首页 > 最新文献

2022 IEEE Future Networks World Forum (FNWF)最新文献

英文 中文
The Cost of Uncertainty: Impact of Overprovisioning on the Dimensioning of Machine Learning-based Network Slicing 不确定性代价:过度供给对基于机器学习的网络切片维数的影响
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00120
Caner Bektas, S. Böcker, C. Wietfeld
Increasing automation of industry verticals and frequently changing production cycles require a high level of production line modularity and are locally accompanied by frequently changing disjunctive application requirements. Thus, current and future wireless communication networks need to face the challenge of providing opportunities to rapidly adapt the network to its changing application demands in order to guarantee a resilient and interference-free communication. A possible key technology for implementing such a solution is represented by private 5G networks that are additionally equipped with network slicing in order to be able to meet the versatile requirements of novel applications. However, resilient network design as well as network slice dimensioning can only be guaranteed through detailed network planning. This requires expert knowledge, which is not yet present at most companies or institutions. Accordingly, automation of the network planning process is a possible solution. Existing coverage planning frameworks are extended by capacity planning in this work, and network slicing is introduced. It is shown on the basis of a realistic scenario that the predictability of data (e.g., traffic characteristics in low-latency slices) significantly influences capacity planning and must be taken into account in the dimensioning of 5G and beyond future mobile networks.
垂直行业自动化程度的提高和频繁变化的生产周期需要高水平的生产线模块化,并且在当地伴随着频繁变化的分离应用需求。因此,当前和未来的无线通信网络需要面对的挑战是提供机会来快速调整网络以适应不断变化的应用需求,以保证弹性和无干扰的通信。实现这种解决方案的一种可能的关键技术是专用5G网络,该网络额外配备了网络切片,以便能够满足新应用的多用途要求。然而,只有通过详细的网络规划,才能保证网络的弹性设计和网络切片的尺寸。这需要专业知识,而大多数公司或机构尚不具备这方面的知识。因此,网络规划过程的自动化是一个可能的解决方案。本文通过容量规划对现有的覆盖规划框架进行扩展,并引入了网络切片技术。在一个现实场景的基础上,数据的可预测性(例如,低延迟切片中的流量特征)对容量规划有重大影响,必须在5G及未来移动网络的维度规划中加以考虑。
{"title":"The Cost of Uncertainty: Impact of Overprovisioning on the Dimensioning of Machine Learning-based Network Slicing","authors":"Caner Bektas, S. Böcker, C. Wietfeld","doi":"10.1109/FNWF55208.2022.00120","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00120","url":null,"abstract":"Increasing automation of industry verticals and frequently changing production cycles require a high level of production line modularity and are locally accompanied by frequently changing disjunctive application requirements. Thus, current and future wireless communication networks need to face the challenge of providing opportunities to rapidly adapt the network to its changing application demands in order to guarantee a resilient and interference-free communication. A possible key technology for implementing such a solution is represented by private 5G networks that are additionally equipped with network slicing in order to be able to meet the versatile requirements of novel applications. However, resilient network design as well as network slice dimensioning can only be guaranteed through detailed network planning. This requires expert knowledge, which is not yet present at most companies or institutions. Accordingly, automation of the network planning process is a possible solution. Existing coverage planning frameworks are extended by capacity planning in this work, and network slicing is introduced. It is shown on the basis of a realistic scenario that the predictability of data (e.g., traffic characteristics in low-latency slices) significantly influences capacity planning and must be taken into account in the dimensioning of 5G and beyond future mobile networks.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127002368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Agile Metropolitan Filterless Optical Networking 敏捷城域无滤波光网络
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00029
C. Tremblay, É. Archambault, Rodney G. Wilson, Stewart Clelland, M. Furdek, L. Wosinska
The tremendous traffic growth generated by video, cloud, future 5G and beyond services is compelling network operators to re-think network architectures to ensure flexible and efficient service support. Filterless optical networking based on broadcast-and-select nodes and coherent transceivers is considered as a disruptive approach for delivering network agility in a cost-effective manner. The filterless network concept has been widely studied for terrestrial and submarine applications. In this paper, we explore the suitability of filterless architectures in metropolitan networks through a comparative performance analysis with a conventional metro network based on active switching. The results show that a filterless solution with lower, but adequate, network connectivity can achieve up to 36% lower power consumption and up to 45.4% cost reduction at the expense of a 19% higher spectrum usage, which makes the filterless architecture an attractive alternative for metro network deployments.
视频、云、未来5G及其他服务带来的巨大流量增长,迫使网络运营商重新思考网络架构,以确保灵活高效的业务支持。基于广播选择节点和相干收发器的无滤波器光网络被认为是一种以经济有效的方式提供网络敏捷性的颠覆性方法。无滤波器网络的概念在陆地和海底应用中得到了广泛的研究。在本文中,我们通过与基于主动交换的传统城域网络的性能比较分析来探讨无滤波器架构在城域网络中的适用性。结果表明,具有较低但足够的网络连接性的无滤波器解决方案可以实现高达36%的功耗降低和高达45.4%的成本降低,而代价是频谱使用增加19%,这使得无滤波器架构成为城域网络部署的一个有吸引力的替代方案。
{"title":"Agile Metropolitan Filterless Optical Networking","authors":"C. Tremblay, É. Archambault, Rodney G. Wilson, Stewart Clelland, M. Furdek, L. Wosinska","doi":"10.1109/FNWF55208.2022.00029","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00029","url":null,"abstract":"The tremendous traffic growth generated by video, cloud, future 5G and beyond services is compelling network operators to re-think network architectures to ensure flexible and efficient service support. Filterless optical networking based on broadcast-and-select nodes and coherent transceivers is considered as a disruptive approach for delivering network agility in a cost-effective manner. The filterless network concept has been widely studied for terrestrial and submarine applications. In this paper, we explore the suitability of filterless architectures in metropolitan networks through a comparative performance analysis with a conventional metro network based on active switching. The results show that a filterless solution with lower, but adequate, network connectivity can achieve up to 36% lower power consumption and up to 45.4% cost reduction at the expense of a 19% higher spectrum usage, which makes the filterless architecture an attractive alternative for metro network deployments.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133067280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Link Failure Recovery in SDN-Enabled Reconfigurable 6G Crosshaul Architecture 基于sdn的可重构6G交叉通道架构中的链路故障恢复
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00079
Yijie Tao, Sampath Edirisinghe, Chathurika Ranaweera, C. Lim, A. Nirmalathas, L. Wosinska
While 5G infrastructure is being rapidly rolled out around the world, it is clear that a key strategy to meet the required high speed, ubiquitous connection is via small cell deployment and cell densification. This results in increased complexity in orchestrating and managing the Radio Access Network (RAN). To this end, we proposed a novel Software Defined Networking (SDN)-enabled reconfigurable crosshaul architecture for supporting heterogeneous hauling technologies and enhancing RAN flexibility and robustness. This is achieved by crosshaul control and data plane separation and a novel control plane. In particular, the link failure recovery procedure in the proposed architecture is evaluated to assess the robustness of the network. Simulation results illustrated that the fast recovery time will not interrupt the mobile users' connectivity with RAN. However, mobile users' data plane shows impacts on different RAN protocol layers due to the failure.
虽然5G基础设施正在全球迅速铺开,但很明显,满足所需的高速、无处不在的连接的关键战略是通过小型蜂窝部署和蜂窝密度。这增加了编排和管理无线接入网(RAN)的复杂性。为此,我们提出了一种新颖的支持软件定义网络(SDN)的可重构交叉通道架构,以支持异构运输技术并增强RAN的灵活性和鲁棒性。这是通过交叉控制和数据平面分离以及一个新的控制平面来实现的。特别地,我们对所提出的架构中的链路故障恢复过程进行了评估,以评估网络的鲁棒性。仿真结果表明,快速恢复时间不会中断移动用户与无线局域网的连接。但是由于故障,移动用户的数据平面会对RAN协议的不同层产生影响。
{"title":"Link Failure Recovery in SDN-Enabled Reconfigurable 6G Crosshaul Architecture","authors":"Yijie Tao, Sampath Edirisinghe, Chathurika Ranaweera, C. Lim, A. Nirmalathas, L. Wosinska","doi":"10.1109/FNWF55208.2022.00079","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00079","url":null,"abstract":"While 5G infrastructure is being rapidly rolled out around the world, it is clear that a key strategy to meet the required high speed, ubiquitous connection is via small cell deployment and cell densification. This results in increased complexity in orchestrating and managing the Radio Access Network (RAN). To this end, we proposed a novel Software Defined Networking (SDN)-enabled reconfigurable crosshaul architecture for supporting heterogeneous hauling technologies and enhancing RAN flexibility and robustness. This is achieved by crosshaul control and data plane separation and a novel control plane. In particular, the link failure recovery procedure in the proposed architecture is evaluated to assess the robustness of the network. Simulation results illustrated that the fast recovery time will not interrupt the mobile users' connectivity with RAN. However, mobile users' data plane shows impacts on different RAN protocol layers due to the failure.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132700695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attack Graphs for Standalone Non-Public 5G Networks 独立非公共5G网络攻击图
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00036
Arpit Tripathi, A. Thakur, T. B. Reddy
Private Networks (also known as Non-Public Net-works) bring significant benefits to Industry 4.0. These networks are typically deployed on-premises of the enterprises, and their isolation from the public (consumer) networks improves the crucial aspects of security and reliability. Despite the isolation, insider attacks can be mounted on these networks. This paper analyses such attacks using attack patterns from Common Attack Pattern Enumerations and Classifications (CAPEC) database. The analysis uses attack graphs, to combine individual domains, in the context of human, device, and network vulner-abilities. The attack graphs help identify paths, the cumulative impact on the system, and possible defense techniques, including security controls to mitigate the impact. Using three sample attack graphs in the context of standalone private 5G networks, this paper analyses possible security mechanisms and captures the difference among legacy enterprise networks (including WiFi for limited mobility), public networks, and private networks.
专用网络(也称为非公用网络)为工业4.0带来了巨大的好处。这些网络通常部署在企业内部,它们与公共(消费者)网络的隔离提高了安全性和可靠性的关键方面。尽管这些网络是隔离的,但内部攻击仍然可以在这些网络上进行。本文利用CAPEC数据库中的攻击模式对这类攻击进行了分析。该分析使用攻击图,在人员、设备和网络漏洞的上下文中组合各个域。攻击图有助于识别路径、对系统的累积影响以及可能的防御技术,包括减轻影响的安全控制。本文使用独立私有5G网络背景下的三个示例攻击图,分析了可能的安全机制,并捕获了传统企业网络(包括用于有限移动的WiFi)、公共网络和私有网络之间的差异。
{"title":"Attack Graphs for Standalone Non-Public 5G Networks","authors":"Arpit Tripathi, A. Thakur, T. B. Reddy","doi":"10.1109/FNWF55208.2022.00036","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00036","url":null,"abstract":"Private Networks (also known as Non-Public Net-works) bring significant benefits to Industry 4.0. These networks are typically deployed on-premises of the enterprises, and their isolation from the public (consumer) networks improves the crucial aspects of security and reliability. Despite the isolation, insider attacks can be mounted on these networks. This paper analyses such attacks using attack patterns from Common Attack Pattern Enumerations and Classifications (CAPEC) database. The analysis uses attack graphs, to combine individual domains, in the context of human, device, and network vulner-abilities. The attack graphs help identify paths, the cumulative impact on the system, and possible defense techniques, including security controls to mitigate the impact. Using three sample attack graphs in the context of standalone private 5G networks, this paper analyses possible security mechanisms and captures the difference among legacy enterprise networks (including WiFi for limited mobility), public networks, and private networks.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131561756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cost-efficient Federated Reinforcement Learning- Based Network Routing for Wireless Networks 成本效益的基于联邦强化学习的无线网络路由
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00050
Zakaria Abou El Houda, Diala Naboulsi, Georges Kaddoum
Advances in Artificial Intelligence (AI) provide new capabilities to handle network routing problems. However, the lack of up-to-date training data, slow convergence, and low robustness due to the dynamic change of the network topology, makes these AI-based routing systems inefficient. To address this problem, Reinforcement Learning (RL) has been introduced to design more flexible and robust network routing protocols. However, the amount of data ($i$. e., state-action space) shared be- tween agents, in a Multi-Agent Reinforcement Learning (MARL) setup, can consume network bandwidth and may slow down the process of training. Moreover, the curse of dimensionality of RL encompasses the exponential growth of the discrete state-action space, thus limiting its potential benefit. In this paper, we present a novel approach combining Federated Learning (FL) with Deep Reinforcement Learning (D RL) in order to ensure an effective network routing in wireless environment. First, we formalize the problem of network routing as a problem of RL, where multiple agents that are geographically distributed train the policy model in a fully distributed manner. Thus, each agent can quickly obtain the optimal policy that maximizes the cumulative expected reward, while preserving the privacy of each agent's data. Experiments results show that our proposed Federated Reinforcement Learning (FRL) approach is robust and effective.
人工智能(AI)的进步为处理网络路由问题提供了新的能力。然而,由于缺乏最新的训练数据,由于网络拓扑结构的动态变化,收敛速度慢,鲁棒性低,使得这些基于人工智能的路由系统效率低下。为了解决这个问题,已经引入了强化学习(RL)来设计更灵活和健壮的网络路由协议。然而,数据量($i$。在多智能体强化学习(MARL)设置中,智能体之间共享的状态-动作空间(即状态-动作空间)会消耗网络带宽,并可能减慢训练过程。此外,RL的维数诅咒包含了离散状态-行为空间的指数增长,从而限制了其潜在的好处。本文提出了一种将联邦学习(FL)与深度强化学习(D RL)相结合的新方法,以确保无线环境下有效的网络路由。首先,我们将网络路由问题形式化为RL问题,其中地理上分布的多个代理以完全分布的方式训练策略模型。这样,每个agent都可以在保证数据隐私性的前提下,快速获得累积期望奖励最大化的最优策略。实验结果表明,我们提出的联邦强化学习(FRL)方法具有鲁棒性和有效性。
{"title":"Cost-efficient Federated Reinforcement Learning- Based Network Routing for Wireless Networks","authors":"Zakaria Abou El Houda, Diala Naboulsi, Georges Kaddoum","doi":"10.1109/FNWF55208.2022.00050","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00050","url":null,"abstract":"Advances in Artificial Intelligence (AI) provide new capabilities to handle network routing problems. However, the lack of up-to-date training data, slow convergence, and low robustness due to the dynamic change of the network topology, makes these AI-based routing systems inefficient. To address this problem, Reinforcement Learning (RL) has been introduced to design more flexible and robust network routing protocols. However, the amount of data ($i$. e., state-action space) shared be- tween agents, in a Multi-Agent Reinforcement Learning (MARL) setup, can consume network bandwidth and may slow down the process of training. Moreover, the curse of dimensionality of RL encompasses the exponential growth of the discrete state-action space, thus limiting its potential benefit. In this paper, we present a novel approach combining Federated Learning (FL) with Deep Reinforcement Learning (D RL) in order to ensure an effective network routing in wireless environment. First, we formalize the problem of network routing as a problem of RL, where multiple agents that are geographically distributed train the policy model in a fully distributed manner. Thus, each agent can quickly obtain the optimal policy that maximizes the cumulative expected reward, while preserving the privacy of each agent's data. Experiments results show that our proposed Federated Reinforcement Learning (FRL) approach is robust and effective.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132919105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
No Limits – Smart Cellular Edges for Cross-Border Continuity of Automotive Services 无极限——汽车服务跨界连续性的智能蜂窝边缘
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00089
Girma M. Yilma, Nina Slamnik-Kriještorac, M. Liebsch, A. Francescon, J. Márquez-Barja
One of the major challenges in 5G-based Cooperative Connected and Automated Mobility is to ensure continuity of a service that is deployed on the network edge and used by a moving vehicle. We propose enablers for smart cellular edges, which support service continuity in cross-border scenarios by the timely preparation of a service instance in an anticipated topologically closer target edge, and by connecting the vehicle to such service instance before the cellular handover occurs. In this paper, we use the edge data centers of a German and Austrian mobile operator to showcase two main enabling pillars for edge service continuity, i.e., i) transparent edge bridging by means of a programmable data plane to serve a vehicle from the target edge before the vehicle performs handover to a different operator, and ii) smart applications, which apply data analytics to boost orchestration decisions for target edge preparation.
基于5g的协作连接和自动移动的主要挑战之一是确保部署在网络边缘并由移动车辆使用的服务的连续性。我们提出了智能蜂窝边缘的使能器,它通过在预期的拓扑上更接近的目标边缘及时准备服务实例,并在蜂窝切换发生之前将车辆连接到该服务实例,来支持跨界场景中的服务连续性。在本文中,我们使用德国和奥地利移动运营商的边缘数据中心来展示边缘服务连续性的两个主要支持支柱,即i)通过可编程数据平面的透明边缘桥接,在车辆执行切换到不同的运营商之前从目标边缘为车辆提供服务,以及ii)智能应用程序,应用数据分析来促进目标边缘准备的编排决策。
{"title":"No Limits – Smart Cellular Edges for Cross-Border Continuity of Automotive Services","authors":"Girma M. Yilma, Nina Slamnik-Kriještorac, M. Liebsch, A. Francescon, J. Márquez-Barja","doi":"10.1109/FNWF55208.2022.00089","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00089","url":null,"abstract":"One of the major challenges in 5G-based Cooperative Connected and Automated Mobility is to ensure continuity of a service that is deployed on the network edge and used by a moving vehicle. We propose enablers for smart cellular edges, which support service continuity in cross-border scenarios by the timely preparation of a service instance in an anticipated topologically closer target edge, and by connecting the vehicle to such service instance before the cellular handover occurs. In this paper, we use the edge data centers of a German and Austrian mobile operator to showcase two main enabling pillars for edge service continuity, i.e., i) transparent edge bridging by means of a programmable data plane to serve a vehicle from the target edge before the vehicle performs handover to a different operator, and ii) smart applications, which apply data analytics to boost orchestration decisions for target edge preparation.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128941539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Decoupling Statistical Trends from Data Volume on LDP-Based Spatio-Temporal Data Collection 基于ldp时空数据采集的数据量统计解耦趋势
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00053
Taisho Sasada, Yuzo Taenaka, Y. Kadobayashi
Spatio-temporal data is useful for various applications such as urban planning, epidemiology, and natural disasters, but causes exposure of private information, such as home/workplace addresses, because it involves people's trajec-tories. Local Differential Privacy (LDP) based processing is a promising technology for removing sensitive information from spatio-temporal data. A LDP-based processing adds a certain amount of noise to make each piece of data indistinguishable while keeping its intrinsic value. However, LDP is vulnerable to data amplification. When a data store receives data from any device, the data store only appends the received data to existing data. This allows anyone to inject any amount of data into the data and manipulate the trend of the whole data. To tackle this problem, we design a data collection method enabling a data store to collect statistical trends of data from every device irrespective of the data volume. We utilize an Oblivious Transfer (OT) protocol that performs a packet sampling at the reception side, the data store. This sampling enables the collection of statistical trends but requires adjusting LDP processing because the amount of noise is determined by the assumption that the data store receives every piece of LDP-processed data. We then propose an adjustment method for LDP-based process based on the Euclidean algorithm. We conducted qualitative and experimental overhead analysis and showed that the proposed method decouples the relationship between statistical trend and data volume. We also show the processing load can be acceptable on small devices such as smartphones and loT.
时空数据对城市规划、流行病学和自然灾害等各种应用都很有用,但由于涉及到人的轨迹,它会导致家庭/工作场所地址等私人信息的暴露。基于本地差分隐私(LDP)的处理是一种很有前途的从时空数据中去除敏感信息的技术。基于ldp的处理增加了一定数量的噪声,使每个数据块无法区分,同时保持其内在价值。但是,LDP容易受到数据放大的影响。当数据存储从任何设备接收数据时,数据存储只将接收到的数据追加到现有数据中。这使得任何人都可以向数据中注入任意数量的数据,并操纵整个数据的趋势。为了解决这个问题,我们设计了一种数据收集方法,使数据存储能够从每个设备收集数据的统计趋势,而不考虑数据量。我们利用遗忘传输(OT)协议,在接收端(数据存储)执行数据包采样。这种抽样能够收集统计趋势,但需要调整LDP处理,因为噪声的数量是由数据存储接收到LDP处理的每一块数据的假设决定的。然后,我们提出了一种基于欧几里得算法的基于ldp的过程平差方法。我们进行了定性和实验开销分析,并表明所提出的方法解耦了统计趋势和数据量之间的关系。我们还展示了在智能手机和loT等小型设备上处理负载是可以接受的。
{"title":"Decoupling Statistical Trends from Data Volume on LDP-Based Spatio-Temporal Data Collection","authors":"Taisho Sasada, Yuzo Taenaka, Y. Kadobayashi","doi":"10.1109/FNWF55208.2022.00053","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00053","url":null,"abstract":"Spatio-temporal data is useful for various applications such as urban planning, epidemiology, and natural disasters, but causes exposure of private information, such as home/workplace addresses, because it involves people's trajec-tories. Local Differential Privacy (LDP) based processing is a promising technology for removing sensitive information from spatio-temporal data. A LDP-based processing adds a certain amount of noise to make each piece of data indistinguishable while keeping its intrinsic value. However, LDP is vulnerable to data amplification. When a data store receives data from any device, the data store only appends the received data to existing data. This allows anyone to inject any amount of data into the data and manipulate the trend of the whole data. To tackle this problem, we design a data collection method enabling a data store to collect statistical trends of data from every device irrespective of the data volume. We utilize an Oblivious Transfer (OT) protocol that performs a packet sampling at the reception side, the data store. This sampling enables the collection of statistical trends but requires adjusting LDP processing because the amount of noise is determined by the assumption that the data store receives every piece of LDP-processed data. We then propose an adjustment method for LDP-based process based on the Euclidean algorithm. We conducted qualitative and experimental overhead analysis and showed that the proposed method decouples the relationship between statistical trend and data volume. We also show the processing load can be acceptable on small devices such as smartphones and loT.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128115396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Lightweight Hash-Chain-Based Multi-Node Mutual Authentication Algorithm for IoT Networks 一种基于轻量级哈希链的IoT网络多节点相互认证算法
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00021
Shengli Yuan, Randy Phan-Huynh
As an emerging technology, IoT is rapidly revolutionizing the global communication network with billions of new devices deployed and connected with each other. Many of these devices collect and transfer a large amount of sensitive or mission critical data, making security a top priority. Compared to traditional Internet, IoT networks often operate in open and harsh environment, and may experience frequent delays, traffic loss and attacks; Meanwhile, IoT devices are often severally constrained in computational power, storage space, network bandwidth, and power supply, which prevent them from deploying traditional security schemes. Authentication is an important security mechanism that can be used to identify devices or users. Due to resource constrains of IoT networks, it is highly desirable for the authentication scheme to be lightweight while also being highly effective. In this paper, we developed and evaluated a hash-chain-based multi-node mutual authentication algorithm. Nodes on a network all share a common secret key and broadcast to other nodes in range. Each node may also add to the hash chain and rebroadcast, which will be used to authenticate all nodes in the network. This algorithm has a linear running time and complexity of $O(n)$, a significant improvement from the $O(n^{2})$ running time and complexity of the traditional pairwise multi-node mutual authentication.
作为一项新兴技术,物联网正在迅速改变全球通信网络,数十亿台新设备被部署并相互连接。许多此类设备收集和传输大量敏感或关键任务数据,因此安全性是重中之重。与传统互联网相比,物联网网络往往运行在开放、恶劣的环境中,可能会出现频繁的时延、流量丢失和攻击;同时,物联网设备通常在计算能力、存储空间、网络带宽和电源等方面受到一定的限制,这使得它们无法部署传统的安全方案。身份验证是一种重要的安全机制,可以用来识别设备或用户。由于物联网网络的资源限制,非常希望认证方案既轻便又高效。在本文中,我们开发并评估了一种基于哈希链的多节点相互认证算法。网络上的节点都共享一个公共密钥,并向范围内的其他节点广播。每个节点也可以添加到哈希链中并重新广播,这将用于验证网络中的所有节点。该算法线性运行时间为$O(n)$,复杂度为$O(n^{2})$,较传统的两两多节点相互认证的$O(n^{2})$运行时间和复杂度有显著提高。
{"title":"A Lightweight Hash-Chain-Based Multi-Node Mutual Authentication Algorithm for IoT Networks","authors":"Shengli Yuan, Randy Phan-Huynh","doi":"10.1109/FNWF55208.2022.00021","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00021","url":null,"abstract":"As an emerging technology, IoT is rapidly revolutionizing the global communication network with billions of new devices deployed and connected with each other. Many of these devices collect and transfer a large amount of sensitive or mission critical data, making security a top priority. Compared to traditional Internet, IoT networks often operate in open and harsh environment, and may experience frequent delays, traffic loss and attacks; Meanwhile, IoT devices are often severally constrained in computational power, storage space, network bandwidth, and power supply, which prevent them from deploying traditional security schemes. Authentication is an important security mechanism that can be used to identify devices or users. Due to resource constrains of IoT networks, it is highly desirable for the authentication scheme to be lightweight while also being highly effective. In this paper, we developed and evaluated a hash-chain-based multi-node mutual authentication algorithm. Nodes on a network all share a common secret key and broadcast to other nodes in range. Each node may also add to the hash chain and rebroadcast, which will be used to authenticate all nodes in the network. This algorithm has a linear running time and complexity of $O(n)$, a significant improvement from the $O(n^{2})$ running time and complexity of the traditional pairwise multi-node mutual authentication.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":"37 22","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120855520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Native Applications Profiling using a Graph Neural Networks Approach 使用图神经网络方法分析云原生应用程序
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00046
Amine Boukhtouta, Taous Madi, M. Pourzandi, H. Alameddine
The convergence of Telecommunication and industry operational networks towards cloud native applications has enabled the idea to integrate protection layers to harden security posture and management of cloud native based deployments. In this paper, we propose a data-driven approach to support detection of anomalies in cloud native application based on a graph neural network. The essence of the profiling relies on capturing interactions between different perspectives in cloud native applications through a network dependency graph and transforming it to a computational graph neural network. The latter is used to profile different deployed assets like micro-service types, workloads' namespaces, worker machines, management and orchestration machines as well as clusters. As a first phase of the profiling, we consider a fine-grained profiling on microservice types with an emphasis on network traffic indicators. These indicators are collected on distributed Kubernetes (K8S) deployment premises. Experimental results shows good trade-off in terms of accuracy and recall with respect to micro-service types profiling (around 96%). In addition, we used predictions entropy scores to infer anomalies in testing data. These scores allow to segregate between benign and anomalous graphs, where we identified 19 out of 23 anomalies. Moreover, by using entropy scores, we can conduct a root cause analysis to infer problematic micro-services.
电信和工业运营网络向云原生应用程序的融合使得集成保护层的想法成为可能,从而加强基于云原生部署的安全态势和管理。在本文中,我们提出了一种基于图神经网络的数据驱动方法来支持云原生应用中的异常检测。分析的本质依赖于通过网络依赖图捕获云原生应用程序中不同透视图之间的交互,并将其转换为计算图神经网络。后者用于分析不同的部署资产,如微服务类型、工作负载的名称空间、工作机器、管理和编排机器以及集群。作为分析的第一阶段,我们考虑对微服务类型进行细粒度分析,重点放在网络流量指标上。这些指标是在分布式Kubernetes (K8S)部署前提下收集的。实验结果表明,相对于微服务类型分析,在准确性和召回率方面有很好的权衡(约96%)。此外,我们使用预测熵分数来推断测试数据中的异常。这些分数允许在良性和异常图之间进行隔离,其中我们识别了23个异常中的19个。此外,通过使用熵分数,我们可以进行根本原因分析来推断有问题的微服务。
{"title":"Cloud Native Applications Profiling using a Graph Neural Networks Approach","authors":"Amine Boukhtouta, Taous Madi, M. Pourzandi, H. Alameddine","doi":"10.1109/FNWF55208.2022.00046","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00046","url":null,"abstract":"The convergence of Telecommunication and industry operational networks towards cloud native applications has enabled the idea to integrate protection layers to harden security posture and management of cloud native based deployments. In this paper, we propose a data-driven approach to support detection of anomalies in cloud native application based on a graph neural network. The essence of the profiling relies on capturing interactions between different perspectives in cloud native applications through a network dependency graph and transforming it to a computational graph neural network. The latter is used to profile different deployed assets like micro-service types, workloads' namespaces, worker machines, management and orchestration machines as well as clusters. As a first phase of the profiling, we consider a fine-grained profiling on microservice types with an emphasis on network traffic indicators. These indicators are collected on distributed Kubernetes (K8S) deployment premises. Experimental results shows good trade-off in terms of accuracy and recall with respect to micro-service types profiling (around 96%). In addition, we used predictions entropy scores to infer anomalies in testing data. These scores allow to segregate between benign and anomalous graphs, where we identified 19 out of 23 anomalies. Moreover, by using entropy scores, we can conduct a root cause analysis to infer problematic micro-services.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":"418 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123447137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SliceSecure: Impact and Detection of DoS/DDoS Attacks on 5G Network Slices SliceSecure: DoS/DDoS攻击对5G网络切片的影响及检测
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00117
Md Sajid Khan, Behnam Farzaneh, Nashid Shahriar, Niloy Saha, R. Boutaba
5G Network slicing is one of the key enabling technologies that offer dedicated logical resources to different applications on the same physical network. However, a Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) attack can severely damage the performance and functionality of network slices. Furthermore, recent DoS/DDoS attack detection techniques are based on the available data sets which are collected from simulated 5G networks rather than from 5G network slices. In this paper, we first show how DoS/DDoS attacks on network slices can impact slice users' performance metrics such as bandwidth and latency. Then, we present a novel DoS/DDoS attack dataset collected from a simulated 5G network slicing test bed. Finally, we showed a deep-learning-based bidirectional LSTM (Long Short Term Memory) model, namely, SliceSecure can detect DoS/DDoS attacks with an accuracy of 99.99% on the newly created data sets for 5G network slices.
5G网络切片是为同一物理网络上的不同应用提供专用逻辑资源的关键使能技术之一。但是,拒绝服务(DoS)或分布式拒绝服务(DDoS)攻击会严重损害网络切片的性能和功能。此外,最近的DoS/DDoS攻击检测技术是基于从模拟5G网络而不是从5G网络切片收集的可用数据集。在本文中,我们首先展示了网络切片上的DoS/DDoS攻击如何影响切片用户的性能指标,如带宽和延迟。然后,我们提出了一个从模拟5G网络切片测试平台收集的新型DoS/DDoS攻击数据集。最后,我们展示了一个基于深度学习的双向LSTM(长短期记忆)模型,即SliceSecure可以在5G网络切片新创建的数据集上检测DoS/DDoS攻击,准确率达到99.99%。
{"title":"SliceSecure: Impact and Detection of DoS/DDoS Attacks on 5G Network Slices","authors":"Md Sajid Khan, Behnam Farzaneh, Nashid Shahriar, Niloy Saha, R. Boutaba","doi":"10.1109/FNWF55208.2022.00117","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00117","url":null,"abstract":"5G Network slicing is one of the key enabling technologies that offer dedicated logical resources to different applications on the same physical network. However, a Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) attack can severely damage the performance and functionality of network slices. Furthermore, recent DoS/DDoS attack detection techniques are based on the available data sets which are collected from simulated 5G networks rather than from 5G network slices. In this paper, we first show how DoS/DDoS attacks on network slices can impact slice users' performance metrics such as bandwidth and latency. Then, we present a novel DoS/DDoS attack dataset collected from a simulated 5G network slicing test bed. Finally, we showed a deep-learning-based bidirectional LSTM (Long Short Term Memory) model, namely, SliceSecure can detect DoS/DDoS attacks with an accuracy of 99.99% on the newly created data sets for 5G network slices.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":"112 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114003888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2022 IEEE Future Networks World Forum (FNWF)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1