Professional Documents
Culture Documents
5G Wireless Commsys
5G Wireless Commsys
5G Wireless Commsys
net/publication/363554360
Article in International Journal of Online and Biomedical Engineering (iJOE) · September 2022
DOI: 10.3991/ijoe.v18i12.33817
CITATIONS READS
67 1,129
2 authors:
All content following this page was uploaded by Haider TH. Salim Alrikabi on 27 September 2022.
2
Electrical Engineering Department, College of Engineering, University of Misan, Misan, Iraq
hdhiyab@uowasit.edu.iq
1 Introduction
In recent times, the provision of optimum network capacity to end-users has become
imperative for service providers because of the increased presence and use of services
and applications that are dependent on bandwidth. The management of capacity in con-
ventional networks is time and resource-consuming as it needs more planning and time
[1]. This problem can be solved by the proposed CHAOS algorithm because it can
reduce and increase resources. Through network functions (NF’s), extra storage, CPU,
and bandwidth can be provided; the request for these additional provisions can be made
through VIM (virtual infrastructure manager) and assigned to NF’s. The modification
of parameters such as storage, CPU, and bandwidth within conventional networks can
be achieved by fully replacing the physical device as noted by the author in [2]. One of
the advantages offered by adaptive 5G routing is the reduction of cost for the service
provider as it minimizes the required capital investment for maintaining the network
devices. Experts and researchers have provided software-defined and virtualization
approaches that are aimed at reducing the budget allocated for the maintenance of sys-
tems. To decrease the budget for system maintenance in IT departments virtualization
and software-defined techniques are introduced. Researchers in the area of networking
have made available several solutions that can solve numerous complex problems that
exist in conventional networking as noted by the authors in [3, 4]. There is a wide
range of routing problems associated with multimedia communications, but 5G routing
happens to be one of the most difficult. The use conventional networks cannot be used
in attaining certain 5G routing-specific goals such as finding an alternative route for
unwanted traffic [5, 6]. For certain goals to be achieved and tasks accomplished there
is a need for network flexibility and programmability [7–9]. The proposed CHAOS
can be incorporated into networking so that the tasks can be achieved by the network.
The adaptive network must be implemented so that the best path needed for 5G routing
can be achieved. With the use of adaptive 5G routing, an optimal throughput as well
as desirable 5G parameters can be achieved. Another benefit of adaptive routing is its
ability to enhance the utilization of link bandwidth, thereby resulting in performance
enhancement of multimedia applications [10–13]. Adaptive routing can also assist in
improving link bandwidth utilization which in turn enhances performance for multime-
dia applications as shown in Figures 1 and 2.
Fig. 1. It has shown the use cases of 5G communication on IoT-based networks [14]
90 http://www.i-joe.org
Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications
through which a centralized view is provided. Also, through the provided centralized
view, underlying devices can be managed and configured while automated network
policies are programmed. The main component of a network is its traffic controller,
through which, flows are installed into network devices. Through the use of protocols
like OpenFlow, optimal paths are installed in forwarding devices by the controllers
[15–17].
Forwarding layer: This is the layer that is also referred to as the infrastructure layer
because it is made up of all the network devices. With the help of this layer, data can be
transferred to and from clients via several protocols installed by the traffic controller of
the network. Network devices like switches or routers make up the forwarding plane.
A wide range of tasks can be executed by such devices on data packets like prioritizing,
outright blocking of packets, dropping, etc. [18, 19].
Application layer: the application layer is made up of numerous kinds of services
and applications. This layer allows the management of applications like IDS, firewalls,
and load balancers. Given the fact that the programming model of the 5G architecture is
naturally open, applications are enabled to provide some details to the traffic controller
of the network. This in turn aids the network to have greater flexibility, resilience, and
organization. When considering the components of this layer, applications that provide
direct support to forwarding plan operations like the process of routing in the control
plane are not included.
To accurately predict the existence of malicious and harmful users, the primary
user spectrum occupancy identification process is to be developed. A huge number of
harmful users will be used to analyze the accuracy of prediction. The use of MANETs
is employed to enable the designing of an automatic reconfiguration of the cognitive
features [21]. The cognitive techniques used in this work, make utility of the spectrum
that has not been used in military architectures. The MANET is designed with several
cognitive features that are found in every layer. The different objectives of the design
are; application-based, routing-based, and topology-based. Also, the steps involved in
the design include design hierarchy, place platforms, design paths, design topology,
manager checks, and design MAC schedules [22–24].
This research is aimed at solving and analyzing the following key issues:
• Why has the network traffic control’s topology not been found, which has to be a
control network traffic overflow problem which can be formulated through the use
of multi-objective 5G routing optimization?
• How is video streaming in-network presented by the 5G routing performance deg-
radation with the cell-blocking differentiation and dropping between the numerous
stages of the MANET network topology?
• What are the different available protocols associated with mobile ad hoc networks
used for the control of network traffic and enhancement of 5G?
• In what way does the 5G network enhance the secondary users as a channel reserva-
tion scheme? Also, an analysis of the location of the cooperative spectrum sensing
used in MANET for controlling network traffic and resulting 5G is carried out.
• How is the quality of services enhanced by routing through the assistance of the
incorporated CHAOS algorithm and MANET algorithm?
In this study, the MANET and CHAOS have been used to create a virtualized testbed
that is employed in testing the network traffic integration, routing of 5G network, and
implementation of adaptive 5G routing subsequent to the acquisition of the network
traffic stubs. The testbed which was built enables network set-up and is designed with a
Client-Server scenario that is separated using four MANETs (Mobile Ad-hoc Network).
For CHAOS and MANET to be integrated, network management and orchestration are
required. In addition, one of the requirements for the interaction between the controller
and virtual network functions (VNF) is the management of the network through the
use of MANET and CHAOS techniques. This way, the efficient operation of MANET
can be achieved. Thus, the use of Python programming was employed in programming
the proposed system through the two aforementioned frameworks. The heterogeneous
MANET network is responsible for ensuring the 5G’s quality of services. The process-
ing of both algorithms is done in a time sense which does not affect the performance
of MANET system. With this model, the quality of 5G’s service in MANET can be
attained such as control of network traffic, MANET blocking probability, and termina-
tion probability of secondary uses. Secondary users will be used in enhancing the 5G
quality of service with the proposal of channel reservation of schemes. An analysis of
the location of the cooperative spectrum sensing is done in MANET for the control of
network traffic and the resultant 5G network.
92 http://www.i-joe.org
Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications
2 Background
The review of related literature begins with the discussion of the joint implemen-
tation of 5G and CHAOS so that automated networks can be achieved as shown in
Figure 3. In this work, adaptive routing is applied in multimedia communications so
that 5G constraints can be eliminated [25]. In Software-defined networking, the concept
of transparency is supported, thereby leading to the programming of network devices.
Thus, when the northbound and southbound API are configured in 5G, it allows the
functionality of a 5G-enabled NFV network. One of the key requirements of NFV and
SDN networks’ design is services such as the management and orchestration of net-
works. Thus, the management of the network is important for the implementation of
adaptive routing. The use of 5G routing can be employed as a network management
tool that allows the control of network traffic, as well as the application of control the-
ory in networking. The author of the study [17], applied the control-theoretic approach
to the joint operation of SDN and NFV networks, where the use of RINA was employed
in the management of VNF nodes. In the study conducted by the authors in [18], the
CPU load of two VNF instances was monitored, and they ensured that a balance was
achieved for the traffic load for the different VNFs. This study is focused on imple-
menting a technique that is similar to that used by the authors in [26]; this is aimed at
improving the throughput for multimedia communications through the implementation
of the adaptive routing concept. The development of the northbound SDN API has
received attention from a few authors. In [19], the researchers introduced and built an
NBI architecture which is defined by the guidelines and principles of the Open Net-
working Foundation (ONF). In [20], the demonstrated Quite a few papers have been
published regarding the development of northbound SDN API. The authors in [27]
have developed an NBI architecture that follows principles and guidelines provided
by the Open Networking Foundation (ONF). The work done by [28] focused on NBI
design which uses REST services, being the most preferred option for northbound API
in SDN. Also, the authors highlighted and discussed the problems associated with the
use of REST API.
Fig. 3. Physical communication with the implementation of 5G framework using radio links
and optical fiber [28]
The authors in the study [29] and [30] focused on the use of SDN for 5G provi-
sioning. In the two articles, the authors demonstrated that the application layer plays a
critical role in SDN when used for 5G routing. The authors used a certain framework
in their study to showcase the flexibility that can be derived from the SDN applica-
tion layer. The use of network monitoring services can be employed in 5G routing as
achieved in [31] and [32]. The key objective of this article is the provision of optimum
link bandwidth for video streaming applications. Similarly, the researcher in [32] had
similar objectives but achieved them using an idea different from the one used by other
authors; they used NFV as the monitoring system for their work. In [33] 5G parameters
were considered in calculating the optimal route for data transfer, while later priority
flows were installed in the network. Similarly, NFV was as a routing function used in
the study [34], in which several routes were created, and the classification of packets
was done according to ipv4 and ipv6. The work done in this paper is in part related to
[35], where an optimal routing function is obtained to improve the general throughput
by making use of network monitoring. However, the current work is distinguished by
the fact that it is focused on providing a single application where the adaptive 5G rout-
ing is implemented as shown in Figure 4.
94 http://www.i-joe.org
Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications
Fig. 4. Prioritizing the security concerns on 5G networks with the scale on board [36]
3 Methodology
In this study, the adaptive 5G routing has been deployed in a virtualized topology
for network overflow of traffic through the use of both CHAOS and MANET algo-
rithms. Adaptive 5G routing is a method or routing that is also referred to as dynamic
routing and is capable of establishing the best routes for data packets based on certain
cond tions. Implementing adaptive routing is made easy when MANET and CHAOS
are implemented. The possibility of determining the best routing path and directing
packets using the same path is attributed to the open nature of MANET. Use of several
parameters can be employed in calculating adaptive routing including, usage of CPU,
hop counts, bandwidth, as well as other limitations of networking. When these are
calculated, an optimal route can be found. In the testbed which has been created in this
study, packets that are highly prioritized are forwarded towards the direction of the
best path, which is the shortest route, while packets of low priority will be able to have
an alternative route. Also, the mechanism of adaptive routing is only enhanced for the
needed applications, which in the case of this study is the MANET application. In this
work, the function of the virtual network was used as a service together with 5G routing
for MANET application for the development of a control-theoretic approach that sup-
ports adaptive 5G routing for MANET application for the proposed topology. For this
idea to be executed, MANET and CHAOS must be managed properly. Figure 5 shows
the diagram approach.
96 http://www.i-joe.org
Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications
Fig. 6. Division of 5G routing on different levels with shared states for security area
In this work, MANET has been combined with CHAOS to provide a better set-up for
conventional routing. Figure 7 shows the MANET and CHAOS algorithms used for the
network alongside a controller and several networking devices like MANET and other
heterogeneous devices whereby the two can be differentiated by the forwarding layer
and control layer. In the case of this study, a centralized network view which is obtained
by the controller makes use of the Link Layer Discovery Protocol to perform the cal-
culation of the shortest route between nodes. After the calculation of the shortest path,
flows are generated by a controller, and the flows are installed in the MANET through
the use of a variety of network protocols. It should be noted that two hops of 5G routing
are required by the network traffic to arrive at a server. In the same fashion, two hops of
adaptive 5G routing using the MANET and CHAOS are required by network traffic to
arrive at a server. Thus, the same route taken to arrive at the server is used to block the
overflow of network traffic. At the same time, the use of the network from MANET and
CHAOS to inject traffic requires just a short time in 5G routing for MANET to network
traffic so that the path can be shared. The metrics of 5G defense security architecture
with low, medium, and best for communication for controlling the CHAOS traffic over-
flow with variable network bandwidth are shown in Figures 7 and 8.
Fig. 7. The metrics of 5G defense security architecture with low, medium, and best for commu-
nication for controlling the CHAOS traffic overflow with variable network bandwidth
Fig. 8. The abstract CHAOS security model is being used in this work
Here, the transfer of network traffic segments has been carried out according to the
link bandwidth that has been estimated. Thus, the bitrate of all transferred network
packets is not affected by network traffic due to the shared link of 5G routing. The
injection of network traffic varies from 1 MB to 10 MB successively for the same
network traffic. It is through this process that downloading bitrate is provided to each
segment by a MANET network; the segments are subjected to the processes of moni-
toring and recording. Therefore, in this study, it was hypothesized that the bitrate under
the considered network decreases as a result of 5G shared links which results in lower
network traffic and high use of bandwidth.
4 Results
Using the methodology described above, the 5G routing successfully executed the
shortest path routing algorithm through the use of LLDP protocol. The use 5G rout-
ing enabled the addition of certain flows in a python programming language which is
responsible for the duplication of every traffic emanating from the interface and for-
warding it to another interface. CHAOS and MANET algorithms’ flows are duplicated
98 http://www.i-joe.org
Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications
Fig. 10. A graphical representation of network traffic bandwidth allowing different types of
metrics in M-bits with QoS disabled for 5G communication
Fig. 11. This graphical representation explains the total networking traffic instances
on the x-axis while the allowed traffic bitrate on the y-axis using for analysis of CHAOS
with max-bitrate
100 http://www.i-joe.org
Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications
Fig. 12. This graphical representation displays the allowed traffic instances with CHAOS and
5G communication routing enabled on all segments of network traffic
5 Discussion
The 5G routing for a certain topology has been implemented in this work, and this
has been done in a real-time network, where it is implemented based on CHAOS and
MANET algorithms. An alternative route for 5G routing through which low-priority
traffic can be directed rather than the shortest optimal route is calculated. It is believed
that implementing the Alternate routing with the support of an algorithm will cause a
gradual throughput increase in multimedia communication as shown in Table 1.
Finally, segments of network traffic control are detected using layer three and layer
four information in the proposed application. In the proposed approach, the CHAOS is
well configured on various levels so that incoming packets from 5G routing network
can be identified. This is avoided by installing a mechanism known as deep packet
inspection in the proposed system. This way, the overflow of network traffic can be
detected in the video segments depending on the payload. The study is concluded by
enlisting the major contributions of this work as follows:
• Deriving an optimal route through which the overflow of network traffic can be con-
trolled through the calculation of the 5G constraints such as bandwidth, CPU load,
delay, and priority for the control of network traffic overflow.
• Implementation of alternate path algorithm for unwanted traffic.
• Initialization of CHAOS mode in any network under consideration such as MANET.
6 Conclusion
In this research, the limitations and challenges of conventional networking and
MANETS have been discussed in this work. Also, the paper discusses how the pro-
posed CHAOS algorithm can be used in addressing the challenges. The concept of
adaptive 5G routing has been proposed in this study and can be applied in several mul-
timedia applications where the provision of Quality of Service (5G) and revoking extra
network traffic are the main objectives. The experimental results revealed that one of
the ways through which an optimal dedicated path can be created for a certain service
or application is by implementing an adaptive 5G routing. Doing this can also help in
achieving network traffic segments of higher bitrate, approximately 10% more than that
in a shared path using CHAOS. Thus, it is concluded that both algorithms are capable
of enhancing the overall throughput of the network traffic. In addition, it was observed
that when 5G routing is used as a network management tool, it allows the implemen-
tation of a theoretic approach to control CHAOS. At the moment, about all 5G con-
trollers utilize REST service to establish communication between a controller and
network applications. The overflow of network traffic can be minimized by executing
5G-enabled networks coupled with the application of CHAOS. Furthermore, numerous
multimedia service providers can benefit from the implementation of the adaptive 5G
routing in the real network. No limitations were recorded during the implementation of
the proposed approach in a real-time network. Also, the optimal path was calculated,
considering all the 5G parameters. Optimal 5G routing can be achieved by considering
optimal 5G routing limitations such as delay, error rate, CPU load in the future, etc.
7 References
[1] N. Akhtar, I. Matta, and Y. Wang, “Managing NFV using SDN and control theory,” in
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 2016,
pp. 1113–1118: IEEE. https://doi.org/10.1109/NOMS.2016.7502972
[2] P. Juluri, and D. Medhi, “Cache’n dash: Efficient caching for dash,” ACM SIGCOMM
Computer Communication Review, vol. 45, no. 4, pp. 599–600, 2015. https://doi.
org/10.1145/2829988.2790015
102 http://www.i-joe.org
Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications
[3] J. Batalle, J. F. Riera, E. Escalona, and J. A. Garcia-Espin, “On the implementation of NFV
over an OpenFlow infrastructure: Routing function virtualization,” in 2013 IEEE SDN for
Future Networks and Services (SDN4FNS), 2013, pp. 1–6: IEEE. https://doi.org/10.1109/
SDN4FNS.2013.6702546
[4] H. ALRikabi, and N. Alseelawi, “A novel method of multimodal medical image fusion
based on hybrid approach of NSCT and DTCWT,” International Journal of Online and
Biomedical Engineering, vol. 18, no. 3, 2022. https://doi.org/10.3991/ijoe.v18i03.28011
[5] H. T. Salim, A. H. M. Alaidi, A. S. Abdalrada, and F. T. Abed, “Analysis the efficient energy
prediction for 5G wireless communication technologies,” International Journal of Emerging
Technologies in Learning (iJET), vol. 14, no. 08, pp. 23–37, 2019. https://doi.org/10.3991/
ijet.v14i08.10485
[6] A. Strelnitskiy, V. Shokalo, E. Yagudina, and M. K. Abdul-Hussein, “Method of calculating
the detection zone boundaries of the Rayleigh Wi-Fi wireless channel with quasi-static fad-
ing,” Radioelectronics Communications Systems, vol. 55, no. 10, pp. 452–457, 2012. https://
doi.org/10.3103/S0735272712100032
[7] J. Lima, and E. B. Rodrigues, “Quality of service control in software-defined 5G networks,”
in 2021 IEEE International Conference on Automation/XXIV Congress of the Chilean Asso-
ciation of Automatic Control (ICA-ACCA), 2021, pp. 1–6: IEEE.
[8] X. Foukas, N. Nikaein, M. M. Kassem, M. K. Marina, and K. Kontovasilis, “FlexRAN:
A flexible and programmable platform for software-defined radio access networks,” in Pro-
ceedings of the 12th International on Conference on Emerging Networking Experiments and
Technologies, 2016, pp. 427–441. https://doi.org/10.1145/2999572.2999599
[9] A. M. Alaidi, and I. A. Aljazaery, “Encryption of color image based on DNA strand and
exponential factor,” International Journal of Online and Biomedical Engineering (iJOE),
vol. 18, no. 3, 2022. https://doi.org/10.3991/ijoe.v18i03.28021
[10] S. Shafi, and D. V. Ratnam, “A trust based energy and mobility aware routing protocol
to improve infotainment services in VANETs,” Peer-to-Peer Networking and Applications,
pp. 1–16, 2022. https://doi.org/10.1007/s12083-021-01272-6
[11] H. Salim, M. K. Abdul-Hussein, Ivan Obod, Iryna Svyd, “Evaluation of the interference’s
impact of cooperative surveillance systems signals processing for healthcare,” International
Journal of Online and Biomedical Engineering, vol. 18, no. 3, 2022. https://doi.org/10.3991/
ijoe.v18i03.28015
[12] H. Salim, J. S. Qateef, and R. M. Al_airaji, “Face patterns analysis and recognition sys-
tem based on Quantum Neural Network QNN,” International Journal of Interactive Mobile
Technologies (iJIM), vol. 16, no. 9, 2022. https://doi.org/10.3991/ijim.v16i08.30107
[13] H. T. ALRikabi, and H. T. Hazim, “Enhanced data security of communication system using
combined encryption and steganography,” International Journal of Interactive Mobile Tech-
nologies, vol. 15, no. 16, 2021. https://doi.org/10.3991/ijim.v15i16.24557
[14] G.-C. Deng, and K. Wang, “An application-aware QoS routing algorithm for SDN-based
IoT networking,” in 2018 IEEE Symposium on Computers and Communications (ISCC),
2018, pp. 00186–00191: IEEE. https://doi.org/10.1109/ISCC.2018.8538551
[15] N. L. Van Adrichem, C. Doerr, and F. A. Kuipers, “Opennetmon: Network monitoring in
openflow software-defined networks,” in 2014 IEEE Network Operations and Management
Symposium (NOMS), 2014, pp. 1–8: IEEE. https://doi.org/10.1109/NOMS.2014.6838228
[16] Y. Jimenez, C. Cervelló-Pastor, and A. J. Garcia, “On the controller placement for design-
ing a distributed SDN control layer,” in 2014 IFIP Networking Conference, 2014, pp. 1–9:
IEEE. https://doi.org/10.1109/IFIPNetworking.2014.6857117
[17] O. H. Yahya, and I. Aljazaery, “Reducing the data rate in Internet of Things applications by
using wireless sensor network,” International Journal of Online and Biomedical Engineer-
ing (iJOE), vol. 16, no. 03, pp. 107–116, 2020. https://doi.org/10.3991/ijoe.v16i03.13021
[18] J. Bhatia, R. Govani, and M. Bhavsar, “Software defined networking: From theory to prac-
tice,” in 2018 Fifth International Conference on Parallel, Distributed and Grid Computing
(PDGC), 2018, pp. 789–794: IEEE. https://doi.org/10.1109/PDGC.2018.8745762
[19] R. A. Azeez, M. K. Abdul-Hussein, and M. S. Mahdi, “Design a system for an approved
video copyright over cloud based on biometric iris and random walk generator using water-
mark technique,” Periodicals of Engineering Natural Sciences, vol. 10, no. 1, pp. 178–187,
2022. https://doi.org/10.21533/pen.v10i1.2577
[20] A. Sethi, S. K. Jain, and S. Vijay, “Secure self optimizing software defined framework for
NB-IoT towards 5G,” Procedia Computer Science, vol. 171, pp. 2740–2749, 2020. https://
doi.org/10.1016/j.procs.2020.04.298
[21] G. Xilouris, E. Trouva, F. Lobillo, J. M. Soares, J. Carapinha, M. J. McGrath, G. Gardikis,
P. Paglierani, E. Pallis, and L. Zuccaro, “T-NOVA: A marketplace for virtualized network
functions,” in 2014 European Conference on Networks and Communications (EuCNC),
2014, pp. 1–5: IEEE. https://doi.org/10.1109/EuCNC.2014.6882687
[22] J. Matias, J. Garay, N. Toledo, J. Unzilla, and E. Jacob, “Toward an SDN-enabled NFV
architecture,” IEEE Communications Magazine, vol. 53, no. 4, pp. 187–193, 2015. https://
doi.org/10.1109/MCOM.2015.7081093
[23] V. M. Shokalo, A. Strelnitsky, M. Abdul-Hussein, and E. Yagudina, “Refined model for
calculation of limiting secret efficiency of Wi-Fi communication channel,” Telecommuni-
cations Radio Engineering, vol. 71, no. 16, 2012. https://doi.org/10.1615/TelecomRadEng.
v71.i16.30
[24] A. H. M. Alaidi, R. M. Al_airaji, I. A. Aljazaery, and S. H. Abbood, “Dark web illegal
activities crawling and classifying using data mining techniques,” International Journal
of Interactive Mobile Technologies, vol. 16, no. 10, 2022. https://doi.org/10.3991/ijim.
v16i10.30209
[25] A. Kakkar, “A survey on secure communication techniques for 5G wireless heteroge-
neous networks,” Information Fusion, vol. 62, pp. 89–109, 2020. https://doi.org/10.1016/j.
inffus.2020.04.009
[26] M. Pham, and D. B. Hoang, “SDN applications-the intent-based northbound interface real
isation for extended applications,” in 2016 IEEE NetSoft conference and workshops (Net-
Soft), 2016, pp. 372–377: IEEE. https://doi.org/10.1109/NETSOFT.2016.7502469
[27] W. Zhou, L. Li, M. Luo, and W. Chou, “REST API design patterns for SDN northbound API,”
in 2014 28th International Conference on Advanced Information Networking and Appli
cations Workshops, 2014, pp. 358–365: IEEE. https://doi.org/10.1109/WAINA.2014.153
[28] N. Herbaut, D. Negru, D. Magoni, and P. A. Frangoudis, “Deploying a content delivery
service function chain on an SDN-NFV operator infrastructure,” in 2016 International Con-
ference on Telecommunications and Multimedia (TEMU), 2016, pp. 1–7: IEEE. https://doi.
org/10.1109/TEMU.2016.7551917
[29] P.-K. Chartsias, A. Amiras, I. Plevrakis, I. Samaras, K. Katsaros, D. Kritharidis, E. Trouva,
I. Angelopoulos, A. Kourtis, and M. S. Siddiqui, “SDN/NFV-based end to end network slic-
ing for 5G multi-tenant networks,” in 2017 European Conference on Networks and Commu-
nications (EuCNC), 2017, pp. 1–5: IEEE. https://doi.org/10.1109/EuCNC.2017.7980670
[30] Y.-Y. Yang, C.-T. Yang, S.-T. Chen, W.-H. Cheng, and F.-C. Jiang, “Implementation of net-
work traffic monitor system with SDN,” in 2015 IEEE 39th Annual Computer Software
and Applications Conference, 2015, vol. 3, pp. 631–634: IEEE. https://doi.org/10.1109/
COMPSAC.2015.149
[31] G. Kakkavas, A. Stamou, V. Karyotis, and S. Papavassiliou, “Network tomography for effi-
cient monitoring in SDN-enabled 5G networks and beyond: Challenges and opportunities,”
IEEE Communications Magazine, vol. 59, no. 3, pp. 70–76, 2021. https://doi.org/10.1109/
MCOM.001.2000458
104 http://www.i-joe.org
Paper—Secure Chaos of 5G Wireless Communication System Based on IOT Applications
[32] L. R. Battula, “Network security function virtualization (nsfv) towards cloud computing
with nfv over openflow infrastructure: Challenges and novel approaches,” in 2014 Interna-
tional Conference on Advances in Computing, Communications and Informatics (ICACCI),
2014, pp. 1622–1628: IEEE. https://doi.org/10.1109/ICACCI.2014.6968453
[33] M. Głąbowski, S. Hanczewski, and M. Stasiak, “Modelling of cellular networks with
traffic overflow,” Mathematical Problems in Engineering, vol. 2015, 2015. https://doi.
org/10.1155/2015/286490
[34] M. Glabowski, D. Kmiecik, and M. Stasiak, “Overflow of elastic traffic,” in 2016 Inter-
national Conference on Broadband Communications for Next Generation Networks
and Multimedia Applications (CoBCom), 2016, pp. 1–6: IEEE. https://doi.org/10.1109/
COBCOM.2016.7593508
[35] M. Głąbowski and M. D. Stasiak, “Multiservice switching networks with overflow links and
resource reservation,” Mathematical Problems in Engineering, vol. 2016, 2016. https://doi.
org/10.1155/2016/4090656
[36] W. Duan, J. Gu, M. Wen, G. Zhang, Y. Ji, and S. Mumtaz, “Emerging technologies for
5G-IoV networks: Applications, trends and opportunities,” IEEE Network, vol. 34, no. 5,
pp. 283–289, 2020. https://doi.org/10.1109/MNET.001.1900659
[37] A. Sukarno, A. Hikmaturokhman, and D. Rachmawaty, “Comparison of 5g nr planning in
mid-band and high-band in jababeka industrial estate,” in 2020 IEEE International Con-
ference on Communication, Networks and Satellite (Comnetsat), 2020, pp. 12–17: IEEE.
https://doi.org/10.1109/Comnetsat50391.2020.9329000
[38] R. S. Yarrabothu, S. Satrasupali, and L. Gutha, “Performance analysis of 5G waveform–
bi-orthogonal frequency division multiplexing under real fading condition simulations,”
International Journal of Engineering Technology, vol. 7, no. 4.5, pp. 175–178, 2018. https://
doi.org/10.14419/ijet.v7i4.5.20039
8 Authors
Haider TH. Salim ALRikabi is presently Asst. Prof. and one of the faculty Elec-
trical Engineering Department, College of Engineering, Wasit University in Al Kut,
Wasit, Iraq. He received his B.Sc. degree in Electrical Engineering in 2006 from the
Al Mustansiriya University in Baghdad, Iraq. His M.Sc. degree in Electrical Engineer-
ing focusing on Communications Systems from California state university/Fullerton,
USA in 2014. His current research interests include Communications systems with
the mobile generation, Control systems, intelligent technologies, smart cities, and the
Internet of Things (IoT). Al Kut city – Hay ALRabee, Wasit, Iraq. E-mail: hdhiyab@
uowasit.edu.iq. The number of articles in national databases – 30, and the number of
articles in international databases – 50.
Hussein Tuama Hazim is presently one of the faculty college of engineering, elec-
trical engineering department, University of Misan in Misan, Iraq. Master degree in
Electronics and Telecommunication Engineering focusing on Mobile communications.
The current research interests include wiress Communications, mobile computing, AI,
Information Technology, IoT, intelligent Control systems, sustainable energy, deep
learning.
Article submitted 2022-07-05. Resubmitted 2022-08-19. Final acceptance 2022-08-20. Final version
published as submitted by the authors.