One of the key foundations of 5 th Generation (5G) and beyond 5G (B5G) networks is network slicing, in which the network is partitioned into several separated logical networks, taking into account the requirements of diverse applications. In this context, resource management is of great importance to instantiate and operate network slices and meet their performance and functional requirements. Resource management in Radio Access Networks (RANs) is associated with a range of challenges due to network dynamics and the specific requirements of each application while ensuring performance isolation. In this paper, we present a survey on state-of-the-art works that employ Machine Learning (ML) techniques in RAN slicing. We begin by reviewing the challenges, then we review the existing papers on resource management in a comprehensive manner, and classify the papers based on the used ML algorithm, the addressed challenges, and the type of allocated resources. We evaluate the maturity of current methods and state a number of open challenges and some solutions to address these challenges in RAN resource management.
RFID facilitates automatic identification, tracking, and handling of objects, human beings, and animals through the use of radio-frequency based communications. The performance of RFID depends on tag, reader, and server equipment that make use of radio waves in order to establish communications between each other. The economic transfers are among the primary objectives of RFID, though these days, other sectors within the industry benefit from it. Nonetheless, the major concern in RFID systems relates to their security and privacy. Up to now, several protocols have been introduced on tag and reader identification but the majority of them suffer from shortcomings. In 2012, Doss et al. proposed a lightweight protocol based on minimum disclosure that guaranteed the safety of communications between tag-reader and reader-server channels. In the current study, it has been shown that this protocol is prone to replay attack. In other words, attackers can authenticate themselves to the server as a legal reader or a legal tag. Therefore, an improvement has been proposed in the current article to make the protocol more resistant against attacks.
RFID, Authentication, Replay attack, Minimum disclosureI.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.