Pub Date : 2021-06-01DOI: 10.1109/ICT52184.2021.9511518
A. Faid, M. Sadik, Essaid Sabir
The role of Wireless Sensor Networks in the ongoing industrial development is becoming crucial on daily basis. It is undoubtedly the skeleton of the current global digital transformation and the fourth industrial revolution. WSN has grown into an emerging field of research due to its tremendous opportunities and several challenges. Machine to Machine (M2M), energy consumption, and wireless transmission are the most challenging areas of research with a plethora of solid papers that have been published in the last decade. Unquestionably, Low-Energy Adaptive Clustering Hierarchy (LEACH) is the most famous clustering protocol in the literature that allows the creation of self-organizing networks. However, the protocol presents several drawbacks in terms of cluster balancing, random CH selection, and single-hop communication. In this paper, we propose a hybrid energy-aware multi-hop clustering algorithm for WSN's self-organization and energy efficiency. The approach is based on the combination of K-medoids and LEACH clustering approach with a trade-off philosophy for the network clustering and eventual energy enhancement. The technique applies different energy ranges for a self-aware gateways' selection, along with the application of K-medoids, and LEACH for the building of dynamic clusters. The results are compared to the LEACH and K-medoids algorithms. Extensive simulation runs have shown a very good improvement in the network's performance based on the first dead node, the network lifetime, and the energy dissipation metrics. The algorithm's results show an improvement of 158% comparing to LEACH and 834% comparing to K-medoids in terms of the first dead node, while the network performance is enhanced by 151% comparing to LEACH and 33% comparing to K-medoids.
{"title":"EACA: An Energy Aware Clustering Algorithm for Wireless IoT Sensors","authors":"A. Faid, M. Sadik, Essaid Sabir","doi":"10.1109/ICT52184.2021.9511518","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511518","url":null,"abstract":"The role of Wireless Sensor Networks in the ongoing industrial development is becoming crucial on daily basis. It is undoubtedly the skeleton of the current global digital transformation and the fourth industrial revolution. WSN has grown into an emerging field of research due to its tremendous opportunities and several challenges. Machine to Machine (M2M), energy consumption, and wireless transmission are the most challenging areas of research with a plethora of solid papers that have been published in the last decade. Unquestionably, Low-Energy Adaptive Clustering Hierarchy (LEACH) is the most famous clustering protocol in the literature that allows the creation of self-organizing networks. However, the protocol presents several drawbacks in terms of cluster balancing, random CH selection, and single-hop communication. In this paper, we propose a hybrid energy-aware multi-hop clustering algorithm for WSN's self-organization and energy efficiency. The approach is based on the combination of K-medoids and LEACH clustering approach with a trade-off philosophy for the network clustering and eventual energy enhancement. The technique applies different energy ranges for a self-aware gateways' selection, along with the application of K-medoids, and LEACH for the building of dynamic clusters. The results are compared to the LEACH and K-medoids algorithms. Extensive simulation runs have shown a very good improvement in the network's performance based on the first dead node, the network lifetime, and the energy dissipation metrics. The algorithm's results show an improvement of 158% comparing to LEACH and 834% comparing to K-medoids in terms of the first dead node, while the network performance is enhanced by 151% comparing to LEACH and 33% comparing to K-medoids.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122902428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1109/ICT52184.2021.9511539
Hao Wang, Shunliang Zhang, Qian Cheng
Securing communications for D2D underlaying cellular networks by physical layer mechanisms has become an important issue for 5G and beyond. The preference of D2D users and the role of D2D users as cooperative jammers are rarely investigated together in previous works. In this paper, we investigate spectrum resource allocation to maximize system secrecy sum rate and leverage D2D users to cooperatively protect cellular users at high risks of being eavesdropped. The resource allocation problem is formulated as a Mixed-Integer Non-Linear Programming (MINLP) model. We propose a preference-based matching algorithm (PBMA) to tackle the spectrum resource allocation problem. Then, cooperative jamming-based algorithms by D2D users assisted are proposed to further improve the secrecy rate of cellular users. Extensive simulation results demonstrate the effectiveness of proposed schemes in terms of the secrecy sum rate of D2D links and cellular links.
{"title":"Security Aware Resource Allocation for D2D Communications with cooperative Jamming","authors":"Hao Wang, Shunliang Zhang, Qian Cheng","doi":"10.1109/ICT52184.2021.9511539","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511539","url":null,"abstract":"Securing communications for D2D underlaying cellular networks by physical layer mechanisms has become an important issue for 5G and beyond. The preference of D2D users and the role of D2D users as cooperative jammers are rarely investigated together in previous works. In this paper, we investigate spectrum resource allocation to maximize system secrecy sum rate and leverage D2D users to cooperatively protect cellular users at high risks of being eavesdropped. The resource allocation problem is formulated as a Mixed-Integer Non-Linear Programming (MINLP) model. We propose a preference-based matching algorithm (PBMA) to tackle the spectrum resource allocation problem. Then, cooperative jamming-based algorithms by D2D users assisted are proposed to further improve the secrecy rate of cellular users. Extensive simulation results demonstrate the effectiveness of proposed schemes in terms of the secrecy sum rate of D2D links and cellular links.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130247831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1109/ICT52184.2021.9511537
K. Ystgaard, K. Moor
Communication networks beyond 5G will bring about a human existence that is ever more virtual. Allowing new communication services with virtual existence and involvement everywhere is likely to redefine and place new demands on how humans can and wish (or do not wish) to engage with the connected network. The ubiquitous nature of the 6G network evolution enables increased involvement and affords more power to networks and machines (and those designing them) versus humans. This paper advocates that human-centric 6G networks should put humans' interests and potential first and foremost, in a holistic manner. There is a need to critically monitor, (r)evaluate, and adjust the above power implications. Human-centric design perspectives applied to future network technologies incorporate the human element more broadly. Thus, meaningful user control, empowerment, and agency should be key features of future network technologies beyond 5G and 6G. The network system's ability to protect human potential and humanity first, to serve multiple normative standards, while balancing the interests of all parties, can become a catalyst for stimulating better governing practices and for managing consensus building between individuals, communities, governments, and networked machines embedded with human-like capabilities. However, realising this vision and potential requires a thorough alignment with the human- and humanity-centric paradigm and a renewal of its operationalisation and implementation. This paper overviews a set of human-centric design interpretations and discusses the next challenges and implications in a beyond 5G and 6G context.
{"title":"Bring the human to the network: 5G and beyond","authors":"K. Ystgaard, K. Moor","doi":"10.1109/ICT52184.2021.9511537","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511537","url":null,"abstract":"Communication networks beyond 5G will bring about a human existence that is ever more virtual. Allowing new communication services with virtual existence and involvement everywhere is likely to redefine and place new demands on how humans can and wish (or do not wish) to engage with the connected network. The ubiquitous nature of the 6G network evolution enables increased involvement and affords more power to networks and machines (and those designing them) versus humans. This paper advocates that human-centric 6G networks should put humans' interests and potential first and foremost, in a holistic manner. There is a need to critically monitor, (r)evaluate, and adjust the above power implications. Human-centric design perspectives applied to future network technologies incorporate the human element more broadly. Thus, meaningful user control, empowerment, and agency should be key features of future network technologies beyond 5G and 6G. The network system's ability to protect human potential and humanity first, to serve multiple normative standards, while balancing the interests of all parties, can become a catalyst for stimulating better governing practices and for managing consensus building between individuals, communities, governments, and networked machines embedded with human-like capabilities. However, realising this vision and potential requires a thorough alignment with the human- and humanity-centric paradigm and a renewal of its operationalisation and implementation. This paper overviews a set of human-centric design interpretations and discusses the next challenges and implications in a beyond 5G and 6G context.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132391667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1109/ICT52184.2021.9511464
Teng Wu, Xiaochang Fan, Jie Zeng, Wei Ni, R. Liu
Enabling ultra-reliable and low latency communications (URLLC) under severe fading is really challenging. We study how to realize URLLC under $kappa-mu$ shadowed fading, because we can unify multiple traditional fading models by using the $kappa-mu$ shadowed fading model. For the MIMO system with two single-transmit-antenna users and $L$ receive antennas, we derive the probability density function (PDF) of the signal-to-noise ratio (SNR) of minimum mean squared error detection. In particular, we accomplish the above work in both perfect channel state information (CSI) and imperfect CSI. Then, the error probability can be calculated by the finite blocklength information theory, in accordance with constrained latency and given length of pilots. The simulation results show that we can configure the system parameters according to the $kappa-mu$ parameters, to satisfy the requirements for both latency and reliability. Hence, multiple fading models can be unified by the $hslash-mu$ shadowed fading model to study how to realize URLLC.
{"title":"Enabling URLLC under $kappa-mu$ Shadowed Fading","authors":"Teng Wu, Xiaochang Fan, Jie Zeng, Wei Ni, R. Liu","doi":"10.1109/ICT52184.2021.9511464","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511464","url":null,"abstract":"Enabling ultra-reliable and low latency communications (URLLC) under severe fading is really challenging. We study how to realize URLLC under $kappa-mu$ shadowed fading, because we can unify multiple traditional fading models by using the $kappa-mu$ shadowed fading model. For the MIMO system with two single-transmit-antenna users and $L$ receive antennas, we derive the probability density function (PDF) of the signal-to-noise ratio (SNR) of minimum mean squared error detection. In particular, we accomplish the above work in both perfect channel state information (CSI) and imperfect CSI. Then, the error probability can be calculated by the finite blocklength information theory, in accordance with constrained latency and given length of pilots. The simulation results show that we can configure the system parameters according to the $kappa-mu$ parameters, to satisfy the requirements for both latency and reliability. Hence, multiple fading models can be unified by the $hslash-mu$ shadowed fading model to study how to realize URLLC.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117097549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1109/ict52184.2021.9511458
{"title":"[Copyright notice]","authors":"","doi":"10.1109/ict52184.2021.9511458","DOIUrl":"https://doi.org/10.1109/ict52184.2021.9511458","url":null,"abstract":"","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131496220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Client certificate authentication (CCA) is gaining greater significance, as more and more security-critical private activities such like e-bank and e-health are being conducted online, posing strong needs for mutual authentication. Unlike server certificates, active measurement of client certificates via probing techniques is infeasible since CCA is non-mandatory in the TLS protocol. Passive measurement is technically feasible but requires consistent access to large-scale Internet traffic to be comprehensive and convincing, which puts very high requirements on the research conditions. In this paper, we present a comprehensive study of the client certificate ecosystem, as the outcome of by far the largest passive measurement of client certificates in literature. As many as 97 million unique client certificates have been collected from the top-level academic network in China during six months. We analyze the actual use of CCA and classify the client certificates into three categories according to purposes: device authentication, user authentication, and application authentication. We discuss the security of client certificates with respect to the certificate attributes and make comparisons between client and server certificates. We also evaluate the risk of privacy leakage caused by client certificates, indicating the severity and the culprit. We hope our work would benefit the community by depicting an intuitive overview of the client certificate ecosystem and inspiring new thoughts on certificate usage in all kinds of scenarios.
{"title":"Illuminate the Shadow: A Comprehensive Study of TLS Client Certificate Ecosystem in the Wild","authors":"Wei Xia, Mingxin Cui, Wen Wang, Yangyang Guan, Zhenzhen Li, Zhen Li, G. Xiong","doi":"10.1109/ICT52184.2021.9511513","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511513","url":null,"abstract":"Client certificate authentication (CCA) is gaining greater significance, as more and more security-critical private activities such like e-bank and e-health are being conducted online, posing strong needs for mutual authentication. Unlike server certificates, active measurement of client certificates via probing techniques is infeasible since CCA is non-mandatory in the TLS protocol. Passive measurement is technically feasible but requires consistent access to large-scale Internet traffic to be comprehensive and convincing, which puts very high requirements on the research conditions. In this paper, we present a comprehensive study of the client certificate ecosystem, as the outcome of by far the largest passive measurement of client certificates in literature. As many as 97 million unique client certificates have been collected from the top-level academic network in China during six months. We analyze the actual use of CCA and classify the client certificates into three categories according to purposes: device authentication, user authentication, and application authentication. We discuss the security of client certificates with respect to the certificate attributes and make comparisons between client and server certificates. We also evaluate the risk of privacy leakage caused by client certificates, indicating the severity and the culprit. We hope our work would benefit the community by depicting an intuitive overview of the client certificate ecosystem and inspiring new thoughts on certificate usage in all kinds of scenarios.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127505193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1109/ICT52184.2021.9511461
Ayes Chinmay, H. K. Pati
The IEEE 802.11 standard is commonly used to provide wireless networking capabilities for different applications. Although the format was designed mainly to provide data transmission capability, it also became a common medium for speech communication. The reasons are twofold: extensive Wireless Local Area Network (WLAN) connectivity and the low cost of making voice calls on this network. To provide the Quality-of-Service (QoS) of Voice over WiFi (VoWiFi) calls, an appropriate policy for call admission control is required. Such a policy requires VoWiFi user capacity of the WLAN cell. In this paper, we have proposed an analytical model to estimate the number of VoWiFi calls possible in IEEE 802.11ax standard Access Point (AP) (i.e. sixth generation Wireless Fidelity (WiFi) standard) and compared with earlier standards like IEEE 802.11b/g/n/ac. We have used DCF Inter-frame Spacing (DIFS) to detect channel status before transmitting data from one station to another and Short Inter-frame Spacing (SIFS) before sending acknowledgement, Request To Send (RTS) and Clear To Send (CTS) frames. We have used the Compressed RTP (cRTP) protocol to enhance VoWiFi cell capacity. We have measured VoWiFi cell capacity using G.729 voice codec.
IEEE 802.11标准通常用于为不同的应用程序提供无线网络功能。虽然这种格式的设计主要是为了提供数据传输能力,但它也成为语音通信的常用媒介。原因有两个:广泛的无线局域网(WLAN)连接和在该网络上进行语音通话的低成本。为了提供VoWiFi (Voice over WiFi)呼叫的QoS (Quality-of-Service),需要适当的呼叫准入控制策略。这种策略需要WLAN小区的VoWiFi用户容量。在本文中,我们提出了一个分析模型来估计IEEE 802.11ax标准接入点(AP)(即第六代无线保真度(WiFi)标准)中可能的VoWiFi呼叫数量,并与IEEE 802.11b/g/n/ac等早期标准进行比较。我们使用DCF帧间间隔(DIFS)在将数据从一个站传输到另一个站之前检测信道状态,在发送确认,请求发送(RTS)和清除发送(CTS)帧之前使用短帧间间隔(SIFS)。我们使用压缩RTP (cRTP)协议来增强VoWiFi小区容量。我们使用G.729语音编解码器测量了VoWiFi小区容量。
{"title":"VoWiFi Cell Capacity Estimation using IEEE 802.11ax","authors":"Ayes Chinmay, H. K. Pati","doi":"10.1109/ICT52184.2021.9511461","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511461","url":null,"abstract":"The IEEE 802.11 standard is commonly used to provide wireless networking capabilities for different applications. Although the format was designed mainly to provide data transmission capability, it also became a common medium for speech communication. The reasons are twofold: extensive Wireless Local Area Network (WLAN) connectivity and the low cost of making voice calls on this network. To provide the Quality-of-Service (QoS) of Voice over WiFi (VoWiFi) calls, an appropriate policy for call admission control is required. Such a policy requires VoWiFi user capacity of the WLAN cell. In this paper, we have proposed an analytical model to estimate the number of VoWiFi calls possible in IEEE 802.11ax standard Access Point (AP) (i.e. sixth generation Wireless Fidelity (WiFi) standard) and compared with earlier standards like IEEE 802.11b/g/n/ac. We have used DCF Inter-frame Spacing (DIFS) to detect channel status before transmitting data from one station to another and Short Inter-frame Spacing (SIFS) before sending acknowledgement, Request To Send (RTS) and Clear To Send (CTS) frames. We have used the Compressed RTP (cRTP) protocol to enhance VoWiFi cell capacity. We have measured VoWiFi cell capacity using G.729 voice codec.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125057654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-16DOI: 10.36227/TECHRXIV.14572548.V1
Vaibhav Kumar, M. Flanagan, D. B. D. Costa, Le-Nam Tran
In this paper, we present the ergodic sum secrecy rate (ESSR) analysis of an underlay spectrum sharing nonorthogonal multiple access (NOMA) system. We consider the scenario where the power transmitted by the secondary transmitter (ST) is constrained by the peak tolerable interference at multiple primary receivers (PRs) as well as the maximum transmit power of the ST. The effect of channel estimation error is also taken into account in our analysis. We derive exact and asymptotic closed-form expressions for the ESSR of the downlink NOMA system, and show that the performance can be classified into two distinct regimes, i.e., it is dictated either by the interference constraint or by the power constraint. Our results confirm the superiority of the NOMA-based system over its orthogonal multiple access (OMA) based counterpart. More interestingly, our results show that NOMA helps in maintaining the secrecy rate of the strong user while significantly enhancing the secrecy performance of the weak user as compared to OMA. The correctness of the proposed investigation is corroborated through Monte Carlo simulation.
{"title":"On the Secrecy Rate of Downlink NOMA in Underlay Spectrum Sharing with Imperfect CSI: Invited Paper","authors":"Vaibhav Kumar, M. Flanagan, D. B. D. Costa, Le-Nam Tran","doi":"10.36227/TECHRXIV.14572548.V1","DOIUrl":"https://doi.org/10.36227/TECHRXIV.14572548.V1","url":null,"abstract":"In this paper, we present the ergodic sum secrecy rate (ESSR) analysis of an underlay spectrum sharing nonorthogonal multiple access (NOMA) system. We consider the scenario where the power transmitted by the secondary transmitter (ST) is constrained by the peak tolerable interference at multiple primary receivers (PRs) as well as the maximum transmit power of the ST. The effect of channel estimation error is also taken into account in our analysis. We derive exact and asymptotic closed-form expressions for the ESSR of the downlink NOMA system, and show that the performance can be classified into two distinct regimes, i.e., it is dictated either by the interference constraint or by the power constraint. Our results confirm the superiority of the NOMA-based system over its orthogonal multiple access (OMA) based counterpart. More interestingly, our results show that NOMA helps in maintaining the secrecy rate of the strong user while significantly enhancing the secrecy performance of the weak user as compared to OMA. The correctness of the proposed investigation is corroborated through Monte Carlo simulation.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128303402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-12DOI: 10.1109/ICT52184.2021.9511519
K. Mehmood, H. V. K. Mendis, Katina Kralevska, P. Heegaard
5G technology complements the enabling of communication services for different vertical industries such as smart distribution grids. Automation is an integral and necessary part of the power distribution grid operation and management. This paper postulates a framework by which the smart distribution grid can obtain service-oriented communication services using 5G network slicing and intent-based networking (IBN). IBN provides an interface to service users and network stakeholders to cooperate through a high level abstraction model of service provisioning in a network agnostic manner. The automation and adaptability of the distribution grid are facilitated by using the dynamic and closed-loop mechanism of IBN together with network slicing and network function virtualization for network management and orchestration. We identify the automation parts of the power distribution grid and illustrate the intent processing and its inclusion in the definition of network slice instances, service and network configuration models.
{"title":"Intent-based Network Management and Orchestration for Smart Distribution Grids","authors":"K. Mehmood, H. V. K. Mendis, Katina Kralevska, P. Heegaard","doi":"10.1109/ICT52184.2021.9511519","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511519","url":null,"abstract":"5G technology complements the enabling of communication services for different vertical industries such as smart distribution grids. Automation is an integral and necessary part of the power distribution grid operation and management. This paper postulates a framework by which the smart distribution grid can obtain service-oriented communication services using 5G network slicing and intent-based networking (IBN). IBN provides an interface to service users and network stakeholders to cooperate through a high level abstraction model of service provisioning in a network agnostic manner. The automation and adaptability of the distribution grid are facilitated by using the dynamic and closed-loop mechanism of IBN together with network slicing and network function virtualization for network management and orchestration. We identify the automation parts of the power distribution grid and illustrate the intent processing and its inclusion in the definition of network slice instances, service and network configuration models.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124866537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}