
epidemic data from recent and past pandemic
trends, may be used to achieve this.
According to, [16], [17], the DT may assess
the overall performance of a 5G connected
vehicle and enable customized services to be
delivered. AI is used to forecast a vehicle's
performance under a variety of dynamic
scenarios, diagnose issues, and implement
improvements, making the user's driving
experience safer. Before deploying the
technology on public roadways, it must be
thoroughly tested using emulations. The Spirent
5G DT uses a 3xD drive-in simulator to simulate
a 5G network for evaluating the behavior and
performance of connected vehicles in a
controlled realistic environment.
According to, [18], In relation to the density
of femtocell deployment, the UE simultaneously
achieves enhanced QoS and significantly reduced
energy consumption per bit. More complex HO
decision algorithms with the inclusion of LTE
femtocells are necessary, alongside an Energy
Efficient HO decision procedure for the
macrocell - femtocell LTE system that seeks to
lower power transferred at the mobile terminals,
thus allowing to optimally utilize the native
femtocell authority in terms of improved QoS
and lower consumption of energy.
According to, [19], different service levels in
terms of throughput, latency (delay), jitter (delay
fluctuation), and packet errors or loss are
provided for different types or streams of data to
offer QoS. The goal of their work is to present a
basic QoS principle for the 5G LTE service.
According to, [20], they uses WLAN models
from network simulators to create Energy
Efficiency and secure wireless networks. The
main contributions of this study include the
effect of proposed Energy Efficient WTLS
security protocol modifications on the energy
used by the IPsec protocol, principles to enhance
the precision and effectiveness of WLAN energy
models to effectively simulate massive and
intricate wireless networks, and design and
verification of energy models for WLAN
situations using real-world measurements.
According to, [21], Modeling and Simulation
(M&S) has been used for a long time as a
method of decision-making for a range of
complex problem solutions, including the
application in Digital Twins. In contrast to the
overall multi-dimensional nature of real-world
complex systems, standard single type M&S
techniques, such as Discrete Event Simulation
(DES), System Dynamics (SD), and Agent-
Based Simulation (ABS), might encounter
significant challenges in accurately representing
such systems at various abstraction, temporal, or
spatial levels. To address these difficulties, a
variety of hybrid and multi-model M&S
techniques for simulation and modeling of
various aspects of complex systems have been
developed.
According to, [22], Attacks via Distributed
Denial of Service (DDoS) damage the Internet's
digital accessibility. The user's expectation of
receiving prompt and efficient services could be
severely harmed by DDoS attackers. There are
numerous stories of DDoS attack incidents that
have had catastrophic repercussions on Internet
users and web services. Users are multiplying
daily in the current digital environment, which is
dominated by wireless, mobile, and IoT gadgets.
Because most users are inexperienced, DDoS
assaults frequently target their devices, or they
unintentionally join the DDoS attack Force.
According to, [23], Threats from the radio
interface can be deadly due to 5G's increasing
access speeds and the rapidly expanding IoT
technology. To address the three stages of a
DDoS attack, the breach or infection of
terminals, the weaponization of the terminal, and
the DDoS attack itself, DDoS detect, and
mitigation will be required. Even when under
attack, critical network services and customer
experience must be maintained. For 5G
enterprise customers, security reporting and
analysis will be crucial. These will comprise
attack mitigation records, event analysis, host
infection predictive analysis, and pattern reports.
According to, [24], The current research has
covered a range of 5G concerns as well as the
security risks posed by IoT. The repercussions of
the most serious cyberattack, known as a
Distributed Denial of Service Attack (DDoS),
call for loT’s attention, making finding solutions
essential. As a result, it offers an overview of the
development of 5G, 5G-enabled IoT
applications, and the size of DDoS attacks in
such applications. Their study offers guidance on
WSEAS TRANSACTIONS on COMMUNICATIONS
DOI: 10.37394/23204.2023.22.16
Umar Danjuma Maiwada,
Kamaluddeen Usman Danyaro,
Aliza Bt Sarlan, M. S. Liew, Umar Ismaila Audi