SIGNAL MONITORING AND ANALYSIS FOR ENHANCED TRUSTWORTHINESS IN 5G TELECOMMUNICATIONS NETWORKS: AN OVERVIEW OF THE CHALLENGES FACED AND SOLUTIONS

Authors
  • Giwa A.M.

    Airforce Institute of Technology, Kaduna

  • Olatunji O. K.

    Airforce Institute of Technology, Kaduna

  • Mohammed Dikko Almustapha

    Ahmadu Bello University, Zaria, Kadunaering, Ahmadu Bello University, Zaria, Kaduna

  • Muhammad.Z.Z

    Ahmadu Bello University, Zaria, Kaduna

  • Agbon E.E

    Ahmadu Bello University, Zaria, Kaduna

  • Yau.I

    Ahmadu Bello University, Zaria, Kaduna

  • Sena Timothy Tersoo

    Ahmadu Bello University, Zaria, Kaduna

Keywords:
Signal, Monitoring, Trustworthiness, 5G, Challenges, Solutions
Abstract

In the rapidly evolving landscape of telecommunications, the uninterrupted transmission of signals holds utmost importance. To achieve this, signal monitoring and analysis are indispensable for upholding the quality, integrity, and security of telecommunications networks. However, these critical tasks come with a set of intricate challenges. This comprehensive paper offers a detailed exploration of the hurdles encountered in signal monitoring and analysis for enhancing communication trustworthiness within telecommunications networks. By gaining a thorough understanding of these challenges, researchers and industry professionals can develop effective strategies and solutions to optimize network performance and elevate the overall user experience. Through a holistic examination of the complexities involved in signal monitoring and analysis, this paper aims to contribute to the advancement of telecommunications networks and facilitate the development of robust monitoring techniques. In this study, solutions were suggested to tackle the signal processing challenges. Through the suggested solutions, signal monitoring and analysis for a trustworthy communication in 5G telecommunications networks can achieve improved network performance, enhanced security, timely anomaly detection, proactive issue mitigation, optimal resource utilization, and an overall enhanced user experience.

Author Biographies
  1. Giwa A.M., Airforce Institute of Technology, Kaduna

    Department of Telecommunications Engineering

  2. Olatunji O. K. , Airforce Institute of Technology, Kaduna

    Department of Telecommunications Engineering

  3. Mohammed Dikko Almustapha, Ahmadu Bello University, Zaria, Kadunaering, Ahmadu Bello University, Zaria, Kaduna

    Department of Electronics and Telecommunications Engineering

  4. Muhammad.Z.Z, Ahmadu Bello University, Zaria, Kaduna

    Department of Electronics and Telecommunications Engineering

  5. Agbon E.E, Ahmadu Bello University, Zaria, Kaduna

    Department of Electronics and Telecommunications Engineering

  6. Yau.I, Ahmadu Bello University, Zaria, Kaduna
  7. Sena Timothy Tersoo, Ahmadu Bello University, Zaria, Kaduna

    Department of Electronics and Telecommunications Engineering

References

Afaq, A., Haider, N., Baig, M. Z., Khan, K. S., Imran, M., & Razzak, I. (2021). Machine learning for 5G security: Architecture, recent advances, and challenges. Ad Hoc Networks, 123, 102667.

Al-Saadi, R., Armitage, G., But, J., & Branch, P. (2019). A survey of delay-based and hybrid TCP congestion control algorithms. IEEE Communications Surveys & Tutorials, 21(4), 3609-3638.

C. Rolim, F. Koch, J. W. C. Westphall, and A. Fracalossi, and G. Salvador, “A cloud computing solution for patients data collection in health care institutions,” in Proc. 2nd Int. Conf. eHealth, Telemed., Social Med., 2010, pp. 95–99.

Fang, W., Cui, N., Chen, W., Zhang, W., & Chen, Y. (2020). A trust-based security system for data collection in smart city. IEEE Transactions on Industrial Informatics, 17(6), 4131-4140.

Haji, S. H., Zeebaree, S. R., Saeed, R. H., Ameen, S. Y., Shukur, H. M., Omar, N., ... & Yasin, H. M. (2021). Comparison of software defined networking with traditional networking. Asian Journal of Research in Computer Science, 9(2), 1-18.

Hakeem, S. A. A., Hussein, H. H., & Kim, H. (2022). Vision and research directions of 6G technologies and applications. Journal of King Saud University-Computer and Information Sciences, 34(6), 2419-2442.

Huang, S., Liu, A., Zhang, S., Wang, T., & Xiong, N. N. (2020). BD-VTE: A novel baseline data based verifiable trust evaluation scheme for smart network systems. IEEE transactions on network science and engineering, 8(3), 2087-2105.

Jiang, W., Han, B., Habibi, M. A., & Schotten, H. D. (2021). The road towards 6G: A comprehensive survey. IEEE Open Journal of the Communications Society, 2, 334-366.

Khan, R., Kumar, P., Jayakody, D. N. K., & Liyanage, M. (2019). A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions. IEEE Communications Surveys & Tutorials, 22(1), 196-248.

Kolluru, D. S., & Reddy, P. B. (2021, December). Review on communication technologies in telecommunications from conventional telephones to smart phones. In AIP Conference Proceedings (Vol. 2407, No. 1). AIP Publishing.

Korki, M., Jin, J., & Tian, Y. C. (2022). Real-Time Cyber-physical Systems: State-of-the-Art and Future Trends. In Handbook of Real-Time Computing (pp. 509-540). Singapore: Springer Nature Singapore.

Liu, F., Cui, Y., Masouros, C., Xu, J., Han, T. X., Eldar, Y. C., & Buzzi, S. (2022). Integrated sensing and communications: Toward dual-functional wireless networks for 6G and beyond. IEEE journal on selected areas in communications, 40(6), 1728-1767.

Liu, Y., Liu, A., Liu, X., & Ma, M. (2019). A trust-based active detection for cyber-physical security in industrial environments. IEEE Transactions on Industrial Informatics, 15(12), 6593-6603.

M. R. Patra, R. K. Das, and R. P. Padhy, “CRHIS (2012): Cloud based rural healthcare information system,” in Proc. ACM 6th Int. Conf. Theory Practice Electron. Governance, pp. 402–405.

Mo, W., Li, Z., Zeng, Z., Xiong, N. N., Zhang, S., & Liu, A. (2023). SCTD: A spatiotemporal correlation truth discovery scheme for security management of data platform. Future generation computer systems, 139, 109-125.

Mughal, A. A. (2020). Cyber Attacks on OSI Layers: Understanding the Threat Landscape. Journal of Humanities and Applied Science Research, 3(1), 1-18.

Sapalo Sicato, J. C., Sharma, P. K., Loia, V., & Park, J. H. (2019). VPNFilter malware analysis on cyber threat in smart home network. Applied Sciences, 9(13), 2763.

Shafique, K., Khawaja, B. A., Sabir, F., Qazi, S., & Mustaqim, M. (2020). Internet of things (IoT) for next-generation smart systems: A review of current challenges, future trends and prospects for emerging 5G-IoT scenarios. Ieee Access, 8, 23022-23040.

Shen, M., Liu, A., Huang, G., Xiong, N. N., & Lu, H. (2021). ATTDC: An active and traceable trust data collection scheme for industrial security in smart cities. IEEE Internet of Things journal, 8(8), 6437-6453.

Sodhro, A. H., Pirbhulal, S., Luo, Z., Muhammad, K., & Zahid, N. Z. (2020). Toward 6G architecture for energy-efficient communication in IoT-enabled smart automation systems. IEEE Internet of Things Journal, 8(7), 5141-5148.

Stefanescu, D., Galán-García, P., Montalvillo, L., Unzilla, J., & Urbieta, A. (2023). Industrial Data Homogenization and Monitoring Scheme with Blockchain Oracles. Smart Cities, 6(1), 263-290.

Veith, B., Krummacker, D., & Schotten, H. D. (2023). The road to trustworthy 6G: A survey on trust anchor technologies. IEEE Open Journal of the Communications Society, 4, 581-595.

Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A., & Venkatraman, S. (2019). Deep learning approach for intelligent intrusion detection system. Ieee Access, 7, 41525-41550.

Wang, K., Yu, J., Yu, Y., Qian, Y., Zeng, D., Guo, S., ... & Wu, J. (2017). A survey on energy internet: Architecture, approach, and emerging technologies. IEEE systems journal, 12(3), 2403-2416.

Whitman, M. E., & Mattord, H. J. (2021). Principles of information security. Cengage learning.

Xian, W., Yu, K., Han, F., Fang, L., He, D., & Han, Q. L. (2023). Advanced Manufacturing in Industry 5.0: A Survey of Key Enabling Technologies and Future Trends. IEEE Transactions on Industrial Informatics.

Yi, B., Wang, X., Li, K., & Huang, M. (2018). A comprehensive survey of network function virtualization. Computer Networks, 133, 212-262.

Zhu, G., Liu, D., Du, Y., You, C., Zhang, J., & Huang, K. (2020). Toward an intelligent edge: Wireless communication meets machine learning. IEEE communications magazine, 58(1), 19-25.

Cover Image
Downloads
Published
2024-11-20
Section
Articles
License

Copyright (c) 2024 FUTA JOURNAL OF ENGINEERING AND ENGINEERING TECHNOLOGY

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Copyright

With the submission of a manuscript, the corresponding author confirms that the manuscript is not under consideration by another journal. With the acceptance of a manuscript, the Journal reserves the exclusive right of publication and dissemination of the information contained in the article. The veracity of the paper and all the claims therein is solely the opinion of the authors not the journal.

How to Cite

SIGNAL MONITORING AND ANALYSIS FOR ENHANCED TRUSTWORTHINESS IN 5G TELECOMMUNICATIONS NETWORKS: AN OVERVIEW OF THE CHALLENGES FACED AND SOLUTIONS. (2024). FUTA JOURNAL OF ENGINEERING AND ENGINEERING TECHNOLOGY, 18(2), 101-111. https://doi.org/10.51459/futajeet.2024.18.2.542

Similar Articles

1-10 of 34

You may also start an advanced similarity search for this article.