To read this content please select one of the options below:

Please note you do not have access to teaching notes, 5g literature review.

Understanding 5G Mobile Networks

ISBN : 978-1-80071-037-5 , eISBN : 978-1-80071-036-8

Publication date: 8 March 2021

Curwen, P. and Whalley, J. (2021), "5G Literature Review", Understanding 5G Mobile Networks , Emerald Publishing Limited, Leeds, pp. 47-66. https://doi.org/10.1108/978-1-80071-036-820210003

Emerald Publishing Limited

Copyright © 2021 by Emerald Publishing Limited

We’re listening — tell us what you think

Something didn’t work….

Report bugs here

All feedback is valuable

Please share your general feedback

Join us on our journey

Platform update page.

Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

Questions & More Information

Answers to the most commonly asked questions here

Study and Investigation on 5G Technology: A Systematic Review

Affiliations.

  • 1 School of Computing Science and Engineering, VIT University Bhopal, Bhopal 466114, India.
  • 2 Department of Applied Mathematics and Computer Science, Technical University of Denmark, 2800 Lyngby, Denmark.
  • 3 Department of Information Security Engineering, Soonchunhyang University, Asan-si 31538, Korea.
  • 4 Faculty of Engineering and Architecture, Kore University of Enna, 94100 Enna, Italy.
  • PMID: 35009569
  • PMCID: PMC8747744
  • DOI: 10.3390/s22010026

In wireless communication, Fifth Generation (5G) Technology is a recent generation of mobile networks. In this paper, evaluations in the field of mobile communication technology are presented. In each evolution, multiple challenges were faced that were captured with the help of next-generation mobile networks. Among all the previously existing mobile networks, 5G provides a high-speed internet facility, anytime, anywhere, for everyone. 5G is slightly different due to its novel features such as interconnecting people, controlling devices, objects, and machines. 5G mobile system will bring diverse levels of performance and capability, which will serve as new user experiences and connect new enterprises. Therefore, it is essential to know where the enterprise can utilize the benefits of 5G. In this research article, it was observed that extensive research and analysis unfolds different aspects, namely, millimeter wave (mmWave), massive multiple-input and multiple-output (Massive-MIMO), small cell, mobile edge computing (MEC), beamforming, different antenna technology, etc. This article's main aim is to highlight some of the most recent enhancements made towards the 5G mobile system and discuss its future research objectives.

Keywords: 5G; beamforming; machine learning; massive multiple input and multiple output (MIMO); millimeter wave (mmW); mobile edge computing (MEC); small cell.

Publication types

  • Systematic Review
  • Communication*
  • Wireless Technology*

Grants and funding

  • The Soonchunhyang University Research Fund/Soonchunhyang University

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

  • View all journals
  • My Account Login
  • Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • Open access
  • Published: 24 November 2022

Comment on “5G mobile networks and health-a state-of-the-science review of the research into low-level RF fields above 6 GHz” by Karipidis et al.

  • Steven Weller   ORCID: orcid.org/0000-0003-4697-6351 1 , 2 ,
  • Murray May 2 ,
  • Julie McCredden 2 ,
  • Victor Leach 2 ,
  • Dung Phung 3 &
  • Igor Belyaev 4  

Journal of Exposure Science & Environmental Epidemiology volume  33 ,  pages 17–20 ( 2023 ) Cite this article

2049 Accesses

3 Citations

6 Altmetric

Metrics details

Karipidis et al. [ 1 ] (hereinafter: Karipidis) published a scoping review investigating radiofrequency (RF) studies in the range >6 GHz, with a particular focus on the millimetre wave (MMW) band. The Karipidis review was performed against a backdrop of rising public concerns associated with the health and safety of 5th generation (5G) wireless technology [ 2 ]. Subsequently, the telecommunications industry is now using the Karipidis review to suggest “no evidence of adverse health effects from the radio waves used in 5G including mmWave” [ 3 ]. Notwithstanding the fact that no studies have investigated specific 5G frequencies and modulations, does the Karipidis review stand up to scrutiny in providing assurances of safety (no evidence of harm) that industry is suggesting? The analysis herein reveals that it does not.

A host of study design weaknesses in the existing literature were critiqued throughout the Karipidis review. In spite of the apparent lack of rigour attributed to many papers, Karipidis concluded that “experimental studies provided no confirmed evidence that low-level MMWs are associated with biological effects relevant to human health” and similarly, that radar-related epidemiological studies “presented little evidence of an association between low-level MMWs and any adverse health effects”.

This line of reasoning parallels that used previously by scientists working for the tobacco industry, whose studies repeatedly arrived at conclusions suggesting no clear determination of harm could be made [ 4 ]. This was part of a broader strategy of manufacturing doubt about the potential negative health effects of their product, as summarised by Gilbert [ 5 ]:

“The very nature of scientific exploration is to ask and answer the next question. But rather than accepting the process of scientific discovery, business interests press to have every tiny bit of uncertainty explored before any policy decision can be made, demanding proof rather than precaution—in fact, they even manufacture uncertainty. As a result, decisions are not made; policy is not advanced; problems are not addressed.”

A similar ethos is observed with the handling of scientific evidence by some governments and associated regulatory bodies in regards to radiofrequency exposures and health risks [ 6 , 7 ]. The same was noted by the US Court of Appeals in the recent case against the FCC [ 8 ].

Surprisingly, the Karipidis review did not identify and discuss potential risk implications. This is of significant importance, because as Karipidis noted, the use of RF frequencies above 6 GHz is only just beginning. Best practice demands a risk management approach for the identification of all potential hazards and implementation of mitigation strategies to address these risks. This is already the case with low-dose ionizing radiation [ 9 ], but is sorely neglected for non-ionizing RF radiation [ 10 ]. Rather than waiting for harm to be established before acting, a precautionary approach to risk management is necessary [ 6 , 11 ].

Detailed analysis of Karipidis tables and selection of papers

In order to conduct an independent assessment of the Karipidis review, we performed our own literature search using the same international research libraries as Karipidis, and also accessed the Oceania Radiofrequency Scientific Advisory Association (ORSAA) database (ODEB) [ 12 ].

To perform our assessment, the Karipidis review was critiqued and classified into different categories as summarised in Tables  1  and 2 . The full set of Karipidis tables, our corresponding review comments and analysis can be downloaded from the ORSAA website [ 13 ]. The results reveal issues of potential bias as well as questions around the completeness and thoroughness of the work conducted by Karipidis.

Critique summary

Examination of the Karipidis 5G health review reveals many errors in classification and analysis. Some are minor, and although indicating a lack of diligence, they have no substantial implications for the outcomes identified in the papers reviewed. Of much greater concern are the number of misstatements, misclassifications, and exclusions of important findings from sound research.

The Karipidis review is at best a superficial analysis of a restricted set of available publications investigating exposures to radio frequencies in the >6 GHz range. No attempt has been made to understand or reconcile differing study outcomes. Karipidis has simply restated the results for specific endpoints, showing papers that have demonstrated statistically significant effects and those that have not. Divergent findings have been used to suggest ‘inconsistency’ as a problem, thereby diminishing the importance of biological effect findings. In contrast, our assessment [ 13 ] provides rational justifications to explain some of the divergent findings. We have also previously discussed a number of physical and biological variables, which underlie the different outcomes from studies investigating biological effects of RF exposures in general [ 14 ], and MMW exposures in particular [ 15 ]. Karipidis also attributed ‘quality’ deficiencies to a number of studies that are unjustified [ 13 ].

A literature search identified a significant number of relevant papers (at least 70 experimental papers and 16 epidemiological papers available from PubMed and ODEB) were missing from the Karipidis collection. These papers cover all major themes presented by Karipidis and more, with the majority showing statistically significant effects. By restricting the paper selection criteria, the balance of evidence can be skewed. A lack of transparency regarding papers found and ultimately discarded by Karipidis means that selection bias cannot be excluded.

Also missing from the Karipidis review is an analysis of potential publication and funding biases, which would allow the reader to assess how such influences affect study outcomes. This is often very obvious. For example, on a related topic, Carpenter [ 16 ] found that evidence for magnetic fields increasing the risk of cancer is neither inconsistent nor inconclusive (from government or independent studies), yet almost all industry supported studies fail to find any significant or even suggested associations. A similar industry funding study bias was observed with mobile phones [ 17 ].

The biased selections and assessments that have been uncovered in the Karipidis review create an unbalanced view of the science, and skew the final conclusion towards uncertainty. In contrast, when appraising all relevant findings, the evidence found in our review points to risks not fully considered by the International Commission on Non-Ionizing Radiation Protection (ICNIRP) or the Australian Radiation Protection and Nuclear Safety Agency (ARPANSA) in their respective RF guidelines and RF standards. These guidelines do not reflect the current state of scientific knowledge and are based on acute heating protection only [ 10 ], which is purely for regulatory convenience. The gulf between thermal and non-thermal evaluative frameworks has previously been discussed [ 6 , 18 ].

Other important works have been omitted from the Karipidis review. Epidemiological studies suggest that RF exposures from other technologies such as radar are associated with an increased risk of hemolymphatic cancers [ 19 ], and experimental studies investigating genotoxicity in blood cells [ 20 ] have found the same. Such converging evidence requires an immediate focused investigation into RF bioeffects rather than dismissal. Other health risks potentially linked to RF exposures include pregnancy complications, fertility impairment, testicular cancer and brain cancer. These are identified in our analysis [ 13 ] and will be discussed in a future paper.

Other researchers [ 21 ] agree that the current peer reviewed science points to “predictable harm to life forms within mixed frequency mesh networks with negative consequences likely over time”. Russell assessed the literature on MMW effects on skin and eyes, the immune system, gene expression, and bacterial antibiotic resistance. Because of the shallow penetration of MMW, the skin and eyes are of significant concern. More than a decade ago, research by Feldman et al. [ 22 ] indicated that sweat ducts in the skin could behave as antennas and thus respond to MMW. The same group [ 23 ] later stated that there is enough evidence suggesting that helical sweat ducts in conjunction with wavelengths approaching the dimensions of skin layers could lead to non-thermal biological effects.

Finally, the Karipidis review lacks representation of many species, including plants, amphibians, birds, domestic animals and most importantly, insects. Therefore, readers are provided with little to no understanding of how MMWs impact these important ecological entities. This is a significant gap.

The above critique of the Karipidis review raises a number of ‘red-flags’. These require clarification and clear justification before telecommunications companies are given carte blanche to begin rolling out novel modulated signals to which biological systems have never been exposed.

Karipidis has conducted an investigation resulting in the exclusion of important findings, while also overemphasising quality deficiencies and inconsistencies in the data, thereby suggesting confirmation bias. Di Ciaula [ 24 ] argues that underestimating the relevance of available results (in particular those from in vitro and animal models) is ethically unacceptable, and is equivalent to saying that potential hazardous effects can only be assessed after the agent has had time to exert its harmful effects.

In this regard, Gee’s discussion [ 25 ] of risk assessment is pertinent. In “late lessons from early warnings” a variety of case studies spanning chemicals, physical agents, pathogens, and environmental issues illustrate how timing is critical for risk analysis and application of the precautionary principle. In all cases, precautionary action, or foresight based on a lower strength of evidence, would have lowered the burden of disease, reduced unnecessary suffering and prevented many premature deaths.

In our opinion, the Karipidis review provides insufficient evidence of safety, which is being used by Industry [ 3 ] as justification for the planned densification and ubiquitous use of radiofrequencies >6 GHz as part of the 5G rollout. However, we concur with Karipidis that future experimental studies “should improve the experimental design” and “epidemiological research should continue to monitor long-term health effects in the population related to wireless telecommunications”.

The Karipidis review seemingly equates risk management with the need to confirm evidence of harm. The point at which harm becomes a public issue is far too late, given the size of the population being exposed without formal consent. We consider that risks to humans and the environment identified in past epidemiological studies [ 13 ], as well as unknown risks yet to be identified, warrant the application of a precautionary approach.

We find the Karipidis review to be both inadequate and incomplete, sending the wrong messages regarding safety assessment and public health.

Data availability

Data generated and analysed for the production of this comment article is freely available for download from the Oceania Radiofrequency Scientific Advisory (ORSAA) website at the following address: https://www.orsaa.org/5g-review-supplementary-material.html .

Karipidis K, Mate R, Urban D, Tinker R, Wood A. 5G mobile networks and health-a state-of-the-science review of the research into low-level RF fields above 6 GHz. J Expo Sci Environ Epidemiol. 2021;31:585–605.

Article   Google Scholar  

Parliament of Australia. Committee Inquiry into 5G in Australia. https://www.aph.gov.au/Parliamentary_Business/Committees/House/Communications/5G/Submissions Accessed 28 September 2022.

Telstra. 5G and EME research. 2021. https://www.telstra.com.au/consumer-advice/eme/5g-and-eme [Under heading “5G and EME Research” (paragraph 4)] Accessed 28 September 2022.

Brandt AM. Inventing conflicts of interest: a history of tobacco industry tactics. Am J Public Health. 2012;102:63–71.

Gilbert SG. Doubt is their product: how industry’s assault on science threatens your health. Environ Health Perspect. 2009;117:A218.

Weller S, Leach V, May M. Comment on letter: “Post-normal science and the management of uncertainty in bioelectromagnetic controversies” by A.W. Wood. Bioelectromagnetics. 2020;41:80–4.

Alster N. Captured Agency: How the Federal Communications Commission Is Dominated by the Industries It Presumably Regulates. Edmond J. Safra Center for Ethics, Harvard University, Cambridge, MA; 2015.

Environmental Health Trust et al. vs Federal Communications Commission and United States of America. https://www.cadc.uscourts.gov/internet/opinions.nsf/FB976465BF00F8BD85258730004EFDF7/$file/20-1025-1910111.pdf Accessed 28 September 2022.

ICRP. 2007. The 2007 Recommendations of the International Commission on Radiological Protection. ICRP Publication 103. Ann. ICRP 37 (2–4).

Hardell L. World Health Organization, radiofrequency radiation and health - a hard nut to crack (Review). Int J Oncol. 2017;51:405–13.

Leach V, Bromwich D. Why the precautionary approach is needed for non-ionising radiation devices. Radiat Prot Australas. 2018;35:13–21.

Google Scholar  

Leach V, Weller S, Redmayne M. A novel database of bio-effects from non-ionizing radiation. Rev Environ Health. 2018;33:273–80.

ORSAA. A critical analysis of Karipidis 5G Health Review. 2022. https://www.orsaa.org/5g-review-supplementary-material.html Accessed 28 September 2022.

Belyaev IY. Dependence of non-thermal biological effects of microwaves on physical and biological variables: implications for reproducibility and safety standards. Eur J Oncol. 2010;5:187–218.

Belyaev IY, Shcheglov VS, Alipov ED, Ushakov VD. Nonthermal effects of extremely high-frequency microwaves on chromatin conformation in cells in vitro - Dependence on physical, physiological, and genetic factors. IEEE Trans Micro Theory Tech. 2000;48:2172–9.

Article   CAS   Google Scholar  

Carpenter DO Extremely low frequency electromagnetic fields and cancer: How source of funding affects results. Environ Res. 2019; 178: https://doi.org/10.1016/j.envres.2019.108688 .

Huss A, Egger M, Hug K, Huwiler-Muntener K, Roosli M. Source of funding and results of studies of health effects of mobile phone use: systematic review of experimental studies. Environ Health Perspect. 2007;115:1–4.

Belyaev I Main regularities and health risks from exposure to non-thermal microwaves of mobile communication. In: 14th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS), Nis, Serbia IEEE. 2019. 111-6. https://doi.org/10.1109/TELSIKS46999.2019.9002324 .

Peleg M, Nativ O, Richter ED. Radio frequency radiation-related cancer: assessing causation in the occupational/military setting. Environ Res. 2018;163:123–33.

Zaroushani V, Khavanin A, Mortazavi SB. Nonthermal effects of radar exposure on human: a review article. Iran J Health Saf Environ. 2014;1:43–52.

Russell CL. 5 G wireless telecommunications expansion: Public health and environmental implications. Environ Res. 2018;165:484–95.

Feldman Y, Puzenko A, Ben Ishai P, Caduff A, Agranat AJ Human skin as arrays of helical antennas in the millimeter and submillimeter wave range. Phys Rev Lett. 2008; 100: https://doi.org/10.1103/PhysRevLett.100.128102 .

Betzalel N, Ben Ishai P, Feldman Y. The human skin as a sub-THz receiver – Does 5G pose a danger to it or not? Environ Res. 2018;163:208–16.

Di Ciaula A. Towards 5G communication systems: are there health implications? Int J Hyg Environ Health. 2018;221:367–75.

Gee D. Late lessons from early warnings: towards realism and precaution with EMF? Pathophysiology. 2009;16:217–31.

Wood A, Mate R, Karipidis K. Meta-analysis of in vitro and in vivo studies of the biological effects of low-level millimetre waves. J Expo Sci Environ Epidemiol. 2021;31:606–13.

Download references

Acknowledgements

We would like to acknowledge Professor Cordia Chu, director at Griffith University, School of Medicine and Dentistry, who provided invaluable advice in the development of this paper.

Author information

Authors and affiliations.

Centre for Environmental and Population Health, School of Medicine and Dentistry, Griffith University, 170 Kessels Road, Nathan, Brisbane, QLD, 4111, Australia

Steven Weller

Oceania Radiofrequency Scientific Advisory Association (ORSAA), Scarborough, QLD, 4020, Australia

Steven Weller, Murray May, Julie McCredden & Victor Leach

School of Public Health, University of Queensland, St Lucia, QLD, 4072, Australia

Department of Radiobiology, Cancer Research Institute, Biomedical Research Center, Slovak Academy of Sciences, Bratislava, 845 05, Slovak Republic

Igor Belyaev

You can also search for this author in PubMed   Google Scholar

Contributions

SW was responsible for reviewing and categorising all Karipidis research articles, writing the analysis documents and initial comment letter. MM and JM offered feedback, and further contributed to writing of letter content and adding references. VL provided ORSAA database relevant records, offered feedback and further contributed to letter content. DP offered feedback and advice on epidemiological studies. IB contributed to letter content, provided feedback and contributed to the analysis documents.

Corresponding author

Correspondence to Steven Weller .

Ethics declarations

Competing interests.

The authors declare no competing interest. SW, VL and JM are founding members of ORSAA. This association is a not-for-profit scientific advisory association and not an advocacy group for any specific cause. ORSAA derives income from public donations and has no ties with industry or government. IB provided an expert opinion in the Cell Phone Litigation on the link between microwave radiation and human health.

Additional information

Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/ .

Reprints and permissions

About this article

Cite this article.

Weller, S., May, M., McCredden, J. et al. Comment on “5G mobile networks and health-a state-of-the-science review of the research into low-level RF fields above 6 GHz” by Karipidis et al.. J Expo Sci Environ Epidemiol 33 , 17–20 (2023). https://doi.org/10.1038/s41370-022-00497-8

Download citation

Received : 07 September 2021

Revised : 27 October 2022

Accepted : 31 October 2022

Published : 24 November 2022

Issue Date : January 2023

DOI : https://doi.org/10.1038/s41370-022-00497-8

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Quick links

  • Explore articles by subject
  • Guide to authors
  • Editorial policies

literature review of 5g technology

In the tech world and beyond, new 5G applications are being discovered every day. From driverless cars to smarter cities, farms, and even shopping experiences, the latest standard in wireless networks is poised to transform the way we interact with information, devices and each other. What better time to take a closer look at how humans are putting 5G to use to transform their world.

What is 5G?

5G (fifth-generation mobile technology) is the newest standard for cellular networks. Like its predecessors, 3G, 4G and 4G LTE, 5G technology uses radio waves for data transmission. However, due to significant improvements in latency, throughput and bandwidth, 5G is capable of much faster download and upload speeds than previous networks.

How is 5G different from other wireless networks?

Since its release in 2019, 5G broadband technology has been hailed as a breakthrough technology with big implications for both consumers and businesses. Primarily, this is due to its ability to handle large volumes of data generated by complex devices using its networks.

As mobile technology has expanded over the years, the amount of data users generate every day has increased exponentially. Currently, other transformational technologies like artificial intelligence (AI), the Internet of Things (IoT ) and machine learning (ML) require much faster speeds to function than 3G and 4G networks offer. Enter 5G, with its lightning-fast data transfer capabilities that allow newer technologies to function in the way they were designed to.

Here are some of the biggest differences between 5G and previous wireless networks.

  • Physical footprint: The transmitters used in 5G technology are smaller than in predecessors’ networks, allowing for discrete placement in out-of-the-way places. Furthermore, “cells”—geographical areas that all wireless networks require for connectivity—in 5G networks are smaller and require less power to run than in previous generations.
  • Error rates: 5G’s adaptive Modulation and Coding Scheme (MCS), a schematic that WiFi devices use to transmit data, is more powerful than ones in 3G and 4G networks. This makes 5G’s Block Error Rate (BER)—a metric of error frequency—much lower.
  • Bandwidth: By utilizing a broader spectrum of radio frequencies than previous wireless networks, 5G networks can transmit on a much wider range of bandwidths. This increases the number of devices they can support at any given time.
  • Lower latency: 5G’s low latency , a measurement of the time it takes data to travel from one location to another, is a significant upgrade over previous generations. This means routine activities like downloading a file or working in the cloud is going to be much faster with a 5G connection than a connection on a different network.

How does 5G work?

Like all wireless networks, 5G networks are separated into geographical areas known as cells. Within each cell, wireless devices—such as smartphones, PCs and IoT devices—connect to the internet via radio waves transmitted between an antenna and a base station. The technology that underpins 5G is essentially the same as in 3G and 4G networks, but due to its lower latency, 5G networks are capable of delivering much faster download speeds—in some cases as high as 10 gigabits per second (Gbps).

As more and more devices are built for 5G speeds, demand for 5G connectivity is growing. Today, many popular Internet Service Providers (ISPs), such as Verizon, Google and AT&T, offer 5G networks to homes and businesses. According to Statista, more than 200 million homes and businesses have already purchased it with that number expected to at least double by 2028 (link resides outside ibm.com).

Let’s take a look at three areas of technological improvement that have made 5G so unique.

New telecom specifications

The 5G NR (New Radio) standard for cellular networks defines a new radio access technology (RAT) specification for all 5G mobile networks. The 5G rollout began in 2018 with a global initiative known as the 3rd Generation Partnership Project (3FPP) that defined a new set of standards to steer the design of devices and applications for use on 5G networks.

The initiative was a success, and 5G networks began to grow swiftly in the ensuing years. Today, 45% of networks worldwide are 5G compatible, with that number forecasted to rise to 85% by the end of the decade according to a recent report by Ericsson  (link resides outside ibm.com).

Independent virtual networks (network slicing)

On 5G networks, network operators can offer multiple independent virtual networks (in addition to public ones) on the same infrastructure. Unlike previous wireless networks, this new capability allows users to do more things remotely with greater security than ever before. For example, on a 5G network, enterprises can create use cases or business models and assign them their own independent virtual network, dramatically improving the user experience for their employees by adding greater customizability and security.

Private networks

In addition to network slicing, creating a 5G private network can also enhance personalization and security features over those available on previous generations of wireless networks. Global businesses seeking more control and mobility for their employees increasingly turn to private 5G network architectures rather than public networks they’ve used in the past.

5G use cases

Now that we better understand how 5G technology works, let’s take a closer look at some of the exciting applications it’s enabling.

Autonomous vehicles

From taxi cabs to drones and beyond, 5G technology underpins most of the next-generation capabilities in autonomous vehicles. Until the 5G cellular standard came along, fully autonomous vehicles were a bit of a pipe dream due to the data transmission limitations of 3G and 4G technology. Now, 5G’s lightning-fast connection speeds have made transport systems for cars, trains and more much faster than previous generations, transforming the way systems and devices connect, communicate and collaborate.

Smart factories

5G, along with AI and ML, is poised to help factories become not only smarter but more automated, efficient and resilient. Today, many mundane but necessary tasks associated with equipment repair and optimization are being turned over to machines thanks to 5G connectivity paired with AI and ML capabilities. This is one area where 5G is expected to be highly disruptive, impacting everything from fuel economy to the design of equipment lifecycles and how goods arrive at our homes.

For example, on a busy factory floor, drones and cameras connected to smart devices utilizing the IoT can help locate and transport something more efficiently than in the past and prevent theft. Not only is this better for the environment and consumers, but it also frees up employees to dedicate their time and energy to tasks that are more suited to their skill sets.

Smart cities

The idea of a hyper-connected urban environment that uses 5G network speeds to spur innovation in areas like law enforcement, waste disposal and disaster mitigation is fast becoming a reality. Some cities already use 5G-enabled sensors to track traffic patterns in real time and adjust signals, helping guide the flow of traffic, minimize congestion and improve air quality.

In another example, 5G power grids monitor supply and demand across heavily populated areas and deploy AI and ML applications to “learn” what times energy is in high or low demand. This process has been shown to significantly impact energy conservation and waste, potentially reducing carbon emissions and helping cities reach sustainability goals.

Smart healthcare

Hospitals, doctors and the healthcare industry as a whole already benefit from the speed and reliability of 5G networks every day. One example is the area of remote surgery that uses robotics and a high-definition live stream connected to the internet via a 5G network. Another is the field of mobile health, where 5G gives medical workers in the field quick access to patient data and medical history, enabling them to make smarter decisions, faster, and potentially save lives.

Lastly, as we saw during the pandemic, contact tracing and the mapping of outbreaks are critical to keeping populations safe. 5G’s ability to deliver of volumes of data swiftly and securely allows experts to make more informed decisions that have ramifications for everyone.

Better employee experiences

5G paired with new technological capabilities won’t just result in the automation of employee tasks, it will dramatically improve them and the overall employee experience . Take virtual reality (VR) and augmented reality (AR), for example. VR (digital environments that shut out the real world) and AR (digital content that augments the real world) are already used by stockroom employees, transportation drivers and many others. These employees rely on wearables connected to a 5G network capable of high-speed data transfer rates that improve several key capabilities, including the following:

  • Live views: 5G connectivity provides live, real-time views of equipment, events and even people. One way in which this feature is being used in professional sports is to allow broadcasters to remotely call a sporting event from outside the stadium where the event is taking place.
  • Digital overlays: IoT applications in a warehouse or industrial setting allow workers equipped with smart glasses (or even just a smartphone) to obtain real-time insights from an application, including repair instructions or the name and location of a spare part.
  • Drone inspections: Right now, one of the leading causes of employee injury is inspection of equipment or project sites in remote and potentially dangerous areas. Drones, connected via 5G networks, can safely monitor equipment and project sites and even take readings from hard-to-reach gauges.

Edge computing

Edge c omputing, a computing framework that allows computations to be done closer to data sources, is fast becoming the standard for enterprises. According to this Gartner white paper (link resides outside ibm.com), by 2025, 75% of enterprise data will be processed at the edge (compared to only 10% today). This shift saves businesses time and money and enables better control over large volumes of data. It would be impossible without the new speed standards generated by 5G technology. 

Ultra-reliable edge computing and 5G enable the enterprise to achieve faster transmission speeds, increased control and greater security over massive volumes of data. Together, these twin technologies will help reduce latency while increasing speed, reliability and bandwidth, resulting in faster, more comprehensive data analysis and insights for businesses everywhere.

5G solutions with IBM Cloud Satellite

5G presents big opportunities for the enterprise, but first, you need a platform that can handle its speed. IBM Cloud Satellite lets you deploy and run apps consistently across on-premises, edge computing and public cloud environments on a 5G network. And it’s all enabled by secure and auditable communications within the IBM Cloud.

More from Cloud

Public cloud use cases: 10 ways organizations are leveraging public cloud.

6 min read - Public cloud adoption has soared since the launch of the first commercial cloud two decades ago. Most of us take for granted the countless ways public cloud-related services—social media sites (Instagram), video streaming services (Netflix), web-based email applications (Gmail), and more—permeate our lives. In the business sphere, both large enterprises and small startups depend on public cloud computing models to provide the flexibility, cost-effectiveness and scalability needed to fuel business growth. According to an International Data Corporation (IDC) report (link resides outside…

The future of 5G: What to expect from this transformational technology

7 min read - Since its rollout in 2019, 5G wireless networks have been growing in both availability and use cases. Apple was one of the first manufacturers to test the appetite for 5G in 2020 by offering its newest iPhone with 5G compatibility. From there, the floodgates opened, and today as much as 62% of smartphones are built with 5G connectivity (link resides outside ibm.com.) The number of networks also continues to grow, with many popular Internet Service Providers (ISPs) like Verizon, Google…

Getting started with Kafka client metrics

4 min read - Apache Kafka stands as a widely recognized open source event store and stream processing platform. It has evolved into the de facto standard for data streaming, as over 80% of Fortune 500 companies use it. All major cloud providers provide managed data streaming services to meet this growing demand. One key advantage of opting for managed Kafka services is the delegation of responsibility for broker and operational metrics, allowing users to focus solely on metrics specific to applications. In this…

IBM Newsletters

A Review on the Analysis of 5G Technology and its Impact on Humans

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

U.S. flag

An official website of the United States government

The .gov means it’s official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

  • Publications
  • Account settings

Preview improvements coming to the PMC website in October 2024. Learn More or Try it out now .

  • Advanced Search
  • Journal List
  • Sensors (Basel)

Logo of sensors

A Survey on 5G Coverage Improvement Techniques: Issues and Future Challenges

Fifth generation (5G) is a recent wireless communication technology in mobile networks. The key parameters of 5G are enhanced coverage, ultra reliable low latency, high data rates, massive connectivity and better support to mobility. Enhanced coverage is one of the major issues in the 5G and beyond 5G networks, which will be affecting the overall system performance and end user experience. The increasing number of base stations may increase the coverage but it leads to interference between the cell edge users, which in turn impacts the coverage. Therefore, enhanced coverage is one of the future challenging issues in cellular networks. In this survey, coverage enhancement techniques are explored to improve the overall system performance, throughput, coverage capacity, spectral efficiency, outage probability, data rates, and latency. The main aim of this article is to highlight the recent developments and deployments made towards the enhanced network coverage and to discuss its future research challenges.

1. Introduction

Nowadays, the usage of wireless devices is increasing rapidly along with the amount of data consumption, user demands, and their expectations. Advances in wireless evaluation have introduced new services and use cases to meet these demands and expectations [ 1 , 2 ]. The essential services of these wireless technologies provide key parameters such as low latency, high bandwidth, maximum throughput, and enhanced capacity [ 3 , 4 ]. Fifth-generation (5G) wireless technology has been proposed to fulfill these key parameters with new optimised and enhanced services. 5G introduces new challenges such as high data rates, ultra-reliable low-latency communication (URLLC), high connectivity, greater bandwidth, and better support for mobility [ 5 ]. An evaluation of technology generations with their access techniques, data rates, frequency bands, applications, and key parameters is shown in Table 1 [ 6 ]. To meet these key parameters of 5G and beyond, new technologies are proposed, including millimetre wave (mmWave) spectrum for large bandwidths, multiple input and multiple output (MIMO) for massive connectivity, and extreme mobile broadband (eMBB) for high data rates and low latency [ 7 , 8 ].

Evaluation of technology generations from 1G to 5G.

The mmWave is a very underutilised spectrum, and it is used by the 5G network to provide very high-speed communications and large bandwidths. The International Telecommunication Union (ITU) identified the frequency bands for international mobile telecommunications (IMT) from the mmWave bands. The ITU identified more bands for 5G deployment at the World Radio Communication Conference 2019 (WRC-19), which took place from 28 October to 22 November 2019. They are 24.25 GHz–27.5 GHz, 37 GHz–43.5 GHz, 45.5 GHz–47 GHz, 47.2 GHz–48.2 GHz, and 66 GHz–71 GHz. As a result, the conference has identified a total of 17.25 GHz of spectrum, compared to the 1.9 GHz of bandwidth that was accessible prior to WRC-19 [ 9 ].

The frequency bands specified by 3GPP (3rd Generation Partnership Project) for 5G are frequency range 1 (FR1) and frequency range 2 (FR2), from 450 MHz to 6 GHz and 24.25 GHz to 52.6 GHz, respectively. These bands are again subdivided into different new bands. FR1’s new bands are n78 (3.3 GHz–3.8 GHz), n79 (4.4 GHz–5.0 GHz), and n77 (3.3 GHz–4.2 GHz). Out of these three bands, n78 is the most commonly used FR1 band for 5G deployment. Out of all these new bands, some are used for uplink (UL) and some are used for downlink (DL). The maximum carrier bandwidth of FR1 is 100 MHz, and the sub-carrier spacing is 15 kHz, 30 kHz, and 60 kHz. FR1 uses both time-division duplexing (TDD) and frequency-division duplexing (FDD) modes. The new frequency bands of FR2 are n256: 24.25 GHz to 27 GHz, n257: 26.6 GHz to 29 GHz, n260: 37 GHz to 40 GHz, and n261: 27 GHz to 28 GHz. FR2 uses only TDD mode for duplexing, and the maximum carrier bandwidths are 200 MHz and 400 MHz. The sub-carrier spacing is 60 kHz, 120 kHz, or up to 240 kHz.

The mmWave frequency bands are vulnerable to high attenuation due to their channel conditions and high path loss, which deteriorate the signal quality. However, the expectations of future cellular networks are high data rates, enhanced coverage and throughput, better connectivity, and massive mobility, which cannot be fulfilled without proper signal quality. The mmWave travels at high frequency and collides with the obstacles, causing a loss of signal energy. As a result of their lower penetration losses, mm-wave signals can only travel shorter distances, resulting in a much smaller coverage area than conventional frequency bands. Hence, coverage is one of the most challenging issues in the future of cellular networks.

1.1. Existing Surveys

According to the author, there is no detailed review of coverage enhancement techniques in cellular networks. However, there are some papers that explore the challenges of the future cellular network requirements, including coverage as one of the subtopics. In 5G, coverage is the basic issue, and to overcome this issue, many authors have proposed various algorithms and methods. To improve coverage in cellular networks, heterogeneous networks (HetNets) and small cells are proposed [ 10 , 11 , 12 ]. The HetNets with less complex user association algorithms and small cells with interference mitigation algorithms are still required to improve the efficiency and reliability of the cellular system. In the literature, network coverage was improved using optimization techniques such as machine learning, linear programming, and mathematical analysis. The optimization of coverage capacity, deployment cost, and coverage area in 5G are explored [ 13 , 14 , 15 , 16 ]. Along with the deployment cost and network capacity, it will provide the optimization algorithms for resource allocation, quality of service (QoS), spectral efficiency, and throughput.

The conventional multiple access techniques will not fulfil the future challenges of 5G, such as high data rates, low latency, massive connectivity, and high spectral efficiency. In 5G, the increased number of cellular users increases the receiver’s complexity. However, non-orthogonal multiple access (NOMA) techniques can be used to reduce receiver complexity [ 17 , 18 , 19 ]. This will allocate the multiple users in one resource block based on allocation techniques and decode the users at the receiver to reduce the system’s complexity. This method will improve the bit error rate, throughput, and system capacity. Device-to-Device (D2D) technology is also used to reduce the system complexity, provide security from malicious users, and provide better reliability [ 20 , 21 , 22 , 23 , 24 ]. The bandwidth of the cellular network can be improved by using carrier aggregation (CA) techniques [ 25 , 26 , 27 , 28 , 29 ]. The opportunities and future challenges of massive MIMO in 5G and beyond are discussed in [ 29 ].

In the literature, there exists several techniques and technologies to enhance the network coverage, but not in an integrated manner. The authors focused on key parameters of the 5G networks and its implementations, deployments individually. The authors in Refs. [ 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 ], focused on one or two coverage enhancement techniques such as small cells, CA, D2D, NOMA, MIMO, or 5G optimisation techniques—but not all in one paper. Therefore, this survey aims to provide broad and complete information about all coverage enhancement techniques and the intelligent optimization techniques, their pros and cons to fulfil the existing gap in wireless cellular networks, and also future challenging issues. A comparative overview of existing surveys on different 5G coverage enhancement techniques are shown in Table 2 .

A comparative overview of existing surveys on 5G coverage enhancement techniques.

Note: In Table 2 , ✓ denotes covered topics and X denotes uncovered topics.

1.2. Contributions

This research primarily focused on cellular network coverage enhancement approaches and conducted a literature review on the topics of coverage enhancement techniques, coverage definitions, and coverage requirements. Techniques for improving coverage capacity, spectrum efficiency, throughput, latency, and data rates are analysed. The contributions of this paper are summarised as:

  • This survey focused on the 5G network coverage. Starting from the coverage definitions, requirements, and its enhancement techniques;
  • The evaluations and advancements of mobile networks from 1G to 5G, are discussed;
  • 3GPP releases are explored towards the coverage enhancements, spectrum bands, multiplexing techniques, number of channels aggregated, and their bandwidths;
  • In this survey, we highlighted the 5G network key parameters, applications and advantages;
  • The coverage degradation sources are identified and the enhancement techniques are explored;
  • The coverage enhancement techniques such as small cells, carrier aggregation, device to device communication, non-orthogonal multiple access, multiple input and multiple output, and optimization approaches are discussed;
  • The pros and cons and the future challenges of each enhancement technique are highlighted.

1.3. Paper Outline

This article is organised as follows: Section 2 illustrates the basics of wireless communication system, i.e., coverage definitions, coverage issues, coverage monitoring, and coverage requirements. Section 3 focuses on the coverage enhancement technologies such as small cells, CA, D2D, NOMA, MIMO, and optimization in 5G networks. In this section, each coverage enhancement technique implementations and their future challenges are explored. In Section 4 , 5G key parameter enhancement techniques, their advantages, limitation and future challenges are illustrated. 6G and its future challenges are explored in Section 5 . Section 6 concludes the article and provides the future scope. The structure of this article is shown in Figure 1 . Table 3 provides the list of abbreviations used in this article.

An external file that holds a picture, illustration, etc.
Object name is sensors-23-02356-g001.jpg

Structure of the article.

List of Abbreviations.

2. 5G Network Coverage Planning

2.1. coverage definitions.

Coverage Definition: The area covered by one base station (BS) or cell where the user can send a service request or receive a service, which is defined as coverage, is shown in Figure 2 a [ 30 ]. This coverage area depends on many parameters such as transmitting power of the cell, type of antenna used, carrier frequency and the location of the cell. Coverage area is also measured in terms of the cell boundary or cell radius and is defined as the maximum distance from the cell to the user equipment (UE). The user can send any service request or receive any service without any interference within the cell boundary. In 5G, small cell site concept was proposed to avoid latency, to improve the spectral efficiency and to provide high data rates. A small cell site of 100 m cell radius is used at higher frequency bands. Therefore, to cover the large area more than one small cell site is required to be deployed. To avoid interference between two cells, i.e., out of cell interference, it is mandatory to maintain a minimum distance between the cell sites called inter site distance.

An external file that holds a picture, illustration, etc.
Object name is sensors-23-02356-g002.jpg

( a ) Single cell, ( b ) cell structure.

In 5G, hundreds of small cell sites are required to cover a large area and the basic cell structure is shown in the Figure 2 b [ 30 ]. Based on the coverage area, the number of cells can be increased, as in tier 1, which contains 6 cells, tier 2, containing 12 cells, tier 3, containing 18 cells, and so on.

2.2. Identification of Coverage Issues

In cellular network, coverage is one of the most important parameters. It is affected by many parameters such as high network density, location of UE and BS, and the environmental conditions. Some of the coverage issues are coverage holes, overshoot coverage, weak coverage, channel coverage mismatch, and the cell edge problems [ 31 ]. Coverage hole is a location within the cell boundary where the UE cannot receive signals from the primary cell when it is actually in the primary cell or neighbouring cell if it is at the cell edge. This is mainly due to obstacles such as buildings, trees, mountains, etc., which will reduce the signal strength because of multipath fading effects and because the signal strength received by the UE is less than the threshold value. The coverage holes are mainly due to non-line of sight, poor radio frequency (RF) network planning, and multi-path fading.

Overshoot coverage is exactly opposite the coverage area. Overshoot coverage occurs when the signal strength is very high and it crosses the primary cell boundary. The issues with overshoot coverage are signal interference and poor quality of service. Weak coverage is the result of the signal strength being below the necessary threshold inside the cell boundary. These two issues can be mitigated by proper adjustment of RF signal power within the cell area. Channel coverage mismatch occurs due to the UL and DL frequency variations. In a cellular network the coverage issues are mainly at cell edge or cell boundary because the signal power decreases exponentially with respect to the distance [ 32 ]. To reduce the cell edge issues, sectoring and micro cell concepts were proposed [ 33 , 34 ].

2.3. Coverage Monitoring

The coverage issues mentioned in the above subsection need to be solved to provide a better cellular network. To rectify these issues it is first mandatory to identify the cause by using drive test method, performance measurements, and alarm and traces. To detect the weak coverage and overshoot coverage locations, unsuccessful handovers and terminated connections, a drive test is the best method [ 35 ]. The authors in Ref. [ 36 ], proposed a coverage mapping and cell boundary mapping techniques to solve the coverage issues. To monitor the network and to predict the network, network planning tools play an important role. ASSET radio planning tools are used to predict the network coverage and neighbouring cell planning techniques. RF planning tools [ 37 ] and RAN planning tools [ 38 ] are proposed in the literature to monitor the coverage. The coverage issues and network parameter optimization techniques are discussed in the following sections.

2.4. Coverage Enhancement Requirements

All cellular technologies define their requirements before their initial releases. The 5G defined its requirements such as ultra-reliable low latency communication, high spectral efficiency, high data rates, massive mobility, and coverage enhancement [ 39 , 40 , 41 , 42 ]. In 5G, a small cell site concept was proposed to improve the coverage but in rural areas large cell sites are still used because of low traffic rates. In suburban areas, based on the traffic density, the number of relay nodes deployed are increased to improve the coverage [ 43 ]. Therefore, based on the requirements the cell sites are deployed to improve the coverage, throughput, and spectral efficiency [ 44 ]. Mobility, handovers, and cell edge data rates also affect the coverage [ 45 ]. The authors in Ref. [ 46 ], proposed a method to reduce the data transfer rate at the cell edge and also to reduce the inter-cell interference and to improve the coverage. This section provides an overview of cellular network requirements and in the following sections the coverage enhancement techniques and their future challenges are explained.

3. 5G Coverage Enhancement Techniques

In this survey, small cells, carrier aggregation, device to device and NOMA, MIMO and 5G optimization techniques are proposed as the 5G network coverage enhancements techniques, which is shown in Figure 3 . The existing works of each technique are discussed and its future challenges are explored in this section.

An external file that holds a picture, illustration, etc.
Object name is sensors-23-02356-g003.jpg

5G coverage enhancement techniques.

3.1. Small Cells

Small cells are low power short range transmission systems or BS deployed to cover a small geographical area. The characteristics of small cells are similar to the conventional BSs. These small cells can be deployed in indoor or outdoor regions and it will provide high data rates and low latency. These small cells are classified into three types based on the area covered by the BS, the maximum number of user’s covered, and the maximum power transmitted [ 47 ]. They are femto cells, pico cells, and micro cells, which are shown in Figure 4 . The classification of small cells and their parameters are shown in Table 4 .

An external file that holds a picture, illustration, etc.
Object name is sensors-23-02356-g004.jpg

Small cell techniques.

Comparison of small cells.

5G requires small cells to achieve its key parameters such as enhanced mobile broad band, URLLC, massive connections and enhanced spectral efficiency. Small cells use low power transmitting stations and are very easy to deploy because of their low complexity in hardware installation. These small cells can be mounted on a wall for indoor applications and small towers or lamp posts can be used for outdoor applications. In small cells, the coverage and data rate depends on the operating frequency, transmitted power, and height and tilt angle of an antenna. The radius of the coverage area is always proportional to the transmitted power [ 48 ]. The small cells have many advantages such as high data rates, faster deployment, cost effective, they can work with low powers, and require less installation space. To achieve high data rates and large capacity, the 5G network is integrated with small cells, MIMO, beam-forming, and mmWaves.

The mmWave, i.e., from 30 GHz to 300 GHz, is a much less utilised spectrum and it provides very high speed communication. However, the problem with high frequency mmWave is that it collides with obstacles such as trees, buildings, etc., in the free space, and causes multipath fading, which leads to reduced signal strength. Therefore, mmWaves are the best frequency bands for short distance communication and can be used in small cells. A geographical area without small cells and with small cells is shown in Figure 5 . In Figure 5 a, the mmWave signal is facing multipath fading but in Figure 5 b, with the use of small cells, the multipath fading is avoided and it provides better coverage than compared to the conventional method.

An external file that holds a picture, illustration, etc.
Object name is sensors-23-02356-g005.jpg

( a ) The mmWave signal is blocked by obstacles. ( b ) Small cells used to avoid the multipath fading.

In the literature, researchers deployed the femto, pico, and micro cells and identified the network capacity, data rates, and coverage area [ 49 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 ]. In Ref. [ 49 ], the authors considered a stochastic geometry theorem for the optimization of small BS density in a ultra dense Hetnets. The optimized small BS density enhances the energy efficiency for a particular number of UEs. In Ref. [ 50 ], the authors deployed a small cell in a moving bus and estimated the coverage area as 300 m in an urban environment. For indoor applications such as residential, hospitals, schools, offices, and shopping malls, the femto cells are preferred because of their easy installation, cost effectiveness, and low power requirements [ 51 ]. The femto cells will improve the system throughput and signal to interference noise ratio (SINR) and also minimizes the latency and the cell edge coverage problems [ 52 ]. The performance of femto cells is affected by the location they are placed and the infrastructure present in the place, such as number of walls, curtains, doors, ceiling, etc. They will obstruct the signals and cause multi path propagation.. This may reduce the SINR and overall coverage area [ 53 ].

The maximum coverage radius of femto cells is up to 50 m; if the area covered by a cell increases, then the femto cells are replaced by the pico cells. The pico cells are used in indoor and outdoor regions and it also increases the coverage radius up to 200 m and the maximum power required is 250 mW [ 54 ]. If this coverage radius is extended from 200 m to 2.5 km, then the pico cells are replaced by the micro cells. A micro cell covers a large area and the power radiated by an antenna is also increased to 5 W. The pico cells are deployed at the cell edge of macro cells to enhance the coverage capacity, throughput, and traffic offload at the macro cell edge [ 55 ]. The coverage area of a macro cell is added with the pico cells to improve the overall system throughput and the received signal power is used to estimate the path loss [ 56 ]. This method will enhance the coverage capacity and cell edge spectral efficiency. A macro cell and pico cell cooperative scheduling scheme is considered to reduce the UL and DL interference due to the macro cell on pico cell UEs [ 57 ]. The problem with these small cells is handovers, i.e., frequent handovers cause major issues in the small cells. Therefore, the open research challenges in small cells are: power demands, coverage radius, deployment and testing, and mobility and handovers. Different techniques have been used in recent research to resolve the coverage and capacity issues in 5G networks with small cells, as summarised in Table 5 .

Summary of small cell-based approaches of 5G networks.

The future challenges of small cells are:

  • Power Requirements: For data transmission, the small cells use mmWave frequency bands, which require strong operating powers. A huge number of small cells must be installed in order to cover a vast area with a high population density, which requires more transmission power. Therefore, the power required will increase with the increase of small cells, which increases the deployment cost and energy. Hence, power optimization techniques must be proposed in the future to enhance the network coverage;
  • Coverage Radius: Small cells coverage radius is less compared to the conventional BSs. The users need more coverage capacity in their working places or living places, where the small cells are to be deployed. In places where there is no need of any coverage, such as ponds, lakes, and forests, the small cells are not required to be deployed. Therefore, the deployment of small cells depends on the population density, available carriers, and topography. Along with these it also depends on small cell parameters such as supporting frequency bands, carrier frequencies, and coverage area size. The coverage radius is one of future challenges in the small cells to provide a better coverage and to avoid any gaps in the coverage;
  • Mobility and Handovers: Small cells cover a small geographic area. When a small cell is installed in a shopping mall and a person is moving from one floor to another floor and browsing, emailing, calling, or downloading files, then it should not cause any degradation in the connectivity. Therefore, how many UEs it can handle at a time with high data rates is also one of the challenging issues to be considered in the future;
  • Deployment and Testing: Small cells can utilise the existing infrastructure such as street lamp poles, walls, top of the apartments, etc. The weight of a small cell is one of the important factors when deploying them in indoor or outdoor regions. The correct way to test a small cell is to improve the quality of service and also to satisfy the subscribers demands. The user traffic, mobility and handovers, and overall system load should be considered as the testing parameters. These parameters should be improved by proper testing. So, AI based algorithms need to be proposed to test the small cells automatically. Identifying the correct testing method is also one of the future challenging issues.

3.2. Carrier Aggregation

Carrier aggregation is the process of combining one or more carriers to increase the data rate and network capacity for continuous transmission or reception [ 58 ]. Initially, the unused spectrum bands or carriers are identified and then added with the primary carriers. These combined carriers are referred to as component carriers (CC), and these are only the downlink carriers or a combination of the downlink and uplink carriers but not only the uplink carriers [ 59 ]. CC is divided into two types: primary CC (PCC) and secondary CC (SCC). The PCC is always in active mode, but the SCC can be in sleep or active mode based on the requirements of the user. If the user requires higher data rates, then the SCC is in active mode. Otherwise, it will be in sleep mode, but the PCC will always be in active mode until the handover is required. In CA, the primary serving cell or PCC, carries both the controlling signals and user data. The secondary serving cell or SCC, carries only user data; it does not carry any control information, as shown in Figure 6 [ 60 ].

An external file that holds a picture, illustration, etc.
Object name is sensors-23-02356-g006.jpg

Primary carrier components and secondary carrier components in a network.

In a network, if four carriers are aggregated, then one is PCC and the remaining three are SCCs. CA in 5G is divided into two types: intra band and inter band, and again these two are subdivided into contiguous and non-contiguous ways of carrier aggregation, which are classified as follows [ 61 ].

  • Intra-band contiguous method: One or more adjacent carriers of the same band are aggregated to form a single carrier, which is called the intra-band contiguous method of CA;
  • Intra-band non-contiguous method: One or more carriers separated by some band gap in one frequency band are aggregated to form a single carrier. This is called the intra-band non-contiguous method of CA;

An external file that holds a picture, illustration, etc.
Object name is sensors-23-02356-g007.jpg

Types of carrier aggregations.

CA is introduced in 3GPP release-10 to enhance the data rates and mitigate the inter-cell interference of the LTE-advanced network [ 62 ]. In the initial stage, it can combine two or more CCs to achieve a maximum bandwidth of 100 MHz, with each CC having a bandwidth of 1.4 MHz, 3 MHz, 5 MHz, 10 MHz, 15 MHz, and 20 MHz [ 63 ]. In both intra and inter bands, the maximum number of UL or DL carriers that can be aggregated is 5. CA uses both FDD and TDD duplexing modes and also uses licensed and unlicensed bands for aggregation. The number of wireless devices increases day by day, and the bandwidth of 100 MHz is not sufficient to support the required data rates. Hence, new releases with increased bandwidths and new applications are proposed by the 3GPP. Release-13 is used by LTE Advanced Pro, and it will support a maximum bandwidth of 640 MHz and aggregate up to 32 UL and DL carriers [ 60 ]. This release allows unlicensed frequency bands in the 5 GHz range to aggregate with licensed bands. Releases 15 and 16 are proposed for 5G New Radio (5G-NR) and provide a maximum bandwidth of 6.4 GHz. Up to 16 CCs are aggregated, and those CCs can select their frequency bands from both the FR1 and FR2 bands. The CA of both LTE and 5G-NR is known as dual connectivity (DC), and it is used by the 5G headset for data transmission to achieve a maximum bandwidth of 6.4 GHz [ 64 ].

The coverage can be enhanced by using carrier aggregation techniques [ 65 , 66 , 67 , 68 , 69 ]. The high and low frequency components are aggregated based on cooperation in order to enhance the coverage and capacity in a building [ 65 ]. In Ref. [ 66 ], contiguous and non-contiguous CA methods are deployed, and the authors observe that the proposed methods improve the bandwidth and also enhance the coverage and data rates. In Ref. [ 67 ], aggregation of two CCs is considered, and the performance of CA with independent carriers is compared. The authors observed that the CA achieves a higher data rate compared with the independent carriers. In Ref. [ 68 ], single and multi-flow relay-assisted CA systems were analysed, and it was observed that the relay can be used as a capacity booster for low-frequency CCs. It will improve the capacity and fairness of the CA system. LTE and 5G-NR carriers are aggregated to enhance the coverage, channel capacity, and data speed [ 69 ]. CA has several advantages, including an unutilized spectrum that can be effectively used to improve spectral efficiency, to increase the UL and DL data rates with higher throughput, and improve the system performance. As has been summarised in Table 6 , different techniques have been used in recent research to resolve the coverage and capacity issues in 5G networks with CA.

Summary of carrier aggregation-based approaches of 5G networks.

CA is facing DL, UL, and implementation challenges that need to be addressed in the future:

  • DL Sensitivity: Instead of designing a duplexer for each carrier component, the interference between DL and UL at the receiver is used to design it. A separate multiplexer or duplexer is required if there is a large frequency separation between the UL and DL frequency bands. Therefore, designing a multiplexer for reducing RF front-end design at large frequency variations is a future challenge;
  • Harmonic Generations: The harmonics are generated by the use of non-linear components in duplexers, power amplifiers, and transceivers. These harmonics are generated to reduce system complexity. This is one of the open challenges for researchers to design the best harmonic generator;
  • Filter Design: In California, proper filter design is required to decode the carriers at the receiver without any interference;
  • Power Amplifier: The intra-band UL CA signals use a higher bandwidth and a high peak-to-average power ratio (PARP) to reduce the maximum power. The maximum power can be reduced by adjusting the resource block configurations. Therefore, to achieve reduced power with high bandwidth and high PAPR, tuned power amplifiers are required. So, the open challenge is the design of tuned power amplifiers for UL CA;
  • Implementation Issues: The hardware implementation of CA is very critical, as it requires oscillators, radio frequency chains, signal processing techniques, a strong battery life, etc. [ 70 ].

3.3. Device to Device Communication

The way information is exchanged between two UEs is changing as technology evolves. In mobile communication, even though two pieces of user equipment (the source and destination devices) are very close to each other, they need a central entity called BS to establish a connection between them. They are not allowed to establish a direct connection between them without BS, and it increases the data traffic at BS [ 71 ]. Therefore, to address this issue, D2D communication is proposed, and it is one of the most popular coverage improvement techniques on mobile networks [ 46 ]. In D2D communication, two devices can communicate with each other without the use of a base station. The features of D2D communication are traffic offloading, low latency, low power consumption, more spectral efficiency, and a large cellular coverage area [ 72 ].

In D2D communication, the cellular architecture is divided into two tiers. In the first tier, the communication is between the BS and the device in the macro-cell layer, called the macro-cell tier. In the second tier, also called the device tier, only devices will communicate with each other. In D2D communication, the users can share their spectrum resources in the device-tier using licensed spectrum and in the macro-cell-tier using unlicensed spectrum. The device-tier mode of communication is divided into underlay and overlay modes. The D2D users share the same spectrum resources as cellular users in in-band mode, but in macro-cell tier mode, D2D and cellular users share different spectrum resources [ 73 ]. The two-tier network is classified into four types [ 74 ].

  • Device relaying with an Operator Controlled Link Establishment (DR-OC): In this method, a device will communicate with the BS if there is poor cell coverage or if it is at the cell edge. This method is used to relay the data to other networks, as shown in Figure 8 .

An external file that holds a picture, illustration, etc.
Object name is sensors-23-02356-g008.jpg

Illustration of DR-OC communication.

  • Direct D2D Communication with Operator Controlled Link Establishment (DC-OC): In this method, the BS will establish a link between the source device and the destination device. Once the link is established, the devices will communicate with each other directly without any role of BS, as shown in Figure 9 .

An external file that holds a picture, illustration, etc.
Object name is sensors-23-02356-g009.jpg

Illustration of DC-OC communication.

  • Device Relaying with Device Controlled Link Establishment (DR-DC): In this method, the source and destination devices will communicate with each other using relay transmission data. In this method there is no role of BS, as shown in Figure 10 .

An external file that holds a picture, illustration, etc.
Object name is sensors-23-02356-g010.jpg

Illustration of DR-DC communication.

  • Direct D2D communication with Device Controlled Link Establishment (DC-DC): In this method, the source and the destination devices will communicate with each other by establishing a direct link between them on their own, and there is no role of BS, as shown in Figure 11 .

An external file that holds a picture, illustration, etc.
Object name is sensors-23-02356-g011.jpg

Illustration of DC-DC communication.

The successful implementation of D2D communication faces many issues and challenges such as mode selection, device discovery, interference management, and security and mobility management [ 75 , 76 , 77 ].

3.3.1. Mode Selection

In D2D communication, two users can directly communicate with each other. Mode selection is the process of choosing the right mode, i.e., D2D or cellular mode, for communication between two UEs, which will improve the system’s performance, throughput, spectral efficiency, and reduce latency. The mode selection issues and proposed solutions are discussed in this section [ 78 , 79 , 80 , 81 , 82 , 83 , 84 , 85 , 86 , 87 ]. In Ref. [ 78 ], a joint optimization algorithm has been proposed for mode selection and power allocation in D2D underlay communication. This will improve the total sum rate and overall system performance using relay-based D2D. A degree of freedom-based mode selection algorithm and an interference alignment algorithm for interference management are proposed in Ref. [ 79 ]. These two algorithms will reduce interference and enhance the system’s performance at high SNR. These two algorithms will be suitable for large MIMO systems and small cell 5G networks. A distributed coalition formation algorithm has been proposed to achieve high system performance under link allocation and mode selection [ 80 ]. An underlying D2D multi-hop relay-aided scheme has been proposed to improve the coverage capacity [ 81 ]. A joint mode selection, relay selection, and resource allocation optimization algorithm are proposed to improve the throughput and SINR [ 82 ]. A greedy heuristic algorithm is proposed for mode selection based on QoS [ 83 ]. This method will improve the total sum rate and SINR without affecting the signalling overhead.

In Ref. [ 84 ], authors proposed an optimal mode selection and resource allocation algorithm for D2D communication in order to encourage mutual cooperation among D2D users, which also increases the throughput and efficiency. In Ref. [ 85 ], a partial CSI algorithm with a low overhead was proposed. Along with this, rate adaptation, mode selection, and user scheduling algorithms are also used to reduce intercell interference and cross-link interference. The analytical expressions for mode selection in underlay mode are derived from a single antenna at the BS. In Ref. [ 86 ], an interlay mode selection model is proposed for NOMA systems. This will use SIC decoding and power domain multiplexing to reduce interference between the users. A joint mode selection and resource allocation scheme is proposed to improve the sum rate and achieve better SIC decoding outputs. In Ref. [ 87 ], an optimal mode selection algorithm for a full-duplex CR has been proposed to improve the spectral efficiency. The crucial zone is defined to identify the operating mode of users, i.e., if the receiver is inside the guard zone, then the operating mode is considered to be a half-duplex mode. If the transmitter and receiver are outside the guard zone, then the operating mode is considered full duplex mode. Different mode selection, power allocation, and resource allocation algorithms have been used in recent research to resolve the coverage and capacity issues in 5G networks, as summarised in Table 7 .

Summary of mode selection, power allocation, and resource allocation algorithms in D2D communications.

The future research challenges of mode selection in D2D communication are:

  • Dynamic mode selection: The papers so far discussed in this section are mostly focused on the static mode selection schemes of D2D communication. Mode selection depends on the spectrum and resource availability. Therefore, an optimal mode selection scheme needs to be proposed based on the resources available;
  • Mode selection overhead: The mode selection depends on the channel estimation, signalling, and CSI, which leads to system overhead. Therefore, the amount of overhead needs to be minimised by proposing an appropriate algorithm to improve the throughput and device lifetime in D2D communications.

3.3.2. Device Discovery

In D2D communication, before any two user equipments (UE) communicate with each other, a secured device discovery process is required. In this process, the first step is to identify whether there is any device that is near another. It is possible if one device will send a discovery signal to identify the presence of other devices that are near it, and then they can form a pair by sharing the link establishment data between the devices and BS. If the two devices are discovered by each other and a secured link is established, then they can transfer their data without revealing their identities. The D2D discovery procedure is classified mainly into centralised and distributed methods [ 88 ]. A central entity known as a BS or an access point will allow all other devices to discover one another in the centralised method. After discovery, if any device wants to connect with another device, it should send the purpose of the connection to the BS. Initially, the BS will verify the channel conditions, interference control policy, and transmission power before establishing a connection. BS will also verify the SINR, path gain and the connection possibility between the two devices. Finally, it will confirm the connection between the two devices.

In the distributed method, one device can send a device discovery signal to any other device without informing the BS. In this method, the connecting devices have to verify all the channel conditions, path gain, SINR, connection possibility, and so on. This method will cause some interference, security, and synchronisation issues. In the literature, many device discovery algorithms are proposed for both centralised and distributed methods [ 89 , 90 , 91 , 92 , 93 , 94 , 95 , 96 ].

To detect a large number of UEs and reduce latency and collision probability in device discovery, Ref. [ 89 ] proposed a direct discovery scheme based on a random backoff procedure. In Ref. [ 90 ], a VANET-based discovery scheme has been proposed to reduce the latency in the discovery process and to enhance throughput and energy efficiency. In Ref. [ 91 ], an adaptive D2D discovery scheme has been proposed to reduce the energy consumption required for device discovery by reducing the discovery signalling messages in the network. This scheme will improve energy efficiency and throughput. In Ref. [ 92 ], a socially aware peer discovery scheme was proposed to identify malicious and trusted users. This scheme will increase the probability of identifying trusted users and reduce the number of malicious users. Therefore, the throughput increases with the increase in trusted users in D2D communication. In Ref. [ 93 ], an energy-efficient device discovery scheme has been proposed for device discovery over static and random backoff patterns. This method will increase the overall number of devices discovered for D2D communication. A mathematical model for discovering neighbourhood devices was developed in 1994 [ 94 ]. In this method, devices are discovered when they are moving, static, or out of the network.

To improve spectrum efficiency and reduce device discovery delays, a public safety full-duplex device discovery scheme was proposed [ 95 ]. In this method, there is a possibility of switching the device discovery mode from full duplex to half duplex and vice versa based on the QoS requirements. The priority in device discovery, i.e., public safety, has the highest priority as compared to random access devices, which will enhance the discovery time. In Ref. [ 96 ], a device discovery and localization scheme using UAVs is proposed for public safety systems. The MUSIC algorithm is used to estimate the accuracy, throughput, and packet error rate. Different device discovery algorithms have been used in recent research to resolve the coverage and capacity issues in 5G networks, as summarised in Table 8 .

Summary of device discovery algorithms in D2D communications.

The future challenges that need to be addressed in device discovery are:

  • Initial device discovery signal: In D2D communication, initially the device will send a device discovery signal to detect the neighbouring devices. Any malicious user can also send the discovery signal to identify trusted users and create some security issues. Therefore, to avoid security issues due to malicious users, the initial signal generation parameters such as signal data size and control data have to be secured;
  • Multi cell device discovery: The proposed research till now has focused on single cell device discovery models. If the user is at the cell edge or dynamically changing his location from one cell region to another cell region, then multi-cell device discovery is required. Therefore, detection of multi-cell devices is one of the future challenges in D2D communication systems;
  • Non Repudiation and Traceability: Non repudiation prevents D2D users from being denied transmission and reception of messages. Traceability is mandatory to detect the source of false messages. This is also one of the future challenges to providing a secured data transfer;
  • Availability and Efficiency: In D2D communication systems, the availability of a device largely depends on the degree of cooperation of devices. Efficiency is the ability of a communication system to implement and operate economically. Therefore, achieving higher efficiency in device discovery is one of the future challenges in D2D communications.

3.3.3. Interference Management

In a cellular network, the same spectral resources are used by both cellular users and D2D users, which will cause interference for the cellular users. The most commonly occurring types of interference in D2D communication are co-tier and cross-tier interference. In co-tier, the interference occurs between the same tier network elements, i.e., between one D2D user (DU) and the neighbouring DU, because they are located very near each other. This is due to assigning the same frequency channels and resource blocks to multiple DUEs. This co-tier interference can be overcome by proper assignment of spectrum bands and user pairing. Cross-tier interference occurs between the device network elements, i.e., DUE and CUE, which are of different tiers. This is between one CUE and one DUE or one CUE and multiple DUEs. The basic reason for cross-tier interference is sharing the same frequency channels or resource blocks with one or more D2D users.

To manage the interference between D2D users, centralised, distributed, and semi-distributed interference-controlled approaches are proposed. In a centralised method, a central entity collects the channel state information (CSI), channel quality, and interference range from all the users in the network and then manages the interference between CU and DU [ 97 ]. The main issue with this method is the significant amount of signalling overhead required for exchanging CSI and feedback, which grows exponentially with the number of DUs. This method is useful if the network size is small. In the second method, there is no need for a centralised entity to collect complete data from all the DUs. Each user will collect the data using their own methods. Therefore, the signalling overhead will be reduced and will be used for large-sized networks. The only disadvantage is the difficulty in coordinating the users. To overcome the pros and cons of centralised and distributed methods, a hybrid interference control approach is popularly used. The interference between cellular users and D2D users can be overcome by using interference management schemes [ 98 , 99 , 100 , 101 , 102 , 103 , 104 , 105 , 106 , 107 ].

An advanced coding and decoding scheme is proposed for interference cancellation (IC) in the CUE and DUE and to enhance the network capacity. A two-way decode and forward relay mode-based scheme is proposed in D2D communications, and M-antenna BS is used in cellular user communication to reduce interference [ 98 ]. IC and beam-forming concepts are also used to reduce the interference between the CUE and DUE in both asymmetric and symmetric cases. In Ref. [ 99 ], a multiple interference cancellation scheme (MIC) is used instead of SIC in NOMA. The MIC optimises power consumption and provides better system performance compared to the SIC receiver. In Ref. [ 100 ], the authors proposed an innovative method to overcome the interference problem by using a MIMO with zero forcing and a minimum mean square error SIC scheme to improve the performance of the NOMA system. In this method, a practical interference cancellation scheme reduces the bit error rate and improves the system performance by predicting the interference signals. In Ref. [ 101 ], the performance of cellular networks using interference cancellation and beam-forming with M-antennas at the BS is analysed. From the results, it is observed that the interference between the D2D users and cellular users is decreased and the SNR is enhanced. In Ref. [ 102 ], a guard zone-based interference mitigation algorithm is proposed based on the SIC at the BS. This method will improve the average throughput of the UE and the transmission probability.

To avoid interference between the DUEs and CUEs, interference avoidance techniques are proposed. In Ref. [ 103 ], a multi-hop D2D resource allocation scheme was proposed to avoid interference. From the simulation results, it is observed that the system’s performance in terms of throughput has increased. In Ref. [ 104 ], a massive MIMO system operating in FDD mode has been proposed to reduce the feedback overhead. In Ref. [ 105 ], the authors proposed a relay-based D2D system to improve the system’s capacity and performance by avoiding interference. The relay can use the untapped resources of the CUE to enhance the spectrum’s efficiency. In Ref. [ 106 ], a fractional frequency reuse and a blank sub-frame concept were used to avoid interference between the CUEs and DUEs. The numerical results show that the interference level of the DUEs decreased as compared to the conventional methods. This method increases the system throughput and efficiency. In Ref. [ 107 ], a dynamic distance-based algorithm was proposed to reduce the interference. Using this algorithm, outage probability, SINR, and cell density are estimated for D2D-enabled hetnets. Different interference management algorithms have been used in recent research to resolve the coverage and capacity issues in 5G networks, as summarised in Table 9 .

Summary of interference management algorithms in D2D communications.

The future challenges in the interference management that need to be addressed are

  • D2D in mmWave Communication: Multi-cell D2D communication is possible with the small cell concept and mmWave in 5G networks. The mmWave improves the data rates, network capacity, and latency but different interferences occur due to the penetration losses of mmWaves. Therefore, the interference mitigation algorithms for 5G mmWave need to be addressed to provide multicell D2D communication;
  • Cell Densification and Offloading: The small cell and macro cell concepts of 5G are integrated with D2D communication to provide multi-cell D2D transmissions. Multi-cell D2D is used to improve the spectral efficiency and overall system performance of D2D communication. Therefore, the resource allocation and interference control algorithms for multicell D2D communication are challenging future issues.

3.3.4. Security and Privacy

In D2D communication, device discovery was done using a centralised, distributed, and semi-distributed scheme. The centralised and distributed schemes are paired in a semi-distributed scheme to identify neighbouring users, which causes some security issues in both cellular networks and ad-hoc wireless networks. These issues will affect the availability, confidentiality, and authenticity of the devices on the network. Therefore, to overcome these issues, some privacy- and security-based algorithms are proposed [ 108 , 109 , 110 , 111 ].

In Ref. [ 108 ], a user sub-channel matching algorithm has been proposed to address the spoofing and interference between the CUEs and DUEs. The proposed algorithm will reduce the interference and improve the overall sum rate. In Ref. [ 109 ], an optimization algorithm has been proposed to reduce the interference due to eavesdroppers. This proposed method will reduce interference and enhance the physical layer security of CUs and throughput, but it will protect only one CU from multiple eavesdroppers. In Ref. [ 110 ], two privacy-preserving authentication protocols are proposed to provide a secured link between the devices in D2D communication. These methods will improve the efficiency and security by reducing the interference between the DUs. In Ref. [ 111 ], a secure key generation algorithm has been proposed to secure the DUs from malicious users, which leads to improved information confidentiality between the DUs. Only a few authors proposed algorithms to solve the security and privacy issues. Different security and privacy algorithms have been used in recent research to resolve the coverage and capacity issues in 5G networks, as summarised in Table 10 .

Summary of security and privacy algorithms in D2D communications.

The future challenges relating to privacy and security issues are as follows:

  • Lack of Standardisation: To provide a secured connection between the DUs, there are no standard rules for data transmission, the amount of data to be transferred, feedback signalling, security policies, and so on. Therefore, the standardisation of these parameters needs to be addressed;
  • Security Threats: A lot of security threats are happening in D2D communications. They are denial of service, man in the middle attack, impersonation attack, session hijacking, interference attack, data leakage, malware attack, free riding attack, data modification, privacy violation, forge attack, active attack on controlled data, and so on. All these need to be addressed in the future;
  • Privacy and Security: D2D communication allows DUs to communicate directly with one another. However, identifying the trusted users and malicious users is a challenging issue. Therefore, efficient algorithms need to be proposed to identify the trusted users and malicious users before providing a secured connection;
  • Data Confidentiality and Integrity: Data confidentiality protects the data being revealed from unauthorised users as well as preserves the user content and secures the privacy. Integrity ensures that data is not altered during the transmission. This is also one of the future challenging issues in providing an accurate data transmission;
  • Session Key Agreement: This session key agreement is used to ensure the security of data transfer over air interface. It is mandatory to keep the session key secret to avoid any type of security issues;
  • Non Repudiation and Traceability: Non repudiation prevents D2D users from being denied transmission and the reception of messages. Traceability is mandatory to detect the source of false messages in a D2D communication system.

3.4. Non Orthogonal Multiple Access

To enhance the coverage and capacity, the cellular networks use many access techniques, such as frequency division multiple access (FDMA), time division multiple access (TDMA), code division multiple access (CDMA), and orthogonal frequency division multiple access (OFDMA). The concept of orthogonality is used in these accessing techniques to reduce the interference between users, but it also reduces the number of users multiplexed to access the spectrum.

Therefore, the concept of NOMA has been proposed in 3GPP long-term evaluation release 15 as the latest multiple access technology, and it is also implemented in 5G [ 112 ]. Initially, NOMA was used with a single cell to improve spectral efficiency. The spectral efficiency is increased by increasing the number of multiplexed users accessing the single channel with different channel gains [ 113 ]. NOMA is basically divided into two types: power domain NOMA (PDNOMA) and code domain NOMA (CDNOMA). In PDNOMA, multiplexing is based on the transmitted power, and in CDNOMA, multiplexing is based on code [ 114 , 115 , 116 ]. Along with CDNOMA and PDNOMA, there are some other NOMA techniques such as signature NOMA (S-NOMA) and compressing-based NOMA (CS-NOMA) [ 117 ]. NOMA works with MIMO, cognitive radio (CR), HetNets, millimetre waves, mobile edge computing, visible light communication, vehicles for any communication, etc. This will provide high spectral efficiency, high data rates, and massive connectivity while decreasing inter-cell and intra-cell interference [ 118 ]. In NOMA, fairness in power allocation is obtained by assigning less power to strong channel gain users and more power to weak users. This power efficiency will increase the overall throughput and efficiency. NOMA can be implemented with a single cell or with multiple cells. The authors in Ref. [ 119 ] implemented the NOMA on the multi-cell and identified some issues that occurred due to the multi-cell NOMA.

By utilising the idea of high- and low-gain users, NOMA increases the throughput and spectrum efficiency by eliminating interference. It is called successive interference cancellation (SIC). A SIC receiver is one of the most important blocks in NOMA transmission, which is shown in Figure 12 [ 114 ]. The quality detection of the strongest user who has a strong signal is identified by subtracting the other user’s signal. Similarly, the weak user detects its own signal by subtracting the others’ signal, assuming noise or interference, which will improve the system’s performance by minimising the propagation effects. However, while implementing the SIC in NOMA, security issues will arise. These issues are classified as resource allocation issues, signalling issues, and security issues, which are discussed in the following subsections.

An external file that holds a picture, illustration, etc.
Object name is sensors-23-02356-g012.jpg

NOMA with a SIC receiver.

3.4.1. Resource Allocation Issues

In NOMA, one resource block (RB) is shared by multiple users, and the SIC receiver is used to decode the user information at the receiver end based on the user’s channel gains. Interference between users can be avoided by choosing proper power allocation algorithms. Otherwise, resource allocation issues such as user pairing and power allocation (PA) will arise. In user pairing, the users with less power are allocated with more channel gain, and the users with more power are allocated with less channel gain to make the channel fair for all the users at the transmitter end. At the receiver end, the SIC receiver is used to decode the same. In this method, if the number of users increases, then the complexity of decoding also increases at the receiver end. This is one of the major problems with user pairing. Along with this, there is another problem, i.e., if the users with high and low gain are transformed to mid gain, then mid gain users may be paired or may not, which leads to reduced channel capacity.

To overcome the user pairing issues, optimization techniques, game theory, and machine learning algorithms are proposed in the literature. The authors proposed an optimization method while pairing two users [ 120 , 121 , 122 , 123 ]. To optimise the user pairing, the channel gain should not be less than the predefined threshold. A strong channel pairing algorithm (CSS-PA) was proposed to increase the system capacity and fairness in user pairing [ 120 ]. In Ref. [ 121 ], the authors used a new pairing concept, i.e., the highest channel gain users are paired with the next highest gain users, and so on. Game theory for multiple user pairing and machine learning algorithms for user pairing are proposed to reduce the channel capacity [ 122 , 123 ]. Different user pairing and resource allocation algorithms have been proposed in recent research to resolve the coverage and capacity issues in 5G networks, as summarised in Table 11 .

Summary of user pairing and resource allocation algorithms in NOMA systems.

3.4.2. Power Allocation Issues

In the power allocation scheme, users who have more channel gain are given less power, while users who have less channel gain are given more power. In NOMA, the users with various PA are multiplexed in one RB, which will increase the system’s performance, but inefficient PA methods cause interference and also reduce the system’s performance. Therefore, proper selection of power allocation methods plays an important role and depends on many parameters such as CSI, QoS, total system power, and channel conditions.

Therefore, many optimization techniques are proposed for PA fairness [ 124 , 125 , 126 , 127 , 128 , 129 , 130 ]. The PA is optimised by maximising the maximum and average sum rates using physical layer QoS [ 124 , 125 ]. The optimal PA was proposed by minimising the power consumption [ 126 , 127 , 128 ]. Different PA techniques have been proposed for maximising the capacity rate and total power [ 129 , 130 ]. PA based on expenditure or cost is explained using graph theory [ 131 , 132 , 133 , 134 , 135 , 136 , 137 ]. In Ref. [ 131 ], the authors proposed a simulated annealing to optimize the PA and to maximise the throughput. In Ref. [ 132 ], two user concepts were considered. In this method, power is allocated to two users or only one user, whichever has a higher power gain. In Ref. [ 133 ], the authors proposed a price-based PA optimization algorithm for two users based on their QoS. The data rate is maximised using an optimization algorithm [ 134 ]. In Ref. [ 135 ], the authors proposed an auction-based game design by bidding on the transmitting power. The spectrum scarcity issues in both licensed and unlicensed bands for NOMA were discussed in Refs. [ 136 , 137 ].

The joint PA and user pairing problems are solved by using an optimization algorithm [ 138 , 139 , 140 , 141 , 142 , 143 , 144 , 145 , 146 ]. To identify the best multiplexed users in NOMA, a greedy algorithm, and to optimise PA, an optimization algorithm was proposed in Ref. [ 138 ]. A joint PA and user pairing optimization has been used to maximise the transmitted power and reduce the computational complexity of the NOMA system [ 139 ]. In Ref. [ 140 ], the authors proposed a proportional fair scheduling algorithm to reduce the complexity of a single carrier NOMA system. A dynamic PA scheme was used to optimise the PA in both UL and DL and also to maximise the system throughput [ 141 ]. The proposed fractional error factor method will increase the energy efficiency and also maximise the performance gain of both the UL and DL of UE [ 142 ]. A swarm optimization algorithm has been proposed to find the outage rate and average data rate of all the user pairs [ 143 ].

The spectral efficiency and error probabilities are improved by using a sort-based user pairing method [ 144 ]. This method was used to maximise the system capacity and reduce the interference. The user pairing and PA were dynamically varied to identify the system capacity of an individual and paired users [ 145 ]. The system capacity for pairing users was better than for individual users. In Ref. [ 146 ], the bit error rate is considered along with the individual and paired user’s capacities. As summarised in Table 12 , various PA algorithms and joint user pairing and PA algorithms have been proposed in recent research to address the coverage and capacity issues in 5G networks.

Summary of power allocation algorithms and joint user selection and PA algorithms in NOMA systems.

3.4.3. Signalling Issues

With the increase in wireless users in 5G, effective spectrum utilisation plays an important role. NOMA has been proposed to improve spectrum efficiency by allocating multiple users to a single RB. However, the allocation of multiple users to one RB will cause signalling issues such as CSI imperfections, latency, SIC receiver complexity, and interference management. In the literature, many authors use optimization techniques as well as analytical techniques to address all of these issues.

Therefore, optimization algorithms have been proposed to avoid SIC imperfections [ 150 , 151 , 152 , 153 , 154 ]. In Ref. [ 150 ], the authors proposed an efficient PA algorithm for multi-carrier NOMA (MC-NOMA). The optimal SIC decoding value has been determined by the outage threshold of the carrier-to-noise ratio. Two algorithms, i.e., complementary geometric programming (CGP) and arithmetic geometric mean approximation (AGMA), have been proposed to optimise the total power [ 151 ]. A two-phase algorithm has been proposed to solve the non-convex resource allocation problems in NOMA [ 152 ]. Using a matching theory algorithm, the user scheduling is optimised first, and then the branch and bound technique is used to optimise PA. In Ref. [ 153 ], an efficient successive convex approximation (SCA) algorithm is proposed to optimise the sum rate. The sum rate and system utility are maximised by the SNR and the number of iterations in the MIMO-NOMA system. The iterative PA algorithm provides a maximum weighted sum rate in the NOMA system [ 154 ].

The analytical techniques used to overcome signalling issues such as outage probability and CSI of NOMA in UL and DL are addressed by the authors in Refs. [ 155 , 156 , 157 ]. In Ref. [ 155 ], the authors proposed a dynamic SIC receiver concept based on the users’ received power, and the outage probability is estimated theoretically. SIC analytically estimates the statistical CSI to improve the outage probability [ 156 ]. In Ref. [ 157 ], a new decoding algorithm is used to decode the signal information at the SIC receiver, and its outage performance is verified analytically.

Summary of optimization and analytical algorithms used to resolve the signalling issues in NOMA systems.

3.4.4. Security Issues

In NOMA, multiple user messages are superimposed on a single RB. The SIC receiver is used to decode the overlaid signals on the receiver. In the SIC receiver, the strong users are allocated with lower powers and the weak users are allocated with stronger powers for channel fairness. At the receiver, strong users have to subtract the low-power signals to get their own signals. However, it causes some security issues, which have to be considered in NOMA. These security issues can be overcome by using encryption and decryption schemes at the sender and receiver, respectively. This process increases the latency and processing requirements. However, the basic idea of NOMA in 5G is to decrease the latency and improve the data rates, spectral efficiency, and bandwidth.

The NOMA implementation causes some security issues, such as the implementation of SIC, transmitted power, and outage probability. These security issues mainly occur at the physical layer. To overcome these security issues, optimal and analytical solutions are proposed in the literature.

  • Optimization Methods: The authors in Refs [ 163 , 164 , 165 , 166 , 167 ] proposed optimization techniques to overcome the security issues in NOMA technique. An optimization algorithm is used to maximise the security sum rate (SSR) in a secured physical layer of a NOMA system. The authors in Ref. [ 163 ] proposed an optimal PA and optimal power splitting algorithms to maximise the security sum rate. The proposed algorithms significantly improve the system performance by assuming a uniform PA and a fixed power splitting scheme. In Ref. [ 164 ], the authors proposed two mobility models, such as a random way point (RWP) and random direction (RD), to observe the security performance of the physical layer. The average security sum rate of NOMA users was estimated and analysed. From the numerical results, it is observed that the RWP achieves a high safety rate than all other mobility models. In Ref. [ 165 ], the security sum rate is maximised by using a two-stage optimization technique. In the first stage, the SINR of a particular user is fixed to its maximum value, and then it is used to maximise the security sum rate by using a one-dimensional search algorithm. The optimal beamforming technique is used to improve the safety rate by adjusting SINR between signal strength and interference. In Ref. [ 166 ], the authors considered the security outage probability (SOP) to maximise the NOMA security performance. Design parameters such as PA, decoding order, and data rate are estimated even though the CSI is not perfectly known at the transmitter. Pairing a strong user with an unstructured weak user improves the physical layer performance [ 167 ]. The optimization algorithm minimises the pairing outage probability. The mathematical expressions for outage probability and secured outage probability are derived based on the proposed optimization algorithm;

Summary of optimization and analytical algorithms used to resolve the security issues in NOMA systems.

3.4.5. NOMA—Future Challenges and Research Issues

NOMA can be included with the other 5G enabling technologies such as MIMO, CR, HetNets, millimetre wave, and so on. This helps in achieving the 5G key parameters such as improved spectral efficiency, low latency, high data rates, extended coverage capacity, and mass connectivity. However, the inclusion of NOMA with 5G and beyond 5G leads to some issues and challenges such as resource allocation, pairing, decoding, security, and signalling. These issues can be overcome by using some technologies and techniques such as optimization and analytical techniques, game theory, and machine learning algorithms. There are still some challenges and issues with the implementation of NOMA that need to be addressed. The major concerns that need to be addressed in the future are:

  • User Pairing in NOMA: In the NOMA implementation, multiple users are multiplexed into one RB, and the SIC receiver will decode the paired users at the receiver. We have discussed pairings of two or three users in previous sections, but not multiple users. Nowadays, the demand for connected devices such as IoT, V2V, and massive machine types is increasing, which requires them to pair a large number of users to one RB. Therefore, NOMA requires some new pairing techniques to fulfil the requirements of future wireless networks. Along with this, there is another challenge to be addressed, which is the practical implementation of user pairing in NOMA systems;
  • Receiver Complexity in SIC implementation: In NOMA, the users are multiplexed at the transmitter side using pairing techniques and decoded at the receiver using a SIC receiver. As the number of users increases, the allocation of transmission power to pair the users becomes very complex, and at the same time, decoding the strong user to the next strong user and up to a weak user is a very difficult task at the receiver end. This process increases the latency and also introduces interference with the increased number of multiplexed users. Therefore, reducing the latency and interference and providing an efficient and dynamic SIC receiver for the NOMA system is a future challenge;
  • Multi-cell NOMA system: In NOMA systems, most of the researchers considered a single cell, and very few addressed the multi-cell concept because the multi-cell system causes inter-cell interference. The interference will affect the performance of the weak users who are at the cell edge. Therefore, to solve the interference issues along with the pairing and decoding issues, a small cell concept of 5G is included in the multi-cell NOMA system. This is the future challenge in the multi-cell NOMA systems to be addressed;
  • Mobility in NOMA: NOMA is used to enable 5G and beyond 5G technologies. In IoT, V2V, and M2M communications, mobility is the key parameter. Most of the research in NOMA systems is based on static systems. The PA, pairing, and SIC receiver algorithms are proposed based on the static behaviour of the users. However, in future communications, dynamic PA, pairing, and SIC algorithms will be required. As the user moves from one location to another, the channel gains vary with respect to the user’s location. Therefore, proposing dynamic algorithms for NOMA systems is one of the challenges of the future;
  • CSI in NOMA: Most of the research is carried out assuming perfect CSI in NOMA systems, but fewer users consider imperfect CSI. The CSI plays an important role in user pairing and decoding for users with SIC receivers in the NOMA system. To increase the system performance and spectrum efficiency of a dynamic system, the estimation of CSI is very important. For a dynamic channel, the estimation of CSI using machine learning and game theory algorithms is one of the important future challenges in NOMA systems.

3.5. Multiple Input and Multiple Output

The key parameters of 5G can be enhanced with the use of MIMO technology. Exploiting the bandwidth and spectral efficiency features of wireless networks will help increase the throughput. The present research is concentrated on methods that increase spectral efficiency because increasing the bandwidth has the disadvantage of decreasing the SNR for the same transmitted power. Utilizing numerous antennas at the transceivers is a well-known method of enhancing spectral efficiency [ 171 ]. To provide high-speed transmission with a minimal quality of service, MIMO communication systems have been proposed based on the usage of an antenna array at the transmitter and receiver [ 172 ].

Foschini [ 173 ] and Telatar [ 174 ] observed a sharp, linear rise in the channel capacity with the increasing number of antennas in the MIMO systems. MIMO systems use two unique dimensions, i.e., diversity and capacity of the radio link, to enhance the system’s performance. Diversity enhances the communication channel’s dependability by utilising multiple antenna links, and capacity can be increased by employing multiple antennas and multiplexing techniques, which maximise the amount of information transmitted through the channel. However, the increase in data traffic these days increases the need for spectrum for 5G wireless networks and beyond. Therefore, to enhance the data rates and the channel capacity, a mm-wave spectrum with a huge number of small radiating elements at the BS, called massive MIMO (M-MIMO) technology, has been proposed [ 175 ].

Massive MIMO is an advancement in MIMO technology that increases the spectral efficiency, energy efficiency, data rates and throughput by using hundreds or even thousands of antennas connected to a BS, which is shown in Figure 13 [ 29 ]. M-MIMO is a significant technique used to enhance the throughput, spectrum efficiency, data rates, capacity and overall system performance [ 176 , 177 , 178 , 179 , 180 , 181 ]. In Ref. [ 176 ], the authors introduced a M-MIMO technology for 5G and beyond. The system performance, throughput and data rates are enhanced through the proposed technology and they achieved a maximum data rate of 100 Gbps. M-MIMO, in conjunction with the planar antenna array, is used to enhance the system capacity. However, the planar antenna array reduces the coverage radius to only tens of kilometres. So, to enhance the coverage radius up to 100 km, a cylindrical M-MIMO system has been proposed [ 177 ]. The proposed system enhanced the coverage radius along with the system capacity by 2.1 times compared to the conventional system with a planar array.

An external file that holds a picture, illustration, etc.
Object name is sensors-23-02356-g013.jpg

Massive MIMO with UL and DL.

The beam multiple access technique was used to enhance the system capacity of a M-MIMO system [ 178 ]. This will reduce the bit error rate and enhance the system capacity by 10 times and energy efficiency by 100 times compared to conventional methods. In Ref. [ 179 ], the authors proposed a cell-free MIMO UL receiver with zero forcing, MMSE, and maximum ratio combining detectors to enhance the spectral efficiency. When compared to conventional methods, the zero forcing and MMSE methods improve spectral efficiency. In Ref. [ 180 ], the authors considered a triangular lattice structure of antennas within the frequency bands of 24.25 GHz and 29.5 GHz for M-MIMO systems. This structure achieves higher spectral efficiency by maintaining a minimum distance between the antennas. In Ref. [ 181 ], the authors estimated the optimal antennas by using the trade-off between energy efficiency and spectral efficiency in a M-MIMO system. This will reduce the cost of the transmitted power and the total energy consumption. In Refs. [ 182 , 183 ], the authors discussed MIMO, its opportunities, recent trends, and advantages in 5G networks and beyond 5G.

Different antenna arrays, multiplexing techniques for M-MIMO have been proposed in recent research to enhance the data rates and capacity in 5G networks, as has been summarised in Table 15 .

Summary of M-MIMO techniques used to enhance the data rates and capacity of 5G networks.

MIMO—Future Challenges and Research Issues

5G key parameters such as improved spectral efficiency, energy efficiency, high data rates, and enhanced capacity are achieved using the MIMO technology. There are still some challenges and issues in the implementation of M-MIMO that need to be addressed. The key issues that need to be explored in the future are:

  • Signal Detection: The UL signal detection becomes more complex in M-MIMO systems due to the large number of radiating elements, which decreases the system throughput. Along with this, the superimposition of user-transmitted signals at the BS causes interference, which also reduces the spectral efficiency and throughput. Therefore, to enhance the spectral efficiency and throughput of a M-MIMO UL, intelligent algorithms are required. Designing less complicated and accurate algorithms for UL signal detection is one of the future research challenges;

FDD Mode Channel Estimation: In this mode, the CSI needs to be estimated for both DL and UL. During the DL, the BS forwards the pilot signals to the user, and the user replies with the estimated CSI to the BS. Similarly, during the UL, the BS estimates the CSI using the orthogonal pilot signals forwarded by the user. The DL channel estimation for a M-MIMO system with a large number of antennas becomes very difficult and is impossible to carry out in real-world applications.

TDD Mode Channel Estimation: The problem during the DL channel estimation in FDD mode is solved by using TDD mode. In this mode, with the advantage of channel reciprocity, the BS estimates the DL channel with the use of UL CSI. During DL, the user will forward the orthogonal pilot signals to the BS, and the BS will estimate the CSI to the user terminal based on these pilot signals;

  • Pilot Contamination: In M-MIMO systems, the BS requires the user terminal’s channel response in order to estimate the channel. When the user terminal delivers orthogonal pilot signals to the BS, the BS estimates the uplink channel. Additionally, the BS calculates the downlink channel to the user terminal using M-MIMO’s channel reciprocity property. The BS can accurately estimate the channel if the pilot signals in the home cell and nearby cells are orthogonal. However, because there are only a limited number of orthogonal pilot signals available in a given bandwidth and period, adjacent cells must reuse the orthogonal pilot signals, which leads to pilot contamination. Hence, the pilot signal contamination is one of the challenges for future research in M-MIMO systems;
  • Energy Efficiency: Energy efficiency is defined as the ratio of spectral efficiency to the total transmitted power. M-MIMO systems offer significant energy efficiency by achieving higher spectral efficiency with low power consumption. The increased number of antennas in the M-MIMO system will increase the spectral efficiency, but it will also increase the total power consumption, which reduces the energy efficiency. Numerous studies have been done to develop energy-efficient M-MIMO systems based on the trade-off between energy efficiency and spectral efficiency and also to reduce the power consumption by designing the power amplifiers. Therefore, achieving higher energy efficiency is one of the challenges of future research.

3.6. 5G Optimization Algorithms

Nowadays, cellular networks are becoming increasingly challenged to provide high data rates, low latency, enhanced coverage, and capacity. The user requirements are to be fulfilled with advanced technologies. These technologies might affect network complexity and also cost. Therefore, optimization algorithms are required to reduce the network complexity and to enhance the key parameters of 5G and beyond 5G. The benefits of optimization algorithms include reduction in interference and latency, enhanced SINR throughout the cell, spectral efficiency, throughput, coverage, and capacity [ 184 ]. In the literature, researches have proposed optimization techniques to enhance the key parameters of 5G [ 185 , 186 , 187 ]. In Ref. [ 185 ], a genetic optimization algorithm is used to identify the location of a mobile station in a cell and the location of the new BSs in the test regions. This method will enhance the coverage capacity and data rates and decrease latency and traffic density. In Ref. [ 186 ], a game theory based optimization algorithm is proposed to enhance energy efficiency and throughput based on link fairness. In Ref. [ 187 ], the authors proposed an innovative scheduling algorithm to reduce the delays and call drop rates in order to enhance the QoS.

The position of an antenna, its tilt angle and height will affect the coverage of a cellular system. Therefore, optimization of antenna parameters will be considered to enhance the coverage of a network [ 188 , 189 , 190 ]. In a cellular system, directional antennas with higher order sectorization are considered to enhance the coverage. The antenna tilt will improve the coverage and also SINR [ 188 ]. In Ref. [ 189 ], a reinforcement learning (RL) algorithm is used to improve the spectrum efficiency and the sum rate of a network, using a simplified path loss model. In Ref. [ 190 ], a self-tuning algorithm is proposed to adjust the tilt of an antenna. Two fuzzy logic controllers are used for automatic adjustment of the antenna tilt, which will improve the SINR at the cell edge and spectrum efficiency. In Ref. [ 191 ], artificial neural network (ANN) and stochastic learning based optimization algorithms are used to optimise the antenna tilt. Network coverage and capacity are enhanced by using the ANN algorithm. In Ref. [ 192 ], two machine learning algorithms are proposed to reduce the interference and to enhance the coverage by optimizing the transmitted power and antenna tilt.

The random distribution of the traffic across a cell and its uncertainty in the radio propagation needs dynamic antenna tilts and optimization algorithms to enhance the coverage and capacity. Different optimization algorithms have been proposed in recent research to enhance the coverage and capacity in 5G networks, as has been summarised in Table 16 .

Summary of optimization algorithms used to enhance the coverage and capacity of 5G networks.

5G Optimization—Future Challenges and Research Issues

5G key parameters such as improved spectral efficiency, low latency, high data rates, and extended coverage capacity are achieved using the optimization algorithms. There are still some challenges and issues in the implementation of AI-based optimization algorithms that need to be addressed. The key issues that are to be explored in the future are:

  • ML and RL Algorithms: New ML and RL based optimization algorithms are required to enhance the 5G network coverage and capacity and also to bridge the gap between intelligent algorithms and 5G technologies;
  • Scheduling Algorithms: Scheduling algorithms need to be proposed for 5G networks to optimize the throughput and to enhance the capacity of cellular networks;
  • Optimization of the Antenna Parameter: Optimization of antenna tilt angle, antenna height, and number of antennas is required to enhance the coverage and capacity and to reduce cell edge interference, deployment cost, and complexity.

5G key parameters such as coverage capacity, latency, throughput, spectral efficiency, data rate, outage probability, interference management, and power consumption can be enhanced by using different algorithms and methods in the literature. Table 17 , lists the various key performance indicators and the articles in which they were used for performance evaluation. Statistical analysis of 5G key parameters is shown in Figure 14 .

An external file that holds a picture, illustration, etc.
Object name is sensors-23-02356-g014.jpg

Statistical analysis of 5G key parameters.

Summary of research articles based on performance indicators.

Note: Only one mathematical expression is included for the 5G key parameters present in Table 17 . However, different authors follow different techniques to enhance these parameters, such as path loss techniques, SINR, optimization algorithms, etc.

4. 5G Enhancement Techniques—Key Technologies, Advantages, Limitations, and Future Challenges

In this section, 5G key parameter enhancement techniques, their advantages, limitations, and future challenges are explored. In Section 3 , all 5G enhancements techniques were discussed. Their advantages, limitations, and future challenges have been summarised in Table 18 .

Summary of 5G coverage enhancement techniques-advantages, limitations, and future challenges.

5G key parameters can be enhanced using small cells, CA, D2D, NOMA, MIMO, and optimization techniques. Each technique’s pros and cons and their future challenges are listed in Table 17 . In small cells, the future challenges can be achieved by developing path loss models using ML, AI, and deep learning techniques. These path loss models will enhance the coverage radii, mobility, handovers, etc. Future challenges in CA can be met by developing dynamic frequency carrier aggregation techniques and heuristic optimization algorithms to maximise battery life. In D2D, the future challenges are achieved by proposing ML and AI-based algorithms for device discovery, synchronisation, mode selection, etc. In NOMA, significant optimization techniques are required to enhance the power efficiency, user pairing, security, and receiver complexity. In MIMO, ANN and CNN algorithms need to be proposed to detect the signals and estimate the channel information. The 5G optimization algorithms are required to enhance the coverage capacity, data rates, and latency.

5. 6G and Its Challenges

Beyond 5G and 6G network applications, users need more network capacity, throughput, data rates, spectral efficiency, low latency, and an extended coverage area compared to 5G networks. It will transform the nation into automation, i.e., smart production, a smart society, and smart lives, by 2030 [ 193 ].

In the literature, several studies have focused on 6G networks [ 194 , 195 , 196 , 197 , 198 , 199 , 200 , 201 ]. In Ref. [ 194 ], a thorough analysis of 6G is provided based on a review of 5G advances, covering technology trends and issues with the goal of addressing the problems with coverage, capacity, user data rates, and mobility of mobile communication systems. In Ref. [ 195 ], authors provided a detailed overview of the 6G network and highlighted the use cases and applications of the 6G network in various dimensions. The key parameters and future research challenges of 6G are discussed. In Ref. [ 196 ], the authors focused on the use cases and technologies of 6G networks. Sixth-generation enabling technologies and their applicable use cases are compared. In Ref. [ 197 ], the authors provided the major issues and challenges relating to the security, privacy, and trust problems in 6G networks. In Ref. [ 198 ], the authors discussed the security and privacy challenges that may emerge with the 6G requirements, novel network architecture, applications and enabling technologies including physical layer security, distributed AI/ML, Visible Light Communication, THz bands, and quantum communication. In Ref. [ 199 ], the authors discussed 6G security and privacy issues in the four key aspects such as distributed AI, real time edge computing, 3D intercoms, and intelligent radio.

It is necessary for 6G capabilities to be realised at scale for extremely immersive applications such as 3D communication, virtual reality, and digital twins [ 200 ]. The advantages of the upcoming 6G technology for processing real-time applications on edge networks have been discussed [ 201 ]. The challenging issues and future directions of 6G based edge computing have also been discussed. The future challenges of 6G networks that need to be addressed are quantum machine learning for 6G communications, ultra-reliable communications for edge computing, energy harvesting for extended battery life, and so on.

6. Conclusions and Future Scope

This survey explored the evaluation of mobile networks from 1G to 5G, its requirements, and the key parameters of 5G, including coverage definitions and coverage requirements. It addressed the coverage enhancement techniques in 5G such as small cells, CA, D2D, NOMA, MIMO, and optimization in 5G. Each technique’s advantages, limitations, and future challenges are understandably illustrated. Afterwards, we explored the new requirements of coverage enhancement techniques such as interference management, spectrum management, device discovery, mode selection, CSI requirements, security and privacy, network deployments, and testing issues. Further, we have provided the pros and cons of existing techniques and their future challenges for enhanced coverage in 5G networks. Our paper shows the accurate path for coverage enhancement solutions and its future requirements.

One of the main goals of this paper was to provide readers with the most recent and relevant information on coverage enhancement techniques for 5G networks and beyond. To this end, we focused on the most recent studies in the field and aimed to demonstrate the current research focus within the community. We believe that the information and insights presented in this paper will be valuable to researchers working in the field of 5G wireless communications and beyond.

The use of AI in cellular networks towards SDN, effective deployment of edge computing, implementation of RAN, network slicing management, network visualization, THz communication, visible light communication, quantum communication, virtual reality, and security and privacy issues are the future research challenges of 5G networks and beyond 5G.

Funding Statement

This work is supported and funded by Telekom Malaysia Research & Development Grant, RDTC: 211034, MMUE/220006, TM, Malaysia.

Conflicts of Interest

The authors declared no conflict of interest.

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

IMAGES

  1. 5G and the Future of Connectivity ?

    literature review of 5g technology

  2. 5G Technologies, Key For More Effective Mission Critical Communications

    literature review of 5g technology

  3. Internet of Things Using 5G Infrastructure. A Literature Review

    literature review of 5g technology

  4. 5G Technology: What Is 5G & Why Does Everyone Care So Much About It

    literature review of 5g technology

  5. What Is 5G Technology And How Will It Change Our Lives?

    literature review of 5g technology

  6. Internet of Things Using 5G Infrastructure. A Literature Review

    literature review of 5g technology

VIDEO

  1. 6G technology|| how 6G technology will work|| Future of 6G technology|| Research and Technology

  2. Democratizing Innovatrion in the 5G era

  3. The Impact of 5G Technology on Business Operations

  4. Research Methods

  5. How 5G Technology is Transforming Healthcare

  6. Approaches , Analysis And Sources Of Literature Review ( RESEARCH METHODOLOGY AND IPR)

COMMENTS

  1. Study and Investigation on 5G Technology: A Systematic Review

    1.1. Evolution from 1G to 5G. First generation (1G): 1G cell phone was launched between the 1970s and 80s, based on analog technology, which works just like a landline phone. It suffers in various ways, such as poor battery life, voice quality, and dropped calls. In 1G, the maximum achievable speed was 2.4 Kbps.

  2. (PDF) Exploring the Potential and Limitations of 5G Technology: A

    The literature review highlights the potential of 5G to offer faster speeds, lower latency, as well as greater capacity, which are critical for powering the[3] Internet of Things (IoT),[1 ...

  3. (PDF) Literature Review of IoT & 5G

    Literature Review of IoT & 5G . 1 st Ravi Kumar . Faculty of Science . MIT World Peace . University Pune, India . ... Meenal G. Kachhavay, Ajay P. Thakare, 5G Technology -Evolution and Revolution ...

  4. 5G mobile networks and health—a state-of-the-science review of the

    The state-of-the-science review included a comprehensive search of all available literature and examined the extent, range and nature of evidence into the bioeffects of RF fields above 6 GHz, at ...

  5. 5G Literature Review

    5G Literature Review. Peter Curwen (Independent Scholar, UK) Jason Whalley (Newcastle Business School, Northumbria University, UK) Understanding 5G Mobile Networks. ISBN: 978-1-80071-037-5, eISBN: 978-1-80071-036-8. Publication date: 8 March 2021. Citation. Curwen, P. and ...

  6. Study and Investigation on 5G Technology: A Systematic Review

    Abstract. In wireless communication, Fifth Generation (5G) Technology is a recent generation of mobile networks. In this paper, evaluations in the field of mobile communication technology are presented. In each evolution, multiple challenges were faced that were captured with the help of next-generation mobile networks.

  7. A Study on 5G Technology and Its Applications in Telecommunications

    The 5G network is a promising technology that revolutionizes and connects the global world through seamless connectivity. This paper presents a survey on 5G networks on how, in particular, it to address the drawbacks of foregoing cellular standards and be a potential key facilitator for the future as well as the extant technologies such as IoT ...

  8. 5G Coverage Evaluation: A Systematic Literature Review

    5G technology is an alternative communication ser-vice to provide better data communication services than LTE technology. Telco operators in various parts of the world are preparing to improve the quality of communication; even some developed countries have already launched the 5G technology. As a preparation effort for launching 5G technology, network coverage must be a well-calculated factor ...

  9. A Review of 5G Technology: Architecture and Challenges

    5G Networks are considered as a new evolution since it aims to increase the wireless capacity 1000 times the previous generations. By 2025, it is expected that 5G will be connecting around 3 billion people and 41.6 billion devices enabling the Internet of Things (IoT) and the Internet of Everything (IoE) while increasing energy efficiency 90% more than 4G and reducing 20% of carbon emissions ...

  10. Resource Allocation Schemes for 5G Network: A Systematic Review

    Through a tremendous growth in the need of the consumers, 4G would be upgraded to 5G through an innovative technology called Beam Division Multiple Access (BDMA), Filter Bank Multicarrier (FBMC), ... There was a need for a systematic literature review regarding resource allocation methods in 5G networks. Our study addresses this unmet need by ...

  11. 5G Technology in Healthcare and Wearable Devices: A Review

    1. Introduction. The term "5G" refers to wireless communication technology's fifth generation, which is expected to have a major impact on many aspects of modern civilization, including healthcare and wearable devices [1,2]. 5G makes use of higher bandwidth technologies such as sub-6 GHz and mmWave. 5G wireless signals are transmitted by a large number of small cell stations located in ...

  12. Study and Investigation on 5G Technology: A Systematic Review

    In wireless communication, Fifth Generation (5G) Technology is a recent generation of mobile networks. In this paper, evaluations in the field of mobile communication technology are presented. In each evolution, multiple challenges were faced that were captured with the help of next-generation mobile networks. Among all the previously existing mobile networks, 5G provides a high-speed internet ...

  13. 5G in manufacturing: a literature review and future research

    2021. TLDR. The evolution and development of various generations of mobile wireless technology underscores the importance of 5G revolutionary networks, its key enabling technologies, examines its trends and challenges, explores its applications in different manufacturing industries, and highlights its role in shaping the age of unlimited ...

  14. A Systematic Literature Review on 5G Security

    The threat environment for 5G networks, security weaknesses in the new technology paradigms that 5G will embrace, and provided solutions presented in the key studies in the field of 5G cyber security are all described in this systematic literature review for prospective researchers. It is expected that the creation of next-generation wireless networks would result in the availability of high ...

  15. PDF Literature Review On 5G

    Literature Review On 5G 1st Dwarka Nath Pandey rd2nd Rahul Kumar Chawda 3 Srikant Singh M.C.A 6th sem Assistant Professor Assistant Professor Dept. Of Computer Science HOD, Faculty of IT Faculty of Computer Science Engineering ... to swing towards 5G depends on present floats; it is regularly accepted that 5G cell organizations

  16. A review of 5G applications and key technoligies

    With the rapid development of the Internet of Things technology in today's society, people's demand for communication is getting higher and higher. People need a convenient, smooth, and more advanced communication method. The previous communication network has failed to meet all human needs. To solve these problems, 5G came into being. In this article, the concept of 5G, the key technologies ...

  17. Comment on "5G mobile networks and health-a state-of-the-science review

    The Karipidis review was performed against a backdrop of rising public concerns associated with the health and safety of 5th generation (5G) wireless technology .

  18. The population health effects from 5G: Controlling the narrative

    The development and implementation of the fifth-generation wireless technology (5G) are currently ongoing and have largely been met with enthusiasm from the telecommunication industry, applications industries, national governments, and the public. ... (ARPANSA) published two studies in March 2021: a comprehensive review of the literature for ...

  19. Fifth Generation Antennas: A Comprehensive Review of Design and

    The intensive research in the fifth generation (5G) technology is a clear indication of technological revolution to meet the ever-increasing demand and needs for high speed communication as well as Internet of Thing (IoT) based applications. The timely upgradation in 5G technology standards is released by third generation partnership project (3GPP) which enables the researchers to refine the ...

  20. 5G Use in Healthcare: The Future is Present

    Therefore, this report is limited to reviewing the literature of healthcare application of the 5G which already exists and, after presenting the communication basic principles, to discuss future applications in the context of the other critical supporting infrastructures and biologic principles. ... A Review of 5G Technology: Architecture ...

  21. 5G use cases that are transforming the world

    The 5G NR (New Radio) standard for cellular networks defines a new radio access technology (RAT) specification for all 5G mobile networks. The 5G rollout began in 2018 with a global initiative known as the 3rd Generation Partnership Project (3FPP) that defined a new set of standards to steer the design of devices and applications for use on 5G ...

  22. Leveraging 5G network for digital innovation in small and medium

    The goal of this paper was to carry out a literature review on the potential ways small businesses can leverage on 5G network for digital innovation. The paper proposed that small and medium businesses can leverage the 5G Mobile Technology through enhanced interpersonal communication, expanded remote work opportunities, innovative digital tools ...

  23. A Review on the Analysis of 5G Technology and its Impact on Humans

    This paper is made to clarify the detailed information of 5G radiation. An overview on the information on the consequences of 5G radiation on the human body and its architecture in 5G with related to its security. There are numerous organizations set up to highlight the negative effects of 5G in a human's day-to-day life. This acknowledges the public's understanding of 5G radiation and ...

  24. A Survey on 5G Coverage Improvement Techniques: Issues and Future

    In the literature, several studies have focused on 6G networks [194,195,196,197,198,199,200,201]. In Ref. , a thorough analysis of 6G is provided based on a review of 5G advances, covering technology trends and issues with the goal of addressing the problems with coverage, capacity, user data rates, and mobility of mobile communication systems.