic Control (ICA-ACCA), 2021, pp. 1–6: IEEE.
[8] X. Foukas, N. Nikaein, M. M. Kassem, M. K. Marina, and K. Kontovasilis, “FlexRAN:
A flexible and programmable platform for software-defined radio access networks,” in Pro-
ceedings of the 12th International on Conference on Emerging Networking Experiments and
Technologies, 2016, pp. 427–441. https://doi.org/10.1145/2999572.2999599
[9] A. M. Alaidi, and I. A. Aljazaery, “Encryption of color image based on DNA strand and
expo­nential factor,” International Journal of Online and Biomedical Engineering (iJOE),
vol. 18, no. 3, 2022. https://doi.org/10.3991/ijoe.v18i03.28021
[10] S. Shafi, and D. V. Ratnam, “A trust based energy and mobility aware routing protocol
to improve infotainment services in VANETs,” Peer-to-Peer Networking and Applications,
pp. 1–16, 2022. https://doi.org/10.1007/s12083-021-01272-6
[11] H. Salim, M. K. Abdul-Hussein, Ivan Obod, Iryna Svyd, “Evaluation of the interference’s
impact of cooperative surveillance systems signals processing for healthcare,” International
Journal of Online and Biomedical Engineering, vol. 18, no. 3, 2022. https://doi.org/10.3991/
ijoe.v18i03.28015
[12] H. Salim, J. S. Qateef, and R. M. Al_airaji, “Face patterns analysis and recognition sys-
tem based on Quantum Neural Network QNN,” International Journal of Interactive Mobile
Technologies (iJIM), vol. 16, no. 9, 2022. https://doi.org/10.3991/ijim.v16i08.30107
[13] H. T. ALRikabi, and H. T. Hazim, “Enhanced data security of communication system using
combined encryption and steganography,” International Journal of Interactive Mobile Tech-
nologies, vol. 15, no. 16, 2021. https://doi.org/10.3991/ijim.v15i16.24557
[14] G.-C. Deng, and K. Wang, “An application-aware QoS routing algorithm for SDN-based
IoT networking,” in 2018 IEEE Symposium on Computers and Communications (ISCC),
2018, pp. 00186–00191: IEEE. https://doi.org/10.1109/ISCC.2018.8538551
[15] N. L. Van Adrichem, C. Doerr, and F. A. Kuipers, “Opennetmon: Network monitoring in
openflow software-defined networks,” in 2014 IEEE Network Operations and Management
Symposium (NOMS), 2014, pp. 1–8: IEEE. https://doi.org/10.1109/NOMS.2014.6838228
[16] Y. Jimenez, C. Cervelló-Pastor, and A. J. Garcia, “On the controller placement for design-
ing a distributed SDN control layer,” in 2014 IFIP Networking Conference, 2014, pp. 1–9:
IEEE. https://doi.org/10.1109/IFIPNetworking.2014.6857117
[17] O. H. Yahya, and I. Aljazaery, “Reducing the data rate in Internet of Things applications by
using wireless sensor network,” International Journal of Online and Biomedical Engineer-
ing (iJOE), vol. 16, no. 03, pp. 107–116, 2020. https://doi.org/10.3991/ijoe.v16i03.13021

iJOE ‒ Vol. 18, No. 12, 2022 103


Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications

[18] J. Bhatia, R. Govani, and M. Bhavsar, “Software defined networking: From theory to prac-
tice,” in 2018 Fifth International Conference on Parallel, Distributed and Grid Computing
(PDGC), 2018, pp. 789–794: IEEE. https://doi.org/10.1109/PDGC.2018.8745762
[19] R. A. Azeez, M. K. Abdul-Hussein, and M. S. Mahdi, “Design a system for an approved
video copyright over cloud based on biometric iris and random walk generator using water-
mark technique,” Periodicals of Engineering Natural Sciences, vol. 10, no. 1, pp. 178–187,
2022. https://doi.org/10.21533/pen.v10i1.2577
[20] A. Sethi, S. K. Jain, and S. Vijay, “Secure self optimizing software defined framework for
NB-IoT towards 5G,” Procedia Computer Science, vol. 171, pp. 2740–2749, 2020. https://
doi.org/10.1016/j.procs.2020.04.298
[21] G. Xilouris, E. Trouva, F. Lobillo, J. M. Soares, J. Carapinha, M. J. McGrath, G. Gardikis,
P. Paglierani, E. Pallis, and L. Zuccaro, “T-NOVA: A marketplace for virtualized network
functions,” in 2014 European Conference on Networks and Communications (EuCNC),
2014, pp. 1–5: IEEE. https://doi.org/10.1109/EuCNC.2014.6882687
[22] J. Matias, J. Garay, N. Toledo, J. Unzilla, and E. Jacob, “Toward an SDN-enabled NFV
architecture,” IEEE Communications Magazine, vol. 53, no. 4, pp. 187–193, 2015. https://
doi.org/10.1109/MCOM.2015.7081093
[23] V. M. Shokalo, A. Strelnitsky, M. Abdul-Hussein, and E. Yagudina, “Refined model for
calculation of limiting secret efficiency of Wi-Fi communication channel,” Telecommuni-
cations Radio Engineering, vol. 71, no. 16, 2012. https://doi.org/10.1615/TelecomRadEng.
v71.i16.30
[24] A. H. M. Alaidi, R. M. Al_airaji, I. A. Aljazaery, and S. H. Abbood, “Dark web illegal
activities crawling and classifying using data mining techniques,” International Journal
of Interactive Mobile Technologies, vol. 16, no. 10, 2022. https://doi.org/10.3991/ijim.
v16i10.30209
[25] A. Kakkar, “A survey on secure communication techniques for 5G wireless heteroge-
neous networks,” Information Fusion, vol. 62, pp. 89–109, 2020. https://doi.org/10.1016/j.
inffus.2020.04.009
[26] M. Pham, and D. B. Hoang, “SDN applications-the intent-based northbound interface real­
isation for extended applications,” in 2016 IEEE NetSoft conference and workshops (Net-
Soft), 2016, pp. 372–377: IEEE. https://doi.org/10.1109/NETSOFT.2016.7502469
[27] W. Zhou, L. Li, M. Luo, and W. Chou, “REST API design patterns for SDN northbound API,”
in 2014 28th International Conference on Advanced Information Networking and Appli­
cations Workshops, 2014, pp. 358–365: IEEE. https://doi.org/10.1109/WAINA.2014.153
[28] N. Herbaut, D. Negru, D. Magoni, and P. A. Frangoudis, “Deploying a content delivery
service function chain on an SDN-NFV operator infrastructure,” in 2016 International Con-
ference on Telecommunications and Multimedia (TEMU), 2016, pp. 1–7: IEEE. https://doi.
org/10.1109/TEMU.2016.7551917
[29] P.-K. Chartsias, A. Amiras, I. Plevrakis, I. Samaras, K. Katsaros, D. Kritharidis, E. Trouva,
I. Angelopoulos, A. Kourtis, and M. S. Siddiqui, “SDN/NFV-based end to end network slic-
ing for 5G multi-tenant networks,” in 2017 European Conference on Networks and Commu-
nications (EuCNC), 2017, pp. 1–5: IEEE. https://doi.org/10.1109/EuCNC.2017.7980670
[30] Y.-Y. Yang, C.-T. Yang, S.-T. Chen, W.-H. Cheng, and F.-C. Jiang, “Implementation of net-
work traffic monitor system with SDN,” in 2015 IEEE 39th Annual Computer Software
and Applications Conference, 2015, vol. 3, pp. 631–634: IEEE. https://doi.org/10.1109/
COMPSAC.2015.149
[31] G. Kakkavas, A. Stamou, V. Karyotis, and S. Papavassiliou, “Network tomography for effi-
cient monitoring in SDN-enabled 5G networks and beyond: Challenges and opportunities,”
IEEE Communications Magazine, vol. 59, no. 3, pp. 70–76, 2021. https://doi.org/10.1109/
MCOM.001.2000458

104 http://www.i-joe.org
Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications

[32] L. R. Battula, “Network security function virtualization (nsfv) towards cloud computing
with nfv over openflow infrastructure: Challenges and novel approaches,” in 2014 Interna-
tional Conference on Advances in Computing, Communications and Informatics (ICACCI),
2014, pp. 1622–1628: IEEE. https://doi.org/10.1109/ICACCI.2014.6968453
[33] M. Głąbowski, S. Hanczewski, and M. Stasiak, “Modelling of cellular networks with
traffic overflow,” Mathematical Problems in Engineering, vol. 2015, 2015. https://doi.
org/10.1155/2015/286490
[34] M. Glabowski, D. Kmiecik, and M. Stasiak, “Overflow of elastic traffic,” in 2016 Inter-
national Conference on Broadband Communications for Next Generation Networks
and Multimedia Applications (CoBCom), 2016, pp. 1–6: IEEE. https://doi.org/10.1109/
COBCOM.2016.7593508
[35] M. Głąbowski and M. D. Stasiak, “Multiservice switching networks with overflow links and
resource reservation,” Mathematical Problems in Engineering, vol. 2016, 2016. https://doi.
org/10.1155/2016/4090656
[36] W. Duan, J. Gu, M. Wen, G. Zhang, Y. Ji, and S. Mumtaz, “Emerging technologies for
5G-IoV networks: Applications, trends and opportunities,” IEEE Network, vol. 34, no. 5,
pp. 283–289, 2020. https://doi.org/10.1109/MNET.001.1900659
[37] A. Sukarno, A. Hikmaturokhman, and D. Rachmawaty, “Comparison of 5g nr planning in
mid-band and high-band in jababeka industrial estate,” in 2020 IEEE International Con-
ference on Communication, Networks and Satellite (Comnetsat), 2020, pp. 12–17: IEEE.
https://doi.org/10.1109/Comnetsat50391.2020.9329000
[38] R. S. Yarrabothu, S. Satrasupali, and L. Gutha, “Performance analysis of 5G waveform–
bi-orthogonal frequency division multiplexing under real fading condition simula­tions,”
International Journal of Engineering Technology, vol. 7, no. 4.5, pp. 175–178, 2018. https://
doi.org/10.14419/ijet.v7i4.5.20039

8 Authors

Haider TH. Salim ALRikabi is presently Asst. Prof. and one of the faculty Elec-
trical Engineering Department, College of Engineering, Wasit University in Al Kut,
Wasit, Iraq. He received his B.Sc. degree in Electrical Engineering in 2006 from the
Al Mustansiriya University in Baghdad, Iraq. His M.Sc. degree in Electrical Engineer-
ing focusing on Communications Systems from California state university/Fullerton,
USA in 2014. His current research interests include Communications systems with
the mobile generation, Control systems, intelligent technologies, smart cities, and the
Internet of Things (IoT). Al Kut city – Hay ALRabee, Wasit, Iraq. E-mail: hdhiyab@
uowasit.edu.iq. The number of articles in national databases – 30, and the number of
articles in international databases – 50.
Hussein Tuama Hazim is presently one of the faculty college of engineering, elec-
trical engineering department, University of Misan in Misan, Iraq. Master degree in
Electronics and Telecommunication Engineering focusing on Mobile communications.
The current research interests include wiress Communications, mobile computing, AI,
Information Technology, IoT, intelligent Control systems, sustainable energy, deep
learning.

Article submitted 2022-07-05. Resubmitted 2022-08-19. Final acceptance 2022-08-20. Final version
published as submitted by the authors.

iJOE ‒ Vol. 18, No. 12, 2022 105

View publication stats

You might also like