Pub Date : 2019-08-01DOI: 10.1109/FiCloud.2019.00041
Perin Ünal
This study aims to identify the main Internet of Things and big data reference architectures (RAs) available for the manufacturing industry. Besides open RAs developed by national and international consortia, proprietary RAs and frameworks are also discussed. The main building blocks of RAs are governed by viewpoints finding their root in systems and software engineering literature and standards. However, in most RAs, only technical viewpoints are addressed, and business architecture and customer context aspects are usually missing. In this paper, RAs are discussed in terms of their functionality and viewpoints addressed. Additionally, the standards developed by international and European institutions to complement RAs in the manufacturing industry are identified and presented. The RAs, standards and underlying models given can be useful for system architects, service providers, and other users as a guideline in the digital transformation of industry.
{"title":"Reference Architectures and Standards for the Internet of Things and Big Data in Smart Manufacturing","authors":"Perin Ünal","doi":"10.1109/FiCloud.2019.00041","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00041","url":null,"abstract":"This study aims to identify the main Internet of Things and big data reference architectures (RAs) available for the manufacturing industry. Besides open RAs developed by national and international consortia, proprietary RAs and frameworks are also discussed. The main building blocks of RAs are governed by viewpoints finding their root in systems and software engineering literature and standards. However, in most RAs, only technical viewpoints are addressed, and business architecture and customer context aspects are usually missing. In this paper, RAs are discussed in terms of their functionality and viewpoints addressed. Additionally, the standards developed by international and European institutions to complement RAs in the manufacturing industry are identified and presented. The RAs, standards and underlying models given can be useful for system architects, service providers, and other users as a guideline in the digital transformation of industry.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116552054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/FiCloud.2019.00030
Ahmed Salim Alrawahi, Kevin Lee, Ahmad Lotfi
Cloud of Things (CoT) consists of heterogeneous Cloud and Internet of Things (IoT) resources. CoT increasingly requires adaptive run-time management due to the CoT dynamism, environmental uncertainties and unpredictable changes in IoT resources. Adapting to these changes benefits particularly trading of CoT resources where the adaptability of traded resources and applications remains a challenge. Run-time changes in CoT trading environments can impact vital aspects including resource allocation, resource utilisation and application performance. This paper adopts monitoring, analysis, planning and execution (MAPE) model from autonomic computing to support adaptations when trading CoT resources. This is achieved by applying the MAPE model to systematically capture and identify changes in CoT environment. Based on the identified adaptations, an adaptive model is proposed to react to these changes.
{"title":"Adaptive Trading of Cloud of Things Resources","authors":"Ahmed Salim Alrawahi, Kevin Lee, Ahmad Lotfi","doi":"10.1109/FiCloud.2019.00030","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00030","url":null,"abstract":"Cloud of Things (CoT) consists of heterogeneous Cloud and Internet of Things (IoT) resources. CoT increasingly requires adaptive run-time management due to the CoT dynamism, environmental uncertainties and unpredictable changes in IoT resources. Adapting to these changes benefits particularly trading of CoT resources where the adaptability of traded resources and applications remains a challenge. Run-time changes in CoT trading environments can impact vital aspects including resource allocation, resource utilisation and application performance. This paper adopts monitoring, analysis, planning and execution (MAPE) model from autonomic computing to support adaptations when trading CoT resources. This is achieved by applying the MAPE model to systematically capture and identify changes in CoT environment. Based on the identified adaptations, an adaptive model is proposed to react to these changes.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"547 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124877969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/FiCloud.2019.00051
I. Dronyuk, O. Fedevych, N. Kryvinska
The method for real time high quality video traffic management based on the fuzzy triangular numbers is proposed. Four types of high quality video traffic are investigated. The mathematical model for traffic simulation and prediction with differential equations is created. Solution is obtained using Ateb-functions. The triangular fuzzy numbers matrix based on prediction results is constructed. The matrix is used for optimal control and management in telecommunication network with quality of service criteria. Also influence of traffic self-similarity is discussed.
{"title":"High Quality Video Traffic Ateb-Forecasting and Fuzzy Logic Management","authors":"I. Dronyuk, O. Fedevych, N. Kryvinska","doi":"10.1109/FiCloud.2019.00051","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00051","url":null,"abstract":"The method for real time high quality video traffic management based on the fuzzy triangular numbers is proposed. Four types of high quality video traffic are investigated. The mathematical model for traffic simulation and prediction with differential equations is created. Solution is obtained using Ateb-functions. The triangular fuzzy numbers matrix based on prediction results is constructed. The matrix is used for optimal control and management in telecommunication network with quality of service criteria. Also influence of traffic self-similarity is discussed.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124918686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/FiCloud.2019.00040
Cristian Lai, Francesco Boi, Alberto Buschettu, Renato Caboni
In this paper, we will illustrate how microservice architectures can be adopted to build Internet of Things services for multimobility in a smart city. Traditional centralized architectures are built as monolithic solutions, which lack the flexibility required to deal with heterogeneous devices efficiently. Microservice architectures implement small features bounded within a running process; independent microservices can be deployed separately in a distributed system. We have proposed a draft of architecture for general-purpose Internet of Things applications. Thanks to the choice of the microservice paradigm, the architecture is capable of interfacing with a wide range of heterogeneous IoT devices while implementing scalability by design. On this basis, a web application has been developed bearing in mind a set of real case scenarios mobility services for citizens multimobility in a smart city.
{"title":"IoT and Microservice Architecture for Multimobility in a Smart City","authors":"Cristian Lai, Francesco Boi, Alberto Buschettu, Renato Caboni","doi":"10.1109/FiCloud.2019.00040","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00040","url":null,"abstract":"In this paper, we will illustrate how microservice architectures can be adopted to build Internet of Things services for multimobility in a smart city. Traditional centralized architectures are built as monolithic solutions, which lack the flexibility required to deal with heterogeneous devices efficiently. Microservice architectures implement small features bounded within a running process; independent microservices can be deployed separately in a distributed system. We have proposed a draft of architecture for general-purpose Internet of Things applications. Thanks to the choice of the microservice paradigm, the architecture is capable of interfacing with a wide range of heterogeneous IoT devices while implementing scalability by design. On this basis, a web application has been developed bearing in mind a set of real case scenarios mobility services for citizens multimobility in a smart city.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128520375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/FiCloud.2019.00019
A. Sangodoyin, Bashir Mohammed, S. Moyo, I. Awan, Jules Pagna Disso
Software Defined Network is an evolving and promising architecture which allows greater control over network entities by centralising the control plane. Although on the surface SDN provides a simple framework for network programmability and monitoring, few has been said about security measures to make it more robust to hitherto security flaws. Among the identified security flaws, DDoS flooding attack continue to be one of the major security concerns as attack volumes are increasing year on year. In this paper, we developed and implement the feasibility of spoofing and flooding DDoS attack on data plane devices using Mininet emulator, floodlight and network performance testing tools. We further developed a mitigation mechanism to counter these attacks by pushing reactive flow through the controller to the attacking switch port. Our result shows that pushing flows through the controller mitigates the flooding attack with low performance overheads, and requires no change to the controllers mode of operation for deployment, which indicates a good performance of our model.
{"title":"A Framework for Distributed Denial of Service Attack Detection and Reactive Countermeasure in Software Defined Network","authors":"A. Sangodoyin, Bashir Mohammed, S. Moyo, I. Awan, Jules Pagna Disso","doi":"10.1109/FiCloud.2019.00019","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00019","url":null,"abstract":"Software Defined Network is an evolving and promising architecture which allows greater control over network entities by centralising the control plane. Although on the surface SDN provides a simple framework for network programmability and monitoring, few has been said about security measures to make it more robust to hitherto security flaws. Among the identified security flaws, DDoS flooding attack continue to be one of the major security concerns as attack volumes are increasing year on year. In this paper, we developed and implement the feasibility of spoofing and flooding DDoS attack on data plane devices using Mininet emulator, floodlight and network performance testing tools. We further developed a mitigation mechanism to counter these attacks by pushing reactive flow through the controller to the attacking switch port. Our result shows that pushing flows through the controller mitigates the flooding attack with low performance overheads, and requires no change to the controllers mode of operation for deployment, which indicates a good performance of our model.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114631282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/FiCloud.2019.00059
J. Casademont, Elena López-Aguilera, J. Aspas
Cooperative-Intelligent Transport systems are new applications developed on top of communications between vehicles and between vehicles and fixed infrastructure. Their architecture envisages devices deployed along the routes and streets, transmitting and receiving different kind of messages belonging to different services. Quite often, these devices will be located in isolated places with very low number of vehicles passing nearby. Being in isolated places, these devices will require to be feed with rechargeable batteries and alternative power sources, the usage of which need to be very efficient. The fact of continuously transmitting messages whenever there is no vehicle to receive them demands a solution. In this paper, we propose to use a well-known saving power strategy already used in Internet of Things, the Wake-up Radio systems. As vehicular communications are based on IEEE 802.11 standard, we propose to use a Wake-up Radio system based on this standard as well, being thus no additional hardware needed for the wake-up transmitter. The paper analyses the feasibility of using this solution on several vehicular applications.
{"title":"Wake-Up Radio Systems for Cooperative-Intelligent Transport Systems Architecture","authors":"J. Casademont, Elena López-Aguilera, J. Aspas","doi":"10.1109/FiCloud.2019.00059","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00059","url":null,"abstract":"Cooperative-Intelligent Transport systems are new applications developed on top of communications between vehicles and between vehicles and fixed infrastructure. Their architecture envisages devices deployed along the routes and streets, transmitting and receiving different kind of messages belonging to different services. Quite often, these devices will be located in isolated places with very low number of vehicles passing nearby. Being in isolated places, these devices will require to be feed with rechargeable batteries and alternative power sources, the usage of which need to be very efficient. The fact of continuously transmitting messages whenever there is no vehicle to receive them demands a solution. In this paper, we propose to use a well-known saving power strategy already used in Internet of Things, the Wake-up Radio systems. As vehicular communications are based on IEEE 802.11 standard, we propose to use a Wake-up Radio system based on this standard as well, being thus no additional hardware needed for the wake-up transmitter. The paper analyses the feasibility of using this solution on several vehicular applications.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131312413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/FiCloud.2019.00046
M. Aleksy, F. Dai, Nima Enayati, P. Rost, Guillermo Pocovi
Sensor-based real-time control is being used in robotics for different purposes. The trend is to develop intelligent robots that can understand and react on environmental situations. This leads to the integration of more complex algorithms and involving multiple sensors and mobile assets for a more flexible and intelligent motion control. The requirement on computing power becomes often higher than it could be performed on the robot controller itself. Using an external computer introduces, nowadays, significant communication delays that make real-time control difficult or even impossible. Furthermore, to integrate mobile assets in a motion control scenario wired communication cannot be employed. A 5G network / local factory cloud may bridge this gap. In this paper we describe why 5G technology can make a significant contribution to enable new types of industrial robotics applications. Moreover, we present various use cases and discuss simulation results of a 5G-based robotics application in an industrial environment.
{"title":"Utilizing 5G in Industrial Robotic Applications","authors":"M. Aleksy, F. Dai, Nima Enayati, P. Rost, Guillermo Pocovi","doi":"10.1109/FiCloud.2019.00046","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00046","url":null,"abstract":"Sensor-based real-time control is being used in robotics for different purposes. The trend is to develop intelligent robots that can understand and react on environmental situations. This leads to the integration of more complex algorithms and involving multiple sensors and mobile assets for a more flexible and intelligent motion control. The requirement on computing power becomes often higher than it could be performed on the robot controller itself. Using an external computer introduces, nowadays, significant communication delays that make real-time control difficult or even impossible. Furthermore, to integrate mobile assets in a motion control scenario wired communication cannot be employed. A 5G network / local factory cloud may bridge this gap. In this paper we describe why 5G technology can make a significant contribution to enable new types of industrial robotics applications. Moreover, we present various use cases and discuss simulation results of a 5G-based robotics application in an industrial environment.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132410763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/FiCloud.2019.00033
O. Makinde, A. Sangodoyin, Bashir Mohammed, D. Neagu, Umaru Adamu
Distributed network behaviour is increasingly attracting huge attention both in academics and industrial initiatives, and most recently machine learning has been used in every possible field, leveraging its advantages.Typically, a distributed networking allows for the execution of distributed applications which results in complex behaviours among connected systems. This complexity in itself can create grey areas and vulnerabilities in the securities of these networks, therefore predicting the behaviour of these systems both at the macro and micro level has become essential. In the past most researchers have predicted network behaviour and network attack patterns by using aggregated data, but in this paper we focus on the application of machine learning at the individual user level such that the prediction of the individual network user behaviour pattern at the micro level becomes a substasive tool in creating a realistic agent based simulation of the whole distributed network, which in turn can serve as a test bed for predicting what-if scenarios such as network attacks on the target system or exposing vulnerabilities within the target system. The simulation result was validated by comparing the simulated interaction within the simulated network to the data logged in the server logs within the real life network system. This produced a correlation above 0.8, indicating a realistic model.
{"title":"Distributed Network Behaviour Prediction Using Machine Learning and Agent-Based Micro Simulation","authors":"O. Makinde, A. Sangodoyin, Bashir Mohammed, D. Neagu, Umaru Adamu","doi":"10.1109/FiCloud.2019.00033","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00033","url":null,"abstract":"Distributed network behaviour is increasingly attracting huge attention both in academics and industrial initiatives, and most recently machine learning has been used in every possible field, leveraging its advantages.Typically, a distributed networking allows for the execution of distributed applications which results in complex behaviours among connected systems. This complexity in itself can create grey areas and vulnerabilities in the securities of these networks, therefore predicting the behaviour of these systems both at the macro and micro level has become essential. In the past most researchers have predicted network behaviour and network attack patterns by using aggregated data, but in this paper we focus on the application of machine learning at the individual user level such that the prediction of the individual network user behaviour pattern at the micro level becomes a substasive tool in creating a realistic agent based simulation of the whole distributed network, which in turn can serve as a test bed for predicting what-if scenarios such as network attacks on the target system or exposing vulnerabilities within the target system. The simulation result was validated by comparing the simulated interaction within the simulated network to the data logged in the server logs within the real life network system. This produced a correlation above 0.8, indicating a realistic model.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115963760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/FiCloud.2019.00023
Yusuf Muhammad Tukur, D. Thakker, I. Awan
The Internet of Things (IoT) is a huge, global, distributed network of interlinked heterogeneous devices armed with embedded sensors, actuators and processors enabling them to connect to the internet, exchange data, communicate and interact seamlessly with one another in real time. It enjoys wide range of applications where it holds important data, hence becoming exposed to varying degrees of security and privacy threats which require careful architectural design to address. Consequently, we present in this paper a multi-layer security aware IoT architecture that aims to secure the entire system by providing security at all layers to ensure secure data collection, transfer, analysis, storage and usage. That is necessary because each layer of the IoT has vulnerabilities and a successful attack on any layer can have far-reaching impact on the whole system. We then proposed a novel security algorithm to protect the IoT system against Denial of Service (DoS) attacks at the application layer, the weakest link in IoT. The algorithm logs record of user activities and actions at given times of the day which it employs to regulate access and prevent DoS attacks. Finally, we evaluated our proposed approach against IoT security and privacy requirements, and it demonstrated better level of security.
{"title":"Multi-layer Approach to Internet of Things (IoT) Security","authors":"Yusuf Muhammad Tukur, D. Thakker, I. Awan","doi":"10.1109/FiCloud.2019.00023","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00023","url":null,"abstract":"The Internet of Things (IoT) is a huge, global, distributed network of interlinked heterogeneous devices armed with embedded sensors, actuators and processors enabling them to connect to the internet, exchange data, communicate and interact seamlessly with one another in real time. It enjoys wide range of applications where it holds important data, hence becoming exposed to varying degrees of security and privacy threats which require careful architectural design to address. Consequently, we present in this paper a multi-layer security aware IoT architecture that aims to secure the entire system by providing security at all layers to ensure secure data collection, transfer, analysis, storage and usage. That is necessary because each layer of the IoT has vulnerabilities and a successful attack on any layer can have far-reaching impact on the whole system. We then proposed a novel security algorithm to protect the IoT system against Denial of Service (DoS) attacks at the application layer, the weakest link in IoT. The algorithm logs record of user activities and actions at given times of the day which it employs to regulate access and prevent DoS attacks. Finally, we evaluated our proposed approach against IoT security and privacy requirements, and it demonstrated better level of security.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125332275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
5th Generation (5G) mobile networks is anticipated to serve large number of devices with multiple services in the single network. Due to heterogeneous service demand in a single network, 5G is presumed to be service based amalgamated with network slicing. The network will create a dedicated slice with dedicated resources and network elements based on the requested service. With so many devices and services under one umbrella of 5G, mobility becomes one of the crucial aspect, which can further have lot of impact on 5G NR (New Radio) requirements such as, radio resource optimization, seamless connectivity, minimal handovers and Quality of Experience (QoE). MAS5G (Move Smartly in 5G) explores the avenues of mobility management, wherein we consider three main services of 5G i.e. (1) enhanced Mobile Broadband (eMBB), (2) Ultra Reliable Low Latency Communications (URLLC) and (3) massive Machine Type Communications (mMTC). Unlike considering single mobility policy for all type of services (in the current networks), we propose MAS5G Central Mobility Manager (CMM), which will create dedicated schema for each service based on the network slice. With the help of User Equipment (UE) capability if network slice subscribed by subscriber is having skewed features and mobility requirement, MAS5G CMM creates schema as per the requirements of a particular network slice. It can help Access and Mobility Management Function (AMF) to provide dedicated attributes of Access and Mobility applied to devices based on predefined schemas. Through our simulation experiment, based on real time mMTC and eMBB traffic traces, we show that MAS5G is able to curtail the number of handovers, thus, saving the energy at UE significantly, which further helps to boost the QoE.
第五代(5G)移动网络预计将在单个网络中为大量设备提供多种服务。由于单个网络的业务需求是异构的,因此5G被认为是基于业务和网络切片的融合。网络将根据请求的服务创建一个包含专用资源和网络元素的专用切片。由于5G拥有如此多的设备和服务,移动性成为关键方面之一,这可能进一步对5G NR(新无线电)需求产生很大影响,例如无线电资源优化、无缝连接、最小切换和体验质量(QoE)。MAS5G (Move smart in 5G)探索了移动管理的途径,其中我们考虑了5G的三种主要服务,即(1)增强型移动宽带(eMBB),(2)超可靠低延迟通信(URLLC)和(3)大规模机器类型通信(mMTC)。与考虑所有类型服务(在当前网络中)的单一移动策略不同,我们提出MAS5G中央移动管理器(CMM),它将基于网络片为每个服务创建专用模式。如果用户订阅的网络片具有倾斜的特性和移动性需求,MAS5G CMM可以根据特定网络片的需求创建模式。它可以帮助AMF (Access and Mobility Management Function)根据预定义的模式提供应用于设备的Access和Mobility的专用属性。通过我们的仿真实验,基于实时mMTC和eMBB流量轨迹,我们表明MAS5G能够减少切换次数,从而显着节省UE的能量,从而进一步有助于提高QoE。
{"title":"MAS5G: Move Around Smartly in 5G","authors":"Shylendra Kumar, Rahul Banerji, Naman Gupta, Suman Kumar, Sukhdeep Singh, Avinash Bhat, Seungil Yoon, Shatarupa Dash","doi":"10.1109/FiCloud.2019.00037","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00037","url":null,"abstract":"5th Generation (5G) mobile networks is anticipated to serve large number of devices with multiple services in the single network. Due to heterogeneous service demand in a single network, 5G is presumed to be service based amalgamated with network slicing. The network will create a dedicated slice with dedicated resources and network elements based on the requested service. With so many devices and services under one umbrella of 5G, mobility becomes one of the crucial aspect, which can further have lot of impact on 5G NR (New Radio) requirements such as, radio resource optimization, seamless connectivity, minimal handovers and Quality of Experience (QoE). MAS5G (Move Smartly in 5G) explores the avenues of mobility management, wherein we consider three main services of 5G i.e. (1) enhanced Mobile Broadband (eMBB), (2) Ultra Reliable Low Latency Communications (URLLC) and (3) massive Machine Type Communications (mMTC). Unlike considering single mobility policy for all type of services (in the current networks), we propose MAS5G Central Mobility Manager (CMM), which will create dedicated schema for each service based on the network slice. With the help of User Equipment (UE) capability if network slice subscribed by subscriber is having skewed features and mobility requirement, MAS5G CMM creates schema as per the requirements of a particular network slice. It can help Access and Mobility Management Function (AMF) to provide dedicated attributes of Access and Mobility applied to devices based on predefined schemas. Through our simulation experiment, based on real time mMTC and eMBB traffic traces, we show that MAS5G is able to curtail the number of handovers, thus, saving the energy at UE significantly, which further helps to boost the QoE.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123978253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}