<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>J. Boiko);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Neural Network-Based Secure Beam Management in 5G Networks for Cyberspace Protection</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Juliy Boiko</string-name>
          <email>boiko_julius@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ilya Pyatin</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Khmelnytskyi National University</institution>
          ,
          <addr-line>11</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Khmelnytskyi Polytechnic Professional College by Lviv Polytechnic National University</institution>
          ,
          <addr-line>10, Zarichanska str., Khmelnytskyi, 29019</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>str.</institution>
          ,
          <addr-line>Khmelnytskyi, 29016</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2026</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>This paper proposes a neural network-based secure beam management method in fifth-generation (5G) wireless networks to reduce signaling overhead, enhance spatial transmission accuracy, and strengthen communication resilience in cyberspace. A synchronization signal block (SSB) is generated using New Radio (NR) synchronization signals, where each beam scans specific azimuth and elevation directions. The beams propagate through a spatial scattering channel and are received using multiple receive beams. For each transmit-receive beam pair, the reference signal received power (RSRP) is measured to identify the optimal pair with the highest signal strength. Key performance indicators such as RSRP, received signal strength indicator (RSSI), and reference signal signal-to-noise ratio (RSRQ) are analyzed across various bandwidths. A heatmap of RSRP values provides a visual overview of optimal beam pairings. To support secure and intelligent beam selection, a neural network (NN) is trained to predict the best beam pair based exhaustive search among them to select the one with the highest average RSRP. By minimizing overhead signaling, the method reduces the attack surface of the control plane. The model is compared with k-nearest neighbors (KNN), statistical, and random selection methods. The NN-based approach, along with statistical and random methods, achieves near 100% accuracy, while KNN lags by approximately 20%. The results confirm the value of NN-driven beam selection in enhancing robust and protected 5G communications.</p>
      </abstract>
      <kwd-group>
        <kwd>beam management</kwd>
        <kwd>neural network</kwd>
        <kwd>secure communication</kwd>
        <kwd>beam pair selection</kwd>
        <kwd>5G</kwd>
        <kwd>location1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The exponential growth in data demand and the proliferation of connected devices have positioned
fifth-generation (5G) wireless networks as the backbone of next-generation mobile communications
[
        <xref ref-type="bibr" rid="ref1">1, 2</xref>
        ]. As critical infrastructure increasingly relies on wireless connectivity, ensuring secure,
resilient, and efficient communication in 5G environments becomes paramount. One of the key
technologies enabling high data rates and ultra-low latency in 5G is the use of millimeter-wave
(mmWave) frequency bands [3]. However, while mmWave offers wider bandwidth and high
throughput, it also introduces new cyber-physical challenges, including vulnerability to jamming,
eavesdropping, and link disruption due to severe path loss and signal blockage. These issues affect
not only performance but also the integrity and availability of wireless communication channels.
      </p>
      <p>To overcome these physical limitations, beamforming and beam management are essential. These
techniques allow directional transmission and reception using multiple antenna arrays, focusing the
radio energy towards specific directions. In the context of 5G NR [4], the initial access procedure
typically relies on exhaustive beam sweeping, where each possible transmit-receive beam pair is
evaluated to identify the one offering the highest RSRP [5, 6]. While this method ensures reliable
initial access, it becomes increasingly inefficient and resource-intensive as the number of antennas
and beam combinations grows. For example, a system with 64 transmit and 64 receive beams leads
to 4096 possible combinations, requiring up to 320 ms for full bidirectional sweeping, which is
impractical in dynamic or latency-critical environments.</p>
      <p>To address these bottlenecks, recent research has shifted toward smart beam management
solutions using machine learning (ML), and particularly NNs [7-9]. These approaches aim to reduce
scanning overhead by predicting the most suitable beam pairs based solely on readily available input,
scanning.</p>
      <p>This paper investigates the implementation of a NN-based beam selection framework that
predicts the top K candidate beam pairs, significantly reducing access latency and signaling
overhead. The model is trained on synthetic data generated through detailed simulation of receiver
positions and scattering environments. Each data sample maps a set of UE coordinates to the optimal
beam pair index determined through exhaustive search. During inference, the network suggests K
promising beam combinations, among which the final choice is made based on RSRP evaluation.
Simulation results show that the proposed approach achieves over 90% Top-K accuracy with K=8,
cutting scanning delay by up to 75% compared to exhaustive search. Moreover, the predicted beam
pairs yield RSRP values nearly equivalent to the true optimum, validating the practicality of the
method.</p>
      <p>While mmWave technology enables high-throughput communication, its practical deployment is
hindered by significant computational complexity, scanning latency, and signaling overhead during
beam alignment. Traditional heuristic methods like KNN [10] or frequency-based statistical
estimations often lack adaptability and generalization in complex or dynamic propagation
environments.</p>
      <p>The main objective of this work is to design, train, and evaluate a smart NN model for efficient
beam selection in 5G mmWave networks. The focus is on minimizing the beam scanning burden
while maintaining high beam selection accuracy and robust signal quality.</p>
      <p>To achieve the research objectives, a series of tasks were carried out. First, a synthetic dataset
was generated by simulating beam sweeping results for various UE locations. For each receiver
position, the optimal beam pair was identified using exhaustive evaluation to serve as ground truth.
A NN was then trained to map GPS coordinates of the UE to the corresponding beam pair indices.
The model's performance was assessed using metrics such as Top-K classification accuracy and
average RSRP. Finally, the proposed method was compared with baseline approaches, including
KNN, statistical, and random beam selection methods, to highlight its advantages in terms of
accuracy and efficiency.</p>
      <p>With the rollout of densely deployed 5G networks [11, 12] and the growing demand for
ultrareliable and low-latency communication (URLLC) [13], the need for intelligent and scalable beam
management becomes increasingly critical. The integration of s into the beam selection pipeline
transforms the traditionally static and computationally intensive procedure into a smart and adaptive
process. This approach not only accelerates initial access and improves energy efficiency but also
lays the foundation for future wireless systems, including 6G, where real-time learning, context
awareness, and AI-driven decision-making will be fundamental to network operation.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Beam Management Procedures in 5G NR Systems</title>
      <p>Beam management is a critical functionality in 5G NR, particularly in the millimeter wave (mmWave)
frequency bands where highly directional transmission and reception are required to overcome
severe path losses. The process includes several key procedures such as beam sweeping, beam
measurement, beam determination, beam refinement, and beam recovery. These procedures are
performed during the initial access and throughout the connection to maintain optimal
communication quality.</p>
      <p>During the initial access stage (Procedure P-1), the gNB (next-generation Node B) transmits SSBs
[14] in the form of a beam-sweeping package across the coverage sector. Concurrently, the UE (User
Equipment) scans its reception beams to perform a bidirectional search. For each transmitter
receiver beam pair, the RSRP is measured at the physical layer. Based on the RSRP measurements,
the system determines the optimal transmit receive beam pair. At the MAC layer, the UE reports
the strongest beam pairs (Beam Reporting) to the gNB. Once a suitable beam pair is established, it is
locked for future data transmission and control signaling. In the case of a link failure, the system
may initiate re-scanning or switch to a backup beam, enabling robust Beam Recovery.</p>
      <p>Figure 1 illustrates the core steps of the initial access procedure (P-1), along with beam refinement
methods P-2 and P-3.</p>
      <p>After initial access, beam refinement is essential for optimizing the transmission link, especially
in dynamic or high-mobility scenarios. Procedure P-2 (Transmit-End Refinement) involves the gNB
performing a fine-grained scan of transmit beams using Channel State Information Reference Signals
(CSIvalues and reports the best performing transmit beam. Procedure P-3 (Receive-End Refinement),
transmit beam and allows the UE (or gNB, in uplink) to scan its receive
beams. CSI-RS (for DL) or Sounding Reference Signals (SRS) (for UL) are used for beam quality
assessment, enabling selection of the optimal receive beam.</p>
      <p>In cases of link degradation or beam failure, Beam Failure Recovery (BFR) is activated. This
involves either reusing previously measured backup beams or re-initiating P-1 sweeping to find a
new suitable beam pair. BFR ensures communication continuity even under mobility or blockage
conditions.</p>
      <p>Traditional P-1 procedures involve exhaustive sweeping of all possible beam pairs, which
becomes computationally intensive as the number of antennas increases. ML techniques can
dramatically reduce this overhead. By using input data such as UE GPS coordinates, a NN can predict
the top K most promising beam pairs, thereby reducing the number of measurements required.</p>
      <p>ML-based prediction modules can replace the traditional exhaustive sweeping block during:
•
•
initial Access (P-1). (ML reduces beam search space and accelerates access time).
beam Recovery. (In case of beam failure, the model quickly suggests new candidate beam
pairs based on context).</p>
      <p>Figure 2 presents the detailed signal processing stages for P-1. Beam management functions are
highlighted for clarity.</p>
      <p>We investigated the NR SSB beam sweeping simulation model. The simulation setup incorporates
a variety of configurable parameters that define the beam sweeping environment and signal
acquisition behavior. These include the cell identity (Cell ID), the selected frequency range either
FR1 or FR2 and the corresponding central carrier frequency. The SSB pattern is chosen based on
the frequency range: types A, B, or C for FR1, and types D or E for FR2, with each pattern implicitly
determining the subcarrier spacing. The number of transmitted SSBs also varies, with typical
configurations of 4 or 8 beams for FR1 and up to 64 beams for FR2. Transmit and receive antenna
arrays are modeled as Uniform Rectangular Arrays (URA), with independently configurable
horizontal and vertical dimensions. Beam scanning is conducted across specified azimuth and
elevation ranges, with optional activation of elevation sweeping. Additionally, the simulation
accounts for signal-to-noise ratio (SNR) in decibels and supports different reference RSRP
measurement modes such as 'SSSonly' or 'SSSwDMRS' to evaluate synchronization signal quality.</p>
      <p>Figure 3 shows a spectrogram of the synchronization signal package at 35 GHz. Figures 4 a and 4
b illustrate the transmit and receive array response patterns, respectively.</p>
      <p>For each transmit receive beam pair, RSRP is evaluated. A beam pair with the highest RSRP is
selected (e.g., Transmit #40 and Receive #9 yielding 29.0963 dBm).</p>
      <p>The channel state information (CSI) acquisition process involves three primary types of reference
signal measurements. RSRP quantifies the strength of the received CSI reference signal and serves
as a key indicator of signal coverage. RSSI captures the total power received within the channel,
encompassing both useful signal components and unwanted interference or background noise. RSRQ
provides a normalized metric for link quality by expressing the ratio of RSRP to RSSI, offering insight
into signal clarity in noisy or congested environments. Figures 5 7 demonstrate the dependence of
RSRP, RSSI, and RSRQ on the interference level (Noc in dBm). Figure 8 provides an RSRP map for all
beam pairs.
gNB, ensuring that every transmit beam is captured by each of the M receive beams at the UE side.
In our study, both N and M are set equal to the number of SS blocks in a single SSB burst. Figure 10
illustrates a beam-domain representation of the sweeping procedure at both the gNB and UE sides,
assuming N=M=8 in the azimuth plane.</p>
      <p>In 5G NR, a complete SSB burst comprising 8 SS blocks is transmitted every 20 ms. Therefore,
achieving full bidirectional beam sweeping over all 8×8 beam pair combinations requires 160 ms to
complete. The diagram highlights the timing structure of this dual sweeping process, where each
horizontal segment corresponds to an individual SSB transmission at the gNB, and each vertical
segment represents an SSB burst at the UE. This implementation realizes full bidirectional scanning
across N×M time instances.</p>
      <p>After the completion of beam sweeping and measurement on both the transmitter and receiver
sides, the optimal beam pair is selected based on the highest RSRP measurement. The resulting
visualizations highlight the transmit and receive beam patterns as well as the spatial scene (Figure
11). The outcomes depend on the specific beam directions used during the sweeping procedure. The
spatial scene illustrates the configuration of the transmit and receive antenna arrays, the selected
optimal beam pair, and the location of the scatterer.</p>
      <p>Figure 12 presents the RSRP matrix visualization obtained in our study, allowing us to identify
which transmitter-receiver pair delivers the strongest signal level.</p>
      <p>Next, we present the study on the downlink beam refinement procedure using the Channel State
Information Reference Signal (CSI-RS). For P-2, the gNB transmits CSI-RS using narrowly focused
beams. The system configuration includes a 50 MHz carrier bandwidth with 30 kHz subcarrier
spacing, a 2D antenna array setup with precise location configuration, calculation of free-space path
loss combined with the application of a spatial MIMO channel model (16), and receiver noise
modeling (17) based on the Boltzmann constant, bandwidth, and equivalent noise temperature.</p>
      <p>Figure 13 illustrates the key stages of the downlink beam refinement procedure processing at the
transmitter.</p>
      <p>Time synchronization is achieved by cross-correlating the received reference symbols with a local
copy of the NZP-CSI-RS symbols. To establish the initial reception beam direction ideally aligned,
either partially or fully, with the position of the scatterer we examine the beamwidth variation as
a function of the steering direction in a three-dimensional plane (Fig. 14). Beams pointing near the
central direction of propagation exhibit narrower widths, while at the edges of the steering range
(±60° in azimuth), the beam becomes wider due to stronger sidelobes. The plot in Figure 14 illustrates
how the azimuthal beamwidth changes when steering across different directions.</p>
      <p>Next, we present the constructed MIMO scattering scenario, which includes the transmit and
receive antenna arrays, the positions and paths of the scatterers, as well as the radiation patterns of
both the transmitting and receiving arrays (Figure 15).</p>
      <p>Below, we present our study on the refined beamwidth as a function of the number of transmit
antennas (Figure 16).</p>
      <p>When the number of antennas in the array is a power of two, the refined beamwidths in both
azimuth and elevation are equal. Once the number of antenna elements (18)
increases result in only marginal beamwidth reduction approximately 5° when scaling from 128 to
1024 elements.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Neural Network for Beam Selection</title>
      <sec id="sec-3-1">
        <title>In our research, a neural model [19]</title>
        <p>
          GPS coordinates [
          <xref ref-type="bibr" rid="ref4">20</xref>
          ], following the methodology previously outlined. Assuming fixed positions for
the
location with the index of the actual optimal beam pair, determined via exhaustive search across all
transmit receive beam combinations.
of candidate beam pair indices. During inference, the network first proposes a set of K candidate
pairs. Instead of exhaustively scanning all beams, we then evaluate only these K, calculating the
average RSRP for each. The beam pair with the highest average RSRP among them is chosen as the
final predicted beam.
        </p>
        <p>This approach significantly reduces the search space and access latency while retaining
close-tooptimal performance by leveraging location-based prediction combined with limited exhaustive
evaluation.</p>
        <p>A schematic overview of the NN training process is shown in Figure 17, whereas Figure 18 depicts
the testing process.</p>
        <p>We carried out the preparation for initial data generation. Receiver positions are randomly placed
along the edges of a 6×6 m² area. Each receiver supports 16 transmit receive beam pair combinations,
formed using 4 analog beams at both ends and a single RF chain. The beam selection is based on an
exhaustive scan across all beam pairs, conducted under AWGN conditions. The configuration
remains fixed for the transmitter and scatterers in all simulations. For each receiver location, four
independent channel realizations are simulated. The beam pair with the highest average RSRP is
assigned as the optimal one. This label is used as the ground truth for supervised learning (Figure
19). To train a neural classifier, beam pair labels are converted into categorical values. The output
space is defined for 16 classes, covering all possible combinations. Padding is applied if needed to
maintain uniform dimensionality across samples. The labeled dataset reveals clear spatial grouping
of beam indices, with neighboring receivers often sharing the same optimal pair. This reflects the
directional properties of the environment and is shown in Figure 20.</p>
        <p>The NN was trained using a four-layer hidden architecture, where the positions of the receivers
were also incorporated as part of the input features, as illustrated in Figure 21.</p>
        <p>
          As depicted in Figure 21, the final fully connected layer is followed by a Softmax layer [
          <xref ref-type="bibr" rid="ref5">21</xref>
          ] and
subsequently by a classification layer. The activation function of the output block is the Softmax
function, which is mathematically represented below:
        </p>
        <p>exp ((ar (x))
yr (x) = k
 exp ((a j (x))
j=1
k
where 0  yr  1 and  y j = 1.</p>
        <p>j=1</p>
        <p>The Softmax function was used as the activation function of the output block after the final fully
connected layer for multi-class classification tasks.</p>
        <p>P(cr | x, ) = k
 P(x, | c j )P(c j )
j=1</p>
        <p>P(x, | cr )P(cr ) = k
 exp ((a j (x, ))
j=1
exp ((ar (x, ))
k
where 0  P(cr | x, )  1 and  P(cr | x, ) = 1 ; ar = ln(P(x, | cr )P(cr )), P(x, | cr ) this is
j=1
the conditional probability of the sample given the class r ; P(cr ) is the prior probability of class.</p>
        <p>
          The Softmax function, also known as the normalized exponential, can be considered a multi-class
generalization of the logistic sigmoid function [
          <xref ref-type="bibr" rid="ref6 ref7">22, 23</xref>
          ]. Class weighting was applied, meaning that
more frequent classes were assigned lower weights, while less frequent ones received higher weights
[
          <xref ref-type="bibr" rid="ref8">24</xref>
          ]. As a result, the weights of the second hidden layer in three-dimensional space are visualized in
Figure 22.
(1)
(2)
        </p>
        <p>
          To evaluate Top-K accuracy [
          <xref ref-type="bibr" rid="ref10 ref9">25, 26</xref>
          ], multiple approaches were compared. Specifically, the trained
NN was tested using the
Topfirst outputs a set of K candidate beam pairs. It then performs an exhaustive sequential search among
these K pairs, selecting the one with the highest average RSRP as the final prediction. A prediction
is considered successful if the truly optimal beam pair is selected as the final output. Alternatively,
success also occurs if the optimal beam pair is among the K candidates proposed by the NN.
        </p>
        <p>Four different beam selection strategies were evaluated, each producing K recommended beam
pairs:
•
•
•
•</p>
        <p>Proposed NN The primary method developed in this work, which infers K candidate beam
pairs based on the input features.</p>
        <p>K-Nearest Neighbors (KNN) For each test sample, this method locates the K nearest training
samples based on GPS coordinates. The associated beam pairs of these training samples are
then recommended. Since each training instance is linked to a single optimal beam pair, the
total number of recommended beam pairs does not exceed K.</p>
        <p>Statistical Method This approach ranks all beam pairs by their empirical frequency in the
training dataset and selects the top K most common ones as recommendations.</p>
        <p>Random Selection For each test instance, this baseline method randomly selects K beam
pairs from the available pool.</p>
        <p>Our results indicate the following: as shown in Figure 23, with K=8, the Top-K accuracy already
exceeds 90%, highlighting the effectiveness of the trained NN for beam selection tasks. At K=16, each
method effectively performs an exhaustive search over all 16 candidate beam pairs. The proposed
NN, along with the statistical and random methods, achieves an accuracy close to 100%. In contrast,
the KNN method performs approximately 20% worse, primarily because the optimal beam pair is not
always present among the nearest neighbors.</p>
        <p>
          Using the test dataset, the average RSRP achieved by the NN was calculated employing four
distinct methods [
          <xref ref-type="bibr" rid="ref11 ref12">27, 28</xref>
          ]. The graph (Figure 24) demonstrates that applying the trained NN [
          <xref ref-type="bibr" rid="ref13">29</xref>
          ]
results in an average RSRP value approaching that of the optimal search [
          <xref ref-type="bibr" rid="ref14">30</xref>
          ].
        </p>
        <p>The performance gap between KNN and optimal methods suggests that KNN may operate
inefficiently, even when considering a larger set of beam pairs, such as 256. An investigation was
conducted on the developed NN operating at a carrier frequency of 35 GHz, utilizing 64
synchronization signal blocks. These signal blocks are transmitted sequentially with a 5 ms interval.
There are N=64 transmitting beams and M=64 receiving beams, resulting in a total of 64×64 = 4096
beam combinations. Each SSB (64 beams) is sent every 5 ms. If a mobile user scans one direction per
11
synchronization block, completing a full scan of all 64 receiving beams takes 64×5 ms=320 ms. Since
4096 beam pairs (transmitter receiver combinations) must be checked, and the mobile user changes
direction every 5 ms, a full two-way sweep also requires 320 ms. By employing a NN and scanning
only 16 beam pairs, the maximum scanning duration reduces to 16×5 ms=80 ms, which is four times
faster compared to an exhaustive search through all possible beam pairings.</p>
        <p>
          In addition to performance optimization, the proposed NN-based beam management framework
also contributes to the protection of the 5G control plane [
          <xref ref-type="bibr" rid="ref15">31</xref>
          ]. By significantly narrowing the beam
search space and limiting the number of signaling exchanges required during the initial access phase,
the system minimizes the exposure of synchronization and reference signals to potential interception
or spoofing. This is particularly important in densely deployed networks, where frequent and
repetitive control signaling can become a vector for adversarial attacks such as jamming or beam
hijacking [
          <xref ref-type="bibr" rid="ref16 ref17 ref18">32, 33, 34</xref>
          ].
        </p>
        <p>Moreover, leveraging spatial awareness and predictive modeling allows the network to make
intelligent beamforming decisions without broadcasting full sweeping patterns. This approach
inherently reduces the amount of observable overhead traffic, thereby shrinking the attack surface
and improving the privacy of user equipment (UE) location and movement patterns. In this sense,
the use of neural networks not only enhances efficiency but also introduces a form of implicit spatial
protection a valuable trait for modern and future wireless systems operating in adversarial
environments.</p>
        <p>Three-dimensional diagrams of mobile user and transmitter (red square) placement scenarios for
training (testing) the NN are shown in Figures 25 and b.</p>
        <p>a
b</p>
        <p>A study was conducted on applying a NN to the beam selection process in 5G NR systems. The
design and training of a NN capable of outputting a set of K optimal beam pairs were carried out. By
limiting the exhaustive beam search to only these selected K pairs, scanning overhead can be
significantly reduced.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusion</title>
      <p>This study investigates beam management in 5G systems with a focus on neural networks (NNs)
to reduce signaling overhead and enhance secure communication. By minimizing the amount of
control signaling and improving spatial transmission accuracy, the proposed approach strengthens
protection against interference, eavesdropping, and other threats in the cyberspace domain. Signal
processing schemes for R-1 and R-2 procedures are presented, with CSI-RS metrics (RSRP, RSSI,
RSRQ) confirming minimal interference and stable propagation channels. Changing FFT points from
512 to 4096 shows negligible impact on system performance. Beam Sweeping analysis demonstrates
that transmitting eight SSB blocks every 20 ms leads to a bilateral sweep time of 160 ms (8 Tx × 8
Rx) when the UE changes direction per SSB packet. Path loss analysis reveals that at 700 meters,
increasing the frequency from 0.9 to 45 GHz raises path loss by 35 dB, while RMS noise at the receiver
drops by 55 dB. Beamwidth studies indicate that increasing antenna elements and inter-element
spacing narrows the beam. For instance, a
32narrower widths, while those at ±60° widen due to sidelobes. In elevation, beamwidth is narrowest
at 0° and increases toward ±30° and ±60°, impacted by vertical array size. With 32 elements, allowable
angular offset doubles from ±15° to ±30° without beam broadening; further offset increases
beamwidth exponentially. For antenna arrays with power-of-two element counts, azimuth and
elevation beamwidths become equal, and increasing beyond 128 elements yields only marginal (~5°)
improvement. The developed NN architecture for beam selection, featuring one input, four hidden,
and one output layer, was benchmarked against KNN, statistical, and random methods. The proposed
NN, as well as the statistical and random strategies, achieved nearly 100% Top-K accuracy, while
KNN lagged by about 20% due to suboptimal neighborhood selection. Average RSRP values show
a 35 GHz setup with 64 synchronization blocks and 4096 beam pairs, exhaustive scanning requires
320 ms. Using the NN to narrow the scan to just 16 beam pairs reduces the access delay to 80 ms
a fourfold speedup.</p>
      <p>Beyond efficiency gains, this NN-based strategy enhances the resilience of 5G communication by
reducing the exposure of synchronization signals to interception or jamming. By limiting the
signaling overhead during beam alignment, the system shrinks the attack surface of the control
plane, contributing to a more secure and adaptive beamforming process. This work demonstrates
that intelligent beam selection is not only critical for performance but also for maintaining
communication integrity in modern, adversarial wireless environments laying groundwork for
scalable and protected operation in future 5G and 6G networks.</p>
    </sec>
    <sec id="sec-5">
      <title>Declaration on Generative AI</title>
      <sec id="sec-5-1">
        <title>The authors have not employed any Generative AI tools.</title>
        <p>[2] I. Pyatin, J. Boiko, V. Kovtun and O. Kovtun. "Radio frequency interface quality assessment in
4G/5G: Effects of IQ imbalance, phase noise, and nonlinearities on error vector magnitude."
PLoS One 20.5 (2025): e0324170. https://doi.org/10.1371/journal.pone.0324170.
[3] X. He, D. Ding and X. Y. Zhang. "An SIW-Based Wideband 5G mmWave Bandpass Filter by
Using Multimode Resonator," IEEE Microwave and Wireless Technology Letters 35.4 (2025):
412-415. https://doi.org/10.1109/LMWT.2025.3533482.
[4] A. Ghosh, A. Maeder, M. Baker and D. Chandramouli. "5G Evolution: A View on 5G Cellular
Technology Beyond 3GPP Release 15." IEEE Access, 7 (2019): 127639-127651.
https://doi.org/10.1109/ACCESS.2019.2939938.
[5] X. Zhou, L. Chen, Y. Ruan and R. Chen. "Indoor Localization With Multi-Beam of 5G New Radio
Signals," IEEE Transactions on Wireless Communications 23.9 (2024): 11260-11275.
https://doi.org/10.1109/TWC.2024.3380737.
[6] E. Gures et al. "Adaptive cell selection algorithm for balancing cell loads in 5G heterogeneous
networks," Alexandria Engineering Journal, 7 (2023): 621-634.
https://doi.org/10.1016/j.aej.2023.04.012.
[7] N. Chukhno et al. "The Use of Machine Learning Techniques for Optimal Multicasting in 5G NR
Systems," IEEE Transactions on Broadcasting, 69.1 (2023): 201-214.
https://doi.org/10.1109/TBC.2022.3206595.
[8] M. S. Sim, Y. -G. Lim, S. H. Park, L. Dai and C. -B. Chae. "Deep Learning-Based mmWave Beam
Selection for 5G NR/6G With Sub-6 GHz Channel Information: Algorithms and Prototype
Validation." IEEE Access, 8 (2020): 51634-51646 https://doi.org/10.1109/ACCESS.2020.2980285.
[9] L. Weedage, C. Stegehuis, and S. Bayhan. "beam-align: Distributed user association for mmWave
networks with multi-connectivity." Computer Networks 270 (2025): 111446.
https://doi.org/10.1016/j.comnet.2025.111446.
[10] X. Yang, Y. Chen, Y. Zhao, J. Pan, J. Guo and D. Yang. "Application of KNN for Linear Array
Pattern Prediction Based on the Active Element Pattern Method." IEEE Antennas and Wireless
Propagation Letters, 22.5 (2023): 1134-1138. https://doi.org/10.1109/LAWP.2023.3234587.
[11] K. Venkateswararao et al. "Using UE-VBS for dynamic virtual small cells deployment and
backhauling in 5G Ultra-Dense networks." Computer Networks 189 (2021): 107926.
https://doi.org/10.1016/j.comnet.2021.107926.
[12] I. Pyatin, J. Boiko, O. Eromenko and I. Parkhomey. "Implementation and analysis of 5G network
identification operations at low signal-to-noise ratio." TELKOMNIKA (Telecommunication
Computing Electronics and Control) 21.3 (2023): 496-505.
http://doi.org/10.12928/telkomnika.v21i3.22893.
[13] R. Kumar, D. Sinwar and V. Singh. "QoS aware resource allocation for coexistence mechanisms
between eMBB and URLLC: Issues, challenges, and future directions in 5G." Computer
Communications 213 (2024): 208-235. https://doi.org/10.1016/j.comcom.2023.10.024.
[14] J. Boiko, I. Pyatin and O. Eromenko, Analysis of Signal Synchronization Conditions in 5G Mobile
Information Technologies, in: Proceedings of the 2022 IEEE 16th International Conference on
Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering
(TCSET), IEEE Press, 2022, pp. 01-06, https://doi.org/10.1109/TCSET55632.2022.9766899.
[15] Ö. Sabuncu and B. Bilgehan. "Novel Statistical Modelling and Optimization Techniques of
Fading Channel Coefficients for 5G Network Performance." Journal of Network and Systems
Management 33.2 (2025): 42. https://doi.org/10.1007/s10922-025-09905-4.
[16] A. Ranjan and B. C. Sahana. Deep learning empowered channel estimation in massive MIMO:
unveiling the efficiency of hybrid deep learning architecture. Journal of Ambient Intelligence
and Humanized Computing 16 (2025): 375 390. https://doi.org/10.1007/s12652-025-04952-w.
[17] T. N. Guo. "Unique Measurement and Modeling of Total Phase Noise in RF Receiver." IEEE
Transactions on Circuits and Systems II: Express Briefs 60.5 (2013): 262-266.
https://doi.org/10.1109/TCSII.2013.2251966.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Patil</surname>
          </string-name>
          et al.
          <article-title>"A comprehensive survey on spectrum sharing techniques for 5G/B5G intelligent wireless networks: Opportunities, challenges and future research directions."</article-title>
          <source>Computer Networks</source>
          <volume>253</volume>
          (
          <year>2024</year>
          ):
          <fpage>110697</fpage>
          . https://doi.org/10.1016/j.comnet.
          <year>2024</year>
          .
          <volume>110697</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>I. R.</given-names>
            <surname>Parhomey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Boiko</surname>
          </string-name>
          and
          <string-name>
            <given-names>O. I.</given-names>
            <surname>Eromenko</surname>
          </string-name>
          .
          <article-title>"Features of digital signal processing in the information control systems of multipositional radar</article-title>
          .
          <source>" Journal of Achievements in Materials and Manufacturing Engineering</source>
          <volume>77</volume>
          .2 (
          <year>2016</year>
          ):
          <fpage>75</fpage>
          -
          <lpage>84</lpage>
          . https://doi.org/10.5604/17348412.1230101.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>F. M.</given-names>
            <surname>Ghannouchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Hammi</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Helaoui</surname>
          </string-name>
          ,
          <source>Neural Network Based Models, in: Behavioral Modeling and Predistortion of Wideband Wireless Transmitters</source>
          , Wiley, New York, NY,
          <year>2015</year>
          , pp.
          <fpage>133</fpage>
          -
          <lpage>152</lpage>
          , https://doi.org/10.1002/9781119004424.ch7.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>S.M.</given-names>
            <surname>Hosseini</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Jalili</surname>
          </string-name>
          .
          <article-title>"An online incremental learning support vector regression for INS/GPS integrated navigation system during long-time GPS outage." GPS Solutions 29(</article-title>
          <year>2025</year>
          ):
          <fpage>164</fpage>
          . https://doi.org/10.1007/s10291-025-01900-1.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>A.</given-names>
            <surname>Banerjee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Kumar</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Megavath</surname>
          </string-name>
          .
          <article-title>"Learning optimal deep prototypes for video retrieval systems with hybrid SVM-softmax layer."</article-title>
          <source>International Journal of Data Science and Analytics</source>
          (
          <year>2024</year>
          ). https://doi.org/10.1007/s41060-024-00587-w.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [22]
          <string-name>
            <surname>C. -H. Tsai</surname>
            , Y. -T. Chih,
            <given-names>W. H.</given-names>
          </string-name>
          <string-name>
            <surname>Wong</surname>
            and
            <given-names>C. -Y.</given-names>
          </string-name>
          <string-name>
            <surname>Lee</surname>
          </string-name>
          .
          <article-title>"A Hardware-Efficient Sigmoid Function With Adjustable Precision for a Neural Network System."</article-title>
          <source>IEEE Transactions on Circuits and Systems II: Express Briefs 62.11</source>
          (
          <year>2015</year>
          ):
          <fpage>1073</fpage>
          -
          <lpage>1077</lpage>
          . https://doi.org/10.1109/TCSII.
          <year>2015</year>
          .
          <volume>2456531</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>X.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Liao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Zhou</surname>
          </string-name>
          and
          <string-name>
            <given-names>F.</given-names>
            <surname>Peng</surname>
          </string-name>
          .
          <article-title>"Grating Lobe Suppression of Non-Uniform Arrays Based on Position Gradient</article-title>
          and
          <string-name>
            <given-names>Sigmoid</given-names>
            <surname>Function</surname>
          </string-name>
          .
          <article-title>" IEEE Access 7 (</article-title>
          <year>2019</year>
          ):
          <fpage>106407</fpage>
          -
          <lpage>106416</lpage>
          . https://doi.org/10.1109/ACCESS.
          <year>2019</year>
          .
          <volume>2932123</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>O.</given-names>
            <surname>Shynkaruk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Boiko</surname>
          </string-name>
          and
          <string-name>
            <given-names>O.</given-names>
            <surname>Eromenko</surname>
          </string-name>
          ,
          <article-title>Measurements of the energy gain in the modified circuit signal processing unit</article-title>
          ,
          <source>in: Proceedings of the 2016 IEEE 13th International Conference on Modern Problems of Radio Engineering</source>
          , Telecommunications and Computer Science (TCSET), IEEE Press,
          <year>2016</year>
          , pp.
          <fpage>582</fpage>
          -
          <lpage>584</lpage>
          , https://doi.org/10.1109/TCSET.
          <year>2016</year>
          .
          <volume>7452121</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Huo</surname>
          </string-name>
          and
          <string-name>
            <given-names>X. Chen. "Fast</given-names>
            <surname>Top-K Graph Similarity Search Via Representative Matrices</surname>
          </string-name>
          .
          <article-title>" IEEE Access 6 (</article-title>
          <year>2018</year>
          ):
          <fpage>21408</fpage>
          -
          <lpage>21417</lpage>
          . https://doi.org/10.1109/ACCESS.
          <year>2018</year>
          .
          <volume>2819426</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sasaki</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Okajima</surname>
          </string-name>
          ,
          <article-title>Top-k Rule List Learning via Integer Linear Programming</article-title>
          , in: R. Hadfi,
          <string-name>
            <given-names>P.</given-names>
            <surname>Anthony</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Ito</surname>
          </string-name>
          ,
          <string-name>
            <surname>Q.</surname>
          </string-name>
          Bai (Eds.),
          <source>Trends in Artificial Intelligence. PRICAI 2024. Lecture Notes in Computer Science</source>
          , Springer, Singapore,
          <volume>15285</volume>
          (
          <year>2025</year>
          ), pp.
          <fpage>16</fpage>
          <lpage>28</lpage>
          . https://doi.org/10.1007/
          <fpage>978</fpage>
          -981-96-0128-
          <issue>8</issue>
          _
          <fpage>2</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>O. A.</given-names>
            <surname>Jumaev</surname>
          </string-name>
          et al.
          <article-title>"Algorithms for increasing the efficiency of information processing in continuous channels</article-title>
          .
          <source>" Journal of Physics: Conference Series</source>
          <volume>3027</volume>
          (
          <year>2025</year>
          ):
          <fpage>012034</fpage>
          . https://doi.org/10.1088/
          <fpage>1742</fpage>
          -6596/3027/1/012034.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>Y. M.</given-names>
            <surname>Boiko</surname>
          </string-name>
          and
          <string-name>
            <given-names>R. O.</given-names>
            <surname>Boryachok</surname>
          </string-name>
          ,
          <article-title>Improving effectiveness for processing signals in data transmission channels with phase manipulation</article-title>
          ,
          <source>in: Proceedings of the 2013 23rd International Crimean Conference "Microwave &amp; Telecommunication Technology"</source>
          , IEEE Press,
          <year>2013</year>
          , pp.
          <fpage>262</fpage>
          -
          <lpage>263</lpage>
          . https://ieeexplore.ieee.org/document/6652818.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Cai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Chen</surname>
          </string-name>
          and
          <string-name>
            <given-names>Z.</given-names>
            <surname>Qiao</surname>
          </string-name>
          .
          <article-title>"Neural networks trained by weight permutation are universal approximators</article-title>
          .
          <source>" Neural Networks</source>
          <volume>187</volume>
          (
          <year>2025</year>
          ):
          <fpage>107277</fpage>
          . https://doi.org/10.1016/j.neunet.
          <year>2025</year>
          .
          <volume>107277</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ali</surname>
          </string-name>
          et al.
          <article-title>"A k-Nearest Neighbours Based Ensemble via Optimal Model Selection for Regression." IEEE Access 8 (</article-title>
          <year>2020</year>
          ):
          <fpage>132095</fpage>
          -
          <lpage>132105</lpage>
          . https://doi.org/10.1109/ACCESS.
          <year>2020</year>
          .
          <volume>3010099</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>A.I.</given-names>
            <surname>Sulyman</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Henggeler</surname>
          </string-name>
          .
          <article-title>"Physical Layer Security for Military IoT Links Using MIMOBeamforming at</article-title>
          60
          <source>GHz." Information 13.2</source>
          (
          <year>2022</year>
          ):
          <fpage>100</fpage>
          . https://doi.org/10.3390/info13020100.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>H. S. M.</given-names>
            <surname>Antony</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Lakshmanan</surname>
          </string-name>
          .
          <article-title>"</article-title>
          <source>Secure Beamforming in 5G-Based Cognitive Radio Network." Symmetry</source>
          <volume>11</volume>
          .10(
          <year>2019</year>
          ):
          <fpage>1260</fpage>
          . https://doi.org/10.3390/sym11101260.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>K.</given-names>
            <surname>Tsachrelias</surname>
          </string-name>
          et al.
          <article-title>"Robust Protection of 5G MIMO Networks from Jamming Attacks via Adaptive Beamforming."</article-title>
          <source>Procedia Computer Science</source>
          <volume>265</volume>
          (
          <year>2025</year>
          ):
          <fpage>65</fpage>
          -
          <lpage>72</lpage>
          . https://doi.org/10.1016/j.procs.
          <year>2025</year>
          .
          <volume>07</volume>
          .157.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [34]
          <string-name>
            <surname>Samokhvalov</surname>
            ,
            <given-names>Y.Y.</given-names>
          </string-name>
          <article-title>Developing the Analytic Hierarchy Process Under Collective DecisionMaking Based on Aggregated Matrices of Pairwise Comparisons</article-title>
          .
          <source>Cybern Syst Anal</source>
          <volume>58</volume>
          ,
          <fpage>758</fpage>
          <lpage>763</lpage>
          (
          <year>2022</year>
          ). https://doi.org/10.1007/s10559-022-00509-3.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>