首页 > 最新文献

2022 IEEE Future Networks World Forum (FNWF)最新文献

英文 中文
A Learning-Based Zero-Trust Architecture for 6G and Future Networks 基于学习的6G及未来网络零信任架构
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00020
M. A. Enright, Eman M. Hammad, Ashutosh Dutta
In the evolution of 6G and Future Networks, a dynamic, flexible, learning-based security architecture will be essential with the ability to handle both current and evolving cybersecurity threats. This is specially critical with future networks' increased reliance on distributed learning-based approaches for operation. To address this challenge, a distributed learning framework must provide security and trust in an integrated fashion. In contrast to existing approach such as federated learning (FL), that update parameters of a shared model, this work proposes an architecture that is capable of integrating advanced learning with real-time digital forensics, e.g. monitoring compute and storage resources. With real-time monitoring, it is possible to develop a learning-based, real-time Zero-Trust Architecture (ZTA) to achieve the high levels of security. The proposed architecture, serves as a framework to enable and spur innovation, where new machine learning based techniques can be developed for enhanced real-time, adaptive and proactive security, thus, embedding future networks' security with learning-based ZTA elements.
在6G和未来网络的发展过程中,动态、灵活、基于学习的安全架构对于处理当前和不断发展的网络安全威胁的能力至关重要。随着未来网络越来越依赖基于分布式学习的操作方法,这一点尤为重要。为了应对这一挑战,分布式学习框架必须以集成的方式提供安全性和信任。与现有的方法(如更新共享模型参数的联邦学习(FL))相比,这项工作提出了一种能够将高级学习与实时数字取证(例如监控计算和存储资源)集成在一起的架构。通过实时监控,可以开发基于学习的实时零信任体系结构(ZTA),以实现高级别安全性。提出的架构作为一个框架,可以实现和刺激创新,在这个框架中,可以开发新的基于机器学习的技术,以增强实时、自适应和主动安全性,从而将未来网络的安全性嵌入基于学习的ZTA元素。
{"title":"A Learning-Based Zero-Trust Architecture for 6G and Future Networks","authors":"M. A. Enright, Eman M. Hammad, Ashutosh Dutta","doi":"10.1109/FNWF55208.2022.00020","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00020","url":null,"abstract":"In the evolution of 6G and Future Networks, a dynamic, flexible, learning-based security architecture will be essential with the ability to handle both current and evolving cybersecurity threats. This is specially critical with future networks' increased reliance on distributed learning-based approaches for operation. To address this challenge, a distributed learning framework must provide security and trust in an integrated fashion. In contrast to existing approach such as federated learning (FL), that update parameters of a shared model, this work proposes an architecture that is capable of integrating advanced learning with real-time digital forensics, e.g. monitoring compute and storage resources. With real-time monitoring, it is possible to develop a learning-based, real-time Zero-Trust Architecture (ZTA) to achieve the high levels of security. The proposed architecture, serves as a framework to enable and spur innovation, where new machine learning based techniques can be developed for enhanced real-time, adaptive and proactive security, thus, embedding future networks' security with learning-based ZTA elements.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121117113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Community CBRS Networks - What You Need to Know 社区CBRS网络-你需要知道的
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00047
Filippo Malandra, Mari Silbey, Rolando Alvarez, Bob Cacace, Troy Hege
In the wake of the pandemic, the federal government is directing billions of dollars to state and local governments in an effort to connect all residents to fast, affordable, reliable Internet service. The funding is a welcome investment as communities work to connect the unconnected. However, it also means community leaders need to move quickly to evaluate technologies and broadband deployment strategies. Citizen Broadband and Radio Service (CBRS) spectrum represents a novel solution to support such broadband initiatives but, due to its recent use, it comes with a number of unknowns that need to be considered and experimentally evaluated. In this paper, we propose an overview on the CBRS technology with a particular focus on lessons learned from existing deployments in the US. In particular, two use cases-in Buffalo, NY and Cleveland, OH-are presented to focus on two important lessons learned regarding the importance of i) thoroughly characterizing the propagation in the area of interest and ii) involving experts in different areas of specialty, such as structural/RF engineering or property management.
疫情爆发后,联邦政府向州和地方政府拨款数十亿美元,努力让所有居民都能享受到快速、负担得起、可靠的互联网服务。这笔资金是一项受欢迎的投资,因为社区正在努力将未联网的人连接起来。然而,这也意味着社区领导人需要迅速行动起来评估技术和宽带部署战略。公民宽带和无线电服务(CBRS)频谱代表了一种支持此类宽带计划的新颖解决方案,但由于其最近的使用,它存在许多未知因素,需要考虑和实验评估。在本文中,我们提出了对CBRS技术的概述,特别关注从美国现有部署中吸取的经验教训。特别地,两个用例——纽约州布法罗市和俄亥俄州克利夫兰市——将重点放在两个重要的经验教训上,即i)彻底描述感兴趣领域的传播特征,ii)涉及不同专业领域的专家,如结构/射频工程或物业管理。
{"title":"Community CBRS Networks - What You Need to Know","authors":"Filippo Malandra, Mari Silbey, Rolando Alvarez, Bob Cacace, Troy Hege","doi":"10.1109/FNWF55208.2022.00047","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00047","url":null,"abstract":"In the wake of the pandemic, the federal government is directing billions of dollars to state and local governments in an effort to connect all residents to fast, affordable, reliable Internet service. The funding is a welcome investment as communities work to connect the unconnected. However, it also means community leaders need to move quickly to evaluate technologies and broadband deployment strategies. Citizen Broadband and Radio Service (CBRS) spectrum represents a novel solution to support such broadband initiatives but, due to its recent use, it comes with a number of unknowns that need to be considered and experimentally evaluated. In this paper, we propose an overview on the CBRS technology with a particular focus on lessons learned from existing deployments in the US. In particular, two use cases-in Buffalo, NY and Cleveland, OH-are presented to focus on two important lessons learned regarding the importance of i) thoroughly characterizing the propagation in the area of interest and ii) involving experts in different areas of specialty, such as structural/RF engineering or property management.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121403348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Innovative Hashgraph-based Federated Learning Approach for Multi Domain 5G Network Protection 一种创新的基于哈希图的多域5G网络保护联邦学习方法
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00033
H. Kholidy, Riaad Kamaludeen
Federated Learning (FL) is a decentralized learning approach, meaning it learns from data housed locally on devices such as tablets, cellular phones, and more, and does not collect nor transfer user-sensitive data but merely learns from the data utilizing a shared model and sending periodical updates. Using federated learning throws out the problems associated with user privacy and the high bandwidth needed to transmit resource-intensive files to a central server for training. However, FL systems may be compromised to make a wrong decision or disclose private data once the attacker modifies the FL model and/or its paraments. The main contribution of this paper includes (1) introducing a comprehensive study that explores the FL and how it applies to different domains like healthcare and medicine, Insurance and Finance, Robotics and Autonomous Systems, Virtual Reality, and 5G. (2) Develop a Hashgraph-based federated learning Approach (HFLA) to protect the 5G network against poisoning and membership inherence attacks. The HFLA was evaluated using our Federated 5G testbed and proved its superiority compared to other existing FL approaches.
联邦学习(FL)是一种分散的学习方法,这意味着它从本地设备(如平板电脑、手机等)上的数据中学习,并且不收集或传输用户敏感数据,而只是利用共享模型从数据中学习并定期发送更新。使用联邦学习解决了与用户隐私和将资源密集型文件传输到中央服务器进行训练所需的高带宽相关的问题。然而,一旦攻击者修改FL模型和/或其参数,FL系统可能会做出错误的决定或泄露私人数据。本文的主要贡献包括:(1)介绍了一项全面的研究,探讨了FL及其如何应用于不同的领域,如医疗保健和医药、保险和金融、机器人和自主系统、虚拟现实和5G。(2)开发基于哈希图的联邦学习方法(HFLA),保护5G网络免受中毒攻击和成员固有攻击。HFLA使用我们的联邦5G测试平台进行了评估,并证明了其与其他现有FL方法相比的优势。
{"title":"An Innovative Hashgraph-based Federated Learning Approach for Multi Domain 5G Network Protection","authors":"H. Kholidy, Riaad Kamaludeen","doi":"10.1109/FNWF55208.2022.00033","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00033","url":null,"abstract":"Federated Learning (FL) is a decentralized learning approach, meaning it learns from data housed locally on devices such as tablets, cellular phones, and more, and does not collect nor transfer user-sensitive data but merely learns from the data utilizing a shared model and sending periodical updates. Using federated learning throws out the problems associated with user privacy and the high bandwidth needed to transmit resource-intensive files to a central server for training. However, FL systems may be compromised to make a wrong decision or disclose private data once the attacker modifies the FL model and/or its paraments. The main contribution of this paper includes (1) introducing a comprehensive study that explores the FL and how it applies to different domains like healthcare and medicine, Insurance and Finance, Robotics and Autonomous Systems, Virtual Reality, and 5G. (2) Develop a Hashgraph-based federated learning Approach (HFLA) to protect the 5G network against poisoning and membership inherence attacks. The HFLA was evaluated using our Federated 5G testbed and proved its superiority compared to other existing FL approaches.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128282808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automated Data Analytics and Resource Arbitration Scheduling for Containerized Network Functions 容器化网络功能的自动化数据分析和资源仲裁调度
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00038
T. Miyazawa, M. Jibiki, Ved P. Kafle
The agile deployment of network functions on containers in a virtualized network infrastructure is a viable solution for realizing future diverse microservice-based applications in 5G and beyond-5G networks. Because the CPU utilization of each containerized network function (CNF) is time-varying, microservice-based applications may experience a shortage or wastage of CPU resources if a fixed amount of resources is allocated to each CNF. In this study, to realize autonomous and proactive resource control for CNFs, we proposed and implemented an automated sequential processing system that cascades CPU utilization analytics by applying least-squares support vector regression and resource arbitration scheduling for CNFs. Through experiments and numerical analyses, we prove that the proposed system is sufficiently agile to perform automated sequential processing in approximately 2 s.
在虚拟化网络基础设施的容器上灵活部署网络功能,是在5G及5G以上网络中实现未来各种基于微服务的应用的可行解决方案。由于每个容器化网络功能(CNF)的CPU利用率是时变的,如果给每个CNF分配固定数量的资源,基于微服务的应用程序可能会出现CPU资源短缺或浪费的情况。在本研究中,为了实现CNFs的自主和主动资源控制,我们提出并实现了一个自动顺序处理系统,该系统通过对CNFs应用最小二乘支持向量回归和资源仲裁调度来级联CPU利用率分析。通过实验和数值分析,我们证明了该系统具有足够的敏捷性,可以在大约2秒内完成自动顺序处理。
{"title":"Automated Data Analytics and Resource Arbitration Scheduling for Containerized Network Functions","authors":"T. Miyazawa, M. Jibiki, Ved P. Kafle","doi":"10.1109/FNWF55208.2022.00038","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00038","url":null,"abstract":"The agile deployment of network functions on containers in a virtualized network infrastructure is a viable solution for realizing future diverse microservice-based applications in 5G and beyond-5G networks. Because the CPU utilization of each containerized network function (CNF) is time-varying, microservice-based applications may experience a shortage or wastage of CPU resources if a fixed amount of resources is allocated to each CNF. In this study, to realize autonomous and proactive resource control for CNFs, we proposed and implemented an automated sequential processing system that cascades CPU utilization analytics by applying least-squares support vector regression and resource arbitration scheduling for CNFs. Through experiments and numerical analyses, we prove that the proposed system is sufficiently agile to perform automated sequential processing in approximately 2 s.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127328283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource Allocation Using Filtennas in the Presence of Leakage 在存在泄漏的情况下使用过滤器进行资源分配
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00109
Ishani B. Majumdar, Shaghayegh Vosoughitabar, C. Wu, N. Mandayam, Joseph Brodie, Behzad Golparvar, Ruoqian Wang
The utilization of newer spectrum bands such as in 5G and 6G networks, has the potential to inadvertently cause interference to passive sensing applications operating in the adjacent portions of spectrum. One such application that has received a lot of attention has been passive weather sensing where leakage from 5G mmWave band transmissions in the 26 GHz spectrum could potentially impact the observations of passive sensors on weather prediction satellites. To mitigate problems such as the above, we present a design framework that can be employed in mm Wave networks by using filtennas (or filtering antennas) at the transmitter along with integrated resource allocation to minimize leakage into adjacent channels. Specifically, we propose an Iterative Leakage Aware Water Filling solution to allocate power and bandwidth in a system employing filtennas that guarantees performance requirements while reducing the leakage. In addition, a key contribution of this work is the characterization of the leakage function based on the order of filtennas which is incorporated in our resource allocation framework.
在5G和6G网络等较新的频谱频段中,有可能无意中对在频谱邻近部分运行的被动传感应用造成干扰。其中一个受到广泛关注的应用是被动天气传感,其中26 GHz频谱的5G毫米波频段传输的泄漏可能会影响天气预报卫星上被动传感器的观测。为了缓解上述问题,我们提出了一种设计框架,该框架可用于毫米波网络,通过在发射机上使用滤波器(或滤波天线)以及集成资源分配来最大限度地减少相邻信道的泄漏。具体而言,我们提出了一种迭代泄漏感知充水解决方案,用于在采用过滤器的系统中分配功率和带宽,以保证性能要求,同时减少泄漏。此外,这项工作的一个关键贡献是基于过滤器顺序的泄漏函数的特征,该特征被纳入我们的资源分配框架。
{"title":"Resource Allocation Using Filtennas in the Presence of Leakage","authors":"Ishani B. Majumdar, Shaghayegh Vosoughitabar, C. Wu, N. Mandayam, Joseph Brodie, Behzad Golparvar, Ruoqian Wang","doi":"10.1109/FNWF55208.2022.00109","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00109","url":null,"abstract":"The utilization of newer spectrum bands such as in 5G and 6G networks, has the potential to inadvertently cause interference to passive sensing applications operating in the adjacent portions of spectrum. One such application that has received a lot of attention has been passive weather sensing where leakage from 5G mmWave band transmissions in the 26 GHz spectrum could potentially impact the observations of passive sensors on weather prediction satellites. To mitigate problems such as the above, we present a design framework that can be employed in mm Wave networks by using filtennas (or filtering antennas) at the transmitter along with integrated resource allocation to minimize leakage into adjacent channels. Specifically, we propose an Iterative Leakage Aware Water Filling solution to allocate power and bandwidth in a system employing filtennas that guarantees performance requirements while reducing the leakage. In addition, a key contribution of this work is the characterization of the leakage function based on the order of filtennas which is incorporated in our resource allocation framework.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131692507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Edge-Based Machine Learning-Enabled Approach in Structural Health Monitoring for Public Protection 基于边缘的机器学习在公共保护结构健康监测中的应用
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00031
C. Rinaldi, Francesco Smarra, F. Franchi, A. D’innocenzo
5G technologies have opened a wide range of possibilities in all the application fields that require features as low latency and massive Machine-Type Communications (mMTC), such as Structural Health Monitoring (SHM) systems. In this paper, an edge-based Machine Learning (ML) enabled public safety service is proposed where an SHM system is exploited to support public protection actions in case of critical situations. To this aim, an end-to-end solution based on ultra Reliable and Low Latency (uRLLC) networks is proposed together with an innovative ML-based approach that uses SHM systems information to detect critical issues in structures. The unprecedented level of reliability offered by uRLLC networks together with the efficient ML modeling capabilities allow to efficiently propagate an alarm message in case of emergency. Referring to the 5G vision, the proposed SHM system can thus be considered depending on the operational scenario: in the case of data collection and processing from sensors, considering the high number of sensors installed, it can refer to the massive Machine-Type Communications (mMTC) context; vice-versa, during a safety critical situation e.g., during an earthquake or under structural problems, or immediately after the event, the use case requires high reliability, connectivity, and sometimes low latency, i.e. uRLLC.
5G技术在所有需要低延迟和大规模机器类型通信(mMTC)功能的应用领域开辟了广泛的可能性,例如结构健康监测(SHM)系统。在本文中,提出了一种基于边缘的机器学习(ML)公共安全服务,其中利用SHM系统在危急情况下支持公共保护行动。为此,提出了一种基于超可靠和低延迟(uRLLC)网络的端到端解决方案,以及一种基于ml的创新方法,该方法使用SHM系统信息来检测结构中的关键问题。uRLLC网络提供的前所未有的可靠性水平以及高效的ML建模功能允许在紧急情况下有效地传播警报消息。参考5G愿景,因此可以根据操作场景考虑拟议的SHM系统:在从传感器收集和处理数据的情况下,考虑到安装的传感器数量众多,它可以参考大规模机器类型通信(mMTC)环境;反之亦然,在安全危急情况下,例如,在地震或结构性问题期间,或事件发生后,用例需要高可靠性、连接性,有时还需要低延迟,即uRLLC。
{"title":"An Edge-Based Machine Learning-Enabled Approach in Structural Health Monitoring for Public Protection","authors":"C. Rinaldi, Francesco Smarra, F. Franchi, A. D’innocenzo","doi":"10.1109/FNWF55208.2022.00031","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00031","url":null,"abstract":"5G technologies have opened a wide range of possibilities in all the application fields that require features as low latency and massive Machine-Type Communications (mMTC), such as Structural Health Monitoring (SHM) systems. In this paper, an edge-based Machine Learning (ML) enabled public safety service is proposed where an SHM system is exploited to support public protection actions in case of critical situations. To this aim, an end-to-end solution based on ultra Reliable and Low Latency (uRLLC) networks is proposed together with an innovative ML-based approach that uses SHM systems information to detect critical issues in structures. The unprecedented level of reliability offered by uRLLC networks together with the efficient ML modeling capabilities allow to efficiently propagate an alarm message in case of emergency. Referring to the 5G vision, the proposed SHM system can thus be considered depending on the operational scenario: in the case of data collection and processing from sensors, considering the high number of sensors installed, it can refer to the massive Machine-Type Communications (mMTC) context; vice-versa, during a safety critical situation e.g., during an earthquake or under structural problems, or immediately after the event, the use case requires high reliability, connectivity, and sometimes low latency, i.e. uRLLC.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121200014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Jamming Attacks on NextG Radio Access Network Slicing with Reinforcement Learning 基于强化学习的NextG无线接入网切片干扰攻击
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00076
Yi Shi, Y. Sagduyu, T. Erpek, M. C. Gursoy
This paper studies how to launch an attack on reinforcement learning for network slicing in NextG radio access network (RAN). An adversarial machine learning approach is pursued to construct an over-the-air attack that manipulates the reinforcement learning algorithm and disrupts resource allocation of NextG RAN slicing. Resource blocks are allocated by the base station (gNodeB) to the requests of user equipments and reinforcement learning is applied to maximize the total reward of accepted requests over time. In the meantime, the jammer builds its surrogate model with its own reinforcement learning algorithm by observing the spectrum. This surrogate model is used to select which resource blocks to jam subject to an energy budget. The jammer's goal is to maximize the number of failed network slicing requests. For that purpose, the jammer jams the resource blocks and reduces the reinforcement learning algorithm's reward that is used as the input to update the reinforcement learning algorithm for network slicing. As result, the network slicing performance does not recover for a while even after the jammer stops jamming. The recovery time and the loss in the reward are evaluated for this attack. Results demonstrate the effectiveness of this attack compared to benchmark (random and myopic) jamming attacks, and indicate vulnerabilities of NextG RAN slicing to smart jammers.
本文研究了如何在下一代无线接入网(RAN)中对网络切片进行强化学习攻击。采用对抗性机器学习方法构建空中攻击,操纵强化学习算法并破坏NextG RAN切片的资源分配。资源块由基站(gNodeB)分配给用户设备的请求,并应用强化学习来最大化接受请求的总回报。同时,干扰机通过观察频谱,用自己的强化学习算法建立代理模型。该代理模型用于根据能源预算选择阻塞哪些资源块。干扰者的目标是最大化失败的网络切片请求的数量。为此,干扰器阻塞资源块,减少强化学习算法的奖励,作为更新网络切片强化学习算法的输入。因此,即使在干扰器停止干扰后,网络切片性能在一段时间内也无法恢复。对这种攻击的恢复时间和奖励损失进行评估。结果表明,与基准(随机和短视)干扰攻击相比,这种攻击是有效的,并指出了NextG RAN切片对智能干扰器的漏洞。
{"title":"Jamming Attacks on NextG Radio Access Network Slicing with Reinforcement Learning","authors":"Yi Shi, Y. Sagduyu, T. Erpek, M. C. Gursoy","doi":"10.1109/FNWF55208.2022.00076","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00076","url":null,"abstract":"This paper studies how to launch an attack on reinforcement learning for network slicing in NextG radio access network (RAN). An adversarial machine learning approach is pursued to construct an over-the-air attack that manipulates the reinforcement learning algorithm and disrupts resource allocation of NextG RAN slicing. Resource blocks are allocated by the base station (gNodeB) to the requests of user equipments and reinforcement learning is applied to maximize the total reward of accepted requests over time. In the meantime, the jammer builds its surrogate model with its own reinforcement learning algorithm by observing the spectrum. This surrogate model is used to select which resource blocks to jam subject to an energy budget. The jammer's goal is to maximize the number of failed network slicing requests. For that purpose, the jammer jams the resource blocks and reduces the reinforcement learning algorithm's reward that is used as the input to update the reinforcement learning algorithm for network slicing. As result, the network slicing performance does not recover for a while even after the jammer stops jamming. The recovery time and the loss in the reward are evaluated for this attack. Results demonstrate the effectiveness of this attack compared to benchmark (random and myopic) jamming attacks, and indicate vulnerabilities of NextG RAN slicing to smart jammers.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123502959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optical X-haul for 5G /6G: Design and Deployment Standpoint 面向5G /6G的光X-haul:设计和部署观点
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00095
C. Lim, Chathurika Ranaweera, A. Nirmalathas, Yijie Tao, Sampath Edirisinghe, L. Wosinska, Tingting Song
In this paper, we review the work we have carried out in the investigation of the transport network in a hybrid fiber-wireless system to cater for the next generation wireless networks. We have demonstrated advanced coordination functionality in the physical layer to enable coordination between remote radio heads. We have also devised an optimization framework to jointly optimize the wireless and optical network that minimizes the deployment cost. We conclude the paper by providing insights into a reconfigurable optical architecture that can be used to support wireless networks of 6G and beyond.
在本文中,我们回顾了我们在研究光纤-无线混合系统中的传输网络以适应下一代无线网络方面所做的工作。我们已经演示了物理层的高级协调功能,以实现远程无线电头之间的协调。我们还设计了一个优化框架,以共同优化无线和光网络,从而最大限度地降低部署成本。我们通过提供可用于支持6G及以上无线网络的可重构光架构的见解来总结本文。
{"title":"Optical X-haul for 5G /6G: Design and Deployment Standpoint","authors":"C. Lim, Chathurika Ranaweera, A. Nirmalathas, Yijie Tao, Sampath Edirisinghe, L. Wosinska, Tingting Song","doi":"10.1109/FNWF55208.2022.00095","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00095","url":null,"abstract":"In this paper, we review the work we have carried out in the investigation of the transport network in a hybrid fiber-wireless system to cater for the next generation wireless networks. We have demonstrated advanced coordination functionality in the physical layer to enable coordination between remote radio heads. We have also devised an optimization framework to jointly optimize the wireless and optical network that minimizes the deployment cost. We conclude the paper by providing insights into a reconfigurable optical architecture that can be used to support wireless networks of 6G and beyond.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121173441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Discovering the most urgent 5G services for the competitiveness of the port using an updated Analytic Hierarchic Process in the 5G-LOGINNOV project 在5G- loginnov项目中,使用更新的层次分析法发现港口竞争力最紧迫的5G服务
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00056
G. Renzi
The Analytic Hierarchic Process (AHP) is a type of analysis that allows finding - considering different criteria and given a certain objective - the best option among different choices [1]. Since it is not always possible and easy to collect proper data for AHP (especially if the context is complex and the stakeholders are complicated to contact), in this paper we want to propose a new methodology that allow to perform the AHP using data collected for other scopes. Following in the footsteps of the AHP proposed by Saaty [1], through a new methodology this paper identifies the most important 5G services for the competitiveness of the port. The research field is the 5G-LOGINNOV project and the research question that guided the work is: which 5G service best meets the most urgent needs of the ports? The aim of this paper is to propose a methodology for an AHP that can be re-used to understand which are the most urgent services needed in line with the defined objectives.
层次分析法(AHP)是一种分析方法,它允许在考虑不同标准和给定特定目标的情况下,在不同的选择中找到最佳选择[1]。由于为AHP收集适当的数据并不总是可能和容易的(特别是如果上下文很复杂,涉众很难联系),在本文中,我们想提出一种新的方法,允许使用为其他范围收集的数据来执行AHP。跟随Saaty[1]提出的AHP的脚步,通过一种新的方法,本文确定了对港口竞争力最重要的5G服务。研究领域为5G- loginnov项目,指导工作的研究问题是:哪种5G服务最能满足端口最迫切的需求?本文的目的是为AHP提出一种方法,该方法可以被重用,以了解哪些是与定义的目标一致的最迫切需要的服务。
{"title":"Discovering the most urgent 5G services for the competitiveness of the port using an updated Analytic Hierarchic Process in the 5G-LOGINNOV project","authors":"G. Renzi","doi":"10.1109/FNWF55208.2022.00056","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00056","url":null,"abstract":"The Analytic Hierarchic Process (AHP) is a type of analysis that allows finding - considering different criteria and given a certain objective - the best option among different choices [1]. Since it is not always possible and easy to collect proper data for AHP (especially if the context is complex and the stakeholders are complicated to contact), in this paper we want to propose a new methodology that allow to perform the AHP using data collected for other scopes. Following in the footsteps of the AHP proposed by Saaty [1], through a new methodology this paper identifies the most important 5G services for the competitiveness of the port. The research field is the 5G-LOGINNOV project and the research question that guided the work is: which 5G service best meets the most urgent needs of the ports? The aim of this paper is to propose a methodology for an AHP that can be re-used to understand which are the most urgent services needed in line with the defined objectives.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121641027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Cost of Uncertainty: Impact of Overprovisioning on the Dimensioning of Machine Learning-based Network Slicing 不确定性代价:过度供给对基于机器学习的网络切片维数的影响
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00120
Caner Bektas, S. Böcker, C. Wietfeld
Increasing automation of industry verticals and frequently changing production cycles require a high level of production line modularity and are locally accompanied by frequently changing disjunctive application requirements. Thus, current and future wireless communication networks need to face the challenge of providing opportunities to rapidly adapt the network to its changing application demands in order to guarantee a resilient and interference-free communication. A possible key technology for implementing such a solution is represented by private 5G networks that are additionally equipped with network slicing in order to be able to meet the versatile requirements of novel applications. However, resilient network design as well as network slice dimensioning can only be guaranteed through detailed network planning. This requires expert knowledge, which is not yet present at most companies or institutions. Accordingly, automation of the network planning process is a possible solution. Existing coverage planning frameworks are extended by capacity planning in this work, and network slicing is introduced. It is shown on the basis of a realistic scenario that the predictability of data (e.g., traffic characteristics in low-latency slices) significantly influences capacity planning and must be taken into account in the dimensioning of 5G and beyond future mobile networks.
垂直行业自动化程度的提高和频繁变化的生产周期需要高水平的生产线模块化,并且在当地伴随着频繁变化的分离应用需求。因此,当前和未来的无线通信网络需要面对的挑战是提供机会来快速调整网络以适应不断变化的应用需求,以保证弹性和无干扰的通信。实现这种解决方案的一种可能的关键技术是专用5G网络,该网络额外配备了网络切片,以便能够满足新应用的多用途要求。然而,只有通过详细的网络规划,才能保证网络的弹性设计和网络切片的尺寸。这需要专业知识,而大多数公司或机构尚不具备这方面的知识。因此,网络规划过程的自动化是一个可能的解决方案。本文通过容量规划对现有的覆盖规划框架进行扩展,并引入了网络切片技术。在一个现实场景的基础上,数据的可预测性(例如,低延迟切片中的流量特征)对容量规划有重大影响,必须在5G及未来移动网络的维度规划中加以考虑。
{"title":"The Cost of Uncertainty: Impact of Overprovisioning on the Dimensioning of Machine Learning-based Network Slicing","authors":"Caner Bektas, S. Böcker, C. Wietfeld","doi":"10.1109/FNWF55208.2022.00120","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00120","url":null,"abstract":"Increasing automation of industry verticals and frequently changing production cycles require a high level of production line modularity and are locally accompanied by frequently changing disjunctive application requirements. Thus, current and future wireless communication networks need to face the challenge of providing opportunities to rapidly adapt the network to its changing application demands in order to guarantee a resilient and interference-free communication. A possible key technology for implementing such a solution is represented by private 5G networks that are additionally equipped with network slicing in order to be able to meet the versatile requirements of novel applications. However, resilient network design as well as network slice dimensioning can only be guaranteed through detailed network planning. This requires expert knowledge, which is not yet present at most companies or institutions. Accordingly, automation of the network planning process is a possible solution. Existing coverage planning frameworks are extended by capacity planning in this work, and network slicing is introduced. It is shown on the basis of a realistic scenario that the predictability of data (e.g., traffic characteristics in low-latency slices) significantly influences capacity planning and must be taken into account in the dimensioning of 5G and beyond future mobile networks.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127002368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE Future Networks World Forum (FNWF)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1