№1, 2024

Tabriz J. Agashov

The article analyzes the current state of mobile communication systems, and highlights development perspectives from the past to the present, vulnerabilities in security systems and application fields. At the same time, it provides information about the possible threats that may occur during an attack on the data entering the network from intelligent devices. For many years, numerous research centers have been conducting intensive research on the direct communication between various devices through mobile communication systems. These studies are realized to manage mobile communication systems and computers, mobile devices and other equipment. Therefore, special attention is paid to the development of mobile communication systems both in Azerbaijan and in the world, and it is considered one of the most promising fields of application of information technologies. The article also provides information about the fifth-generation mobile communication system, which is a new generation of wireless network technology for digital mobile networks. The results of research conducted on the fifth-generation mobile communication system in the world and the technological innovations to be brought to the healthcare and energy fields, agriculture, smart cities, smart villages and transport sectors are reported (pp.86-97).

Keywords:NMRS, UMTS, GPRS, LTE, Mobile Station , 5G, Direct Attack, IoT
  • Aashi SINGH Bhadouria. (2022). Study of Impact of Malicious Attacks and Data Breach on the Growth and Performance of the Company and Few of the World's Biggest Data Breaches, International Journal of Scientific and Research Publications, 10(10). https://DOI: 10.29322/IJSRP.X.2022.p091095
  • Ahmad, Norlia and Methe, David T. (2021) "Technological Innovations and Consumer Needs: An Analysis of Mobile Communications Market," ASEAN Marketing Journal: 3(2), DOI: 10.21002/amj.v3i2.2022
  • Ahmadi, S. (2011). WiMAX Network Architecture. Mobile WiMAX. A Systems Approach to Understanding IEEE 802.16m Radio Access Technology, (pp. 33–60). https://Doi:10.1016/b978-0-12-374964-2.10002-5
  • Ahmed, T., Ahmad, W. and Ahmad, B. (2022), "Assessing the value of 3G and 4G network modes in mobile phone pricing", Digital Policy, Regulation and Governance, 24(4), pp. 380-397. https://doi.org/10.1108/DPRG-10-2021-0135
  • Alakbarov R.G., Hashimov M.A. (2016). Cloud Technologies: Services, Issues and Application Areas. Information technology issues, 1, pp. 3–10. (in Azerbaijani)
  • Alenoghena CO, Ohize HO, Adejo AO, Onumanyi AJ, Ohihoin EE, Balarabe AI, Okoh SA, Kolo E, Alenoghena B. (2023), Telemedicine: A Survey of Telecommunication Technologies, Developments, and Challenges. Journal of Sensor and Actuator Networks, 12(2), 20. https://doi.org/10.3390/jsan12020020
  • Alhabib, M. H., Ali, Q. I. (2023). Internet of autonomous vehicles communication infrastructure: A short review. Diagnostyka, 24(3), 2023302. https://doi.org/10. 29354/diag/168310
  • Anand Vardhan Bhalla and Mudit Ratana Bhalla. (2010). Generations of Mobile Wireless Technology: A Survey. International Journal of Computer Applications, 5(4), 26–32, 2010. Doi:10.5120/905-1282
  • Anastasios N. Bikos & Nicolas Sklavos. (2013). LTE/SAE Security Issues on 4G Wireless Networks. IEEE Security and Privacy, Greece, 1 March 2013, (pp. 55-62). https://DOI:10.1109/MSP.2012.136
  • Andrea Goldsmith. (2020). Wireless Communications.  Draft of Second Edition. March 3, 2020, Pp. 1-16. http://web.stanford.edu/class/ee359/doc/WirelessComm_Chp1-16_March32020.pdf
  • Andy Hira, James Morfopoulos and Florence Chee. (2012). Evolution of the South Korean wireless industry: from state guidance to global competition. International Journal of Technology and Globalisation, January 2012, 6(1/2), (pp. 65-86). https://Doi:10.1504/IJTG.2012.045296
  • Ashish Kumar, Ankit Aswal and Lalit Singh. (2013). 4G Wireless Technology: A Brief Review. International Journal of Engineering and Management Research, April 2013, 3(2), (pp. 35-43).
  • Attaran, M. (2021). The impact of 5G on the evolution of intelligent automation and industry digitization. Journal of Ambient Intelligence and Humanized Computing, Feb 21, 2021, (pp. 1-17). https://Doi.org/10.1007/s12652-020-02521-x
  • Azerbaijan - Country Commercial Guide (2023). Information and Communications Technology.
  • Bonavolonta, F., Tedesco, A., Moriello, R. S. L., & Tufano, A. (2017). Enabling wireless technologies for industry 4.0: State of the art. 2017 IEEE International Workshop on Measurement and Networking (M&N). doi:10.1109/iwmn.2017.8078381
  • Bondyopadhyay, P. K. (1998). Sir J. C Bose diode detector received Marconi's first transatlantic wireless signal of December 1901 (the “Italian Navy Coherer” Scandal Revisited). Proceedings of the IEEE, 86(1), 259-285. https://doi:10.1109/5.658778
  • Chi-Chun Lo and Yu-Jen Chen. (1999). A secure communication architecture for GSM networks. 1999 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, Victoria, BC, Canada, 1999, (pp. 221-224). https://Doi:10.1109/PACRIM.1999.799517.
  • Danish Javeed, Umar Mohammed Badamasi, Cosmas Obiora Ndubuisi, Faiza Soomro and Muhammad Asif. (2020). Man in the Middle Attacks: Analysis, Motivation and Prevention. International Journal of Computer Networks and Communications Security, 8(7), (pp. 52-58). https://DOI: 10.47277/IJCNCS/8(7)1
  • Dhanaraju M, Chenniappan P, Ramalingam K, Pazhanivelan S, Kaliaperumal R. (2022) Smart Farming: Internet of Things (IoT)-Based Sustainable Agriculture. 12(10):1745. https://doi.org/10.3390/agriculture12101745
  • Dr. Vidyaa Thulasiraman, Mr.G.Manikandan. (2016). 4G Technology and Its Application an Overview. International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 3, Issue 1, pp: (23-27), www.paperpublications.org
  • Fabio Ricciato, Angelo Coluccia and Alessandro D’Alconzo. (2010). A review of DoS attack models for 3G cellular networks from a system-design perspective. Journal of Computer Communications, 33(5), (pp 551-558). https://DOI:10.1016/j.comcom.2009.11.015
  • Federica Laricchia. (2023). Forecast number of mobile devices, Number of mobile devices worldwide 2020-2025. https://www.statista.com/statistics/245501/multiple-mobile-device-ownership-worldwide/
  • Fragkiadakis, A. G., Askoxylakis, I. G., Tragos, E. Z., & Verikoukis, C. V. (2011). Ubiquitous robust communications for emergency response using multi-operator heterogeneous networks. EURASIP Journal on Wireless Communications and Networking, 2011(1).
  • Garcia, L., Jiménez, J. M., Taha, M., & Lloret, J. (2018). Wireless Technologies for IoT in Smart Cities. Network Protocols and Algorithms, 10(1), 23. doi:10.5296/npa.v10i1.12798
  • Global Smart Clothing Market Size, Share & Trends Analysis Report by Product (T-shirts, Pants, Shoes, Undergarments, Jackets, Socks), by Application (Sports & Fitness, Healthcare, Fashion & Entertainment), by Region, and Segment Forecasts, 2022-2030
  • H. Holma and A. Toskala. (2004). WCDMA for UMTS-Radio Access for Third Generation Mobile Communications. Third Edition, John Wiley & Sons Ltd, 2004, 303-315. https://DOI: 10.1002/0470870982.ch12
  • Hashimov M.A. (2020). “Smart City” Concept: Current Status, Application Fields and Problems, Information Society Problems, 2021, No. 2, (pp. 95–107). DOI: 10.25045/jpis.v12.i2.07 (in Azerbaijani)
  • Heikki Karjaluoto. (2006). An Investigation of Third Generation (3G) Mobile Technologies and Services. Contemporary Management Research, October 2006, 2(2):91-104.  https://Doi:10.7903/cmr.653
  • Heikki Karjaluoto. (2006). An Investigation of Third Generation (3G) Mobile Technologies and Services. Contemporary Management Research 2(2):91-104. DOI:10.7903/cmr.653
  • Henri Hodara & Edvin Skaljo. (2021). From 1G to 5G. Fiber and Integrated Optics, December 2021, 40(1):1-99.  https://Doi:10.1080/01468030.2021.1919358
  • Ishtiaq Ahmed Choudhry & Nazir Ahmad Zafar. (2012). Modeling Components and Services of LTE Mobile Communications System. International Journal Communications, Network and System Sciences, 5(12), 2012, (pp. 815-824). Doi:10.4236/ijcns.2012.512086
  • Ivy Huang. (2023). Digital China Development Report (2022) Released, China's Digital Economy Ranks Second in the World, Digital China Summit. http://www.szzg.gov.cn/2023/cgz/ 
  • J.Ding, Y. Lim, M. Solano, Kelvin Shadle, Chris Park, Chris Lin and John Hu. (2014). Giving patients a lift - the robotic nursing assistant (RoNA). 2014 IEEE International Conference on Technologies for Practical Robot Applications, https://Doi:10.1109/tepra.2014.6869137
  • Jonne Soininen. (2000). GPNS and UNT$ Netease 2000 AlloIP opgien, Mobile Computing and Communications Review, 4(3).  https://dl.acm.org/doi/pdf/10.1145/372346.372362
  • Jyhi-Kong Wey, Han-Tsung Chang, Lir-Fan Sun and Wei-Pang Yang. (1995). Clone terminator: an authentication service for advanced mobile phone system. 1995 IEEE 45th Vehicular Technology Conference. Countdown to the Wireless Twenty-First Century, Chicago, IL, USA, 1995, 1, (pp. 175-179). https://Doi:10.1109/VETEC.1995.504852
  • Khan, M., Ahmed, A., & Cheema, A.R. (2008). Vulnerabilities of UMTS Access Domain Security Architecture. 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Distributed Computing, 350-355. https://DOI:10.1109/SNPD.2008.78
  • Kireet Muppavaram, Sudeepthi Govathoti, Deepthi Kamidi, T.Bhaskar. (2023). "Exploring the Generations: A Comparative Study of Mobile Technology from 1G to 5G," SSRG International Journal of Electronics and Communication Engineering, 10(7), 54-62, 2023. Crossref, https://doi.org/10.14445/23488549/IJECE-V10I7P106
  • Quy Vu Khanh, Nam Vi Hoai, Linh Dao Manh, Anh Ngoc Le, Gwanggil Jeon, "Wireless Communication Technologies for IoT in 5G: Vision, Applications, and Challenges", Wireless Communications and Mobile Computing, 2022 (1):1-12. https://doi.org/10.1155/2022/3229294
  • Leliopoulos, P., & Drigas, A. (2022). The evolution of wireless mobile networks and the future 5G mobile technology for sustainability. Technium Sustainability, 2(4), 28–43. https://doi.org/10.47577/sustainability.v2i4.7346
  • Liu, Y., Kashef, M., Lee, K. B., Benmohamed, L., & Candell, R. (2019). Wireless Network Design for Emerging IIoT Applications: Reference Framework and Use Cases. Proceedings of the IEEE, 1–27. doi:10.1109/jproc.2019.2905423
  • Chen, Y. Ma, Yong Li, D. Wu, Y. Zhang and C. Youn. (2017). Wearable 2.0: Enable Human-Cloud Integration in Next Generation Healthcare System. IEEE Communications Magazine, 55(11), (pp. 54-61), Jan. 2017.
  • Mammadova M.H., Jabrayilova Z.G. (2020). Telemedicine: Opportunities and New Applications in the Context of the Covid-19 Pandemic. Information Society Problems, 2, 23–38. DOI: 10.25045/jpis.v11.i2.03(in Azerbaijani)
  • Meyer, U., & Wetzel, S. (2004). A Man-in the Middle Attack on UMTS. Proceedings of the 3rd ACM workshop on Wireless security, (pp. 90–97). https://doi:10.1145/1023646.1023662
  • Munip Geylani, Musa Çıbuk, Hanefi Çınar, Fikri Ağgün. (2016). Geçmişten günümüze hücresel haberleşme teknolojilerinin gelişimi. Dokuz Eylül Üniversitesi Mühendislik Fakültesi Fen ve Mühendislik Dergisi. 2016; 18(54): 606-623. https://Doi:10.21205/deufmd.2016185425
  • Ning AY, Cabrera CI, D'Anza B. (2021). Telemedicine in Otolaryngology: A Systematic Review of Image Quality, Diagnostic Concordance, and Patient and Provider Satisfaction. Ann Otol Rhinol Laryngol, 130(2):195-204. https://Doi:10.1177/0003489420939590
  • OECD (2022), Promoting Enterprise Digitalisation in Azerbaijan, OECD Publishing, Paris, https://doi.org/10.1787/6a612a2a-en
  • Omendri Kumari and Dr. Sanjay Kumar. (2014). Study of Wireless Communication Technologies: Bluetooth, WI-FI, Cellular and WiMAX. International Journal of Computer Science and Communications, 5(2), 61-70.
  • Osseiran, A., Braun, V., Hidekazu, T., Marsch, P., Schotten, H., Tullberg, H., Schellman, M. (2013). The Foundation of the Mobile and Wireless Communications System for 2020 and Beyond: Challenges, Enablers and Technology Solutions. 2013 IEEE 77th Vehicular Technology Conference (VTC Spring). doi:10.1109/vtcspring.2013.66 9278
  • Payel Mukherjee et al. (2021). Study of basic radio network controller networking system using qualnet software. Int J Recent Sci Res. 12(06), (pp. 42075-42080). DOI: http://dx.doi.org/10.24327/ijrsr.2021.1206.6021
  • Yallapragada, V. Kripalani and A. Kripalani. (2002). EDGE: a technology assessment. 2002 IEEE International Conference on Personal Wireless Communications, New Delhi, India, 2002, (pp. 35-40). doi: 10.1109/ICPWC.2002.1177241.
  • Richard Gray. (2020). How crop and animal sensors are making farming smarter. Horizon the EU Research and İnnovation Magazine, 18 May 2020, https://ec.europa.eu/research-and-innovation/en/horizon-magazine/how-crop-and-animal-sensors-are-making-farming-smarter
  • Shukla, V. Khare, S. Garg, and P. Sharma. (2013). Comparative study of 1G, 2G, 3G, 4G. Journal of Engineering Computers and Applied Science, 2(4), (pp. 55-63). https://Doi:
  • Sağıroğlu, Ş. & Mohammed, M. (2010). Mobil Ortamlara Yapılan Saldırılar Üzerine Bir İnceleme. TÜBAV Bilim Dergisi, 2 (2), 138-147
  • Samet, Refik, Çelik Ömer Faruk. (2016). Fake Gsm Base Station Attack Detection Algorithm. Journal of the Faculty of Engineering and Architecture of Gazi University, Ankara, 2016, 31(1), 161-169
  • Sankaran, K. S., Ramprabu, G., & Prakash, V. R. (2020). Importance of Fifth Generation Wireless Systems. Intech Open. https://doi: 10.5772/intechopen.89345
  • Seongmin Park, Daeun Kim, Youngkwon Park, Hyungjin Cho, Dowon Kim and Sungmoon. (2021). Kwon 5G Security Threat Assessment in Real Networks. Special Issue Communication Security in Wireless and Mobile Networks, 21(16), https://doi.org/10.3390/s21165524
  • Taylor, M., Ralon, P., & Ilas, A. (2016). The power to change: solar and wind cost reduction potential to 2025. International renewable energy agency (IRENA).
  • Toghrul Fattahov. (2019). The Competitive Analyses of Marketing Strategies of National Mobile Operators. The Ministry of Education of Azerbaijan Republic. https://unec.edu.az/application/uploads/2019/07/F-ttahov-To-rul.pdf
  • Tweed, Katherine. (2016). Smart Grid Saves EPB Chattanooga $1.4M in One Storm, Greentech Media, August 1, 2013, Accessed December 19, 2016,  https://www.greentechmedia.com/articles/read/distribution-automationsaving-epb-millions.
  • UKŞAL Mesut. (2015). Mobile Forensics. İstanbul Bilgi Üniversitesi Sosyal Bilimler Enstitüsü Bilişim ve Teknoloji Hukuku Yüksek Lisans Pogramı, pp. 35
  • Webster, J.G. and Larsson, T. (2017). Telecommunication Exchange Evolution. In Wiley Encyclopedia of Electrical and Electronics Engineering, (pp. 1-16). https://doi.org/10.1002/047134608X.W2043.pub2
  • Wie Xiang, Fengling Han & Tran Khoa Phan. (Eds.). (2022). Broadband Communications, Networks, and Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 01 January 2022, vol. 413, (pp. 182-192). https://Doi.org/10.1007/978-3-030-93479-8
  • L. Huang, Ch. Y. Shen, and Sh. W. Shieh. (2011). S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks. IEEE Transactions on Vehicular Technology, 60(9), (pp. 4509-4519). https://DOI:10.1109/TVT.2011.2168247
  • Yang, T., Lau, W. Y., Zhang, H., Wu, M. C., & Shen, F. (2016). Hepatic surgeons are like the child who rescued dying fishes. Hepatology (Baltimore, Md.), 63(3), 1054. https://doi.org/10.1002/hep.27980
  • Yanxiang He, Wei Chen, Wenling Peng and Min Yang. (2005). Efficient and Beneficial Defense against DDoS Direct Attack and Reflector Attack. Conference: Parallel and Distributed Processing and Applications, Third International Symposium, ISPA 2005, (pp. 576-587). 
  • 5G network pilot project launched in Baku" - Azerbaijan State News Agency (AZERTAC), https://azertag.az/en/xeber /_Azercell_starts_first_in_Azerbaijan_5G_network_in_center_of_Baku-1353936