Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

A Theoretical Model and Business Solutions for Improving 5G+ Transportation Services

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2020
Authors:
Vijey Thayananthan, Abdullah Algarni
10.5120/ijca2020919810

Vijey Thayananthan and Abdullah Algarni. A Theoretical Model and Business Solutions for Improving 5G+ Transportation Services. International Journal of Computer Applications 177(33):17-25, January 2020. BibTeX

@article{10.5120/ijca2020919810,
	author = {Vijey Thayananthan and Abdullah Algarni},
	title = {A Theoretical Model and Business Solutions for Improving 5G+ Transportation Services},
	journal = {International Journal of Computer Applications},
	issue_date = {January 2020},
	volume = {177},
	number = {33},
	month = {Jan},
	year = {2020},
	issn = {0975-8887},
	pages = {17-25},
	numpages = {9},
	url = {http://www.ijcaonline.org/archives/volume177/number33/31114-2020919810},
	doi = {10.5120/ijca2020919810},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Business models for improving the transportation system, which includes the services of transport facilities, predict the future of users’ requirements according to the emerging technologies. All predictions raise the number of questions that support to increase business challenges such as management of 5G transportation services. Management issues cover technical challenges considered to improve the customer relationship and cost for utilizing the service mentioned in the 5G-transportation system. During the traveling or driving time, driverless vehicles face many challenges managed through the services without proper management. Security and energy management are examples of current problems. These problems involve the technical challenges of 5G, and other emerging technologies considered for developing the business model in this paper. As an appropriate method, an efficient model of 5G transportation is introduced as a business model for analyzing the challenges mentioned above. In this model, few challenges need more discussions and analysis because users’ and customers’ requirements are evolving with the future emerging technologies. Further, this model will encourage the users, including service providers, to make necessary decisions for enhancing the management facilities.

References

  1. S. Patil, V. Patil, and P. Bhat, “A Review on 5G Technology,” in International Journal of Engineering and Innovative Technology (IJEIT) vol. 1, no. 1, pp. 26–30, 2012.
  2. Kastalli, Ivanka Visnjic, Bart Van Looy, and Andy Neely. "Steering manufacturing firms towards service business model innovation." California Management Review 56, no. 1 (2013): 100-123
  3. Badii, Claudio, Pierfrancesco Bellini, Angelo Difino, and Paolo Nesi. "Sii-Mobility: An IoT/IoE architecture to enhance smart city mobility and transportation services." Sensors 19, no. 1 (2019).
  4. V Wangenheim F. Situational characteristics as moderators of the satisfaction-loyalty link: an investigation in a business-to-business context. Journal of Consumer Satisfaction, Dissatisfaction, and Complaining Behavior. 2003 Jan 1;16, pp. 145-156.
  5. Weng TS. Using information technology on customer relationship management. InWSEAS International Conference. Proceedings. Recent Advances in Computer Engineering 2009 Mar 23 (No. 10). WSEAS, pp. 271-279.
  6. Guha S, Harrigan P, Soutar G. Linking social media to customer relationship management (CRM): a qualitative study on SMEs. Journal of Small Business & Entrepreneurship. 2018 May 4;30(3):193-214.
  7. Tzeng SF, Chen WH, Pai FY. Evaluating the business value of RFID: Evidence from five case studies. International journal of production economics. 2008 Apr 1;112(2):601-13.
  8. Wu NC, Nystrom MA, Lin TR, Yu HC. Challenges to global RFID adoption. InTechnology Management for the Global Future, 2006. PICMET 2006 2006 Jul (Vol. 2, pp. 618-623). IEEE.
  9. Roussos G. Networked RFID: systems, software, and services. Springer Science & Business Media; 2008 Oct 17.
  10. Yang S, Zhang R, Liu Z. The AGA is evaluating a model of customer loyalty based on the e-commerce environment. Journal of Software. 2009 May;4(3):262-269.
  11. Inaba, T. "Realization of SCM and CRM by using RFID-captured consumer behavior information." Journal of Networks. 2009 Apr. 4, no. 2: 92-99.
  12. Donovan J, Franzel S, Cunha M, Gyau A, Mithöfer D. Guides for value chain development: a comparative review. Journal of Agribusiness in Developing and Emerging Economies. 2015 May 18;5(1):2-3.
  13. Thayananthan V, Alzahrani A, Qureshi MS. Information and communication technology (ICT) applications for customer relationship management (CRM). InICTs and the Millennium Development Goals 2014 (pp. 161-183). Springer, Boston, MA.
  14. Kastalli, Ivanka Visnjic, Bart Van Looy, and Andy Neely. "Steering manufacturing firms towards service business model innovation." California Management Review 56, no. 1 (2013): 100-123.
  15. Din, Sadia, Anand Paul, and Abdul Rehman. "5G-enabled Hierarchical architecture for the software-defined intelligent transportation system." Computer Networks 150 (2019): 81-89.
  16. Haffner, S., A. Monticelli, A. Garcia, J. Mantovani, and R. Romero. "Branch and bound algorithm for transmission system expansion planning using a transportation model." IEE Proceedings-Generation, Transmission and Distribution 147, no. 3 (2000): 149-156.
  17. Camacho, Fernando, César Cárdenas, and David Muñoz. "Emerging technologies and research challenges for intelligent transportation systems: 5G, HetNets, and SDN." International Journal of Interactive Design and Manufacturing (IJIDeM) (2017): 1-9.
  18. Menouar, Hamid, Ismail Guvenc, Kemal Akkaya, A. Selcuk Uluagac, Abdullah Kadri, and Adem Tuncer. "UAV-Enabled Intelligent Transportation Systems for the Smart City: Applications and Challenges." IEEE Communications Magazine 55, no. 3 (2017): 22-28.
  19. Stojkoska, Biljana L. Risteska, and Kire V. Trivodaliev. "A review of the Internet of Things for smart home: Challenges and solutions." Journal of Cleaner Production 140 (2017): 1454-1464.
  20. Amaral, Leonardo Albernaz, Everton de Matos, Ramão Tiago Tiburski, Fabiano Hessel, Willian Tessaro Lunardi, and Sabrina Marczak. "Middleware Technology for IoT Systems: Challenges and Perspectives Toward 5G." In
  21. Internet of Things (IoT) in 5G Mobile Technologies, Springer International Publishing, 2016, pp. 333-367.
  22. Rahman, Md Abdur, Md Mamunur Rashid, M. Shamim Hossain, Elham Hassanain, Mohammed F. Alhamid, and Mohsen Guizani. "Blockchain and IoT-based Cognitive Edge Framework for Sharing Economy Services in a Smart City." IEEE Access (2019).
  23. Jo, Minho, Vanga Odelu, Ashok Kumar Das, Muhammad Khurram Khan, and Kim-Kwang Raymond Choo. "Expressive CP-ABE Scheme for Mobile Devices in IoT satisfying Constant-size Keys and Ciphertexts." IEEE Access (2017).
  24. Gavrilovska, Liljana, Valentin Rakovic, and Vladimir Atanasovski. "Visions towards 5G: Technical requirements and potential enablers." Wireless Personal Communications 87, no. 3 (2016): 731-757.
  25. Tewari, Aakanksha, and B. B. Gupta. "Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags." The Journal of Supercomputing (2016): 1-18.
  26. Nordby K. Conceptual designing and technology: Short-range RFID as a design material. International Journal of Design. 2010;4(1):29-44.
  27. Juels A. RFID security and privacy: A research survey. IEEE Journal on selected areas in communications. 2006 Feb;24(2):381-94.
  28. Sharif, Abubakar, Jun Ouyang, Feng Yang, Hassan T. Chattha, Muhammad Ali Imran, Akram Alomainy, and Qammer H. Abbasi. "Low-cost, Inkjet-printed UHF RFID Tag based System for the Internet of Things Applications using Characteristic Modes." IEEE Internet of Things Journal (2019).
  29. Ciftler, Bekir Sait, Abdullah Kadri, and Ismail Güvenç. "IoT localization for bistatic passive UHF RFID systems with 3-D radiation pattern." IEEE Internet of Things Journal 4, no. 4 (2017): 905-916.
  30. Chen, Yen-Hung, Rui-Ze Hung, Lin-Kung Chen, Pi-Tzong Jan, and Yin-Rung Su. "Channel-Quality Aware RFID Tag Identification Algorithm to Accommodate the Varying Channel Quality of IoT Environment." Applied Sciences 9, no. 2 (2019): 321.
  31. Sfar, Arabia Riahi, Enrico Natalizio, Yacine Challal, and Zied Chtourou. "A Roadmap for Security Challenges in the Internet of Things." Digital Communications and Networks (2017).
  32. Samaila, Musa G., Miguel Neto, Diogo AB Fernandes, Mário M. Freire, and Pedro RM Inácio. "Security Challenges of the Internet of Things." In Beyond the Internet of Things, Springer International Publishing, 2017, pp. 53-82.
  33. Mozzaquatro, Bruno A., Ricardo Jardim-Goncalves, and Carlos Agostinho. "Towards a reference ontology for security in the Internet of Things." In Measurements & Networking (M&N), 2015 IEEE International Workshop on, IEEE, 2015, pp. 1-6.
  34. Sukant K. Mohapatra, Jay N. Bhuyan, Pankaj Asundi, and Anand Singh A Solution Framework For Managing Internet Of Things, A Solution Framework For Managing Internet Of Things, International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016.
  35. Jan, Mian Ahmad, Fazlullah Khan, Muhammad Alam, and Muhammad Usman. "A payload-based mutual authentication scheme for the Internet of Things." Future Generation Computer Systems (2017).
  36. Ejaz, Waleed, and Alagan Anpalagan. Internet of Things for Smart Cities: Technologies, Big Data, and Security. Springer, 2019.
  37. D’Angelo, Gabriele, Stefano Ferretti, and Vittorio Ghini. "Multi-level simulation of the Internet of Things on smart territories." Simulation Modelling Practice and Theory 73 (2017): 3-21.
  38. Saha, Himadri Nath, Supratim Auddy, Avimita Chatterjee, Subrata Pal, Susmit Sarkar, Rocky Singh, Amrendra Kumar Singh et al. "IoT solutions for smart cities." In Industrial Automation and Electromechanical Engineering Conference (IEMECON), 2017 8th Annual, pp. 74-80. IEEE, 2017.
  39. Chatterjee, Sheshadri, Arpan Kumar Kar, and M. P. Gupta. "Critical Success Factors to Establish 5G Network in Smart Cities: Inputs for Security and Privacy." Journal of Global Information Management (JGIM) 25, no. 2 (2017): 15-37.
  40. Wu, Jun, Kaoru Ota, Mianxiong Dong, and Chunxiao Li. "A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities." IEEE Access 4 (2016): 416-424.
  41. Kim, Jin Ho. "A Survey of IoT Security: Risks, Requirements, Trends, and Key Technologies." Journal of Industrial Integration and Management (2017): 1750008.
  42. Vijey Thayananthan, Ahmed Alzahrani, and Muhammad Shuaib Qureshi, "Efficient techniques for key management and quantum cryptography in RFID networks," SECURITY AND COMMUNICATION NETWORKS, USA, 2014.
  43. Riaz Ahmed Shaikh and Vijey Thayananthan," Hop-by-Hop Trust Evaluation Algorithm for Identity Anonymous Wireless Sensor Networks," SECURITY AND COMMUNICATION NETWORKS, USA, 2014.
  44. Vijey Thayananthan, Omar Abdul Kader, Kamal Jambi, and Alwi Bamhdi, “Analysis of Cybersecurity based on Li-Fi in green data storage and cloud computing for industrial networking,” IEEE CSCloud/SSC 2017.
  45. Vijey Thayananthan and Aiiad Albeshri, “Big data security issues based on quantum cryptography and privacy with authentication for the mobile data center ” 2nd International Symposium on Big Data and Cloud Computing (ISBCC’15) Elsevier, India, 2015.
  46. Salman, Ola, Ayman Kayssi, Ali Chehab, and Imad Elhajj. "Multi-level security for the 5G/IoT ubiquitous network." In Fog and Mobile Edge Computing (FMEC), 2017 Second International Conference on, pp. 188-193. IEEE, 2017.
  47. Suo H et al. (2012) Security on the internet of things: a review. In: International conference on computer science and electronics engineering (ICCSEE ’12), vol. 3, pp 648–651 IEEE, 23 Mar 2012.
  48. V Thayananthan, RA Shaikh, “Contextual Risk-based Decision Modeling for Vehicular Networks,” International Journal of Computer Network & Information Security 8 (9), 2016.
  49. Hasrouny, Hamssa, Carole Bassil, Abed Ellatif Samhat, and Anis Laouiti. "Security Risk Analysis of a Trust Model for Secure Group Leader-Based Communication in VANET." In Vehicular Ad-Hoc Networks for Smart Cities, pp. 71-83. Springer, Singapore, 2017.
  50. Kaufman, C., Perlman, R., Speciner, M.: Network Security: Private Communication in a Public World. Prentice Hall Press (2002).
  51. Elminaam, Diaa Salama Abdul, Hatem Mohamed Abdul Kader, and Mohie Mohamed Hadhoud. "Performance evaluation of symmetric encryption algorithms." IJCSNS International Journal of Computer Science and Network Security 8, no. 12 (2008): 280-286.
  52. Wang, Zhu, Yan Yao, Xiaojun Tong, Qinghua Luo, and Xiangyu Chen. "Dynamically Reconfigurable Encryption and Decryption System Design for the Internet of Things Information Security." Sensors 19, no. 1 (2019): 143.

Keywords

Business Model; 5G based infrastructure; Automation Transportation; Transportation Modelling