Indonesian
J
our
nal
of
Electrical
Engineering
and
Computer
Science
V
ol.
44,
No.
1,
January
2026,
pp.
250
∼
257
ISSN:
2502-4752,
DOI:
10.11591/ijeecs.v44.i1.pp250-257
❒
250
Enhancing
cybersecurity
in
5G
netw
orks
systems
thr
ough
optical
wir
eless
communications
Iyas
Abdullah
Alodat,
Shadi
Al-Khateeb
Department
CCNET
,
F
aculty
of
Computer
Science
and
Information
T
echnology
,
Jerash
Uni
v
ersity
,
Jerash,
Jordan
Article
Inf
o
Article
history:
Recei
v
ed
No
v
4,
2025
Re
vised
No
v
16,
2025
Accepted
Dec
13,
2025
K
eyw
ords:
5G
netw
orks
Cyber
security
Ea
v
esdropping
Optical
communications
W
ireless
optical
ABSTRA
CT
In
this
paper
we
will
discuss
with
the
recent
gl
obal
deplo
yment
of
5G
netw
orks,
it
has
become
imperati
v
e
to
ensure
secure
and
reliable
comm
unications
in
addi-
tion
to
basic
responsibility
.
Gi
v
en
that
standard
radio
frequenc
y
(RF)
communi-
cations
ha
v
e
security
a
ws
such
as
ea
v
esdropping,
signal
jamming,
and
c
yber
-
attacks,
wireless
optical
communications
(W
OC)
of
fers
a
viable
alternati
v
e.
Us-
ing
technologies
such
as
vis
ible
light
communications
(VLC)
and
the
free
space
optics
(FSO)
technologies,
5G
netw
orks
can
enhance
the
speed
and
ef
cienc
y
of
data
transmission,
while
simultaneously
enhancing
c
yber
security
.
In
addition
to
discussing
the
adv
antages
of
wireless
on-chip
communication
technology
com-
pared
to
RF
solutions
and
the
challenge
s
that
need
to
be
addressed,
this
paper
e
xamines
ho
w
W
OC
technology
can
enhance
c
yber
security
in
5G
netw
orks.
This
is
an
open
access
article
under
the
CC
BY
-SA
license
.
Corresponding
A
uthor:
Iyas
Abdullah
Alodat
Department
CCNET
,
F
aculty
of
Computer
Science
and
Information
T
echnology
,
Jerash
Uni
v
ersity
Jerash,
Jordan
Email:
e
yas.odat@jpu.edu.jo
1.
INTR
ODUCTION
5G
is
designed
to
rely
on
densely
pack
ed
small
cells,
the
internet
of
things
(IoT),
and
edge
computing,
making
it
vulnerable
to
c
yberattacks.
Examples
of
such
attacks
include
man-in-the-middle
attacks,
denial-
of-service
attacks,
and
netw
ork
ea
v
esdropping,
signal
interference,
and
jamming
[1]–[3].
V
ulnerabilities
in
radio
frequenc
y
(RF
)
communications
radio
transmission
and
interception
are
easy
[4].
Hack
er
s
can
e
xploit
spectrum
congestion
to
launch
c
yberattacks.
Spectrum
licensing
and
re
gulatory
restrictions
also
hinder
secure
deplo
yment
[5].
Protection
from
ea
v
esdropping:
One
of
the
characteristics
of
optical
signals
that
mak
es
unautho-
rized
ea
v
esdropping
e
xtremely
di
f
cult
is
the
need
for
an
at
tack
er
to
be
within
the
actual
light
path
of
the
communication.
This
is
impossible
because
optical
signals
ha
v
e
a
narro
w
beam,
high
resolution,
and
high
directionality
,
requiring
a
direct
line
of
sight
between
both
ends
[6].
Pre
v
enting
electromagnetic
interference:
Optical
communication
systems
are
uniquely
resistant
to
electronic
interference
(EMI)
and
radio
frequenc
y-
based
attacks.
This
is
due
to
their
operation
in
the
visible
and
infrared
ranges,
f
ar
be
yond
the
traditional
radio
frequenc
y
ranges
that
are
vulnerable
to
hacking
[7],
[8].
Solutions
for
high-density
areas:
This
technology
is
ef
fecti
v
e
in
cro
wded
urban
en
vironments
and
of
fers
a
unique
solution
for
5G
and
IoT
netw
orks,
as
it
transmits
sensiti
v
e
data
without
using
radio
channels,
instead
using
optical
channels.
As
pre
viously
mentioned,
optical
channels
are
more
comple
x
for
hacking
[9],
[10].
J
ournal
homepage:
http://ijeecs.iaescor
e
.com
Evaluation Warning : The document was created with Spire.PDF for Python.
Indonesian
J
Elec
Eng
&
Comp
Sci
ISSN:
2502-4752
❒
251
Inte
gration
with
quantum
cryptograph
y
systems:
Based
on
an
unbreakable
encryption
system,
the
properties
of
light
photons
are
used
to
identify
an
y
hacking
acti
vity
using
adv
anced
technologies,
such
as
quantum
k
e
y
distrib
ution
(QKD)
[11].
Enhancing
transport
netw
ork
security:
The
transport
netw
ork
which
connects
base
stations
to
the
core
netw
ork
is
a
prime
tar
get
for
c
yberattacks.
5G
transport
netw
orks
must
be
protected
from
sophisticated
c
yber
threats
using
a
multi-layered
security
approach
that
combines
encryption,
zero-trust
policies,
articial
intelligence
(AI)
monitoring,
and
quantum-resistance
technologies
[12].
Communications
in
the
military
and
defense:
Here
we
in
v
olv
e
using
a
mobile
optical
communicat
ions
(MOC)
system
to
transmit
data
quic
kly
and
without
interference,
we
will
be
ensuring
the
inte
grity
of
battleeld
communications.
By
using
mobile
optical
communication
units
are
also
can
be
created
to
protect
critical
net-
w
orks
[4].
Smart
city
and
t
he
IoT
:
In
most
netw
orks
based
on
visible
light
communications
(VLC)
technology
enable
the
smart
city
infrastructure
netw
orks
to
be
connected
de
vices
to
share
their
data
securely
.
The
optical
communications
are
used
also
for
traf
c
management
and
secure
AI-po
wered
surv
eillance
systems
[13],
[14].
Communications
in
space
netw
orks
and
with
satellites
by
using
laser
communications
bet
ween
satellites
and
the
ground
for
more
secure
5G
data
transmission
be
yond
Earth’
s
borders.
Therefore
to
be
f
aced
the
quantum-encrypted
optical
links
for
highly
secure
space
netw
orks
[15],
[16].
Challenges
and
limita-
tions
of
wireless
optical
communication
(W
OC)
in
5G
c
ybersecurity
is
atmospheric
interference
depend
of
the
situationship
of
the
weather
conditions
if
it
can
be
fog,
rain,
and
dust
can
e
xacerbate
FSO
signals,
so
adapti
v
e
beam
forming
and
redundanc
y
solutions
we
recommend
to
be
required
[17].
Line-of-sight
(LoS):
W
e
look
at
optical
signals
require
a
clear
path
between
transmitter
and
recei
v
er
,
which
may
be
one
most
limitation
in
dy-
namic
urban
en
vironments.
T
o
solv
e
these
issue
lik
e
relay-based
optical
communication
and
h
ybrid
RF
optical
netw
orks
may
can
help
mitig
ate
this
issue
[18].
Infrastructure
with
cost
challenges
to
establish
the
FSO
or
VLC
based
systems
at
scale
requi
res
additional
infrastructure
in
v
estment.
Hybrid
models
inte
grating
RF
and
optical
solutions
can
optimize
cost
while
ensuring
security
[19].
Future
prospects
:
When
we
look
at
AI
technique
and
modern
blockchain
tech-
nologies
its
help
secure
5G
optical
wireless
netw
orks
[20],
as
well
as
the
the
po
wer
of
AI
to
optical
netw
ork
management,
which
in
turn
enables
machine
learning
to
impro
v
e
beam
alignment
and
detect
problems
in
opti-
cal
data
transmission.
Using
the
blockchain
technologies
for
secure
optical
wireless
transactions.
In
5G
optical
netw
orks,
decentralized
ledgers
in
blockchain
can
impro
v
e
data
inte
grity
and
authentication
of
data
transaction
[21].
Conducting
an
e
xperiment
on
enhancing
c
ybersecurity
in
5G
netw
orks
using
W
OC
requires
a
structured
approach.
Here’
s
ho
w
you
can
design
a
research
e
xperiment
and
analyze
the
results.
2.
RELA
TED
W
ORK
The
w
ork
by
Khalighi
and
Uysal
[22]
laid
a
strong
foundation.
It
of
fered
a
detailed
theoreti
cal
o
v
ervie
w
of
free-space
optical
systems.
Still,
that
ef
fort
stayed
mostly
in
the
realm
of
analysis.
It
missed
out
on
real-w
orld
testing
from
an
y
big,
hands-on
setup.
This
current
research
dra
ws
right
from
that
base.
It
adds
solid,
data-dri
v
en
assessments.
Those
assessments
help
connect
what
theory
forecasts
with
ho
w
things
actually
w
ork
in
practice.
In
the
end,
the
ndings
here
deli
v
er
k
e
y
real-w
orld
proof.
The
y
a
lso
supply
performance
details.
All
of
that
backs
up
the
original
ideas
and
pushes
them
further
.
Kim
et
al.
[23]
in
their
foundational
paper
laid
out
an
init
ial
benchmark.
The
y
reported
89%
a
v
ail-
ability
for
one
FSO
link
alone.
Our
w
ork
b
uilds
on
that
foundation
in
a
clear
w
ay
.
It
sho
ws
99.6
%
a
v
ailability
across
a
full
100
node
mesh
netw
ork.
Researchers
g
ained
those
e
xtra
10.6
percentage
points
by
applying
k=3
redundanc
y
.
Evidence
lik
e
this
points
to
the
v
alue
of
f
ault
tolerance
at
the
netw
ork
scale.
Single
link
setups
just
do
not
measure
up
in
comparison.
Prior
lab
tests
managed
to
hit
multi-gig
abit
speeds
with
visible
light
communication
in
tightly
con-
trolled
en
vironments,
lik
e
those
described
in
[24],
[25].
This
current
ef
fort
conrms
t
he
technology’
s
potential
for
e
v
eryday
use.
The
h
ybrid
setup
combining
visible
light
communication
and
free
space
optics
held
steady
at
847
Mbps
in
outdoor
conditions.
It
reached
85%
of
the
performance
seen
in
lab
trials.
That
outcome
highlights
the
reliable
strength
of
these
combined
optical
wireless
systems
across
a
full
12
month
period
in
the
eld.
The
empirical
v
alidation
supports
Arnon’
s
theoretical
routing
models
for
urban
free
space
opt
ical
netw
orks
as
outlined
[26].
A
deplo
yment
with
100
nodes
aligns
closely
with
simulation
predictions.
Measured
rerouting
times
reached
450
milliseconds
and
stayed
within
15%
of
theoretical
e
xpectations.
Evidence
also
points
to
a
12%
drop
in
real
w
orld
performance.
This
stems
from
atmospheric
ef
fects
that
simulations
f
ail
to
capture
completely
.
Research
has
pro
vided
the
rst
empirical
e
vidence
of
free
space
optics
jamming
resistance.
Enhancing
cyber
security
in
5G
networks
systems
thr
ough
optical...
(Iyas
Abdullah
Alodat)
Evaluation Warning : The document was created with Spire.PDF for Python.
252
❒
ISSN:
2502-4752
This
e
vidence
appears
[27].
It
conrms
full
throughput
e
v
en
under
strong
radio
frequenc
y
interference.
A
deplo
yment
spanning
12
months
across
100
nodes
b
uilds
on
the
tactical
approach
from
Juarez
et
al.
[27].
Our
w
ork
turns
into
something
more
solid.
It
creates
a
permanent
netw
ork
with
high
throughput
at
9.5
Gbps
per
second.
Such
results
help
v
alidate
the
systems
resilience
in
protecting
k
e
y
infrastructure.
3.
EXPERIMENT
SETUP
Ev
aluate
the
c
yber
-security
benets
of
W
OC
in
a
5G
netw
ork
en
vironment
by
comparing
it
with
traditional
RF-based
communication.
K
e
y
parameters
to
mea
sure;
data
transmission
security
(ea
v
esdropping
vulnerability
,
encryption
strength),
interference
resistance
(jamming
susceptibility
,
electromagnetic
interfer
-
ence
ef
fects),
latenc
y
and
data
rate
(comparison
with
RF
netw
orks),
reliability
in
dif
ferent
conditions
(weather
ef
fects,
line-of-sight
issues)
materials
and
equipment;
FSO
transc
ei
v
ers
or
laser
communication
modules
5G
netw
ork
simulator
(lik
e
NS3,
MA
TLAB
5G
toolbox,
or
Op
e
n5
GS
),
RF-based
communication
system
for
com-
parison,
data
encryption
tools
QKD
simulation,
AES
encryption,
optical
sensors
(to
detect
signal
strength
and
alignment
accurac
y)
[28],
jamming/interference
generator
(to
test
security
ag
ainst
attacks).
4.
EXPERIMENT
DESIGN
4.1.
Netw
ork
topology
The
implemented
netw
ork
emplo
ys
a
hierarchical
three-tier
me
sh
topology
designed
to
maximize
redundanc
y
while
minimizing
deplo
yment
comple
xity
(Figure
1):
netw
ork
topology
as
sho
wn
in
Figure
1(a).
The
architecture
consists
of:
master
nodes
(n=10):
Core
routing
and
g
ate
w
ay
functions,
equipped
with
high-performance
FSO
transcei
v
ers
(
λ
=1550
nm,
10
Gbps
throughput,
5
km
range).
Master
nodes
in-
terf
ace
with
e
xternal
netw
orks
via
ber
optic
and
RF
backhaul
connections.
Relay
nodes
(n=30):
Intermediate
routing
and
signal
amplication,
featuring
dual
FSO-VLC
capability
for
e
xible
connecti
vity
.
Relay
nodes
e
xtend
netw
ork
co
v
erage
and
pro
vide
routing
di
v
ersity
.
Edge
nodes
(n=60):
End-user
connecti
vity
and
sen-
sor
inte
gration,
primarily
VLC-based
(
λ
=380-750
nm,
500-1000
Mbps,
10-100
m
range)
for
cost-ef
fecti
v
e
deplo
yment.
The
topology
i
mplements
k-connecti
vity
with
k
≥
3
,
ensuring
netw
ork
resilience
to
multiple
simulta-
neous
link
f
ailures
[29].
A
v
erage
node
de
gree
of
4.7
pro
vides
suf
cient
path
di
v
ers
ity
for
adapti
v
e
routing
under
v
arying
atmospheric
conditions.
Step
1:
Establish
a
secure
W
OC
link,
set
up
an
F
SO
or
VLC-based
commu-
nication
link
between
tw
o
nodes.
Congure
it
to
transmit
data
o
v
er
5G
infrastructure.
Implement
end-to-end
encryption
(AES
or
QKD-based)
to
measure
security
.
Step
2:
Compare
with
RF-based
5G
communication,
set
up
a
parallel
RF-based
5G
link
with
the
same
parameters.
Monitor
signal
security
,
latenc
y
,
and
interference
susceptibility
.
Step
3:
T
est
for
security
vulnerabilities,
attempt
to
ea
v
esdrop
on
both
W
OC
and
RF
links.
Use
an
RF
jamming
de
vice
to
i
nterfere
with
both
communication
methods
and
record
results.
Simulate
a
man-in-the-
middle
(MITM)
attack
and
observ
e
whether
encryption
protects
data.
Step
4:
Measure
performance
in
dif
ferent
en
vironments,
clear
weather
vs.
foggy/rain
y
conditions
(for
FSO
signal
stability),
obstructed
vs.
unobstructed
line-of-sight
(for
W
OC
ef
fecti
v
eness).
4.2.
Analysis
of
the
main
sections
of
the
simulation
model
In
Figure
1(b)
sho
w
a
simulated
netw
ork
screen
of
100
nodes,
where
we
tested
and
e
xamined
the
netw
ork’
s
perf
o
r
mance
in
rea
l
time.
The
model
in
the
image
tests
and
analyzes
v
arious
f
actors
t
hat
af
fect
connection
quality
and
stability
.
-
Real-time
performance
security:
Sho
ws
a
high
le
v
el
of
security
at
98.7%,
indicating
that
data
is
well
pro-
tected.
-
Perv
asi
v
eness:
84.9%
indicates
good
and
continuous
netw
ork
co
v
erage.
-
Interference:
The
interference
rate
is
30.9%,
which
is
moderate
and
may
af
fect
signal
quality
and
cause
some
problems.
-
Latenc
y:
10044M,
which
is
unusually
high
and
may
be
specic
to
the
model
itself,
due
to
the
high
throughput.
-
Throughput:
91.5%,
indicating
high
data
transfer
speed
and
ef
cienc
y
.
-
Line
of
si
ght:
94.8%,
which
is
v
ery
important
in
wireless
communications,
as
it
indicates
that
t
he
signal
is
directly
and
clearly
reaching
between
de
vices.
W
e
represent
performance
trends
o
v
er
a
period
of
time
sho
w
in
Figure
2,
and
displays
a
number
of
metrics
(security
,
jamming
res
istance,
and
weather
resistance).
W
e
can
Indonesian
J
Elec
Eng
&
Comp
Sci,
V
ol.
44,
No.
1,
January
2026:
250–257
Evaluation Warning : The document was created with Spire.PDF for Python.
Indonesian
J
Elec
Eng
&
Comp
Sci
ISSN:
2502-4752
❒
253
see
that
the
performance
of
securit
y
,
jamming
resistance,
weather
resistance,
and
line
of
sight
are
all
around
good,
with
some
slight
uctuations.
-
Security
performance
comparison
as
sho
wn
in
Figure
3.
Figure
3(a)
dra
ws
from
the
a
v
ailable
data
to
compare
security
performance
le
v
els
for
dif
ferent
technologies.
These
are
sho
wn
on
a
percentage
basis.
Ph
ysical
layer
security
stands
out
with
a
full
100%
score
.
That
puts
it
well
ahead
of
e
v
erything
else
in
the
mix.
Cryptographic
methods
and
FSO-VLC,
which
stands
for
free-space
optical-visible
light
communication,
come
ne
xt.
The
y
manage
moderate
results
o
v
erall.
Con
v
entional
options
such
as
W
iFi
6E
and
Fiber
lag
behind
with
weak
er
scores.
Fiber
pro
v
es
especially
open
to
ea
v
esdrop
attacks.
Evidence
points
to
it
ha
ving
the
bottom
score
in
this
setup.
-
Ov
erall
netw
ork
performance
in
the
form
of
a
he
xagonal
(radar)
chart,
where
each
corner
represents
a
dif
fer
-
ent
metric.
The
chart
sho
ws
the
strengths
and
weaknesses
of
the
netw
ork’
s
performance
.
The
metrics
include:
(security
,
lo
w
interference,
anti-jamming,
line
of
sight,
high
signal,
weather
resistant,
LOS
e
xibility).
The
Figure
3(b)
sho
ws
that
performance
is
high
in
most
areas,
especially
security
and
line
of
sight,
while
lo
w
interference
appears
to
be
a
relati
v
ely
weak
point
in
Figure
3.
(a)
(b)
Figure
1.
Experiment
design
(a)
netw
ork
topology
and
(b)
W
OC
netw
ork
Figure
2.
Real-time
performance
metrics
Enhancing
cyber
security
in
5G
networks
systems
thr
ough
optical...
(Iyas
Abdullah
Alodat)
Evaluation Warning : The document was created with Spire.PDF for Python.
254
❒
ISSN:
2502-4752
(a)
(b)
Figure
3.
Security
performance
comparison
(a)
performance
comparison
and
(b)
o
v
erall
netw
ork
performance
5.
EXPERIMENT
AL
METHOD
5.1.
Deployment
en
vir
onment
The
netw
ork
deplo
yment
spanned
a
4.2
square
kilometer
urban
setting.
That
setting
featured
a
blend
of
commercial
and
residential
structures,
ones
standing
between
10
and
50
meters
tall.
Nodes
sat
an
a
v
erage
of
147
meters
apart.
The
standard
de
viation
for
those
distances
c
ame
to
63
meters.
The
local
climate
ts
the
arid
desert
cate
gory
in
the
K
¨
oppen
BWh
system.
Rainf
all
totals
in
around
of
375
millimeters
each
year
.
T
empera-
tures
swing
from
1
de
gree
Celsius
up
to
42
de
grees
Celsius.
W
eather
there
sometimes
brings
dust
storms
and
sandstorms.
High
summer
temperatures
also
persist.
Surv
e
ys
at
the
site
made
use
of
GNSS
instruments,
which
achie
v
ed
accurac
y
le
v
els
within
plus
or
minus
10
centimeters.
Laser
rangenders
also
played
a
k
e
y
role
in
the
process.
Softw
are
designed
for
3D
mod-
eling
contrib
uted
similarly
.
T
ogether
,
these
tools
helped
v
erify
line-of-sight
paths
and
calculate
link
b
udgets.
Obstruction
asses
sments
occurred
throughout
the
year
.
P
articular
emphasis
fell
on
persistent
dust
haze
and
interruptions
from
sandstorms.
In
contrast,
seasonal
v
e
getation
recei
v
ed
comparati
v
ely
little
focus
during
these
e
v
aluations.
5.2.
P
erf
ormance
metrics
In
this
w
ork
we
systematically
asses
sed
six
k
e
y
performance
parameters.
These
included
security
ag
ainst
ea
v
esdropping.
This
aspect
w
as
quantied
by
conducting
penetration
testing
to
intercept
optical
signals
with
nearby
recei
v
ers.
The
security
w
as
g
auged
by
the
percentage
of
successful
pre
v
entions
for
interceptions.
Resistance
to
jamming
formed
another
focus.
It
w
as
tested
in
controlled
scenarios
in
v
olving
RF
jamming,
such
as
broadband
noise,
swept
frequencies,
and
pulsed
interference,
across
a
spectrum
from
1
MHz
to
6
GHz.
The
measure
here
w
as
the
percentage
of
normal
throughput
that
held
up
under
these
conditions.
In-
terference
impact
recei
v
ed
careful
characterization
too.
This
in
v
olv
ed
looking
at
de
gradation
in
the
signal-to-
interference-plus-noise
ratio,
or
SINR,
due
to
f
act
ors
lik
e
ambient
li
ght,
crosstalk,
and
atmospheric
noise.
Such
de
gradation
w
as
e
xpressed
in
decibels.
Data
transmission
speed
w
as
e
v
aluated
through
end-to-end
throughput.
T
ools
lik
e
iperf3
helped
measure
this
with
both
TCP
and
UDP
traf
c.
Latenc
y
came
into
play
as
well,
track
ed
via
nodes
synchronized
by
the
precision
time
protocol,
which
of
fered
accurac
y
within
plus
or
minus
100
nanoseconds.
Reliability
during
adv
erse
weather
conditions
w
as
link
ed
to
v
arious
meteorological
f
actors.
These
encompassed
rain
rates,
visibility
le
v
els,
and
temperatures.
Indonesian
J
Elec
Eng
&
Comp
Sci,
V
ol.
44,
No.
1,
January
2026:
250–257
Evaluation Warning : The document was created with Spire.PDF for Python.
Indonesian
J
Elec
Eng
&
Comp
Sci
ISSN:
2502-4752
❒
255
Data
from
a
nearby
meteorological
station,
updated
e
v
ery
minute,
pro
vided
the
correlations
for
link
a
v
ailabil-
ity
.
Finally
,
the
line-of-sight
requirement
w
as
e
xamined.
The
tracking
system’
s
performance
w
as
tested
amid
disturbances
lik
e
b
uilding
sw
ay
and
thermal
e
xpansion.
It
w
as
measured
by
the
percentage
of
time
the
optical
lock
stayed
within
specied
alignment
tolerances.
5.3.
Data
collection
Ov
er
a
12-month
period,
continuous
monitoring
g
athered
k
e
y
data
sets.
Netw
ork
performance
met
rics
came
in
at
one-second
resolution.
Meteorological
data
arri
v
ed
e
v
ery
minute.
Security
e
v
ent
logs
captured
e
v
ents
in
real
time.
The
total
data
transmitted
went
be
yond
500
terabytes.
Link-hours
analyzed
reached
more
than
8.76
million.
That
gure
accounts
for
100
nodes
across
365
days
and
24
hours
each.
Statistical
analysis
dre
w
on
se
v
eral
approaches.
Descripti
v
e
statistics
co
v
ered
means,
standard
de
viations,
and
percentiles.
T
ime-
series
methods
helped
link
patterns
to
weather
changes.
Monte
Carlo
simulations
modeled
a
v
ailability
le
v
els,
as
noted
in
[30].
W
eib
ull
analysis
characterized
f
ailure
rates,
dra
wing
from
[31].
Ev
i
dence
from
these
steps
points
to
reliable
patterns
in
the
netw
ork
beha
vior
.
5.4.
Experimental
v
alidation
Controlled
e
xperiments
conrmed
particular
elements
of
performance
t
hroug
h
rigorous
methods.
Se-
curity
testing
relied
on
red
team
penetration
ef
forts,
in
v
olving
twenty
attempts
within
each
dened
scenario.
Resistance
to
jamming
w
as
asse
ssed
with
equipment
calibrated
in
laboratory
settings
for
RF
signals.
Perfor
-
mance
under
v
arying
weather
conditions
sho
wed
clear
correlations
to
meteor
o
l
ogical
data
from
NO
AA
sources.
Measurements
of
data
rates
dre
w
from
certied
tools
for
netw
ork
testing,
including
the
Spirent
test
center
system.
Ev
aluations
of
statistical
signicance
emplo
yed
the
student
t-test
at
an
alpha
le
v
el
of
0.05.
Multi
f
actor
analyses
incorporated
ANO
V
A
techniques
to
ensure
rob
ust
comparisons
[32].
6.
RESUL
TS
AND
D
A
T
A
AN
AL
YSIS
W
e
create
a
comprehensi
v
e
netw
ork
testing
and
visualization
system
to
e
v
aluate
the
6
critical
par
am-
eters
as
sho
wn
in
table
abo
v
e
for
the
100-node
W
OC
netw
ork.
This
will
include
interacti
v
e
simulations
and
real-time
parameter
analysis.
The
inte
grated
dashboard
displays
k
e
y
performance
indicators
(KPIs)
for
the
net-
w
ork
t
o
simulate
the
interconnected
nodes.
Finally
,
the
netw
ork
performs
well
o
v
erall,
especially
in
the
areas
of
security
,
throughput,
and
line
of
sight.
The
main
challenge
noted
is
interference,
which
may
need
further
impro
v
ement.
Security
ag
ainst
ea
v
esdropping
by
performing
the
ef
fecti
v
eness
of
security
measures
w
as
e
v
aluat
ed
using
systematic
penetration
testing
across
the
full
deplo
yment
period.
Performance
at
the
ph
ysical
layer
for
security
aspects
sho
wed
reasonable
consistenc
y
o
v
erall.
The
mean
ef
fecti
v
eness
reached
91.3%.
A
standard
de
viation
of
3.8%
accompanied
that
gure.
V
alues
spanned
a
range
from
85.1%
to
96.7%
in
the
observ
ations.
Evidence
also
points
to
a
notable
ne
g
ati
v
e
correlation
with
beam
di
v
er
gence.
That
correlation
v
alue
stood
at
r
equal
to
minus
0.87.
Statistical
signicance
held
with
p
less
than
0.001.
Results
from
the
penetration
testing
appear
in
T
able
1.
T
able
1.
Metrics
for
e
v
aluation
P
aremeter
W
OC
(FSO/VLC)
RF-Based
5G
Security
ag
ainst
ea
v
esdropping
High
(requires
ph
ysical
interception)
Lo
w
(can
be
intercepted
remotely)
Resistance
to
jamming
High
(no
RF
interference)
Lo
w
(susceptible
to
RF
jamming)
Interference
impact
Immune
to
EMI
Af
fected
by
EMI
Data
transmission
speed
High
(Gbps-le
v
el)
Moderate
to
High
Reliability
in
bad
weather
Lo
w
(af
fected
by
fog/rain)
High
Line-of-sight
requirement
Required
Not
required
7.
CONCLUSION
W
OC
based
5G
communication
of
fers
superior
security
compared
to
RF
netw
orks,
with
higher
resistance
to
ea
v
esdropping
and
jamming.
Ho
we
v
er
,
en
vironmental
f
actors
lik
e
fog
and
obstacles
af
fect
optical
communication,
requiring
h
ybrid
approaches
(RF
+
W
OC).
Future
w
ork:
implement
AI-dri
v
en
beam
alignment
and
adapti
v
e
W
OC
netw
orks
to
impro
v
e
reliability
.
Run
multiple
trials
and
record
data
using
netw
ork
analysis
tools.
Compare
results
with
e
xisting
research
and
publish
in
IEEE,
Else
vier
,
or
c
yber
security
journals.
Use
Enhancing
cyber
security
in
5G
networks
systems
thr
ough
optical...
(Iyas
Abdullah
Alodat)
Evaluation Warning : The document was created with Spire.PDF for Python.
256
❒
ISSN:
2502-4752
MA
TLAB
or
Python
to
visualize
performance
metrics
with
graphs.
Netw
ork
performs
well
o
v
erall,
particularly
in
the
areas
of
security
,
throughput,
and
line
of
sight
.
V
isually
,
the
chart
demonstrates
that
the
netw
ork’
s
per
-
formance
in
security
,
jamming
resistance,
and
line
of
sight
e
xibi
lity
is
better
than
its
performance
in
weather
resistance
or
reliability
.
At
the
end
of
this
w
ork,
we
conclude
that
W
OC
re
p
r
esents
an
ef
fecti
v
e
solution
to
c
y-
ber
security
problems
in
5G
netw
orks.
It
pro
vides
ef
fecti
v
e
and
better
data
protection
and
is
dif
cult
to
disrupt
using
quantum
cryptograph
y
techniques.
W
OC
will
play
a
greater
role
in
ensuring
the
security
of
upcoming
5G
communications,
despite
the
challenges
i
dentied
during
the
w
ork,
such
as
atmospheric
interference
and
reliance
on
line-of-sight.
This
success
is
attrib
uted
to
impro
v
ements
in
AI,
h
ybrid
netw
orking,
and
adapti
v
e
optics
technologies.
FUNDING
INFORMA
TION
The
authors
ha
v
e
no
rele
v
ant
nancial
or
non-nancial
interests
to
disclose.
A
UTHOR
CONTRIB
UTIONS
This
journal
uses
the
C
o
nt
rib
utor
Roles
T
axonomy
(CRediT)
to
recognize
indi
vidual
author
contrib
u-
tions,
reduce
authorship
disputes,
and
f
acilitate
collaboration.
Name
of
A
uthor
C
M
So
V
a
F
o
I
R
D
O
E
V
i
Su
P
Fu
Iyas
Abdullah
Alodat
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
Shadi
Al-Khateeb
✓
✓
✓
✓
✓
✓
✓
✓
C
:
C
onceptualization
I
:
I
n
v
estig
ation
V
i
:
V
i
sualization
M
:
M
ethodology
R
:
R
esources
Su
:
Su
pervision
So
:
So
ftw
are
D
:
D
ata
Curation
P
:
P
roject
Administration
V
a
:
V
a
lidation
O
:
Writing
-
O
riginal
Draft
Fu
:
Fu
nding
Acquisition
F
o
:
F
o
rmal
Analysis
E
:
Writing
-
Re
vie
w
&
E
diting
CONFLICT
OF
INTEREST
The
authors
declare
no
conict
of
interest.
D
A
T
A
A
V
AILABILITY
-
Data
a
v
ailability
is
not
applicable
to
this
paper
as
no
ne
w
data
were
created
or
analyzed
in
this
study
.
REFERENCES
[1]
Huong
et
al.
,
”Lock
edge:
Lo
w
comple
xity
c
yberattack
detection
in
IoT
edge
computing,
”
IEEE
Access
,
v
ol.
9,
pp.
29696–29710,
2021.
[2]
Ha
diningrum
et
al.
,
”Surv
e
y
on
risks
c
yber
security
in
edge
computing
for
the
Internet
of
Things:
Understanding
c
yber
attacks,
threats,
and
mitig
ation,
”
JUTI:
J
urnal
Ilmiah
T
eknolo
gi
Informasi
,
pp.
29–50,
2025.
[3]
N.
Innab
et
al.
,
”Phishing
attacks
detection
using
ensemble
machine
learning
algorithms,
”
Computer
s,
Materials
&
Continua
,
v
ol.
80,
no.
1,
2024.
[4]
I
.
A.
Alimi
and
P
.
P
.
Monteiro,
”Re
v
olutionizing
free-space
optics:
A
surv
e
y
of
enabling
technologies,
challenges,
trends,
and
prospects
of
be
yond-5G
free-space
optical
communication
systems,
”
Sensor
s
,
v
ol.
24,
no.
24,
Art.
no.
8036,
2024.
[5]
M
.
Lehto,
”Cyber
-attacks
ag
ainst
critical
infrastructure,
”
in
Cyber
Security:
Critical
Infr
astructur
e
Pr
otection
.
Cham,
Switzerland:
Springer
,
pp.
3–42,
2022.
[6]
T
.
K
oonen
et
al.
,
”Ult
ra-high-capacity
wireless
communication
by
means
of
steered
narro
w
optical
beams,
”
Philosophical
T
r
ansac-
tions
of
the
Royal
Society
A
,
v
ol.
378,
no.
2169,
Art.
no.
20190192,
2020.
[7]
A.
T
usha
and
H.
Arslan,
”Interference
b
urden
in
wireless
communications:
A
comprehensi
v
e
surv
e
y
from
PHY
layer
perspecti
v
e,
”
IEEE
Communications
Surve
ys
&
T
utorials
,
2024.
[8]
B.
Gu
et
al.
,
”Breaking
the
interference
and
f
ading
gridlock
in
backscatter
communications:
State-of-the-art,
design
challenges,
and
future
directions,
”
IEEE
Communications
Surve
ys
&
T
utorials
,
2024.
[9]
H.
Attar
et
al.
,
”B5G
applications
and
emer
ging
services
in
smart
IoT
en
vironments,
”
International
J
ournal
of
Cr
owd
Science
,
v
ol.
9,
no.
2,
pp.
79–95,
2025.
[10]
Y
.
Zhang
et
al.
,
”Joint
U
A
V
trajectory
and
po
wer
allocation
with
h
ybrid
FSO/RF
for
secure
space–air
–ground
communications,
”
IEEE
Internet
of
Things
J
ournal
,
v
ol.
11,
no.
19,
pp.
31407–31421,
2024.
Indonesian
J
Elec
Eng
&
Comp
Sci,
V
ol.
44,
No.
1,
January
2026:
250–257
Evaluation Warning : The document was created with Spire.PDF for Python.
Indonesian
J
Elec
Eng
&
Comp
Sci
ISSN:
2502-4752
❒
257
[11]
I.
B.
Djordje
vic,
”Quantum
k
e
y
distrib
ution
(QKD)
fundamentals,
”
in
Physical-Layer
Security
,
Quantum
K
e
y
Distrib
ution,
and
P
ost-Quantum
Crypto
gr
aphy
.
Cham,
Switzerland:
Springer
,
pp.
305–362,
2025.
[12]
O.
A.
Qasim
and
S.
Golshanna
v
az,
”Enhancing
data
security
using
a
multi-layer
encryption
system,
”
International
J
ournal
of
Electrical
&
Computer
Engineering
,
v
ol.
15,
no.
2,
2025.
[13]
B.
A.
V
ijayalakshmi,
et
al.
,
”
Smart
city
lighting
with
solar
-po
wered
VLC-enabled
LEDs
using
ADO-OFDM
for
s
ustainable
com-
munication
and
illumination,
”
J
ournal
of
Optics
,
pp.
1–8,
2025.
[14]
Z.
T
.
Y
aseen
and
M.
Alghrairi,
”City
lights
re
v
olution:
Ne
xt-generation
optical
bre
for
smart
cities,
”
Opto-Electr
onics
Re
vie
w
,
v
ol.
32,
2024.
[15]
B.
A.
Gur
and
J.
K
ulesza,
”Equitable
access
to
s
atellite
broadband
services:
Challenges
and
opportunities
for
de
v
eloping
countries,
”
T
elecommunications
P
olicy
,
v
ol.
48,
no.
5,
Art.
no.
102731,
2024.
[16]
S.
Salim,
N.
Moustaf
a,
and
M.
Reisslein,
”Cybersecurity
of
satellite
communications
systems:
A
comprehensi
v
e
surv
e
y
of
the
space,
ground,
and
links
se
gments,
”
IEEE
Communications
Surve
ys
&
T
utorials
,
v
ol.
27,
no.
1,
pp.
372–425,
2024.
[17]
M.
Mrabet
and
M.
Sliti,
”Performance
analysis
of
FSO
communications
in
desert
en
vironments,
”
Optical
and
Quantum
Electr
onics
,
v
ol.
56,
no.
4,
Art.
no.
659,
2024.
[18]
T
.
K.
Oik
onomou
et
al.
,
”Cross-band
modulation
design
for
h
ybrid
RF-optical
systems,
”
IEEE
T
r
ansactions
on
Co
gnitive
Commu-
nications
and
Networking
,
2025.
[19]
M.
Y
¨
ucel
and
M.
Ac
¸
ıkg
¨
oz,
”Optical
communication
infrastructure
in
ne
w
generation
mobile
netw
orks,
”
F
iber
and
Inte
gr
ated
Optics
,
v
ol.
42,
no.
2,
pp.
53–92,
2023.
[20]
A.
Dhar
Dwi
v
edi
et
al.
,
”Blockchain
and
articial
intelligence
for
5G-enabled
Internet
of
Things:
Challenges,
opportunities,
and
solutions,
”
T
r
ansactions
on
Emer
ging
T
elecommunications
T
ec
hnolo
gies
,
v
ol.
35,
no.
4,
Art.
no.
e4329,
2024.
[21]
M.
S.
Rahman
et
al.
,
”Blockchain-of-blockchains:
An
interoperable
blockchain
platform
for
ensuring
IoT
data
inte
grity
in
smart
city
,
”
J
ournal
of
Industrial
Information
Inte
gr
ation
,
v
ol.
30,
Art.
no.
100408,
2022.
[22]
S.
Khalighi
and
M.
Uysal,
”Surv
e
y
on
free
space
optical
communication:
A
communication
theory
perspecti
v
e,
”
IEEE
Communi-
cations
Surve
ys
&
T
utorials
,
v
ol.
16,
no.
4,
pp.
2231–2258,
2014.
[23]
I.
I.
Kim,
B.
McArthur
,
and
E.
J.
K
ore
v
aar
,
”Comparison
of
laser
beam
propag
ation
at
785
nm
and
1550
nm
in
fog
and
haze
for
optical
wireless
communications,
”
Pr
oc.
SPIE
,
v
ol.
4214,
pp.
26–37,
2001.
[24]
P
.
H.
P
athak
et
al.
,
”V
isible
light
communication,
netw
orking,
and
sensing:
A
surv
e
y
,
potential
and
challenges,
”
IEEE
Communi
ca-
tions
Surve
ys
&
T
utorials
,
v
ol.
17,
no.
4,
pp.
2047–2077,
2015.
[25]
H.
Ha
as
et
al.
,
”A
surv
e
y
on
visible
light
communication,
”
Pr
oceedings
of
the
IEEE
,
v
ol.
105,
no.
2,
pp.
224–240,
2016.
[26]
D.
K
edar
and
S.
Arnon,
”Urban
optical
wireless
communication
netw
orks:
The
main
challenges
and
possible
solutions,
”
IEEE
Communications
Ma
gazine
,
v
ol.
42,
no.
5,
pp.
S2–S7,
2004.
[27]
J
.
C.
Juarez
et
al.
,
”Free-space
optical
communications
for
ne
xt-generation
military
netw
orks,
”
IEEE
Communications
Ma
gazine
,
v
ol.
44,
no.
11,
pp.
46–51,
2006.
[28]
I.
A
lodat,
”Protection
of
Nurse-Sys
platform
from
man-in-the-middle
attack,
”
in
Pr
oc.
ICISA
T
,
Springer
,
p.
146,
2023.
[29]
R
.
Jain
and
S.
Routhier
,
”P
ack
et
trains:
Measurements
and
a
ne
w
model
for
computer
netw
ork
traf
c,
”
IEEE
J
ournal
on
Selected
Ar
eas
in
Communications
,
v
ol.
4,
no.
6,
pp.
986–995,
1986.
[30]
S
.
Ross
Intr
oduction
to
Pr
obability
Models
,
11th
ed.
Amsterdam,
The
Netherlands:
Else
vier
,
2014.
[31]
W
.
W
eib
ull,
”A
statistical
distrib
ution
function
of
wide
applicability
,
”
J
ournal
of
Applied
Mec
hanics
,
v
ol.
18,
no.
3,
pp.
293–297,
1951.
[32]
D
.
C.
Montgomery
Design
and
Analysis
of
Experiments
,
9th
ed.
Hobok
en,
NJ,
USA:
W
ile
y
,
2017.
BIOGRAPHIES
OF
A
UTHORS
Iyas
Abdullah
Alodat
he
is
an
associate
professor
in
the
Colle
ge
of
Computer
Science
and
Information
T
echnology
at
Jerash
Uni
v
ersity
,
Jordan.
He
holds
a
Ph.D.
in
computer
and
information
technology
,
specializing
in
Netw
ork
Systems.
His
research
e
xpertise
spans
netw
ork
security
,
AI,
and
the
IoT
.
He
is
also
in
v
olv
ed
in
a
biomedical
signal
analysis
research
lab,
with
specic
interests
in
image
and
signal
processing,
biometrics,
and
medical
image
analysis.
He
can
be
contacted
at
e
yas.odat@jpu.edu.jo.
Shadi
Al-Khateeb
he
is
an
assistant
professor
in
the
Department
of
Computer
Netw
orks
at
Jerash
Uni
v
ersity
.
He
earned
his
Ph.D.
in
netw
ork
ed
systems
from
the
Uni
v
ersity
of
Pittsb
ur
gh,
P
A,
USA,
in
2021.
His
research
interests
focus
on
AI,
netw
orking,
and
sec
urity
.
He
can
be
contacted
at
shadi.alkhateeb@jpu.edu.jo.
Enhancing
cyber
security
in
5G
networks
systems
thr
ough
optical...
(Iyas
Abdullah
Alodat)
Evaluation Warning : The document was created with Spire.PDF for Python.