This paper presents a comprehensive survey of existing authentication and privacy- preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …
H Zhou, T Wu, H Zhang, J Wu - IEEE Journal on Selected Areas …, 2021 - ieeexplore.ieee.org
Offloading cellular traffic via Device-to-Device communication (or D2D offloading) has been proved to be an effective way to ease the traffic burden of cellular networks. However …
The fully accomplished standardization of the new mobile generation has led to the deployment of fifth-generation (5G) wireless networks to gratify enormous traffic volume for …
It is widely recognized that connected vehicles have the potential to further improve the road safety, transportation intelligence and enhance the in-vehicle entertainment. By leveraging …
Recently, due to the increasing popularity of enjoying various multimedia services on mobile devices (eg, smartphones, ipads, and electronic tablets), the generated mobile data traffic …
Cyber–Physical convergence, the fast expansion of the Internet at its edge, and tighter interactions between human users and their personal mobile devices push towardan …
H Zhou, X Chen, S He, J Chen… - IEEE Journal on Selected …, 2020 - ieeexplore.ieee.org
Offloading cellular traffic through WiFi Access Points (APs) has been a promising way to relieve the overload of cellular networks. However, data offloading process consumes a lot …
B Kar, W Yahya, YD Lin, A Ali - IEEE Communications Surveys …, 2023 - ieeexplore.ieee.org
The huge amount of data generated by the Internet of things (IoT) devices needs the computational power and storage capacity provided by cloud, edge, and fog computing …
The deployment of the fifth-generation (5G) wireless communication services requires the installation of 5G next-generation Node-B Base Stations (gNBs) over the territory and the …