You are viewing a javascript disabled version of the site. Please enable Javascript for this site to function properly.
Go to headerGo to navigationGo to searchGo to contentsGo to footer
In content section. Select this link to jump to navigation

Energy efficiency in 5G systems: A systematic literature review

Abstract

To ensure Energy Efficiency (EE) and better Quality of service (QoS), it is necessary to analyze the energy saving possibilities for low resource utilization in the current networks caused by rigorous QoS requirements and implementing EE approach in the planned model for performance improvement. Distributed Denial of Service (DDoS) attacks aim to exhaust the network’s processing and communication capacity by saturating it with packets and generating malicious traffic. There are numerous advantages that make Digital Twin (DT) and Intrusion Detection technique (ID) an effective remedy for a range of (fifth generation) 5G problems. A DDoS attack must be immediately detected and stopped before a legitimate user can access the target of the attacker for the 5G network to provide an efficient energy service. Although they clearly show promise in assisting with the creation and implementation of the challenging 5G environment, Digital Twins is still a relatively new technology for 5G networks but will increase EE. In this research, a thorough examination of the materials was carried out to identify the most cutting-edge DT and ID methods. The purpose of this study was to comprehend the problems with Energy Efficiency, the need for DT, and the methods for dealing with large-scale attack by DDoS on Energy Efficient networks. Only 94 of the 1555 articles produced by the procedure were determined to be relevant using inclusion and exclusion criteria. The outcome demonstrates that in 5G networks, DT, and its fundamental approaches, like QoS and DDoS attack mitigation, can be used to regulate the network’s Energy Efficiency. Numerous practical applications focusing on 5G Systems use their own principles. The effectiveness of these strategies was evaluated using several assessment criteria, including DT, Intrusion Detection, QoS, Energy Efficiency, and 5G Systems. Each study issue is thoroughly explained, along with typical methods, advantages, disadvantages, and performance metrics. Energy economy, network reliability, privacy, and cost reduction are all considerably increased by the implementation of intrusion detection technology in 5G systems. The decision is supported by the technology’s demonstrated efficacy, scalability, real-time detection capacities, low error level, and personalized learning attributes, all of which contribute to the long-term viability of 5G networks as an entire system.

1.Introduction

Previous studies on 5G cellular systems have been motivated by the exponential growth of consumers who depend on mobile devices such as wireless broadband services, mobile phones, and other smart devices. These portable devices are operated by a battery, which is a fixed power source. The limited power source of battery-powered wireless devices is an important barrier to the creation of ever-more-sophisticated technology, including the highly desired “smart” phones. Research on larger batteries has already been the focus of the articles published recently. On the other hand, the slow advancement of battery capacity may keep up with the quick development of mobile and Internet technologies. Instead, scientists are currently working to improve the Energy Efficiency of every network tier. Creating green networks or Energy Efficient computer network architectures is one such attempt (s) [1].

To make real items and pertinent sources of data accessible to programs and users through digital channels, the concept of the “Digital Twin” (DT) emerged. Research agents, avatars, virtual twins, virtual products, and digital counterparts are all phrases used to represent ideas that are similar or partially overlap [2]. DT is defined as the relationship between the physical and virtual commodities as well as the physical and digital products. DT enables simultaneous communication with the physical twin in both ways. A DT can be used by interested parties that read the data from the physical product, assess it, and execute simulations. Actuation instructions, control signals, as well as other information may be sent to the physical twin using a DT [3]. By reviewing the DTs of the various components, developers and engineers can choose, create, and implement the necessary integrations, interfaces, and telecommunication linkages despite having specific understanding of each component. Eventually, the devices might be able to communicate with one another without the assistance of a human programmer. The most cutting-edge technologies can build virtual worlds with a real-world appearance and feel concurrent movement between the real world and the virtual world. Furthermore, smartphones have eliminated the need for complex sensor installations by enabling real-time monitoring of a variety of data sources directly from the user. This knowledge could be used to add features from the actual world to virtual environments [4]. Global adoption of fifth generation (5G) technologies for mobile communication is imminent. Currently, 5G is being implemented in modest locations across practically all continents, with a greater number of networks being made available in the United States and Europe [5]. By 2025, 5G is anticipated to represent at least 15% of the entire mobile communications industry [6]. As a result, it is imperative to consider how 5G may affect key fields of research in data management and processing, including databases, distributed systems, block-chain, deep learning, machine leaning, and cryptography.

Continual prototype, validation, self-optimization, and verification of the live network are made possible by the 5G Digital Twin, a revolutionary technique to test results and assurance that offers a program replica of 5G physical network. So, it is also necessary to have a virtualized solution that can create a digital version and accurately represent the 5G ecosystem. This will help in overcoming all the difficulties and meeting the 5G requirements. The DT can assess performance, forecast the impact of environmental change, and, more importantly, optimize 5G network operations and decision-making. For conducting operational forecasts and enforcing proper decision into the living network and related systems, the digital 5G model will cohabit with the actual 5G network in the 5G DT. A dependable, high performance, exceptionally fast internet connection using cutting-edge networking technology is a crucial necessity for the integration and deployment of all the technologies in the digitization process. One of the primary pillars of a digital transformation process is the Digital Twin technology. It makes it possible to reproduce physical systems digitally, which has a few advantages like real-time monitoring, enhanced production, and efficiency [7].

In this systematic literature review (SLR), we suggested a solution to the issues raised above by doing a thorough literature assessment of the textual data domains related to Energy Efficiency. The research was well performed and has contributed to the newly added disciplines of 5G network, DDoS, and Digital Twin. Additionally, we chose publications that cover the fundamental performance assessment and internet data approaches. Energy Efficiency difficulties, DDoS attacks, a 5G network, and a Digital Twin’s model are all included in the state-of-the-art SLR.

The research questions were chosen to highlight the areas that concentrate on the problem of Energy Efficiency. How the 5G network strategy would help the fundamental methods that can handle DDoS, and which algorithms are suited based on efficiency. The goals of the proposed SLR are to comprehend the Energy Efficiency problems of 5G networks encounter. Also, to change the problem by substituting a Digital Twin model and Intrusion Detection technique with performance measuring methods for the 5G network. With the use of the Digital Twin concept and Intrusion Detection technique, this study will benefit the mobile network research community. The network security will also benefit by the prevention, effectiveness, and Quality of Service (QoS) of the 5G network.

The contributions of enhancing energy efficiency in 5G systems through the adoption of an intrusion detection method are substantial and multifaceted. Implementing an efficient intrusion detection method in 5G systems helps reduce energy consumption. By accurately identifying and mitigating security threats, the system can avoid unnecessary resource-intensive processes triggered by malicious activities. This contributes to a more sustainable and eco-friendlier 5G network. Extensive research and empirical evidence support the chosen intrusion detection method’s effectiveness in identifying and mitigating security threats in 5G systems. It has demonstrated superior performance compared to previous methods, making it a reliable choice. In conclusion, the adoption of an intrusion detection method in 5G systems contributes significantly to energy efficiency, network performance, security, and cost savings. The choice is justified by its proven effectiveness, scalability, real-time detection capabilities, low false positive rate, and adaptive learning features, all of which collectively enhance the overall resilience and sustainability of 5G networks.

The paper is organized into sections; Section 1 introduction, Section 2 literatures, Section 3 methodology, Section 4 result, Section 5 discussion and finally conclusion significance and contribution.

2.5G technology

It was estimated that 5G would enable $12.3 trillion in global economic output and support 22 million jobs by 2035. Although 5G has enormous potential, obtaining those benefits will still be challenging. It has been a vast interconnected network of everything, 5G systems. Its applications include all the demanding high data rates (such as video games), ultrareliable and rapid connections (such as in autonomous factories), and machine-type devices that run on batteries. Because of this, 5G network components are incredibly complicated, and the creation and deployment of these networks will be plagued with financial and technical risks. The deployment of 5G aims to enable fully autonomous driving and efficient communication between connected cars, which might enhance traffic management and road safety [8]. Support for these connected car services as well as a new software program will be made possible by the provision of ultra-reliable latency low communications (URLLC) via 5G Systems. Car makers will be able to observe how their vehicles respond in a variety of road-specific scenarios, such as parking, pedestrians, traffic, weather, along with 5G connectivity scenarios, and the 5G emulator. Given that the automotive industry relies on 5G Systems to power essential functions, this degree of testing could aid in accelerating the acceptance and implementation of driverless vehicles in a safe, dependable, and secure manner. New research models have made a lot of promises to 5G Systems, the demands of different services impede the network rollout. This scope for every strategic plan is different for each provider, therefore these objectives may not be compatible [9].

Due to the complex nature, that comprises of a lack of data to enhance the system, including user behaviors and channel characteristics, building an ideal 5G network in one go is therefore not practical. When enough accurate data is unavailable before the scheduling technique, there is a bottleneck. The 5G commercialization process is still in its infancy. The 5G network has the potential to alter the current wireless network with its enhanced capabilities and cutting-edge features. 5G new radio (5G NR) is the name of the global 5G standard. The cornerstone of industrial development is emerging as 5G networks based on digitization and improved communication. It has promised to provide stable services at incredibly fast rates with almost no latency. Anybody, anywhere, at any time will be able to access mobile and fixed broadband services in 5G.

3.Energy Efficiency

Energy Efficient cellular radio resource management is one of the best ways to reduce the energy usage of wireless devices. Developing heterogeneous networks with a combination of microcells, macrocells, femtocells, and picocells will be more efficient. Various backhaul and cooperative communications need also be considered in addition to Energy Efficient cell-size design. Therefore, a great way to improve Energy Efficiency is by establishing Energy Efficient base stations then switching off as many base stations as you can. It is essential to increase the Energy Efficiency of wireless cellular networks. To make wireless cellular networks more Energy Efficient, extensive research must be done. It simply relates to a user equipment (UE’s) battery and has since developed into a crucial part of UE designs. Metrics including UE power usage, UE battery capacity, and UE transmitting power are part of current research efforts. The first objective that must be addressed is Energy Efficiency. The use of femtocells is one of the most promising methods for improving the Energy Efficiency of future networks. The corresponding energy consumption is growing at an astounding rate along with the rapid and radical spread of information and communication technologies (ICT). Additionally, it has been reported that mobile providers continue to rank among the biggest energy consumers. Digi Malaysia, for instance, is among Malaysia’s top energy consumers. From another point of view, the energy consumption of mobile networks is growing far more quickly than ICT. Hence, once 4G systems are completely implemented in developing countries (like China and Malaysia), 5G systems will thereafter be implemented globally. If nothing is done, mobile communications will consume a lot more energy in terms of network [10].

A wirelessly base station (BS) uses a substantial amount of energy, which results in a high electricity bill. The cognitive radio component consumes over half of the overall energy, while the power amplifier (PA) uses the remaining 50–80 percent. Therefore, from the perspective of the operators, Energy Efficiency (EE) also does not show social commitment in the fight against climate change and has great ecological advantages, but it also has significant business advantages. As a result, it is crucial to switch from optimizing throughput and bandwidth efficiency to improving energy use when creating wireless networks. From the perspective of consumers, Energy Efficient wireless technology is also crucial [11]. Latest research involving Energy Efficient wireless networks was also discussed, along with several significant international projects for these networks. To start building Energy Efficient wireless networks, the Multi Input Multi Output (MIMO) and rotational symmetric level of coverage transmission method orthogonal frequency-division multiplexing (OFDM) techniques are required. Implementation methods of Energy Efficient system resource management needs various relay, collaborative communications and cross-layer optimizations to be introduced.

4.Qaulity of service (QoS)

The 5G service’s lowest number of granularities, the QoS flow, is where policies and fees are implemented. Several or more Service data flows (SDFs) may be given in the same QoS flow if they adhere to the same policy and billing guidelines (almost like an EPS bearer in 4G long term evolution (LTE)). As in Fig. 1, every traffic contained within the same QoS route is handled equally. Differentiating LTE compliant customers and services is made possible by LTE QoS. Compared to basic customers, premium members have an advantage, and it is possible to prioritize real-time services over non-real-time services. As everyone is aware, an unloaded network cannot interfere with the transmission of services to LTE consumers. When the network is overloaded, the real problem arises in LTE and QoS is being deployed during this time for assessment. Prioritization identifies which users are performing well and those who are not as the demand on the network rises [12].

Figure 1.

Model of QoS for assessing Energy Efficiency.

Model of QoS for assessing Energy Efficiency.

5.Related works

Name of authorProblemMethodResult
Z. Mike et al., 2019Complex difficulties in the real world Consider the power grid.Online investigation of the power system using a large-scale network model.With only a sub-second latency, it tracks or mirrors the operating condition of a large-scale Power grid in real-time.
C.K. Lo et al., 2021Examine DT advancement in product design and learn about DT trends in prominent research fields.Conceptual design, detailed design, design verification, and redesign are the four categories for methodology adoption.It has been discovered that using data from existing product DT, DT may successfully aid in concept creation and redesign.
Q. Qinglin et al., 2021Current tools may not be able to be integrated and utilized concurrently for a certain goal due to differences in formats, protocols, and standards.The research looked at and summarized the technology and techniques that make DT possible.The document gives broad guidelines for enabling technologies, as well as some examples of tools and how to choose them.
D. Rui et al., 2019Too much energy is used, and resource allocation and job offloading strategies are not optimized. Mechanical environmental control (MEC).To train the DL algorithm, like a Digital Twin of the real network is used. Ultra-Reliable Low Latency Communications (URLLC).Improve the EE of users in a MEC system, while keeping in mind the URLLC services’ latency and reliability limits, as well as the stability requirements of delay tolerant services.
Sh. Zh. Seilov et al., 2021Several real-world issues with sophisticated telecommunications networks.Design, building, and operation of equipment, as well as the creation of modernization concepts.Monitoring traffic, including its normal behavior, helps prevent erroneous actions in emergency circumstances and to become a useful instrument for undertaking multidisciplinary research.
D. Xia et al., 2023Every channel’s traffic flow is calculated. There is an assault if the flow count value is large; entropy reduces dramatically.Fast Entropy Approach.The adaptive threshold technique is used to keep track of the network’s ongoing flow.
G. Amponis et al., 2023The attack characteristics and tolerance level of a system are determined by utilizing fundamental information.Stone method.The Stone system and the data control center identify and mitigate traffic.
Y. Siriwardhana et al., 2021How can wireless local area network (WLAN) energy models be made more accurate and efficient to model big and complicated wireless networks?WLAN environments using real-world measurements. Wireless transport layer security (WTLS). Internet protocol security (IPSec).Energy-Efficient The key contributions are WTLS security protocol adjustments on the energy spent by the IPSec protocol, which result in Energy-Efficient and secure wireless networks.
P. Stavropoulos et al., 2022Diagnose problems and make necessary changes.Artificial Intelligent (AI) is used to anticipate a vehicle’s Energy Efficiency performance.Improved Energy Efficiency is used to improve the behavior and performance of connected cars in a controlled realistic environment.
L.B. Makai et al., 2023Manage user with access points.Suggest two mobility management strategies.In femtocells, we looked at several issues that reduced signal traffic.
I. Budhiraja et al., 2018Network security.Avoids unwanted handovers using mobile velocity.Increased network capacity and coverage.
V. Chauhan., 2018When a mobile phone is turned on, how do you get bandwidth?Spatial multiplexing.LTE networks have achieved a downlink peak data rate of 300 Mps.
A. Mauri et al., 2020Boundary fluctuation.Two consecutive handovers.If the signal at the source and destination eNodeBs is equal, the UE transfers between them.
D. Xenakis et al., 2018Femtocell deployment density.Handover (HO) decision algorithms in the presence of LTE femtocells.The macrocell-femtocell LTE network’s HO decision strategy tends to minimize transmit power at mobile terminals.

Name of authorProblemMethodResult
M. Malekzadeh, 2023To provide QoS, multiple types or streams of data are delivered with packet faults or loss.In terms of speed, latency (delay), and jitter, several service levels were employed.A basic Quality of Service (QoS) theory for the 5G LTE service is offered.
B.S.G.J. Selvakumar et al., 2023Multiple macrocell multiple femtocell.Energy consumption. Network control language (NCL). Content service gateway (CSG).It uses a mix of NCL and CSG to solve the problem of cell search and it has been achieved by addressing the issue.
Maiwada et al., 2020In a densely deployed femtocell deployment scenario, the alternative option is hop-on hop-off handover.Probability of handover occurrenceThe algorithm handles CSG and non-CSG member UEs’ inbound, outbound, and intra-cell handovers.
M. Pramod et al., 2023Wireless Sensor Network (WSN) is known to be a highly resource constrained class of network where energy consumption is one of the prime concerns.A cross layer design methodology was adopted to design an energy efficient routing protocol entitled “Position Responsive Routing Protocol” (PRRP).The outcomes show a significant improvement in the WSN in terms of energy efficiency and the overall performance of WSN.
M.K. Hasan et al., 2022The existing research have discussed various issues in 5G, and the security risks associated with IoT.Network Slicing and scrubbing center.When an attack is identified with sample thresholds, the traffic is diverted to a specific data center where the packet is inspected, the content with the. Attack is removed and the original data is allowed to pass through the network.
A. Keiser., 2020DDoS is a present and growing threat. In this post, I will make the case that 5G increases the DDoS threat.High-end Solution: Scrubbing Centers.The solution is integrated with Deep Packet Inspection (DPI), uses machine learning to centrally analyze ratios of inbound and outbound traffic, it detects unfamiliar patterns, which provides future-proof security.

Based on the research findings, the primary challenge revolves around optimizing every layer of the network through various methods. While significant progress has been made, there are still gaps to address, particularly in terms of Energy Efficiency and Security. Most research efforts have concentrated on aspects of the Physical, Session, and Data Link layers. However, there is a need for more attention to the Session, Transport, and Network layers. Through experiments, Energy Efficiency has been achieved for a specific duration. Some of the outcomes have raised concerns related to femtocell size and type, as well as issues like random handovers, which can lead to unnecessary handovers, thereby diminishing mobility efficiency. Additionally, these experiments have revealed challenges associated with inappropriate selection due to parameter changes during cell transitions, potentially creating opportunities for DDoS attacks through the transmission of superfluous packets. What sets this research apart is its focus on three key areas. Firstly, it explores the realm of 5G networks and how Energy Efficiency can be effectively managed within this context. Furthermore, it delves into the concept of Digital Twins in 5G wireless networks, which not only addresses DDoS attacks from the sender side but also seeks to enhance Energy Efficiency in the realm of 5G wireless technology.

6.Research methodology

Following the recommendations in references [13, 14], the Systematic Literature Review (SLR) was conducted. Three phases make up the research process. The processes of designing and validating review protocols, as well as defining research questions, are covered in the initial planning phase. Data extraction, information synthesis, and the finding/selection of pertinent research are addressed in the second step. Writing and verifying the review are covered in the third phase. The three phases of flow are shown in Fig. 2 and the methodology flow is shown in Fig. 3.

Figure 2.

SLR process.

SLR process.

6.1Phase 1 – plan review

The appropriate searching strategy is used to specify the important research questions and the creation of review protocols in this first stage of the research technique.

1) Research questions

The research questions which are posed in this SLR were presented, and potentially all of them are later addressed with appropriate solutions.

RQ #1: Which of the domains focuses primarily on 5G Systems research?

Finding the relevance of Digital Twin in 5G Systems by communication, network, industries, businesses, websites, and hospitals via models, frameworks, or apps is the driving force behind this research question. 5G Systems Energy Efficiency are exceedingly difficult to handle but crucial for networks, communication, businesses, industry, and organizations.

RQ #2: How can Digital Twin address the 5G System’s difficulties with Energy Efficiency?

This research question is related to Digital Twin. Its goal is to use the most up-to-date tools and methodologies to evaluate the models, frameworks, and applications that handle the Energy Efficiency of network using Digital Twins of 5G Systems. Additionally, a different approach was used to collect pertinent data, utilizing phrases like “DDoS,” “Handoff,” and “Intrusion Detection”.

RQ #3: What methods can be employed to address the issues of Energy Efficiency in 5G Systems?

Identifying the issues that hindered the inefficiency in 5G Systems and the methods applied to the problems of sending, controlling, and availability of resources is the aim of this research question. Sending, retrieving, and efficiency of network can all be done using bandwidth, transmission error method. It is also utilized for Energy Efficiency and resource availability. As a result, detailed Energy Efficiency methodologies, detection, and prevention measures are later evaluated.

RQ #4: How can QoS be used to increase the Energy Efficient of a network?

The phrase “Quality of Service” (QoS) refers to measurements of a service’s overall performance as seen by network users. Various service-related factors are taken into consideration while calculating QoS, including transmission errors, data rates, bandwidth, different patterns, availability, jitter, and more. The ability of a communication network to provide a service at an assured service level is referred to as QoS. The cornerstone of quality of experience is a satisfied client in terms of capacity, accessibility, and service integrity.

RQ #5: Which algorithms are more effective in terms of Energy Efficiency for DDoS attacks in 5G Systems?

The primary goal of this research question is to evaluate the effectiveness of algorithms for DDoS in Energy Efficiency with 5G Systems. The DDoS attacks are entirely based on methodologies, resource availability, and Intrusion Detection mechanism.

2) Review protocols

The creation and verification of the reviewed methodology put a focus on finding relevant articles using relevant keywords and research sources.

(a) Searching keywords

An effort has been made to focus our search on the most pertinent search phrase to ensure that the evaluation closely covers Digital Twin and Energy Efficiency for 5G Systems.

As a result, we begin with the keywords and then completed the following steps:

  • Taking the key terms from our study questions and separating them.

  • Using alternative term spellings.

  • Replacing the search queries with relevant papers’ keywords.

To find the most immediately pertinent articles in the literature, we used the primary alternatives and included the “OR operator” and “AND operator,” as shown in Table 1.

Table 1

Inclusion and exclusion criteria description

IdKeywords
1(“Digital Twin” AND “5G network”)
2(“Energy Efficiency” OR in AND “5G Systems” AND using OR “Digital Twin”)
3(“Energy Efficiency” AND in OR “5G Systems”)
4((“Energy Efficiency” AND in OR “5G Systems”) OR (“Digital Twin” AND “5G network”))
5((“Energy Efficiency” OR in AND “5G Systems”) AND (“Digital Twin” OR “5G network”))
6((“Energy Efficiency” OR in OR “5G Systems”) OR (“Digital Twin” OR “5G network”))
7((“Energy Efficiency” AND in AND “5G Systems”) OR (“Digital Twin” AND “5G network”))
8((“Energy Efficiency” OR in OR “5G Systems”) AND (“Digital Twin” OR “5G network”))
9((“Energy Efficiency” OR in OR “5G Systems” OR using OR “Digital Twin”))
10(“Energy Efficiency” AND in OR “5G Systems” OR using AND “Digital Twin”)
11(“Energy Efficiency” AND “5G systems”)
12(“Energy Efficiency” AND “Digital Twin”)
13(“5G Systems” AND “DDoS”)
14(“Energy Efficiency” AND “DDoS”)

Figure 3.

Methodology flow.

Methodology flow.

(b) Literature resources

Primary review studies: for the selection of pertinent publications, the databases that were used for this SLR include Google scholar, NCJ, Web of Science, Scopus, ACM Digital Library, Springer, Science Direct, and IEEE Explorer. These databases have the most comprehensive collection of high-caliber articles in our field, including ISI and Scopus indexed articles. The extensive search tools offered by all these databases were used to create the search term. Our search covered the years 2018 through 2022.

6.2Phase 2 – conduct review

We carried out the review at this step-in accordance with the research questions, protocols, and keywords. As per Table 2(a) and (b), this phase focuses mostly on the addition and elimination of publications.

Table 2

(a) Inclusion criteria description and (b) exclusion criteria description

(a) Inclusion criteria
The research has relevance to 5G Systems.
The Digital Twin is directly relevant to the research.
The research focuses on DDoS attacks and Energy Efficiency.
Techniques for measuring performance were used in the research.
The research employed the use of 5G System related like DT, EE, ID, and HO methodologies.
The most recent and comprehensive publication was chosen where there were multiple articles on the same subject.
This only pertains to one study, but there were two instances of related work in that study.
Latest publications in the topic of network and communication search.
(b) Exclusion criteria
Research’s that was unrelated to the domain of Energy Efficiency, Digital Twin in 5G Systems was excluded.
They appeared in our search because of the terms “5G System” and “Energy Efficiency” being incorrectly used to denote
conventional Gaming and musical activity. Selected research is shown in Table 1.
Publications written in a language other than English.
Academic works that are not fully texted.
Papers that served as the workshop’s opening presentation.

1) Study selection

Figure 4 provides an illustration of the entire research selection procedure. During the process of identifying relevant studies, 1555 articles were found when we searched online. A few 194 papers were short-listed by using screening with name, term, inclusion, and exclusion criteria. Table 2(a) and (b) define inclusion and exclusion criteria. There were 25 articles from many areas, including music, physics, gaming, social science, and other languages, and there were 35 items that had already been published in other databases. After thorough reading, 40 items are finally dropped from the list.

The selection criteria for the related publications according to keywords are described in Table 2(a) and (b). Articles that are duplicates or do not address all questions are discarded.

The standard evaluation questions for evaluating research are shown in Table 3. The major purposes of the questions are to pick studies that are more thorough, relevant, and that address all research questions.

Table 3

Quality checklist

No.Questions
1Did the research concentrate on the Energy Efficiency of 5G Systems’ Digital Twin?
2Was the research a description of the 5G Digital Twin network for improving Energy Efficiency?
3A concept for the 5G Digital Twin network, has it been proposed?
4Is the research concentrating on the fundamental DT, DDoS, QoS, ID and EE approaches for 5G Systems?
5Has the research examined the model performance utilizing fundamental methods?

2) Data extraction

We employed the data-extraction techniques listed in Table 4 to gather the information required to answer our research issues and make our contributions.

Table 4

Data extraction

Study
Research Project Approaches to the Problem
RQ1: 5G Systems
RQ2: Digital Twin’s network
RQ3: Energy Efficiency
RQ4: QoS
RQ5: Distributed Denial of Service

3) Information synthesis

The gathered information was consolidated at this point to respond to the study questions. The narrative synthesis approach was employed to answer our study questions. As a result, we presented our findings using tables and charts.

6.3Report review

The five research questions were answered using data that was taken from the primary studies. In the reporting of the results, the recommendations of the references [15, 16] were strictly adhered to.

7.Result

This section discusses Energy Efficiency and 5G Systems, including how they are now being used and some fresh ideas for potential new research directions in networks for Digital Twin consideration. The system of Intrusion Detection has made remarkable contributions to numerous DDoS problem-solving techniques during the past few years. Furthermore, a lot of thorough study into 5G Systems is emerging to further improve the Digital Twin’s network. The detailed organization of the summary of chosen studies is shown. This review covered a maximum of 94 papers. As indicated in Table 5, 30 research emphasized the RQ1, 11 research addressed Digital Twin network, 28 studies concentrated on Energy Efficiency, QoS has only 6 papers covered, and 19 studies demonstrated how DDoS attacks the network.

Table 5

RQ studies

RQStudies
5G systems30
Digital Twin’s network11
Energy Efficiency28
QoS6
Distributed Denial of Service19

Figure 4.

Process of identifying relevant studies.

Process of identifying relevant studies.

The number of studies selected per year is shown in Fig. 5. In 2018, there were 6 research, and in 2019, the number of linked research studies increased to 11, for example. 19 studies were discovered in 2020, and 31 and 34 in 2021 and 2022, respectively.

Figure 5.

Studies selected per year.

Studies selected per year.

Figure 6 shows a map of the world showing the locations of the nations that contributed to the above-mentioned study questions. Each research question’s research discussion is presented.

Figure 6.

Choropleth map displaying the global publishing distribution by nation.

Choropleth map displaying the global publishing distribution by nation.

7.1Which of the domains focuses primarily on 5G systems research?

This section reviews 30 studies that covered 5G Systems. A list of accomplishments to 5G Systems is provided here. The Unmanned Aerial Vehicles (UAVs), a new area of aerial robotics, have drawn a lot of attention from researchers in the field of wireless networking. Swarms of UAV will begin to populate the skies of our smart cities as soon as national laws permit them to fly autonomously [17]. These UAVs will be used for a variety of tasks, including delivery services, infrastructure monitoring, event recording, surveillance, and tracking. 5G/B5G cellular networks are advantageous for the UAV ecosystem because they may be used in a variety of ways to improve UAV communications. These smart gadgets provide a huge variety of communication systems and use cases due to the intrinsic properties of UAVs pertaining to flexible movement in 3-dimensional model, autonomous operation, and intelligent placement. With the UAV being incorporated as a fresh aerial User Equipment (UE) to establish cellular networks, the UAV intends to present an in-depth investigation of incorporation efficiencies between 5G/B5G communication network and UAV technology [18]. The UAVs in this integration take on the function of flying users while in cellular coverage, hence the phrase “cellular-connected UAVs.” The UAV’s major goal is to give a thorough analysis of integration difficulties along with significant 5G/B5G technological advancements and current work on design development and field tests supporting cellular-connected UAVs. The UAV covers current third generation partnership project (3GPP) standardization progress updates and underlines socioeconomic considerations that must be taken into consideration before this potential technology is successfully used [19].

To satisfy the demands for large frequencies, low latency, high performance, and high dependability, certain nations have begun developing 5G networks. Applications based on the Internet of Things (IoT) are also growing daily [20]. 5G would make it possible for more Internet of Things applications, including connected autos that can manage traffic. It will be crucial to take security issues into account once 5G and IoT are combined. The current research has covered a range of 5G concerns as well as the security risks posed by IoT. The repercussions of the most serious cyberattack, known as a Distributed Denial of Service (DDoS), call for a lot of attention, making finding solutions essential. As a result, an overview of the development of 5G technology allows IoT applications, and the size of DDoS attacks in such applications [21].

Numerous systems and gadgets are connected via 5G in almost real time, which has both advantages and disadvantages. To accelerate the safe delivery of 5G-enabled prospects to market, MITRE and its collaborators are validating the technology, policy, and standards. Many of us learn about 5G through advertisements. Therefore, it makes sense that people could assume that this 5th wireless technology will lead to quicker internet or the next step in gaming. However, the opportunities go well beyond consumer device improvements [22].

Globally, 5G network commercialization is accelerating. 5G communications are viewed from the viewpoint of industries drivers as being essential for improvements to consumer consumption experiences and digital industrial revolution. Globally significant economies need 5G to be a crucial component of long-term industrialization [23]. In terms of business, 5G will penetrate hundreds of industries, and technically, 5G must further combine DOICT and other technologies. Hence, the suggestions made are that ongoing study on the 5G advanced network’s needs further evolution [24].

The link between online consumer behavior and e-commerce Quality of Service to better understand consumer psychology activities and lower the risks associated with cost control for businesses needs to be examined. It also hopes to study e-commerce by segmenting online consumer groups [25]. The consumer consumption patterns and expenses using 5G technology needs tracking. First, it is determined that the core service performance, system performance, performance, guarantee and completion, as well as the performance of after-sales service, are the e-commerce Quality of Service assessment factors based on the body of existing literary works and interviews conducted with online consumers. The reliability of the collection variables was examined using SPSS software for statistical analysis based on the information gathered from the questionnaire in Y. Si research, thereby raising the caliber of the sample data. On these measurement items, they run a statistical analysis that is descriptive. Through the examination of experimental examples, it can be demonstrated that the deployment of 5G technology can very well fit consumers’ consumption habits and messaging demands and can assess the reliability of e-commerce operations more correctly and scientifically. Each characteristic calculates the relevance of each dimension [26].

5G is now in its early stages of commercialization. With its improved capabilities and cutting-edge features, the 5G System will completely transform the current wireless network. The Third-Generation Partnership Project (3GPP) is currently working on 5G New Radio (5G NR), also known as the global standardization of 5G, which may operate over a variety of bandwidths from less than 6 GHz to Millimeter wave (mmWave) (100 GHz). The three core 5G NR use cases – Ultra-Reliable and Low Latency Communication (uRLLC), Mega Machine Type Communication (mMTC), and Enhanced Mobile Broadband – are the main areas to look at for 3GPP Enhanced mobile broadband (eMBB). In comparison to LTE systems, several features such as scalable numerology, flexible spectrum, onward compatibility, and ultra-lean architecture are added to achieve the goals of 5G NR [27]. A quick rundown of 5G NR’s new features and important performance indicators. There is a good job of addressing the problems associated with inter-radio access technology (RAT) handover synchronization and the adaptation of higher modulation schemes. A proposed next-generation wireless communication approach takes these issues into account. The architecture serves as the foundation for the transition to networks that go beyond 5G and 6G. It also provides an overview of various 6G network technology and applications. Edge computing, quantum computing, wireless optical communications, hybrid access, and haptic services will all be included in the 6G network. A virtualized network slicing-based 6G architecture is suggested to provide these various services [28].

By advancing linked business realities, the fifth generation of smartphone bandwidth, cellular technology, and networks, or 5G, promises to significantly alter mobility. Effective Service-Level Agreements (SLA) and the foresight of Service Level Objective (SLO) breaches become essential in such a developing environment. It becomes difficult to ensure the necessary service quality while simultaneously assuring effective resource allocation [29]. Furthermore, a variety of Quality of Service (QoS) assurances for a broad range of services, applications, and consumers with a diverse set of needs are anticipated from 5G networks. The ability to translate user-friendly business terminology into resource-specific monitoring features that may be utilized to manage resources in the 5G core network, however, it is becoming more challenging. SLA management framework with QoS provider is introduced to close these gaps. An adaptive tracking algorithm will support the architecture to deliver amazingly precise information in real time without adding extra network traffic. The method eliminates the fixed time interval utilized in the monitoring system. To ensure that pertinent QoS measures are incorporated into the service-level agreement (SLAs), the proposed architecture additionally includes a recommendation system that assesses the importance of various QoS metrics using enriched metadata data from an Network functions virtualization (NFV) Catalogue [30].

With positive effects on energy use, available resources, resilience, and customer experience, the centralized cloud computing landscape is increasingly shifting to distributed and decentralized clouds [31]. Industrial Artificial Intelligence (AI), block chain technology, and 5G wireless technology are three examples of rising IT trends that have an impact on the creation and implementation of next-generation cloud computing, according to most studies. An integrated edge-fog-cloud architecture is suggested for effective application in manufacturing systems after the merging of these innovations in cyber-physical network and cloud-based paradigms in 5G as discussed [32].

Table 6

RQ1 domains, advantages and disadvantages

Study referencesDomainAdvantagesDisadvantages
[7]Health careGrowing demand for robotic surgery due to COVID-19 epidemic.High 5G network deployment costs.
[8]Oil and gasHelp improve field security and safety, find abandoned items, and other things.It compromises cybersecurity by raising the danger of hacking.
[9]InfrastructureData management and security for technology used in land transportation.Device battery drain.
[10]EducationPersonalized learning may be possible.Compromising the esthetics.
[11]Information retrievalIncreased security and WAN connections.Blockages may reduce connectivity.
[12]EngineeringFreedom in design.Many of the outdated devices wouldn’t support 5G.
[13]ArchitectureTechnology that makes quick-response subscriber monitoring tools possible.Technology is still in development, and studies are being done to determine its practicality.
[14]AirlineOperational communication that is trustworthy.The use of aircraft could be hampered by 5G networks.
[15]Text similarityAids in classifying objects that are similar. Text approaches’ performance should be improved.It is regarded as erratic and haphazard.
[16]Smart citySmart cities and driverless vehicles will be possible because to the increased number of linked devices.It is challenging to fully integrate 5G smart cities; implementation requires a bottom-up approach.
[17]General purposeIt can offer bigger capacity, faster speed, and lower latency.Shorter broadcast range.
[18]CommunicationMassive machine type communication, ultra-reliable low latency communication, and enhanced mobile broadband are all aspects of 5G.Building infrastructure is expensive.
[19]Digital twinDigital Twins with 5G capabilities can gather near real-time inputs from equipment, sensors, people, and network to provide this data more quickly and precisely than previously.Internet connectivity is essential to the development of technology.

Many nations and governments view smart cities as a solution to resource depletion, population increase, and global warming. The process of building a smart city is fraught with difficulties [33]. Digital Twins and 5G hold great promise for the conversion of the current urban governance paradigm toward smart cities, along with the Internet of Things. Fifth-generation wireless communication systems, block chain technology, collaborative computing, simulation, and Artificially Intelligent technologies all use both DT and 5G Systems [34]. The idea of a Digital Twin city (DTC) is put forth in most research, a DTC’s properties, core technology, and use cases are described. They also go over the framework, hypotheses, and future directions for DTC research [35].

By considering a mobile edge computer network with ultra-reliable, low-latency, and delay-tolerant services. By improving user identification, allocation of resources, and offloading probability pursuant to the Quality-of-Service requirements, there is a hope to reduce normalized energy consumption, which is described as the energy consumption per bit [36]. The mobility management entity (MME) controls user association, and each access point controls allocation of resources and offloading probability (AP). In some deep learning (DL) design, the DL algorithm is trained at a central server using Digital Twin and 5G of an actual network environment. The pre-trained deep neural networks (DNN) can supply the MME with a real-time user association strategy. Given that real networks are dynamic, the Digital Twin continuously tracks these changes and adjusts the DNN as necessary. There is a suggestion of an optimization approach to determine the best allocation of resources and offloading probability at each AP for a certain user association scheme. The simulation findings demonstrate that, in comparison to a current method approach strategy to the efficiency of the optimal global solution, the method achieves lower normalized energy usage with less computational complexity in 5G Systems [37].

7.2How can digital twin address the 5G system’s difficulties with energy efficiency?

Eleven (11) research papers covering the topics of Digital Twin (DT) networks in 5G Systems and improved Energy Efficiency were chosen for this part. Each study’s specifics are given in Table 7.

Table 7

RQ2 domains and contributions

Study referenceDomainContributions
[20]CommunicationEnabling quicker physical fault diagnosis and quicker production response.
[21]HealthcareAI-powered models propose more individualized and effective treatment regimens. It can have a significant effect on how chronic diseases are managed.
[22]Oil and gasUsed to keep an eye on resources, schedule maintenance, and streamline processes.
[23]BusinessTo provide their customers with personalized goods and services, designers create numerous product variations.
[24]IndustriesImprove the experience for customers by better comprehending the needs of the consumer, provide improvements to current goods and processes.
[25]EducationImproves understanding, boosts student motivation, and enhances the learning process.
[26]EngineeringReducing the number of times engineering teams must iterate a product lowers the overall costs of the product life cycle.
[27]InfrastructureEnabling more efficient project execution, asset operations, and asset design.
[28]NetworksEnables network operators to create solutions for network optimization and carry out troubleshooting.
[29]General purposeTo gather information, to forecast how well they will work, replicate processes.
[30]AgricultureFacilitates the separation of physical flows’ planning and management.
[31]AeronauticsA standard simulation could only test one process, a digital simulation network can conduct a massive number of simulations.
[32]RoboticsAssist in virtualizing hardware movement from raw materials to finished goods.
[33]AIKeep track of a physical system’s operating performance and actual circumstances.
[34]Smart cityImprovements to municipal system of public transportation, housing, streetlights, garbage collection, and power.
[32, 35]ManufacturingUnderstanding the past, observing current circumstances, and preventing problems in the future allows for educated decision-making.
[36]ArchitectureMonitoring performance and spotting problems, simulating design without really producing the real object.
[37]SecurityStrong tool for cyber risk prediction and mitigation.

For creating and improving 5G networks and beyond, the DT technology was launched, and various DT functions and designs were examined. The DT may undoubtedly assist the research community in moving away from traditional network designs (which involved actual deployment) and toward digital/virtual ones, including measures for testing and validation. However, since this DT technology is not currently commercially available for 5G, there is a unique possibility for both DT and 5G study communities to develop ideas that will enable revolutionary 5G use cases for the society of the future. The cost and efficiency of the production line for hollow glass are significantly influenced by the customized design [50]. Most articles suggested quick, personalized production line design based on Digital Twins. Some studies suggested an idea of “iteration between static design and dynamic execution” by analyzing configuration factors in the development of production lines.

As such, it is designed for operating process requirements to meet process limitations and the associated optimization problems. The production line’s performance can now be more accurately digitally simulated to the suggested Digital Twin concept [33]. Some proposed decoupling methods can offer design with an optimum guide, as shown by a good design application in a thin glass matching warehouse system. A variety of controlled flow type manufacturing systems, including a production line for custom furniture and a line for 3C products, can use the suggested Digital Twin based paradigm. In the future, focus on integrating big data analytics will be taken into the Digital Twin approach for both production line design and operation. One of the fundamental pillars of the innovation process is the technology of the Digital Twin [35, 51]. It enables the creation of digital representations of physical systems, which has the potential to accomplish many advantages like real-time monitoring and greater productivity and efficiency. To provide users of Digital Twins with a high level of service and enable the implementation of Digital Twins in far more domains, most papers highlighted the significance of the network that links the physical and Digital Twins around each other, as well as the prerequisites that should be available in the connecting network. The DTC will change city systems of governance and laws as a new paradigm for creating smart cities and infuse ongoing energy for urban development and transformation [52].

Digital Twin cities are being planned in many significant cities throughout the world. Building Digital Twin cities is now conceivable to the quick advancement of Digital Twin technology. Some studies suggested a pattern for Digital Twins by examining the current Digital Twin technologies and basing it on the growth of smart cities [53]. Through mapping and surveying technology, IoT perception, develop solutions, simulation, and deep learning (DL), a platform for urban management and maintenance is built that is identity, conscience, self-organizing, self-executing, and adaptive. Investigating how URLLC and delay-tolerant services could lower consumers’ average energy consumption in a Multi-access edge computing (MEC) system is done. To train the algorithm off-line, a presentation of a deep learning (DL) design for user association in which a Digital Twin of the network environment was set up at the central server [37, 54]. The MME that handles user association received the DNN after the training phase. Suggestion on a low-complexity optimization approach that improves allocation of resources and offloading probability at each AP with a specific user association scheme is done. Additionally, as compared to an existing technique and strategy for the global optimal solution, most modelling schemes can lower normalized energy consumption with the DL algorithm and with less computational complexity [55]. Technical literature actively examines concepts for developing Digital Twins to address a variety of issues that can occur for different types of businesses. Using Digital Twins, significant new results can now be obtained with advances in technology and the production of the requisite software. Some studies put out the idea of creating a system of Digital Twins to address a variety of real-world issues in intricate communication networks. These tasks are seen as examples of two applications [34]. For businesses involved in the life cycle of a communication system, the initial application is the management of information feedback: “elaboration of modernization concepts, creation of technology, design, construction, and operation.” A second application is keeping an eye on traffic, including any unusual behavior, to prevent mistakes from being made again in case of emergencies.

The Digital Twin connection will also be a useful tool for multidisciplinary study, which is another key element [36]. By creating a digital version of the physical entities, Digital Twin (DT) gives precise advice for inter scheduling algorithm in 5G edge computing-enabled distribution grids. In most studies, discussion on the important issues of low accuracy, long iteration delays, and security concerns in DT construction and DT-assisted resource scheduling was made. Description of a secure and delay Digital Twin assisted resource scheduling algorithm and a collaborative learning-based DT infrastructure Security Administrator’s Integrated Network Tool (SAINT) was done. By jointly optimizing its total iteration latency and loss function and utilizing abnormal model identification, SAINT provides low, accurate, and safe DT antimicrobial resistance (AMR). To enhance the effectiveness of deep Q-learning, SAINT uses DT to provide intelligent resource scheduling deep Q network (DQN) [56]. Because of the consideration of long-term limits, SAINT provides connect precedence and energy consumption awareness. SAINT performs better than cutting-edge algorithms in terms of cumulative iteration latency, DT loss function, energy usage, and access preference deficit. Addressing the 5G edge computing-enabled distribution grid’s resource scheduling issue with DT assistance [57]. To obtain a low-latency, accurate, and secure DT, SAINT was proposed. SAINT reduces the DT gradient descent by 58:06% and 70:39%, the DT error function increases by 46:92% and 58:53%, and the cumulative iteration latency by 12:23% and 31:89% compared to CS-unit control block (UCB) and RS-DNN [58]. Due to access priority and energy consumption awareness, SAINT also achieves the lowest access urgency deficit and cumulative energy consumption. The Digital Twin makes 5G testing easier and more efficient for university R&D initiatives and the kinds of private networks that are now cropping up on campuses, in factories, and in distribution and manufacturing facilities around the world [59]. Digital Twin makes a perfect testing-on-demand solution when combined with other cutting-edge Spirent products like Lab as a solution with intelligent automation. It is quickly emerging as the preferred option for realizing unified connectivity, optimized assistance, and secure communications within a particular location, such as a campus, factory, or geo-fenced area, to its significant advantages for modelling and supporting dedicated, next-generation operations [60].

7.3What methods can be employed to address the issues of energy efficiency in 5G systems?

Energy Efficiency has been employed in previous research to enhance network performance. Numerous methods and frameworks for Energy Efficiency were suggested in the literature evaluations on Digital Twin’s network and 5G Systems. To satisfy the needs of consumers and owners, DT analysts employ a variety of strategies in various sectors. Therefore, 28 studies that emphasize the fundamental methods and their contributions to enhancing the network’s Energy Efficiency in terms of speed, accuracy, and performance have been chosen for this part. Each study’s specifics were covered.

To increase operational effectiveness, productivity, and automatization, Cyber-Physical Systems (CPS), Big Data (BD), and the Internet of Things (IoT) are merged. Despite emphasizing these advantages, smart factories must also use energy sources that are sustainable and renewable [78]. According to estimates, industry operations consume around 35% of the world’s total electrical supply and contribute about 20% of all carbon emissions. Examination on the effect of energy upon that reach of Industry 4.0 in its environment. It was suggested to conduct a thorough literature review of current research on smart factories and energy use. To address the questions, a selection of papers was assessed. As a result, revisions have been made to more than 2,500 articles that were published in the last ten years [79, 80]. A trustworthy approach of article selection was used to identify the most important themes in energy conservation in smart factories.

In addition to offering a new taxonomy to structure projects that correlate the consumption of energy as well as the new demands of Industry 4.0, the contributions include highlighting unresolved problems and difficulties in the field [81]. The survey that is being presented attempts to assess the state-of-the-art interaction between smart factories and energy. To extract and arrange the articles to respond to the stated survey questionnaire, a systematic literature search methodology was used to see how effective Energy Efficiency was. A focus on ways to reduce energy use and challenges encountered while tackling energy in smart manufacturing [10, 82]. Along with the survey, tools, their connection, and generated data were all investigated. Finland has some of the highest mobile data consumption rates in the world. The use of mobile data has rapidly increased, and future expansion is anticipated [83]. The absolute yearly energy consumption associated with the operations of mobile providers appears to be rising even though the energy used per transferred gigabyte has significantly dropped. Consumer behavior is altering concurrently, even though modern consumer electronics use less energy, we use mobile devices more and more frequently [84].

Does rising usage negate any energy savings made? What options are there for addressing the rising energy demand? Recently, there has been an increase in interest in finding ways to reduce energy usage in wireless communications [85]. New network architectures like wireless links, dispersed antennas, cross cellular; advanced physical layer techniques like multiple-input multiple-output (MIMO) and frequency division multiplexing (OFDM), cognitive radio, network coding, collaborative communication; radio and network resource management schemes like various cross layer optimization algorithms, switching devices saving, multiple radio access technologies [86]. In most posts, provision of an overview of various technologies and the most recent information on each topic was made. The difficulties that must be overcome in the location are also described, because it will have significant economic and ecological impacts soon, cellular networks’ Energy Efficiency has recently attracted scholarly attention from academia and industry. A strategy for collaboration between Long Term Evolution (LTE) and the next wireless communications is put out in some papers [87]. The fifth generation (5G) wireless technology seeks to compromise between wireless network performance (maintaining the focus on high-speed packet rates throughout congested traffic durations) and Energy Efficiency (EE) by alternately switching 5G base stations (BSs) off/on based on the traffic immediate load condition while, at the same time, assuring broadband service for mobile subscribers by the current active LTE BSs [88]. The optimal LTE BS parameters (technical support, total high antenna, spectral range frequency, and transceiver ratio) that ensure maximum reception for the entire region as during switch-off session for 5G BSs were determined using the optimization of particle swarms (PSO) technique. With a maximal data throughput of close to 22.4 Gbps during peak traffic times and 80.64 megabits per second during such 5G BS switched-off period and assured full coverage and over entire area by the remaining operational LTE BSs, simulation findings show that the energy reduction can exceed 3.52 kW per day [89].

The suggested BSs switching-on/off algorithm has merit since the existing dense BSs placement, which is the driving force behind the narrow coverage area concept, has led to unexpected traffic patterns for each BS. The suggested solutions reduce energy use by keeping an eye on the network’s traffic load and making decisions about whether to turn on or off specific BSs. Most studies investigated the possibilities of balancing network efficiency and energy savings in LTE and 5G dual wireless access cellular networks by turning on and off the 5G-BSs in response to the current state of traffic load while maintaining service and coverage [90]. However, the number of BSs which will be switched off will determine how much energy is saved by this method. Energy Efficiency (EE) is the cell inside the User Equipment (UE), and it has since evolved into a crucial component of UE designs. Factors including UE power usage, UE battery capacity, and UE transceiver are now being studied. Recent years have seen an increase in the importance of Energy Efficiency as a determining factor [91]. A key design element that determines the potential for Energy Efficient transmission is the type of reference signals that must be transmitted irrespective of the network demand, including cell-specific reference signals (CRS) for 3GPP LTE systems. The coverage regions for green CoMP with collaborative dimensions of 2 and 3 are inadequate to link all the UEs originally connected by turned-off evoled node B (eNBs), there is a large energy consumption. Although it is projected that increased transmission power will lead to decreased Energy Efficiency (EE), its gap gets smaller as cell size increases [92]. For whatever transmission power investigated, the EE is essentially same at 1200 meters. On the other hand, when Bandwidth (BW) increases, EE increases significantly.

The impact on EE is comparable whenever Mobility Controllers (MCs) transition from a middle level to a higher order scheme. In fact, EE becomes increasingly susceptible to MCs changes as bandwidth grows. It is believed that enhancing Energy Efficiency is essential to reducing operating expenses and environmental effects [93]. By automatically updating internet bandwidth to the real traffic requirement at a given time, the network’s radio access can achieve most of its energy savings. Energy Efficient radio resource planning is one of the best ways to reduce the energy use of wireless devices. Developing heterogeneous networks (a combination of femtocells, small cells, macrocells, and femtocells) and various relay and cooperative connections need also be considered in addition to Energy Efficient cell-size design [94]. A great way to improve Energy Efficiency is by installing Energy Efficient infrastructure and switching off as numerous base stations as you can. It is essential to increase the Energy Efficiency of wireless cellular networks. To make wireless cellular networks more Energy Efficient, extensive research must be done [95]. It simply relates to the UE’s charger and has since developed into a crucial part of UE designs. Metrics including UE power usage, UE battery capacity, and UE development of renewable energy are part of current research efforts. For building Energy Efficient wireless networks, the Multiple Input Multiple Output (MIMO) and Analogous frequency division transmission method (OFDM) techniques, connectivity techniques, Energy Efficient network strategic planning, various relay, and cooperative communications, and cross-layer optimizations were all introduced [96].

The idea is to first develop concepts for Energy Efficiency before improving them to improve QoS metrics. Then, by perfectly alright the energy-saving technique considering the technical expertise, QoS may be quickly improved. To prove the value of QoS technology, energy conservation methods should be taken into consideration during QoS upgrading [97]. The amount of energy used depends on both the volume of data and the separation between sensor nodes. The spacing distance may have an impact on how much power the transmitter and receiving circuits use. If the amount of data transferred between numerous sensor nodes is the same, a smaller gap distance between them would result in less energy being used [98].

Table 8

RQ3 domain, technique and contribution

Study referencesDomainTechniqueContribution
[38, 39]EntertainmentEnergy savingThe entertainment sector is under pressure to switch to sustainable energy and reduce emissions.
[40]BusinessHigher network data rateEnergy Efficiency decreases operating costs for businesses, cuts emissions, and demonstrates to the community that a company cares about the environment.
[41]GeneralFeature extractionUtilizing tools and libraries to handle data containing lengthy text examples.
[42]HealthcarePrivacy preservationImproved physical health, such as fewer injuries and signs of cardiovascular and respiratory problems, rheumatism, arthritis, and allergies are potential advantages of Energy Efficiency techniques.
[43]EmailWord embeddingRetrieved unstructured email in an organized way.
[44]Social mediaRadio transmissionTo determine the tone of the communication in terms of its substance and degree of hurt or criticism.
[45]AICarrier, channel shutdownIt manages energy consumption, cuts it down during peak times, spots issues, alerts users to them, and foresees equipment failures.
[46]RoboticsChannel coding technologyEfficiency is more important than ever for robotics Power consumption of robots becomes an increasingly urgent issue as the industrial sector uses more of them.
[47]IoTMassive MIMOIoT innovations can help cut emissions, resulting in more effective energy generation.
[48]Machine learningVirtualizationEnergy Efficiency is frequently associated like doing fewer, but machine learning enables businesses to enhance their goods in real-world settings.
[49]IndustryBeamformingEnergy Efficiency for manufacturing machinery is crucial because it can result in life-cycle cost savings and emissions reductions.
[50]Mobile edgeNatural language processing (NLP)Edge computing lowers the quantity of data that must travel over networks, which also lowers network energy consumption.
[16]Smart cityNon-orthogonal multiple access (NOMA)Both residential and business structures are more Energy Efficient by using less energy in smart cities.
[51]EducationQualitative ecology and resource management (QERM)First step in realizing the potential for energy savings is to teach kids and young families how to use energy more effectively.
[44, 52]CommunicationRadio resource allocationAdditionally, demand response and dispersed energy can be made possible by Energy Efficient communications, which can help the globe lessen its reliance on fossil fuels.

7.4How can qos be used to increase the energy efficient of a network?

Six (6) studies that show the effectiveness of Quality of Service (QoS) and Energy Efficiency employed in 5G Systems were chosen for this part. Each study’s specifics were given.

It is crucial to create a configurable data forwarding that is conscious of QoS and is adjustable to enforce the QoS obligations to fully satisfy the various Quality of Service (QoS) needs imposed by various network slices for various vertical applications. For the edge and core subnetworks of a 5G network, a concentration on creating prototyping, and evaluating a unique privacy data-plane network slicing architecture. By device congestion control, priority configuration, and scheduling, the framework may manage differentiated services. A prototype that suggested framework using the most successful and able field-programmable circuit array platform, and empirically assess the system’s performance. Results from experiments show that the suggested framework can perform proxy broadband segmentation at the data layer. To partially meet the enormous demand for high throughput in 5G networks, the network infrastructure is vertically dense with so-called limited base stations. The efficiency of 5G networks inherently suffers from: 1) significant inter-cell interference brought on by network density and 2) significant energy waste because of the high redundancy of weakly occupied, often, and small-cell base units [111]. The use of continuous learning method to intelligently direct the search toward useful answers to get around the repetitive quality of exploring in the enormous strategy space. More specifically, to balance high bandwidth usage and Energy Efficiency, some approaches use orthogonal frequency division multiple access (OFDMA) sequencing and dynamically learn effective user-equipment association strategies. Inter-cell disturbance and the variety of user QoS requirements are both considered by their model. Information and computing technology (ICT) research have recently concentrated on Next-Generation Networks, Software-Defined Networking, 5G, and 6G. One of the research topics in 5G is the optimal operational state for device-to-device (D2D) communication, which aims to enhance service quality using the frequency spectrum structure. D2D connection working modes are chosen to satisfy the predetermined system requirements and offer the network’s highest throughput.

Due to the intricacy of the direct answers, a structured issue as an optimal solution and, using extensive simulations, identified the best operating modes for various system characteristics [112]. The use of computed network throughput after identifying the ideal operating modes for the links, and as a result, was able to achieve the highest throughput. To satisfy system requirements, D2D communication couples are more likely to employ full-duplex (FD) mode at small distances, and as a result, most communications occur in FD style at these distances. These findings show that FD communication over short distances provides higher QoS and conditions than QoS-D2D technique. The way we live will change drastically because of 5G technology. The 5G network can adapt to emerging simulation results followed by a significant growth in traffic and the number of connected devices to a flexible combination of improving current infrastructure solutions and innovative wireless ideas and meeting the needs for efficiency and scalability [113]. The dynamic resource exchange and context sharing requirements of the upcoming 5G network age call for ubiquitous, high-speed connectivity. Operators must be able to comprehend and control the services’ performance and quality to meet professional Quality of Service (QoS) and Quality of Experience (QoE) requirements. The subjective acceptability of a telecommunication service’s perceived quality by the user is known as quality of experience. In contrast, Quality of Service refers to technical measures that are objective at the network level. Most papers discuss the selection of service relevant QoE measures and modelling of how these are impacted by various 5G QoS indicators [114]. The effect of QoS requirements on QoE as well as a potential technique for QoS/QoE mapping are provided. One of the key issues with cellular networks is mobile communication. A mobile community sets up the right public model to provide a data service packet at a high rate.

To increase service quality, the bits of mobile data model are required (QoS). The enhancement of QoS and communication systems to 5G cellular operators are provided by some search efforts. A helpful resource allocation mechanism is used at the “Radio Access Network (RAN)” layer to enhance built-in services and the Quality of Service (QoS) in Energy Efficiency of 5G. A local hub or departure station can indicate to or interact with its neighbors to require special modifying of beneficial traffic with QoS labelling, a type of organizational communication. To give website users options for customization, QoS highlighting is useful. By applying the simulation model in 5G’s ultra-low latency, real-time connection, greatly enhanced capacity, and rapid speed, ISP function effectively and demonstrate the full potential of the ubiquitous network [115]. Device connections will become quicker, more effective, and less vulnerable to delays with 5G categories that can use lower, medium, and high broad bandwidth bands. Faster connectivity than 4G is available at close range with mid-bandwidth, which also offers better mobile broadband connections or higher machine-to-machine communication.

For distributing multimedia information like still photographs and movies, wireless multimedia sensor networks (WMSNs) are becoming a popular technology. Multimedia delivery over resource constrained WMSNs faces significant hurdles despite being highly scrutinized by research communities, particularly in terms of efficient energy and Quality of Service (QoS) assurances. Most papers surveys recent advances in methods for creating Energy Efficient and QoS-capable WMSNs. First, examine the distinctive qualities and pertinently enforced requirements of WMSNs. Also provides a summary of each requirement’s current answers. Then, with an emphasis on their techniques for prioritization and service differentiation as well as disjoint multipath routing protocols, recent research cover initiatives on Energy Efficient and computation communication channels, including media access control (MAC) protocols [116].

Table 9

RQ4 comparison of QoS-based techniques

S/NTechniqueCountPercentage
1D2D-based1311%
2E2E-based1512.7%
3Slicing-based2319.5%
4RSVP-based108.5%
5PSO-based97.6%
6Spectrum-based54%
7Intelligence-based32.5%
8QoE-based2521.2%
9CF-based86.8%
10DAFC-based75.9%

7.5Which algorithms are more effective in terms of energy efficiency for DDoS attacks in 5G systems?

Nineteen (19) research’s that demonstrate the threats posed by DDoS attacks on 5G Systems to lower the network’s Energy Efficiency are included in this section. Each study’s specifics are presented.

DDoS assaults’ effects on 5G-enabled IoT applications has offered a summary of remedies for shielding the Internet of Things from DDoS attacks. Among the recommendations, which are based on machine learning (ML), strategy might offer a productive setting, where DDoS attacks will be severely limited. Moreover, the research could be expanded to include ML approaches in creating a 5G network optimized IoT application [117]. Attacks such as Distributed Denial of Service (DDoS) can cause communication networks to become unstable by sending a large volume of malicious requests and traffic over the network. Computer networks develop an intricate web of nodes that results in a robust structure. Consequently, in this situation, it becomes difficult to give the user an effective and secure environment [118]. Many strategies have been used before to identify and stop DDoS attacks.

However, they fall short in terms of offering effective and trustworthy attack detection. Because of this, there is still a lot that can be done to strengthen the protection against DDoS attacks. The Gated Recurrent Unit (GRU), a form of Recurrent Neural Network (RNN), is used to protect against new DDoS attacks that are used in the real world. DDoS attacks are detected and identified using a variety of classification methods, including Gated Recurrent Units (GRU), Recurrent Neural Networks (RNN), Naïve Bayes (NB), and Sequential Minimal Optimization (SMO) [119]. The effectiveness of the artificial and deep learning classifiers is assessed using performance review metrics like accuracy, precision, recall and f1-score. According to experimental findings, reflection attacks and exploitation assaults using GRU both produce DDoS classification accuracy readings of 99.69% and 99.94%, respectively. Since Satoshi Nakamoto’s white paper regarding Bitcoin was released in 2008, blockchain has (slowly) grown in popularity as one of the most mentioned strategies for protecting data storage and transmission through decentralized, trustless, and peer-to-peer systems [120]. Most studies identify academic research that aims to use blockchain for cyber security reasons and provides a comprehensive overview of the most widely used blockchain security applications. The number of Internet of Things (IoT) devices and sensors has rapidly expanded with the development of IoT technologies [21, 121]. Large-scale sensor-based systems are predicted to dominate in our societies, necessitating the development of novel design and operation approaches. The cloud is moving to the edge of the network, where resources like routers, switches, and gateway are being virtualized, to serve the computing requirement of real-time delay-sensitive programs of widely dispersed IoT devices/sensors. The open structural layout of architecture and the widespread use of the concept itself give rise to typical security concerns for the currently used networking technologies [122].

Additionally, cooperation creates difficulties because new security issues may impair the systems’ normal functionality and functioning. Moreover, the IoT’s commercialization has given rise to various public security worries, such as the risk of cyberattacks, privacy problems, and organized crime. More precisely, a thorough analysis of security risks and difficulties across the various IoT system design layers were presented [123]. The literature suggested methods and counter measures to deal with these security vulnerabilities was also clarified. Due to its dispersed nodes, server, and software for efficient communication, the Internet of Things (IoT) is essential in many industries, including transportation and the medical industry. Existing Intrusion Detection approaches are unable to reliably thwart attacks even though this IoT paradigm has been subject to infiltration assaults and threats that have raised security and privacy concerns. As a result, the sparse convoluted network has been used to study the IoT intrusion danger to counter threats and attacks. A set of intrusion data, traits, and suspicious activity sets are used to train the web, assisting in the identification, and tracking of attacks, primarily Distributed Denial of Service (DDoS) threats [124].

The network is also optimized using an application that recognizes and detects common errors and attacks attempts under various circumstances. Neurons are used to evaluate complex hypotheses in the sparse network, and the event channel outputs are then propagated to additional hidden layer processes. This method reduces the interference with IoT data transfer. The network correctly distinguishes the normal and threat patterns by using training patterns effectively. When it comes to ensuring network security, Intrusion Detection systems were better than other forms of conventional network defense [125]. Some researchers used an improved genetic algorithm back propagation (IGA-BP) network, an auto encoder network model, and an improved evolutionary algorithm to detect attacks and tackle the increasing issue of internet safety in the big data era. One of the most important recent advancements in computer science is the Internet of Things. Modern computing infrastructures frequently include many low power devices with a wide range of hardware and software capabilities. Such systems cannot be sufficiently protected by existing security models, techniques, and solutions [126]. The use of lightweight agents installed at various Internet of Things (IoT) installations, such as smart homes, is suggested in most studies to jointly identify Distributed Denial of Service (DDoS) attacks carried out by IoT device botnets. A dramatic decrease in Distributed Denial of Service (DDoS) attacks because of the harm it does to organizations’ assets, computer security is a topic that is often discussed. However, it has difficulties due to the rapid increase in computer access speed and internet user traffic. There is need for a thorough study on the DDoS impact’s measurement data and a systematic assessment of the literature with regards to 5G.

Definition, forms of DDoS attacks, and different DDoS attacks currently in use for 5G Systems that need detection and various methods for predicting DDoS attacks [127]. An overview and analysis of the different DDoS attacks detection and prevention techniques has been seen. They have developed a conclusion that there is a significant threat from DDoS attacks to Internet-based shared and distributed systems are crucial, therefore shield of such attacks from occurring against our system is required. Despite the numerous methods for identifying and reducing the DDoS assault there is a flaw in the entire system since the system utilizes high bandwidth to identify genuine users’ data as a perpetrator [128]. Jamming methods range from straight forward attacks that just transmit interference signals continuously to more complex ones that target specific protocol weaknesses. Other preventative strategies call for elements that might not hold true in practical situations. For instance, evasion approaches need for the nodes’ mobility, which may not be viable, while other alternatives call for changes to the current protocols. Solutions that need significant changes (and cannot be implemented, for example, with a software fix) are unrealistic given the already extensive deployment of wireless systems. Attacks via Distributed Denial of Service (DDoS) damage the Internet’s digital accessibility.

The user’s expectation of receiving prompt and efficient services could be severely harmed by DDoS attackers [129]. There are numerous stories of DDoS attack incidents that have had catastrophic repercussions on internet users and web services. Hence, most users are inexperienced, DDoS assaults frequently target their devices, or they unintentionally join the advanced threat army. The 5G growth of mobile will soon take place, but there are rumors that 5G cellular are also vulnerable to DDoS attacks. As a result, it is important to recognize DDoS attacks as a threat. Inter-slice isolation is known to give powerful resource isolation; however, it might lower resource efficiency [130]. Utilization of better control is provided by intra-slice isolation in terms of security, resource availability, and cost trade-offs utilization. Currently, conducting extensive 5G testing is exceedingly difficult, although being gained through a modest testbed, some findings are thought to be highly valuable in this new field of study because they were obtained through actual tests. To determine if the testing experiments can be scaled up, the outcomes for larger testbeds will be the same. They tested and trained their suggested model using the Knowledge discovery (KDD99) dataset. To find the DDoS attack, they applied SVM and logistic regression algorithms. The software define network (SDN) environment has deployed the classification module to differentiate between legitimate and malicious traffic data, the decision tree and support vector machine (SVM) algorithms are used. Most research demonstrated that, in simulated environment, SVM performs better than decision tree approach and Intrusion Detection was the best [131].

Table 10

RQ5 model performance technique

ReferencesDomainTechniquesContribution
[53]GeneralSpoofingAttackers can avoid detection and place a significant load on the target node for filtering attack packets by using IP spoof.
[54]MedicalCastingThis shows that attackers are searching for weak places and susceptible victims without proper defense by casting a larger net.
[55]CommunicationIntrusion detectionCreated to identify unusual traffic patterns linked to the execution of an attack.
[56]EducationScrubbersScrubbing services can aid in the defense against Distributed Denial of Service (DDoS) assaults. Scrubbing centers prevent 98% of DDoS attacks.
[57]BusinessReflectionAllows the preventer to increase the volume of unwanted traffic they may generate while also masking the origins of the network attacks.
[58]HealthcareAmplificationAttacker takes use of weaknesses in domain name system to convert minor inquiries into considerably bigger payloads that are then utilized to knock down the victim’s servers.
[59]IndustrialBlackhole filteringTo mitigate DDoS assaults on IoT devices distributed without the assistance of third trusted parties.
[60]NetworkMitigationDDoS assaults produce malicious surges in data traffic and application usage, which must be blocked and absorbed while genuine traffic flows unhindered.
[61]Online serviceIntrusion detection and filteringRequired to track traffic irregularities associated with an attack’s execution.

8.Common techniques

Various Digital Twin and DDoS tactics to improve the Energy Efficiency in 5G Systems are covered in this study. Table 11 shows the main approaches employed in investigations. In certain studies, the Intrusion Detection technique is employed as a whole, whereas in others, it is used separately. Different strategies that were employed to serve multiple domains are highlighted for 5G Systems. Mitigation, filtering, blackhole, amplification, reflection, scrubbers, casting, spoofing, and Intrusion Detection are the main strategies. It also aids in the detection, prevention, and improvement of Energy Efficiency in 5G networks.

Table 11 highlights various DDoS methods for prevention and detection, in addition to Intrusion Detection. Furthermore, Digital Twin techniques are used for enhanced performance and efficiency in 5G Systems for Energy Efficiency. With the use of Intrusion Detection algorithms, Digital Twin networks outperformed handover decision algorithm (HAD). Prevention, detection, and twin networks were employed to create an Energy Efficient network, and the research revealed that the quality of Digital Twins utilizing these strategies is superior. Time to trigger (TTT), mobility state detection (MSD) and radio link failure (RLF) technologies are utilized in 5G Systems to retrieve network and efficiently place it. DDoS, DT, 5G, and EE fundamental approaches are listed in Table 11. Core methodologies derived from studies related to research topics are also included.

Table 11

Common techniques

CategoryTechniquesStudies references
Network/Transport levelProtocol exploitation[62, 63]
DDoS based flooding attacksReflection based[63]
Amplification based[64]
Spoofing technique[65]
Application-level DDoSReflection[63]
flooding attackAmplification[64]
Hidden markov model[66]
Change point monitoring[67]
Source endCentre track[68]
Radial basis function[69]
Flow iteration[70]
Traffic flowDifferentiating between legal flow, DDoS assault, and flash event using concept entropy and divergence[71]
NetworkFor web-log analysis, propose a self-organizing map (SOM) and a modified ART2[72]
RoutersDistinguish faked IP packets from legitimate IP packets by mapping IP addresses to hop counts[73]

9.Method format

Method formats are shown in Table 12. DDoS in 5G can be found in a variety of method formats. Area detection is classified based on these formats. DT, ID, ML, IT, S, HMM, GA, FL, RL, TP, CPM, FM, and MIB are the area detection and method formats employed in the investigations.

Table 12

Method formats

MethodArea detectionStudy references
ITTraffic flow[71]
DTPhysical[74]
SNetwork[75]
MLNetwork[76]
HMMNetwork[77]
GANetwork[78]
FLNetwork[79]
RLRouters[80]
TPSource end[81]
CPMNetwork[82]
FMRouters[83]
MIBNetwork[84]
IDRouters[85, 86]

Meaning – IT: information theory, DT: Digital Twin, S: statistical, ML: machine learning, HMM: hidden Markov model, GA: genetic algorithm, FL: fuzzy logic, RL: rate limit, TP: traffic profiling, CPM: change point monitoring, FM: filtering method, MIB: management information base, ID: Intrusion Detection.

10.Definitions of digital twin in different literatures

The definition of DT in many academic works is significant for all areas of the field in raising a network’s energy effectiveness. Through the integration of the data model and the physical model of the product, Digital Twins assist in the iterative optimization of both models. The models’ iterative optimization shortens the entire design process and minimizes the likelihood that extra costs will be incurred during rework. As illustrated in Table 13, a building project is developed through a series of phases.

Table 13

Definitions of DT in various literatures

ReferenceYearDefinitionApplication
[87]2017A digital replica of a genuine plant, machine, worker, which is built, extended autonomously, automatically updated, and instantly accessible everywhere.System engineering
[88]2017A group of modeling and simulation constructions that completely define a manufactured product, whether it can be potential or actual, down to the atomic level and up to the large-scale geometrical level.Control of smart workshop
[89]2018A virtual, one-to-one reproduction of a “technical asset” (such as a machine, component, or environment piece).eRobotics
[90]2018A Digital Twin is a building information model (BIM).Maintenance of railway station building
[91]2018Digital model with several domains and extremely high levels of fidelity that integrates structural, electronic, hydraulic, and control topics.Smart manufacturing
[92]2018Fundamentally distinct live model of the physical system supported by supporting technologies like Multiphysics simulation, machine learning, Augmented reality/virtual reality (AR/VR), cloud services.Machinery fault diagnosis
[93]2019Individual physical artefacts are combined with digital models that dynamically reflect the status of those artefacts under the engineering paradigm known as “Digital Twins.”Healthcare management system
[94]2019A Digital Twin is a building information model (BIM).Life cycle management
[95]2019An accurate and live digital replica of a physical manufacturing system that accurately depicts all its features.Architecture of cyber system
[96]2020Digital Twins, which represent both the components and the behaviors of how systems and equipment work within their environments and survive throughout their lifecycles, are linked, digital replicas of physical assets that are connected to one another.Work environment safety
[97]2021A virtual object or group of virtual objects that are defined in a digital virtual environment and that are mapped to actual objects in a physical environment.System design
[98]2021A digital replica of a physical object that gathers real-time data from the object and derives data that is not explicitly measured in the hardware.Structural performance
[99]2022A digital object that continuously updates and reflects the behavior rules of a physical thing.Predictive manufacturing
[100]2022A single system model that can federate models from various vendor tools and configuration-controlled repositories to synchronize design, engineering, electronic, software, validation, and other discipline-specific models throughout the system lifetime.IoT lifecycle

The proposed multi, cross, stochastic modeling of a vehicle or system known as a “Digital Twin” employs the best physical models currently available, sensor updates, fleet history to mimic the behavior of its flying twin. The ability of an airplane to fulfil mission criteria is modelled from birth to death using a Digital Twin, which also includes comment section of the electronics, flying controls, launch vehicle, and other subsystems. A structural model known as a “Digital Twin” will have quantitative information on highly sensitive material level properties [53]. A Digital Twin is a representation of a genuine machine that is tied together, runs on a cloud platform, and simulates its state of health using information both from content analysis methods and other physical knowledge that is readily available. A life planning and certification paradigm that gives higher designing of personal aerospace vehicles over the course of their service lives by using models and simulations that include the state of the vehicle as it was when it was built, the loads and environments it has experienced, and other vehicle-specific history [77]. Digital Twins are extremely accurate representations of the process as it is currently standing as well as of how people behave while interacting with their surroundings in the actual world.

11.Definitions of energy efficiency in various domains

Energy Efficiency is the elimination of energy waste by utilizing less energy to complete the same work. Numerous advantages come from Energy Efficiency, including less energy usage in network, decreased demand for imported energy, and decreased demand for energy by base stations and the entire network. While photovoltaic systems also aid in achieving these goals, improving Energy Efficiency provides the most affordable and practical option to cut back on the usage of internet. Buildings, transportation, and energy industries are just a few of the economic sectors where there are significant chances to increase efficiency.

Table 14

Energy efficiency definitions in various domains

ReferencesYearDefinitionApplicationContribution
[101]2022The idea of Energy Efficiency Systems (EES) is to hasten the development of Energy Efficiency in businesses.BusinessImproved Energy Efficiency for businesses and more tools to control their energy use.
[102]2022Due to problems with energy consumption, particularly in low-power devices, Energy Efficiency (EE) seems to be an ongoing research topic on a global scale.CommunicationEither extending their lifespan or boosting data throughput.
[103]2022Optimizing network load is necessary to achieve a decrease in overall energy usage.IndustryEfficiency improvements can reduce industrial congestion.
[104]2022Increasing the quantity of energy used to deliver goods and services is known as Energy Efficiency.ManufacturingProtecting the environment and giving local manufacturers and installation companies chances.
[105]2022The proportion between both the overall number of packets delivered at the end node and Energy Efficiency may be used to explain.Smart cityEconomic benefits of Energy Efficiency improvements include reduced utility costs and job growth.
[106]2022The amount of data that can be communicated divide by a unit of energy consumption, which is typically measured in bits per joule.InternetLowering energy bills and usage.
[107]2022The quantity of data which can be transmitted from end – to – end per unit of energy used by the network is what we refer to as Energy Efficiency.NetworksTo create sustainable prosperity, load shedding and networked energy resources must be made possible.
[108]2022Energy conservation strategies can be developed using the enormous quantity of IoT data that has been gathered and examined.IoTEnhance the utilization of internet energy sources and lessen the impact on the environment.

Given the rising cost of energy and the growing demand for processing massive data sets (big data), Energy Efficiency in cloud services data center (DCs) is currently a subject of increasing relevance. Understanding the prospects for increasing Energy Efficiency in DCs requires a structured measuring framework that can be utilized to quantify Energy Efficiency. To put it another way, a thorough review of energy measures is required. However, in recent years, measuring the Energy Efficiency of DCs has only made a little advancement [182]. As a result, it is difficult to quantify the Energy Efficiency of DCs using a set of metrics that are widely accepted. Due to problems with energy consumption, particularly in low-power devices, Energy Efficiency (EE) is really an ongoing research subject on a global scale.

The effective utilization of scarce energy resources depending on a variety of application tasks is crucial for networks containing trillions of devices and low-power devices to support these cutting-edge technologies. Energy loss or waste also contributes to energy consumption. Energy provided by the system that is not immediately utilized by computer operations, such as power transmission and translation, cooling, and lighting, is referred to as energy loss [84]. The energy for use by server without performing beneficial work is referred to as energy waste, as opposed to the energy used by other devices without producing any useful output.

(1)
η=ErEu

Energy Efficiency [η], energy required [Er], energy used [Eu]

(2)
η𝑑𝑎𝑡=𝐷𝑐𝑜𝑚-𝐷𝑔𝑜𝑖𝐷𝑐𝑜𝑚-𝐷𝑎𝑓𝑡

Energy Efficient Data [η], Data coming in [Dcom], Data going out [Dgoi], and Data affected [Daft]

(3)
𝑇𝐸𝐶=DAEC

Total energy consumed [TEC], Data aggregation [DA] and Energy consumed [EC]

(4)
Xn=xin_old+v𝑛𝑒𝑤

New energy [xn], old incoming energy [xin_old] and new data [v𝑛𝑒𝑤].

12.Discussion

The papers chosen for this SLR are primarily from the mobile communication and 5G Systems domains, and they include DDoS attack and Energy Efficacy issues. The DDoS assault created by a third party is the primary cause of the problem with Energy Efficiency. The consistent depiction of 5G data creates a demand for Energy Efficiency due to the pace of the transmission. In-depth discussion of network data pertaining to fundamental approaches and their performance assessment was also necessary. The study’s main findings center on the following topics: the nature of 5G Systems; a network’s attention to the Energy Efficiency problem; the domains’ use of the Digital Twin approach; and knowledge basic strategies, Intrusion Detection techniques, equipment, and models, as well as the evaluation of their performance in handling DDoS assault. Moreover, additional aspects of Energy Efficiency and DDoS attack problems were reviewed to provide the research community with the most recent information on the 5G Systems. Section VI discusses all research questions pertaining to 5G, Digital Twins, QoS, DDoS, and Energy Efficiency. Additionally, Table 11 displays the standard procedures that have lately been used by academics and data analysts for various objectives. Table 12 is the depiction of the diverse nature of 5G networks created in a variety of formats demonstrates how frequently Energy Efficiency is required in every component of the network. Table 10’s discussion of the performance measurement technique demonstrates how technologies like Intrusion Detection, spoofing, Digital Twins, reflection, and scrubbing will assist researchers and managers in assessing the effectiveness of the fundamental techniques, tools, algorithms, and models for Energy Efficiency.

According to what we discovered via our research using information retrieval sources, currently there is no specific Energy Efficiency employing Digital Twin and Intrusion Detection SLR given and provides the primary emphasis on 5G Systems. To improve the performance of traffic from UE in [183], they suggested a network handover choice technique. With the development of tools and technology, DDoS attacks have been reduced utilizing a variety of techniques for 5G Systems, including ID, reflection (R), scrubbing (S), and detection (D) models [120]. The keyword “Energy Efficiency” was suggested to be replaced with others, like “QoS” and “DDoS attack.” A survey article on affective computing and associated topics like business, production, and communication has been released. It is utilized to evaluate the effectiveness, efficient data that aids in accurate 5G during DDoS attacks and inefficient networks caused by network feedback [81]. The physical network is replicated using a Digital Twin along with Handoff (HAD) and DT methods, the tactics used included scribing, spoofing, and Intrusion Detection. DT, QoS, and DDoS techniques were applied in the sentiment analysis, which was done using supervised and unsupervised methods. Methods for Intrusion Detection, evaluation, and performance measurement went unreported in the meantime.

Different studies pertaining to the suggested SLR were later explored. A Digital Twin network survey that characterizes both Energy Efficiency for 5G Systems with problems like DDoS attacks are mentioned in the references section below. However, no parameter pertaining to the Digital Twin that could increase the network’s Energy Efficiency was mentioned. Case studies on various Digital Twin techniques for medical and network communication generally focus on the proportion of 5G Systems [61]. Moreover, in [34], the Digital Twin method was used to predict sentiment. To maintain an Energy Efficient network and lower the likelihood of a DDoS assault, the Intrusion Detection approach was utilized for sentiment analysis.

However, a DDoS attempt was discovered utilizing a 5G System’s Intrusion Detection technology [121]. As in [52], feelings, and a suggested network framework for travelling were developed employing DT techniques on a 5G network.

The present related work generally concentrates on assessing single attacks on the network as opposed to many attacks. Both integration and performance measurement are compatible with the proposed SLR when applied to core approaches only. Numerous papers are presented, with a focus on studies that address research-related questions, based on literature evaluation and findings were stated above. These findings’ knowledge will benefit cutting-edge networks and fields like 5G/6G networks and DDoS attack mitigation. Extended reality applications, IoT, and Industry 4.0. These technologies generate dissimilar networks in large quantities, so the network must be effective prior to achieving and transmission. The efficiency and throughput of the 5G Systems will benefit from the deep learning, machine learning, and Internet of Things techniques. The choice of appropriate tools and procedures will be made easier for network analysts and managers with the aid of performance evaluation techniques including Intrusion Detection, scrubbing, reflection, amplification, and DT

Additionally, it is recommended that scholars who are focused on the domain of Energy Efficiency in 5G Systems use more of these techniques by fine-tuning their parameter settings to arrive at the best outcome. This idea will increase the application of the Digital Twin and Intrusion Detection techniques for achieving Energy Efficiency.

13.Conclusion

Throughout this SLR paper, we include an up-to-date overview of the current state of 5G System usage with a Digital Twin and suggest for prospective research areas related to energy saving. It has been noted that once the network is effective and developments are highly successful in resolving different network issues, the attack on the network by DDoS can be reduced as in Table 11. Additionally, for the purpose of achieving Energy Efficiency, we have succinctly categorized all the stages into four (4) different categories: 5G network, QoS, Digital Twin, and DDoS attack as in Fig. 5. We concentrated more on improving the Energy Efficiency of 5G Systems considering these classifications. Although it is clear from the review and discussion in this paper that Digital Twin is relatively new to 5G Systems with the technique of Intrusion Detection as in Table 7. Improving the network’s Energy Efficiency can help to some extent lower the frequency of DDoS attacks against the 5G Systems and improve network performance. Even so, many issues have been raised about some DDoS attack mitigations as in Table 12. Additionally, this study can serve as a reference on how to incorporate Digital Twin techniques with improved specialization and variation to address the issue of Energy Efficiency in section VI. As a result, the analysis in this study can serve as a thorough informational source and a foundation for future work.

Reviewing the Energy Efficiency concerns, 5G System approach, fundamental DDoS attack mitigation approaches, and their performance assessment was another goal of this study. To handle 5G Systems, DDoS attack mitigation, and Energy Efficiency improvements, core techniques including DT, ID, S, and A have been implemented in real applications and discussed in depth as in Table 11. It was expected that the problem of Energy Efficiency can be resolved by deploying DDoS assault Intrusion Detection methods or Digital Twin networks as in Table 11 where ID with DT was considered as the best technique to handle DDoS attack. In conclusion, energy efficiency is crucial for 5G systems because of the operational, financial, and environmental advantages it offers. It is essential for lowering greenhouse gas emissions, cutting down on network operators’ operating expenses, prolonging device battery life, boosting network dependability, and enabling scalability for future expansion. We can achieve sustainable and environmentally friendly network deployments, lower operational costs, improve network performance and reliability, and support the expansion of new applications and services made possible by 5G technology by addressing these issues and promoting Energy Efficiency in 5G systems.

In summary, integrating an intrusion detection approach within 5G systems offers substantial benefits in terms of energy efficiency, network performance, security, and cost-effectiveness. This choice is validated by its demonstrated efficacy, scalability, real-time detection capabilities, minimal false positive occurrences, and adaptive learning attributes. Collectively, these factors bolster the overall resilience and sustainability of 5G networks. Intrusion detection assumes a pivotal role in upholding the integrity and performance of 5G networks. Its capacity to swiftly pinpoint and counter security breaches guarantees the optimal utilization of network resources for legitimate traffic, consequently elevating overall network performance and quality of service (QoS). Furthermore, the adopted intrusion detection method reinforces the security posture of 5G systems. It adeptly identifies and thwarts various cyber threats, encompassing Distributed Denial of Service (DDoS) attacks, malware incursions, and unauthorized access endeavors, thus mitigating the potential for data breaches and service interruptions. Crucially, the chosen intrusion detection method is highly adaptable and can scale to accommodate the evolving landscape of 5G networks. It can seamlessly accommodate the escalating number of connected devices and the increasing complexity of network architectures, ensuring its continued relevance and effectiveness.

14.Contribution

This study’s key contribution applies to 5G Systems and the Digital Twin network because it addresses the most important Energy Efficiency problem, namely DDoS attacks on network. Data must be protected from DDoS attack utilizing Intrusion Detection and the most up-to-date analytical tools prior to achieving Energy Efficiency which can be attained. The Handover, reflection, emphasis on DoS attacks, and energy inefficiency when compared to previous related work. However, no such aspect was examined as suggested in the research questions for this study despite the employment of Digital Twin and Intrusion Detection techniques for DDoS attacks. This cutting-edge SLR tackles Energy Efficiency with 5G Systems and Digital Twin, as far as we can tell. This study’s main goals included conducting a thorough analysis of the Energy Efficiency problem, Intrusion Detection on DDoS attack approaches for 5G Systems using Digital Twins, Energy Efficient processing, and management techniques for 5G Systems using Digital Twins, Intrusion Detection and performance evaluation of tools, techniques, and models. The diverse nature of networks has previously been discussed in several relevant studies, like DDoS attacks. Hence, none of these studies have gone into detail on the problems raised in the research topics. The knowledge provided by such SLR will be useful for academics and network experts who are working with large forms of network, according to the findings and debate.

As previously said, attaining Energy Efficiency of the network in the form of 5G Systems would benefit from the most current deep learning, machine learning, and Digital Twin approaches. Furthermore, performance using measurement techniques will help in choosing the best methods, equipment, models, and frameworks. In addition, Digital Twin will support cutting-edge applications including zero-shot network domain network, IoT, industrial reformation 4.0, and enhanced reality.

15.Practice relevance

With the use of already-available tools and methodologies, administrators and network packet analysts controlled the enormous amounts of network created by industries including healthcare, banking, insurance, architecture, engineering, education, oil and gas, communications, and entertainment. Data centers present a huge chance for energy and money savings. With the introduction of the newest tools and technologies, administrators and network packet analysts have a duty to process and efficiently portray networks such that the end users can understand all the data and utilize the network appropriately. DDoS attacks must be managed and neutralized to solve the Energy Efficiency problem and provide effective energy. Managers and data analysts must choose the best model for attaining Energy Efficiency, such as a Digital Twin, Intrusion Detection, and reflection for consistent representations. Furthermore, quick training and testing methods will be made possible by excellent deep learning, machine learning, and DT techniques for 5G Systems. The performance metric can therefore be produced by considering accuracy, retention, reliability, and latency. As a subset of 5G Systems, Energy Efficiency is a prominent topic in academia since it addresses Digital Twin networks and DDoS attack mitigation. Digital Twin networks are a great way to characterize, forecast, and visualize data for this purpose. Regarding the effects of academic achievement, research can advance in Energy Efficiency with Digital Twins.

16.Significance of the research

A tremendous rise in data traffic is anticipated to be supported by 5G networks, which will also connect billions of devices. With this expansion, energy use by the network infrastructure becomes a major problem. Energy Efficient 5G technologies reduce the telecommunications sector’s carbon footprint and greenhouse gas emissions, promoting environmental sustainability. For network operators, energy consumption is a significant operating expense. Operators can lower their operational costs and electricity bills by increasing Energy Efficiency, which will boost their profitability. Operators can handle the expanding network demands while maximizing resource use with the help of Energy Efficient 5G technologies. An extensive variety of gadgets may connect and interact with 5G. Many of these gadgets, including wearable electronics and Internet of Things (IoT) sensors, run on batteries. These gadgets’ batteries may work for longer periods of time without needing to be frequently recharged or replaced in Energy Efficient 5G technology. 5G network availability and reliability are also impacted by Energy Efficiency. Operators can improve the resilience of their network infrastructure and guarantee ongoing service availability, even during power outages or in locations with sparse power supply, by optimizing power utilization. In addition to supporting new applications like driverless vehicles, smart cities, and industrial automation, 5G networks are built to handle a massive amount of data traffic. Systems that are Energy Efficient enable scalable network deployments and consider the expected increase in data traffic and linked devices without significantly increasing power consumption.

17.Research direction

Many methods and technologies are used in 5G networks to achieve Energy Efficiency. To enable sustainable and ecologically friendly 5G deployments, continuing research and development focuses on enhancing Energy Efficiency at the network and device levels. To increase the Energy Efficiency of 5G networks, researchers are investigating cutting-edge network optimization approaches. To minimize energy consumption while still maintaining the required level of service, this includes optimizing the deployment of base stations, lowering the energy consumption of network equipment, optimizing resource allocation algorithms, and creating effective scheduling algorithms. To enable base stations and network components to dynamically modify their power usage based on traffic demand, Energy Efficient sleep modes are being researched. The goal of research is to create intelligent algorithms that can correctly forecast traffic patterns and activate or deactivate network components in accordance. By doing this, energy waste during slow periods is reduced. Green communication methods try to make wireless signals use less energy. Energy Efficient transmission protocols, such as energy harvesting and Energy Efficient relaying, are being studied, along with Energy Efficient modulation and coding schemes, power amplifier efficiency optimization, advanced antenna technologies, and advanced antenna technologies. It is being investigated how to use energy harvesting methods to power 5G network components with renewable energy. To lessen dependency on the power grid and boost overall Energy Efficiency, research is looking into the integration of solar, wind, and kinetic energy collecting technologies into base stations and network infrastructure. To maximize Energy Efficiency in 5G systems, artificial intelligence and machine learning approaches are being used. These methods allow for resource management and intelligent decision-making based on real-time network circumstances, traffic patterns, and energy consumption statistics. Machine learning methods are being investigated for the purpose of predicting energy consumption, optimizing network operations, and dynamically adapting network designs. With the rapid deployment of 5G networks comes energy concerns that must be addressed to ensure sustainable and environmentally friendly installations. By increasing Energy Efficiency, researchers hope to lessen the telecom sector’s carbon footprint, save network operators’ operating expenses, and improve the overall performance and dependability of 5G systems.

18.Limitation of the research

With a greater number of network components, larger traffic demands, and a variety of service requirements, 5G networks are substantially more complicated than networks from earlier generations. Due to the requirement for advanced optimization techniques, real-time monitoring, and coordination across many network components, managing Energy Efficiency in such complex networks becomes difficult. High-bandwidth apps, IoT devices, and applications with extremely low latency are all supported by 5G networks along with a variety of traffic patterns. The dynamic nature of traffic requires Energy Efficient techniques to adjust and optimize resource allocation based on current demand. Intelligent resource management strategies are needed to solve the difficulty of ensuring Energy Efficiency under fluctuating traffic conditions. It can be difficult to implement Energy Efficient 5G networks in places with a lack of infrastructure or erratic power supplies. To maintain ongoing network functioning and Energy Efficiency in such circumstances, it becomes essential to investigate alternate energy sources, energy storage options, and intelligent power management systems. The interoperability and integration of new Energy Efficient technologies with older systems as well as Energy Efficiency issues frequently need to be balanced. It can be difficult and expensive to upgrade or retrofit existing infrastructure to increase Energy Efficiency. To encourage the adoption of Energy Efficient practices, it is essential to guarantee seamless integration and backward compatibility. It takes continual research, cooperation amongst industry parties, breakthroughs in technology, algorithms, and network topologies to address these limits. While energy economy is a crucial component of the architecture of the 5G system, finding the ideal balance between Energy Efficiency and performance is crucial to guarantee the network’s maximum performance.

19.Future research suggessions

As the phrase “Energy Efficiency” is used in various applications, data accessibility and domain context are this SLR’s two most significant limitations. The inconsistencies in the review of the literature, SLRs and surveys are another drawback. Due to the article acceptance and publication period between 2018 and 2022, certain pertinent articles were not available. The choice of research in 5G Systems is a small drawback. Digital Twin networks, expanded reality, industrialization 4.0, learning algorithms, and blockchain all play a crucial part in Energy Efficiency, so do DDoS attacks. Massive networks created by domains and applications can be universally represented by Digital Twin networks as platforms for Energy Efficiency problems. The following are the most important recommendations for moving forward based on the comprehensive debate and in-depth analysis of all the publications, methodologies, tools, and models. The use of DT network and Intrusion Detection techniques on 5G Systems is required in the medical, network, and communication industries. The focus of this review article is the adoption and integration of these excellent Digital Twin methods into the Energy Efficiency of 5G Systems. As a result, the following intriguing research priorities are listed:

  • 1. For instance, to identify the DDoS attack mitigation methods used and not used in the Energy Efficiency issue, this research analyzed the current DDoS attack mitigation methods. Similar research may eventually be applied to other crucial aspects of 5G Systems, including engineering issues, railroad issues, feature selection issues, and so forth.

  • 2. Additionally, to raise a privacy concern in the context of 5G Systems given that practically all DDoS attack techniques are accessible through cloud databases.

  • 3. There is a need for more reviews in terms of Denial of Service (DoS) attack for single network in 5G Systems and the method to handle such attacks.

  • 4. Security issues need to be looked upon in 5G Systems, also the security issues in implementing Digital Twin need to be checked.

  • 5. Other domains need to know about Digital Twin technology like the agricultural sector and banking sector.

Acknowledgments

This work was supported by Universiti Teknologi PETRONAS (UTP) Malaysia.

References

[1] 

Series M. IMT Vision-Framework and overall objectives of the future development of IMT for 2020 and beyond. Recommendation ITU. (2015) ; 2083: : 21.

[2] 

Datta SPA. Emergence of digital twins. arXiv preprint arXiv:1610.06467; (2016) .

[3] 

Glaessgen E, Stargel D. The digital twin paradigm for future NASA and US Air Force vehicles. In: 53rd AIAA/ASME/ASCE/AHS/ASC Structures, Structural Dynamics and Materials Conference 20th AIAA/ASME/AHS Adaptive Structures Conference 14th AIAA. (2012) . p. 1818.

[4] 

Miao Y, Jiang Y, Peng L, Hossain MS, Muhammad G. Telesurgery robot based on 5G tactile internet. Mob Netw Appl. (2018) ; 23: (6): 1645–54. doi: 10.1007/s11036-018-1110-3.

[5] 

Gillispie C. South Korea’s 5G ambitions Academic Paper Series. Korea Economic Institute of America. (2020) .

[6] 

Tobin M. New Zealand bans Huawei from 5G, China Has Message for New Zealand. This Week Asia. (2019) .

[7] 

Fuller A, Fan Z, Day C, Barlow C. Digital twin: Enabling technologies, challenges and open research. IEEE Access. (2020) ; 8: : 108952–71. doi: 10.1109/ACCESS.2020.2998358.

[8] 

Tobin M. My way or the Huawei: how US ultimatum over China’s 5G giant fell flat in Southeast Asia. South China Morning Post. (2019) ; 20.

[9] 

Ji X, Huang K, Jin L, Tang H, Liu C, Zhong Z, et al. Overview of 5G security technology. Sci China Inf Sci. (2018) ; 61: (8): 1–25. doi: 10.1007/s11432-017-9426-4.

[10] 

Ahmed AH, Thair Al-Heety AT, Al-Khateeb B, Mohammed AH. Energy efficiency in 5G massive MIMO for mobile wireless network. In: International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA). Vol. 2020. IEEE Publications. (2020) . pp. 1–6. doi: 10.1109/HORA49412.2020.9152847.

[11] 

Rizvi S, Aziz A, Jilani MT, Armi N, Muhammad G, Butt SH. An investigation of energy efficiency in 5G wireless networks. In: International Conference on Circuits, System and Simulation (ICCSS). Vol. 2017. IEEE Publications. (2017) . pp. 142–5. doi: 10.1109/CIRSYSSIM.2017.8023199.

[12] 

Varshney U, Jain R. Issues in emerging 4G wireless networks. Computer. (2001) ; 34: (6): 94–6. doi: 10.1109/2.953469.

[13] 

Keele S. Guidelines for performing systematic literature reviews in software engineering [technical report] Ebse technical report. ebse. ver 2.3; (2007) .

[14] 

Yang C, Liang P, Fu L, Cui G, Huang F, Teng F, et al. Using 5G in smart cities: A systematic mapping study. Intell Syst Appl. (2022) ; 14: : 200065. doi: 10.1016/j.iswa.2022.200065.

[15] 

Kitchenham BA, Pfleeger SL, Pickard LM, Jones PW, Hoaglin DC, El Emam K, et al. Preliminary guidelines for empirical research in software engineering. IEEE Trans Softw Eng. (2002) ; 28: (8): 721–34. doi: 10.1109/TSE.2002.1027796.

[16] 

Carvalho R, da Silva AR. Sustainability requirements of digital twin-based systems: A meta systematic literature review. Appl Sci. (2021) ; 11: (12): 5519. doi: 10.3390/app11125519.

[17] 

Shrivastava VK, Baek S, Baek Y. 5G evolution for multicast and broadcast services in 3GPP release 17. IEEE Commun Stand Mag. (2022) ; 6: (3): 70–6. doi: 10.1109/MCOMSTD.0001.2100068.

[18] 

Cao J, Yan Z, Ma R, Zhang Y, Fu Y, Li H. LSAA: A lightweight and secure access authentication scheme for both UE and mMTC devices in 5G networks. IEEE Internet Things J. (2020) ; 7: (6): 5329–44. doi: 10.1109/JIOT.2020.2976740.

[19] 

Mishra D, Natalizio E. A survey on cellular-connected UAVs: Design challenges, enabling 5G/B5G innovations, and experimental advancements. Comput Netw. (2020) ; 182: : 107451. doi: 10.1016/j.comnet.2020.107451.

[20] 

Chettri L, Bera R. A comprehensive survey on Internet of things (IoT) toward 5G wireless systems. IEEE Internet Things J. (2019) ; 7: (1): 16–32. doi: 10.1109/JIOT.2019.2948888.

[21] 

Gurusamy D, Priya MD, Yibgeta B, Bekalu A. DDoS risk in 5G enabled IoT and solutions. Int J Eng Adv Technol. (2019) ; 8: (5): 1574–8.

[22] 

Allam Z, Sharifi A, Bibri SE, Jones DS, Krogstie J. The metaverse as a virtual form of smart cities: Opportunities and challenges for environmental, economic, and social sustainability in urban futures. Smart Cities. (2022) ; 5: (3): 771–801. doi: 10.3390/smartcities5030040.

[23] 

Dighriri M, Alfoudi ASD, Lee GM, Baker T, Pereira R. Comparison data traffic scheduling techniques for classifying QoS over 5G mobile networks. In: 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA). Vol. 2017. IEEE Publications. (2017) . pp. 492–7. doi: 10.1109/WAINA.2017.106.

[24] 

Fujii Y, Iye T, Tsuda K, Tanibayashi A. 28 GHz cooperative digital beamforming for 5G advanced system on an SDR platform. In: IEEE Radio and Wireless Symposium (RWS). Vol. 2021. IEEE Publications. (2021) . pp. 80–2. doi: 10.1109/RWS50353.2021.9360368.

[25] 

Aljiznawi RA, Alkhazaali NH, Jabbar SQ, Kadhim DJ. Quality of service (qos) for 5-g networks. Int J Future Comput Commun. (2017) ; 6: (1): 27–30. doi: 10.18178/ijfcc.2017.6.1.483.

[26] 

Si Y. Research on the balanced relationship between online consumer behavior and e-commerce service quality based on 5G network. Mob Inf Syst. (2021) ; 2021: : 1–12. doi: 10.1155/2021/5562996.

[27] 

Dogra A, Jha RK, Jain S. A survey on beyond 5G network with the advent of 6G: Architecture and emerging technologies. IEEE Access. (2020) ; 9: : 67512–47. doi: 10.1109/ACCESS.2020.3031234.

[28] 

Chowdhury MZ, Shahjalal M, Ahmed S, Jang YM. 6G wireless communication systems: Applications, requirements, technologies, challenges, and research directions. IEEE Open J Commun Soc. (2020) ; 1: : 957–75. doi: 10.1109/OJCOMS.2020.3010270.

[29] 

Ahmad I, Shahabuddin S, Kumar T, Okwuibe J, Gurtov A, Ylianttila M. Security for 5G and beyond. IEEE Commun Surv Tutorials. (2019) ; 21: (4): 3682–722. doi: 10.1109/COMST.2019.2916180.

[30] 

Kapass E, Touloupou M, Stavrianos P, Xylouris G, Kyriazis D. Managing and optimizing quality of service in 5-g environments across the complete sla lifecycle. Adv Sci Technol Eng Syst J. (2019) ; 4: (1): 329–42. doi: 10.25046/aj040132.

[31] 

Qian M, Wang Y, Zhou Y, Tian L, Shi J. A super base station based centralized network architecture for 5G mobile communication systems. Digit Commun Netw. (2015) ; 1: (2): 152–9. doi: 10.1016/j.dcan.2015.02.003.

[32] 

Baxter K, Lundberg J. From centralized systems to distributed 5G-enabled manufacturing. (2020) .

[33] 

Nguyen HX, Trestian R, To D, Tatipamula M. Digital twin for 5G and beyond. IEEE Commun Mag. (2021) ; 59: (2): 10–5. doi: 10.1109/MCOM.001.2000343.

[34] 

Seilov SZ, Seilov AA, Shyngisov DS, Goikhman VY, Levakov AK, et al. The concept of building a network of digital twins to increase the efficiency of complex telecommunication systems. Complexity. (2021) ; 2021: : 1–9. doi: 10.1155/2021/9480235.

[35] 

Deng T, Zhang K, Shen Z-JM. A systematic review of a digital twin city: A new pattern of urban governance toward smart cities. Manag Sci Eng. (2021) ; 6: (2): 125–34. doi: 10.1016/j.jmse.2021.03.003.

[36] 

Zhou Z, Jia Z, Liao H, Lu W, Mumtaz S, Guizani M, et al. Secure and latencyaware digital twin assisted resource scheduling for 5G edge computingempowered distribution grids. IEEE Trans Ind Inform. (2021) ; 18: (7): 4933–43. doi: 10.1109/TII.2021.3137349.

[37] 

Dong R, She C, Hardjawana W, Li Y, Vucetic B. Deep learning for hybrid 5G services in mobile edge computing systems: Learn from a digital twin. IEEE Trans Wirel Commun. (2019) ; 18: (10): 4692–707. doi: 10.1109/TWC.2019.2927312.

[38] 

Qureshi HN, Manalastas M, Zaidi SMA, Imran A, Al Kalaa MO. Service Level agreements for 5G and beyond: Overview, challenges and enablers of 5G-healthcare systems. IEEE Access. (2021) ; 9: : 1044–61. doi: 10.1109/access.2020.3046927, PMID 35211361.

[39] 

Christos SC, Christos G. Data-centric operations in oil & gas industry by the use of 5G mobile networks and industrial Internet of Things (IIoT). In: Proceedings of the 13th Int. Conf. Digit Telecommun. (2018) . p. 16.

[40] 

Israr A, Yang Q, Li W, Zomaya AY. Renewable energy powered sustainable 5G network infrastructure: Opportunities, challenges and perspectives. J Netw Comput Appl. (2021) ; 175: : 102910. doi: 10.1016/j.jnca.2020.102910.

[41] 

Baratè A, Haus G, Ludovico LA, Pagani E, Scarabottolo N. 5G technology for augmented and virtual reality in education. Education and New Developments. Proceedings of the International Conference on Education and New Developments. (2019) ; 2019: : 512–6. doi: 10.36315/2019v1end116.

[42] 

Hu F. Opportunities in 5G networks: A research and development perspective. CRC press. (2016) .

[43] 

Shafique K, Khawaja BA, Sabir F, Qazi S, Mustaqim M. Internet of things (IoT) for next-generation smart systems: A review of current challenges, future trends and prospects for emerging 5G-IoT scenarios. IEEE Access. (2020) ; 8: : 23022–40. doi: 10.1109/ACCESS.2020.2970118.

[44] 

Gupta A, Jha RK. A survey of 5G network: Architecture and emerging technologies. IEEE Access. (2015) ; 3: : 1206–32. doi: 10.1109/ACCESS.2015.2461602.

[45] 

Kostopoulos A, Chochliouros IP, Spada MR. Business challenges for service provisioning in 5G networks. In: International Conference on Business Information Systems. Springer. (2019) . pp. 423–34.

[46] 

Djenouri Y, Srivastava G, Belhadi A, Lin JCW. Intelligent blockchain management for distributed knowledge graphs in IoT 5G environments. Trans Emerg Telecommun Technol. (2021) ; e4332. doi: 10.1002/ett.4332.

[47] 

Rao SK, Prasad R. Impact of 5G technologies on smart city implementation. Wirel Personal Commun. (2018) ; 100: (1): 161–76. doi: 10.1007/s11277-018-5618-4.

[48] 

Zaidi Z, Friderikos V, Yousaf Z, Fletcher S, Dohler M, Aghvami H. Will SDN be part of 5G? IEEE Commun Surv Tutorials. (2018) ; 20: (4): 3220–58. doi: 10.1109/COMST.2018.2836315.

[49] 

Xiang W, Zheng K, Shen XS. 5G mobile communications. Springer. (2016) .

[50] 

Jain P, Poon J, Singh JP, Spanos C, Sanders SR, Panda SK. A digital twin approach for fault diagnosis in distributed photovoltaic systems. IEEE Trans Power Electron. (2019) ; 35: (1): 940–56. doi: 10.1109/TPEL.2019.2911594.

[51] 

Zhang H, Liu Q, Chen X, Zhang D, Leng J. A digital twin-based approach for designing and multi-objective optimization of hollow glass production line. IEEE Access. (2017) ; 5: : 26901–11. doi: 10.1109/ACCESS.2017.2766453.

[52] 

Mashaly M. Connecting the twins: A review on digital twin technology & its networking requirements. Procedia Comput Sci. (2021) ; 184: : 299–305. doi: 10.1016/j.procs.2021.03.039.

[53] 

Farsi M, Daneshkhah A, Hosseinian-Far A, Jahankhani H. Digital twin technologies and smart cities. Springer. (2020) .

[54] 

Hu C, Fan W, Zeng E, Hang Z, Wang F, Qi L, et al. Digital twin-assisted real-time traffic data prediction method for 5G-enabled internet of vehicles. IEEE Trans Ind Inform. (2021) ; 18: (4): 2811–9. doi: 10.1109/TII.2021.3083596.

[55] 

Dai Y, Zhang K, Maharjan S, Zhang Y. Deep reinforcement learning for stochastic computation offloading in digital twin networks. IEEE Trans Ind Inform. (2020) ; 17: (7): 4968–77. doi: 10.1109/TII.2020.3016320.

[56] 

Ivanov S, Nikolskaya K, Radchenko G, Sokolinsky L, Zymbler M. Digital twin of city: concept overview. In: Global Smart Industry Conference (GloSIC). Vol. 2020. IEEE Publications. (2020) . pp. 178–86. doi: 10.1109/GloSIC50886.2020.9267879.

[57] 

Wu Y, Zhang K, Zhang Y. Digital twin networks: A survey. IEEE Internet Things J. (2021) ; 8: (18): 13789–804. doi: 10.1109/JIOT.2021.3079510.

[58] 

Deng J, Zheng Q, Liu G, Bai J, Tian K, Sun C, et al. A digital twin approach for self-optimization of mobile networks. In: IEEE Wireless Communications and Networking Conference Workshops (WCNCW). Vol. 2021. IEEE Publications. (2021) . pp. 1–6. doi: 10.1109/WCNCW49093.2021.9420037.

[59] 

Lv Z, Chen D, Feng H, Lou R, Wang H. Beyond 5G for digital twins of UAVs. Comput Netw. (2021) ; 197: : 108366. doi: 10.1016/j.comnet.2021.108366.

[60] 

Lu Y, Huang X, Zhang K, Maharjan S, Zhang Y. Communication-efficient federated learning and permissioned blockchain for digital twin edge networks. IEEE Internet Things J. (2020) ; 8: (4): 2276–88. doi: 10.1109/JIOT.2020.3015772.

[61] 

Dixit A, Pathak H. Digital twin in healthcare. (2019) .

[62] 

Wanasinghe TR, Wroblewski L, Petersen BK, Gosine RG, James LA, De Silva O, et al. Digital twin for the oil and gas industry: Overview, research trends, opportunities, and challenges. IEEE Access. (2020) ; 8: : 104175–97. doi: 10.1109/ACCESS.2020.2998723.

[63] 

Li X, Cao J, Liu Z, Luo X. Sustainable business model based on digital twin platform network: The inspiration from haier’s case study in China. Sustainability. (2020) ; 12: (3): 936. doi: 10.3390/su12030936.

[64] 

Tao F, Zhang H, Liu A, Nee AYC. Digital twin in industry: State-of-the-art. IEEE Trans Ind Inform. (2018) ; 15: (4): 2405–15. doi: 10.1109/TII.2018.2873186.

[65] 

Liljaniemi A, Paavilainen H. Using digital twin technology in engineering education-course concept to explore benefits and barriers. Open Eng. (2020) ; 10: (1): 377–85. doi: 10.1515/eng-2020-0040.

[66] 

Schleich B, Anwer N, Mathieu L, Wartzack S. Shaping the digital twin for design and production engineering. CIRP Ann. (2017) ; 66: (1): 141–4. doi: 10.1016/j.cirp.2017.04.040.

[67] 

El Marai O, Taleb T, Song J. Roads infrastructure digital twin: A step toward smarter cities realization. IEEE Netw. (2020) ; 35: (2): 136–43.

[68] 

Jiang L, Zheng H, Tian H, Xie S, Zhang Y. Cooperative federated learning and model update verification in blockchain empowered digital twin edge networks. IEEE Internet Things J. (2021) ; 9: (13): 11154–67. doi: 10.1109/JIOT.2021.3126207.

[69] 

Picone M, Mamei M, Zambonelli F. WLDT: A general purpose library to build IoT digital twins. SoftwareX. (2021) ; 13: : 100661. doi: 10.1016/j.softx.2021.100661.

[70] 

Pylianidis C, Osinga S, Athanasiadis IN. Introducing digital twins to agriculture. Comput Electron Agric. (2021) ; 184: : 105942. doi: 10.1016/j.compag.2020.105942.

[71] 

Bachelor G, Brusa E, Ferretto D, Mitschke A. Model-based design of complex aeronautical systems through digital twin and thread concepts. IEEE Syst J. (2019) ; 14: (2): 1568–79. doi: 10.1109/JSYST.2019.2925627.

[72] 

Phanden RK, Sharma P, Dubey A. A review on simulation in digital twin for aerospace, manufacturing and robotics. Mater Today Proc. (2021) ; 38: : 174–8. doi: 10.1016/j.matpr.2020.06.446.

[73] 

Groshev M, Guimarães C, Martín-Pérez J, de la Oliva A. Toward intelligent cyber-physical systems: Digital twin meets artificial intelligence. IEEE Commun Mag. (2021) ; 59: (8): 14–20. doi: 10.1109/MCOM.001.2001237.

[74] 

Ruohomäki T, Airaksinen E, Huuska P, Kesäniemi O, Martikka M, Suomisto J. Smart city platform enabling digital twin. In: International Conference on Intelligent Systems (IS). Vol. 2018. IEEE Publications. (2018) . pp. 155–61. doi: 10.1109/IS.2018.8710517.

[75] 

Kritzinger W, Karner M, Traar G, Henjes J, Sihn W. Digital Twin in manufacturing: A categorical literature review and classification. IFAC PapersOnLine. (2018) ; 51: (11): 1016–22. doi: 10.1016/j.ifacol.2018.08.474.

[76] 

Wang Z, Gupta R, Han K, Wang H, Ganlath A, Ammar N, et al. Mobility digital twin: Concept, architecture, case study, and future challenges. IEEE Internet Things J. (2022) ; 9: (18): 17452–67. doi: 10.1109/JIOT.2022.3156028.

[77] 

Dietz M, Vielberth M, Pernul G. Integrating digital twin security simulations in the security operations center. In: Proceedings of the 15th International Conference on Availability, Reliability and Security. (2020) . pp. 1–9. doi: 10.1145/3407023.3407039.

[78] 

Mughees A, Tahir M, Sheikh MA, Ahad A. Towards energy efficient 5G networks using machine learning: Taxonomy, research challenges, and future research directions. IEEE Access. (2020) ; 8: : 187498–522. doi: 10.1109/ACCESS.2020.3029903.

[79] 

Buzzi S, I C, Klein TE, Poor HV, Yang C, Zappone A. A survey of energy-efficient techniques for 5G networks and challenges ahead. IEEE J Sel Areas Commun. (2016) ; 34: (4): 697–709. doi: 10.1109/JSAC.2016.2550338.

[80] 

Usama M, Erol-Kantarci M. A survey on recent trends and open issues in energy efficiency of 5G. Sensors (Basel). (2019) ; 19: (14): 3126. doi: 10.3390/s19143126, PMID 31311203.

[81] 

Nguyen LD. Resource allocation for energy efficiency in 5G wireless networks. EAI Endorsed Trans Ind Netw Intell Syst. (2018) ; 5: (14): e1. doi: 10.4108/eai.27-6-2018.154832.

[82] 

Humayun M, Jhanjhi N, Alruwaili M, Amalathas SS, Balasubramanian V, Selvaraj B. Privacy protection and energy optimization for 5G-aided industrial Internet of Things. IEEE Access. (2020) ; 8: : 183665–77. doi: 10.1109/ACCESS.2020.3028764.

[83] 

Su G, Moh M. Improving energy efficiency and scalability for IoT communications in 5G networks. In: Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication. (2018) . pp. 1–8. doi: 10.1145/3164541.3164547.

[84] 

Huynh D-T, Wang X, Duong TQ, Vo N-S, Chen M. Social-aware energy efficiency optimization for device-to-device communications in 5G networks. Comput Commun. (2018) ; 120: : 102–11. doi: 10.1016/j.comcom.2018.02.008.

[85] 

Alsharif MH, Kelechi AH, Kim J, Kim JH. Energy efficiency and coverage trade-off in 5G for eco-friendly and sustainable cellular networks. Symmetry. (2019) ; 11: (3): 408. doi: 10.3390/sym11030408.

[86] 

Ali A, Shah GA, Arshad J. Energy efficient resource allocation for M2M devices in 5G. Sensors (Basel). (2019) ; 19: (8): 1830. doi: 10.3390/s19081830, PMID 30999622.

[87] 

Bashir AK, Arul R, Basheer S, Raja G, Jayaraman R, Qureshi NMF. An optimal multitier resource allocation of cloud RAN in 5G using machine learning. Trans Emerg Telecommun Technol. (2019) ; 30: (8): e3627. doi: 10.1002/ett.3627.

[88] 

Mowla MM, Ahmad I, Habibi D, Phung QV. Energy efficient backhauling for 5G small cell networks. IEEE Trans Sustain Comput. (2018) ; 4: (3): 279–92. doi: 10.1109/TSUSC.2018.2838116.

[89] 

Dai Y, Zhang K, Maharjan S, Zhang Y. Edge intelligence for energy-efficient computation offloading and resource allocation in 5G beyond. IEEE Trans Veh Technol. (2020) ; 69: (10): 12175–86. doi: 10.1109/TVT.2020.3013990.

[90] 

Jones RW, Katzis K. 5G and wireless body area networks. In: IEEE Wireless Communications and Networking Conference Workshops (WCNCW). Vol. 2018. IEEE Publications. (2018) . pp. 373–8. doi: 10.1109/WCNCW.2018.8369035.

[91] 

Li S, Da Xu L, Zhao S. 5G Internet of Things: A survey. J Ind Inf Integr. (2018) ; 10: : 1–9. doi: 10.1016/j.jii.2018.01.005.

[92] 

Jiang D, Wang Y, Lv Z, Wang W, Wang H. An energy-efficient networking approach in cloud services for IIoT networks. IEEE J Sel Areas Commun. (2020) ; 38: (5): 928–41. doi: 10.1109/JSAC.2020.2980919.

[93] 

Kumar V, Yadav S, Sandeep DN, Dhok SB, Barik RK, Dubey H. 5G cellular: concept, research work and enabling technologies. In: Advances in Data and Information Sciences. Springer. (2019) . pp. 327–38. doi: 10.1007/978-981-13-0277-0_27.

[94] 

Salem FE, Altman Z, Gati A, Chahed T, Altman E. Reinforcement learning approach for advanced sleep modes management in 5G networks. In: 88th Vehicular Technology Conference (VTC-Fall). IEEE Publications. (2018) . pp. 1–5. doi: 10.1109/VTCFall.2018.8690555.

[95] 

Kour H, Jha RK, Jain S. A comprehensive survey on spectrum sharing: Architecture, energy efficiency and security issues. J Netw Comput Appl. (2018) ; 103: : 29–57. doi: 10.1016/j.jnca.2017.11.010.

[96] 

Xiong Z, Zhang Y, Niyato D, Deng R, Wang P, Wang L-C. Deep reinforcement learning for mobile 5G and beyond: Fundamentals, applications, and challenges. IEEE Veh Technol Mag. (2019) ; 14: (2): 44–52. doi: 10.1109/MVT.2019.2903655.

[97] 

Dinh THL, Kaneko M, Fukuda EH, Boukhatem L. Energy efficient resource allocation optimization in fog radio access networks with outdated channel knowledge. IEEE Trans Green Commun Netw. (2020) ; 5: (1): 146–59. doi: 10.1109/TGCN.2020.3034638.

[98] 

Qamar F, Hindia MHDN, Dimyati K, Noordin KA, Amiri IS. Interference management issues for the future 5G network: A review. Telecommun Syst. (2019) ; 71: (4): 627–43. doi: 10.1007/s11235-019-00578-4.

[99] 

Sigwele T, Alam AS, Pillai P, Hu YF. Evaluating energy-efficient cloud radio access networks for 5G. In: IEEE International Conference on Data Science and Data Intensive Systems. Vol. 2015. IEEE Publications. (2015) . pp. 362–7. doi: 10.1109/DSDIS.2015.73.

[100] 

Liao D-Y, Wang X. 5G Wireless micro operators for integrated casinos and entertainment in smart cities. In: Handbook of Smart Cities. Springer. (2018) . pp. 115–49.

[101] 

Marabissi D, Mucchi L, Fantacci R, Spada M, Massimiani F, Fratini A, et al. A real case of implementation of the future 5G city. Future Internet. (2018) ; 11: (1): 4. doi: 10.3390/fi11010004.

[102] 

Sigwele T, Hu YF, Ali M, Hou J, Susanto M, Fitriawan H. Intelligent and energy efficient mobile smartphone gateway for healthcare smart devices based on 5G. In: IEEE Global Communications Conference (GLOBECOM). Vol. 2018. IEEE Publications. (2018) . pp. 1–7. doi: 10.1109/GLOCOM.2018.8648031.

[103] 

Yan G. Simulation analysis of key technology optimization of 5G mobile communication network based on Internet of Things technology. Int J Distrib Sens Netw. (2019) ; 15: (6). doi: 10.1177/1550147719851454.

[104] 

Memon ML, Maheshwari MK, Saxena N, Roy A, Shin DR. Artificial intelligence-based discontinuous reception for energy saving in 5G networks. Electronics. (2019) ; 8: (7): 778. doi: 10.3390/electronics8070778.

[105] 

Valecce G, Strazzella S, Grieco LA. On the interplay between 5g, mobile edge computing and robotics in smart agriculture scenarios. In: International Conference on Ad-Hoc Networks and Wireless. Springer. (2019) . pp. 549–59.

[106] 

Chang K-C, Chu K-C, Wang H-C, Lin Y-C, Pan J-S. Energy saving technology of 5G base station based on internet of things collaborative control. IEEE Access. (2020) ; 8: : 32935–46. doi: 10.1109/ACCESS.2020.2973648.

[107] 

I C, Han S, Bian S. Energy-efficient 5G for a greener future. Nat Electron. (2020) ; 3: (4): 182–4. doi: 10.1038/s41928-020-0404-1.

[108] 

Xie R, Li Z, Wu J, Jia Q, Huang T. Energy-efficient joint caching and transcoding for HTTP adaptive streaming in 5G networks with mobile edge computing. China Commun. (2019) ; 16: (7): 229–44. doi: 10.23919/JCC.2019.07.017.

[109] 

Ramaiah VS, Singh B, Raju AR, Reddy GN, Saikumar K, Ratnayake D. Teaching and Learning based 5G cognitive radio application for future application. In: International Conference on Computational Intelligence and Knowledge Economy (ICCIKE). Vol. 2021. IEEE Publications. (2021) . pp. 31–6.

[110] 

Im HYR, Thar K, Hong CS. Q-learning based social community-aware energy efficient cooperative caching in 5G networks. In: Eleventh International Conference on Ubiquitous and Future Networks (ICUFN). Vol. 2019. IEEE Publications. (2019) . pp. 500–3. doi: 10.1109/ICUFN.2019.8806093.

[111] 

Ye Q, Li J, Qu K, Zhuang W, Shen XS, Li X. End-to-end quality of service in 5G networks: Examining the effectiveness of a network slicing framework. IEEE Veh Technol Mag. (2018) ; 13: (2): 65–74. doi: 10.1109/MVT.2018.2809473.

[112] 

RicartSanchez R, Malagon P, MatencioEscolar A, Alcaraz Calero JM, Wang Q. Toward hardwareaccelerated QoSaware 5G network slicing based on data plane programmability. Trans Emerg Telecommun Technol. (2020) ; 31: (1): e3726. doi: 10.1002/ett.3726.

[113] 

Sangaiah AK, Javadpour A, Pinto P, Ja’fari F, Zhang W. Improving quality of service in 5G resilient communication with the cellular structure of smartphones. ACM Trans Sens Netw. (2022) ; 18: (3): 1–23. doi: 10.1145/3512890.

[114] 

Rehman AU, Mahmood I, Kamran M, Sanaullah M, Ijaz A, Ali J, et al. Enhancement in Quality-of-Services using 5G cellular network using resource reservation protocol. Phys Commun. (2022) ; 55: : 101907. doi: 10.1016/j.phycom.2022.101907.

[115] 

Wang Q, Alcaraz-Calero J, Ricart-Sanchez R, Weiss MB, Gavras A, Nikaein N, et al. Enable advanced QoS-aware network slicing in 5G networks for slice-based media use cases. IEEE Trans Broadcast. (2019) ; 65: (2): 444–53. doi: 10.1109/TBC.2019.2901402.

[116] 

Li S, Kim JG, Han DH, Lee KS. A survey of energy-efficient communication protocols with QoS guarantees in wireless multimedia sensor networks. Sensors (Basel). (2019) ; 19: (1): 199. doi: 10.3390/s19010199, PMID 30621117.

[117] 

Hussain B, Du Q, Sun B, Han Z. Deep learning-based DDoS-attack detection for cyber-physical system over 5G network. IEEE Trans Ind Inform. (2020) ; 17: (2): 860–70. doi: 10.1109/TII.2020.2974520.

[118] 

Moudoud H, Khoukhi L, Cherkaoui S. Prediction and detection of fdia and ddos attacks in 5g enabled iot. IEEE Netw. (2020) ; 35: (2): 194–201. doi: 10.1109/MNET.011.2000449.

[119] 

Sattar D, Matrawy A. Towards secure slicing: using slice isolation to mitigate DDoS attacks on 5G core network slices. In: IEEE Conference on Communications and Network Security (CNS). Vol. 2019. IEEE Publications. (2019) . pp. 82–90. doi: 10.1109/CNS.2019.8802852.

[120] 

Javed MA, Niazi Sk. 5G security artifacts (DoS/DDoS and authentication). In: International Conference on Communication Technologies (ComTech). Vol. 2019. IEEE Publications. (2019) . pp. 127–33.

[121] 

Ghorbani H, Mohammadzadeh MS, Ahmadzadegan MH. DDoS attacks on the IoT network with the emergence of 5G. In: International Conference on Technology and Entrepreneurship-Virtual (ICTE-V). Vol. 2020. IEEE Publications. (2020) . pp. 1–5. doi: 10.1109/ICTE-V50708.2020.9113779.

[122] 

Mamolar AS, Pervez Z, Wang Q, Alcaraz-Calero JM. Towards the detection of mobile ddos attacks in 5g multi-tenant networks. In: European Conference on Networks and Communications (EuCNC). Vol. 2019. IEEE Publications. (2019) . pp. 273–7. doi: 10.1109/EuCNC.2019.8801975.

[123] 

Almiani M, AbuGhazleh A, Jararweh Y, Razaque A. DDoS detection in 5G-enabled IoT networks using deep Kalman backpropagation neural network. Int J Mach Learn Cybern. (2021) ; 12: (11): 3337–49. doi: 10.1007/s13042-021-01323-7.

[124] 

Dao N-N, Vu D-N, Lee Y, Park M, Cho S. MAEC-X: DDoS prevention leveraging multi-access edge computing. In: International Conference on Information Networking (ICOIN). Vol. 2018. IEEE Publications. (2018) . pp. 245–8. doi: 10.1109/ICOIN.2018.8343118.

[125] 

Alamri HA, Thayananthan V, Yazdani J. Machine Learning for Securing SDN based 5G network. Int J Comput Appl. (2021) ; 174: (14): 9–16. doi: 10.5120/ijca2021921027.

[126] 

Tu Z, Zhou H, Li K, Li M, Tian A. An energy-efficient topology design and DDoS attacks mitigation for green software-defined satellite network. IEEE Access. (2020) ; 8: : 211434–50. doi: 10.1109/ACCESS.2020.3039975.

[127] 

Ghahramani M, Javidan R, Shojafar M, Taheri R, Alazab M, Tafazolli R. RSS: An energy-efficient approach for securing IoT service protocols against the DoS attack. IEEE Internet Things J. (2020) ; 8: (5): 3619–35. doi: 10.1109/JIOT.2020.3023102.

[128] 

Wang B, Sun Y, Xu X. A scalable and energy-efficient anomaly detection scheme in wireless SDN-based mMTC networks for IoT. IEEE Internet Things J. (2020) ; 8: (3): 1388–405. doi: 10.1109/JIOT.2020.3011521.

[129] 

Abidoye AP, Obagbuwa IC. DDoS attacks in WSNs: Detection and countermeasures. IET Wirel Sens Syst. (2018) ; 8: (2): 52–9. doi: 10.1049/iet-wss.2017.0029.

[130] 

Bhola J, Soni S. Information theory-based defense mechanism against DDOS attacks for WSAN. In: Advances in VLSI, Communication, and Signal Processing. Springer. (2021) . pp. 667–78. doi: 10.1007/978-981-15-6840-4_55.

[131] 

Ye J, Cheng X, Zhu J, Feng L, Song L. A DDoS attack detection method based on SVM in software defined network. Sec Commun Netw. (2018) ; 2018: : 1–8. doi: 10.1155/2018/9804061.

[132] 

Li D, Yu C, Zhou Q, Yu J. Using SVM to detect DDoS attack in SDN network. In: IOP Conference Series. Mater Sci Eng. 2018; 466, no. 1:012003.

[133] 

Rahman O, Quraishi MAG, Lung C-H. DDoS attacks detection and mitigation in SDN using machine learning. In: IEEE World Congress on Services (SERVICES). Vol. 2642. IEEE Publications. (2019) . pp. 184–9. doi: 10.1109/SERVICES.2019.00051.

[134] 

V.VM, ProSD-EdgeIoT: protected Cluster assisted SDWSN for Tetrad Edge-IoT by Collaborative DDoS Detection and Mitigation, Cyber Phys Syst. 2021; 1–30.

[135] 

Pajila PJB, Julie EG, Robinson YH. FBDR-Fuzzy based DDoS attack Detection and Recovery mechanism for wireless sensor networks. Wirel Personal Commun. (2022) ; 122: (4): 3053–83. doi: 10.1007/s11277-021-09040-8.

[136] 

Vashist A, Keats A, Pudukotai Dinakarrao SMP, Ganguly A. Securing a wireless network-on-chip against jamming-based denial-of-service and eavesdropping attacks. IEEE Trans Very Large Scale Integr (VLSI) Syst. (2019) ; 27: (12): 2781–91. doi: 10.1109/TVLSI.2019.2928960.

[137] 

Sonar K, Upadhyay H. A survey: DDOS attack on Internet of Things. Int J Eng Res Dev. (2014) ; 10: (11): 58–63.

[138] 

Kshirsagar D, Kumar S. A feature reduction based reflected and exploited DDoS attacks detection system. J Ambient Intell Hum Comput. (2022) ; 13: (1): 393–405. doi: 10.1007/s12652-021-02907-5.

[139] 

Ismail S, Hassen HR, Just M, Zantout H. A review of amplification-based distributed denial of service attacks and their mitigation. Comput Sec. (2021) ; 109: : 102380. doi: 10.1016/j.cose.2021.102380.

[140] 

Mohammadnia H, Slimane SB. IoT-NETZ: practical spoofing attack mitigation approach in SDWN network. In: Seventh International Conference on Software Defined Systems (SDS). Vol. 2020. IEEE Publications. (2020) . pp. 5–13. doi: 10.1109/SDS49854.2020.9143903.

[141] 

Balaji Bharatwaj M, Aditya Reddy M, Senthil Kumar T, Vajipayajula S. Detection of DoS and DDoS attacks using hidden markov model. In: Inventive Communication and Computational Technologies. Springer. (2022) . pp. 979–92. doi: 10.1007/978-981-16-5529-6_74.

[142] 

Kurt B, Çıldız Ç, Ceritli TY, Sankur B, Cemgil AT. A Bayesian change point model for detecting SIP-based DDoS attacks. Digit Signal Process. (2018) ; 77: : 48–62. doi: 10.1016/j.dsp.2017.10.009.

[143] 

L. SHI. Two Decades of DDoS attacks and defenses.

[144] 

Kurnaz S, Khalid A. A new distributed denial-of-service (DDoS) attacks detection system combining multistage autoencoders with radial basis function (RBF). (2019) .

[145] 

Wang M, Lu Y, Qin J. Source-based defense against DDoS attacks in SDN based on sFlow and SOM. IEEE Access. (2021) ; 10: : 2097–116. doi: 10.1109/ACCESS.2021.3139511.

[146] 

áíotelo Monge MA, Herranz González A, Lorenzo Fernández B, Maestre Vidal D, Rius García G, Maestre Vidal J. Traffic-flow analysis for source-side DDoS recognition on 5G environments. J Netw Comput Appl. (2019) ; 136: : 114–31. doi: 10.1016/j.jnca.2019.02.030.

[147] 

Swami R, Dave M, Ranga V. Software-defined networking-based DDoS defense mechanisms. ACM Comput Surv. (2020) ; 52: (2): 1–36. doi: 10.1145/3301614.

[148] 

Xia S-M, Guo S-Z, Bai W, Qiu J-Y, Wei H, Pan Z-S. A new smart router-throttling method to mitigate DDoS attacks. IEEE Access. (2019) ; 7: : 107952–63. doi: 10.1109/ACCESS.2019.2930803.

[149] 

Yigit Y, Bal B, Karameseoglu A, Duong TQ, Canberk B. Digital twinenabled intelligent DDoS detection mechanism for autonomous core networks. IEEE Common Stand Mag. (2022) ; 6: (3): 38–44. doi: 10.1109/MCOMSTD.0001.2100022.

[150] 

Doshi R, Apthorpe N, Feamster N. Machine learning ddos detection for consumer internet of things devices. In: IEEE Security and Privacy Workshops (SPW). Vol. 2018. IEEE Publications. (2018) . pp. 29–35. doi: 10.1109/SPW.2018.00013.

[151] 

Wang W, Ke X, Wang L. A HMM-R Approach to Detect L-DDoS Attack Adaptively on SDN Controller. Future Internet. (2018) ; 10: (9): 83. doi: 10.3390/fi10090083.

[152] 

Sahoo KS, Tripathy BK, Naik K, Ramasubbareddy S, Balusamy B, Khari M, et al. An evolutionary SVM model for DDOS attack detection in software defined networks. IEEE Access. (2020) ; 8: : 132502–13. doi: 10.1109/ACCESS.2020.3009733.

[153] 

Rios VdM, Inácio PRM, Magoni D, Freire MM. Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms. Comput Netw. (2021) ; 186: : 107792. doi: 10.1016/j.comnet.2020.107792.

[154] 

Zhang Y, Cheng Y. An amplification DDoS attack defence mechanism using reinforcement learning. In: IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). Vol. 2019. IEEE Publications. (2019) . pp. 634–9. doi: 10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00145.

[155] 

Chen Y-W, Sheu J-P, Kuo Y-C, Van Cuong N. Design and implementation of IoT DDoS attacks detection system based on machine learning. In: European Conference on Networks and Communications (EuCNC). Vol. 2020. IEEE Publications. (2020) . pp. 122–7. doi: 10.1109/EuCNC48522.2020.9200909.

[156] 

Srihari Rao N, Chandra Sekharaiah KC, Ananda Rao A. A survey of distributed denial-of-service (DDoS) defense techniques in ISP domains. In: Innovations in Computer Science and Engineering. Springer. (2019) . pp. 221–30. doi: 10.1007/978-981-10-8201-6_25.

[157] 

Xu Z, Wang X, Zhang Y. Towards persistent detection of DDoS attacks in NDN: A sketchbased approach. IEEE Trans Depend Sec Comput. (2022) ; 20: (4): 3449–65. doi: 10.1109/TDSC.2022.3196187.

[158] 

Al-Naymat G, Al-Kasassbeh M, et al. Harwari, Using machine learning methods for detecting network anomalies within SNMP-MIB dataset. Int J Wirel Mob Comput. (2018) ; 15: (1): 67–76.

[159] 

Ghali AA, Ahmad R, Alhussian H. A framework for enhancing network lifetime in Internet of things environment using clustering formation. In: International Conference on Artificial Intelligence for Smart Community. Springer. (2022) . pp. 401–7.

[160] 

Aminu Ghali A, Ahmad R, Alhussian HSA. Comparative analysis of DoS and DDoS attacks in Internet of Things environment. In: Computer Science On-Line Conference. Springer. (2020) . pp. 183–94. doi: 10.1007/978-3-030-51971-1_15.

[161] 

Brenner B, Hummel V. Digital twin as enabler for an innovative digital shop-floor management system in the ESB Logistics Learning Factory at Reutlingen University. Procedia Manuf. (2017) ; 9: : 198–205. doi: 10.1016/j.promfg.2017.04.039.

[162] 

Grieves M, Vickers J. Digital twin: mitigating unpredictable, undesirable emergent behavior in complex systems. In: Transdisciplinary Perspectives on Complex Systems. Springer. (2017) . pp. 85–113.

[163] 

Schluse M, Priggemeyer M, Atorf L, Rossmann J. Experimentable digital twins-streamlining simulation-based systems engineering for industry 4.0. IEEE Trans Ind Inform. (2018) ; 14: (4): 1722–31. doi: 10.1109/TII.2018.2804917.

[164] 

Kaewunruen S, Xu N. Digital twin for sustainability evaluation of railway station buildings. Front Built Environ. (2018) ; 4: : 77. doi: 10.3389/fbuil.2018.00077.

[165] 

Bruynseels K, Santoni de Sio F, Van den Hoven J. Digital twins in health care: Ethical implications of an emerging engineering paradigm. Front Genet. (2018) ; 9: : 31. doi: 10.3389/fgene.2018.00031, PMID 29487613.

[166] 

Kaewunruen S, Rungskunroch P, Welsh J. A digital-twin evaluation of net zero energy building for existing buildings. Sustainability. (2018) ; 11: (1): 159. doi: 10.3390/su11010159.

[167] 

Leng J, Yan D, Liu Q, Xu K, Zhao JL, Shi R, et al. ManuChain: Combining permissioned blockchain with a holistic optimization model as bi-level intelligence for smart manufacturing. IEEE Trans Syst Man Cybern Syst. (2019) ; 50: (1): 182–92. doi: 10.1109/TSMC.2019.2930418.

[168] 

Borth M, Verriet J, Muller G. Digital twin strategies for SoS 4 challenges and 4 architecture setups for digital twins of SoS. In: 14th Annual Conference System of Systems Engineering (SoSE). Vol. 2019. IEEE Publications. (2019) . pp. 164–9. doi: 10.1109/SYSOSE.2019.8753860.

[169] 

Liu C, Vengayil H, Lu Y, Xu X. A cyber-physical machine tools platform using OPC UA and MTConnect. J Manuf Syst. (2019) ; 51: : 61–74. doi: 10.1016/j.jmsy.2019.04.006.

[170] 

Fotland G, Haskins C, Rølvåg T. Trade study to select best alternative for cable and pulley simulation for cranes on offshore vessels. Syst Eng. (2020) ; 23: (2): 177–88. doi: 10.1002/sys.21503.

[171] 

Liu M, Fang S, Dong H, Xu C. Review of digital twin about concepts, technologies, and industrial applications. J Manuf Syst. (2021) ; 58: : 346–61. doi: 10.1016/j.jmsy.2020.06.017.

[172] 

Lv Z, Chen D, Feng H, Wei W, Lv H. Artificial intelligence in underwater digital twins sensor networks. ACM Trans Sens Netw (TOSN). (2022) ; 18: (3): 1–27.

[173] 

Huang W, Zhang Y, Zeng W. Development and application of digital twin technology for integrated regional energy systems in smart cities. Sustain Comput Inform Syst. (2022) ; 36: : 100781. doi: 10.1016/j.suscom.2022.100781.

[174] 

Drago C, Gatto A. An intervalvalued composite indicator for energy efficiency and green entrepreneurship. Bus Strategy Environ. (2022) ; 31: (5): 2107–26. doi: 10.1002/bse.3010.

[175] 

Islam KY, Ahmad I, Habibi D, Waqar A. A survey on energy efficiency in underwater wireless communications. J Netw Comput Appl. (2022) ; 198: : 103295. doi: 10.1016/j.jnca.2021.103295.

[176] 

Li M, Pan X, Yuan S. Do the national industrial relocation demonstration zones have higher regional energy efficiency? Appl Energy. (2022) ; 306: : 117914. doi: 10.1016/j.apenergy.2021.117914.

[177] 

Macharia KK, Gathiaka JK, Ngui D. Energy efficiency in the Kenyan manufacturing sector. Energy Policy. (2022) ; 161: : 112715. doi: 10.1016/j.enpol.2021.112715.

[178] 

Dong F, Li Y, Li K, Zhu J, Zheng L. Can smart city construction improve urban ecological total factor energy efficiency in China? Fresh evidence from generalized synthetic control method. Energy. (2022) ; 241: : 122909. doi: 10.1016/j.energy.2021.122909.

[179] 

Kong X, Duan G, Hou M, Shen G, Wang H, Yan X, et al. Deep reinforcement learning based energy efficient edge computing for internet of vehicles. IEEE Trans Ind Inform. (2022) ; 18: (9): 6308–16. doi: 10.1109/TII.2022.3155162.

[180] 

Alsenwi M, Tun YK, Han Z, Hong CS. N.N. Ei. In: Energy-efficient resource allocation in multi-UAV-assisted two-stage edge computing for beyond 5G networks. IEEE transactions on intelligent transportation systems. (2022) .

[181] 

Xu L, Zhou X, Li Y, Cai F, Yu X, Kumar N. Intelligent power allocation algorithm for energy-efficient mobile internet of things (IoT) networks. IEEE Trans Green Commun Netw. (2022) ; 6: (2): 766–75. doi: 10.1109/TGCN.2022.3144532.

[182] 

Alviola T. Energy efficiency in wireless networks. (2013) .

[183] 

Alraih S, Nordin R, Shayea I, Abdullah NF, Alhammadi A. Ping-pong handover effect reduction in 5G and beyond networks. 2021 IEEE Microwave Theory and Techniques in Wireless Communications (MTTW). (2021) . pp. 97–101. doi: 10.1109/MTTW53539.2021.9607205.

[184] 

Xia D, Shi J, Wan K, Wan J, Martínez-García M, Guan X. Digital twin and artificial intelligence for intelligent planning and energyefficient deployment of 6G networks in smart factories. IEEE Wirel Commun. (2023) ; 30: (3): 171–9. doi: 10.1109/MWC.017.2200495.

[185] 

Amponis G, Radoglou-Grammatikis P, Nakas G, Goudos S, Argyriou V, Lagkas T, et al. 5G core PFCP intrusion detection dataset. In: 12th International Conference on Modern Circuits and Systems Technologies (MOCAST). Vol. 2023. IEEE Publications. (2023) . pp. 1–4. doi: 10.1109/MOCAST57943.2023.10176693.

[186] 

Makai LB, Varga P. Predicting Mobility Management Demands of cellular Networks based on User Behavior. In: Noms IEEE/IFIP Network Operations and Management Symposium. Vol. 2023. IEEE Publications. (2023) . pp. 1–6. doi: 10.1109/NOMS56928.2023.10154215.

[187] 

Malekzadeh M. Performance prediction and enhancement of 5G networks based on linear regression machine learning. EURASIP J Wirel Commun Netw. (2023) ; 2023: (1): 1–34.

[188] 

Selvakumar BSGJ, Soman S, Chandran RK, Raja A, Devarajan BN, Thandapani M. QoS based power allocation in 5G wireless networks. AIP Conf Proc. (2023) ; 2790: (1). doi: 10.1063/5.0152566.

[189] 

Pramod M, Balodi A, Pratik A, Sankalp GS, Varshita B, Amrit R. 4 Energy-Effcient Reinforcement Learning in Wireless Sensor. applications of 5G and beyond in smart cities. (2023) ; 63.