首页 > 最新文献

2022 IEEE Future Networks World Forum (FNWF)最新文献

英文 中文
Link Failure Recovery in SDN-Enabled Reconfigurable 6G Crosshaul Architecture 基于sdn的可重构6G交叉通道架构中的链路故障恢复
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00079
Yijie Tao, Sampath Edirisinghe, Chathurika Ranaweera, C. Lim, A. Nirmalathas, L. Wosinska
While 5G infrastructure is being rapidly rolled out around the world, it is clear that a key strategy to meet the required high speed, ubiquitous connection is via small cell deployment and cell densification. This results in increased complexity in orchestrating and managing the Radio Access Network (RAN). To this end, we proposed a novel Software Defined Networking (SDN)-enabled reconfigurable crosshaul architecture for supporting heterogeneous hauling technologies and enhancing RAN flexibility and robustness. This is achieved by crosshaul control and data plane separation and a novel control plane. In particular, the link failure recovery procedure in the proposed architecture is evaluated to assess the robustness of the network. Simulation results illustrated that the fast recovery time will not interrupt the mobile users' connectivity with RAN. However, mobile users' data plane shows impacts on different RAN protocol layers due to the failure.
虽然5G基础设施正在全球迅速铺开,但很明显,满足所需的高速、无处不在的连接的关键战略是通过小型蜂窝部署和蜂窝密度。这增加了编排和管理无线接入网(RAN)的复杂性。为此,我们提出了一种新颖的支持软件定义网络(SDN)的可重构交叉通道架构,以支持异构运输技术并增强RAN的灵活性和鲁棒性。这是通过交叉控制和数据平面分离以及一个新的控制平面来实现的。特别地,我们对所提出的架构中的链路故障恢复过程进行了评估,以评估网络的鲁棒性。仿真结果表明,快速恢复时间不会中断移动用户与无线局域网的连接。但是由于故障,移动用户的数据平面会对RAN协议的不同层产生影响。
{"title":"Link Failure Recovery in SDN-Enabled Reconfigurable 6G Crosshaul Architecture","authors":"Yijie Tao, Sampath Edirisinghe, Chathurika Ranaweera, C. Lim, A. Nirmalathas, L. Wosinska","doi":"10.1109/FNWF55208.2022.00079","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00079","url":null,"abstract":"While 5G infrastructure is being rapidly rolled out around the world, it is clear that a key strategy to meet the required high speed, ubiquitous connection is via small cell deployment and cell densification. This results in increased complexity in orchestrating and managing the Radio Access Network (RAN). To this end, we proposed a novel Software Defined Networking (SDN)-enabled reconfigurable crosshaul architecture for supporting heterogeneous hauling technologies and enhancing RAN flexibility and robustness. This is achieved by crosshaul control and data plane separation and a novel control plane. In particular, the link failure recovery procedure in the proposed architecture is evaluated to assess the robustness of the network. Simulation results illustrated that the fast recovery time will not interrupt the mobile users' connectivity with RAN. However, mobile users' data plane shows impacts on different RAN protocol layers due to the failure.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132700695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Agile Metropolitan Filterless Optical Networking 敏捷城域无滤波光网络
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00029
C. Tremblay, É. Archambault, Rodney G. Wilson, Stewart Clelland, M. Furdek, L. Wosinska
The tremendous traffic growth generated by video, cloud, future 5G and beyond services is compelling network operators to re-think network architectures to ensure flexible and efficient service support. Filterless optical networking based on broadcast-and-select nodes and coherent transceivers is considered as a disruptive approach for delivering network agility in a cost-effective manner. The filterless network concept has been widely studied for terrestrial and submarine applications. In this paper, we explore the suitability of filterless architectures in metropolitan networks through a comparative performance analysis with a conventional metro network based on active switching. The results show that a filterless solution with lower, but adequate, network connectivity can achieve up to 36% lower power consumption and up to 45.4% cost reduction at the expense of a 19% higher spectrum usage, which makes the filterless architecture an attractive alternative for metro network deployments.
视频、云、未来5G及其他服务带来的巨大流量增长,迫使网络运营商重新思考网络架构,以确保灵活高效的业务支持。基于广播选择节点和相干收发器的无滤波器光网络被认为是一种以经济有效的方式提供网络敏捷性的颠覆性方法。无滤波器网络的概念在陆地和海底应用中得到了广泛的研究。在本文中,我们通过与基于主动交换的传统城域网络的性能比较分析来探讨无滤波器架构在城域网络中的适用性。结果表明,具有较低但足够的网络连接性的无滤波器解决方案可以实现高达36%的功耗降低和高达45.4%的成本降低,而代价是频谱使用增加19%,这使得无滤波器架构成为城域网络部署的一个有吸引力的替代方案。
{"title":"Agile Metropolitan Filterless Optical Networking","authors":"C. Tremblay, É. Archambault, Rodney G. Wilson, Stewart Clelland, M. Furdek, L. Wosinska","doi":"10.1109/FNWF55208.2022.00029","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00029","url":null,"abstract":"The tremendous traffic growth generated by video, cloud, future 5G and beyond services is compelling network operators to re-think network architectures to ensure flexible and efficient service support. Filterless optical networking based on broadcast-and-select nodes and coherent transceivers is considered as a disruptive approach for delivering network agility in a cost-effective manner. The filterless network concept has been widely studied for terrestrial and submarine applications. In this paper, we explore the suitability of filterless architectures in metropolitan networks through a comparative performance analysis with a conventional metro network based on active switching. The results show that a filterless solution with lower, but adequate, network connectivity can achieve up to 36% lower power consumption and up to 45.4% cost reduction at the expense of a 19% higher spectrum usage, which makes the filterless architecture an attractive alternative for metro network deployments.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133067280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attack Graphs for Standalone Non-Public 5G Networks 独立非公共5G网络攻击图
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00036
Arpit Tripathi, A. Thakur, T. B. Reddy
Private Networks (also known as Non-Public Net-works) bring significant benefits to Industry 4.0. These networks are typically deployed on-premises of the enterprises, and their isolation from the public (consumer) networks improves the crucial aspects of security and reliability. Despite the isolation, insider attacks can be mounted on these networks. This paper analyses such attacks using attack patterns from Common Attack Pattern Enumerations and Classifications (CAPEC) database. The analysis uses attack graphs, to combine individual domains, in the context of human, device, and network vulner-abilities. The attack graphs help identify paths, the cumulative impact on the system, and possible defense techniques, including security controls to mitigate the impact. Using three sample attack graphs in the context of standalone private 5G networks, this paper analyses possible security mechanisms and captures the difference among legacy enterprise networks (including WiFi for limited mobility), public networks, and private networks.
专用网络(也称为非公用网络)为工业4.0带来了巨大的好处。这些网络通常部署在企业内部,它们与公共(消费者)网络的隔离提高了安全性和可靠性的关键方面。尽管这些网络是隔离的,但内部攻击仍然可以在这些网络上进行。本文利用CAPEC数据库中的攻击模式对这类攻击进行了分析。该分析使用攻击图,在人员、设备和网络漏洞的上下文中组合各个域。攻击图有助于识别路径、对系统的累积影响以及可能的防御技术,包括减轻影响的安全控制。本文使用独立私有5G网络背景下的三个示例攻击图,分析了可能的安全机制,并捕获了传统企业网络(包括用于有限移动的WiFi)、公共网络和私有网络之间的差异。
{"title":"Attack Graphs for Standalone Non-Public 5G Networks","authors":"Arpit Tripathi, A. Thakur, T. B. Reddy","doi":"10.1109/FNWF55208.2022.00036","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00036","url":null,"abstract":"Private Networks (also known as Non-Public Net-works) bring significant benefits to Industry 4.0. These networks are typically deployed on-premises of the enterprises, and their isolation from the public (consumer) networks improves the crucial aspects of security and reliability. Despite the isolation, insider attacks can be mounted on these networks. This paper analyses such attacks using attack patterns from Common Attack Pattern Enumerations and Classifications (CAPEC) database. The analysis uses attack graphs, to combine individual domains, in the context of human, device, and network vulner-abilities. The attack graphs help identify paths, the cumulative impact on the system, and possible defense techniques, including security controls to mitigate the impact. Using three sample attack graphs in the context of standalone private 5G networks, this paper analyses possible security mechanisms and captures the difference among legacy enterprise networks (including WiFi for limited mobility), public networks, and private networks.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131561756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cost-efficient Federated Reinforcement Learning- Based Network Routing for Wireless Networks 成本效益的基于联邦强化学习的无线网络路由
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00050
Zakaria Abou El Houda, Diala Naboulsi, Georges Kaddoum
Advances in Artificial Intelligence (AI) provide new capabilities to handle network routing problems. However, the lack of up-to-date training data, slow convergence, and low robustness due to the dynamic change of the network topology, makes these AI-based routing systems inefficient. To address this problem, Reinforcement Learning (RL) has been introduced to design more flexible and robust network routing protocols. However, the amount of data ($i$. e., state-action space) shared be- tween agents, in a Multi-Agent Reinforcement Learning (MARL) setup, can consume network bandwidth and may slow down the process of training. Moreover, the curse of dimensionality of RL encompasses the exponential growth of the discrete state-action space, thus limiting its potential benefit. In this paper, we present a novel approach combining Federated Learning (FL) with Deep Reinforcement Learning (D RL) in order to ensure an effective network routing in wireless environment. First, we formalize the problem of network routing as a problem of RL, where multiple agents that are geographically distributed train the policy model in a fully distributed manner. Thus, each agent can quickly obtain the optimal policy that maximizes the cumulative expected reward, while preserving the privacy of each agent's data. Experiments results show that our proposed Federated Reinforcement Learning (FRL) approach is robust and effective.
人工智能(AI)的进步为处理网络路由问题提供了新的能力。然而,由于缺乏最新的训练数据,由于网络拓扑结构的动态变化,收敛速度慢,鲁棒性低,使得这些基于人工智能的路由系统效率低下。为了解决这个问题,已经引入了强化学习(RL)来设计更灵活和健壮的网络路由协议。然而,数据量($i$。在多智能体强化学习(MARL)设置中,智能体之间共享的状态-动作空间(即状态-动作空间)会消耗网络带宽,并可能减慢训练过程。此外,RL的维数诅咒包含了离散状态-行为空间的指数增长,从而限制了其潜在的好处。本文提出了一种将联邦学习(FL)与深度强化学习(D RL)相结合的新方法,以确保无线环境下有效的网络路由。首先,我们将网络路由问题形式化为RL问题,其中地理上分布的多个代理以完全分布的方式训练策略模型。这样,每个agent都可以在保证数据隐私性的前提下,快速获得累积期望奖励最大化的最优策略。实验结果表明,我们提出的联邦强化学习(FRL)方法具有鲁棒性和有效性。
{"title":"Cost-efficient Federated Reinforcement Learning- Based Network Routing for Wireless Networks","authors":"Zakaria Abou El Houda, Diala Naboulsi, Georges Kaddoum","doi":"10.1109/FNWF55208.2022.00050","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00050","url":null,"abstract":"Advances in Artificial Intelligence (AI) provide new capabilities to handle network routing problems. However, the lack of up-to-date training data, slow convergence, and low robustness due to the dynamic change of the network topology, makes these AI-based routing systems inefficient. To address this problem, Reinforcement Learning (RL) has been introduced to design more flexible and robust network routing protocols. However, the amount of data ($i$. e., state-action space) shared be- tween agents, in a Multi-Agent Reinforcement Learning (MARL) setup, can consume network bandwidth and may slow down the process of training. Moreover, the curse of dimensionality of RL encompasses the exponential growth of the discrete state-action space, thus limiting its potential benefit. In this paper, we present a novel approach combining Federated Learning (FL) with Deep Reinforcement Learning (D RL) in order to ensure an effective network routing in wireless environment. First, we formalize the problem of network routing as a problem of RL, where multiple agents that are geographically distributed train the policy model in a fully distributed manner. Thus, each agent can quickly obtain the optimal policy that maximizes the cumulative expected reward, while preserving the privacy of each agent's data. Experiments results show that our proposed Federated Reinforcement Learning (FRL) approach is robust and effective.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132919105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel RACH Scheme for Efficient Access in 5G and Beyond Networks using Hash Function 基于哈希函数的5G及以上网络高效接入RACH方案
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00022
S. Swain, Ashit Subudhi
With more subscribers and a variety in business use cases relying on 5G New Radio (NR) network infrastructure, the access network needs to be scalable. The initial network access procedure comprises of users sending preambles to gNB for granting uplink (UL) resources. However, limited preambles in 5G NR can be a bottleneck on the performance of network access procedures. Preamble collisions during initial Random Access Channel (RACH) procedure can limit the scalability of the network. With the increase in the number of cellular User Equipments (UEs) and Machine Type Communication (MTC) devices, the probability of such preamble collisions further increases, thereby leading to reattempts by UEs. This in turn, results in increased latency and reduced channel utilization. In this work, we have used hash functions for selecting preambles during the RACH process. We have used modulo hash functions to convert device identifiers into preamble indexes such that the collision is reduced. In order to counter collisions while using hash functions, we have adopted standard collision resolution techniques such as linear probing, quadratic probing, and double hashing. On performing extensive simulations, it is observed that the hashing based access scheme performs better than the standard Access Class Barring (ACB) scheme in effectively reducing the number of collisions thereby empowering more users to access the network.
随着越来越多的用户和依赖5G新无线电(NR)网络基础设施的各种业务用例,接入网需要具有可扩展性。初始的网络接入过程包括用户向gNB发送序文,以授予UL (uplink)资源。然而,5G NR中有限的序数可能成为网络接入过程性能的瓶颈。随机接入信道(RACH)初始化过程中的前导冲突限制了网络的可扩展性。随着蜂窝用户设备(ue)和机器类型通信(MTC)设备数量的增加,这种前导冲突的可能性进一步增加,从而导致ue的重试。这反过来又会导致延迟增加和通道利用率降低。在这项工作中,我们在RACH过程中使用哈希函数来选择序曲。我们使用模哈希函数将设备标识符转换为前导索引,从而减少了冲突。为了在使用哈希函数时防止冲突,我们采用了标准的冲突解决技术,如线性探测、二次探测和双哈希。通过大量的仿真,观察到基于哈希的访问方案比标准的访问类限制(ACB)方案在有效减少冲突数量方面表现得更好,从而使更多的用户能够访问网络。
{"title":"A Novel RACH Scheme for Efficient Access in 5G and Beyond Networks using Hash Function","authors":"S. Swain, Ashit Subudhi","doi":"10.1109/FNWF55208.2022.00022","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00022","url":null,"abstract":"With more subscribers and a variety in business use cases relying on 5G New Radio (NR) network infrastructure, the access network needs to be scalable. The initial network access procedure comprises of users sending preambles to gNB for granting uplink (UL) resources. However, limited preambles in 5G NR can be a bottleneck on the performance of network access procedures. Preamble collisions during initial Random Access Channel (RACH) procedure can limit the scalability of the network. With the increase in the number of cellular User Equipments (UEs) and Machine Type Communication (MTC) devices, the probability of such preamble collisions further increases, thereby leading to reattempts by UEs. This in turn, results in increased latency and reduced channel utilization. In this work, we have used hash functions for selecting preambles during the RACH process. We have used modulo hash functions to convert device identifiers into preamble indexes such that the collision is reduced. In order to counter collisions while using hash functions, we have adopted standard collision resolution techniques such as linear probing, quadratic probing, and double hashing. On performing extensive simulations, it is observed that the hashing based access scheme performs better than the standard Access Class Barring (ACB) scheme in effectively reducing the number of collisions thereby empowering more users to access the network.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122190415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SliceSecure: Impact and Detection of DoS/DDoS Attacks on 5G Network Slices SliceSecure: DoS/DDoS攻击对5G网络切片的影响及检测
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00117
Md Sajid Khan, Behnam Farzaneh, Nashid Shahriar, Niloy Saha, R. Boutaba
5G Network slicing is one of the key enabling technologies that offer dedicated logical resources to different applications on the same physical network. However, a Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) attack can severely damage the performance and functionality of network slices. Furthermore, recent DoS/DDoS attack detection techniques are based on the available data sets which are collected from simulated 5G networks rather than from 5G network slices. In this paper, we first show how DoS/DDoS attacks on network slices can impact slice users' performance metrics such as bandwidth and latency. Then, we present a novel DoS/DDoS attack dataset collected from a simulated 5G network slicing test bed. Finally, we showed a deep-learning-based bidirectional LSTM (Long Short Term Memory) model, namely, SliceSecure can detect DoS/DDoS attacks with an accuracy of 99.99% on the newly created data sets for 5G network slices.
5G网络切片是为同一物理网络上的不同应用提供专用逻辑资源的关键使能技术之一。但是,拒绝服务(DoS)或分布式拒绝服务(DDoS)攻击会严重损害网络切片的性能和功能。此外,最近的DoS/DDoS攻击检测技术是基于从模拟5G网络而不是从5G网络切片收集的可用数据集。在本文中,我们首先展示了网络切片上的DoS/DDoS攻击如何影响切片用户的性能指标,如带宽和延迟。然后,我们提出了一个从模拟5G网络切片测试平台收集的新型DoS/DDoS攻击数据集。最后,我们展示了一个基于深度学习的双向LSTM(长短期记忆)模型,即SliceSecure可以在5G网络切片新创建的数据集上检测DoS/DDoS攻击,准确率达到99.99%。
{"title":"SliceSecure: Impact and Detection of DoS/DDoS Attacks on 5G Network Slices","authors":"Md Sajid Khan, Behnam Farzaneh, Nashid Shahriar, Niloy Saha, R. Boutaba","doi":"10.1109/FNWF55208.2022.00117","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00117","url":null,"abstract":"5G Network slicing is one of the key enabling technologies that offer dedicated logical resources to different applications on the same physical network. However, a Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) attack can severely damage the performance and functionality of network slices. Furthermore, recent DoS/DDoS attack detection techniques are based on the available data sets which are collected from simulated 5G networks rather than from 5G network slices. In this paper, we first show how DoS/DDoS attacks on network slices can impact slice users' performance metrics such as bandwidth and latency. Then, we present a novel DoS/DDoS attack dataset collected from a simulated 5G network slicing test bed. Finally, we showed a deep-learning-based bidirectional LSTM (Long Short Term Memory) model, namely, SliceSecure can detect DoS/DDoS attacks with an accuracy of 99.99% on the newly created data sets for 5G network slices.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":"112 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114003888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
NextG Managed Access Systems (N-MAS) for Correctional-Facility Markets 用于惩教设施市场的NextG管理访问系统(N-MAS)
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00088
Praveen Gupta
Managed Access Systems (MAS) are used extensively in correctional facilities such as prisons in both the US and abroad to restrict cellular access within the facility to authorized devices. As cellular radio-access technologies evolve through 4G into 5G and beyond, there is a corresponding demand to evolve the MAS architecture to prosecute these technologies. This paper describes key technology ideas which can be leveraged to effectively architect a future-proof MAS solution to support correctional-facility needs as well as support new use cases for the emergent In-Building Wireless Managed-Access market.
管理访问系统(MAS)在美国和国外的监狱等惩教设施中广泛使用,以限制设备内的蜂窝访问权限。随着蜂窝无线接入技术从4G发展到5G及以后,有相应的需求来发展MAS架构以支持这些技术。本文描述了关键的技术思想,可以用来有效地构建一个面向未来的MAS解决方案,以支持惩教设施的需求,并支持新兴的楼宇内无线管理接入市场的新用例。
{"title":"NextG Managed Access Systems (N-MAS) for Correctional-Facility Markets","authors":"Praveen Gupta","doi":"10.1109/FNWF55208.2022.00088","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00088","url":null,"abstract":"Managed Access Systems (MAS) are used extensively in correctional facilities such as prisons in both the US and abroad to restrict cellular access within the facility to authorized devices. As cellular radio-access technologies evolve through 4G into 5G and beyond, there is a corresponding demand to evolve the MAS architecture to prosecute these technologies. This paper describes key technology ideas which can be leveraged to effectively architect a future-proof MAS solution to support correctional-facility needs as well as support new use cases for the emergent In-Building Wireless Managed-Access market.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126233005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Transfer Learning in 6G 6G中的高效迁移学习
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00062
S. Parsaeefard, A. Leon-Garcia
6G networks will greatly expand the support for data-oriented, autonomous applications for over the top (OTT) and networking use cases. The success of these use cases will depend on the availability of big data sets which is not practical in many real scenarios due to the highly dynamic behavior of systems and the cost of data collection procedures. Transfer learning (TL) is a promising approach to deal with these challenges through the sharing of knowledge among diverse learning algorithms. with TL, the learning rate and learning accuracy can be considerably improved. There are implementation challenges to efficiently deploy and utilize TL in 6G. Here, we initiate this discussion by providing some performance metrics to measure the TL success. We show how infrastructure, application, management, and training planes of 6G can be adapted to handle TL. We provide examples of TL in 6G and highlight the spatio-temporal features of data in 6G that can lead to efficient TL. By simulations, we demonstrate how transferring the quantized neural network weights between two use cases can make a trade-off between overheads and performance and attain more efficient TL in 6G.
6G网络将极大地扩展对面向数据的自主应用的支持,用于OTT和网络用例。这些用例的成功将取决于大数据集的可用性,由于系统的高度动态行为和数据收集过程的成本,这在许多实际场景中是不切实际的。通过在不同的学习算法之间共享知识,迁移学习(TL)是一种很有前途的解决这些挑战的方法。使用TL可以显著提高学习速率和学习准确率。在6G中有效地部署和利用TL存在实现挑战。在这里,我们通过提供一些衡量TL成功的性能指标来开始讨论。我们展示了如何适应6G的基础设施、应用程序、管理和训练平面来处理TL。我们提供了6G中的TL示例,并强调了6G中数据的时空特征,这些特征可以导致高效的TL。通过模拟,我们展示了如何在两个用例之间传递量化神经网络权重可以在开销和性能之间做出权衡,并在6G中获得更高效的TL。
{"title":"Efficient Transfer Learning in 6G","authors":"S. Parsaeefard, A. Leon-Garcia","doi":"10.1109/FNWF55208.2022.00062","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00062","url":null,"abstract":"6G networks will greatly expand the support for data-oriented, autonomous applications for over the top (OTT) and networking use cases. The success of these use cases will depend on the availability of big data sets which is not practical in many real scenarios due to the highly dynamic behavior of systems and the cost of data collection procedures. Transfer learning (TL) is a promising approach to deal with these challenges through the sharing of knowledge among diverse learning algorithms. with TL, the learning rate and learning accuracy can be considerably improved. There are implementation challenges to efficiently deploy and utilize TL in 6G. Here, we initiate this discussion by providing some performance metrics to measure the TL success. We show how infrastructure, application, management, and training planes of 6G can be adapted to handle TL. We provide examples of TL in 6G and highlight the spatio-temporal features of data in 6G that can lead to efficient TL. By simulations, we demonstrate how transferring the quantized neural network weights between two use cases can make a trade-off between overheads and performance and attain more efficient TL in 6G.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126974673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
No Limits – Smart Cellular Edges for Cross-Border Continuity of Automotive Services 无极限——汽车服务跨界连续性的智能蜂窝边缘
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00089
Girma M. Yilma, Nina Slamnik-Kriještorac, M. Liebsch, A. Francescon, J. Márquez-Barja
One of the major challenges in 5G-based Cooperative Connected and Automated Mobility is to ensure continuity of a service that is deployed on the network edge and used by a moving vehicle. We propose enablers for smart cellular edges, which support service continuity in cross-border scenarios by the timely preparation of a service instance in an anticipated topologically closer target edge, and by connecting the vehicle to such service instance before the cellular handover occurs. In this paper, we use the edge data centers of a German and Austrian mobile operator to showcase two main enabling pillars for edge service continuity, i.e., i) transparent edge bridging by means of a programmable data plane to serve a vehicle from the target edge before the vehicle performs handover to a different operator, and ii) smart applications, which apply data analytics to boost orchestration decisions for target edge preparation.
基于5g的协作连接和自动移动的主要挑战之一是确保部署在网络边缘并由移动车辆使用的服务的连续性。我们提出了智能蜂窝边缘的使能器,它通过在预期的拓扑上更接近的目标边缘及时准备服务实例,并在蜂窝切换发生之前将车辆连接到该服务实例,来支持跨界场景中的服务连续性。在本文中,我们使用德国和奥地利移动运营商的边缘数据中心来展示边缘服务连续性的两个主要支持支柱,即i)通过可编程数据平面的透明边缘桥接,在车辆执行切换到不同的运营商之前从目标边缘为车辆提供服务,以及ii)智能应用程序,应用数据分析来促进目标边缘准备的编排决策。
{"title":"No Limits – Smart Cellular Edges for Cross-Border Continuity of Automotive Services","authors":"Girma M. Yilma, Nina Slamnik-Kriještorac, M. Liebsch, A. Francescon, J. Márquez-Barja","doi":"10.1109/FNWF55208.2022.00089","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00089","url":null,"abstract":"One of the major challenges in 5G-based Cooperative Connected and Automated Mobility is to ensure continuity of a service that is deployed on the network edge and used by a moving vehicle. We propose enablers for smart cellular edges, which support service continuity in cross-border scenarios by the timely preparation of a service instance in an anticipated topologically closer target edge, and by connecting the vehicle to such service instance before the cellular handover occurs. In this paper, we use the edge data centers of a German and Austrian mobile operator to showcase two main enabling pillars for edge service continuity, i.e., i) transparent edge bridging by means of a programmable data plane to serve a vehicle from the target edge before the vehicle performs handover to a different operator, and ii) smart applications, which apply data analytics to boost orchestration decisions for target edge preparation.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128941539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Lightweight Hash-Chain-Based Multi-Node Mutual Authentication Algorithm for IoT Networks 一种基于轻量级哈希链的IoT网络多节点相互认证算法
Pub Date : 2022-10-01 DOI: 10.1109/FNWF55208.2022.00021
Shengli Yuan, Randy Phan-Huynh
As an emerging technology, IoT is rapidly revolutionizing the global communication network with billions of new devices deployed and connected with each other. Many of these devices collect and transfer a large amount of sensitive or mission critical data, making security a top priority. Compared to traditional Internet, IoT networks often operate in open and harsh environment, and may experience frequent delays, traffic loss and attacks; Meanwhile, IoT devices are often severally constrained in computational power, storage space, network bandwidth, and power supply, which prevent them from deploying traditional security schemes. Authentication is an important security mechanism that can be used to identify devices or users. Due to resource constrains of IoT networks, it is highly desirable for the authentication scheme to be lightweight while also being highly effective. In this paper, we developed and evaluated a hash-chain-based multi-node mutual authentication algorithm. Nodes on a network all share a common secret key and broadcast to other nodes in range. Each node may also add to the hash chain and rebroadcast, which will be used to authenticate all nodes in the network. This algorithm has a linear running time and complexity of $O(n)$, a significant improvement from the $O(n^{2})$ running time and complexity of the traditional pairwise multi-node mutual authentication.
作为一项新兴技术,物联网正在迅速改变全球通信网络,数十亿台新设备被部署并相互连接。许多此类设备收集和传输大量敏感或关键任务数据,因此安全性是重中之重。与传统互联网相比,物联网网络往往运行在开放、恶劣的环境中,可能会出现频繁的时延、流量丢失和攻击;同时,物联网设备通常在计算能力、存储空间、网络带宽和电源等方面受到一定的限制,这使得它们无法部署传统的安全方案。身份验证是一种重要的安全机制,可以用来识别设备或用户。由于物联网网络的资源限制,非常希望认证方案既轻便又高效。在本文中,我们开发并评估了一种基于哈希链的多节点相互认证算法。网络上的节点都共享一个公共密钥,并向范围内的其他节点广播。每个节点也可以添加到哈希链中并重新广播,这将用于验证网络中的所有节点。该算法线性运行时间为$O(n)$,复杂度为$O(n^{2})$,较传统的两两多节点相互认证的$O(n^{2})$运行时间和复杂度有显著提高。
{"title":"A Lightweight Hash-Chain-Based Multi-Node Mutual Authentication Algorithm for IoT Networks","authors":"Shengli Yuan, Randy Phan-Huynh","doi":"10.1109/FNWF55208.2022.00021","DOIUrl":"https://doi.org/10.1109/FNWF55208.2022.00021","url":null,"abstract":"As an emerging technology, IoT is rapidly revolutionizing the global communication network with billions of new devices deployed and connected with each other. Many of these devices collect and transfer a large amount of sensitive or mission critical data, making security a top priority. Compared to traditional Internet, IoT networks often operate in open and harsh environment, and may experience frequent delays, traffic loss and attacks; Meanwhile, IoT devices are often severally constrained in computational power, storage space, network bandwidth, and power supply, which prevent them from deploying traditional security schemes. Authentication is an important security mechanism that can be used to identify devices or users. Due to resource constrains of IoT networks, it is highly desirable for the authentication scheme to be lightweight while also being highly effective. In this paper, we developed and evaluated a hash-chain-based multi-node mutual authentication algorithm. Nodes on a network all share a common secret key and broadcast to other nodes in range. Each node may also add to the hash chain and rebroadcast, which will be used to authenticate all nodes in the network. This algorithm has a linear running time and complexity of $O(n)$, a significant improvement from the $O(n^{2})$ running time and complexity of the traditional pairwise multi-node mutual authentication.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":"37 22","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120855520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE Future Networks World Forum (FNWF)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1