Article
Computer Science, Information Systems
Redouane Niboucha, Sabra Ben Saad, Adlen Ksentini, Yacine Challal
Summary: Massive machine-type communications (mMTCs) network slices in 5G bring the risk of widened attack surface, especially in terms of in-slice attacks on shared infrastructure components. This article proposes a zero-touch security management solution that utilizes machine learning to detect and mitigate Distributed Denial-of-Service (DDoS) attacks on the 5G core network (CN) components.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Chia-Yu Chang, Teresa Giner Ruiz, Francesco Paolucci, Manuel A. Jimenez, Javier Sacido, Chrysa Papagianni, Fabio Ubaldi, Davide Scano, Molka Gharbaoui, Alessio Giorgetti, Luca Valcarenghi, Konstantin Tomakh, Andrea Boddi, Agustin Caparros, Matteo Pergolesi, Barbara Martini
Summary: Network slicing is crucial in the 5G ecosystem for introducing new use cases in the industrial sector, but faces challenges in providing traffic isolation and meeting diverse performance requirements. This work presents a solution using virtual queue concept on P4 switch to achieve both traffic isolation and performance requirements simultaneously.
Article
Agronomy
Adina Y. Grossman, Mario Henrique Murad Leite Andrade, Ana Luisa Arantes Chaves, Marco Tulio Mendes Ferreira, Vania Helena Techio, Yolanda Lopez, Kevin Begcy, Kevin E. Kenworthy, Esteban F. Rios
Summary: This study investigated the USDA bermudagrass germplasm set, identifying ploidy levels and evaluating their impact on estimating genetic parameters. The findings will support future breeding efforts and selections for forage bermudagrass.
Article
Computer Science, Hardware & Architecture
Nazih Salhab, Rami Langar, Rana Rahim
Summary: This research proposes a framework for orchestrating 5G network resources using machine learning techniques, aiming to improve resource utilization and network performance through predictive modeling and dynamic slicing methods. By utilizing experimental prototypes and real datasets, the study shows that ML-based approaches outperform traditional methods in terms of prediction accuracy and system utilization.
Article
Computer Science, Hardware & Architecture
Adrien Gausseran, Frederic Giroire, Brigitte Jaumard, Joanna Moulierac
Summary: 5G networks promise more bandwidth, lower latency, and increased flexibility, with challenges in efficiently provisioning network and cloud resources for various applications. Investigating network slice reconfiguration, it is found that periodic reconfiguration can reduce operational costs and manage more slices, but affects user QoS during the process. Solutions using a make-before-break scheme and scalable algorithms are proposed to address this issue.
Article
Computer Science, Information Systems
Haotong Cao, Jianbo Du, Haitao Zhao, Daniel Xiapu Luo, Neeraj Kumar, Longxiang Yang, F. Richard Yu
Summary: This article discusses the key technology of network slicing (NS) in 6G networks and addresses the resource allocation issue. It proposes an efficient resource allocation algorithm called TailoredSlice-6G and proves its superiority through comprehensive simulations.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Theory & Methods
Sungmoon Kwon, Seongmin Park, HyungJin Cho, Youngkwon Park, Dowon Kim, Kangbin Yim
Summary: With the rise of 5G technology, IoT applications in smart home/building have become a reality, but security risks need to be addressed. This paper analyzes eavesdropping vulnerabilities in 5G networks and proposes countermeasures to mitigate them.
Article
Computer Science, Hardware & Architecture
Yunwu Wang, Min Zhu, Jiahua Gu, Xiang Liu, Weidong Tong, Bingchang Hua, Mingzheng Lei, Yuancheng Cai, Jiao Zhang
Summary: This paper investigates the security-aware 5G RAN slice mapping problem with tiered isolation policy in optical networks. It introduces the physical-layer secured OTNs and formulates the problem as an exact ILP model. To overcome scalability issue, a heuristic-assisted deep reinforcement learning algorithm is proposed. Simulation results show that the proposed method can achieve approximate solutions in small-scale network scenarios and higher resource efficiency in large-scale scenarios.
JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING
(2023)
Review
Computer Science, Information Systems
S. Sullivan, Alessandro Brighente, S. A. P. Kumar, M. Conti
Summary: 5G envisions a broader range of services but also brings about increased hacker activity, necessitating strong security measures. This paper provides an objective overview of 5G security issues, focusing on vulnerabilities, challenges, and research problems in each OSI layer.
Article
Computer Science, Information Systems
Ying Wang, Naling Li, Peng Yu, Wenjing Li, Xuesong Qiu, Shangguang Wang, Mohamed Cheriet
Summary: 5G and beyond network will support vertical industry applications with varying resource requirements for each service. The introduction of network slices provides flexibility to meet customization requirements. However, existing solutions rarely consider multiple customized requirements such as delay, bandwidth, load balancing, and slice isolation. This article proposes algorithms based on deep reinforcement learning to optimize network slice orchestration and demonstrates significant improvements in bandwidth consumption, slice delay, and load balancing for typical slices.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2023)
Review
Computer Science, Information Systems
Gianfranco Nencioni, Rosario G. G. Garroppo, Ruxandra F. F. Olimid
Summary: The Fifth Generation (5G) of mobile networks is enhanced by Multi-access Edge Computing (MEC), which deploys devices with computing and storage capabilities at the network edge to provide new and advanced services. MEC improves network efficiency by reducing latency, enabling real-time awareness, allowing cloud offloading, and reducing congestion. This survey paper focuses on the security, dependability, and performance aspects of 5G MEC and presents an overview, taxonomy, state-of-the-art, and challenges related to each aspect.
Article
Computer Science, Hardware & Architecture
Chuan Yu, Shuhui Chen, Fei Wang, Ziling Wei
Summary: LTE is the dominant mobile access technology globally but faces security issues exploited by various attacks. Reviewing attacks against LTE helps improve the security of 5G mobile networks. Most security issues have been theoretically fixed, but implementation of these measures remains to be verified.
Article
Computer Science, Hardware & Architecture
G. C. Amaizu, C. Nwakanma, S. Bhardwaj, J. M. Lee, D. S. Kim
Summary: With the growth of 5G and B5G networks, the number and frequency of DDoS attacks are predicted to increase, requiring a sophisticated detection framework. This paper proposes a composite and efficient DDoS attack detection framework that can accurately identify not only DDoS attacks, but also the type of DDoS attack encountered.
Article
Computer Science, Hardware & Architecture
Chiara Suraci, Giuseppe Araniti, Andrea Abrardo, Giuseppe Bianchi, Antonio Iera
Summary: 5G networks and systems will not only outperform past generations in terms of capacity and throughput, but also provide infrastructure for a wide range of services and applications. Unlike previous cellular networks, 5G systems will support various types of end devices, requiring cooperation from different technical and business stakeholders to deploy crucial infrastructure components.
Article
Mathematics
Zhipeng Yu, Fangqing Gu, Hailin Liu, Yutao Lai
Summary: In this paper, a bi-level resource allocation model is proposed for the vertical industry resource allocation problem in the 5G network. The model aims to optimize the profit of the 5G operator and achieve fair resource allocation for users. The multi-agent twin delayed deep deterministic policy gradient (MATD3) algorithm is used for upper slice resource allocation, while the discrete and continuous twin delayed deep deterministic policy gradient (DCTD3) algorithm is used for lower user resource allocation.
Article
Computer Science, Information Systems
Fahad N. Nife, Zbigniew Kotulski
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT
(2020)
Article
Computer Science, Information Systems
Albert Sitek, Zbigniew Kotulski
Article
Computer Science, Information Systems
Wojciech Niewolski, Tomasz W. Nowak, Mariusz Sepczuk, Zbigniew Kotulski
Summary: MEC technology in 5G networks offers a distributed computing environment, allowing customers with different needs and competencies to access services from external suppliers. We propose an efficient and flexible service access control framework on 5G MEC networks, with the focus on the MEC Enabler handling AAA requests. Additionally, we utilize the JSON Web Token standard as a tool for managing access control credentials.
Article
Computer Science, Information Systems
Wojciech Niewolski, Tomasz W. Nowak, Mariusz Sepczuk, Zbigniew Kotulski, Rafal Artych, Krzysztof Bocianiak, Jean-Philippe Wary
Summary: This article presents the research status and new security challenges of the migration of the security context between service instances in Edge/MEC servers. It specifies the steps of the migration procedure and provides possible solutions. The authors also demonstrate how the proposed solution can be used to protect 5G vertical industry services based on mobile use cases.
Article
Computer Science, Hardware & Architecture
Wojciech Niewolski, Tomasz W. Nowak, Mariusz Sepczuk, Zbigniew Kotulski
Summary: This paper presents a new access control architecture for the 5G MEC network, which meets security requirements in a flexible and lightweight way. It introduces the MEC Enabler as the central element for managing access control security policies and generating access credentials. The paper also describes a method to secure data packets in communication process to prevent unauthorized interception of sessions.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2023)
Proceedings Paper
Computer Science, Artificial Intelligence
Mariusz Sepczuk, Zbigniew Kotulski, Wojciech Niewolski, Tomasz W. Nowak
Summary: This paper proposes a new access control and service authorization protocol using MEC edge servers for network services in 5G networks. The solution does not affect the performance of services and addresses some network security issues caused by virtualization techniques in contemporary mobile networks.
PROCEEDINGS OF THE 2022 17TH CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENCE SYSTEMS (FEDCSIS)
(2022)
Article
Computer Science, Information Systems
Tomasz W. Nowak, Mariusz Sepczuk, Zbigniew Kotulski, Wojciech Niewolski, Rafal Artych, Krzysztof Bocianiak, Tomasz Osko, Jean-Philippe Wary
Summary: 5G is the fifth-generation cellular network that satisfies IMT-2020 requirements. The application of MEC technology has a significant impact on the functioning of 5G MEC-based services, highlighting the need to focus on protecting vertical industries from network attacks.
Article
Computer Science, Hardware & Architecture
Xiaolin Gu, Wenjia Wu, Yusen Zhou, Aibo Song, Ming Yang, Zhen Ling, Junzhou Luo
Summary: This study proposes a radio frequency fingerprint identification solution based on crystal oscillator temperature adjustment, which enhances the differences between Wi-Fi device fingerprints and mitigates collision. Experimental results demonstrate the effectiveness of the system in identifying smartphones under different scenarios.
Article
Computer Science, Hardware & Architecture
Yutong Wu, Jianyue Zhu, Xiao Chen, Yu Zhang, Yao Shi, Yaqin Xie
Summary: This paper proposes a quality-of-service-based SIC order method and optimizes power allocation for maximizing the rate in the uplink NOMA system. The simulation results demonstrate the superiority of the proposed method compared to traditional orthogonal multiple access and exhaustive search.
Article
Computer Science, Hardware & Architecture
Songshi Dou, Li Qi, Zehua Guo
Summary: Emerging cloud services and applications have different QoS requirements for the network. SD-WANs play a crucial role in QoS provisioning by introducing network programmability, dynamic flow routing, and low data transmission latency. However, controller failures may degrade QoS. To address this, we propose PREDATOR, a QoS-aware network programmability recovery scheme that achieves fine-grained per-flow remapping without introducing extra delays, ensuring QoS robustness for high-priority flows.
Article
Computer Science, Hardware & Architecture
Ke Wang, Xiaojuan Ma, Heng Kang, Zheng Lyu, Baorui Feng, Wenliang Lin, Zhongliang Deng, Yun Zou
Summary: This paper proposes a method based on a parallel network simulation architecture to improve the simulation efficiency of satellite networks. By effectively partitioning the network topology and using algorithms such as resource assessment and load balancing, the simulation performance is enhanced. Experimental results demonstrate the effectiveness of this method.
Article
Computer Science, Hardware & Architecture
Sijin Yang, Lei Zhuang, Julong Lan, Jianhui Zhang, Bingkui Li
Summary: This paper proposes a reuse-based online scheduling mechanism that achieves deterministic transmission of dynamic flows through dynamic path planning and coordinated scheduling of time slots. Experimental results show that the proposed mechanism improves the scheduling success rate by 37.3% and reduces time costs by up to 66.6% compared to existing online scheduling algorithms.