{"id":"https://openalex.org/W4408235537","doi":"https://doi.org/10.1109/tccn.2025.3549234","title":"IntSHU: A Security-Enabled Intelligent Soft Handover Approach for UAV-Aided 5G and Beyond","display_name":"IntSHU: A Security-Enabled Intelligent Soft Handover Approach for UAV-Aided 5G and Beyond","publication_year":2025,"publication_date":"2025-03-07","ids":{"openalex":"https://openalex.org/W4408235537","doi":"https://doi.org/10.1109/tccn.2025.3549234"},"language":"en","primary_location":{"id":"doi:10.1109/tccn.2025.3549234","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tccn.2025.3549234","pdf_url":null,"source":{"id":"https://openalex.org/S2484188435","display_name":"IEEE Transactions on Cognitive Communications and Networking","issn_l":"2332-7731","issn":["2332-7731","2372-2045"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cognitive Communications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025251681","display_name":"Raja Karmakar","orcid":"https://orcid.org/0000-0003-1916-7743"},"institutions":[{"id":"https://openalex.org/I4210130262","display_name":"Age Institute","ror":"https://ror.org/041bcjv49","country_code":"FI","type":"other","lineage":["https://openalex.org/I4210130262"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Raja Karmakar","raw_affiliation_strings":["Department of Computer Science and Engineering (IoT &#x0026; Cyber Security Including Blockchain Technology), Heritage Institute of Technology, Kolkata, India","Department of Computer Science and Engineering (IoT and Cyber Security including Blockchain Technology), Heritage Institute of Technology, Kolkata, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering (IoT &#x0026; Cyber Security Including Blockchain Technology), Heritage Institute of Technology, Kolkata, India","institution_ids":["https://openalex.org/I4210130262"]},{"raw_affiliation_string":"Department of Computer Science and Engineering (IoT and Cyber Security including Blockchain Technology), Heritage Institute of Technology, Kolkata, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032243366","display_name":"Georges Kaddoum","orcid":"https://orcid.org/0000-0002-5025-6624"},"institutions":[{"id":"https://openalex.org/I9736820","display_name":"\u00c9cole de Technologie Sup\u00e9rieure","ror":"https://ror.org/0020snb74","country_code":"CA","type":"education","lineage":["https://openalex.org/I49663120","https://openalex.org/I9736820"]},{"id":"https://openalex.org/I159129438","display_name":"Universit\u00e9 du Qu\u00e9bec \u00e0 Montr\u00e9al","ror":"https://ror.org/002rjbv21","country_code":"CA","type":"education","lineage":["https://openalex.org/I159129438","https://openalex.org/I49663120"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Georges Kaddoum","raw_affiliation_strings":["Department of Electrical Engineering, ETS, University of Quebec, Montreal, QC, Canada","Department of Electrical Engineering, ETS, University of Quebec, Montreal, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, ETS, University of Quebec, Montreal, QC, Canada","institution_ids":["https://openalex.org/I9736820","https://openalex.org/I159129438"]},{"raw_affiliation_string":"Department of Electrical Engineering, ETS, University of Quebec, Montreal, Canada","institution_ids":["https://openalex.org/I9736820","https://openalex.org/I159129438"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033298817","display_name":"Ouassima Akhrif","orcid":null},"institutions":[{"id":"https://openalex.org/I159129438","display_name":"Universit\u00e9 du Qu\u00e9bec \u00e0 Montr\u00e9al","ror":"https://ror.org/002rjbv21","country_code":"CA","type":"education","lineage":["https://openalex.org/I159129438","https://openalex.org/I49663120"]},{"id":"https://openalex.org/I9736820","display_name":"\u00c9cole de Technologie Sup\u00e9rieure","ror":"https://ror.org/0020snb74","country_code":"CA","type":"education","lineage":["https://openalex.org/I49663120","https://openalex.org/I9736820"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ouassima Akhrif","raw_affiliation_strings":["Department of Electrical Engineering, ETS, University of Quebec, Montreal, QC, Canada","Department of Electrical Engineering, ETS, University of Quebec, Montreal, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, ETS, University of Quebec, Montreal, QC, Canada","institution_ids":["https://openalex.org/I9736820","https://openalex.org/I159129438"]},{"raw_affiliation_string":"Department of Electrical Engineering, ETS, University of Quebec, Montreal, Canada","institution_ids":["https://openalex.org/I9736820","https://openalex.org/I159129438"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5025251681"],"corresponding_institution_ids":["https://openalex.org/I4210130262"],"apc_list":null,"apc_paid":null,"fwci":17.4211,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.98660994,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"11","issue":"6","first_page":"4196","last_page":"4209"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12042","display_name":"Satellite Communication Systems","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7945319414138794},{"id":"https://openalex.org/keywords/handover","display_name":"Handover","score":0.5874813795089722},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35648518800735474}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7945319414138794},{"id":"https://openalex.org/C111852164","wikidata":"https://www.wikidata.org/wiki/Q1414679","display_name":"Handover","level":2,"score":0.5874813795089722},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35648518800735474}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tccn.2025.3549234","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tccn.2025.3549234","pdf_url":null,"source":{"id":"https://openalex.org/S2484188435","display_name":"IEEE Transactions on Cognitive Communications and Networking","issn_l":"2332-7731","issn":["2332-7731","2372-2045"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cognitive Communications and Networking","raw_type":"journal-article"},{"id":"pmh:oai:espace2.etsmtl.ca:30758","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402392","display_name":"Espace \u00c9TS (ETS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1341030882","host_organization_name":"Educational Testing Service","host_organization_lineage":["https://openalex.org/I1341030882"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Non \u00e9valu\u00e9 par les pairs"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.46000000834465027}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2520149731","https://openalex.org/W1981519115","https://openalex.org/W1985631144","https://openalex.org/W2087123996","https://openalex.org/W3111553259","https://openalex.org/W2128480633","https://openalex.org/W2270230623"],"abstract_inverted_index":{"Uncrewed":[0],"aerial":[1],"vehicles":[2],"(UAVs)":[3],"play":[4],"a":[5,38,84,99,105,130,170],"significant":[6],"role":[7],"in":[8,90,113,116,141],"serving":[9],"as":[10],"gNodeBs":[11],"(gNBs),":[12],"or":[13,97],"user":[14],"devices":[15],"(UDs).":[16],"However,":[17,80],"considering":[18],"the":[19,52,114],"high":[20],"data":[21],"rates":[22],"and":[23,31,55,69,72,144,151,178],"low":[24],"latency":[25],"required":[26],"by":[27,201],"fifth":[28],"generation":[29],"(5G)":[30],"beyond,":[32],"it":[33],"is":[34],"essential":[35],"to":[36,45,63,66,87],"maintain":[37],"reliable":[39,203],"connection":[40],"at":[41],"UAVs,":[42],"particularly":[43],"due":[44],"frequent":[46],"handovers.":[47,79,188,205],"To":[48,109],"minimize":[49],"handover":[50,88,100,107],"failures,":[51],"hysteresis":[53,149],"margin":[54],"time-to-trigger":[56],"(TTT)":[57],"should":[58,75],"be":[59,76],"dynamically":[60,154],"adjusted.":[61],"Furthermore,":[62],"prevent":[64],"vulnerabilities":[65],"threats,":[67],"UAV":[68],"gNB":[70],"authentication":[71,101,179],"secure":[73],"communication":[74],"addressed":[77],"during":[78,187],"available":[81],"literature":[82],"uses":[83,147],"learning-based":[85],"approach":[86],"management":[89],"UAV-aided":[91],"5G":[92,143],"networks,":[93],"thereby":[94],"neglecting":[95],"security,":[96],"offers":[98],"mechanism,":[102],"but":[103],"lacks":[104],"novel":[106],"strategy.":[108],"fill":[110],"this":[111,117],"gap":[112],"literature,":[115],"study,":[118],"we":[119,168],"design":[120],"an":[121,157],"Intelligent":[122],"Soft":[123],"Handover":[124],"for":[125,137,183],"UAV-enabled":[126,142],"cellular":[127],"networks":[128],"(IntSHU),":[129],"generative":[131],"adversarial":[132],"network":[133,199],"(GAN)-based":[134],"scheme":[135,180],"designed":[136],"intelligent":[138],"soft":[139,204],"handovers":[140],"beyond.":[145],"IntSHU":[146,196],"adapted":[148],"margins":[150],"TTT":[152],"values,":[153],"generated":[155],"through":[156],"<inline-formula":[158],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[159],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[160],"<tex-math":[161],"notation=\"LaTeX\">$\\epsilon":[162],"$":[163],"</tex-math></inline-formula>-greedy":[164],"policy.":[165],"In":[166],"addition,":[167],"implement":[169],"lightweight,":[171],"physically":[172],"unclonable":[173],"function":[174],"(PUF)-based":[175],"message":[176],"encryption":[177],"via":[181],"blockchain":[182],"streamlined":[184],"access":[185],"control":[186],"The":[189],"results":[190],"of":[191],"our":[192],"simulation":[193],"indicate":[194],"that":[195],"significantly":[197],"enhances":[198],"performance":[200],"facilitating":[202]},"counts_by_year":[{"year":2025,"cited_by_count":5}],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
