The Disruptions of 5G on Data-Driven Technologies and Applications

Dumitrel Loghin*, Shaofeng Cai, Gang Chen, Tien Tuan Anh Dinh, Feiyi Fan, Qian Lin, Janice Ng, Beng Chin Ooi, Xutao Sun, Quang Trung Ta, Wei Wang, Xiaokui Xiao, Yang Yang, Meihui Zhang, Zhonghua Zhang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

57 Citations (Scopus)

Abstract

With 5G on the verge of being adopted as the next mobile network, there is a need to analyze its impact on the landscape of computing and data management. In this paper, we analyze the impact of 5G on both traditional and emerging technologies and project our view on future research challenges and opportunities. With a predicted increase of 10-100x in bandwidth and 5-10x decrease in latency, 5G is expected to be the main enabler for smart cities, smart IoT and efficient healthcare, where machine learning is conducted at the edge. In this context, we investigate how 5G can help the development of federated learning. Network slicing, another key feature of 5G, allows running multiple isolated networks on the same physical infrastructure. However, security remains the main concern in the context of virtualization, multi-tenancy and high device density. Formal verification of 5G networks can be applied to detect security issues in massive virtualized environments. In summary, 5G will make the world even more densely and closely connected. What we have experienced in 4G connectivity will pale in comparison to the vast amounts of possibilities engendered by 5G.

Original languageEnglish
Article number8961984
Pages (from-to)1179-1198
Number of pages20
JournalIEEE Transactions on Knowledge and Data Engineering
Volume32
Issue number6
DOIs
Publication statusPublished - 1 Jun 2020

Keywords

  • 5G mobile communication
  • Data privacy
  • Database systems
  • Edge computing
  • Federated learning
  • Internet of Things
  • Network slicing
  • Security management

Fingerprint

Dive into the research topics of 'The Disruptions of 5G on Data-Driven Technologies and Applications'. Together they form a unique fingerprint.

Cite this