Abstract

Uncrewed aerial vehicles (UAVs) play a significant role in serving as gNodeBs (gNBs), or user devices (UDs). However, considering the high data rates and low latency required by fifth generation (5G) and beyond, it is essential to maintain a reliable connection at UAVs, particularly due to frequent handovers. To minimize handover failures, the hysteresis margin and time-to-trigger (TTT) should be dynamically adjusted. Furthermore, to prevent vulnerabilities to threats, UAV and gNB authentication and secure communication should be addressed during handovers. However, available literature uses a learning-based approach to handover management in UAV-aided 5G networks, thereby neglecting security, or offers a handover authentication mechanism, but lacks a novel handover strategy. To fill this gap in the literature, in this study, we design an Intelligent Soft Handover for UAV-enabled cellular networks (IntSHU), a generative adversarial network (GAN)-based scheme designed for intelligent soft handovers in UAV-enabled 5G and beyond. IntSHU uses adapted hysteresis margins and TTT values, dynamically generated through an \epsilon -greedy policy. In addition, we implement a lightweight, physically unclonable function (PUF)-based message encryption and authentication scheme via blockchain for streamlined access control during handovers. The results of our simulation indicate that IntSHU significantly enhances network performance by facilitating reliable soft handovers.

Original languageEnglish
Pages (from-to)4196-4209
Number of pages14
JournalIEEE Transactions on Cognitive Communications and Networking
Volume11
Issue number6
DOIs
Publication statusPublished - 2025

!!!Keywords

  • 5G and beyond
  • UAV
  • blockchain
  • handover
  • message encryption
  • physically unclonable function

Fingerprint

Dive into the research topics of 'IntSHU: A Security-Enabled Intelligent Soft Handover Approach for UAV-Aided 5G and Beyond'. These topics are generated from the title and abstract of the publication. Together, they form a unique fingerprint.

Cite this