{"id":"https://openalex.org/W2984234948","doi":"https://doi.org/10.1155/2019/4582391","title":"Policy-Based Security Management System for 5G Heterogeneous Networks","display_name":"Policy-Based Security Management System for 5G Heterogeneous Networks","publication_year":2019,"publication_date":"2019-11-14","ids":{"openalex":"https://openalex.org/W2984234948","doi":"https://doi.org/10.1155/2019/4582391","mag":"2984234948"},"language":"en","primary_location":{"id":"doi:10.1155/2019/4582391","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/4582391","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2019/4582391.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/wcmc/2019/4582391.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090343976","display_name":"Hani Alquhayz","orcid":"https://orcid.org/0000-0001-8445-7742"},"institutions":[{"id":"https://openalex.org/I195631090","display_name":"Majmaah University","ror":"https://ror.org/01mcrnj60","country_code":"SA","type":"education","lineage":["https://openalex.org/I195631090"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Hani Alquhayz","raw_affiliation_strings":["Department of Computer Science and Information, College of Science in Zulfi, Majmaah University, Al-Majmaah 11952, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0001-8445-7742","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information, College of Science in Zulfi, Majmaah University, Al-Majmaah 11952, Saudi Arabia","institution_ids":["https://openalex.org/I195631090"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011883455","display_name":"Nasser Alalwan","orcid":"https://orcid.org/0000-0001-6691-4479"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Nasser Alalwan","raw_affiliation_strings":["Department of Computer Science, Community College, King Saud University, Riyadh 11437, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0001-6691-4479","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Community College, King Saud University, Riyadh 11437, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053776267","display_name":"Ahmed Ibrahim Alzahrani","orcid":"https://orcid.org/0000-0001-5903-7383"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Ahmed Ibrahim Alzahrani","raw_affiliation_strings":["Department of Computer Science, Community College, King Saud University, Riyadh 11437, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0001-5903-7383","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Community College, King Saud University, Riyadh 11437, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044675135","display_name":"Ali H. Al\u2010Bayatti","orcid":"https://orcid.org/0000-0002-8062-1258"},"institutions":[{"id":"https://openalex.org/I66943878","display_name":"De Montfort University","ror":"https://ror.org/0312pnr83","country_code":"GB","type":"education","lineage":["https://openalex.org/I66943878"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Ali H. Al-Bayatti","raw_affiliation_strings":["School of Computer Science and Informatics, De Montfort University, Leicester LE1 9BH, UK"],"raw_orcid":"https://orcid.org/0000-0002-8062-1258","affiliations":[{"raw_affiliation_string":"School of Computer Science and Informatics, De Montfort University, Leicester LE1 9BH, UK","institution_ids":["https://openalex.org/I66943878"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070246091","display_name":"Mhd Saeed Sharif","orcid":"https://orcid.org/0000-0002-4008-8049"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mhd Saeed Sharif","raw_affiliation_strings":["School of Architecture, Computing and Engineering, UEL, University Way, Dockland Campus, London E16 2RD, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Architecture, Computing and Engineering, UEL, University Way, Dockland Campus, London E16 2RD, UK","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5044675135","https://openalex.org/A5053776267"],"corresponding_institution_ids":["https://openalex.org/I28022161","https://openalex.org/I66943878"],"apc_list":{"value":2300,"currency":"USD","value_usd":2300},"apc_paid":{"value":2300,"currency":"USD","value_usd":2300},"fwci":0.8475,"has_fulltext":true,"cited_by_count":10,"citation_normalized_percentile":{"value":0.74938436,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"2019","issue":null,"first_page":"1","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8319860696792603},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.5637668371200562},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5510408282279968},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5340983271598816},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.5177813768386841},{"id":"https://openalex.org/keywords/handover","display_name":"Handover","score":0.47825542092323303},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4764676094055176},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.4364606738090515},{"id":"https://openalex.org/keywords/vertical-handover","display_name":"Vertical handover","score":0.41553542017936707},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.41066235303878784},{"id":"https://openalex.org/keywords/heterogeneous-network","display_name":"Heterogeneous network","score":0.3487231135368347},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.30206426978111267}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8319860696792603},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.5637668371200562},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5510408282279968},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5340983271598816},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.5177813768386841},{"id":"https://openalex.org/C111852164","wikidata":"https://www.wikidata.org/wiki/Q1414679","display_name":"Handover","level":2,"score":0.47825542092323303},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4764676094055176},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.4364606738090515},{"id":"https://openalex.org/C2778863105","wikidata":"https://www.wikidata.org/wiki/Q7922836","display_name":"Vertical handover","level":5,"score":0.41553542017936707},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.41066235303878784},{"id":"https://openalex.org/C158207573","wikidata":"https://www.wikidata.org/wiki/Q5747224","display_name":"Heterogeneous network","level":4,"score":0.3487231135368347},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.30206426978111267}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2019/4582391","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/4582391","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2019/4582391.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:8b0d261dfb054eb6a2532df0e24d2e62","is_oa":true,"landing_page_url":"https://doaj.org/article/8b0d261dfb054eb6a2532df0e24d2e62","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wireless Communications and Mobile Computing, Vol 2019 (2019)","raw_type":"article"},{"id":"pmh:oai:dora.dmu.ac.uk:2086/18845","is_oa":true,"landing_page_url":"https://dora.dmu.ac.uk/handle/2086/18845","pdf_url":null,"source":{"id":"https://openalex.org/S4306400394","display_name":"DMU Open Research Archive (De Montfort University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66943878","host_organization_name":"De Montfort University","host_organization_lineage":["https://openalex.org/I66943878"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":{"id":"doi:10.1155/2019/4582391","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/4582391","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2019/4582391.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1313618130","display_name":null,"funder_award_id":"RG-1438-062","funder_id":"https://openalex.org/F4320335726","funder_display_name":"Deanship of Scientific Research, King Saud University"},{"id":"https://openalex.org/G2092790597","display_name":null,"funder_award_id":"RG-1438-062","funder_id":"https://openalex.org/F4320321145","funder_display_name":"King Saud University"}],"funders":[{"id":"https://openalex.org/F4320321145","display_name":"King Saud University","ror":"https://ror.org/02f81g417"},{"id":"https://openalex.org/F4320335726","display_name":"Deanship of Scientific Research, King Saud University","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2984234948.pdf","grobid_xml":"https://content.openalex.org/works/W2984234948.grobid-xml"},"referenced_works_count":12,"referenced_works":["https://openalex.org/W1793086066","https://openalex.org/W1976739636","https://openalex.org/W2054692642","https://openalex.org/W2061022487","https://openalex.org/W2123339119","https://openalex.org/W2156077514","https://openalex.org/W2784786388","https://openalex.org/W2792339401","https://openalex.org/W2910121950","https://openalex.org/W2937471939","https://openalex.org/W4235916016","https://openalex.org/W4240243222"],"related_works":["https://openalex.org/W3183475654","https://openalex.org/W2245568988","https://openalex.org/W2377723824","https://openalex.org/W2344103605","https://openalex.org/W2561470322","https://openalex.org/W2370141073","https://openalex.org/W4206453773","https://openalex.org/W2366627690","https://openalex.org/W2381538496","https://openalex.org/W4205675454"],"abstract_inverted_index":{"Advances":[0],"in":[1],"mobile":[2,43,182],"phone":[3],"technology":[4,45],"and":[5,31,62,68,92,109,124,164,209,226,235],"the":[6,15,22,47,58,89,98,106,129,142,154,157,177,230],"growth":[7],"of":[8,24,42,102,119,128,171,203,222],"associated":[9],"networks":[10,52,108,163],"have":[11,20,146],"been":[12,21],"phenomenal":[13],"over":[14],"last":[16],"decade.":[17],"Therefore,":[18],"they":[19],"focus":[23],"much":[25],"academic":[26],"research,":[27],"driven":[28],"by":[29,60,104],"commercial":[30],"end-user":[32,194],"demands":[33],"for":[34,180,205],"increasingly":[35],"faster":[36],"technology.":[37],"The":[38,169,213],"most":[39],"recent":[40],"generation":[41,49],"network":[44],"is":[46,139,174],"fifth":[48],"(5G).":[50],"5G":[51,103,167,181],"are":[53,126,215],"expected":[54],"to":[55,63,71,78,87,96,175,232],"launch":[56],"across":[57],"world":[59],"2020":[61],"work":[64],"with":[65,156,165,217],"existing":[66,107],"3G":[67],"4G":[69,162],"technologies":[70],"provide":[72],"extreme":[73],"speed":[74],"despite":[75],"being":[76],"limited":[77],"wireless":[79,93],"technologies.":[80],"An":[81],"alternative":[82],"network,":[83],"Y-Communication":[84],"(Y-Comm),":[85],"proposes":[86],"integrate":[88],"current":[90],"wired":[91],"networks,":[94],"attempting":[95],"achieve":[97],"main":[99],"service":[100,113,120],"requirements":[101],"converging":[105],"providing":[110],"an":[111],"improved":[112],"anywhere":[114],"at":[115],"any":[116],"time.":[117],"Quality":[118],"(QoS),":[121],"vertical":[122],"handover,":[123],"security":[125,151,178,189],"some":[127],"technical":[130],"concerns":[131],"resulting":[132],"from":[133],"this":[134,172],"heterogeneity.":[135],"In":[136],"addition,":[137],"it":[138],"believed":[140],"that":[141,193],"Y-Comm":[143],"convergence":[144],"will":[145],"a":[147,187,218],"greater":[148],"influence":[149],"on":[150],"than":[152,224],"was":[153],"case":[155],"previous":[158],"long-term":[159],"evolution":[160],"(LTE)":[161],"future":[166],"networks.":[168,183],"purpose":[170],"research":[173,185],"satisfy":[176],"recommendations":[179],"This":[184,228],"provides":[186],"policy-based":[188],"management":[190],"system,":[191],"ensuring":[192],"devices":[195],"cannot":[196],"be":[197,233],"used":[198],"as":[199],"weapons":[200],"or":[201],"tools":[202],"attack,":[204],"example,":[206],"IP":[207],"spoofing":[208],"man-in-the-middle":[210],"(MITM)":[211],"attacks.":[212],"results":[214],"promising,":[216],"low":[219],"disconnection":[220],"rate":[221],"less":[223],"4%":[225],"7%.":[227],"shows":[229],"system":[231],"robust":[234],"reliable.":[236]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2019-11-22T00:00:00"}
