Some open research issues in the domains of Network Resource Allocation, Edge Computing, offloading content in Edge Computing, Content Caching, Edge Caching, and improving latency in networks to meet 5G requirements are as below, you can find some research papers using this material.
1. **Network Resource Allocation**:
- Dynamic and efficient allocation of network resources to meet varying application requirements.
- Designing resource allocation algorithms that consider both quality of service (QoS) and energy efficiency.
- Developing mechanisms for resource allocation in heterogeneous networks with diverse technologies and devices.
2. **Edge Computing**:
- Enhancing the scalability and reliability of edge computing systems.
- Developing efficient resource management techniques for edge computing environments.
- Addressing security and privacy concerns in edge computing, including data protection and secure communication protocols.
3. **Offloading Content in Edge Computing**:
- Optimizing content offloading strategies to minimize latency and improve user experience.
- Designing intelligent offloading algorithms that consider factors such as network conditions, content popularity, and user preferences.
- Investigating the trade-offs between offloading content to the edge and centralized cloud resources.
4. **Content Caching**:
- Developing efficient content caching strategies for reducing network congestion and improving content delivery.
- Considering dynamic content popularity and user behavior in cache management algorithms.
- Exploring the impact of cache size, replacement policies, and cache consistency mechanisms on overall system performance.
5. **Edge Caching**:
- Optimizing the placement and eviction of content in edge caches to improve content availability and reduce latency.
- Addressing challenges related to cache coordination and consistency in distributed edge caching environments.
- Investigating the impact of mobility and dynamic network conditions on edge caching strategies.
6. **Improving Latency in Networks to Meet 5G Requirements**:
- Developing techniques for reducing end-to-end latency in 5G networks, including optimizing network protocols and architectures.
- Investigating the potential of edge computing and network slicing to reduce latency and improve response times.
- Addressing latency challenges in areas such as real-time applications, Internet of Things (IoT), and mission-critical services.
Please take a look on my papers (Hope these papers may help you deciding on a specific topic):
■ A. Abusukhon Intelligent Shoes for Detecting Blind Falls Using the Internet of Things. KSII Transactions on Internet and Information Systems. Vol. 17, Issue 9. 2023
■ A. Abusukhon, A. Al-Fuqaha, B. Hawashin, A Novel Technique for Detecting Underground Water Pipeline Leakage Using the Internet of Things. Journal of Universal Computer Science (JUCS). Vol. 29, No. 8.
■ A. Abusukhon, IOT Bracelets for Guiding Blind People in an Indoor Environment, in Journal of Communications Software and Systems, vol. 19, no. 2, pp. 114-125, April 2023, doi: 10.24138/jcomss-2022-0160.
■ A. Abusukhon (2021) Towards Achieving a Balance between the User Satisfaction and the Power Conservation in the Internet of Things, IEEE Internet of Things Journal, doi: 10.1109/JIOT.2021.3051764. impact factor 9.936. Published by IEEE. https://ieeexplore.ieee.org/document/9326414. [Science Citation Index].
■ Ahmad Abusukhon, Bilal Hawashin and Mohammad Lafi (2021) An Efficient Algorithm for Reducing the Power Consumption in Offices Using the Internet of Things, International Journal of Advances in Soft Computing and its Applications (IJASCA). http://ijasca.zuj.edu.jo/Volumes.aspx
■ A. Abusukhon, Z. Mohammad, A. Al-Thaher (2021) An authenticated, secure, and mutable multiple-session-keys protocol based on elliptic curve cryptography and text_to-image encryption algorithm. Concurrency and computation practice and experience. [Science Citation Index].
■ B. Hawashin, A. Abusukhon An Efficient Course Recommender Using Deep Enriched Hidden Student Aptitudes. ICIC Express Letters, Part B: Applications, 2022.
■ A. Abusukhon, N. Anwar, M. Mohammad, Z., Alghanam, B. (2019) A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm. Journal of Discrete Mathematical Sciences and Cryptography. 22(1) pp. 65- 81. (SCOPUS). https://www.tandfonline.com/doi/abs/10.1080/09720529.2019.1569821
■ A. Abusukhon, B.Wawashin, B. (2015) A secure network communication protocol based on text to barcode encryption algorithm. International Journal of Advanced Computer Science and Applications (IJACSA). (ISI indexing). https://thesai.org/Publications/ViewPaper?Volume=6&Issue=12&Code=IJACSA&Seri alNo=9
■ A. Abusukhon, Talib, M., and Almimi, H. (2014) Distributed Text-to-Image Encryption Algorithm. International Journal of Computer Applications (IJCA), 106 (1). [ available online at : https://www.semanticscholar.org/paper/Distributed-Text-to-Image-Encryption-Algorithm-Ahmad-Mohammad/0764b3bd89e820afc6007b048dac159d98ba5326]
■ A. Abusukhon (2013) Block Cipher Encryption for Text-to-Image Algorithm. International Journal of Computer Engineering and Technology (IJCET). 4(3) , 50-59. http://www.zuj.edu.jo/portal/ahmad-abu-alsokhon/wpcontent/uploads/sites/15/BLOCK-CIPHER-ENCRYPTION-FOR-TEXT-TO-IMAGE ALGORITHM.pdf
■ A. Abusukhon, Talib, M. and Nabulsi, M. (2012) Analyzing the Efficiency of Text-to-Image Encryption Algorithm. International Journal of Advanced Computer Science and Applications ( IJACSA )(ISI indexing) , 3(11), 35 – 38. https://thesai.org/Publications/ViewPaper?Volume=3&Issue=11&Code=IJACSA&Seri alNo=6
■ A. Abusukhon, Talib M., Issa, O. (2012) Secure Network Communication Based on Text to Image Encryption. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 1(4). The Society of Digital Information and Wireless Communications (SDIWC) 2012. https://www.semanticscholar.org/paper/SECURE NETWORK-COMMUNICATION-BASED-ON-TEXT-TO-IMAGE-Abusukhon-Talib/1d122f280e0d390263971842cc54f1b044df8161
The weak point of network security seems to be Time Sync. You might explore vulnerabilities introduced using this path. I would think focus on "intermediate" notes such as routers and bridges that are not transparent to the higher levels of communications software, but are accessible to remote commands using SNMP's relatively simplistic security.