With the mobility and ease of connection, wireless sensor networks have played a significant role in communication over the last few years, making them a significant data carrier across networks. Additional security, lower latency, and dependable standards and communication capability are required for future-generation systems such as millimeter-wave LANs, broadband wireless access schemes, and 5G/6G networks, among other things. Effectual congestion control is regarded as of the essential aspects of 5G/6G technology. It permits operators to run many network illustrations on a single organization while maintaining higher service quality. A sophisticated decision-making system for arriving network traffic is necessary to confirm load balancing, limit network slice letdown, and supply alternative slices in slice letdown or congestion. Because of the massive amount of data being generated, artificial intelligence (AI) and machine learning (ML) play a vital role in reconfiguring and improving a 5G/6G wireless network. In this research work, a hybrid deep learning method is being applied to forecast optimal congestion improvement in the wireless sensors of 5G/6G IoT networks. This proposed model is applied to a training dataset to govern the congestion in a 5G/6G network. The proposed approach provided promising results, with 0.933 accuracy, and 0.067 miss rate.
Cloud computing provides services rather than products; where it offers many benefits to clients who pay to use hardware and software resources. There are many advantages of using cloud computing such as low cost, easy to maintain, and available resources. The main challenge in the Cloud system is how to obtain a highly secured system against attackers. For this reason, methods were developed to increase the security level in different techniques. This paper aims to review these techniques with their security challenges by presenting the most popular cloud techniques and applications. Homomorphic Encryption method in cloud computing is presented in this paper as a solution to increase the security of the data. By using this method, a client can perform an operation on encrypted data without being decrypted which is the same result as the computation applied to decrypted data. Finally, the reviewed security techniques are discussed with some recommendations that might be used to raise the required security level in such a system.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.