0% found this document useful (0 votes)
13 views40 pages

Maiwada Et Al 2024 Energy Efficiency in 5g Systems A Systematic Literature Review

This systematic literature review examines energy efficiency in 5G systems, focusing on the role of Digital Twin (DT) and Intrusion Detection (ID) techniques in mitigating Distributed Denial of Service (DDoS) attacks and enhancing Quality of Service (QoS). The study highlights the importance of energy-efficient strategies and the potential benefits of integrating DT technology to optimize network performance and sustainability. The findings indicate that effective ID methods can significantly reduce energy consumption and improve the overall resilience of 5G networks.

Uploaded by

l6858850
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views40 pages

Maiwada Et Al 2024 Energy Efficiency in 5g Systems A Systematic Literature Review

This systematic literature review examines energy efficiency in 5G systems, focusing on the role of Digital Twin (DT) and Intrusion Detection (ID) techniques in mitigating Distributed Denial of Service (DDoS) attacks and enhancing Quality of Service (QoS). The study highlights the importance of energy-efficient strategies and the potential benefits of integrating DT technology to optimize network performance and sustainability. The findings indicate that effective ID methods can significantly reduce energy consumption and improve the overall resilience of 5G networks.

Uploaded by

l6858850
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

International Journal of Knowledge-based and Intelligent Engineering Systems 28 (2024) 93–132 93

DOI 10.3233/KES-230061
IOS Press

Energy efficiency in 5G systems:


A systematic literature review

Umar Danjuma Maiwadaa,d,∗ , Kamaluddeen Usman Danyaroa , Aliza Sarlana , M.S. Liewb ,
Ayankunle Taiwoc and Umar Ismaila Audia
a Computer and Information Sciences Department, Faculty of Science and Information Technology,
Universiti Teknologi PETRONAS, Perak, Malaysia
b Civil & Environmental Engineering Department, Faculty of Engineering, Universiti Teknologi

PETRONAS, Perak, Malaysia


c Computer Information Technology Department, Schreiner University, Kerrville, Texas, TX, USA
d Computer Science Department, Faculty of Natural and Applied Sciences, Umaru Musa Yar’adua

University Katsina, Nigeria

Received 13 May 2023


Accepted 25 October 2023

Abstract. To ensure Energy Efficiency (EE) and better Quality of service (QoS), it is necessary to analyze the energy saving
possibilities for low resource utilization in the current networks caused by rigorous QoS requirements and implementing EE
approach in the planned model for performance improvement. Distributed Denial of Service (DDoS) attacks aim to exhaust
the network’s processing and communication capacity by saturating it with packets and generating malicious traffic. There are
numerous advantages that make Digital Twin (DT) and Intrusion Detection technique (ID) an effective remedy for a range of
(fifth generation) 5G problems. A DDoS attack must be immediately detected and stopped before a legitimate user can access the
target of the attacker for the 5G network to provide an efficient energy service. Although they clearly show promise in assisting
with the creation and implementation of the challenging 5G environment, Digital Twins is still a relatively new technology for
5G networks but will increase EE. In this research, a thorough examination of the materials was carried out to identify the most
cutting-edge DT and ID methods. The purpose of this study was to comprehend the problems with Energy Efficiency, the need
for DT, and the methods for dealing with large-scale attack by DDoS on Energy Efficient networks. Only 94 of the 1555 articles
produced by the procedure were determined to be relevant using inclusion and exclusion criteria. The outcome demonstrates that
in 5G networks, DT, and its fundamental approaches, like QoS and DDoS attack mitigation, can be used to regulate the network’s
Energy Efficiency. Numerous practical applications focusing on 5G Systems use their own principles. The effectiveness of these
strategies was evaluated using several assessment criteria, including DT, Intrusion Detection, QoS, Energy Efficiency, and 5G
Systems. Each study issue is thoroughly explained, along with typical methods, advantages, disadvantages, and performance
metrics. Energy economy, network reliability, privacy, and cost reduction are all considerably increased by the implementation of
intrusion detection technology in 5G systems. The decision is supported by the technology’s demonstrated efficacy, scalability,
real-time detection capacities, low error level, and personalized learning attributes, all of which contribute to the long-term viability
of 5G networks as an entire system.

Keywords: Digital twin, energy efficiency in 5G, wireless network, intrusion detection

1. Introduction

Previous studies on 5G cellular systems have been motivated by the exponential growth of consumers


Corresponding author: Umar Danjuma Maiwada, Computer and Information Sciences Department, Faculty of Science
and Information Technology, Universiti Teknologi PETRONAS, Perak, Malaysia. E-mails: [email protected] and
[email protected].

ISSN 1327-2314/$35.00 c 2024 – IOS Press. All rights reserved.


94 U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review

who depend on mobile devices such as wireless broadband services, mobile phones, and other smart
devices. These portable devices are operated by a battery, which is a fixed power source. The limited
power source of battery-powered wireless devices is an important barrier to the creation of ever-more-
sophisticated technology, including the highly desired “smart” phones. Research on larger batteries has
already been the focus of the articles published recently. On the other hand, the slow advancement of
battery capacity may keep up with the quick development of mobile and Internet technologies. Instead,
scientists are currently working to improve the Energy Efficiency of every network tier. Creating green
networks or Energy Efficient computer network architectures is one such attempt (s) [1].
To make real items and pertinent sources of data accessible to programs and users through digital
channels, the concept of the “Digital Twin” (DT) emerged. Research agents, avatars, virtual twins, virtual
products, and digital counterparts are all phrases used to represent ideas that are similar or partially
overlap [2]. DT is defined as the relationship between the physical and virtual commodities as well as the
physical and digital products. DT enables simultaneous communication with the physical twin in both
ways. A DT can be used by interested parties that read the data from the physical product, assess it, and
execute simulations. Actuation instructions, control signals, as well as other information may be sent
to the physical twin using a DT [3]. By reviewing the DTs of the various components, developers and
engineers can choose, create, and implement the necessary integrations, interfaces, and telecommunication
linkages despite having specific understanding of each component. Eventually, the devices might be able
to communicate with one another without the assistance of a human programmer. The most cutting-edge
technologies can build virtual worlds with a real-world appearance and feel concurrent movement between
the real world and the virtual world. Furthermore, smartphones have eliminated the need for complex
sensor installations by enabling real-time monitoring of a variety of data sources directly from the user.
This knowledge could be used to add features from the actual world to virtual environments [4]. Global
adoption of fifth generation (5G) technologies for mobile communication is imminent. Currently, 5G is
being implemented in modest locations across practically all continents, with a greater number of networks
being made available in the United States and Europe [5]. By 2025, 5G is anticipated to represent at least
15% of the entire mobile communications industry [6]. As a result, it is imperative to consider how 5G
may affect key fields of research in data management and processing, including databases, distributed
systems, block-chain, deep learning, machine leaning, and cryptography.
Continual prototype, validation, self-optimization, and verification of the live network are made possible
by the 5G Digital Twin, a revolutionary technique to test results and assurance that offers a program replica
of 5G physical network. So, it is also necessary to have a virtualized solution that can create a digital version
and accurately represent the 5G ecosystem. This will help in overcoming all the difficulties and meeting the
5G requirements. The DT can assess performance, forecast the impact of environmental change, and, more
importantly, optimize 5G network operations and decision-making. For conducting operational forecasts
and enforcing proper decision into the living network and related systems, the digital 5G model will
cohabit with the actual 5G network in the 5G DT. A dependable, high performance, exceptionally fast
internet connection using cutting-edge networking technology is a crucial necessity for the integration
and deployment of all the technologies in the digitization process. One of the primary pillars of a digital
transformation process is the Digital Twin technology. It makes it possible to reproduce physical systems
digitally, which has a few advantages like real-time monitoring, enhanced production, and efficiency [7].
In this systematic literature review (SLR), we suggested a solution to the issues raised above by doing
a thorough literature assessment of the textual data domains related to Energy Efficiency. The research
was well performed and has contributed to the newly added disciplines of 5G network, DDoS, and Digital
Twin. Additionally, we chose publications that cover the fundamental performance assessment and internet
data approaches. Energy Efficiency difficulties, DDoS attacks, a 5G network, and a Digital Twin’s model
are all included in the state-of-the-art SLR.
U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review 95

The research questions were chosen to highlight the areas that concentrate on the problem of Energy
Efficiency. How the 5G network strategy would help the fundamental methods that can handle DDoS,
and which algorithms are suited based on efficiency. The goals of the proposed SLR are to comprehend
the Energy Efficiency problems of 5G networks encounter. Also, to change the problem by substituting
a Digital Twin model and Intrusion Detection technique with performance measuring methods for the
5G network. With the use of the Digital Twin concept and Intrusion Detection technique, this study will
benefit the mobile network research community. The network security will also benefit by the prevention,
effectiveness, and Quality of Service (QoS) of the 5G network.
The contributions of enhancing energy efficiency in 5G systems through the adoption of an intrusion
detection method are substantial and multifaceted. Implementing an efficient intrusion detection method in
5G systems helps reduce energy consumption. By accurately identifying and mitigating security threats,
the system can avoid unnecessary resource-intensive processes triggered by malicious activities. This
contributes to a more sustainable and eco-friendlier 5G network. Extensive research and empirical evidence
support the chosen intrusion detection method’s effectiveness in identifying and mitigating security threats
in 5G systems. It has demonstrated superior performance compared to previous methods, making it a
reliable choice. In conclusion, the adoption of an intrusion detection method in 5G systems contributes
significantly to energy efficiency, network performance, security, and cost savings. The choice is justified
by its proven effectiveness, scalability, real-time detection capabilities, low false positive rate, and adaptive
learning features, all of which collectively enhance the overall resilience and sustainability of 5G networks.
The paper is organized into sections; Section 1 introduction, Section 2 literatures, Section 3 methodology,
Section 4 result, Section 5 discussion and finally conclusion significance and contribution.

2. 5G technology

It was estimated that 5G would enable $12.3 trillion in global economic output and support 22 million
jobs by 2035. Although 5G has enormous potential, obtaining those benefits will still be challenging. It has
been a vast interconnected network of everything, 5G systems. Its applications include all the demanding
high data rates (such as video games), ultrareliable and rapid connections (such as in autonomous factories),
and machine-type devices that run on batteries. Because of this, 5G network components are incredibly
complicated, and the creation and deployment of these networks will be plagued with financial and technical
risks. The deployment of 5G aims to enable fully autonomous driving and efficient communication between
connected cars, which might enhance traffic management and road safety [8]. Support for these connected
car services as well as a new software program will be made possible by the provision of ultra-reliable
latency low communications (URLLC) via 5G Systems. Car makers will be able to observe how their
vehicles respond in a variety of road-specific scenarios, such as parking, pedestrians, traffic, weather, along
with 5G connectivity scenarios, and the 5G emulator. Given that the automotive industry relies on 5G
Systems to power essential functions, this degree of testing could aid in accelerating the acceptance and
implementation of driverless vehicles in a safe, dependable, and secure manner. New research models
have made a lot of promises to 5G Systems, the demands of different services impede the network rollout.
This scope for every strategic plan is different for each provider, therefore these objectives may not be
compatible [9].
Due to the complex nature, that comprises of a lack of data to enhance the system, including user
behaviors and channel characteristics, building an ideal 5G network in one go is therefore not practical.
When enough accurate data is unavailable before the scheduling technique, there is a bottleneck. The
5G commercialization process is still in its infancy. The 5G network has the potential to alter the current
wireless network with its enhanced capabilities and cutting-edge features. 5G new radio (5G NR) is the
name of the global 5G standard. The cornerstone of industrial development is emerging as 5G networks
96 U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review

based on digitization and improved communication. It has promised to provide stable services at incredibly
fast rates with almost no latency. Anybody, anywhere, at any time will be able to access mobile and fixed
broadband services in 5G.

3. Energy Efficiency
Energy Efficient cellular radio resource management is one of the best ways to reduce the energy usage
of wireless devices. Developing heterogeneous networks with a combination of microcells, macrocells,
femtocells, and picocells will be more efficient. Various backhaul and cooperative communications need
also be considered in addition to Energy Efficient cell-size design. Therefore, a great way to improve
Energy Efficiency is by establishing Energy Efficient base stations then switching off as many base stations
as you can. It is essential to increase the Energy Efficiency of wireless cellular networks. To make wireless
cellular networks more Energy Efficient, extensive research must be done. It simply relates to a user
equipment (UE’s) battery and has since developed into a crucial part of UE designs. Metrics including
UE power usage, UE battery capacity, and UE transmitting power are part of current research efforts.
The first objective that must be addressed is Energy Efficiency. The use of femtocells is one of the most
promising methods for improving the Energy Efficiency of future networks. The corresponding energy
consumption is growing at an astounding rate along with the rapid and radical spread of information and
communication technologies (ICT). Additionally, it has been reported that mobile providers continue to
rank among the biggest energy consumers. Digi Malaysia, for instance, is among Malaysia’s top energy
consumers. From another point of view, the energy consumption of mobile networks is growing far more
quickly than ICT. Hence, once 4G systems are completely implemented in developing countries (like
China and Malaysia), 5G systems will thereafter be implemented globally. If nothing is done, mobile
communications will consume a lot more energy in terms of network [10].
A wirelessly base station (BS) uses a substantial amount of energy, which results in a high electricity
bill. The cognitive radio component consumes over half of the overall energy, while the power amplifier
(PA) uses the remaining 50–80 percent. Therefore, from the perspective of the operators, Energy Efficiency
(EE) also does not show social commitment in the fight against climate change and has great ecological
advantages, but it also has significant business advantages. As a result, it is crucial to switch from
optimizing throughput and bandwidth efficiency to improving energy use when creating wireless networks.
From the perspective of consumers, Energy Efficient wireless technology is also crucial [11]. Latest
research involving Energy Efficient wireless networks was also discussed, along with several significant
international projects for these networks. To start building Energy Efficient wireless networks, the Multi
Input Multi Output (MIMO) and rotational symmetric level of coverage transmission method orthogonal
frequency-division multiplexing (OFDM) techniques are required. Implementation methods of Energy
Efficient system resource management needs various relay, collaborative communications and cross-layer
optimizations to be introduced.

4. Qaulity of service (QoS)


The 5G service’s lowest number of granularities, the QoS flow, is where policies and fees are imple-
mented. Several or more Service data flows (SDFs) may be given in the same QoS flow if they adhere
to the same policy and billing guidelines (almost like an EPS bearer in 4G long term evolution (LTE)).
As in Fig. 1, every traffic contained within the same QoS route is handled equally. Differentiating LTE
compliant customers and services is made possible by LTE QoS. Compared to basic customers, premium
members have an advantage, and it is possible to prioritize real-time services over non-real-time services.
As everyone is aware, an unloaded network cannot interfere with the transmission of services to LTE
consumers. When the network is overloaded, the real problem arises in LTE and QoS is being deployed
U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review 97

Fig. 1. Model of QoS for assessing Energy Efficiency.

during this time for assessment. Prioritization identifies which users are performing well and those who are
not as the demand on the network rises [12].

5. Related works

Based on the research findings, the primary challenge revolves around optimizing every layer of the
network through various methods. While significant progress has been made, there are still gaps to address,
particularly in terms of Energy Efficiency and Security. Most research efforts have concentrated on aspects
of the Physical, Session, and Data Link layers. However, there is a need for more attention to the Session,
Transport, and Network layers. Through experiments, Energy Efficiency has been achieved for a specific
duration. Some of the outcomes have raised concerns related to femtocell size and type, as well as issues
like random handovers, which can lead to unnecessary handovers, thereby diminishing mobility efficiency.
Additionally, these experiments have revealed challenges associated with inappropriate selection due to
parameter changes during cell transitions, potentially creating opportunities for DDoS attacks through the
transmission of superfluous packets. What sets this research apart is its focus on three key areas. Firstly,
it explores the realm of 5G networks and how Energy Efficiency can be effectively managed within this
context. Furthermore, it delves into the concept of Digital Twins in 5G wireless networks, which not only
addresses DDoS attacks from the sender side but also seeks to enhance Energy Efficiency in the realm of
5G wireless technology.

6. Research methodology

Following the recommendations in references [13,14], the Systematic Literature Review (SLR) was
conducted. Three phases make up the research process. The processes of designing and validating review
protocols, as well as defining research questions, are covered in the initial planning phase. Data extraction,
information synthesis, and the finding/selection of pertinent research are addressed in the second step.
Writing and verifying the review are covered in the third phase. The three phases of flow are shown in
Fig. 2 and the methodology flow is shown in Fig. 3.
98 U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review

Name of author Problem Method Result


Z. Mike et al., Complex difficulties in the real Online investigation of the power With only a sub-second latency, it
2019 world Consider the power grid. system using a large-scale network tracks or mirrors the operating
model. condition of a large-scale Power
grid in real-time.
C.K. Lo et al., Examine DT advancement in Conceptual design, detailed It has been discovered that using
2021 product design and learn about DT design, design verification, and data from existing product DT, DT
trends in prominent research fields. redesign are the four categories for may successfully aid in concept
methodology adoption. creation and redesign.
Q. Qinglin et Current tools may not be able to be The research looked at and The document gives broad
al., 2021 integrated and utilized summarized the technology and guidelines for enabling
concurrently for a certain goal due techniques that make DT possible. technologies, as well as some
to differences in formats, examples of tools and how to
protocols, and standards. choose them.
D. Rui et al., Too much energy is used, and To train the DL algorithm, like a Improve the EE of users in a MEC
2019 resource allocation and job Digital Twin of the real network is system, while keeping in mind the
offloading strategies are not used. Ultra-Reliable Low Latency URLLC services’ latency and
optimized. Mechanical Communications (URLLC). reliability limits, as well as the
environmental control (MEC). stability requirements of delay
tolerant services.
Sh. Zh. Seilov Several real-world issues with Design, building, and operation of Monitoring traffic, including its
et al., 2021 sophisticated telecommunications equipment, as well as the creation normal behavior, helps prevent
networks. of modernization concepts. erroneous actions in emergency
circumstances and to become a
useful instrument for undertaking
multidisciplinary research.
D. Xia et al., Every channel’s traffic flow is Fast Entropy Approach. The adaptive threshold technique is
2023 calculated. There is an assault if used to keep track of the network’s
the flow count value is large; ongoing flow.
entropy reduces dramatically.
G. Amponis et The attack characteristics and Stone method. The Stone system and the data
al., 2023 tolerance level of a system are control center identify and mitigate
determined by utilizing traffic.
fundamental information.
Y. Siriwardhana How can wireless local area WLAN environments using Energy-Efficient The key
et al., 2021 network (WLAN) energy models real-world measurements. Wireless contributions are WTLS security
be made more accurate and transport layer security (WTLS). protocol adjustments on the energy
efficient to model big and Internet protocol security (IPSec). spent by the IPSec protocol, which
complicated wireless networks? result in Energy-Efficient and
secure wireless networks.
P. Stavropoulos Diagnose problems and make Artificial Intelligent (AI) is used to Improved Energy Efficiency is used
et al., 2022 necessary changes. anticipate a vehicle’s Energy to improve the behavior and
Efficiency performance. performance of connected cars in a
controlled realistic environment.
L.B. Makai et Manage user with access points. Suggest two mobility management In femtocells, we looked at several
al., 2023 strategies. issues that reduced signal traffic.
I. Budhiraja et Network security. Avoids unwanted handovers using Increased network capacity and
al., 2018 mobile velocity. coverage.
V. Chauhan., When a mobile phone is turned on, Spatial multiplexing. LTE networks have achieved a
2018 how do you get bandwidth? downlink peak data rate of 300
Mps.
A. Mauri et al., Boundary fluctuation. Two consecutive handovers. If the signal at the source and
2020 destination eNodeBs is equal, the
UE transfers between them.
D. Xenakis et Femtocell deployment density. Handover (HO) decision The macrocell-femtocell LTE
al., 2018 algorithms in the presence of LTE network’s HO decision strategy
femtocells. tends to minimize transmit power at
mobile terminals.
U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review 99

Name of author Problem Method Result


M. Malekzadeh, To provide QoS, multiple types or In terms of speed, latency (delay),A basic Quality of Service (QoS)
2023 streams of data are delivered with and jitter, several service levels theory for the 5G LTE service is
packet faults or loss. were employed. offered.
B.S.G.J. Multiple macrocell multiple Energy consumption. Network con- It uses a mix of NCL and CSG to
Selvakumar et femtocell. trol language (NCL). solve the problem of cell search and
al., 2023 Content service gateway (CSG). it has been achieved by addressing
the issue.
Maiwada et al., In a densely deployed femtocell Probability of handover occurrence The algorithm handles CSG and
2020 deployment scenario, the non-CSG member UEs’ inbound,
alternative option is hop-on outbound, and intra-cell handovers.
hop-off handover.
M. Pramod et Wireless Sensor Network (WSN) A cross layer design methodology The outcomes show a significant
al., 2023 is known to be a highly resource was adopted to design an energy improvement in the WSN in terms
constrained class of network where efficient routing protocol entitled of energy efficiency and the overall
energy consumption is one of the “Position Responsive Routing performance of WSN.
prime concerns. Protocol” (PRRP).
M.K. Hasan et The existing research have Network Slicing and scrubbing When an attack is identified with
al., 2022 discussed various issues in 5G, and center. sample thresholds, the traffic is di-
the security risks associated with verted to a specific data center
IoT. where the packet is inspected, the
content with the.
Attack is removed and the original
data is allowed to pass through the
network.
A. Keiser., 2020 DDoS is a present and growing High-end Solution: Scrubbing The solution is integrated with
threat. In this post, I will make the Centers. Deep Packet Inspection (DPI), uses
case that 5G increases the DDoS machine learning to centrally
threat. analyze ratios of inbound and
outbound traffic, it detects
unfamiliar patterns, which provides
future-proof security.

6.1. Phase 1 – plan review

The appropriate searching strategy is used to specify the important research questions and the creation
of review protocols in this first stage of the research technique.

1) Research questions
The research questions which are posed in this SLR were presented, and potentially all of them are later
addressed with appropriate solutions.
RQ #1: Which of the domains focuses primarily on 5G Systems research?
Finding the relevance of Digital Twin in 5G Systems by communication, network, industries, businesses,
websites, and hospitals via models, frameworks, or apps is the driving force behind this research question.
5G Systems Energy Efficiency are exceedingly difficult to handle but crucial for networks, communication,
businesses, industry, and organizations.
RQ #2: How can Digital Twin address the 5G System’s difficulties with Energy Efficiency?
This research question is related to Digital Twin. Its goal is to use the most up-to-date tools and
methodologies to evaluate the models, frameworks, and applications that handle the Energy Efficiency
of network using Digital Twins of 5G Systems. Additionally, a different approach was used to collect
pertinent data, utilizing phrases like “DDoS,” “Handoff,” and “Intrusion Detection”.
RQ #3: What methods can be employed to address the issues of Energy Efficiency in 5G Systems?
Identifying the issues that hindered the inefficiency in 5G Systems and the methods applied to the
problems of sending, controlling, and availability of resources is the aim of this research question. Sending,
retrieving, and efficiency of network can all be done using bandwidth, transmission error method. It
100 U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review

Fig. 2. SLR process.

is also utilized for Energy Efficiency and resource availability. As a result, detailed Energy Efficiency
methodologies, detection, and prevention measures are later evaluated.
RQ #4: How can QoS be used to increase the Energy Efficient of a network?
The phrase “Quality of Service” (QoS) refers to measurements of a service’s overall performance as
seen by network users. Various service-related factors are taken into consideration while calculating QoS,
including transmission errors, data rates, bandwidth, different patterns, availability, jitter, and more. The
ability of a communication network to provide a service at an assured service level is referred to as QoS.
The cornerstone of quality of experience is a satisfied client in terms of capacity, accessibility, and service
integrity.
RQ #5: Which algorithms are more effective in terms of Energy Efficiency for DDoS attacks in 5G
Systems?
The primary goal of this research question is to evaluate the effectiveness of algorithms for DDoS in
Energy Efficiency with 5G Systems. The DDoS attacks are entirely based on methodologies, resource
availability, and Intrusion Detection mechanism.

2) Review protocols
The creation and verification of the reviewed methodology put a focus on finding relevant articles using
relevant keywords and research sources.

(a) Searching keywords


An effort has been made to focus our search on the most pertinent search phrase to ensure that the
evaluation closely covers Digital Twin and Energy Efficiency for 5G Systems.
As a result, we begin with the keywords and then completed the following steps:
U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review 101

Table 1
Inclusion and exclusion criteria description
Id Keywords
1 (“Digital Twin” AND “5G network”)
2 (“Energy Efficiency” OR in AND “5G Systems” AND using OR “Digital Twin”)
3 (“Energy Efficiency” AND in OR “5G Systems”)
4 ((“Energy Efficiency” AND in OR “5G Systems”) OR (“Digital Twin” AND “5G network”))
5 ((“Energy Efficiency” OR in AND “5G Systems”) AND (“Digital Twin” OR “5G network”))
6 ((“Energy Efficiency” OR in OR “5G Systems”) OR (“Digital Twin” OR “5G network”))
7 ((“Energy Efficiency” AND in AND “5G Systems”) OR (“Digital Twin” AND “5G network”))
8 ((“Energy Efficiency” OR in OR “5G Systems”) AND (“Digital Twin” OR “5G network”))
9 ((“Energy Efficiency” OR in OR “5G Systems” OR using OR “Digital Twin”))
10 (“Energy Efficiency” AND in OR “5G Systems” OR using AND “Digital Twin”)
11 (“Energy Efficiency” AND “5G systems”)
12 (“Energy Efficiency” AND “Digital Twin”)
13 (“5G Systems” AND “DDoS”)
14 (“Energy Efficiency” AND “DDoS”)

Fig. 3. Methodology flow.

– Taking the key terms from our study questions and separating them.
– Using alternative term spellings.
– Replacing the search queries with relevant papers’ keywords.
To find the most immediately pertinent articles in the literature, we used the primary alternatives and
included the “OR operator” and “AND operator,” as shown in Table 1.
102 U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review

Table 2
(a) Inclusion criteria description and (b) exclusion criteria description
(a) Inclusion criteria
The research has relevance to 5G Systems.
The Digital Twin is directly relevant to the research.
The research focuses on DDoS attacks and Energy Efficiency.
Techniques for measuring performance were used in the research.
The research employed the use of 5G System related like DT, EE, ID, and HO methodologies.
The most recent and comprehensive publication was chosen where there were multiple articles on the same subject.
This only pertains to one study, but there were two instances of related work in that study.
Latest publications in the topic of network and communication search.
(b) Exclusion criteria
Research’s that was unrelated to the domain of Energy Efficiency, Digital Twin in 5G Systems was excluded.
They appeared in our search because of the terms “5G System” and “Energy Efficiency” being incorrectly used to denote
conventional Gaming and musical activity. Selected research is shown in Table 1.
Publications written in a language other than English.
Academic works that are not fully texted.
Papers that served as the workshop’s opening presentation.

Table 3
Quality checklist
No. Questions
1 Did the research concentrate on the Energy Efficiency of 5G Systems’ Digital Twin?
2 Was the research a description of the 5G Digital Twin network for improving Energy Efficiency?
3 A concept for the 5G Digital Twin network, has it been proposed?
4 Is the research concentrating on the fundamental DT, DDoS, QoS, ID and EE approaches for 5G Systems?
5 Has the research examined the model performance utilizing fundamental methods?

(b) Literature resources


Primary review studies: for the selection of pertinent publications, the databases that were used for
this SLR include Google scholar, NCJ, Web of Science, Scopus, ACM Digital Library, Springer, Science
Direct, and IEEE Explorer. These databases have the most comprehensive collection of high-caliber articles
in our field, including ISI and Scopus indexed articles. The extensive search tools offered by all these
databases were used to create the search term. Our search covered the years 2018 through 2022.

6.2. Phase 2 – conduct review

We carried out the review at this step-in accordance with the research questions, protocols, and keywords.
As per Table 2(a) and (b), this phase focuses mostly on the addition and elimination of publications.

1) Study selection
Figure 4 provides an illustration of the entire research selection procedure. During the process of
identifying relevant studies, 1555 articles were found when we searched online. A few 194 papers were
short-listed by using screening with name, term, inclusion, and exclusion criteria. Table 2(a) and (b) define
inclusion and exclusion criteria. There were 25 articles from many areas, including music, physics, gaming,
social science, and other languages, and there were 35 items that had already been published in other
databases. After thorough reading, 40 items are finally dropped from the list.
The selection criteria for the related publications according to keywords are described in Table 2(a) and
(b). Articles that are duplicates or do not address all questions are discarded.
The standard evaluation questions for evaluating research are shown in Table 3. The major purposes of
the questions are to pick studies that are more thorough, relevant, and that address all research questions.
U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review 103

Table 4
Data extraction
Study
Research Project Approaches to the Problem
RQ1: 5G Systems
RQ2: Digital Twin’s network
RQ3: Energy Efficiency
RQ4: QoS
RQ5: Distributed Denial of Service

Table 5
RQ studies
RQ Studies
5G systems 30
Digital Twin’s network 11
Energy Efficiency 28
QoS 6
Distributed Denial of Service 19

2) Data extraction
We employed the data-extraction techniques listed in Table 4 to gather the information required to
answer our research issues and make our contributions.

3) Information synthesis
The gathered information was consolidated at this point to respond to the study questions. The narrative
synthesis approach was employed to answer our study questions. As a result, we presented our findings
using tables and charts.

6.3. Report review

The five research questions were answered using data that was taken from the primary studies. In the
reporting of the results, the recommendations of the references [15,16] were strictly adhered to.

7. Result

This section discusses Energy Efficiency and 5G Systems, including how they are now being used and
some fresh ideas for potential new research directions in networks for Digital Twin consideration. The
system of Intrusion Detection has made remarkable contributions to numerous DDoS problem-solving
techniques during the past few years. Furthermore, a lot of thorough study into 5G Systems is emerging to
further improve the Digital Twin’s network. The detailed organization of the summary of chosen studies is
shown. This review covered a maximum of 94 papers. As indicated in Table 5, 30 research emphasized the
RQ1, 11 research addressed Digital Twin network, 28 studies concentrated on Energy Efficiency, QoS has
only 6 papers covered, and 19 studies demonstrated how DDoS attacks the network.
The number of studies selected per year is shown in Fig. 5. In 2018, there were 6 research, and in 2019,
the number of linked research studies increased to 11, for example. 19 studies were discovered in 2020,
and 31 and 34 in 2021 and 2022, respectively.
Figure 6 shows a map of the world showing the locations of the nations that contributed to the above-
mentioned study questions. Each research question’s research discussion is presented.
104 U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review

Fig. 4. Process of identifying relevant studies.

Fig. 5. Studies selected per year.

7.1. Which of the domains focuses primarily on 5G systems research?

This section reviews 30 studies that covered 5G Systems. A list of accomplishments to 5G Systems is
provided here. The Unmanned Aerial Vehicles (UAVs), a new area of aerial robotics, have drawn a lot
of attention from researchers in the field of wireless networking. Swarms of UAV will begin to populate
the skies of our smart cities as soon as national laws permit them to fly autonomously [17]. These UAVs
will be used for a variety of tasks, including delivery services, infrastructure monitoring, event recording,
surveillance, and tracking. 5G/B5G cellular networks are advantageous for the UAV ecosystem because
they may be used in a variety of ways to improve UAV communications. These smart gadgets provide a
huge variety of communication systems and use cases due to the intrinsic properties of UAVs pertaining to
flexible movement in 3-dimensional model, autonomous operation, and intelligent placement. With the
UAV being incorporated as a fresh aerial User Equipment (UE) to establish cellular networks, the UAV
intends to present an in-depth investigation of incorporation efficiencies between 5G/B5G communication
network and UAV technology [18]. The UAVs in this integration take on the function of flying users while
in cellular coverage, hence the phrase “cellular-connected UAVs.” The UAV’s major goal is to give a
thorough analysis of integration difficulties along with significant 5G/B5G technological advancements
and current work on design development and field tests supporting cellular-connected UAVs. The UAV
covers current third generation partnership project (3GPP) standardization progress updates and underlines
U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review 105

Fig. 6. Choropleth map displaying the global publishing distribution by nation.

socioeconomic considerations that must be taken into consideration before this potential technology is
successfully used [19].
To satisfy the demands for large frequencies, low latency, high performance, and high dependability,
certain nations have begun developing 5G networks. Applications based on the Internet of Things (IoT) are
also growing daily [20]. 5G would make it possible for more Internet of Things applications, including
connected autos that can manage traffic. It will be crucial to take security issues into account once 5G
and IoT are combined. The current research has covered a range of 5G concerns as well as the security
risks posed by IoT. The repercussions of the most serious cyberattack, known as a Distributed Denial of
Service (DDoS), call for a lot of attention, making finding solutions essential. As a result, an overview
of the development of 5G technology allows IoT applications, and the size of DDoS attacks in such
applications [21].
Numerous systems and gadgets are connected via 5G in almost real time, which has both advantages
and disadvantages. To accelerate the safe delivery of 5G-enabled prospects to market, MITRE and its
collaborators are validating the technology, policy, and standards. Many of us learn about 5G through
advertisements. Therefore, it makes sense that people could assume that this 5th wireless technology will
lead to quicker internet or the next step in gaming. However, the opportunities go well beyond consumer
device improvements [22].
Globally, 5G network commercialization is accelerating. 5G communications are viewed from the
viewpoint of industries drivers as being essential for improvements to consumer consumption experiences
and digital industrial revolution. Globally significant economies need 5G to be a crucial component
of long-term industrialization [23]. In terms of business, 5G will penetrate hundreds of industries, and
technically, 5G must further combine DOICT and other technologies. Hence, the suggestions made are
106 U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review

that ongoing study on the 5G advanced network’s needs further evolution [24].
The link between online consumer behavior and e-commerce Quality of Service to better understand
consumer psychology activities and lower the risks associated with cost control for businesses needs
to be examined. It also hopes to study e-commerce by segmenting online consumer groups [25]. The
consumer consumption patterns and expenses using 5G technology needs tracking. First, it is determined
that the core service performance, system performance, performance, guarantee and completion, as well
as the performance of after-sales service, are the e-commerce Quality of Service assessment factors
based on the body of existing literary works and interviews conducted with online consumers. The
reliability of the collection variables was examined using SPSS software for statistical analysis based
on the information gathered from the questionnaire in Y. Si research, thereby raising the caliber of the
sample data. On these measurement items, they run a statistical analysis that is descriptive. Through the
examination of experimental examples, it can be demonstrated that the deployment of 5G technology can
very well fit consumers’ consumption habits and messaging demands and can assess the reliability of
e-commerce operations more correctly and scientifically. Each characteristic calculates the relevance of
each dimension [26].
5G is now in its early stages of commercialization. With its improved capabilities and cutting-edge
features, the 5G System will completely transform the current wireless network. The Third-Generation
Partnership Project (3GPP) is currently working on 5G New Radio (5G NR), also known as the global
standardization of 5G, which may operate over a variety of bandwidths from less than 6 GHz to Millimeter
wave (mmWave) (100 GHz). The three core 5G NR use cases – Ultra-Reliable and Low Latency Commu-
nication (uRLLC), Mega Machine Type Communication (mMTC), and Enhanced Mobile Broadband – are
the main areas to look at for 3GPP Enhanced mobile broadband (eMBB). In comparison to LTE systems,
several features such as scalable numerology, flexible spectrum, onward compatibility, and ultra-lean
architecture are added to achieve the goals of 5G NR [27]. A quick rundown of 5G NR’s new features
and important performance indicators. There is a good job of addressing the problems associated with
inter-radio access technology (RAT) handover synchronization and the adaptation of higher modulation
schemes. A proposed next-generation wireless communication approach takes these issues into account.
The architecture serves as the foundation for the transition to networks that go beyond 5G and 6G. It
also provides an overview of various 6G network technology and applications. Edge computing, quantum
computing, wireless optical communications, hybrid access, and haptic services will all be included in the
6G network. A virtualized network slicing-based 6G architecture is suggested to provide these various
services [28].
By advancing linked business realities, the fifth generation of smartphone bandwidth, cellular technology,
and networks, or 5G, promises to significantly alter mobility. Effective Service-Level Agreements (SLA)
and the foresight of Service Level Objective (SLO) breaches become essential in such a developing
environment. It becomes difficult to ensure the necessary service quality while simultaneously assuring
effective resource allocation [29]. Furthermore, a variety of Quality of Service (QoS) assurances for a broad
range of services, applications, and consumers with a diverse set of needs are anticipated from 5G networks.
The ability to translate user-friendly business terminology into resource-specific monitoring features that
may be utilized to manage resources in the 5G core network, however, it is becoming more challenging.
SLA management framework with QoS provider is introduced to close these gaps. An adaptive tracking
algorithm will support the architecture to deliver amazingly precise information in real time without adding
extra network traffic. The method eliminates the fixed time interval utilized in the monitoring system. To
ensure that pertinent QoS measures are incorporated into the service-level agreement (SLAs), the proposed
architecture additionally includes a recommendation system that assesses the importance of various QoS
metrics using enriched metadata data from an Network functions virtualization (NFV) Catalogue [30].
With positive effects on energy use, available resources, resilience, and customer experience, the
centralized cloud computing landscape is increasingly shifting to distributed and decentralized clouds [31].
U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review 107

Table 6
RQ1 domains, advantages and disadvantages
Study
Domain Advantages Disadvantages
references
[7] Health care Growing demand for robotic surgery due to COVID-19 High 5G network deployment
epidemic. costs.
[8] Oil and gas Help improve field security and safety, find abandoned It compromises cybersecurity by
items, and other things. raising the danger of hacking.
[9] Infrastructure Data management and security for technology used in Device battery drain.
land transportation.
[10] Education Personalized learning may be possible. Compromising the esthetics.
[11] Information retrieval Increased security and WAN connections. Blockages may reduce
connectivity.
[12] Engineering Freedom in design. Many of the outdated devices
wouldn’t support 5G.
[13] Architecture Technology that makes quick-response subscriber Technology is still in
monitoring tools possible. development, and studies are
being done to determine its
practicality.
[14] Airline Operational communication that is trustworthy. The use of aircraft could be
hampered by 5G networks.
[15] Text similarity Aids in classifying objects that are similar. Text It is regarded as erratic and
approaches’ performance should be improved. haphazard.
[16] Smart city Smart cities and driverless vehicles will be possible It is challenging to fully
because to the increased number of linked devices. integrate 5G smart cities;
implementation requires a
bottom-up approach.
[17] General purpose It can offer bigger capacity, faster speed, and lower Shorter broadcast range.
latency.
[18] Communication Massive machine type communication, ultra-reliable Building infrastructure is
low latency communication, and enhanced mobile expensive.
broadband are all aspects of 5G.
[19] Digital twin Digital Twins with 5G capabilities can gather near Internet connectivity is essential
real-time inputs from equipment, sensors, people, and to the development of
network to provide this data more quickly and precisely technology.
than previously.

Industrial Artificial Intelligence (AI), block chain technology, and 5G wireless technology are three
examples of rising IT trends that have an impact on the creation and implementation of next-generation
cloud computing, according to most studies. An integrated edge-fog-cloud architecture is suggested for
effective application in manufacturing systems after the merging of these innovations in cyber-physical
network and cloud-based paradigms in 5G as discussed [32].
Many nations and governments view smart cities as a solution to resource depletion, population increase,
and global warming. The process of building a smart city is fraught with difficulties [33]. Digital Twins
and 5G hold great promise for the conversion of the current urban governance paradigm toward smart
cities, along with the Internet of Things. Fifth-generation wireless communication systems, block chain
technology, collaborative computing, simulation, and Artificially Intelligent technologies all use both
DT and 5G Systems [34]. The idea of a Digital Twin city (DTC) is put forth in most research, a DTC’s
properties, core technology, and use cases are described. They also go over the framework, hypotheses,
and future directions for DTC research [35].
By considering a mobile edge computer network with ultra-reliable, low-latency, and delay-tolerant
services. By improving user identification, allocation of resources, and offloading probability pursuant
to the Quality-of-Service requirements, there is a hope to reduce normalized energy consumption, which
is described as the energy consumption per bit [36]. The mobility management entity (MME) controls
user association, and each access point controls allocation of resources and offloading probability (AP). In
108 U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review

Table 7
RQ2 domains and contributions
Study
Domain Contributions
reference
[20] Communication Enabling quicker physical fault diagnosis and quicker production response.
[21] Healthcare AI-powered models propose more individualized and effective treatment regimens. It can
have a significant effect on how chronic diseases are managed.
[22] Oil and gas Used to keep an eye on resources, schedule maintenance, and streamline processes.
[23] Business To provide their customers with personalized goods and services, designers create numerous
product variations.
[24] Industries Improve the experience for customers by better comprehending the needs of the consumer,
provide improvements to current goods and processes.
[25] Education Improves understanding, boosts student motivation, and enhances the learning process.
[26] Engineering Reducing the number of times engineering teams must iterate a product lowers the overall
costs of the product life cycle.
[27] Infrastructure Enabling more efficient project execution, asset operations, and asset design.
[28] Networks Enables network operators to create solutions for network optimization and carry out
troubleshooting.
[29] General purpose To gather information, to forecast how well they will work, replicate processes.
[30] Agriculture Facilitates the separation of physical flows’ planning and management.
[31] Aeronautics A standard simulation could only test one process, a digital simulation network can conduct a
massive number of simulations.
[32] Robotics Assist in virtualizing hardware movement from raw materials to finished goods.
[33] AI Keep track of a physical system’s operating performance and actual circumstances.
[34] Smart city Improvements to municipal system of public transportation, housing, streetlights, garbage
collection, and power.
[32, 35] Manufacturing Understanding the past, observing current circumstances, and preventing problems in the
future allows for educated decision-making.
[36] Architecture Monitoring performance and spotting problems, simulating design without really producing
the real object.
[37] Security Strong tool for cyber risk prediction and mitigation.

some deep learning (DL) design, the DL algorithm is trained at a central server using Digital Twin and 5G
of an actual network environment. The pre-trained deep neural networks (DNN) can supply the MME with
a real-time user association strategy. Given that real networks are dynamic, the Digital Twin continuously
tracks these changes and adjusts the DNN as necessary. There is a suggestion of an optimization approach
to determine the best allocation of resources and offloading probability at each AP for a certain user
association scheme. The simulation findings demonstrate that, in comparison to a current method approach
strategy to the efficiency of the optimal global solution, the method achieves lower normalized energy
usage with less computational complexity in 5G Systems [37].

7.2. How can digital twin address the 5G system’s difficulties with energy efficiency?

Eleven (11) research papers covering the topics of Digital Twin (DT) networks in 5G Systems and
improved Energy Efficiency were chosen for this part. Each study’s specifics are given in Table 7.
For creating and improving 5G networks and beyond, the DT technology was launched, and various DT
functions and designs were examined. The DT may undoubtedly assist the research community in moving
away from traditional network designs (which involved actual deployment) and toward digital/virtual
ones, including measures for testing and validation. However, since this DT technology is not currently
commercially available for 5G, there is a unique possibility for both DT and 5G study communities to
develop ideas that will enable revolutionary 5G use cases for the society of the future. The cost and
efficiency of the production line for hollow glass are significantly influenced by the customized design [50].
Most articles suggested quick, personalized production line design based on Digital Twins. Some studies
suggested an idea of “iteration between static design and dynamic execution” by analyzing configuration
factors in the development of production lines.
U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review 109

As such, it is designed for operating process requirements to meet process limitations and the associated
optimization problems. The production line’s performance can now be more accurately digitally simulated
to the suggested Digital Twin concept [33]. Some proposed decoupling methods can offer design with
an optimum guide, as shown by a good design application in a thin glass matching warehouse system. A
variety of controlled flow type manufacturing systems, including a production line for custom furniture
and a line for 3C products, can use the suggested Digital Twin based paradigm. In the future, focus on
integrating big data analytics will be taken into the Digital Twin approach for both production line design
and operation. One of the fundamental pillars of the innovation process is the technology of the Digital
Twin [35,51]. It enables the creation of digital representations of physical systems, which has the potential
to accomplish many advantages like real-time monitoring and greater productivity and efficiency. To
provide users of Digital Twins with a high level of service and enable the implementation of Digital Twins
in far more domains, most papers highlighted the significance of the network that links the physical and
Digital Twins around each other, as well as the prerequisites that should be available in the connecting
network. The DTC will change city systems of governance and laws as a new paradigm for creating smart
cities and infuse ongoing energy for urban development and transformation [52].
Digital Twin cities are being planned in many significant cities throughout the world. Building Digital
Twin cities is now conceivable to the quick advancement of Digital Twin technology. Some studies
suggested a pattern for Digital Twins by examining the current Digital Twin technologies and basing it
on the growth of smart cities [53]. Through mapping and surveying technology, IoT perception, develop
solutions, simulation, and deep learning (DL), a platform for urban management and maintenance is
built that is identity, conscience, self-organizing, self-executing, and adaptive. Investigating how URLLC
and delay-tolerant services could lower consumers’ average energy consumption in a Multi-access edge
computing (MEC) system is done. To train the algorithm off-line, a presentation of a deep learning
(DL) design for user association in which a Digital Twin of the network environment was set up at
the central server [37,54]. The MME that handles user association received the DNN after the training
phase. Suggestion on a low-complexity optimization approach that improves allocation of resources and
offloading probability at each AP with a specific user association scheme is done. Additionally, as compared
to an existing technique and strategy for the global optimal solution, most modelling schemes can lower
normalized energy consumption with the DL algorithm and with less computational complexity [55].
Technical literature actively examines concepts for developing Digital Twins to address a variety of issues
that can occur for different types of businesses. Using Digital Twins, significant new results can now
be obtained with advances in technology and the production of the requisite software. Some studies put
out the idea of creating a system of Digital Twins to address a variety of real-world issues in intricate
communication networks. These tasks are seen as examples of two applications [34]. For businesses
involved in the life cycle of a communication system, the initial application is the management of
information feedback: “elaboration of modernization concepts, creation of technology, design, construction,
and operation.” A second application is keeping an eye on traffic, including any unusual behavior, to
prevent mistakes from being made again in case of emergencies.
The Digital Twin connection will also be a useful tool for multidisciplinary study, which is another
key element [36]. By creating a digital version of the physical entities, Digital Twin (DT) gives precise
advice for inter scheduling algorithm in 5G edge computing-enabled distribution grids. In most studies,
discussion on the important issues of low accuracy, long iteration delays, and security concerns in DT
construction and DT-assisted resource scheduling was made. Description of a secure and delay Digital
Twin assisted resource scheduling algorithm and a collaborative learning-based DT infrastructure Security
Administrator’s Integrated Network Tool (SAINT) was done. By jointly optimizing its total iteration
latency and loss function and utilizing abnormal model identification, SAINT provides low, accurate, and
safe DT antimicrobial resistance (AMR). To enhance the effectiveness of deep Q-learning, SAINT uses
110 U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review

DT to provide intelligent resource scheduling deep Q network (DQN) [56]. Because of the consideration
of long-term limits, SAINT provides connect precedence and energy consumption awareness. SAINT
performs better than cutting-edge algorithms in terms of cumulative iteration latency, DT loss function,
energy usage, and access preference deficit. Addressing the 5G edge computing-enabled distribution
grid’s resource scheduling issue with DT assistance [57]. To obtain a low-latency, accurate, and secure
DT, SAINT was proposed. SAINT reduces the DT gradient descent by 58:06% and 70:39%, the DT
error function increases by 46:92% and 58:53%, and the cumulative iteration latency by 12:23% and
31:89% compared to CS-unit control block (UCB) and RS-DNN [58]. Due to access priority and energy
consumption awareness, SAINT also achieves the lowest access urgency deficit and cumulative energy
consumption. The Digital Twin makes 5G testing easier and more efficient for university R&D initiatives
and the kinds of private networks that are now cropping up on campuses, in factories, and in distribution and
manufacturing facilities around the world [59]. Digital Twin makes a perfect testing-on-demand solution
when combined with other cutting-edge Spirent products like Lab as a solution with intelligent automation.
It is quickly emerging as the preferred option for realizing unified connectivity, optimized assistance, and
secure communications within a particular location, such as a campus, factory, or geo-fenced area, to its
significant advantages for modelling and supporting dedicated, next-generation operations [60].

7.3. What methods can be employed to address the issues of energy efficiency in 5G systems?

Energy Efficiency has been employed in previous research to enhance network performance. Numerous
methods and frameworks for Energy Efficiency were suggested in the literature evaluations on Digital
Twin’s network and 5G Systems. To satisfy the needs of consumers and owners, DT analysts employ a
variety of strategies in various sectors. Therefore, 28 studies that emphasize the fundamental methods
and their contributions to enhancing the network’s Energy Efficiency in terms of speed, accuracy, and
performance have been chosen for this part. Each study’s specifics were covered.
To increase operational effectiveness, productivity, and automatization, Cyber-Physical Systems (CPS),
Big Data (BD), and the Internet of Things (IoT) are merged. Despite emphasizing these advantages, smart
factories must also use energy sources that are sustainable and renewable [78]. According to estimates,
industry operations consume around 35% of the world’s total electrical supply and contribute about 20% of
all carbon emissions. Examination on the effect of energy upon that reach of Industry 4.0 in its environment.
It was suggested to conduct a thorough literature review of current research on smart factories and energy
use. To address the questions, a selection of papers was assessed. As a result, revisions have been made to
more than 2,500 articles that were published in the last ten years [79,80]. A trustworthy approach of article
selection was used to identify the most important themes in energy conservation in smart factories.
In addition to offering a new taxonomy to structure projects that correlate the consumption of energy
as well as the new demands of Industry 4.0, the contributions include highlighting unresolved problems
and difficulties in the field [81]. The survey that is being presented attempts to assess the state-of-the-art
interaction between smart factories and energy. To extract and arrange the articles to respond to the stated
survey questionnaire, a systematic literature search methodology was used to see how effective Energy
Efficiency was. A focus on ways to reduce energy use and challenges encountered while tackling energy
in smart manufacturing [10,82]. Along with the survey, tools, their connection, and generated data were
all investigated. Finland has some of the highest mobile data consumption rates in the world. The use of
mobile data has rapidly increased, and future expansion is anticipated [83]. The absolute yearly energy
consumption associated with the operations of mobile providers appears to be rising even though the energy
used per transferred gigabyte has significantly dropped. Consumer behavior is altering concurrently, even
though modern consumer electronics use less energy, we use mobile devices more and more frequently [84].
Does rising usage negate any energy savings made? What options are there for addressing the rising
energy demand? Recently, there has been an increase in interest in finding ways to reduce energy usage in
U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review 111

wireless communications [85]. New network architectures like wireless links, dispersed antennas, cross
cellular; advanced physical layer techniques like multiple-input multiple-output (MIMO) and frequency
division multiplexing (OFDM), cognitive radio, network coding, collaborative communication; radio
and network resource management schemes like various cross layer optimization algorithms, switching
devices saving, multiple radio access technologies [86]. In most posts, provision of an overview of various
technologies and the most recent information on each topic was made. The difficulties that must be
overcome in the location are also described, because it will have significant economic and ecological
impacts soon, cellular networks’ Energy Efficiency has recently attracted scholarly attention from academia
and industry. A strategy for collaboration between Long Term Evolution (LTE) and the next wireless
communications is put out in some papers [87]. The fifth generation (5G) wireless technology seeks to
compromise between wireless network performance (maintaining the focus on high-speed packet rates
throughout congested traffic durations) and Energy Efficiency (EE) by alternately switching 5G base
stations (BSs) off/on based on the traffic immediate load condition while, at the same time, assuring
broadband service for mobile subscribers by the current active LTE BSs [88]. The optimal LTE BS
parameters (technical support, total high antenna, spectral range frequency, and transceiver ratio) that
ensure maximum reception for the entire region as during switch-off session for 5G BSs were determined
using the optimization of particle swarms (PSO) technique. With a maximal data throughput of close to
22.4 Gbps during peak traffic times and 80.64 megabits per second during such 5G BS switched-off period
and assured full coverage and over entire area by the remaining operational LTE BSs, simulation findings
show that the energy reduction can exceed 3.52 kW per day [89].
The suggested BSs switching-on/off algorithm has merit since the existing dense BSs placement, which
is the driving force behind the narrow coverage area concept, has led to unexpected traffic patterns for
each BS. The suggested solutions reduce energy use by keeping an eye on the network’s traffic load and
making decisions about whether to turn on or off specific BSs. Most studies investigated the possibilities of
balancing network efficiency and energy savings in LTE and 5G dual wireless access cellular networks by
turning on and off the 5G-BSs in response to the current state of traffic load while maintaining service and
coverage [90]. However, the number of BSs which will be switched off will determine how much energy
is saved by this method. Energy Efficiency (EE) is the cell inside the User Equipment (UE), and it has
since evolved into a crucial component of UE designs. Factors including UE power usage, UE battery
capacity, and UE transceiver are now being studied. Recent years have seen an increase in the importance
of Energy Efficiency as a determining factor [91]. A key design element that determines the potential for
Energy Efficient transmission is the type of reference signals that must be transmitted irrespective of the
network demand, including cell-specific reference signals (CRS) for 3GPP LTE systems. The coverage
regions for green CoMP with collaborative dimensions of 2 and 3 are inadequate to link all the UEs
originally connected by turned-off evoled node B (eNBs), there is a large energy consumption. Although
it is projected that increased transmission power will lead to decreased Energy Efficiency (EE), its gap
gets smaller as cell size increases [92]. For whatever transmission power investigated, the EE is essentially
same at 1200 meters. On the other hand, when Bandwidth (BW) increases, EE increases significantly.
The impact on EE is comparable whenever Mobility Controllers (MCs) transition from a middle level to
a higher order scheme. In fact, EE becomes increasingly susceptible to MCs changes as bandwidth grows. It
is believed that enhancing Energy Efficiency is essential to reducing operating expenses and environmental
effects [93]. By automatically updating internet bandwidth to the real traffic requirement at a given time,
the network’s radio access can achieve most of its energy savings. Energy Efficient radio resource planning
is one of the best ways to reduce the energy use of wireless devices. Developing heterogeneous networks
(a combination of femtocells, small cells, macrocells, and femtocells) and various relay and cooperative
connections need also be considered in addition to Energy Efficient cell-size design [94]. A great way to
improve Energy Efficiency is by installing Energy Efficient infrastructure and switching off as numerous
112 U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review

Table 8
RQ3 domain, technique and contribution
Study
Domain Technique Contribution
references
[38, 39] Entertainment Energy saving The entertainment sector is under pressure to switch to sustainable
energy and reduce emissions.
[40] Business Higher network data rate Energy Efficiency decreases operating costs for businesses, cuts
emissions, and demonstrates to the community that a company cares
about the environment.
[41] General Feature extraction Utilizing tools and libraries to handle data containing lengthy text
examples.
[42] Healthcare Privacy preservation Improved physical health, such as fewer injuries and signs of
cardiovascular and respiratory problems, rheumatism, arthritis, and
allergies are potential advantages of Energy Efficiency techniques.
[43] Email Word embedding Retrieved unstructured email in an organized way.
[44] Social media Radio transmission To determine the tone of the communication in terms of its substance
and degree of hurt or criticism.
[45] AI Carrier, channel It manages energy consumption, cuts it down during peak times, spots
shutdown issues, alerts users to them, and foresees equipment failures.
[46] Robotics Channel coding Efficiency is more important than ever for robotics Power
technology consumption of robots becomes an increasingly urgent issue as the
industrial sector uses more of them.
[47] IoT Massive MIMO IoT innovations can help cut emissions, resulting in more effective
energy generation.
[48] Machine learning Virtualization Energy Efficiency is frequently associated like doing fewer, but
machine learning enables businesses to enhance their goods in
real-world settings.
[49] Industry Beamforming Energy Efficiency for manufacturing machinery is crucial because it
can result in life-cycle cost savings and emissions reductions.
[50] Mobile edge Natural language Edge computing lowers the quantity of data that must travel over
processing (NLP) networks, which also lowers network energy consumption.
[16] Smart city Non-orthogonal multiple Both residential and business structures are more Energy Efficient by
access (NOMA) using less energy in smart cities.
[51] Education Qualitative ecology and First step in realizing the potential for energy savings is to teach kids
resource management and young families how to use energy more effectively.
(QERM)
[44, 52] Communication Radio resource Additionally, demand response and dispersed energy can be made
allocation possible by Energy Efficient communications, which can help the
globe lessen its reliance on fossil fuels.

base stations as you can. It is essential to increase the Energy Efficiency of wireless cellular networks. To
make wireless cellular networks more Energy Efficient, extensive research must be done [95]. It simply
relates to the UE’s charger and has since developed into a crucial part of UE designs. Metrics including UE
power usage, UE battery capacity, and UE development of renewable energy are part of current research
efforts. For building Energy Efficient wireless networks, the Multiple Input Multiple Output (MIMO) and
Analogous frequency division transmission method (OFDM) techniques, connectivity techniques, Energy
Efficient network strategic planning, various relay, and cooperative communications, and cross-layer
optimizations were all introduced [96].
The idea is to first develop concepts for Energy Efficiency before improving them to improve QoS
metrics. Then, by perfectly alright the energy-saving technique considering the technical expertise, QoS
may be quickly improved. To prove the value of QoS technology, energy conservation methods should
be taken into consideration during QoS upgrading [97]. The amount of energy used depends on both the
volume of data and the separation between sensor nodes. The spacing distance may have an impact on how
much power the transmitter and receiving circuits use. If the amount of data transferred between numerous
sensor nodes is the same, a smaller gap distance between them would result in less energy being used [98].
U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review 113

7.4. How can qos be used to increase the energy efficient of a network?

Six (6) studies that show the effectiveness of Quality of Service (QoS) and Energy Efficiency employed
in 5G Systems were chosen for this part. Each study’s specifics were given.
It is crucial to create a configurable data forwarding that is conscious of QoS and is adjustable to enforce
the QoS obligations to fully satisfy the various Quality of Service (QoS) needs imposed by various network
slices for various vertical applications. For the edge and core subnetworks of a 5G network, a concentration
on creating prototyping, and evaluating a unique privacy data-plane network slicing architecture. By device
congestion control, priority configuration, and scheduling, the framework may manage differentiated
services. A prototype that suggested framework using the most successful and able field-programmable
circuit array platform, and empirically assess the system’s performance. Results from experiments show
that the suggested framework can perform proxy broadband segmentation at the data layer. To partially meet
the enormous demand for high throughput in 5G networks, the network infrastructure is vertically dense
with so-called limited base stations. The efficiency of 5G networks inherently suffers from: 1) significant
inter-cell interference brought on by network density and 2) significant energy waste because of the high
redundancy of weakly occupied, often, and small-cell base units [111]. The use of continuous learning
method to intelligently direct the search toward useful answers to get around the repetitive quality of
exploring in the enormous strategy space. More specifically, to balance high bandwidth usage and Energy
Efficiency, some approaches use orthogonal frequency division multiple access (OFDMA) sequencing and
dynamically learn effective user-equipment association strategies. Inter-cell disturbance and the variety
of user QoS requirements are both considered by their model. Information and computing technology
(ICT) research have recently concentrated on Next-Generation Networks, Software-Defined Networking,
5G, and 6G. One of the research topics in 5G is the optimal operational state for device-to-device (D2D)
communication, which aims to enhance service quality using the frequency spectrum structure. D2D
connection working modes are chosen to satisfy the predetermined system requirements and offer the
network’s highest throughput.
Due to the intricacy of the direct answers, a structured issue as an optimal solution and, using extensive
simulations, identified the best operating modes for various system characteristics [112]. The use of
computed network throughput after identifying the ideal operating modes for the links, and as a result, was
able to achieve the highest throughput. To satisfy system requirements, D2D communication couples are
more likely to employ full-duplex (FD) mode at small distances, and as a result, most communications
occur in FD style at these distances. These findings show that FD communication over short distances
provides higher QoS and conditions than QoS-D2D technique. The way we live will change drastically
because of 5G technology. The 5G network can adapt to emerging simulation results followed by a
significant growth in traffic and the number of connected devices to a flexible combination of improving
current infrastructure solutions and innovative wireless ideas and meeting the needs for efficiency and
scalability [113]. The dynamic resource exchange and context sharing requirements of the upcoming
5G network age call for ubiquitous, high-speed connectivity. Operators must be able to comprehend and
control the services’ performance and quality to meet professional Quality of Service (QoS) and Quality of
Experience (QoE) requirements. The subjective acceptability of a telecommunication service’s perceived
quality by the user is known as quality of experience. In contrast, Quality of Service refers to technical
measures that are objective at the network level. Most papers discuss the selection of service relevant QoE
measures and modelling of how these are impacted by various 5G QoS indicators [114]. The effect of
QoS requirements on QoE as well as a potential technique for QoS/QoE mapping are provided. One of the
key issues with cellular networks is mobile communication. A mobile community sets up the right public
model to provide a data service packet at a high rate.
To increase service quality, the bits of mobile data model are required (QoS). The enhancement of QoS
and communication systems to 5G cellular operators are provided by some search efforts. A helpful resource
114 U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review

Table 9
RQ4 comparison of QoS-based techniques
S/N Technique Count Percentage
1 D2D-based 13 11%
2 E2E-based 15 12.7%
3 Slicing-based 23 19.5%
4 RSVP-based 10 8.5%
5 PSO-based 9 7.6%
6 Spectrum-based 5 4%
7 Intelligence-based 3 2.5%
8 QoE-based 25 21.2%
9 CF-based 8 6.8%
10 DAFC-based 7 5.9%

allocation mechanism is used at the “Radio Access Network (RAN)” layer to enhance built-in services and
the Quality of Service (QoS) in Energy Efficiency of 5G. A local hub or departure station can indicate to
or interact with its neighbors to require special modifying of beneficial traffic with QoS labelling, a type
of organizational communication. To give website users options for customization, QoS highlighting is
useful. By applying the simulation model in 5G’s ultra-low latency, real-time connection, greatly enhanced
capacity, and rapid speed, ISP function effectively and demonstrate the full potential of the ubiquitous
network [115]. Device connections will become quicker, more effective, and less vulnerable to delays with
5G categories that can use lower, medium, and high broad bandwidth bands. Faster connectivity than 4G is
available at close range with mid-bandwidth, which also offers better mobile broadband connections or
higher machine-to-machine communication.
For distributing multimedia information like still photographs and movies, wireless multimedia sensor
networks (WMSNs) are becoming a popular technology. Multimedia delivery over resource constrained
WMSNs faces significant hurdles despite being highly scrutinized by research communities, particularly in
terms of efficient energy and Quality of Service (QoS) assurances. Most papers surveys recent advances in
methods for creating Energy Efficient and QoS-capable WMSNs. First, examine the distinctive qualities
and pertinently enforced requirements of WMSNs. Also provides a summary of each requirement’s current
answers. Then, with an emphasis on their techniques for prioritization and service differentiation as well as
disjoint multipath routing protocols, recent research cover initiatives on Energy Efficient and computation
communication channels, including media access control (MAC) protocols [116].

7.5. Which algorithms are more effective in terms of energy efficiency for DDoS attacks in 5G systems?

Nineteen (19) research’s that demonstrate the threats posed by DDoS attacks on 5G Systems to lower
the network’s Energy Efficiency are included in this section. Each study’s specifics are presented.
DDoS assaults’ effects on 5G-enabled IoT applications has offered a summary of remedies for shielding
the Internet of Things from DDoS attacks. Among the recommendations, which are based on machine
learning (ML), strategy might offer a productive setting, where DDoS attacks will be severely limited.
Moreover, the research could be expanded to include ML approaches in creating a 5G network optimized
IoT application [117]. Attacks such as Distributed Denial of Service (DDoS) can cause communication
networks to become unstable by sending a large volume of malicious requests and traffic over the network.
Computer networks develop an intricate web of nodes that results in a robust structure. Consequently,
in this situation, it becomes difficult to give the user an effective and secure environment [118]. Many
strategies have been used before to identify and stop DDoS attacks.
However, they fall short in terms of offering effective and trustworthy attack detection. Because of this,
there is still a lot that can be done to strengthen the protection against DDoS attacks. The Gated Recurrent
Unit (GRU), a form of Recurrent Neural Network (RNN), is used to protect against new DDoS attacks
U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review 115

that are used in the real world. DDoS attacks are detected and identified using a variety of classification
methods, including Gated Recurrent Units (GRU), Recurrent Neural Networks (RNN), Naïve Bayes (NB),
and Sequential Minimal Optimization (SMO) [119]. The effectiveness of the artificial and deep learning
classifiers is assessed using performance review metrics like accuracy, precision, recall and f1-score.
According to experimental findings, reflection attacks and exploitation assaults using GRU both produce
DDoS classification accuracy readings of 99.69% and 99.94%, respectively. Since Satoshi Nakamoto’s
white paper regarding Bitcoin was released in 2008, blockchain has (slowly) grown in popularity as one of
the most mentioned strategies for protecting data storage and transmission through decentralized, trustless,
and peer-to-peer systems [120]. Most studies identify academic research that aims to use blockchain
for cyber security reasons and provides a comprehensive overview of the most widely used blockchain
security applications. The number of Internet of Things (IoT) devices and sensors has rapidly expanded
with the development of IoT technologies [21,121]. Large-scale sensor-based systems are predicted to
dominate in our societies, necessitating the development of novel design and operation approaches. The
cloud is moving to the edge of the network, where resources like routers, switches, and gateway are being
virtualized, to serve the computing requirement of real-time delay-sensitive programs of widely dispersed
IoT devices/sensors. The open structural layout of architecture and the widespread use of the concept itself
give rise to typical security concerns for the currently used networking technologies [122].
Additionally, cooperation creates difficulties because new security issues may impair the systems’
normal functionality and functioning. Moreover, the IoT’s commercialization has given rise to various
public security worries, such as the risk of cyberattacks, privacy problems, and organized crime. More
precisely, a thorough analysis of security risks and difficulties across the various IoT system design
layers were presented [123]. The literature suggested methods and counter measures to deal with these
security vulnerabilities was also clarified. Due to its dispersed nodes, server, and software for efficient
communication, the Internet of Things (IoT) is essential in many industries, including transportation and
the medical industry. Existing Intrusion Detection approaches are unable to reliably thwart attacks even
though this IoT paradigm has been subject to infiltration assaults and threats that have raised security and
privacy concerns. As a result, the sparse convoluted network has been used to study the IoT intrusion
danger to counter threats and attacks. A set of intrusion data, traits, and suspicious activity sets are used
to train the web, assisting in the identification, and tracking of attacks, primarily Distributed Denial of
Service (DDoS) threats [124].
The network is also optimized using an application that recognizes and detects common errors and
attacks attempts under various circumstances. Neurons are used to evaluate complex hypotheses in the
sparse network, and the event channel outputs are then propagated to additional hidden layer processes.
This method reduces the interference with IoT data transfer. The network correctly distinguishes the normal
and threat patterns by using training patterns effectively. When it comes to ensuring network security,
Intrusion Detection systems were better than other forms of conventional network defense [125]. Some
researchers used an improved genetic algorithm back propagation (IGA-BP) network, an auto encoder
network model, and an improved evolutionary algorithm to detect attacks and tackle the increasing issue of
internet safety in the big data era. One of the most important recent advancements in computer science
is the Internet of Things. Modern computing infrastructures frequently include many low power devices
with a wide range of hardware and software capabilities. Such systems cannot be sufficiently protected by
existing security models, techniques, and solutions [126]. The use of lightweight agents installed at various
Internet of Things (IoT) installations, such as smart homes, is suggested in most studies to jointly identify
Distributed Denial of Service (DDoS) attacks carried out by IoT device botnets. A dramatic decrease
in Distributed Denial of Service (DDoS) attacks because of the harm it does to organizations’ assets,
computer security is a topic that is often discussed. However, it has difficulties due to the rapid increase in
computer access speed and internet user traffic. There is need for a thorough study on the DDoS impact’s
measurement data and a systematic assessment of the literature with regards to 5G.
116 U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review

Definition, forms of DDoS attacks, and different DDoS attacks currently in use for 5G Systems that
need detection and various methods for predicting DDoS attacks [127]. An overview and analysis of
the different DDoS attacks detection and prevention techniques has been seen. They have developed a
conclusion that there is a significant threat from DDoS attacks to Internet-based shared and distributed
systems are crucial, therefore shield of such attacks from occurring against our system is required. Despite
the numerous methods for identifying and reducing the DDoS assault there is a flaw in the entire system
since the system utilizes high bandwidth to identify genuine users’ data as a perpetrator [128]. Jamming
methods range from straight forward attacks that just transmit interference signals continuously to more
complex ones that target specific protocol weaknesses. Other preventative strategies call for elements that
might not hold true in practical situations. For instance, evasion approaches need for the nodes’ mobility,
which may not be viable, while other alternatives call for changes to the current protocols. Solutions that
need significant changes (and cannot be implemented, for example, with a software fix) are unrealistic
given the already extensive deployment of wireless systems. Attacks via Distributed Denial of Service
(DDoS) damage the Internet’s digital accessibility.
The user’s expectation of receiving prompt and efficient services could be severely harmed by DDoS
attackers [129]. There are numerous stories of DDoS attack incidents that have had catastrophic repercus-
sions on internet users and web services. Hence, most users are inexperienced, DDoS assaults frequently
target their devices, or they unintentionally join the advanced threat army. The 5G growth of mobile will
soon take place, but there are rumors that 5G cellular are also vulnerable to DDoS attacks. As a result, it is
important to recognize DDoS attacks as a threat. Inter-slice isolation is known to give powerful resource
isolation; however, it might lower resource efficiency [130]. Utilization of better control is provided by
intra-slice isolation in terms of security, resource availability, and cost trade-offs utilization. Currently,
conducting extensive 5G testing is exceedingly difficult, although being gained through a modest testbed,
some findings are thought to be highly valuable in this new field of study because they were obtained
through actual tests. To determine if the testing experiments can be scaled up, the outcomes for larger
testbeds will be the same. They tested and trained their suggested model using the Knowledge discovery
(KDD99) dataset. To find the DDoS attack, they applied SVM and logistic regression algorithms. The
software define network (SDN) environment has deployed the classification module to differentiate between
legitimate and malicious traffic data, the decision tree and support vector machine (SVM) algorithms are
used. Most research demonstrated that, in simulated environment, SVM performs better than decision tree
approach and Intrusion Detection was the best [131].

8. Common techniques

Various Digital Twin and DDoS tactics to improve the Energy Efficiency in 5G Systems are covered
in this study. Table 11 shows the main approaches employed in investigations. In certain studies, the
Intrusion Detection technique is employed as a whole, whereas in others, it is used separately. Different
strategies that were employed to serve multiple domains are highlighted for 5G Systems. Mitigation,
filtering, blackhole, amplification, reflection, scrubbers, casting, spoofing, and Intrusion Detection are the
main strategies. It also aids in the detection, prevention, and improvement of Energy Efficiency in 5G
networks.
Table 11 highlights various DDoS methods for prevention and detection, in addition to Intrusion
Detection. Furthermore, Digital Twin techniques are used for enhanced performance and efficiency
in 5G Systems for Energy Efficiency. With the use of Intrusion Detection algorithms, Digital Twin
networks outperformed handover decision algorithm (HAD). Prevention, detection, and twin networks
were employed to create an Energy Efficient network, and the research revealed that the quality of Digital
Twins utilizing these strategies is superior. Time to trigger (TTT), mobility state detection (MSD) and
U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review 117

Table 10
RQ5 model performance technique
References Domain Techniques Contribution
[53] General Spoofing Attackers can avoid detection and place a significant load on the target node
for filtering attack packets by using IP spoof.
[54] Medical Casting This shows that attackers are searching for weak places and susceptible
victims without proper defense by casting a larger net.
[55] Communication Intrusion detection Created to identify unusual traffic patterns linked to the execution of an
attack.
[56] Education Scrubbers Scrubbing services can aid in the defense against Distributed Denial of
Service (DDoS) assaults. Scrubbing centers prevent 98% of DDoS attacks.
[57] Business Reflection Allows the preventer to increase the volume of unwanted traffic they may
generate while also masking the origins of the network attacks.
[58] Healthcare Amplification Attacker takes use of weaknesses in domain name system to convert minor
inquiries into considerably bigger payloads that are then utilized to knock
down the victim’s servers.
[59] Industrial Blackhole filtering To mitigate DDoS assaults on IoT devices distributed without the assistance
of third trusted parties.
[60] Network Mitigation DDoS assaults produce malicious surges in data traffic and application
usage, which must be blocked and absorbed while genuine traffic flows
unhindered.
[61] Online service Intrusion detection Required to track traffic irregularities associated with an attack’s execution.
and filtering

Table 11
Common techniques
Studies
Category Techniques
references
Network/Transport level Protocol exploitation [62, 63]
DDoS based flooding attacks Reflection based [63]
Amplification based [64]
Spoofing technique [65]
Application-level DDoS Reflection [63]
flooding attack Amplification [64]
Hidden markov model [66]
Change point monitoring [67]
Source end Centre track [68]
Radial basis function [69]
Flow iteration [70]
Traffic flow Differentiating between legal flow, DDoS assault, and flash event using concept [71]
entropy and divergence
Network For web-log analysis, propose a self-organizing map (SOM) and a modified [72]
ART2
Routers Distinguish faked IP packets from legitimate IP packets by mapping IP [73]
addresses to hop counts

radio link failure (RLF) technologies are utilized in 5G Systems to retrieve network and efficiently place it.
DDoS, DT, 5G, and EE fundamental approaches are listed in Table 11. Core methodologies derived from
studies related to research topics are also included.

9. Method format

Method formats are shown in Table 12. DDoS in 5G can be found in a variety of method formats. Area
detection is classified based on these formats. DT, ID, ML, IT, S, HMM, GA, FL, RL, TP, CPM, FM, and
MIB are the area detection and method formats employed in the investigations.
118 U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review

Table 12
Method formats
Method Area detection Study references
IT Traffic flow [71]
DT Physical [74]
S Network [75]
ML Network [76]
HMM Network [77]
GA Network [78]
FL Network [79]
RL Routers [80]
TP Source end [81]
CPM Network [82]
FM Routers [83]
MIB Network [84]
ID Routers [85, 86]
Meaning – IT: information theory, DT: Digital Twin, S:
statistical, ML: machine learning, HMM: hidden Markov
model, GA: genetic algorithm, FL: fuzzy logic, RL: rate
limit, TP: traffic profiling, CPM: change point monitoring,
FM: filtering method, MIB: management information base,
ID: Intrusion Detection.

10. Definitions of digital twin in different literatures

The definition of DT in many academic works is significant for all areas of the field in raising a network’s
energy effectiveness. Through the integration of the data model and the physical model of the product,
Digital Twins assist in the iterative optimization of both models. The models’ iterative optimization shortens
the entire design process and minimizes the likelihood that extra costs will be incurred during rework. As
illustrated in Table 13, a building project is developed through a series of phases.
The proposed multi, cross, stochastic modeling of a vehicle or system known as a “Digital Twin”
employs the best physical models currently available, sensor updates, fleet history to mimic the behavior of
its flying twin. The ability of an airplane to fulfil mission criteria is modelled from birth to death using a
Digital Twin, which also includes comment section of the electronics, flying controls, launch vehicle, and
other subsystems. A structural model known as a “Digital Twin” will have quantitative information on
highly sensitive material level properties [53]. A Digital Twin is a representation of a genuine machine
that is tied together, runs on a cloud platform, and simulates its state of health using information both
from content analysis methods and other physical knowledge that is readily available. A life planning and
certification paradigm that gives higher designing of personal aerospace vehicles over the course of their
service lives by using models and simulations that include the state of the vehicle as it was when it was
built, the loads and environments it has experienced, and other vehicle-specific history [77]. Digital Twins
are extremely accurate representations of the process as it is currently standing as well as of how people
behave while interacting with their surroundings in the actual world.

11. Definitions of energy efficiency in various domains

Energy Efficiency is the elimination of energy waste by utilizing less energy to complete the same work.
Numerous advantages come from Energy Efficiency, including less energy usage in network, decreased
demand for imported energy, and decreased demand for energy by base stations and the entire network.
While photovoltaic systems also aid in achieving these goals, improving Energy Efficiency provides the
most affordable and practical option to cut back on the usage of internet. Buildings, transportation, and
U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review 119

Table 13
Definitions of DT in various literatures
Reference Year Definition Application
[87] 2017 A digital replica of a genuine plant, machine, worker, which is built, System engineering
extended autonomously, automatically updated, and instantly accessible
everywhere.
[88] 2017 A group of modeling and simulation constructions that completely define a Control of smart
manufactured product, whether it can be potential or actual, down to the workshop
atomic level and up to the large-scale geometrical level.
[89] 2018 A virtual, one-to-one reproduction of a “technical asset” (such as a eRobotics
machine, component, or environment piece).
[90] 2018 A Digital Twin is a building information model (BIM). Maintenance of railway
station building
[91] 2018 Digital model with several domains and extremely high levels of fidelity Smart manufacturing
that integrates structural, electronic, hydraulic, and control topics.
[92] 2018 Fundamentally distinct live model of the physical system supported by Machinery fault
supporting technologies like Multiphysics simulation, machine learning, diagnosis
Augmented reality/virtual reality (AR/VR), cloud services.
[93] 2019 Individual physical artefacts are combined with digital models that Healthcare management
dynamically reflect the status of those artefacts under the engineering system
paradigm known as “Digital Twins.”
[94] 2019 A Digital Twin is a building information model (BIM). Life cycle management
[95] 2019 An accurate and live digital replica of a physical manufacturing system that Architecture of cyber
accurately depicts all its features. system
[96] 2020 Digital Twins, which represent both the components and the behaviors of Work environment safety
how systems and equipment work within their environments and survive
throughout their lifecycles, are linked, digital replicas of physical assets that
are connected to one another.
[97] 2021 A virtual object or group of virtual objects that are defined in a digital System design
virtual environment and that are mapped to actual objects in a physical
environment.
[98] 2021 A digital replica of a physical object that gathers real-time data from the Structural performance
object and derives data that is not explicitly measured in the hardware.
[99] 2022 A digital object that continuously updates and reflects the behavior rules of Predictive manufacturing
a physical thing.
[100] 2022 A single system model that can federate models from various vendor tools IoT lifecycle
and configuration-controlled repositories to synchronize design,
engineering, electronic, software, validation, and other discipline-specific
models throughout the system lifetime.

energy industries are just a few of the economic sectors where there are significant chances to increase
efficiency.
Given the rising cost of energy and the growing demand for processing massive data sets (big data),
Energy Efficiency in cloud services data center (DCs) is currently a subject of increasing relevance.
Understanding the prospects for increasing Energy Efficiency in DCs requires a structured measuring
framework that can be utilized to quantify Energy Efficiency. To put it another way, a thorough review
of energy measures is required. However, in recent years, measuring the Energy Efficiency of DCs has
only made a little advancement [182]. As a result, it is difficult to quantify the Energy Efficiency of DCs
using a set of metrics that are widely accepted. Due to problems with energy consumption, particularly in
low-power devices, Energy Efficiency (EE) is really an ongoing research subject on a global scale.
The effective utilization of scarce energy resources depending on a variety of application tasks is
crucial for networks containing trillions of devices and low-power devices to support these cutting-edge
technologies. Energy loss or waste also contributes to energy consumption. Energy provided by the system
that is not immediately utilized by computer operations, such as power transmission and translation,
cooling, and lighting, is referred to as energy loss [84]. The energy for use by server without performing
beneficial work is referred to as energy waste, as opposed to the energy used by other devices without
120 U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review

Table 14
Energy efficiency definitions in various domains
References Year Definition Application Contribution
[101] 2022 The idea of Energy Efficiency Systems (EES) Business Improved Energy Efficiency for
is to hasten the development of Energy businesses and more tools to control
Efficiency in businesses. their energy use.
[102] 2022 Due to problems with energy consumption, Communication Either extending their lifespan or
particularly in low-power devices, Energy boosting data throughput.
Efficiency (EE) seems to be an ongoing
research topic on a global scale.
[103] 2022 Optimizing network load is necessary to Industry Efficiency improvements can reduce
achieve a decrease in overall energy usage. industrial congestion.
[104] 2022 Increasing the quantity of energy used to Manufacturing Protecting the environment and
deliver goods and services is known as Energy giving local manufacturers and
Efficiency. installation companies chances.
[105] 2022 The proportion between both the overall Smart city Economic benefits of Energy
number of packets delivered at the end node Efficiency improvements include
and Energy Efficiency may be used to explain. reduced utility costs and job growth.
[106] 2022 The amount of data that can be communicated Internet Lowering energy bills and usage.
divide by a unit of energy consumption, which
is typically measured in bits per joule.
[107] 2022 The quantity of data which can be transmitted Networks To create sustainable prosperity,
from end – to – end per unit of energy used by load shedding and networked energy
the network is what we refer to as Energy resources must be made possible.
Efficiency.
[108] 2022 Energy conservation strategies can be IoT Enhance the utilization of internet
developed using the enormous quantity of IoT energy sources and lessen the
data that has been gathered and examined. impact on the environment.

producing any useful output.


Er
η= (1)
Eu
Energy Efficiency [η ], energy required [Er], energy used [Eu]
Dcom − Dgoi
η dat = (2)
Dcom − Daft
Energy Efficient Data [η ], Data coming in [Dcom], Data going out [Dgoi], and Data affected [Daft]
DA
TEC = (3)
EC
Total energy consumed [TEC], Data aggregation [DA] and Energy consumed [EC ]
Xn = xin_old + vnew (4)
New energy [xn ], old incoming energy [xin_old ] and new data [vnew ].

12. Discussion

The papers chosen for this SLR are primarily from the mobile communication and 5G Systems domains,
and they include DDoS attack and Energy Efficacy issues. The DDoS assault created by a third party is
the primary cause of the problem with Energy Efficiency. The consistent depiction of 5G data creates a
demand for Energy Efficiency due to the pace of the transmission. In-depth discussion of network data
pertaining to fundamental approaches and their performance assessment was also necessary. The study’s
main findings center on the following topics: the nature of 5G Systems; a network’s attention to the
Energy Efficiency problem; the domains’ use of the Digital Twin approach; and knowledge basic strategies,
U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review 121

Intrusion Detection techniques, equipment, and models, as well as the evaluation of their performance in
handling DDoS assault. Moreover, additional aspects of Energy Efficiency and DDoS attack problems were
reviewed to provide the research community with the most recent information on the 5G Systems. Section
VI discusses all research questions pertaining to 5G, Digital Twins, QoS, DDoS, and Energy Efficiency.
Additionally, Table 11 displays the standard procedures that have lately been used by academics and data
analysts for various objectives. Table 12 is the depiction of the diverse nature of 5G networks created in a
variety of formats demonstrates how frequently Energy Efficiency is required in every component of the
network. Table 10’s discussion of the performance measurement technique demonstrates how technologies
like Intrusion Detection, spoofing, Digital Twins, reflection, and scrubbing will assist researchers and
managers in assessing the effectiveness of the fundamental techniques, tools, algorithms, and models for
Energy Efficiency.
According to what we discovered via our research using information retrieval sources, currently there is
no specific Energy Efficiency employing Digital Twin and Intrusion Detection SLR given and provides the
primary emphasis on 5G Systems. To improve the performance of traffic from UE in [183], they suggested
a network handover choice technique. With the development of tools and technology, DDoS attacks have
been reduced utilizing a variety of techniques for 5G Systems, including ID, reflection (R), scrubbing
(S), and detection (D) models [120]. The keyword “Energy Efficiency” was suggested to be replaced with
others, like “QoS” and “DDoS attack.” A survey article on affective computing and associated topics like
business, production, and communication has been released. It is utilized to evaluate the effectiveness,
efficient data that aids in accurate 5G during DDoS attacks and inefficient networks caused by network
feedback [81]. The physical network is replicated using a Digital Twin along with Handoff (HAD) and
DT methods, the tactics used included scribing, spoofing, and Intrusion Detection. DT, QoS, and DDoS
techniques were applied in the sentiment analysis, which was done using supervised and unsupervised
methods. Methods for Intrusion Detection, evaluation, and performance measurement went unreported in
the meantime.
Different studies pertaining to the suggested SLR were later explored. A Digital Twin network survey
that characterizes both Energy Efficiency for 5G Systems with problems like DDoS attacks are mentioned
in the references section below. However, no parameter pertaining to the Digital Twin that could increase
the network’s Energy Efficiency was mentioned. Case studies on various Digital Twin techniques for
medical and network communication generally focus on the proportion of 5G Systems [61]. Moreover,
in [34], the Digital Twin method was used to predict sentiment. To maintain an Energy Efficient network
and lower the likelihood of a DDoS assault, the Intrusion Detection approach was utilized for sentiment
analysis.
However, a DDoS attempt was discovered utilizing a 5G System’s Intrusion Detection technology [121].
As in [52], feelings, and a suggested network framework for travelling were developed employing DT
techniques on a 5G network.
The present related work generally concentrates on assessing single attacks on the network as opposed
to many attacks. Both integration and performance measurement are compatible with the proposed SLR
when applied to core approaches only. Numerous papers are presented, with a focus on studies that address
research-related questions, based on literature evaluation and findings were stated above. These findings’
knowledge will benefit cutting-edge networks and fields like 5G/6G networks and DDoS attack mitigation.
Extended reality applications, IoT, and Industry 4.0. These technologies generate dissimilar networks in
large quantities, so the network must be effective prior to achieving and transmission. The efficiency and
throughput of the 5G Systems will benefit from the deep learning, machine learning, and Internet of Things
techniques. The choice of appropriate tools and procedures will be made easier for network analysts and
managers with the aid of performance evaluation techniques including Intrusion Detection, scrubbing,
reflection, amplification, and DT
122 U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review

Additionally, it is recommended that scholars who are focused on the domain of Energy Efficiency in 5G
Systems use more of these techniques by fine-tuning their parameter settings to arrive at the best outcome.
This idea will increase the application of the Digital Twin and Intrusion Detection techniques for achieving
Energy Efficiency.

13. Conclusion

Throughout this SLR paper, we include an up-to-date overview of the current state of 5G System usage
with a Digital Twin and suggest for prospective research areas related to energy saving. It has been noted
that once the network is effective and developments are highly successful in resolving different network
issues, the attack on the network by DDoS can be reduced as in Table 11. Additionally, for the purpose of
achieving Energy Efficiency, we have succinctly categorized all the stages into four (4) different categories:
5G network, QoS, Digital Twin, and DDoS attack as in Fig. 5. We concentrated more on improving the
Energy Efficiency of 5G Systems considering these classifications. Although it is clear from the review and
discussion in this paper that Digital Twin is relatively new to 5G Systems with the technique of Intrusion
Detection as in Table 7. Improving the network’s Energy Efficiency can help to some extent lower the
frequency of DDoS attacks against the 5G Systems and improve network performance. Even so, many
issues have been raised about some DDoS attack mitigations as in Table 12. Additionally, this study can
serve as a reference on how to incorporate Digital Twin techniques with improved specialization and
variation to address the issue of Energy Efficiency in section VI. As a result, the analysis in this study can
serve as a thorough informational source and a foundation for future work.
Reviewing the Energy Efficiency concerns, 5G System approach, fundamental DDoS attack mitigation
approaches, and their performance assessment was another goal of this study. To handle 5G Systems,
DDoS attack mitigation, and Energy Efficiency improvements, core techniques including DT, ID, S, and A
have been implemented in real applications and discussed in depth as in Table 11. It was expected that the
problem of Energy Efficiency can be resolved by deploying DDoS assault Intrusion Detection methods or
Digital Twin networks as in Table 11 where ID with DT was considered as the best technique to handle
DDoS attack. In conclusion, energy efficiency is crucial for 5G systems because of the operational, financial,
and environmental advantages it offers. It is essential for lowering greenhouse gas emissions, cutting down
on network operators’ operating expenses, prolonging device battery life, boosting network dependability,
and enabling scalability for future expansion. We can achieve sustainable and environmentally friendly
network deployments, lower operational costs, improve network performance and reliability, and support
the expansion of new applications and services made possible by 5G technology by addressing these issues
and promoting Energy Efficiency in 5G systems.
In summary, integrating an intrusion detection approach within 5G systems offers substantial benefits in
terms of energy efficiency, network performance, security, and cost-effectiveness. This choice is validated
by its demonstrated efficacy, scalability, real-time detection capabilities, minimal false positive occurrences,
and adaptive learning attributes. Collectively, these factors bolster the overall resilience and sustainability
of 5G networks. Intrusion detection assumes a pivotal role in upholding the integrity and performance
of 5G networks. Its capacity to swiftly pinpoint and counter security breaches guarantees the optimal
utilization of network resources for legitimate traffic, consequently elevating overall network performance
and quality of service (QoS). Furthermore, the adopted intrusion detection method reinforces the security
posture of 5G systems. It adeptly identifies and thwarts various cyber threats, encompassing Distributed
Denial of Service (DDoS) attacks, malware incursions, and unauthorized access endeavors, thus mitigating
the potential for data breaches and service interruptions. Crucially, the chosen intrusion detection method is
highly adaptable and can scale to accommodate the evolving landscape of 5G networks. It can seamlessly
accommodate the escalating number of connected devices and the increasing complexity of network
architectures, ensuring its continued relevance and effectiveness.
U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review 123

14. Contribution

This study’s key contribution applies to 5G Systems and the Digital Twin network because it addresses
the most important Energy Efficiency problem, namely DDoS attacks on network. Data must be protected
from DDoS attack utilizing Intrusion Detection and the most up-to-date analytical tools prior to achieving
Energy Efficiency which can be attained. The Handover, reflection, emphasis on DoS attacks, and energy
inefficiency when compared to previous related work. However, no such aspect was examined as suggested
in the research questions for this study despite the employment of Digital Twin and Intrusion Detection
techniques for DDoS attacks. This cutting-edge SLR tackles Energy Efficiency with 5G Systems and
Digital Twin, as far as we can tell. This study’s main goals included conducting a thorough analysis of the
Energy Efficiency problem, Intrusion Detection on DDoS attack approaches for 5G Systems using Digital
Twins, Energy Efficient processing, and management techniques for 5G Systems using Digital Twins,
Intrusion Detection and performance evaluation of tools, techniques, and models. The diverse nature of
networks has previously been discussed in several relevant studies, like DDoS attacks. Hence, none of these
studies have gone into detail on the problems raised in the research topics. The knowledge provided by
such SLR will be useful for academics and network experts who are working with large forms of network,
according to the findings and debate.
As previously said, attaining Energy Efficiency of the network in the form of 5G Systems would
benefit from the most current deep learning, machine learning, and Digital Twin approaches. Furthermore,
performance using measurement techniques will help in choosing the best methods, equipment, models,
and frameworks. In addition, Digital Twin will support cutting-edge applications including zero-shot
network domain network, IoT, industrial reformation 4.0, and enhanced reality.

15. Practice relevance

With the use of already-available tools and methodologies, administrators and network packet analysts
controlled the enormous amounts of network created by industries including healthcare, banking, insurance,
architecture, engineering, education, oil and gas, communications, and entertainment. Data centers present
a huge chance for energy and money savings. With the introduction of the newest tools and technologies,
administrators and network packet analysts have a duty to process and efficiently portray networks such
that the end users can understand all the data and utilize the network appropriately. DDoS attacks must be
managed and neutralized to solve the Energy Efficiency problem and provide effective energy. Managers
and data analysts must choose the best model for attaining Energy Efficiency, such as a Digital Twin,
Intrusion Detection, and reflection for consistent representations. Furthermore, quick training and testing
methods will be made possible by excellent deep learning, machine learning, and DT techniques for 5G
Systems. The performance metric can therefore be produced by considering accuracy, retention, reliability,
and latency. As a subset of 5G Systems, Energy Efficiency is a prominent topic in academia since it
addresses Digital Twin networks and DDoS attack mitigation. Digital Twin networks are a great way to
characterize, forecast, and visualize data for this purpose. Regarding the effects of academic achievement,
research can advance in Energy Efficiency with Digital Twins.

16. Significance of the research

A tremendous rise in data traffic is anticipated to be supported by 5G networks, which will also connect
billions of devices. With this expansion, energy use by the network infrastructure becomes a major problem.
Energy Efficient 5G technologies reduce the telecommunications sector’s carbon footprint and greenhouse
gas emissions, promoting environmental sustainability. For network operators, energy consumption is a
124 U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review

significant operating expense. Operators can lower their operational costs and electricity bills by increasing
Energy Efficiency, which will boost their profitability. Operators can handle the expanding network
demands while maximizing resource use with the help of Energy Efficient 5G technologies. An extensive
variety of gadgets may connect and interact with 5G. Many of these gadgets, including wearable electronics
and Internet of Things (IoT) sensors, run on batteries. These gadgets’ batteries may work for longer periods
of time without needing to be frequently recharged or replaced in Energy Efficient 5G technology. 5G
network availability and reliability are also impacted by Energy Efficiency. Operators can improve the
resilience of their network infrastructure and guarantee ongoing service availability, even during power
outages or in locations with sparse power supply, by optimizing power utilization. In addition to supporting
new applications like driverless vehicles, smart cities, and industrial automation, 5G networks are built
to handle a massive amount of data traffic. Systems that are Energy Efficient enable scalable network
deployments and consider the expected increase in data traffic and linked devices without significantly
increasing power consumption.

17. Research direction

Many methods and technologies are used in 5G networks to achieve Energy Efficiency. To enable
sustainable and ecologically friendly 5G deployments, continuing research and development focuses on
enhancing Energy Efficiency at the network and device levels. To increase the Energy Efficiency of 5G
networks, researchers are investigating cutting-edge network optimization approaches. To minimize energy
consumption while still maintaining the required level of service, this includes optimizing the deployment
of base stations, lowering the energy consumption of network equipment, optimizing resource allocation
algorithms, and creating effective scheduling algorithms. To enable base stations and network components
to dynamically modify their power usage based on traffic demand, Energy Efficient sleep modes are
being researched. The goal of research is to create intelligent algorithms that can correctly forecast traffic
patterns and activate or deactivate network components in accordance. By doing this, energy waste during
slow periods is reduced. Green communication methods try to make wireless signals use less energy.
Energy Efficient transmission protocols, such as energy harvesting and Energy Efficient relaying, are
being studied, along with Energy Efficient modulation and coding schemes, power amplifier efficiency
optimization, advanced antenna technologies, and advanced antenna technologies. It is being investigated
how to use energy harvesting methods to power 5G network components with renewable energy. To lessen
dependency on the power grid and boost overall Energy Efficiency, research is looking into the integration
of solar, wind, and kinetic energy collecting technologies into base stations and network infrastructure.
To maximize Energy Efficiency in 5G systems, artificial intelligence and machine learning approaches
are being used. These methods allow for resource management and intelligent decision-making based on
real-time network circumstances, traffic patterns, and energy consumption statistics. Machine learning
methods are being investigated for the purpose of predicting energy consumption, optimizing network
operations, and dynamically adapting network designs. With the rapid deployment of 5G networks comes
energy concerns that must be addressed to ensure sustainable and environmentally friendly installations.
By increasing Energy Efficiency, researchers hope to lessen the telecom sector’s carbon footprint, save
network operators’ operating expenses, and improve the overall performance and dependability of 5G
systems.

18. Limitation of the research

With a greater number of network components, larger traffic demands, and a variety of service require-
ments, 5G networks are substantially more complicated than networks from earlier generations. Due to
U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review 125

the requirement for advanced optimization techniques, real-time monitoring, and coordination across
many network components, managing Energy Efficiency in such complex networks becomes difficult.
High-bandwidth apps, IoT devices, and applications with extremely low latency are all supported by
5G networks along with a variety of traffic patterns. The dynamic nature of traffic requires Energy Effi-
cient techniques to adjust and optimize resource allocation based on current demand. Intelligent resource
management strategies are needed to solve the difficulty of ensuring Energy Efficiency under fluctuating
traffic conditions. It can be difficult to implement Energy Efficient 5G networks in places with a lack of
infrastructure or erratic power supplies. To maintain ongoing network functioning and Energy Efficiency
in such circumstances, it becomes essential to investigate alternate energy sources, energy storage options,
and intelligent power management systems. The interoperability and integration of new Energy Efficient
technologies with older systems as well as Energy Efficiency issues frequently need to be balanced. It can
be difficult and expensive to upgrade or retrofit existing infrastructure to increase Energy Efficiency. To
encourage the adoption of Energy Efficient practices, it is essential to guarantee seamless integration and
backward compatibility. It takes continual research, cooperation amongst industry parties, breakthroughs in
technology, algorithms, and network topologies to address these limits. While energy economy is a crucial
component of the architecture of the 5G system, finding the ideal balance between Energy Efficiency and
performance is crucial to guarantee the network’s maximum performance.

19. Future research suggessions

As the phrase “Energy Efficiency” is used in various applications, data accessibility and domain context
are this SLR’s two most significant limitations. The inconsistencies in the review of the literature, SLRs and
surveys are another drawback. Due to the article acceptance and publication period between 2018 and 2022,
certain pertinent articles were not available. The choice of research in 5G Systems is a small drawback.
Digital Twin networks, expanded reality, industrialization 4.0, learning algorithms, and blockchain all
play a crucial part in Energy Efficiency, so do DDoS attacks. Massive networks created by domains and
applications can be universally represented by Digital Twin networks as platforms for Energy Efficiency
problems. The following are the most important recommendations for moving forward based on the
comprehensive debate and in-depth analysis of all the publications, methodologies, tools, and models.
The use of DT network and Intrusion Detection techniques on 5G Systems is required in the medical,
network, and communication industries. The focus of this review article is the adoption and integration of
these excellent Digital Twin methods into the Energy Efficiency of 5G Systems. As a result, the following
intriguing research priorities are listed:
1. For instance, to identify the DDoS attack mitigation methods used and not used in the Energy
Efficiency issue, this research analyzed the current DDoS attack mitigation methods. Similar research
may eventually be applied to other crucial aspects of 5G Systems, including engineering issues,
railroad issues, feature selection issues, and so forth.
2. Additionally, to raise a privacy concern in the context of 5G Systems given that practically all DDoS
attack techniques are accessible through cloud databases.
3. There is a need for more reviews in terms of Denial of Service (DoS) attack for single network in 5G
Systems and the method to handle such attacks.
4. Security issues need to be looked upon in 5G Systems, also the security issues in implementing
Digital Twin need to be checked.
5. Other domains need to know about Digital Twin technology like the agricultural sector and banking
sector.
126 U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review

Acknowledgments

This work was supported by Universiti Teknologi PETRONAS (UTP) Malaysia.

References
[1] Series M. IMT Vision-Framework and overall objectives of the future development of IMT for 2020 and beyond.
Recommendation ITU. 2015; 2083: 21.
[2] Datta SPA. Emergence of digital twins. arXiv preprint arXiv:1610.06467; 2016.
[3] Glaessgen E, Stargel D. The digital twin paradigm for future NASA and US Air Force vehicles. In: 53rd AIAA/AS-
ME/ASCE/AHS/ASC Structures, Structural Dynamics and Materials Conference 20th AIAA/ASME/AHS Adaptive
Structures Conference 14th AIAA. 2012. p. 1818.
[4] Miao Y, Jiang Y, Peng L, Hossain MS, Muhammad G. Telesurgery robot based on 5G tactile internet. Mob Netw Appl.
2018; 23(6): 1645–54. doi: 10.1007/s11036-018-1110-3.
[5] Gillispie C. South Korea’s 5G ambitions Academic Paper Series. Korea Economic Institute of America. 2020.
[6] Tobin M. New Zealand bans Huawei from 5G, China Has Message for New Zealand. This Week Asia. 2019.
[7] Fuller A, Fan Z, Day C, Barlow C. Digital twin: Enabling technologies, challenges and open research. IEEE Access. 2020;
8: 108952–71. doi: 10.1109/ACCESS.2020.2998358.
[8] Tobin M. My way or the Huawei: how US ultimatum over China’s 5G giant fell flat in Southeast Asia. South China
Morning Post. 2019; 20.
[9] Ji X, Huang K, Jin L, Tang H, Liu C, Zhong Z, et al. Overview of 5G security technology. Sci China Inf Sci. 2018; 61(8):
1–25. doi: 10.1007/s11432-017-9426-4.
[10] Ahmed AH, Thair Al-Heety AT, Al-Khateeb B, Mohammed AH. Energy efficiency in 5G massive MIMO for mobile
wireless network. In: International Congress on Human-Computer Interaction, Optimization and Robotic Applications
(HORA). Vol. 2020. IEEE Publications. 2020. pp. 1–6. doi: 10.1109/HORA49412.2020.9152847.
[11] Rizvi S, Aziz A, Jilani MT, Armi N, Muhammad G, Butt SH. An investigation of energy efficiency in 5G wireless
networks. In: International Conference on Circuits, System and Simulation (ICCSS). Vol. 2017. IEEE Publications. 2017.
pp. 142–5. doi: 10.1109/CIRSYSSIM.2017.8023199.
[12] Varshney U, Jain R. Issues in emerging 4G wireless networks. Computer. 2001; 34(6): 94–6. doi: 10.1109/2.953469.
[13] Keele S. Guidelines for performing systematic literature reviews in software engineering [technical report] Ebse technical
report. ebse. ver 2.3; 2007.
[14] Yang C, Liang P, Fu L, Cui G, Huang F, Teng F, et al. Using 5G in smart cities: A systematic mapping study. Intell Syst
Appl. 2022; 14: 200065. doi: 10.1016/j.iswa.2022.200065.
[15] Kitchenham BA, Pfleeger SL, Pickard LM, Jones PW, Hoaglin DC, El Emam K, et al. Preliminary guidelines for empirical
research in software engineering. IEEE Trans Softw Eng. 2002; 28(8): 721–34. doi: 10.1109/TSE.2002.1027796.
[16] Carvalho R, da Silva AR. Sustainability requirements of digital twin-based systems: A meta systematic literature review.
Appl Sci. 2021; 11(12): 5519. doi: 10.3390/app11125519.
[17] Shrivastava VK, Baek S, Baek Y. 5G evolution for multicast and broadcast services in 3GPP release 17. IEEE Commun
Stand Mag. 2022; 6(3): 70–6. doi: 10.1109/MCOMSTD.0001.2100068.
[18] Cao J, Yan Z, Ma R, Zhang Y, Fu Y, Li H. LSAA: A lightweight and secure access authentication scheme for both UE
and mMTC devices in 5G networks. IEEE Internet Things J. 2020; 7(6): 5329–44. doi: 10.1109/JIOT.2020.2976740.
[19] Mishra D, Natalizio E. A survey on cellular-connected UAVs: Design challenges, enabling 5G/B5G innovations, and
experimental advancements. Comput Netw. 2020; 182: 107451. doi: 10.1016/j.comnet.2020.107451.
[20] Chettri L, Bera R. A comprehensive survey on Internet of things (IoT) toward 5G wireless systems. IEEE Internet Things
J. 2019; 7(1): 16–32. doi: 10.1109/JIOT.2019.2948888.
[21] Gurusamy D, Priya MD, Yibgeta B, Bekalu A. DDoS risk in 5G enabled IoT and solutions. Int J Eng Adv Technol. 2019;
8(5): 1574–8.
[22] Allam Z, Sharifi A, Bibri SE, Jones DS, Krogstie J. The metaverse as a virtual form of smart cities: Opportunities and
challenges for environmental, economic, and social sustainability in urban futures. Smart Cities. 2022; 5(3): 771–801. doi:
10.3390/smartcities5030040.
[23] Dighriri M, Alfoudi ASD, Lee GM, Baker T, Pereira R. Comparison data traffic scheduling techniques for classifying
QoS over 5G mobile networks. In: 31st International Conference on Advanced Information Networking and Applications
Workshops (WAINA). Vol. 2017. IEEE Publications. 2017. pp. 492–7. doi: 10.1109/WAINA.2017.106.
[24] Fujii Y, Iye T, Tsuda K, Tanibayashi A. 28 GHz cooperative digital beamforming for 5G advanced system on an
SDR platform. In: IEEE Radio and Wireless Symposium (RWS). Vol. 2021. IEEE Publications. 2021. pp. 80–2. doi:
10.1109/RWS50353.2021.9360368.
[25] Aljiznawi RA, Alkhazaali NH, Jabbar SQ, Kadhim DJ. Quality of service (qos) for 5-g networks. Int J Future Comput
Commun. 2017; 6(1): 27–30. doi: 10.18178/ijfcc.2017.6.1.483.
[26] Si Y. Research on the balanced relationship between online consumer behavior and e-commerce service quality based on
5G network. Mob Inf Syst. 2021; 2021: 1–12. doi: 10.1155/2021/5562996.
U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review 127

[27] Dogra A, Jha RK, Jain S. A survey on beyond 5G network with the advent of 6G: Architecture and emerging technologies.
IEEE Access. 2020; 9: 67512–47. doi: 10.1109/ACCESS.2020.3031234.
[28] Chowdhury MZ, Shahjalal M, Ahmed S, Jang YM. 6G wireless communication systems: Applications, requirements,
technologies, challenges, and research directions. IEEE Open J Commun Soc. 2020; 1: 957–75. doi: 10.1109/OJCOMS.
2020.3010270.
[29] Ahmad I, Shahabuddin S, Kumar T, Okwuibe J, Gurtov A, Ylianttila M. Security for 5G and beyond. IEEE Commun Surv
Tutorials. 2019; 21(4): 3682–722. doi: 10.1109/COMST.2019.2916180.
[30] Kapass E, Touloupou M, Stavrianos P, Xylouris G, Kyriazis D. Managing and optimizing quality of service in 5-g
environments across the complete sla lifecycle. Adv Sci Technol Eng Syst J. 2019; 4(1): 329–42. doi: 10.25046/aj040132.
[31] Qian M, Wang Y, Zhou Y, Tian L, Shi J. A super base station based centralized network architecture for 5G mobile
communication systems. Digit Commun Netw. 2015; 1(2): 152–9. doi: 10.1016/j.dcan.2015.02.003.
[32] Baxter K, Lundberg J. From centralized systems to distributed 5G-enabled manufacturing. 2020.
[33] Nguyen HX, Trestian R, To D, Tatipamula M. Digital twin for 5G and beyond. IEEE Commun Mag. 2021; 59(2): 10–5.
doi: 10.1109/MCOM.001.2000343.
[34] Seilov SZ, Seilov AA, Shyngisov DS, Goikhman VY, Levakov AK, et al. The concept of building a network of
digital twins to increase the efficiency of complex telecommunication systems. Complexity. 2021; 2021: 1–9. doi:
10.1155/2021/9480235.
[35] Deng T, Zhang K, Shen Z-JM. A systematic review of a digital twin city: A new pattern of urban governance toward smart
cities. Manag Sci Eng. 2021; 6(2): 125–34. doi: 10.1016/j.jmse.2021.03.003.
[36] Zhou Z, Jia Z, Liao H, Lu W, Mumtaz S, Guizani M, et al. Secure and latencyaware digital twin assisted resource
scheduling for 5G edge computingempowered distribution grids. IEEE Trans Ind Inform. 2021; 18(7): 4933–43. doi:
10.1109/TII.2021.3137349.
[37] Dong R, She C, Hardjawana W, Li Y, Vucetic B. Deep learning for hybrid 5G services in mobile edge computing systems:
Learn from a digital twin. IEEE Trans Wirel Commun. 2019; 18(10): 4692–707. doi: 10.1109/TWC.2019.2927312.
[38] Qureshi HN, Manalastas M, Zaidi SMA, Imran A, Al Kalaa MO. Service Level agreements for 5G and beyond: Overview,
challenges and enablers of 5G-healthcare systems. IEEE Access. 2021; 9: 1044–61. doi: 10.1109/access.2020.3046927,
PMID 35211361.
[39] Christos SC, Christos G. Data-centric operations in oil & gas industry by the use of 5G mobile networks and industrial
Internet of Things (IIoT). In: Proceedings of the 13th Int. Conf. Digit Telecommun. 2018. p. 16.
[40] Israr A, Yang Q, Li W, Zomaya AY. Renewable energy powered sustainable 5G network infrastructure: Opportunities,
challenges and perspectives. J Netw Comput Appl. 2021; 175: 102910. doi: 10.1016/j.jnca.2020.102910.
[41] Baratè A, Haus G, Ludovico LA, Pagani E, Scarabottolo N. 5G technology for augmented and virtual reality in education.
Education and New Developments. Proceedings of the International Conference on Education and New Developments.
2019; 2019: 512–6. doi: 10.36315/2019v1end116.
[42] Hu F. Opportunities in 5G networks: A research and development perspective. CRC press. 2016.
[43] Shafique K, Khawaja BA, Sabir F, Qazi S, Mustaqim M. Internet of things (IoT) for next-generation smart systems: A
review of current challenges, future trends and prospects for emerging 5G-IoT scenarios. IEEE Access. 2020; 8: 23022–40.
doi: 10.1109/ACCESS.2020.2970118.
[44] Gupta A, Jha RK. A survey of 5G network: Architecture and emerging technologies. IEEE Access. 2015; 3: 1206–32. doi:
10.1109/ACCESS.2015.2461602.
[45] Kostopoulos A, Chochliouros IP, Spada MR. Business challenges for service provisioning in 5G networks. In: International
Conference on Business Information Systems. Springer. 2019. pp. 423–34.
[46] Djenouri Y, Srivastava G, Belhadi A, Lin JCW. Intelligent blockchain management for distributed knowledge graphs in
IoT 5G environments. Trans Emerg Telecommun Technol. 2021; e4332. doi: 10.1002/ett.4332.
[47] Rao SK, Prasad R. Impact of 5G technologies on smart city implementation. Wirel Personal Commun. 2018; 100(1):
161–76. doi: 10.1007/s11277-018-5618-4.
[48] Zaidi Z, Friderikos V, Yousaf Z, Fletcher S, Dohler M, Aghvami H. Will SDN be part of 5G? IEEE Commun Surv
Tutorials. 2018; 20(4): 3220–58. doi: 10.1109/COMST.2018.2836315.
[49] Xiang W, Zheng K, Shen XS. 5G mobile communications. Springer. 2016.
[50] Jain P, Poon J, Singh JP, Spanos C, Sanders SR, Panda SK. A digital twin approach for fault diagnosis in distributed
photovoltaic systems. IEEE Trans Power Electron. 2019; 35(1): 940–56. doi: 10.1109/TPEL.2019.2911594.
[51] Zhang H, Liu Q, Chen X, Zhang D, Leng J. A digital twin-based approach for designing and multi-objective optimization
of hollow glass production line. IEEE Access. 2017; 5: 26901–11. doi: 10.1109/ACCESS.2017.2766453.
[52] Mashaly M. Connecting the twins: A review on digital twin technology & its networking requirements. Procedia Comput
Sci. 2021; 184: 299–305. doi: 10.1016/j.procs.2021.03.039.
[53] Farsi M, Daneshkhah A, Hosseinian-Far A, Jahankhani H. Digital twin technologies and smart cities. Springer. 2020.
[54] Hu C, Fan W, Zeng E, Hang Z, Wang F, Qi L, et al. Digital twin-assisted real-time traffic data prediction method for
5G-enabled internet of vehicles. IEEE Trans Ind Inform. 2021; 18(4): 2811–9. doi: 10.1109/TII.2021.3083596.
[55] Dai Y, Zhang K, Maharjan S, Zhang Y. Deep reinforcement learning for stochastic computation offloading in digital twin
networks. IEEE Trans Ind Inform. 2020; 17(7): 4968–77. doi: 10.1109/TII.2020.3016320.
128 U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review

[56] Ivanov S, Nikolskaya K, Radchenko G, Sokolinsky L, Zymbler M. Digital twin of city: concept overview. In: Global Smart
Industry Conference (GloSIC). Vol. 2020. IEEE Publications. 2020. pp. 178–86. doi: 10.1109/GloSIC50886.2020.9267879.
[57] Wu Y, Zhang K, Zhang Y. Digital twin networks: A survey. IEEE Internet Things J. 2021; 8(18): 13789–804. doi:
10.1109/JIOT.2021.3079510.
[58] Deng J, Zheng Q, Liu G, Bai J, Tian K, Sun C, et al. A digital twin approach for self-optimization of mobile networks.
In: IEEE Wireless Communications and Networking Conference Workshops (WCNCW). Vol. 2021. IEEE Publications.
2021. pp. 1–6. doi: 10.1109/WCNCW49093.2021.9420037.
[59] Lv Z, Chen D, Feng H, Lou R, Wang H. Beyond 5G for digital twins of UAVs. Comput Netw. 2021; 197: 108366. doi:
10.1016/j.comnet.2021.108366.
[60] Lu Y, Huang X, Zhang K, Maharjan S, Zhang Y. Communication-efficient federated learning and permissioned blockchain
for digital twin edge networks. IEEE Internet Things J. 2020; 8(4): 2276–88. doi: 10.1109/JIOT.2020.3015772.
[61] Dixit A, Pathak H. Digital twin in healthcare. 2019.
[62] Wanasinghe TR, Wroblewski L, Petersen BK, Gosine RG, James LA, De Silva O, et al. Digital twin for the oil and gas
industry: Overview, research trends, opportunities, and challenges. IEEE Access. 2020; 8: 104175–97. doi: 10.1109/AC-
CESS.2020.2998723.
[63] Li X, Cao J, Liu Z, Luo X. Sustainable business model based on digital twin platform network: The inspiration from
haier’s case study in China. Sustainability. 2020; 12(3): 936. doi: 10.3390/su12030936.
[64] Tao F, Zhang H, Liu A, Nee AYC. Digital twin in industry: State-of-the-art. IEEE Trans Ind Inform. 2018; 15(4): 2405–15.
doi: 10.1109/TII.2018.2873186.
[65] Liljaniemi A, Paavilainen H. Using digital twin technology in engineering education-course concept to explore benefits
and barriers. Open Eng. 2020; 10(1): 377–85. doi: 10.1515/eng-2020-0040.
[66] Schleich B, Anwer N, Mathieu L, Wartzack S. Shaping the digital twin for design and production engineering. CIRP Ann.
2017; 66(1): 141–4. doi: 10.1016/j.cirp.2017.04.040.
[67] El Marai O, Taleb T, Song J. Roads infrastructure digital twin: A step toward smarter cities realization. IEEE Netw. 2020;
35(2): 136–43.
[68] Jiang L, Zheng H, Tian H, Xie S, Zhang Y. Cooperative federated learning and model update verification in blockchain
empowered digital twin edge networks. IEEE Internet Things J. 2021; 9(13): 11154–67. doi: 10.1109/JIOT.2021.3126207.
[69] Picone M, Mamei M, Zambonelli F. WLDT: A general purpose library to build IoT digital twins. SoftwareX. 2021; 13:
100661. doi: 10.1016/j.softx.2021.100661.
[70] Pylianidis C, Osinga S, Athanasiadis IN. Introducing digital twins to agriculture. Comput Electron Agric. 2021; 184:
105942. doi: 10.1016/j.compag.2020.105942.
[71] Bachelor G, Brusa E, Ferretto D, Mitschke A. Model-based design of complex aeronautical systems through digital twin
and thread concepts. IEEE Syst J. 2019; 14(2): 1568–79. doi: 10.1109/JSYST.2019.2925627.
[72] Phanden RK, Sharma P, Dubey A. A review on simulation in digital twin for aerospace, manufacturing and robotics.
Mater Today Proc. 2021; 38: 174–8. doi: 10.1016/j.matpr.2020.06.446.
[73] Groshev M, Guimarães C, Martín-Pérez J, de la Oliva A. Toward intelligent cyber-physical systems: Digital twin meets
artificial intelligence. IEEE Commun Mag. 2021; 59(8): 14–20. doi: 10.1109/MCOM.001.2001237.
[74] Ruohomäki T, Airaksinen E, Huuska P, Kesäniemi O, Martikka M, Suomisto J. Smart city platform enabling digital
twin. In: International Conference on Intelligent Systems (IS). Vol. 2018. IEEE Publications. 2018. pp. 155–61. doi:
10.1109/IS.2018.8710517.
[75] Kritzinger W, Karner M, Traar G, Henjes J, Sihn W. Digital Twin in manufacturing: A categorical literature review and
classification. IFAC PapersOnLine. 2018; 51(11): 1016–22. doi: 10.1016/j.ifacol.2018.08.474.
[76] Wang Z, Gupta R, Han K, Wang H, Ganlath A, Ammar N, et al. Mobility digital twin: Concept, architecture, case study,
and future challenges. IEEE Internet Things J. 2022; 9(18): 17452–67. doi: 10.1109/JIOT.2022.3156028.
[77] Dietz M, Vielberth M, Pernul G. Integrating digital twin security simulations in the security operations center.
In: Proceedings of the 15th International Conference on Availability, Reliability and Security. 2020. pp. 1–9. doi:
10.1145/3407023.3407039.
[78] Mughees A, Tahir M, Sheikh MA, Ahad A. Towards energy efficient 5G networks using machine learning: Taxon-
omy, research challenges, and future research directions. IEEE Access. 2020; 8: 187498–522. doi: 10.1109/ACCESS.
2020.3029903.
[79] Buzzi S, I C, Klein TE, Poor HV, Yang C, Zappone A. A survey of energy-efficient techniques for 5G networks and
challenges ahead. IEEE J Sel Areas Commun. 2016; 34(4): 697–709. doi: 10.1109/JSAC.2016.2550338.
[80] Usama M, Erol-Kantarci M. A survey on recent trends and open issues in energy efficiency of 5G. Sensors (Basel). 2019;
19(14): 3126. doi: 10.3390/s19143126, PMID 31311203.
[81] Nguyen LD. Resource allocation for energy efficiency in 5G wireless networks. EAI Endorsed Trans Ind Netw Intell Syst.
2018; 5(14): e1. doi: 10.4108/eai.27-6-2018.154832.
[82] Humayun M, Jhanjhi N, Alruwaili M, Amalathas SS, Balasubramanian V, Selvaraj B. Privacy protection and energy
optimization for 5G-aided industrial Internet of Things. IEEE Access. 2020; 8: 183665–77. doi: 10.1109/ACCESS.
2020.3028764.
[83] Su G, Moh M. Improving energy efficiency and scalability for IoT communications in 5G networks. In: Proceedings
of the 12th International Conference on Ubiquitous Information Management and Communication. 2018. pp. 1–8. doi:
U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review 129

10.1145/3164541.3164547.
[84] Huynh D-T, Wang X, Duong TQ, Vo N-S, Chen M. Social-aware energy efficiency optimization for device-to-device
communications in 5G networks. Comput Commun. 2018; 120: 102–11. doi: 10.1016/j.comcom.2018.02.008.
[85] Alsharif MH, Kelechi AH, Kim J, Kim JH. Energy efficiency and coverage trade-off in 5G for eco-friendly and sustainable
cellular networks. Symmetry. 2019; 11(3): 408. doi: 10.3390/sym11030408.
[86] Ali A, Shah GA, Arshad J. Energy efficient resource allocation for M2M devices in 5G. Sensors (Basel). 2019; 19(8):
1830. doi: 10.3390/s19081830, PMID 30999622.
[87] Bashir AK, Arul R, Basheer S, Raja G, Jayaraman R, Qureshi NMF. An optimal multitier resource allocation of cloud
RAN in 5G using machine learning. Trans Emerg Telecommun Technol. 2019; 30(8): e3627. doi: 10.1002/ett.3627.
[88] Mowla MM, Ahmad I, Habibi D, Phung QV. Energy efficient backhauling for 5G small cell networks. IEEE Trans Sustain
Comput. 2018; 4(3): 279–92. doi: 10.1109/TSUSC.2018.2838116.
[89] Dai Y, Zhang K, Maharjan S, Zhang Y. Edge intelligence for energy-efficient computation offloading and resource
allocation in 5G beyond. IEEE Trans Veh Technol. 2020; 69(10): 12175–86. doi: 10.1109/TVT.2020.3013990.
[90] Jones RW, Katzis K. 5G and wireless body area networks. In: IEEE Wireless Communications and Networking Conference
Workshops (WCNCW). Vol. 2018. IEEE Publications. 2018. pp. 373–8. doi: 10.1109/WCNCW.2018.8369035.
[91] Li S, Da Xu L, Zhao S. 5G Internet of Things: A survey. J Ind Inf Integr. 2018; 10: 1–9. doi: 10.1016/j.jii.2018.01.005.
[92] Jiang D, Wang Y, Lv Z, Wang W, Wang H. An energy-efficient networking approach in cloud services for IIoT networks.
IEEE J Sel Areas Commun. 2020; 38(5): 928–41. doi: 10.1109/JSAC.2020.2980919.
[93] Kumar V, Yadav S, Sandeep DN, Dhok SB, Barik RK, Dubey H. 5G cellular: concept, research work and enabling
technologies. In: Advances in Data and Information Sciences. Springer. 2019. pp. 327–38. doi: 10.1007/978-981-13-0277-
0_27.
[94] Salem FE, Altman Z, Gati A, Chahed T, Altman E. Reinforcement learning approach for advanced sleep modes man-
agement in 5G networks. In: 88th Vehicular Technology Conference (VTC-Fall). IEEE Publications. 2018. pp. 1–5. doi:
10.1109/VTCFall.2018.8690555.
[95] Kour H, Jha RK, Jain S. A comprehensive survey on spectrum sharing: Architecture, energy efficiency and security issues.
J Netw Comput Appl. 2018; 103: 29–57. doi: 10.1016/j.jnca.2017.11.010.
[96] Xiong Z, Zhang Y, Niyato D, Deng R, Wang P, Wang L-C. Deep reinforcement learning for mobile 5G and beyond: Fun-
damentals, applications, and challenges. IEEE Veh Technol Mag. 2019; 14(2): 44–52. doi: 10.1109/MVT.2019.2903655.
[97] Dinh THL, Kaneko M, Fukuda EH, Boukhatem L. Energy efficient resource allocation optimization in fog radio access
networks with outdated channel knowledge. IEEE Trans Green Commun Netw. 2020; 5(1): 146–59. doi: 10.1109/
TGCN.2020.3034638.
[98] Qamar F, Hindia MHDN, Dimyati K, Noordin KA, Amiri IS. Interference management issues for the future 5G network:
A review. Telecommun Syst. 2019; 71(4): 627–43. doi: 10.1007/s11235-019-00578-4.
[99] Sigwele T, Alam AS, Pillai P, Hu YF. Evaluating energy-efficient cloud radio access networks for 5G. In: IEEE
International Conference on Data Science and Data Intensive Systems. Vol. 2015. IEEE Publications. 2015. pp. 362–7.
doi: 10.1109/DSDIS.2015.73.
[100] Liao D-Y, Wang X. 5G Wireless micro operators for integrated casinos and entertainment in smart cities. In: Handbook of
Smart Cities. Springer. 2018. pp. 115–49.
[101] Marabissi D, Mucchi L, Fantacci R, Spada M, Massimiani F, Fratini A, et al. A real case of implementation of the future
5G city. Future Internet. 2018; 11(1): 4. doi: 10.3390/fi11010004.
[102] Sigwele T, Hu YF, Ali M, Hou J, Susanto M, Fitriawan H. Intelligent and energy efficient mobile smartphone gateway for
healthcare smart devices based on 5G. In: IEEE Global Communications Conference (GLOBECOM). Vol. 2018. IEEE
Publications. 2018. pp. 1–7. doi: 10.1109/GLOCOM.2018.8648031.
[103] Yan G. Simulation analysis of key technology optimization of 5G mobile communication network based on Internet of
Things technology. Int J Distrib Sens Netw. 2019; 15(6). doi: 10.1177/1550147719851454.
[104] Memon ML, Maheshwari MK, Saxena N, Roy A, Shin DR. Artificial intelligence-based discontinuous reception for
energy saving in 5G networks. Electronics. 2019; 8(7): 778. doi: 10.3390/electronics8070778.
[105] Valecce G, Strazzella S, Grieco LA. On the interplay between 5g, mobile edge computing and robotics in smart agriculture
scenarios. In: International Conference on Ad-Hoc Networks and Wireless. Springer. 2019. pp. 549–59.
[106] Chang K-C, Chu K-C, Wang H-C, Lin Y-C, Pan J-S. Energy saving technology of 5G base station based on internet of
things collaborative control. IEEE Access. 2020; 8: 32935–46. doi: 10.1109/ACCESS.2020.2973648.
[107] I C, Han S, Bian S. Energy-efficient 5G for a greener future. Nat Electron. 2020; 3(4): 182–4. doi: 10.1038/s41928-020-
0404-1.
[108] Xie R, Li Z, Wu J, Jia Q, Huang T. Energy-efficient joint caching and transcoding for HTTP adaptive streaming in 5G
networks with mobile edge computing. China Commun. 2019; 16(7): 229–44. doi: 10.23919/JCC.2019.07.017.
[109] Ramaiah VS, Singh B, Raju AR, Reddy GN, Saikumar K, Ratnayake D. Teaching and Learning based 5G cognitive radio
application for future application. In: International Conference on Computational Intelligence and Knowledge Economy
(ICCIKE). Vol. 2021. IEEE Publications. 2021. pp. 31–6.
[110] Im HYR, Thar K, Hong CS. Q-learning based social community-aware energy efficient cooperative caching in 5G networks.
In: Eleventh International Conference on Ubiquitous and Future Networks (ICUFN). Vol. 2019. IEEE Publications. 2019.
pp. 500–3. doi: 10.1109/ICUFN.2019.8806093.
130 U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review

[111] Ye Q, Li J, Qu K, Zhuang W, Shen XS, Li X. End-to-end quality of service in 5G networks: Examining the effectiveness
of a network slicing framework. IEEE Veh Technol Mag. 2018; 13(2): 65–74. doi: 10.1109/MVT.2018.2809473.
[112] RicartSanchez R, Malagon P, MatencioEscolar A, Alcaraz Calero JM, Wang Q. Toward hardwareaccelerated QoSaware
5G network slicing based on data plane programmability. Trans Emerg Telecommun Technol. 2020; 31(1): e3726. doi:
10.1002/ett.3726.
[113] Sangaiah AK, Javadpour A, Pinto P, Ja’fari F, Zhang W. Improving quality of service in 5G resilient communication with
the cellular structure of smartphones. ACM Trans Sens Netw. 2022; 18(3): 1–23. doi: 10.1145/3512890.
[114] Rehman AU, Mahmood I, Kamran M, Sanaullah M, Ijaz A, Ali J, et al. Enhancement in Quality-of-Services using 5G cel-
lular network using resource reservation protocol. Phys Commun. 2022; 55: 101907. doi: 10.1016/j.phycom.2022.101907.
[115] Wang Q, Alcaraz-Calero J, Ricart-Sanchez R, Weiss MB, Gavras A, Nikaein N, et al. Enable advanced QoS-aware
network slicing in 5G networks for slice-based media use cases. IEEE Trans Broadcast. 2019; 65(2): 444–53. doi:
10.1109/TBC.2019.2901402.
[116] Li S, Kim JG, Han DH, Lee KS. A survey of energy-efficient communication protocols with QoS guarantees in wireless
multimedia sensor networks. Sensors (Basel). 2019; 19(1): 199. doi: 10.3390/s19010199, PMID 30621117.
[117] Hussain B, Du Q, Sun B, Han Z. Deep learning-based DDoS-attack detection for cyber-physical system over 5G network.
IEEE Trans Ind Inform. 2020; 17(2): 860–70. doi: 10.1109/TII.2020.2974520.
[118] Moudoud H, Khoukhi L, Cherkaoui S. Prediction and detection of fdia and ddos attacks in 5g enabled iot. IEEE Netw.
2020; 35(2): 194–201. doi: 10.1109/MNET.011.2000449.
[119] Sattar D, Matrawy A. Towards secure slicing: using slice isolation to mitigate DDoS attacks on 5G core network slices. In:
IEEE Conference on Communications and Network Security (CNS). Vol. 2019. IEEE Publications. 2019. pp. 82–90. doi:
10.1109/CNS.2019.8802852.
[120] Javed MA, Niazi Sk. 5G security artifacts (DoS/DDoS and authentication). In: International Conference on Communication
Technologies (ComTech). Vol. 2019. IEEE Publications. 2019. pp. 127–33.
[121] Ghorbani H, Mohammadzadeh MS, Ahmadzadegan MH. DDoS attacks on the IoT network with the emergence of 5G. In:
International Conference on Technology and Entrepreneurship-Virtual (ICTE-V). Vol. 2020. IEEE Publications. 2020.
pp. 1–5. doi: 10.1109/ICTE-V50708.2020.9113779.
[122] Mamolar AS, Pervez Z, Wang Q, Alcaraz-Calero JM. Towards the detection of mobile ddos attacks in 5g multi-tenant
networks. In: European Conference on Networks and Communications (EuCNC). Vol. 2019. IEEE Publications. 2019.
pp. 273–7. doi: 10.1109/EuCNC.2019.8801975.
[123] Almiani M, AbuGhazleh A, Jararweh Y, Razaque A. DDoS detection in 5G-enabled IoT networks using deep Kalman
backpropagation neural network. Int J Mach Learn Cybern. 2021; 12(11): 3337–49. doi: 10.1007/s13042-021-01323-7.
[124] Dao N-N, Vu D-N, Lee Y, Park M, Cho S. MAEC-X: DDoS prevention leveraging multi-access edge computing. In:
International Conference on Information Networking (ICOIN). Vol. 2018. IEEE Publications. 2018. pp. 245–8. doi:
10.1109/ICOIN.2018.8343118.
[125] Alamri HA, Thayananthan V, Yazdani J. Machine Learning for Securing SDN based 5G network. Int J Comput Appl.
2021; 174(14): 9–16. doi: 10.5120/ijca2021921027.
[126] Tu Z, Zhou H, Li K, Li M, Tian A. An energy-efficient topology design and DDoS attacks mitigation for green software-
defined satellite network. IEEE Access. 2020; 8: 211434–50. doi: 10.1109/ACCESS.2020.3039975.
[127] Ghahramani M, Javidan R, Shojafar M, Taheri R, Alazab M, Tafazolli R. RSS: An energy-efficient approach for se-
curing IoT service protocols against the DoS attack. IEEE Internet Things J. 2020; 8(5): 3619–35. doi: 10.1109/JIOT.
2020.3023102.
[128] Wang B, Sun Y, Xu X. A scalable and energy-efficient anomaly detection scheme in wireless SDN-based mMTC networks
for IoT. IEEE Internet Things J. 2020; 8(3): 1388–405. doi: 10.1109/JIOT.2020.3011521.
[129] Abidoye AP, Obagbuwa IC. DDoS attacks in WSNs: Detection and countermeasures. IET Wirel Sens Syst. 2018; 8(2):
52–9. doi: 10.1049/iet-wss.2017.0029.
[130] Bhola J, Soni S. Information theory-based defense mechanism against DDOS attacks for WSAN. In: Advances in VLSI,
Communication, and Signal Processing. Springer. 2021. pp. 667–78. doi: 10.1007/978-981-15-6840-4_55.
[131] Ye J, Cheng X, Zhu J, Feng L, Song L. A DDoS attack detection method based on SVM in software defined network. Sec
Commun Netw. 2018; 2018: 1–8. doi: 10.1155/2018/9804061.
[132] Li D, Yu C, Zhou Q, Yu J. Using SVM to detect DDoS attack in SDN network. In: IOP Conference Series. Mater Sci Eng.
2018; 466, no. 1:012003.
[133] Rahman O, Quraishi MAG, Lung C-H. DDoS attacks detection and mitigation in SDN using machine learning. In: IEEE
World Congress on Services (SERVICES). Vol. 2642. IEEE Publications. 2019. pp. 184–9. doi: 10.1109/SERVICES.
2019.00051.
[134] V. VM. ProSD-EdgeIoT: protected Cluster assisted SDWSN for Tetrad Edge-IoT by Collaborative DDoS Detection and
Mitigation. Cyber Phys Syst. 2021; 1–30.
[135] Pajila PJB, Julie EG, Robinson YH. FBDR-Fuzzy based DDoS attack Detection and Recovery mechanism for wireless
sensor networks. Wirel Personal Commun. 2022; 122(4): 3053–83. doi: 10.1007/s11277-021-09040-8.
[136] Vashist A, Keats A, Pudukotai Dinakarrao SMP, Ganguly A. Securing a wireless network-on-chip against jamming-based
denial-of-service and eavesdropping attacks. IEEE Trans Very Large Scale Integr (VLSI) Syst. 2019; 27(12): 2781–91.
doi: 10.1109/TVLSI.2019.2928960.
U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review 131

[137] Sonar K, Upadhyay H. A survey: DDOS attack on Internet of Things. Int J Eng Res Dev. 2014; 10(11): 58–63.
[138] Kshirsagar D, Kumar S. A feature reduction based reflected and exploited DDoS attacks detection system. J Ambient
Intell Hum Comput. 2022; 13(1): 393–405. doi: 10.1007/s12652-021-02907-5.
[139] Ismail S, Hassen HR, Just M, Zantout H. A review of amplification-based distributed denial of service attacks and their
mitigation. Comput Sec. 2021; 109: 102380. doi: 10.1016/j.cose.2021.102380.
[140] Mohammadnia H, Slimane SB. IoT-NETZ: practical spoofing attack mitigation approach in SDWN network. In: Seventh
International Conference on Software Defined Systems (SDS). Vol. 2020. IEEE Publications. 2020. pp. 5–13. doi:
10.1109/SDS49854.2020.9143903.
[141] Balaji Bharatwaj M, Aditya Reddy M, Senthil Kumar T, Vajipayajula S. Detection of DoS and DDoS attacks using
hidden markov model. In: Inventive Communication and Computational Technologies. Springer. 2022. pp. 979–92. doi:
10.1007/978-981-16-5529-6_74.
[142] Kurt B, Çıldız Ç, Ceritli TY, Sankur B, Cemgil AT. A Bayesian change point model for detecting SIP-based DDoS attacks.
Digit Signal Process. 2018; 77: 48–62. doi: 10.1016/j.dsp.2017.10.009.
[143] L. SHI. Two Decades of DDoS attacks and defenses.
[144] Kurnaz S, Khalid A. A new distributed denial-of-service (DDoS) attacks detection system combining multistage autoen-
coders with radial basis function (RBF). 2019.
[145] Wang M, Lu Y, Qin J. Source-based defense against DDoS attacks in SDN based on sFlow and SOM. IEEE Access. 2021;
10: 2097–116. doi: 10.1109/ACCESS.2021.3139511.
[146] áíotelo Monge MA, Herranz González A, Lorenzo Fernández B, Maestre Vidal D, Rius García G, Maestre Vidal J.
Traffic-flow analysis for source-side DDoS recognition on 5G environments. J Netw Comput Appl. 2019; 136: 114–31.
doi: 10.1016/j.jnca.2019.02.030.
[147] Swami R, Dave M, Ranga V. Software-defined networking-based DDoS defense mechanisms. ACM Comput Surv. 2020;
52(2): 1–36. doi: 10.1145/3301614.
[148] Xia S-M, Guo S-Z, Bai W, Qiu J-Y, Wei H, Pan Z-S. A new smart router-throttling method to mitigate DDoS attacks.
IEEE Access. 2019; 7: 107952–63. doi: 10.1109/ACCESS.2019.2930803.
[149] Yigit Y, Bal B, Karameseoglu A, Duong TQ, Canberk B. Digital twinenabled intelligent DDoS detection mechanism for
autonomous core networks. IEEE Common Stand Mag. 2022; 6(3): 38–44. doi: 10.1109/MCOMSTD.0001.2100022.
[150] Doshi R, Apthorpe N, Feamster N. Machine learning ddos detection for consumer internet of things devices. In: IEEE
Security and Privacy Workshops (SPW). Vol. 2018. IEEE Publications. 2018. pp. 29–35. doi: 10.1109/SPW.2018.00013.
[151] Wang W, Ke X, Wang L. A HMM-R Approach to Detect L-DDoS Attack Adaptively on SDN Controller. Future Internet.
2018; 10(9): 83. doi: 10.3390/fi10090083.
[152] Sahoo KS, Tripathy BK, Naik K, Ramasubbareddy S, Balusamy B, Khari M, et al. An evolutionary SVM model for DDOS
attack detection in software defined networks. IEEE Access. 2020; 8: 132502–13. doi: 10.1109/ACCESS.2020.3009733.
[153] Rios VdM, Inácio PRM, Magoni D, Freire MM. Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and
machine learning algorithms. Comput Netw. 2021; 186: 107792. doi: 10.1016/j.comnet.2020.107792.
[154] Zhang Y, Cheng Y. An amplification DDoS attack defence mechanism using reinforcement learning. In: IEEE Smart-
World, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications,
Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBD-
Com/IOP/SCI). Vol. 2019. IEEE Publications. 2019. pp. 634–9. doi: 10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-
SCI.2019.00145.
[155] Chen Y-W, Sheu J-P, Kuo Y-C, Van Cuong N. Design and implementation of IoT DDoS attacks detection system based on
machine learning. In: European Conference on Networks and Communications (EuCNC). Vol. 2020. IEEE Publications.
2020. pp. 122–7. doi: 10.1109/EuCNC48522.2020.9200909.
[156] Srihari Rao N, Chandra Sekharaiah KC, Ananda Rao A. A survey of distributed denial-of-service (DDoS) defense
techniques in ISP domains. In: Innovations in Computer Science and Engineering. Springer. 2019. pp. 221–30. doi:
10.1007/978-981-10-8201-6_25.
[157] Xu Z, Wang X, Zhang Y. Towards persistent detection of DDoS attacks in NDN: A sketchbased approach. IEEE Trans
Depend Sec Comput. 2022; 20(4): 3449–65. doi: 10.1109/TDSC.2022.3196187.
[158] Al-Naymat G, Al-Kasassbeh M, et al. Harwari, Using machine learning methods for detecting network anomalies within
SNMP-MIB dataset. Int J Wirel Mob Comput. 2018; 15(1): 67–76.
[159] Ghali AA, Ahmad R, Alhussian H. A framework for enhancing network lifetime in Internet of things environment
using clustering formation. In: International Conference on Artificial Intelligence for Smart Community. Springer. 2022.
pp. 401–7.
[160] Aminu Ghali A, Ahmad R, Alhussian HSA. Comparative analysis of DoS and DDoS attacks in Internet of Things
environment. In: Computer Science On-Line Conference. Springer. 2020. pp. 183–94. doi: 10.1007/978-3-030-51971-
1_15.
[161] Brenner B, Hummel V. Digital twin as enabler for an innovative digital shop-floor management system in the ESB Logistics
Learning Factory at Reutlingen University. Procedia Manuf. 2017; 9: 198–205. doi: 10.1016/j.promfg.2017.04.039.
[162] Grieves M, Vickers J. Digital twin: mitigating unpredictable, undesirable emergent behavior in complex systems. In:
Transdisciplinary Perspectives on Complex Systems. Springer. 2017. pp. 85–113.
132 U.D. Maiwada et al. / Energy efficiency in 5G systems: A systematic literature review

[163] Schluse M, Priggemeyer M, Atorf L, Rossmann J. Experimentable digital twins-streamlining simulation-based systems
engineering for industry 4.0. IEEE Trans Ind Inform. 2018; 14(4): 1722–31. doi: 10.1109/TII.2018.2804917.
[164] Kaewunruen S, Xu N. Digital twin for sustainability evaluation of railway station buildings. Front Built Environ. 2018; 4:
77. doi: 10.3389/fbuil.2018.00077.
[165] Bruynseels K, Santoni de Sio F, Van den Hoven J. Digital twins in health care: Ethical implications of an emerging
engineering paradigm. Front Genet. 2018; 9: 31. doi: 10.3389/fgene.2018.00031, PMID 29487613.
[166] Kaewunruen S, Rungskunroch P, Welsh J. A digital-twin evaluation of net zero energy building for existing buildings.
Sustainability. 2018; 11(1): 159. doi: 10.3390/su11010159.
[167] Leng J, Yan D, Liu Q, Xu K, Zhao JL, Shi R, et al. ManuChain: Combining permissioned blockchain with a holistic
optimization model as bi-level intelligence for smart manufacturing. IEEE Trans Syst Man Cybern Syst. 2019; 50(1):
182–92. doi: 10.1109/TSMC.2019.2930418.
[168] Borth M, Verriet J, Muller G. Digital twin strategies for SoS 4 challenges and 4 architecture setups for digital twins of
SoS. In: 14th Annual Conference System of Systems Engineering (SoSE). Vol. 2019. IEEE Publications. 2019. pp. 164–9.
doi: 10.1109/SYSOSE.2019.8753860.
[169] Liu C, Vengayil H, Lu Y, Xu X. A cyber-physical machine tools platform using OPC UA and MTConnect. J Manuf Syst.
2019; 51: 61–74. doi: 10.1016/j.jmsy.2019.04.006.
[170] Fotland G, Haskins C, Rølvåg T. Trade study to select best alternative for cable and pulley simulation for cranes on
offshore vessels. Syst Eng. 2020; 23(2): 177–88. doi: 10.1002/sys.21503.
[171] Liu M, Fang S, Dong H, Xu C. Review of digital twin about concepts, technologies, and industrial applications. J Manuf
Syst. 2021; 58: 346–61. doi: 10.1016/j.jmsy.2020.06.017.
[172] Lv Z, Chen D, Feng H, Wei W, Lv H. Artificial intelligence in underwater digital twins sensor networks. ACM Trans Sens
Netw (TOSN). 2022; 18(3): 1–27.
[173] Huang W, Zhang Y, Zeng W. Development and application of digital twin technology for integrated regional energy
systems in smart cities. Sustain Comput Inform Syst. 2022; 36: 100781. doi: 10.1016/j.suscom.2022.100781.
[174] Drago C, Gatto A. An intervalvalued composite indicator for energy efficiency and green entrepreneurship. Bus Strategy
Environ. 2022; 31(5): 2107–26. doi: 10.1002/bse.3010.
[175] Islam KY, Ahmad I, Habibi D, Waqar A. A survey on energy efficiency in underwater wireless communications. J Netw
Comput Appl. 2022; 198: 103295. doi: 10.1016/j.jnca.2021.103295.
[176] Li M, Pan X, Yuan S. Do the national industrial relocation demonstration zones have higher regional energy efficiency?
Appl Energy. 2022; 306: 117914. doi: 10.1016/j.apenergy.2021.117914.
[177] Macharia KK, Gathiaka JK, Ngui D. Energy efficiency in the Kenyan manufacturing sector. Energy Policy. 2022; 161:
112715. doi: 10.1016/j.enpol.2021.112715.
[178] Dong F, Li Y, Li K, Zhu J, Zheng L. Can smart city construction improve urban ecological total factor energy efficiency in
China? Fresh evidence from generalized synthetic control method. Energy. 2022; 241: 122909. doi: 10.1016/j.energy.
2021.122909.
[179] Kong X, Duan G, Hou M, Shen G, Wang H, Yan X, et al. Deep reinforcement learning based energy efficient edge
computing for internet of vehicles. IEEE Trans Ind Inform. 2022; 18(9): 6308–16. doi: 10.1109/TII.2022.3155162.
[180] Alsenwi M, Tun YK, Han Z, Hong CS. N.N. Ei. In: Energy-efficient resource allocation in multi-UAV-assisted two-stage
edge computing for beyond 5G networks. IEEE transactions on intelligent transportation systems. 2022.
[181] Xu L, Zhou X, Li Y, Cai F, Yu X, Kumar N. Intelligent power allocation algorithm for energy-efficient mobile internet of
things (IoT) networks. IEEE Trans Green Commun Netw. 2022; 6(2): 766–75. doi: 10.1109/TGCN.2022.3144532.
[182] Alviola T. Energy efficiency in wireless networks. 2013.
[183] Alraih S, Nordin R, Shayea I, Abdullah NF, Alhammadi A. Ping-pong handover effect reduction in 5G and beyond
networks. 2021 IEEE Microwave Theory and Techniques in Wireless Communications (MTTW). 2021. pp. 97–101. doi:
10.1109/MTTW53539.2021.9607205.
[184] Xia D, Shi J, Wan K, Wan J, Martínez-García M, Guan X. Digital twin and artificial intelligence for intelligent planning
and energyefficient deployment of 6G networks in smart factories. IEEE Wirel Commun. 2023; 30(3): 171–9. doi:
10.1109/MWC.017.2200495.
[185] Amponis G, Radoglou-Grammatikis P, Nakas G, Goudos S, Argyriou V, Lagkas T, et al. 5G core PFCP intrusion detection
dataset. In: 12th International Conference on Modern Circuits and Systems Technologies (MOCAST). Vol. 2023. IEEE
Publications. 2023. pp. 1–4. doi: 10.1109/MOCAST57943.2023.10176693.
[186] Makai LB, Varga P. Predicting Mobility Management Demands of cellular Networks based on User Behavior. In:
Noms IEEE/IFIP Network Operations and Management Symposium. Vol. 2023. IEEE Publications. 2023. pp. 1–6. doi:
10.1109/NOMS56928.2023.10154215.
[187] Malekzadeh M. Performance prediction and enhancement of 5G networks based on linear regression machine learning.
EURASIP J Wirel Commun Netw. 2023; 2023(1): 1–34.
[188] Selvakumar BSGJ, Soman S, Chandran RK, Raja A, Devarajan BN, Thandapani M. QoS based power allocation in 5G
wireless networks. AIP Conf Proc. 2023; 2790(1). doi: 10.1063/5.0152566.
[189] Pramod M, Balodi A, Pratik A, Sankalp GS, Varshita B, Amrit R. 4 Energy-Effcient Reinforcement Learning in Wireless
Sensor. applications of 5G and beyond in smart cities. 2023; 63.

You might also like