RLIS: Resource Limited Improved Security Beyond Fifth-Generation Networks Using Deep Learning Algorithms

This study explores the feasibility of allocating finite resources beyond fifth generation networks for extended reality applications through the implementation of enhanced security measures via offloading analysis (RLIS). The quantification of resources is facilitated through the utilization of par...

Full description

Bibliographic Details
Main Authors: Shitharth Selvarajan, Hariprasath Manoharan, Alaa O. Khadidos, Achyut Shankar, M. S. Mekala, Adil O. Khadidos
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Open Journal of the Communications Society
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10261511/
_version_ 1797655621087002624
author Shitharth Selvarajan
Hariprasath Manoharan
Alaa O. Khadidos
Achyut Shankar
M. S. Mekala
Adil O. Khadidos
author_facet Shitharth Selvarajan
Hariprasath Manoharan
Alaa O. Khadidos
Achyut Shankar
M. S. Mekala
Adil O. Khadidos
author_sort Shitharth Selvarajan
collection DOAJ
description This study explores the feasibility of allocating finite resources beyond fifth generation networks for extended reality applications through the implementation of enhanced security measures via offloading analysis (RLIS). The quantification of resources is facilitated through the utilization of parameters, namely energy, capacity, and power, which are equipped with proximity constraints. These constraints are then integrated with activation functions in both multilayer perceptron and long short term memory models. Furthermore, the system model has been developed using vision-based computing, which involves managing data queues in terms of waiting periods to minimize congestion for data transmission with limited resources. The major significance of the proposed method is to utilize allocated spectrums for future generation networks by allocating necessary resources and therefore high usage of resources by all users can be avoided. In addition the advantage of the proposed method is secure the networks that operate beyond 5G where more number of users will try to share the allocated resources that needs to be provided with high security conditions.
first_indexed 2024-03-11T17:17:07Z
format Article
id doaj.art-06abe3c1db6840818719f9f60cd43890
institution Directory Open Access Journal
issn 2644-125X
language English
last_indexed 2024-03-11T17:17:07Z
publishDate 2023-01-01
publisher IEEE
record_format Article
series IEEE Open Journal of the Communications Society
spelling doaj.art-06abe3c1db6840818719f9f60cd438902023-10-19T23:01:43ZengIEEEIEEE Open Journal of the Communications Society2644-125X2023-01-0142383239610.1109/OJCOMS.2023.331886010261511RLIS: Resource Limited Improved Security Beyond Fifth-Generation Networks Using Deep Learning AlgorithmsShitharth Selvarajan0https://orcid.org/0000-0002-4931-724XHariprasath Manoharan1https://orcid.org/0000-0001-5034-3034Alaa O. Khadidos2https://orcid.org/0000-0003-3297-3715Achyut Shankar3M. S. Mekala4Adil O. Khadidos5https://orcid.org/0000-0001-6854-6235Department of Computer Science, Kebri Dehar University, Kebri Dehar, EthiopiaDepartment of Electronics and Communication Engineering, Panimalar Engineering College, Chennai, IndiaDepartment of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi ArabiaSecure Cyber Systems Research Group (SCSRG), WMG, University of Warwick, Coventry, U.K.School of Computing, Robert Gordon University, Aberdeen, U.K.Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi ArabiaThis study explores the feasibility of allocating finite resources beyond fifth generation networks for extended reality applications through the implementation of enhanced security measures via offloading analysis (RLIS). The quantification of resources is facilitated through the utilization of parameters, namely energy, capacity, and power, which are equipped with proximity constraints. These constraints are then integrated with activation functions in both multilayer perceptron and long short term memory models. Furthermore, the system model has been developed using vision-based computing, which involves managing data queues in terms of waiting periods to minimize congestion for data transmission with limited resources. The major significance of the proposed method is to utilize allocated spectrums for future generation networks by allocating necessary resources and therefore high usage of resources by all users can be avoided. In addition the advantage of the proposed method is secure the networks that operate beyond 5G where more number of users will try to share the allocated resources that needs to be provided with high security conditions.https://ieeexplore.ieee.org/document/10261511/Deep learning algorithmextended reality applicationsfifth generation networkslimited resourcevisual systems
spellingShingle Shitharth Selvarajan
Hariprasath Manoharan
Alaa O. Khadidos
Achyut Shankar
M. S. Mekala
Adil O. Khadidos
RLIS: Resource Limited Improved Security Beyond Fifth-Generation Networks Using Deep Learning Algorithms
IEEE Open Journal of the Communications Society
Deep learning algorithm
extended reality applications
fifth generation networks
limited resource
visual systems
title RLIS: Resource Limited Improved Security Beyond Fifth-Generation Networks Using Deep Learning Algorithms
title_full RLIS: Resource Limited Improved Security Beyond Fifth-Generation Networks Using Deep Learning Algorithms
title_fullStr RLIS: Resource Limited Improved Security Beyond Fifth-Generation Networks Using Deep Learning Algorithms
title_full_unstemmed RLIS: Resource Limited Improved Security Beyond Fifth-Generation Networks Using Deep Learning Algorithms
title_short RLIS: Resource Limited Improved Security Beyond Fifth-Generation Networks Using Deep Learning Algorithms
title_sort rlis resource limited improved security beyond fifth generation networks using deep learning algorithms
topic Deep learning algorithm
extended reality applications
fifth generation networks
limited resource
visual systems
url https://ieeexplore.ieee.org/document/10261511/
work_keys_str_mv AT shitharthselvarajan rlisresourcelimitedimprovedsecuritybeyondfifthgenerationnetworksusingdeeplearningalgorithms
AT hariprasathmanoharan rlisresourcelimitedimprovedsecuritybeyondfifthgenerationnetworksusingdeeplearningalgorithms
AT alaaokhadidos rlisresourcelimitedimprovedsecuritybeyondfifthgenerationnetworksusingdeeplearningalgorithms
AT achyutshankar rlisresourcelimitedimprovedsecuritybeyondfifthgenerationnetworksusingdeeplearningalgorithms
AT msmekala rlisresourcelimitedimprovedsecuritybeyondfifthgenerationnetworksusingdeeplearningalgorithms
AT adilokhadidos rlisresourcelimitedimprovedsecuritybeyondfifthgenerationnetworksusingdeeplearningalgorithms