Fig. 1. Heterogeneous Networks
Fig. 2. Process Time
Fig. 3. Efficiency of Server
Fig. 4. Packet Loss Rate
Table 1. Security Challenges in 5G Technologies
Table 2. Simulation Parameters for Performance Evaluation
참고문헌
- M. Agiwal, A. Roy & N. Saxena. (2016). Next Generation 5G Wireless Networks: A Comprehensive Survey. IEEE Communications Surveys Tutorials, 18(3), 1617-1655. https://doi.org/10.1109/COMST.2016.2532458
- N. Alliance. (2015). NGMN 5G white paper. Next Generation Mobile Networks, White paper.
- Z. Yan, P. Zhang & A. V. Vasilakos. (2016). A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks, 9(16), 3059-3069. https://doi.org/10.1002/sec.1243
- L. T. Sorensen, S. Khajuria & K. E. Skouby. (2015). 2015 IEEE 81st Vehicular Technology Conference(VTC Spring), 1-4.
- F. Kemmer, C. Reich, M. Knahl & N. Clarke. (2016). Software defined privacy. 2016 IEEE International conference on Cloud Engineering Workshop(IC2EW), 25-29.
- D. J. Kim, Y. J. Jung & H. Y. Lee. (2018). Trends and Prospects for 5G Standardization. 2018, TTA Special Report, 1-8. http://www.tta.or.kr/data/reportDown.jsp?news_num=5347
- X. Cui, P. Zhu, X. Yang, K. Li & C. Ji. (2014). Optimized big data K-means clustering using MapReduce. Journal of Supercomputing, 70(3), 1249-1259. https://doi.org/10.1007/s11227-014-1225-7
- B. Bahmani, B. Moseley, A. Vattani, R. Kumar & S. Vassivitskii. (2012). Scalable k-means++. Proceedings of the VLDB Endowment, 5(7), 622-633. https://doi.org/10.14778/2180912.2180915
- Y. H. Kim, K S. Shim, M. S. Kim & J. S. Lee. (2014). DBCURE-MR: an efficient density-based clustering algorithm for large data using MapReduce. Journal of Information Systems, 42, 15-35.
- X. Cui, J. S. Charles & T. Potok. (2013). GPU enhanced parallel computing for large scale data clustering. Journal of Future Generation Computer Systems, 29(7), 1736-1741. https://doi.org/10.1016/j.future.2012.07.009
- J. Cao, M. Ma, Y. Fu, H. Li & Y. Zhang. (2019). CPPHA: Capability-based Privacy-Protection Handover Authentication Mechanism for SDN-based 5G HetNets. IEEE Transactions on Dependable and Secure Computing, 1-1.
- Y. Deng, L. Wang, K. K. Wong, A. Nallanathan, M. Elkashlan & S. Lambotharan. (2015). Safeguarding massive MIMO aided hetnets using physical layer security. Proceedings of the 2015 International Conference on Wireless Communications & Signal Processing(pp. 1-5).
- X. Duan & X. Wang. (2016). Fast authentication in 5G HetNet through SDN enabled weighted secure-context-information transfer. Proceedings of the 2016 IEEE International Conference on Communications (ICC) (pp. 1-6).
- T. Ma, F. Hu & M. Ma. (2017). Fast and efficient physical layer authentication for 5G HetNet handover. Proceedings of the 2017 27th International Telecommunication Networks and Applications Conference (ITNAC)(pp. 1-3).
- S. Sheikhzadeh. M. R. Javan & N. Mokari. (2017). Radio resource allocation for physical-layer security in OFDMA based HetNets with unknown mode of adversary. Proceedings of the 2017 Iran Workshop on Communication and Information Theory (IWCIT)(pp. 1-6).