As QKD infrastructure becomes increasingly complex while being developed by different actors (typically national governments), interconnecting them into a federated network of very elaborate sub-networks that maintain a high degree of autonomy will pose unique challenges. We identify several such challenges and propose a 4-step orchestration framework to address them based on centralized research, target network planning, optimal QKD design, and protocol enforcement.
{"title":"CEF: Connecting Elaborate Federal QKD Networks","authors":"Alin-Bogdan Popa, Pantelimon Popescu","doi":"arxiv-2409.12027","DOIUrl":"https://doi.org/arxiv-2409.12027","url":null,"abstract":"As QKD infrastructure becomes increasingly complex while being developed by\u0000different actors (typically national governments), interconnecting them into a\u0000federated network of very elaborate sub-networks that maintain a high degree of\u0000autonomy will pose unique challenges. We identify several such challenges and\u0000propose a 4-step orchestration framework to address them based on centralized\u0000research, target network planning, optimal QKD design, and protocol\u0000enforcement.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142260187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we study the intricate realm of digital twin synchronization and deployment in multi-access edge computing (MEC) networks, with the aim of optimizing and balancing the two performance metrics Age of Information (AoI) and energy efficiency. We jointly consider the problems of edge association, power allocation, and digital twin deployment. However, the inherent randomness of the problem presents a significant challenge in identifying an optimal solution. To address this, we first analyze the feasibility conditions of the optimization problem. We then examine a specific scenario involving a static channel and propose a cyclic scheduling scheme. This enables us to derive the sum AoI in closed form. As a result, the joint optimization problem of edge association and power control is solved optimally by finding a minimum weight perfect matching. Moreover, we examine the one-shot optimization problem in the contexts of both frequent digital twin migrations and fixed digital twin deployments, and propose an efficient online algorithm to address the general optimization problem. This algorithm effectively reduces system costs by balancing frequent migrations and fixed deployments. Numerical results demonstrate the effectiveness of our proposed scheme in terms of low cost and high efficiency.
{"title":"Age-of-Information and Energy Optimization in Digital Twin Edge Networks","authors":"Yongna Guo, Yaru Fu, Yan Zhang, Tony Q. S. Quek","doi":"arxiv-2409.11799","DOIUrl":"https://doi.org/arxiv-2409.11799","url":null,"abstract":"In this paper, we study the intricate realm of digital twin synchronization\u0000and deployment in multi-access edge computing (MEC) networks, with the aim of\u0000optimizing and balancing the two performance metrics Age of Information (AoI)\u0000and energy efficiency. We jointly consider the problems of edge association,\u0000power allocation, and digital twin deployment. However, the inherent randomness\u0000of the problem presents a significant challenge in identifying an optimal\u0000solution. To address this, we first analyze the feasibility conditions of the\u0000optimization problem. We then examine a specific scenario involving a static\u0000channel and propose a cyclic scheduling scheme. This enables us to derive the\u0000sum AoI in closed form. As a result, the joint optimization problem of edge\u0000association and power control is solved optimally by finding a minimum weight\u0000perfect matching. Moreover, we examine the one-shot optimization problem in the\u0000contexts of both frequent digital twin migrations and fixed digital twin\u0000deployments, and propose an efficient online algorithm to address the general\u0000optimization problem. This algorithm effectively reduces system costs by\u0000balancing frequent migrations and fixed deployments. Numerical results\u0000demonstrate the effectiveness of our proposed scheme in terms of low cost and\u0000high efficiency.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142260189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Internet of Vehicles (IoV), which enables interactions between vehicles, infrastructure, and the environment, faces challenges in maintaining communication security and reliable automated decisions. This paper introduces a decentralized framework comprising a primary layer for managing inter-vehicle communication and a sub-layer for securing intra-vehicle interactions. By implementing blockchain-based protocols like Blockchain-integrated Secure Authentication (BiSA) and Decentralized Blockchain Name Resolution (DBNR), the framework ensures secure, decentralized identity management and reliable data exchanges, thereby supporting safe and efficient autonomous vehicle operations.
{"title":"Blockchain-Enabled IoV: Secure Communication and Trustworthy Decision-Making","authors":"Jingyi Sun, Qi Shi, Guodong Jin, Hao Xu, Erwu Liu","doi":"arxiv-2409.11621","DOIUrl":"https://doi.org/arxiv-2409.11621","url":null,"abstract":"The Internet of Vehicles (IoV), which enables interactions between vehicles,\u0000infrastructure, and the environment, faces challenges in maintaining\u0000communication security and reliable automated decisions. This paper introduces\u0000a decentralized framework comprising a primary layer for managing inter-vehicle\u0000communication and a sub-layer for securing intra-vehicle interactions. By\u0000implementing blockchain-based protocols like Blockchain-integrated Secure\u0000Authentication (BiSA) and Decentralized Blockchain Name Resolution (DBNR), the\u0000framework ensures secure, decentralized identity management and reliable data\u0000exchanges, thereby supporting safe and efficient autonomous vehicle operations.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142260190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiang Li, Mustafa Abdallah, Yuan-Yao Lou, Mung Chiang, Kwang Taik Kim, Saurabh Bagchi
Edge computing is deemed a promising technique to execute latency-sensitive applications by offloading computation-intensive tasks to edge servers. Extensive research has been conducted in the field of end-device to edge server task offloading for several goals, including latency minimization, energy optimization, and resource optimization. However, few of them consider our mobile computing devices (smartphones, tablets, and laptops) to be edge devices. In this paper, we propose a novel multi-tier edge computing framework, which we refer to as M-TEC, that aims to optimize latency, reduce the probability of failure, and optimize cost while accounting for the sporadic failure of personally owned devices and the changing network conditions. We conduct experiments with a real testbed and a real commercial CBRS 4G network, and the results indicate that M-TEC is capable of reducing the end-to-end latency of applications by at least 8% compared to the best baseline under a variety of network conditions, while providing reliable performance at an affordable cost.
{"title":"Dynamic DAG-Application Scheduling for Multi-Tier Edge Computing in Heterogeneous Networks","authors":"Xiang Li, Mustafa Abdallah, Yuan-Yao Lou, Mung Chiang, Kwang Taik Kim, Saurabh Bagchi","doi":"arxiv-2409.10839","DOIUrl":"https://doi.org/arxiv-2409.10839","url":null,"abstract":"Edge computing is deemed a promising technique to execute latency-sensitive\u0000applications by offloading computation-intensive tasks to edge servers.\u0000Extensive research has been conducted in the field of end-device to edge server\u0000task offloading for several goals, including latency minimization, energy\u0000optimization, and resource optimization. However, few of them consider our\u0000mobile computing devices (smartphones, tablets, and laptops) to be edge\u0000devices. In this paper, we propose a novel multi-tier edge computing framework,\u0000which we refer to as M-TEC, that aims to optimize latency, reduce the\u0000probability of failure, and optimize cost while accounting for the sporadic\u0000failure of personally owned devices and the changing network conditions. We\u0000conduct experiments with a real testbed and a real commercial CBRS 4G network,\u0000and the results indicate that M-TEC is capable of reducing the end-to-end\u0000latency of applications by at least 8% compared to the best baseline under a\u0000variety of network conditions, while providing reliable performance at an\u0000affordable cost.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142260221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The emerging field of smart agriculture leverages the Internet of Things (IoT) to revolutionize farming practices. This paper investigates the transformative potential of Long Range (LoRa) technology as a key enabler of long-range wireless communication for agricultural IoT systems. By reviewing existing literature, we identify a gap in research specifically focused on LoRa's prospects and challenges from a communication perspective in smart agriculture. We delve into the details of LoRa-based agricultural networks, covering network architecture design, Physical Layer (PHY) considerations tailored to the agricultural environment, and channel modeling techniques that account for soil characteristics. The paper further explores relaying and routing mechanisms that address the challenges of extending network coverage and optimizing data transmission in vast agricultural landscapes. Transitioning to practical aspects, we discuss sensor deployment strategies and energy management techniques, offering insights for real-world deployments. A comparative analysis of LoRa with other wireless communication technologies employed in agricultural IoT applications highlights its strengths and weaknesses in this context. Furthermore, the paper outlines several future research directions to leverage the potential of LoRa-based agriculture 4.0. These include advancements in channel modeling for diverse farming environments, novel relay routing algorithms, integrating emerging sensor technologies like hyper-spectral imaging and drone-based sensing, on-device Artificial Intelligence (AI) models, and sustainable solutions. This survey can guide researchers, technologists, and practitioners to understand, implement, and propel smart agriculture initiatives using LoRa technology.
{"title":"LoRa Communication for Agriculture 4.0: Opportunities, Challenges, and Future Directions","authors":"Lameya Aldhaheri, Noor Alshehhi, Irfana Ilyas Jameela Manzil, Ruhul Amin Khalil, Shumaila Javaid, Nasir Saeed, Mohamed-Slim Alouini","doi":"arxiv-2409.11200","DOIUrl":"https://doi.org/arxiv-2409.11200","url":null,"abstract":"The emerging field of smart agriculture leverages the Internet of Things\u0000(IoT) to revolutionize farming practices. This paper investigates the\u0000transformative potential of Long Range (LoRa) technology as a key enabler of\u0000long-range wireless communication for agricultural IoT systems. By reviewing\u0000existing literature, we identify a gap in research specifically focused on\u0000LoRa's prospects and challenges from a communication perspective in smart\u0000agriculture. We delve into the details of LoRa-based agricultural networks,\u0000covering network architecture design, Physical Layer (PHY) considerations\u0000tailored to the agricultural environment, and channel modeling techniques that\u0000account for soil characteristics. The paper further explores relaying and\u0000routing mechanisms that address the challenges of extending network coverage\u0000and optimizing data transmission in vast agricultural landscapes. Transitioning\u0000to practical aspects, we discuss sensor deployment strategies and energy\u0000management techniques, offering insights for real-world deployments. A\u0000comparative analysis of LoRa with other wireless communication technologies\u0000employed in agricultural IoT applications highlights its strengths and\u0000weaknesses in this context. Furthermore, the paper outlines several future\u0000research directions to leverage the potential of LoRa-based agriculture 4.0.\u0000These include advancements in channel modeling for diverse farming\u0000environments, novel relay routing algorithms, integrating emerging sensor\u0000technologies like hyper-spectral imaging and drone-based sensing, on-device\u0000Artificial Intelligence (AI) models, and sustainable solutions. This survey can\u0000guide researchers, technologists, and practitioners to understand, implement,\u0000and propel smart agriculture initiatives using LoRa technology.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142260194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nikolaos Bartzoudis, José Rubio Fernández, David López-Bueno, Godfrey Kibalya, Angelos Antonopoulos
This work provides a vision on how to tackle the underutilization of compute resources in FPGA SoC devices used across 5G and edge computing infrastructures. A first step towards this end is the implementation of a resource management layer able to migrate and scale functions in such devices, based on context events. This layer sets the basis to design a hierarchical data-driven micro-orchestrator in charge of providing the lifecycle management of functions in FPGA SoC devices. In the O-RAN context, the micro-orchestrator is foreseen to take the form of an xApp/rApp tandem trained with RAN traffic and context data.
{"title":"Micro-orchestration of RAN functions accelerated in FPGA SoC devices","authors":"Nikolaos Bartzoudis, José Rubio Fernández, David López-Bueno, Godfrey Kibalya, Angelos Antonopoulos","doi":"arxiv-2409.11362","DOIUrl":"https://doi.org/arxiv-2409.11362","url":null,"abstract":"This work provides a vision on how to tackle the underutilization of compute\u0000resources in FPGA SoC devices used across 5G and edge computing\u0000infrastructures. A first step towards this end is the implementation of a\u0000resource management layer able to migrate and scale functions in such devices,\u0000based on context events. This layer sets the basis to design a hierarchical\u0000data-driven micro-orchestrator in charge of providing the lifecycle management\u0000of functions in FPGA SoC devices. In the O-RAN context, the micro-orchestrator\u0000is foreseen to take the form of an xApp/rApp tandem trained with RAN traffic\u0000and context data.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142260193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ufuk Usubütün, André Gomes, Shankaranarayanan Puzhavakath Narayanan, Matti Hiltunen, Shivendra Panwar
As virtualization of Radio Access Networks (RAN) gains momentum, understanding the impact of hardware and software disaggregation on resiliency becomes critical to meet the high availability requirements of mobile networks. Our paper presents an analytical model, using continuous time Markov chains, to study the impact of virtualization and disaggregation on RAN availability. Our evaluation, assuming typical parameter value ranges for failure and recovery rates, points to containerized platform reliability as a constraint on vRAN availability. We also find that with active-passive replication, increasing hardware replication factor beyond 2 may not bring any benefits unless failover times are reduced. We also compare the reliability of centralized and distributed virtualized central units.
随着无线接入网(RAN)虚拟化的发展,了解硬件和软件分解对弹性的影响对于满足移动网络的高可用性要求至关重要。我们的论文提出了一个分析模型,利用连续时间马尔可夫链研究虚拟化和分解对 RAN 可用性的影响。假定故障和恢复速率的典型参数值范围,结果表明容器化平台的可靠性是对 vRAN 可用性的限制。我们还发现,在主动-被动复制的情况下,将硬件复制系数提高到 2 以上可能不会带来任何好处,除非故障切换时间缩短。我们还比较了集中式和分布式虚拟化中央单元的可靠性。
{"title":"Designing Reliable Virtualized Radio Access Networks","authors":"Ufuk Usubütün, André Gomes, Shankaranarayanan Puzhavakath Narayanan, Matti Hiltunen, Shivendra Panwar","doi":"arxiv-2409.11334","DOIUrl":"https://doi.org/arxiv-2409.11334","url":null,"abstract":"As virtualization of Radio Access Networks (RAN) gains momentum,\u0000understanding the impact of hardware and software disaggregation on resiliency\u0000becomes critical to meet the high availability requirements of mobile networks.\u0000Our paper presents an analytical model, using continuous time Markov chains, to\u0000study the impact of virtualization and disaggregation on RAN availability. Our\u0000evaluation, assuming typical parameter value ranges for failure and recovery\u0000rates, points to containerized platform reliability as a constraint on vRAN\u0000availability. We also find that with active-passive replication, increasing\u0000hardware replication factor beyond 2 may not bring any benefits unless failover\u0000times are reduced. We also compare the reliability of centralized and\u0000distributed virtualized central units.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142260220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Helena Rifa-Pous, Victor Garcia-Font, Carlos Nunez-Gomez, Julian Salas
The advent of 6G networks promises unprecedented advancements in wireless communication, offering wider bandwidth and lower latency compared to its predecessors. This article explores the evolving infrastructure of 6G networks, emphasizing the transition towards a more disaggregated structure and the integration of artificial intelligence (AI) technologies. Furthermore, it explores the security, trust and privacy challenges and attacks in 6G networks, particularly those related to the use of AI. It presents a classification of network attacks stemming from its AI-centric architecture and explores technologies designed to detect or mitigate these emerging threats. The paper concludes by examining the implications and risks linked to the utilization of AI in ensuring a robust network.
{"title":"Security, Trust and Privacy challenges in AI-driven 6G Networks","authors":"Helena Rifa-Pous, Victor Garcia-Font, Carlos Nunez-Gomez, Julian Salas","doi":"arxiv-2409.10337","DOIUrl":"https://doi.org/arxiv-2409.10337","url":null,"abstract":"The advent of 6G networks promises unprecedented advancements in wireless\u0000communication, offering wider bandwidth and lower latency compared to its\u0000predecessors. This article explores the evolving infrastructure of 6G networks,\u0000emphasizing the transition towards a more disaggregated structure and the\u0000integration of artificial intelligence (AI) technologies. Furthermore, it\u0000explores the security, trust and privacy challenges and attacks in 6G networks,\u0000particularly those related to the use of AI. It presents a classification of\u0000network attacks stemming from its AI-centric architecture and explores\u0000technologies designed to detect or mitigate these emerging threats. The paper\u0000concludes by examining the implications and risks linked to the utilization of\u0000AI in ensuring a robust network.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142260235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Many IoT applications run on a wireless infrastructure supported by resource-constrained nodes which is popularly known as Low-Power and Lossy Networks (LLNs). Currently, LLNs play a vital role in digital transformation of industries. The resource limitations of LLNs restrict the usage of traditional routing protocols and therefore require an energy-efficient routing solution. IETF's Routing Protocol for Low-power Lossy Networks (RPL, pronounced 'ripple') is one of the most popular energy-efficient protocols for LLNs, specified in RFC 6550. In RPL, Destination Advertisement Object (DAO) control message is transmitted by a child node to pass on its reachability information to its immediate parent or root node. An attacker may exploit the insecure DAO sending mechanism of RPL to perform 'DAO insider attack' by transmitting DAO multiple times. This paper shows that an aggressive DAO insider attacker can drastically degrade network performance. We propose a Lightweight Mitigation Solution for DAO insider attack, which is termed as 'Li-MSD'. Li-MSD uses a blacklisting strategy to mitigate the attack and restore RPL performance, significantly. By using simulations, it is shown that Li-MSD outperforms the existing solution in the literature.
许多物联网应用都运行在由资源受限节点支持的无线基础设施上,这就是俗称的低功耗和低损耗网络(LLN)。目前,LLN 在各行业的数字化转型中发挥着至关重要的作用。IETF 的低功耗有损网络路由协议(RPL,读作 "涟漪")是最流行的低功耗有损网络节能协议之一,由 RFC 6550 规定。在 RPL 中,子节点会发送目的地广告对象(DAO)控制消息,将其可达性信息传递给其父节点或根节点。攻击者可能会利用 RPL 不安全的 DAO 发送机制,通过多次发送 DAO 来实施 "DAO 内部攻击"。本文表明,攻击性 DAO 内部攻击者会大幅降低网络性能。我们提出了一种针对 DAO 内部攻击的轻量级缓解方案,称为 "Li-MSD"。Li-MSD 使用黑名单策略来缓解攻击,并显著恢复 RPL 性能。模拟结果表明,Li-MSD 优于现有的文献解决方案。
{"title":"Li-MSD: A lightweight mitigation solution for DAO insider attack in RPL-based IoT","authors":"Abhishek Verma, Sachin Kumar Verma, Avinash Chandra Pandey, Jyoti Grover, Girish Sharma","doi":"arxiv-2409.10020","DOIUrl":"https://doi.org/arxiv-2409.10020","url":null,"abstract":"Many IoT applications run on a wireless infrastructure supported by\u0000resource-constrained nodes which is popularly known as Low-Power and Lossy\u0000Networks (LLNs). Currently, LLNs play a vital role in digital transformation of\u0000industries. The resource limitations of LLNs restrict the usage of traditional\u0000routing protocols and therefore require an energy-efficient routing solution.\u0000IETF's Routing Protocol for Low-power Lossy Networks (RPL, pronounced 'ripple')\u0000is one of the most popular energy-efficient protocols for LLNs, specified in\u0000RFC 6550. In RPL, Destination Advertisement Object (DAO) control message is\u0000transmitted by a child node to pass on its reachability information to its\u0000immediate parent or root node. An attacker may exploit the insecure DAO sending\u0000mechanism of RPL to perform 'DAO insider attack' by transmitting DAO multiple\u0000times. This paper shows that an aggressive DAO insider attacker can drastically\u0000degrade network performance. We propose a Lightweight Mitigation Solution for\u0000DAO insider attack, which is termed as 'Li-MSD'. Li-MSD uses a blacklisting\u0000strategy to mitigate the attack and restore RPL performance, significantly. By\u0000using simulations, it is shown that Li-MSD outperforms the existing solution in\u0000the literature.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142260226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Unmanned aerial vehicles (UAV) have been recognized as a versatile platform for a wide range of services. During the flight, these vehicles must avoid collisions to operate safely. In this way, they demand to keep spatial awareness, i.e., to know others in their coverage area. However, mobility and positioning aspects hamper building UAV network infrastructure to support reliable basic services. Thus, such vehicles call for a location service with up-to-date information resilient to false location injection threats. This work proposes FlySafe, a resilient UAVs location sharing service that employs opportunistic approaches to deliver UAVs' location. FlySafe takes into account the freshness of UAVs' location to maintain their spatial awareness. Further, it counts on the age of the UAV's location information to trigger device discovery. Simulation results showed that FlySafe achieved spatial awareness up to 94.15% of UAV operations, being resilient to~false locations injected in the network. Moreover, the accuracy in device discovery achieved 94.53% with a location error of less than 2 m.
{"title":"Resilient UAVs Location Sharing Service Based on Information Freshness and Opportunistic Deliveries","authors":"Agnaldo Batista, Aldri Santos","doi":"arxiv-2409.10708","DOIUrl":"https://doi.org/arxiv-2409.10708","url":null,"abstract":"Unmanned aerial vehicles (UAV) have been recognized as a versatile platform\u0000for a wide range of services. During the flight, these vehicles must avoid\u0000collisions to operate safely. In this way, they demand to keep spatial\u0000awareness, i.e., to know others in their coverage area. However, mobility and\u0000positioning aspects hamper building UAV network infrastructure to support\u0000reliable basic services. Thus, such vehicles call for a location service with\u0000up-to-date information resilient to false location injection threats. This work\u0000proposes FlySafe, a resilient UAVs location sharing service that employs\u0000opportunistic approaches to deliver UAVs' location. FlySafe takes into account\u0000the freshness of UAVs' location to maintain their spatial awareness. Further,\u0000it counts on the age of the UAV's location information to trigger device\u0000discovery. Simulation results showed that FlySafe achieved spatial awareness up\u0000to 94.15% of UAV operations, being resilient to~false locations injected in the\u0000network. Moreover, the accuracy in device discovery achieved 94.53% with a\u0000location error of less than 2 m.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142260222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}