Affiliation:
1. Computer and Information Sciences Department, Faculty of Science and Information Technology, Universiti Teknologi PETRONAS, Perak, Malaysia
2. Computer Science Department, Faculty of Natural and Applied Sciences, Umaru Musa Yar’adua University Katsina, Nigeria
3. Civil & Environmental Engineering Department, Faculty of Engineering, Universiti Teknologi PETRONAS, Perak, Malaysia
4. Computer Information Technology Department, Schreiner University, Kerrville, Texas, TX, USA
Abstract
To ensure Energy Efficiency (EE) and better Quality of service (QoS), it is necessary to analyze the energy saving possibilities for low resource utilization in the current networks caused by rigorous QoS requirements and implementing EE approach in the planned model for performance improvement. Distributed Denial of Service (DDoS) attacks aim to exhaust the network’s processing and communication capacity by saturating it with packets and generating malicious traffic. There are numerous advantages that make Digital Twin (DT) and Intrusion Detection technique (ID) an effective remedy for a range of (fifth generation) 5G problems. A DDoS attack must be immediately detected and stopped before a legitimate user can access the target of the attacker for the 5G network to provide an efficient energy service. Although they clearly show promise in assisting with the creation and implementation of the challenging 5G environment, Digital Twins is still a relatively new technology for 5G networks but will increase EE. In this research, a thorough examination of the materials was carried out to identify the most cutting-edge DT and ID methods. The purpose of this study was to comprehend the problems with Energy Efficiency, the need for DT, and the methods for dealing with large-scale attack by DDoS on Energy Efficient networks. Only 94 of the 1555 articles produced by the procedure were determined to be relevant using inclusion and exclusion criteria. The outcome demonstrates that in 5G networks, DT, and its fundamental approaches, like QoS and DDoS attack mitigation, can be used to regulate the network’s Energy Efficiency. Numerous practical applications focusing on 5G Systems use their own principles. The effectiveness of these strategies was evaluated using several assessment criteria, including DT, Intrusion Detection, QoS, Energy Efficiency, and 5G Systems. Each study issue is thoroughly explained, along with typical methods, advantages, disadvantages, and performance metrics. Energy economy, network reliability, privacy, and cost reduction are all considerably increased by the implementation of intrusion detection technology in 5G systems. The decision is supported by the technology’s demonstrated efficacy, scalability, real-time detection capacities, low error level, and personalized learning attributes, all of which contribute to the long-term viability of 5G networks as an entire system.
Subject
Artificial Intelligence,Control and Systems Engineering,Software
Reference165 articles.
1. IMT Vision-Framework and overall objectives of the future development of IMT for 2020 and beyond;Series;Recommendation ITU,2015
2. Telesurgery robot based on 5G tactile internet;Miao;Mob Netw Appl,2018
3. Digital twin: Enabling technologies, challenges and open research;Fuller;IEEE Access,2020
4. Overview of 5G security technology;Ji;Sci China Inf Sci,2018
5. Energy Efficiency in 5G Massive MIMO for Mobile Wireless Network