1. Badoi, C.-I., Prasad, N., Croitoru, V., & Prasad, R. (2011). 5G Based on Cognitive Radio. Wireless Pers Commun , 441-465.
In this paper, two important technologies ‘ cognitive Radio (CR) and 5G are discussed, highlighting the possibility of a complete and integrated 5G wireless access network using CR. The paper briefly examines the 5G concept and its evolution through various stages staring from 1G. The fundamental features of each stage are explained. The paper also examines the requirements of 5G. After explaining the 5G technology, authors attempt to define CR technology and its core features. Finally the CR based 5G solutions and its major advantages are analysed along with the commercial issues associated with it. The paper argues that the proposed CR-5G network is strongly sustained by the main 5G requirements and performs better. The paper concludes that CR technology is the initial phase to even various communication technologies and achieves the ability of communication network to work with other networks. As such, the CR based 5G is a communication network that will offer consumers with the actual 5G network.
2. Chin, W. H., Fan, Z., & Haines, R. (n.d.). Emerging Technologies and Research Challenges for 5G Wireless Networks. Retrieved August 4, 2016, from Cornell University Library: https://arxiv.org/ftp/arxiv/papers/1402/1402.6474.pdf
This paper examines the various technologies emerging in the landscape of 5G wireless network and argues that emerging technologies will transform and redefine the future of telecommunication standards. The paper also analyses the major challenges these technologies going to face in future. The key technologies identified are Heterogeneous Network, Software defined communication networks, Massive MIMO and 3D MIMO and Machine to Machine communications. Besides, other technologies like Millimeter wave, shared spectrum, big data and indoor positioning are also explained. Main features and challenges of each technology id discussed with future possibilities.
3. Duan, X., & Wang, X. (2015). Authentication Handover and Privacy Protection in 5G HetNets Using Software-Defined Networking. IEEE Communications Magazine , 28-35.
This paper brings in Software Defined Networking or SDN into the realm of 5G. The paper argues that SDN is an important ground to activate validation or authentication handover and confidentiality protection. The authors note that SDN can facilitate the process of authentication handover using 5G HetNets by sharing security information of a dependent user between linked access points. In addition, the study shows that security solutions that are SDN-enabled, and have a centralized control option necessary for delay-constrained 5G network are more efficient. The handover authentication challenge in 5G is also explained before analysing the operational aspects of SDN in 5G. Various examples and numerical simulations have demonstrated the achievement of the proposed schemes.
4. Ge, X., Tu, S., Mao, G., Wang, C.-X., & Han, T. (2016). 5G Ultra Dense Cellullar Networks. IEEE Wireless Communications , 72-79.
This paper explains the 5G ultra dense cellular networks with single and multiple gateways, which can be deployed in all 5G cellular scenarios. Further, the article also explains the impact of different numbers of small cell BSs on the backhaul network capacity. The backhaul energy efficiency of ultra-dense cellular networks is also investigated. There is a density threshold of small cells in ultra-dense cellular networks. The paper compares the architecture of conventional cellular network with the ultra dense cellular network as well. Results of the stimulation research show that when the density of ultra-dense cellular networks is larger than the density threshold, the backhaul network capacity and the backhaul energy efficiency of ultra dense cellular networks will reduce with a further increase in small cell density. The article finally concludes that the 5G ultra-dense cellular network is a density-limited communication system and the analytical determination of the optimum density of small cell BSs in 5G ultra-dense cellular networks is an open issue.
5. Han, Q., Liang, S., & Zhang, H. (2015). Mobile Cloud Sensing,Big Data, and 5G Networks Make an Intelligent and Smart World. IEEE Network , 40-45.
As the title itself indicates, this article explains mobile sensing and cloud computing and analyses how these both concepts can together make mobile cloud sensing. The paper explains the structure and architecture of mobile cloud sensing and highlights the key features of the model. The applications of mobile cloud sensing with special emphasis on health and fitness monitoring and environment monitoring and control were also examined in detail. The key limitations of mobile cloud sensing including the limited network resources and interface and the huge workload on cloud are also explained in the article. Finally the paper highlights the role of 5G and Big data in making it effective and successful. The key argument is that 5G and big data technologies are promising techniques to make mobile cloud sensing possible.
6. Lu, R., Lin, X., & Shen, X. S. (2013). SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS , 614-624.
This paper discusses a computer framework called SPOC, which focuses on securing and preserving privacy during Healthcare emergencies. Using the SPOC framework, any medical user can utilize the user-centric privacy access control and grant access to only qualified helpers to be involved in the opportunistic computing aimed at balancing high-reliability of the PHI process and limiting disclosure of PHI privacy during m-Healthcare emergency. The paper is divided into three sections. In section one, the authors provide a brief overview of the SPOC model. In the second section, the paper explains the system model, security model and the design goal. Section three discusses in detail the SPOC model while the rest of the sections discuss about performance assessment and security analysis of the computing model. The paper highlights the model and argues the SPOC model can effectively balance transmission and the high-intensive PHI process, and reduces disclosure of PHI privacy in m-Healthcare emergency.
7. NetWorld. (2014). 5G:Challenges, Research Priorities, and Recommendations. European Technology Platform forCommunications Networks and Services.
This is a white paper that explains the major features, challenges and prospects of 5G within European context. The comprehensive document defines 5G and highlights its rationale with key benefits and performance indicators. After explaining the 5G ecosystem, the whitepaper explains convergence aspects, privacy concerns and main issues that require addressing in 5G. There are various issues that require attention for the framework to reach and exceed the target performance indicators, such as service-level latency, energy efficiency, lifetime of the battery, manageability, and global and seamless coverage experience among others. Moreover, the paper suggests that the advanced 5G infrastructure should be very flexible for it to effectively operate under foreseen as well as unforeseen requirements, according to the expectations of the present and future stakeholders, while enhancing the total cost of ownership in different stationing situations across Europe and beyond. To address the challenges surrounding 5G, the paper recommends investigating and defining all disruptive network architectures utilizing all accessible and usable network technologies and services. Further, researchers should investigate, develop and deploy the necessary access, networking (core & transmission) and virtualization technologies that will drive the advances of 5G system components and meet the KPIs. The paper also highlights the need for advancing effective business models for 5G network systems, which would enable a worthy cycle of investment throughout the whole existing or future value chain. The white paper concludes that to nurture and further cross-value chain collaboration within 5G, there is need to invest in an effective policy and standardized framework that would effectively manage all networked assets and resources used in computing.
8. Pirinen, P. (2014). A Brief Overview of 5G Research Activities. 1st International Conference on 5G for Ubiquitous Connectivity (5GU) (pp. 16-22). Levi, Finland: European Alliance for innovation.
This article explains and defines 5G and provides a brief overview of the technology mainly emphasising on various programmes and projects towards initiating 5G. After the brief introduction on 5G and its fundamental features, the paper explains the European 5G projects, which include: the European Union 7th Framework Programme (FP7), and the Future Networks Cluster Radio Access and Spectrum projects that manage a substantial section of European 50 research activities. After explaining all the key 4G projects under this broad initiative, the paper provides a detailed literature review on 5G. Both empirical research papers and white papers were analysed and the key arguments in each paper were discussed. Although the concept of 5g is still evolving, the paper shows that it is emerging through different programmes. The existing studies show that performance enhancements in 5G can be achieved through the combination of network densification such as D2D or small cells; increase in spectrum such as spectrum sharing or enhanced carrier aggregation; frequencies beyond 60Hz; and use of enhanced wireless technologies like virtual zero latency RATS, new waveforms, and massive MIMO. According to the paper, type of machine communication will increase the proportion of network connection and traffic. According to the paper, further notes that combination of an ultra-reliable communication and moving network calls for the need to solve complicated technical requirements when challenging the propagation of conditions.
9. Sharma, P. (2013). Evolution of Mobile Wireless Communication Networks-1G to 5G as well as Future Prospective of Next Generation Communication Network. International Journal of Computer Science and Mobile Computing , 2 (8), 47-53.
This article provides an in-depth examination of two leading technologies for the next-generation mobile broadband namely; the Worldwide Interoperability for Microwave Access (WiMAX) and Long Term Evolution. The evolution and development of first generation, second generation, third generation, fourth generation and fifth generation technologies were described in detail. Apart from that, key features of all these wireless technologies were compared in terms of technology, bandwidth, service, multiplexing, deployment and core network. Lastly, the paper highlights the challenges and prospects of next generation communication networks. Based on its ability to effectively handle technologies and offering priceless handset, 5G is anticipated to have a successful future. The paper concludes that 5G will best support the Super Core concept, where a single core will connect all network operators who will have a single infrastructure irrespective of their individual access technologies.
10. Taranto, R. D., Muppirisetty, S., Raulefs, R., Slock, D. T., Svensson, T., & Wymeersch, H. (2014). Location-Aware Comunications for 5G Networks: How Location Information can improve Scalablity, Latency and Robustness of 5G. IEEE Signal Processing Magazine , 102-112.
The paper discusses how 5G technology’s robustness, latency, and scalability can be improved using location information. The core argument of the paper is the role that location information plays in addressing numerous problems within 5G technology integral to present and future technological advancements. Among the discussed challenges include decrease in energy consumption and latency, rise in number of technology devices and traffic, and strength of mission critical services. The article offers an expansive examination of increased research of location technologies across various conventions. First part of the article explains 5G and the main challenges of the technology. Then the article describes the technologies that provide location awareness and analyses the effectiveness of location information over the protocol stack. The article explains every protocol stack layer using a detailed analysis of current, relevant, and credible study findings on location-aware communication. The author concludes the paper by summarizing the various challenges that 5G technology developers need to address for 5G technologies to effectively use location information and attain the envisioned performance achievements.
11. Tehrani, M. N., Uysal, M., & Yanikomeroglu, H. (2014). Device-to-Device Communication in 5G Cellular Networks: Challenges,Solutions, and Future Directions. IEEE Communications Magazine , 86-92.
This paper explains the device to device communication in 5G cellular networks. In traditional cellular system, devices are not allowed to directly communicate with each other in the licensed cellular bandwidth and all communications take place through the base stations. This article, however arguesfor a two-tier cellular network that involves a macrocell tier (i.e.,BS-to-device communications) and a device tier (i.e., device-to-device communications).Device terminal relaying makes it possible for devices in a network to function as transmission relays for each other and realize a massive ad hoc mesh network. This is a revolutionary departure from the conventional cellular architecture and provides unique technical challenges. In such a two-tier cellular system, since the user data is routed through other users’ devices, security must be maintained for privacy. This article narrates an overview ofthemajor challenges in two-tier networks and proposes some pricing schemes for different types of device relaying. The paper initially explains D2D communication and provided a categorization of D2D communication considering the degree of involvement of the cellular operator. The paper also highlights some major technical challenges to be addressed for each type, such as security, interference management, and resource allocation issues. The article mainly focused on pricing issues and proposed some pricing schemes fortwo-tiernetworks using tools from game theory and auction theory. The numerical results have demonstrated that judiciously designed pricing schemes for a two-tier cellular network bring significant gains for both the operator and users in comparison to a conventional single-tier counterpart.
12. Varshney, U., & Vetter, R. (2000). Emerging Mobile and Wireless Networks. Communication of the ACM , 73-81.
The article highlights the increasing use of mobile and wireless network and their advantages due to the flexibility it offers. Mobile and wireless networks are also experiencing significant progress in the form of wireless local area networks (WLANs), satellite-based networks, Wireless Local Loops (WLL), mobile Internet Protocol (IP), and wireless Asynchronous Transfer Mode (ATM) networks. The article makes a comparative analysis of different technologies and its features as well. Further the important issues in each mobile technology and the possible solutions were also explained. The article concluded that in the near future, universal devices that can access the closest/best quality/cheapest wireless network out of several choices will be developed. Wireless networks will be able to implement a uniform addressing system in which a person has a consistent identifying number or network address that is portable across all wireless networks. With increased frequency allocations, advances in semiconductor technology, and more efficient coding of information over wireless channels, mobile and wireless networks will become the networks of choice for most users and applications, making wired networks relics of the past.
13. Wang, X., Han, G., Du, X. (., & Rodrigues, J. J. (2015). Mobile Cloud Computing in 5G:Emerging Trends, Issues, and Challenges. IEEE Network , 4-5.
This is an editorial of the special issue of the journal on Mobile Cloud Computing in 5G. The editorial arguesthat with thedramatically increased capacities of the 5th generation (5G) mobile networks, MCC services are expected to witness accelerated development and become a new hotspot of mobile services. The editorial opines that people’swork patterns and life styles in a future networked society will be dramatically changed by MCC.IBM predicts that there will be 1 trillion cloud-ready devicesby 2015, and most Internet users will work primarily through cyberspace-based applications on remote servers accessed through networked devices.Through future applications enabled by 5G, MCC will have profoundimpacts on almost every aspect of our future digital lives. The editorial narrates the brief overview of all the articles in the journal. All articles are based on MCC and its technological efficiency and performance appraisal.
14. Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., & Renzo, M. D. (2015). Safeguarding 5G Wireless Communication Networks Using Physical Layer Security. IEEE Communications Magazine , 20-27.
This paper focuses on physical layer security, which safeguards dataconfidentiality by exploiting the intrinsic randomness of the communications mediumand reaping the benefits offered by the disruptive technologies to 5G.Among various technologies, the three most promising technologies are discussed in this paper. They are heterogenous networks, massive multiple-input multiple-output, and millimeter wave.On the basis of the key principles of each technology, the paper identifies the rich opportunities and the outstanding challenges that security designers must tackle. Suchidentification is expected to decisively advance the understanding of future physical layer security. The goal of this article is to identify the opportunities and challenges offeredby thedisruptive technologies enabling 5Gfor achievinga high security level at the physical layer. The article argues that with the introduction of small celldeployments andD2D connections, the use of a very large number of antennas, and the exploration of the underutilized mm Wave frequency spectrum,the 5G network is well positionedto meet the ever-increasing demand on data-centric applications over the next decade. The article concludes that the path to 5G is essentially irreversible, and will impose a profound impact on the design of physical layer security.
15. Zhang, N., Cheng, N., Gamage, A. T., Zhang, K., Mark, J. W., & Shen, X. (2015). Cloud Assisted Hetnets towards 5G Wireless Networks. IEEE Communications Magazine ‘ Communications Standards Supplement , 59-65.
This article highlights some challenges identified in 5G networks and offer solutions. Due to the dense deployment of small cells on a very large scale, the increased level of complexity, coupled with reduced control over applications and data, network operators are facing great challenges including the difficulty to manage and control, high cost to deploy small cells densely and inter-cell interference. Thesefactors affect and limit the development of 5G. To overcome the issues, this article introduces a cloud based platform in which small cells are connected to the cloud for management and control. With the cloud based platform, the operation and maintenance can be easily performed. Furthermore, centralized management facilitates round-the-clock optimization of the network, allowing the network operator to efficiently use network resources to supportdifferent applications while adapting to the changing service demands.Three main applications are discussed: operation and maintenance, a cloud assisted business model for small cell deployment, and cloud assisted interference coordination. This is explained using two case studies. The article concludes that the cloud will accelerate the pace of 5G development, and further diversify wireless applications and services.
16. Zheng, M., ZhengQuan, Z., ZhiGuo, D., PingZhi, F., & HengChao, L. (2015). Key techniques for 5G wireless communications:network architecture, physical layer,and MAC layer perspectives. Science China Information Sciences , 1-20
This article narrates the potential network architecture and highlights several promising techniques which could be employed in the future 5G systems. These techniques includenon-orthogonalmultiple access (NOMA), massive multiple input and multiple output (MIMO), cooperative communications and network coding, full duplex (FD), device-to-device (D2D) communications, millimeter wave communications, automated network organization, cognitive radio (CR), and green communications. After explaining the network architecture, the paper analyses the key enabling techniques of 5G in detail. Technical features, evaluation and major limitations of each factor are described. The article argues that there will be greater breakthroughs in wireless communication technology in future due to focused researches and development. Further, it can be expected that the new network architecture and techniques would come up to promote the current cellular systems.