Indonesian J our nal of Electrical Engineering and Computer Science V ol. 44, No. 1, January 2026, pp. 250 257 ISSN: 2502-4752, DOI: 10.11591/ijeecs.v44.i1.pp250-257 250 Enhancing cybersecurity in 5G netw orks systems thr ough optical wir eless communications Iyas Abdullah Alodat, Shadi Al-Khateeb Department CCNET , F aculty of Computer Science and Information T echnology , Jerash Uni v ersity , Jerash, Jordan Article Inf o Article history: Recei v ed No v 4, 2025 Re vised No v 16, 2025 Accepted Dec 13, 2025 K eyw ords: 5G netw orks Cyber security Ea v esdropping Optical communications W ireless optical ABSTRA CT In this paper we will discuss with the recent gl obal deplo yment of 5G netw orks, it has become imperati v e to ensure secure and reliable comm unications in addi- tion to basic responsibility . Gi v en that standard radio frequenc y (RF) communi- cations ha v e security a ws such as ea v esdropping, signal jamming, and c yber - attacks, wireless optical communications (W OC) of fers a viable alternati v e. Us- ing technologies such as vis ible light communications (VLC) and the free space optics (FSO) technologies, 5G netw orks can enhance the speed and ef cienc y of data transmission, while simultaneously enhancing c yber security . In addition to discussing the adv antages of wireless on-chip communication technology com- pared to RF solutions and the challenge s that need to be addressed, this paper e xamines ho w W OC technology can enhance c yber security in 5G netw orks. This is an open access article under the CC BY -SA license . Corresponding A uthor: Iyas Abdullah Alodat Department CCNET , F aculty of Computer Science and Information T echnology , Jerash Uni v ersity Jerash, Jordan Email: e yas.odat@jpu.edu.jo 1. INTR ODUCTION 5G is designed to rely on densely pack ed small cells, the internet of things (IoT), and edge computing, making it vulnerable to c yberattacks. Examples of such attacks include man-in-the-middle attacks, denial- of-service attacks, and netw ork ea v esdropping, signal interference, and jamming [1]–[3]. V ulnerabilities in radio frequenc y (RF ) communications radio transmission and interception are easy [4]. Hack er s can e xploit spectrum congestion to launch c yberattacks. Spectrum licensing and re gulatory restrictions also hinder secure deplo yment [5]. Protection from ea v esdropping: One of the characteristics of optical signals that mak es unautho- rized ea v esdropping e xtremely di f cult is the need for an at tack er to be within the actual light path of the communication. This is impossible because optical signals ha v e a narro w beam, high resolution, and high directionality , requiring a direct line of sight between both ends [6]. Pre v enting electromagnetic interference: Optical communication systems are uniquely resistant to electronic interference (EMI) and radio frequenc y- based attacks. This is due to their operation in the visible and infrared ranges, f ar be yond the traditional radio frequenc y ranges that are vulnerable to hacking [7], [8]. Solutions for high-density areas: This technology is ef fecti v e in cro wded urban en vironments and of fers a unique solution for 5G and IoT netw orks, as it transmits sensiti v e data without using radio channels, instead using optical channels. As pre viously mentioned, optical channels are more comple x for hacking [9], [10]. J ournal homepage: http://ijeecs.iaescor e .com Evaluation Warning : The document was created with Spire.PDF for Python.
Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752 251 Inte gration with quantum cryptograph y systems: Based on an unbreakable encryption system, the properties of light photons are used to identify an y hacking acti vity using adv anced technologies, such as quantum k e y distrib ution (QKD) [11]. Enhancing transport netw ork security: The transport netw ork which connects base stations to the core netw ork is a prime tar get for c yberattacks. 5G transport netw orks must be protected from sophisticated c yber threats using a multi-layered security approach that combines encryption, zero-trust policies, articial intelligence (AI) monitoring, and quantum-resistance technologies [12]. Communications in the military and defense: Here we in v olv e using a mobile optical communicat ions (MOC) system to transmit data quic kly and without interference, we will be ensuring the inte grity of battleeld communications. By using mobile optical communication units are also can be created to protect critical net- w orks [4]. Smart city and t he IoT : In most netw orks based on visible light communications (VLC) technology enable the smart city infrastructure netw orks to be connected de vices to share their data securely . The optical communications are used also for traf c management and secure AI-po wered surv eillance systems [13], [14]. Communications in space netw orks and with satellites by using laser communications bet ween satellites and the ground for more secure 5G data transmission be yond Earth’ s borders. Therefore to be f aced the quantum-encrypted optical links for highly secure space netw orks [15], [16]. Challenges and limita- tions of wireless optical communication (W OC) in 5G c ybersecurity is atmospheric interference depend of the situationship of the weather conditions if it can be fog, rain, and dust can e xacerbate FSO signals, so adapti v e beam forming and redundanc y solutions we recommend to be required [17]. Line-of-sight (LoS): W e look at optical signals require a clear path between transmitter and recei v er , which may be one most limitation in dy- namic urban en vironments. T o solv e these issue lik e relay-based optical communication and h ybrid RF optical netw orks may can help mitig ate this issue [18]. Infrastructure with cost challenges to establish the FSO or VLC based systems at scale requi res additional infrastructure in v estment. Hybrid models inte grating RF and optical solutions can optimize cost while ensuring security [19]. Future prospects : When we look at AI technique and modern blockchain tech- nologies its help secure 5G optical wireless netw orks [20], as well as the the po wer of AI to optical netw ork management, which in turn enables machine learning to impro v e beam alignment and detect problems in opti- cal data transmission. Using the blockchain technologies for secure optical wireless transactions. In 5G optical netw orks, decentralized ledgers in blockchain can impro v e data inte grity and authentication of data transaction [21]. Conducting an e xperiment on enhancing c ybersecurity in 5G netw orks using W OC requires a structured approach. Here’ s ho w you can design a research e xperiment and analyze the results. 2. RELA TED W ORK The w ork by Khalighi and Uysal [22] laid a strong foundation. It of fered a detailed theoreti cal o v ervie w of free-space optical systems. Still, that ef fort stayed mostly in the realm of analysis. It missed out on real-w orld testing from an y big, hands-on setup. This current research dra ws right from that base. It adds solid, data-dri v en assessments. Those assessments help connect what theory forecasts with ho w things actually w ork in practice. In the end, the ndings here deli v er k e y real-w orld proof. The y a lso supply performance details. All of that backs up the original ideas and pushes them further . Kim et al. [23] in their foundational paper laid out an init ial benchmark. The y reported 89% a v ail- ability for one FSO link alone. Our w ork b uilds on that foundation in a clear w ay . It sho ws 99.6 % a v ailability across a full 100 node mesh netw ork. Researchers g ained those e xtra 10.6 percentage points by applying k=3 redundanc y . Evidence lik e this points to the v alue of f ault tolerance at the netw ork scale. Single link setups just do not measure up in comparison. Prior lab tests managed to hit multi-gig abit speeds with visible light communication in tightly con- trolled en vironments, lik e those described in [24], [25]. This current ef fort conrms t he technology’ s potential for e v eryday use. The h ybrid setup combining visible light communication and free space optics held steady at 847 Mbps in outdoor conditions. It reached 85% of the performance seen in lab trials. That outcome highlights the reliable strength of these combined optical wireless systems across a full 12 month period in the eld. The empirical v alidation supports Arnon’ s theoretical routing models for urban free space opt ical netw orks as outlined [26]. A deplo yment with 100 nodes aligns closely with simulation predictions. Measured rerouting times reached 450 milliseconds and stayed within 15% of theoretical e xpectations. Evidence also points to a 12% drop in real w orld performance. This stems from atmospheric ef fects that simulations f ail to capture completely . Research has pro vided the rst empirical e vidence of free space optics jamming resistance. Enhancing cyber security in 5G networks systems thr ough optical... (Iyas Abdullah Alodat) Evaluation Warning : The document was created with Spire.PDF for Python.
252 ISSN: 2502-4752 This e vidence appears [27]. It conrms full throughput e v en under strong radio frequenc y interference. A deplo yment spanning 12 months across 100 nodes b uilds on the tactical approach from Juarez et al. [27]. Our w ork turns into something more solid. It creates a permanent netw ork with high throughput at 9.5 Gbps per second. Such results help v alidate the systems resilience in protecting k e y infrastructure. 3. EXPERIMENT SETUP Ev aluate the c yber -security benets of W OC in a 5G netw ork en vironment by comparing it with traditional RF-based communication. K e y parameters to mea sure; data transmission security (ea v esdropping vulnerability , encryption strength), interference resistance (jamming susceptibility , electromagnetic interfer - ence ef fects), latenc y and data rate (comparison with RF netw orks), reliability in dif ferent conditions (weather ef fects, line-of-sight issues) materials and equipment; FSO transc ei v ers or laser communication modules 5G netw ork simulator (lik e NS3, MA TLAB 5G toolbox, or Op e n5 GS ), RF-based communication system for com- parison, data encryption tools QKD simulation, AES encryption, optical sensors (to detect signal strength and alignment accurac y) [28], jamming/interference generator (to test security ag ainst attacks). 4. EXPERIMENT DESIGN 4.1. Netw ork topology The implemented netw ork emplo ys a hierarchical three-tier me sh topology designed to maximize redundanc y while minimizing deplo yment comple xity (Figure 1): netw ork topology as sho wn in Figure 1(a). The architecture consists of: master nodes (n=10): Core routing and g ate w ay functions, equipped with high-performance FSO transcei v ers ( λ =1550 nm, 10 Gbps throughput, 5 km range). Master nodes in- terf ace with e xternal netw orks via ber optic and RF backhaul connections. Relay nodes (n=30): Intermediate routing and signal amplication, featuring dual FSO-VLC capability for e xible connecti vity . Relay nodes e xtend netw ork co v erage and pro vide routing di v ersity . Edge nodes (n=60): End-user connecti vity and sen- sor inte gration, primarily VLC-based ( λ =380-750 nm, 500-1000 Mbps, 10-100 m range) for cost-ef fecti v e deplo yment. The topology i mplements k-connecti vity with k 3 , ensuring netw ork resilience to multiple simulta- neous link f ailures [29]. A v erage node de gree of 4.7 pro vides suf cient path di v ers ity for adapti v e routing under v arying atmospheric conditions. Step 1: Establish a secure W OC link, set up an F SO or VLC-based commu- nication link between tw o nodes. Congure it to transmit data o v er 5G infrastructure. Implement end-to-end encryption (AES or QKD-based) to measure security . Step 2: Compare with RF-based 5G communication, set up a parallel RF-based 5G link with the same parameters. Monitor signal security , latenc y , and interference susceptibility . Step 3: T est for security vulnerabilities, attempt to ea v esdrop on both W OC and RF links. Use an RF jamming de vice to i nterfere with both communication methods and record results. Simulate a man-in-the- middle (MITM) attack and observ e whether encryption protects data. Step 4: Measure performance in dif ferent en vironments, clear weather vs. foggy/rain y conditions (for FSO signal stability), obstructed vs. unobstructed line-of-sight (for W OC ef fecti v eness). 4.2. Analysis of the main sections of the simulation model In Figure 1(b) sho w a simulated netw ork screen of 100 nodes, where we tested and e xamined the netw ork’ s perf o r mance in rea l time. The model in the image tests and analyzes v arious f actors t hat af fect connection quality and stability . - Real-time performance security: Sho ws a high le v el of security at 98.7%, indicating that data is well pro- tected. - Perv asi v eness: 84.9% indicates good and continuous netw ork co v erage. - Interference: The interference rate is 30.9%, which is moderate and may af fect signal quality and cause some problems. - Latenc y: 10044M, which is unusually high and may be specic to the model itself, due to the high throughput. - Throughput: 91.5%, indicating high data transfer speed and ef cienc y . - Line of si ght: 94.8%, which is v ery important in wireless communications, as it indicates that t he signal is directly and clearly reaching between de vices. W e represent performance trends o v er a period of time sho w in Figure 2, and displays a number of metrics (security , jamming res istance, and weather resistance). W e can Indonesian J Elec Eng & Comp Sci, V ol. 44, No. 1, January 2026: 250–257 Evaluation Warning : The document was created with Spire.PDF for Python.
Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752 253 see that the performance of securit y , jamming resistance, weather resistance, and line of sight are all around good, with some slight uctuations. - Security performance comparison as sho wn in Figure 3. Figure 3(a) dra ws from the a v ailable data to compare security performance le v els for dif ferent technologies. These are sho wn on a percentage basis. Ph ysical layer security stands out with a full 100% score . That puts it well ahead of e v erything else in the mix. Cryptographic methods and FSO-VLC, which stands for free-space optical-visible light communication, come ne xt. The y manage moderate results o v erall. Con v entional options such as W iFi 6E and Fiber lag behind with weak er scores. Fiber pro v es especially open to ea v esdrop attacks. Evidence points to it ha ving the bottom score in this setup. - Ov erall netw ork performance in the form of a he xagonal (radar) chart, where each corner represents a dif fer - ent metric. The chart sho ws the strengths and weaknesses of the netw ork’ s performance . The metrics include: (security , lo w interference, anti-jamming, line of sight, high signal, weather resistant, LOS e xibility). The Figure 3(b) sho ws that performance is high in most areas, especially security and line of sight, while lo w interference appears to be a relati v ely weak point in Figure 3. (a) (b) Figure 1. Experiment design (a) netw ork topology and (b) W OC netw ork Figure 2. Real-time performance metrics Enhancing cyber security in 5G networks systems thr ough optical... (Iyas Abdullah Alodat) Evaluation Warning : The document was created with Spire.PDF for Python.
254 ISSN: 2502-4752 (a) (b) Figure 3. Security performance comparison (a) performance comparison and (b) o v erall netw ork performance 5. EXPERIMENT AL METHOD 5.1. Deployment en vir onment The netw ork deplo yment spanned a 4.2 square kilometer urban setting. That setting featured a blend of commercial and residential structures, ones standing between 10 and 50 meters tall. Nodes sat an a v erage of 147 meters apart. The standard de viation for those distances c ame to 63 meters. The local climate ts the arid desert cate gory in the K ¨ oppen BWh system. Rainf all totals in around of 375 millimeters each year . T empera- tures swing from 1 de gree Celsius up to 42 de grees Celsius. W eather there sometimes brings dust storms and sandstorms. High summer temperatures also persist. Surv e ys at the site made use of GNSS instruments, which achie v ed accurac y le v els within plus or minus 10 centimeters. Laser rangenders also played a k e y role in the process. Softw are designed for 3D mod- eling contrib uted similarly . T ogether , these tools helped v erify line-of-sight paths and calculate link b udgets. Obstruction asses sments occurred throughout the year . P articular emphasis fell on persistent dust haze and interruptions from sandstorms. In contrast, seasonal v e getation recei v ed comparati v ely little focus during these e v aluations. 5.2. P erf ormance metrics In this w ork we systematically asses sed six k e y performance parameters. These included security ag ainst ea v esdropping. This aspect w as quantied by conducting penetration testing to intercept optical signals with nearby recei v ers. The security w as g auged by the percentage of successful pre v entions for interceptions. Resistance to jamming formed another focus. It w as tested in controlled scenarios in v olving RF jamming, such as broadband noise, swept frequencies, and pulsed interference, across a spectrum from 1 MHz to 6 GHz. The measure here w as the percentage of normal throughput that held up under these conditions. In- terference impact recei v ed careful characterization too. This in v olv ed looking at de gradation in the signal-to- interference-plus-noise ratio, or SINR, due to f act ors lik e ambient li ght, crosstalk, and atmospheric noise. Such de gradation w as e xpressed in decibels. Data transmission speed w as e v aluated through end-to-end throughput. T ools lik e iperf3 helped measure this with both TCP and UDP traf c. Latenc y came into play as well, track ed via nodes synchronized by the precision time protocol, which of fered accurac y within plus or minus 100 nanoseconds. Reliability during adv erse weather conditions w as link ed to v arious meteorological f actors. These encompassed rain rates, visibility le v els, and temperatures. Indonesian J Elec Eng & Comp Sci, V ol. 44, No. 1, January 2026: 250–257 Evaluation Warning : The document was created with Spire.PDF for Python.
Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752 255 Data from a nearby meteorological station, updated e v ery minute, pro vided the correlations for link a v ailabil- ity . Finally , the line-of-sight requirement w as e xamined. The tracking system’ s performance w as tested amid disturbances lik e b uilding sw ay and thermal e xpansion. It w as measured by the percentage of time the optical lock stayed within specied alignment tolerances. 5.3. Data collection Ov er a 12-month period, continuous monitoring g athered k e y data sets. Netw ork performance met rics came in at one-second resolution. Meteorological data arri v ed e v ery minute. Security e v ent logs captured e v ents in real time. The total data transmitted went be yond 500 terabytes. Link-hours analyzed reached more than 8.76 million. That gure accounts for 100 nodes across 365 days and 24 hours each. Statistical analysis dre w on se v eral approaches. Descripti v e statistics co v ered means, standard de viations, and percentiles. T ime- series methods helped link patterns to weather changes. Monte Carlo simulations modeled a v ailability le v els, as noted in [30]. W eib ull analysis characterized f ailure rates, dra wing from [31]. Ev i dence from these steps points to reliable patterns in the netw ork beha vior . 5.4. Experimental v alidation Controlled e xperiments conrmed particular elements of performance t hroug h rigorous methods. Se- curity testing relied on red team penetration ef forts, in v olving twenty attempts within each dened scenario. Resistance to jamming w as asse ssed with equipment calibrated in laboratory settings for RF signals. Perfor - mance under v arying weather conditions sho wed clear correlations to meteor o l ogical data from NO AA sources. Measurements of data rates dre w from certied tools for netw ork testing, including the Spirent test center system. Ev aluations of statistical signicance emplo yed the student t-test at an alpha le v el of 0.05. Multi f actor analyses incorporated ANO V A techniques to ensure rob ust comparisons [32]. 6. RESUL TS AND D A T A AN AL YSIS W e create a comprehensi v e netw ork testing and visualization system to e v aluate the 6 critical par am- eters as sho wn in table abo v e for the 100-node W OC netw ork. This will include interacti v e simulations and real-time parameter analysis. The inte grated dashboard displays k e y performance indicators (KPIs) for the net- w ork t o simulate the interconnected nodes. Finally , the netw ork performs well o v erall, especially in the areas of security , throughput, and line of sight. The main challenge noted is interference, which may need further impro v ement. Security ag ainst ea v esdropping by performing the ef fecti v eness of security measures w as e v aluat ed using systematic penetration testing across the full deplo yment period. Performance at the ph ysical layer for security aspects sho wed reasonable consistenc y o v erall. The mean ef fecti v eness reached 91.3%. A standard de viation of 3.8% accompanied that gure. V alues spanned a range from 85.1% to 96.7% in the observ ations. Evidence also points to a notable ne g ati v e correlation with beam di v er gence. That correlation v alue stood at r equal to minus 0.87. Statistical signicance held with p less than 0.001. Results from the penetration testing appear in T able 1. T able 1. Metrics for e v aluation P aremeter W OC (FSO/VLC) RF-Based 5G Security ag ainst ea v esdropping High (requires ph ysical interception) Lo w (can be intercepted remotely) Resistance to jamming High (no RF interference) Lo w (susceptible to RF jamming) Interference impact Immune to EMI Af fected by EMI Data transmission speed High (Gbps-le v el) Moderate to High Reliability in bad weather Lo w (af fected by fog/rain) High Line-of-sight requirement Required Not required 7. CONCLUSION W OC based 5G communication of fers superior security compared to RF netw orks, with higher resistance to ea v esdropping and jamming. Ho we v er , en vironmental f actors lik e fog and obstacles af fect optical communication, requiring h ybrid approaches (RF + W OC). Future w ork: implement AI-dri v en beam alignment and adapti v e W OC netw orks to impro v e reliability . Run multiple trials and record data using netw ork analysis tools. Compare results with e xisting research and publish in IEEE, Else vier , or c yber security journals. Use Enhancing cyber security in 5G networks systems thr ough optical... (Iyas Abdullah Alodat) Evaluation Warning : The document was created with Spire.PDF for Python.
256 ISSN: 2502-4752 MA TLAB or Python to visualize performance metrics with graphs. Netw ork performs well o v erall, particularly in the areas of security , throughput, and line of sight . V isually , the chart demonstrates that the netw ork’ s per - formance in security , jamming resistance, and line of sight e xibi lity is better than its performance in weather resistance or reliability . At the end of this w ork, we conclude that W OC re p r esents an ef fecti v e solution to c y- ber security problems in 5G netw orks. It pro vides ef fecti v e and better data protection and is dif cult to disrupt using quantum cryptograph y techniques. W OC will play a greater role in ensuring the security of upcoming 5G communications, despite the challenges i dentied during the w ork, such as atmospheric interference and reliance on line-of-sight. This success is attrib uted to impro v ements in AI, h ybrid netw orking, and adapti v e optics technologies. FUNDING INFORMA TION The authors ha v e no rele v ant nancial or non-nancial interests to disclose. A UTHOR CONTRIB UTIONS This journal uses the C o nt rib utor Roles T axonomy (CRediT) to recognize indi vidual author contrib u- tions, reduce authorship disputes, and f acilitate collaboration. Name of A uthor C M So V a F o I R D O E V i Su P Fu Iyas Abdullah Alodat Shadi Al-Khateeb C : C onceptualization I : I n v estig ation V i : V i sualization M : M ethodology R : R esources Su : Su pervision So : So ftw are D : D ata Curation P : P roject Administration V a : V a lidation O : Writing - O riginal Draft Fu : Fu nding Acquisition F o : F o rmal Analysis E : Writing - Re vie w & E diting CONFLICT OF INTEREST The authors declare no conict of interest. D A T A A V AILABILITY - Data a v ailability is not applicable to this paper as no ne w data were created or analyzed in this study . REFERENCES [1] Huong et al. , ”Lock edge: Lo w comple xity c yberattack detection in IoT edge computing, IEEE Access , v ol. 9, pp. 29696–29710, 2021. [2] Ha diningrum et al. , ”Surv e y on risks c yber security in edge computing for the Internet of Things: Understanding c yber attacks, threats, and mitig ation, JUTI: J urnal Ilmiah T eknolo gi Informasi , pp. 29–50, 2025. [3] N. Innab et al. , ”Phishing attacks detection using ensemble machine learning algorithms, Computer s, Materials & Continua , v ol. 80, no. 1, 2024. [4] I . A. Alimi and P . P . Monteiro, ”Re v olutionizing free-space optics: A surv e y of enabling technologies, challenges, trends, and prospects of be yond-5G free-space optical communication systems, Sensor s , v ol. 24, no. 24, Art. no. 8036, 2024. [5] M . Lehto, ”Cyber -attacks ag ainst critical infrastructure, in Cyber Security: Critical Infr astructur e Pr otection . Cham, Switzerland: Springer , pp. 3–42, 2022. [6] T . K oonen et al. , ”Ult ra-high-capacity wireless communication by means of steered narro w optical beams, Philosophical T r ansac- tions of the Royal Society A , v ol. 378, no. 2169, Art. no. 20190192, 2020. [7] A. T usha and H. Arslan, ”Interference b urden in wireless communications: A comprehensi v e surv e y from PHY layer perspecti v e, IEEE Communications Surve ys & T utorials , 2024. [8] B. Gu et al. , ”Breaking the interference and f ading gridlock in backscatter communications: State-of-the-art, design challenges, and future directions, IEEE Communications Surve ys & T utorials , 2024. [9] H. Attar et al. , ”B5G applications and emer ging services in smart IoT en vironments, International J ournal of Cr owd Science , v ol. 9, no. 2, pp. 79–95, 2025. [10] Y . Zhang et al. , ”Joint U A V trajectory and po wer allocation with h ybrid FSO/RF for secure space–air –ground communications, IEEE Internet of Things J ournal , v ol. 11, no. 19, pp. 31407–31421, 2024. Indonesian J Elec Eng & Comp Sci, V ol. 44, No. 1, January 2026: 250–257 Evaluation Warning : The document was created with Spire.PDF for Python.
Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752 257 [11] I. B. Djordje vic, ”Quantum k e y distrib ution (QKD) fundamentals, in Physical-Layer Security , Quantum K e y Distrib ution, and P ost-Quantum Crypto gr aphy . Cham, Switzerland: Springer , pp. 305–362, 2025. [12] O. A. Qasim and S. Golshanna v az, ”Enhancing data security using a multi-layer encryption system, International J ournal of Electrical & Computer Engineering , v ol. 15, no. 2, 2025. [13] B. A. V ijayalakshmi, et al. , Smart city lighting with solar -po wered VLC-enabled LEDs using ADO-OFDM for s ustainable com- munication and illumination, J ournal of Optics , pp. 1–8, 2025. [14] Z. T . Y aseen and M. Alghrairi, ”City lights re v olution: Ne xt-generation optical bre for smart cities, Opto-Electr onics Re vie w , v ol. 32, 2024. [15] B. A. Gur and J. K ulesza, ”Equitable access to s atellite broadband services: Challenges and opportunities for de v eloping countries, T elecommunications P olicy , v ol. 48, no. 5, Art. no. 102731, 2024. [16] S. Salim, N. Moustaf a, and M. Reisslein, ”Cybersecurity of satellite communications systems: A comprehensi v e surv e y of the space, ground, and links se gments, IEEE Communications Surve ys & T utorials , v ol. 27, no. 1, pp. 372–425, 2024. [17] M. Mrabet and M. Sliti, ”Performance analysis of FSO communications in desert en vironments, Optical and Quantum Electr onics , v ol. 56, no. 4, Art. no. 659, 2024. [18] T . K. Oik onomou et al. , ”Cross-band modulation design for h ybrid RF-optical systems, IEEE T r ansactions on Co gnitive Commu- nications and Networking , 2025. [19] M. Y ¨ ucel and M. Ac ¸ ıkg ¨ oz, ”Optical communication infrastructure in ne w generation mobile netw orks, F iber and Inte gr ated Optics , v ol. 42, no. 2, pp. 53–92, 2023. [20] A. Dhar Dwi v edi et al. , ”Blockchain and articial intelligence for 5G-enabled Internet of Things: Challenges, opportunities, and solutions, T r ansactions on Emer ging T elecommunications T ec hnolo gies , v ol. 35, no. 4, Art. no. e4329, 2024. [21] M. S. Rahman et al. , ”Blockchain-of-blockchains: An interoperable blockchain platform for ensuring IoT data inte grity in smart city , J ournal of Industrial Information Inte gr ation , v ol. 30, Art. no. 100408, 2022. [22] S. Khalighi and M. Uysal, ”Surv e y on free space optical communication: A communication theory perspecti v e, IEEE Communi- cations Surve ys & T utorials , v ol. 16, no. 4, pp. 2231–2258, 2014. [23] I. I. Kim, B. McArthur , and E. J. K ore v aar , ”Comparison of laser beam propag ation at 785 nm and 1550 nm in fog and haze for optical wireless communications, Pr oc. SPIE , v ol. 4214, pp. 26–37, 2001. [24] P . H. P athak et al. , ”V isible light communication, netw orking, and sensing: A surv e y , potential and challenges, IEEE Communi ca- tions Surve ys & T utorials , v ol. 17, no. 4, pp. 2047–2077, 2015. [25] H. Ha as et al. , ”A surv e y on visible light communication, Pr oceedings of the IEEE , v ol. 105, no. 2, pp. 224–240, 2016. [26] D. K edar and S. Arnon, ”Urban optical wireless communication netw orks: The main challenges and possible solutions, IEEE Communications Ma gazine , v ol. 42, no. 5, pp. S2–S7, 2004. [27] J . C. Juarez et al. , ”Free-space optical communications for ne xt-generation military netw orks, IEEE Communications Ma gazine , v ol. 44, no. 11, pp. 46–51, 2006. [28] I. A lodat, ”Protection of Nurse-Sys platform from man-in-the-middle attack, in Pr oc. ICISA T , Springer , p. 146, 2023. [29] R . Jain and S. Routhier , ”P ack et trains: Measurements and a ne w model for computer netw ork traf c, IEEE J ournal on Selected Ar eas in Communications , v ol. 4, no. 6, pp. 986–995, 1986. [30] S . Ross Intr oduction to Pr obability Models , 11th ed. Amsterdam, The Netherlands: Else vier , 2014. [31] W . W eib ull, ”A statistical distrib ution function of wide applicability , J ournal of Applied Mec hanics , v ol. 18, no. 3, pp. 293–297, 1951. [32] D . C. Montgomery Design and Analysis of Experiments , 9th ed. Hobok en, NJ, USA: W ile y , 2017. BIOGRAPHIES OF A UTHORS Iyas Abdullah Alodat he is an associate professor in the Colle ge of Computer Science and Information T echnology at Jerash Uni v ersity , Jordan. He holds a Ph.D. in computer and information technology , specializing in Netw ork Systems. His research e xpertise spans netw ork security , AI, and the IoT . He is also in v olv ed in a biomedical signal analysis research lab, with specic interests in image and signal processing, biometrics, and medical image analysis. He can be contacted at e yas.odat@jpu.edu.jo. Shadi Al-Khateeb he is an assistant professor in the Department of Computer Netw orks at Jerash Uni v ersity . He earned his Ph.D. in netw ork ed systems from the Uni v ersity of Pittsb ur gh, P A, USA, in 2021. His research interests focus on AI, netw orking, and sec urity . He can be contacted at shadi.alkhateeb@jpu.edu.jo. Enhancing cyber security in 5G networks systems thr ough optical... (Iyas Abdullah Alodat) Evaluation Warning : The document was created with Spire.PDF for Python.