Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    REVIEW

    Modeling and Comprehensive Review of Signaling Storms in 3GPP-Based Mobile Broadband Networks: Causes, Solutions, and Countermeasures

    Muhammad Qasim Khan1, Fazal Malik1, Fahad Alturise2,*, Noor Rahman3

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.1, pp. 123-153, 2025, DOI:10.32604/cmes.2024.057272 - 17 December 2024

    Abstract Control signaling is mandatory for the operation and management of all types of communication networks, including the Third Generation Partnership Project (3GPP) mobile broadband networks. However, they consume important and scarce network resources such as bandwidth and processing power. There have been several reports of these control signaling turning into signaling storms halting network operations and causing the respective Telecom companies big financial losses. This paper draws its motivation from such real network disaster incidents attributed to signaling storms. In this paper, we present a thorough survey of the causes, of the signaling storm problems More >

  • Open Access

    ARTICLE

    Fuzzy Logic Based Handover Authentication in 5g Telecommunication Heterogeneous Networks

    J. Divakaran1,*, Arvind Chakrapani2, K. Srihari3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1141-1152, 2023, DOI:10.32604/csse.2023.028050 - 20 January 2023

    Abstract Under various deployment circumstances, fifth-generation (5G) telecommunications delivers improved network compound management with fast communication channels. Due to the introduction of the Internet of Things (IoT) in data management, the majority of the ultra-dense network models in 5G networks frequently have decreased spectral efficiency, weak handover management, and vulnerabilities. The majority of traditional handover authentication models are seriously threatened, making them vulnerable to a variety of security attacks. The authentication of networked devices is the most important issue. Therefore, a model that incorporates the handover mechanism and authentication model must be created. This article uses More >

Displaying 1-10 on page 1 of 2. Per Page