首页 > 最新文献

Future Internet最新文献

英文 中文
Analyzing GPU Performance in Virtualized Environments: A Case Study 分析虚拟化环境中的 GPU 性能:案例研究
Pub Date : 2024-02-23 DOI: 10.3390/fi16030072
Adel Belkhiri, Michel Dagenais
The graphics processing unit (GPU) plays a crucial role in boosting application performance and enhancing computational tasks. Thanks to its parallel architecture and energy efficiency, the GPU has become essential in many computing scenarios. On the other hand, the advent of GPU virtualization has been a significant breakthrough, as it provides scalable and adaptable GPU resources for virtual machines. However, this technology faces challenges in debugging and analyzing the performance of GPU-accelerated applications. Most current performance tools do not support virtual GPUs (vGPUs), highlighting the need for more advanced tools. Thus, this article introduces a novel performance analysis tool that is designed for systems using vGPUs. Our tool is compatible with the Intel GVT-g virtualization solution, although its underlying principles can apply to many vGPU-based systems. Our tool uses software tracing techniques to gather detailed runtime data and generate relevant performance metrics. It also offers many synchronized graphical views, which gives practitioners deep insights into GVT-g operations and helps them identify potential performance bottlenecks in vGPU-enabled virtual machines.
图形处理器(GPU)在提高应用性能和增强计算任务方面发挥着至关重要的作用。凭借其并行架构和能效,图形处理器已成为许多计算场景中必不可少的设备。另一方面,GPU 虚拟化的出现是一项重大突破,因为它为虚拟机提供了可扩展和可调整的 GPU 资源。然而,这项技术在调试和分析 GPU 加速应用程序的性能方面面临挑战。目前的大多数性能工具都不支持虚拟 GPU(vGPU),这凸显了对更先进工具的需求。因此,本文介绍了一种专为使用 vGPU 的系统设计的新型性能分析工具。我们的工具与英特尔 GVT-g 虚拟化解决方案兼容,但其基本原理也适用于许多基于 vGPU 的系统。我们的工具使用软件跟踪技术收集详细的运行时数据,并生成相关的性能指标。它还提供了许多同步图形视图,使从业人员能够深入了解 GVT-g 的运行情况,并帮助他们识别启用了 vGPU 的虚拟机中潜在的性能瓶颈。
{"title":"Analyzing GPU Performance in Virtualized Environments: A Case Study","authors":"Adel Belkhiri, Michel Dagenais","doi":"10.3390/fi16030072","DOIUrl":"https://doi.org/10.3390/fi16030072","url":null,"abstract":"The graphics processing unit (GPU) plays a crucial role in boosting application performance and enhancing computational tasks. Thanks to its parallel architecture and energy efficiency, the GPU has become essential in many computing scenarios. On the other hand, the advent of GPU virtualization has been a significant breakthrough, as it provides scalable and adaptable GPU resources for virtual machines. However, this technology faces challenges in debugging and analyzing the performance of GPU-accelerated applications. Most current performance tools do not support virtual GPUs (vGPUs), highlighting the need for more advanced tools. Thus, this article introduces a novel performance analysis tool that is designed for systems using vGPUs. Our tool is compatible with the Intel GVT-g virtualization solution, although its underlying principles can apply to many vGPU-based systems. Our tool uses software tracing techniques to gather detailed runtime data and generate relevant performance metrics. It also offers many synchronized graphical views, which gives practitioners deep insights into GVT-g operations and helps them identify potential performance bottlenecks in vGPU-enabled virtual machines.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140437080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scheduling of Industrial Control Traffic for Dynamic RAN Slicing with Distributed Massive MIMO 利用分布式大规模多输入多输出(MIMO)调度工业控制流量,实现动态 RAN 分片
Pub Date : 2024-02-23 DOI: 10.3390/fi16030071
Emma Fitzgerald, Michal Pióro
Industry 4.0, with its focus on flexibility and customizability, is pushing in the direction of wireless communication in future smart factories, in particular, massive multiple-input-multiple-output (MIMO) and its future evolution of large intelligent surfaces (LIS), which provide more reliable channel quality than previous technologies. At the same time, network slicing in 5G and beyond systems provides easier management of different categories of users and traffic, and a better basis for providing quality of service, especially for demanding use cases such as industrial control. In previous works, we have presented solutions for scheduling industrial control traffic in LIS and massive MIMO systems. We now consider the case of dynamic slicing in the radio access network, where we need to not only meet the stringent latency and reliability requirements of industrial control traffic, but also minimize the radio resources occupied by the network slice serving the control traffic, ensuring resources are available for lower-priority traffic slices. In this paper, we provide mixed-integer programming optimization formulations for radio resource usage minimization for dynamic network slicing. We tested our formulations in numerical experiments with varying traffic profiles and numbers of nodes, up to a maximum of 32 nodes. For all problem instances tested, we were able to calculate an optimal schedule within 1 s, making our approach feasible for use in real deployment scenarios.
工业 4.0 注重灵活性和可定制性,正在推动未来智能工厂的无线通信方向,特别是大规模多输入多输出(MIMO)及其未来演进的大型智能表面(LIS),与以往的技术相比,可提供更可靠的信道质量。与此同时,5G 及更先进系统中的网络切片技术可以更轻松地管理不同类别的用户和流量,并为提供服务质量奠定更好的基础,特别是对于工业控制等要求苛刻的用例。在以前的工作中,我们提出了在 LIS 和大规模 MIMO 系统中调度工业控制流量的解决方案。现在,我们考虑在无线接入网络中进行动态分片的情况,在这种情况下,我们不仅需要满足工业控制流量对延迟和可靠性的严格要求,还要最大限度地减少为控制流量服务的网络分片所占用的无线资源,确保资源可用于优先级较低的流量分片。在本文中,我们为动态网络切片的无线电资源使用最小化提供了混合整数编程优化公式。我们在数值实验中测试了我们的公式,实验中使用了不同的流量剖面和节点数量,最多可达 32 个节点。对于所有测试过的问题实例,我们都能在 1 秒内计算出最佳时间表,这使我们的方法在实际部署场景中的应用变得可行。
{"title":"Scheduling of Industrial Control Traffic for Dynamic RAN Slicing with Distributed Massive MIMO","authors":"Emma Fitzgerald, Michal Pióro","doi":"10.3390/fi16030071","DOIUrl":"https://doi.org/10.3390/fi16030071","url":null,"abstract":"Industry 4.0, with its focus on flexibility and customizability, is pushing in the direction of wireless communication in future smart factories, in particular, massive multiple-input-multiple-output (MIMO) and its future evolution of large intelligent surfaces (LIS), which provide more reliable channel quality than previous technologies. At the same time, network slicing in 5G and beyond systems provides easier management of different categories of users and traffic, and a better basis for providing quality of service, especially for demanding use cases such as industrial control. In previous works, we have presented solutions for scheduling industrial control traffic in LIS and massive MIMO systems. We now consider the case of dynamic slicing in the radio access network, where we need to not only meet the stringent latency and reliability requirements of industrial control traffic, but also minimize the radio resources occupied by the network slice serving the control traffic, ensuring resources are available for lower-priority traffic slices. In this paper, we provide mixed-integer programming optimization formulations for radio resource usage minimization for dynamic network slicing. We tested our formulations in numerical experiments with varying traffic profiles and numbers of nodes, up to a maximum of 32 nodes. For all problem instances tested, we were able to calculate an optimal schedule within 1 s, making our approach feasible for use in real deployment scenarios.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140438195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning for Intrusion Detection Systems (IDSs) in Time Series Data 时间序列数据入侵检测系统(IDS)的深度学习
Pub Date : 2024-02-23 DOI: 10.3390/fi16030073
Konstantinos Psychogyios, Andreas Papadakis, S. Bourou, Nikolaos P. Nikolaou, Apostolos Maniatis, T. Zahariadis
The advent of computer networks and the internet has drastically altered the means by which we share information and interact with each other. However, this technological advancement has also created opportunities for malevolent behavior, with individuals exploiting vulnerabilities to gain access to confidential data, obstruct activity, etc. To this end, intrusion detection systems (IDSs) are needed to filter malicious traffic and prevent common attacks. In the past, these systems relied on a fixed set of rules or comparisons with previous attacks. However, with the increased availability of computational power and data, machine learning has emerged as a promising solution for this task. While many systems now use this methodology in real-time for a reactive approach to mitigation, we explore the potential of configuring it as a proactive time series prediction. In this work, we delve into this possibility further. More specifically, we convert a classic IDS dataset to a time series format and use predictive models to forecast forthcoming malign packets. We propose a new architecture combining convolutional neural networks, long short-term memory networks, and attention. The findings indicate that our model performs strongly, exhibiting an F1 score and AUC that are within margins of 1% and 3%, respectively, when compared to conventional real-time detection. Also, our architecture achieves an ∼8% F1 score improvement compared to an LSTM (long short-term memory) model.
计算机网络和互联网的出现极大地改变了我们分享信息和相互交流的方式。然而,这种技术进步也为恶意行为创造了机会,一些人利用漏洞获取机密数据、阻碍活动等。为此,需要入侵检测系统(IDS)来过滤恶意流量,防止常见攻击。过去,这些系统依赖于一套固定的规则或与以往攻击的比较。然而,随着计算能力和数据可用性的提高,机器学习已成为这项任务的一种有前途的解决方案。目前,许多系统都在实时使用这种方法进行被动式缓解,而我们则在探索将其配置为主动式时间序列预测的潜力。在这项工作中,我们将进一步探讨这种可能性。更具体地说,我们将经典的 IDS 数据集转换为时间序列格式,并使用预测模型来预测即将到来的恶意数据包。我们提出了一种结合卷积神经网络、长短期记忆网络和注意力的新架构。研究结果表明,我们的模型表现强劲,与传统的实时检测相比,F1得分和AUC分别在1%和3%的范围内。此外,与 LSTM(长短期记忆)模型相比,我们的架构在 F1 分数上提高了 8%。
{"title":"Deep Learning for Intrusion Detection Systems (IDSs) in Time Series Data","authors":"Konstantinos Psychogyios, Andreas Papadakis, S. Bourou, Nikolaos P. Nikolaou, Apostolos Maniatis, T. Zahariadis","doi":"10.3390/fi16030073","DOIUrl":"https://doi.org/10.3390/fi16030073","url":null,"abstract":"The advent of computer networks and the internet has drastically altered the means by which we share information and interact with each other. However, this technological advancement has also created opportunities for malevolent behavior, with individuals exploiting vulnerabilities to gain access to confidential data, obstruct activity, etc. To this end, intrusion detection systems (IDSs) are needed to filter malicious traffic and prevent common attacks. In the past, these systems relied on a fixed set of rules or comparisons with previous attacks. However, with the increased availability of computational power and data, machine learning has emerged as a promising solution for this task. While many systems now use this methodology in real-time for a reactive approach to mitigation, we explore the potential of configuring it as a proactive time series prediction. In this work, we delve into this possibility further. More specifically, we convert a classic IDS dataset to a time series format and use predictive models to forecast forthcoming malign packets. We propose a new architecture combining convolutional neural networks, long short-term memory networks, and attention. The findings indicate that our model performs strongly, exhibiting an F1 score and AUC that are within margins of 1% and 3%, respectively, when compared to conventional real-time detection. Also, our architecture achieves an ∼8% F1 score improvement compared to an LSTM (long short-term memory) model.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140436683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications 基于本体的人工智能系统和应用网络安全框架
Pub Date : 2024-02-22 DOI: 10.3390/fi16030069
Davy Preuveneers, Wouter Joosen
Ontologies have the potential to play an important role in the cybersecurity landscape as they are able to provide a structured and standardized way to semantically represent and organize knowledge about a domain of interest. They help in unambiguously modeling the complex relationships between various cybersecurity concepts and properties. Leveraging this knowledge, they provide a foundation for designing more intelligent and adaptive cybersecurity systems. In this work, we propose an ontology-based cybersecurity framework that extends well-known cybersecurity ontologies to specifically model and manage threats imposed on applications, systems, and services that rely on artificial intelligence (AI). More specifically, our efforts focus on documenting prevalent machine learning (ML) threats and countermeasures, including the mechanisms by which emerging attacks circumvent existing defenses as well as the arms race between them. In the ever-expanding AI threat landscape, the goal of this work is to systematically formalize a body of knowledge intended to complement existing taxonomies and threat-modeling approaches of applications empowered by AI and to facilitate their automated assessment by leveraging enhanced reasoning capabilities.
本体有可能在网络安全领域发挥重要作用,因为它们能够提供一种结构化和标准化的方式,以语义表示和组织有关领域的知识。它们有助于对各种网络安全概念和属性之间的复杂关系进行明确建模。利用这些知识,它们为设计更加智能和自适应的网络安全系统奠定了基础。在这项工作中,我们提出了一个基于本体的网络安全框架,该框架扩展了众所周知的网络安全本体,以专门建模和管理强加在依赖人工智能(AI)的应用程序、系统和服务上的威胁。更具体地说,我们的工作重点是记录流行的机器学习(ML)威胁和应对措施,包括新出现的攻击规避现有防御的机制以及它们之间的军备竞赛。在人工智能威胁不断扩大的情况下,这项工作的目标是系统地将知识体系正规化,以补充人工智能赋能应用的现有分类法和威胁建模方法,并利用增强的推理能力促进其自动评估。
{"title":"An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications","authors":"Davy Preuveneers, Wouter Joosen","doi":"10.3390/fi16030069","DOIUrl":"https://doi.org/10.3390/fi16030069","url":null,"abstract":"Ontologies have the potential to play an important role in the cybersecurity landscape as they are able to provide a structured and standardized way to semantically represent and organize knowledge about a domain of interest. They help in unambiguously modeling the complex relationships between various cybersecurity concepts and properties. Leveraging this knowledge, they provide a foundation for designing more intelligent and adaptive cybersecurity systems. In this work, we propose an ontology-based cybersecurity framework that extends well-known cybersecurity ontologies to specifically model and manage threats imposed on applications, systems, and services that rely on artificial intelligence (AI). More specifically, our efforts focus on documenting prevalent machine learning (ML) threats and countermeasures, including the mechanisms by which emerging attacks circumvent existing defenses as well as the arms race between them. In the ever-expanding AI threat landscape, the goal of this work is to systematically formalize a body of knowledge intended to complement existing taxonomies and threat-modeling approaches of applications empowered by AI and to facilitate their automated assessment by leveraging enhanced reasoning capabilities.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139957944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Future of Healthcare with Industry 5.0: Preliminary Interview-Based Qualitative Analysis 工业 5.0 带来的医疗保健未来:基于访谈的初步定性分析
Pub Date : 2024-02-22 DOI: 10.3390/fi16030068
Juliana Basulo-Ribeiro, Leonor C. Teixeira
With the advent of Industry 5.0 (I5.0), healthcare is undergoing a profound transformation, integrating human capabilities with advanced technologies to promote a patient-centered, efficient, and empathetic healthcare ecosystem. This study aims to examine the effects of Industry 5.0 on healthcare, emphasizing the synergy between human experience and technology. To this end, 6 specific objectives were found, which were answered in the results through an empirical study based on interviews with 11 healthcare professionals. This article thus outlines strategic and policy guidelines for the integration of I5.0 in healthcare, advocating policy-driven change, and contributes to the literature by offering a solid theoretical basis on I5.0 and its impact on the healthcare sector.
随着工业 5.0(I5.0)时代的到来,医疗保健正经历着一场深刻的变革,它将人的能力与先进技术相结合,以促进建立一个以患者为中心、高效且富有同情心的医疗保健生态系统。本研究旨在探讨工业 5.0 对医疗保健的影响,强调人类体验与技术之间的协同作用。为此,本研究确定了 6 个具体目标,并通过对 11 名医疗保健专业人员进行访谈,在实证研究结果中对这些目标做出了回答。因此,本文概述了将 I5.0 融入医疗保健领域的战略和政策指导方针,倡导以政策为导向的变革,并为 I5.0 及其对医疗保健领域的影响提供了坚实的理论基础,从而为相关文献做出了贡献。
{"title":"The Future of Healthcare with Industry 5.0: Preliminary Interview-Based Qualitative Analysis","authors":"Juliana Basulo-Ribeiro, Leonor C. Teixeira","doi":"10.3390/fi16030068","DOIUrl":"https://doi.org/10.3390/fi16030068","url":null,"abstract":"With the advent of Industry 5.0 (I5.0), healthcare is undergoing a profound transformation, integrating human capabilities with advanced technologies to promote a patient-centered, efficient, and empathetic healthcare ecosystem. This study aims to examine the effects of Industry 5.0 on healthcare, emphasizing the synergy between human experience and technology. To this end, 6 specific objectives were found, which were answered in the results through an empirical study based on interviews with 11 healthcare professionals. This article thus outlines strategic and policy guidelines for the integration of I5.0 in healthcare, advocating policy-driven change, and contributes to the literature by offering a solid theoretical basis on I5.0 and its impact on the healthcare sector.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140438677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Micro-FL: A Fault-Tolerant Scalable Microservice-Based Platform for Federated Learning Micro-FL:基于容错可扩展微服务的联合学习平台
Pub Date : 2024-02-22 DOI: 10.3390/fi16030070
Mikael Sabuhi, Petr Musilek, C. Bezemer
As the number of machine learning applications increases, growing concerns about data privacy expose the limitations of traditional cloud-based machine learning methods that rely on centralized data collection and processing. Federated learning emerges as a promising alternative, offering a novel approach to training machine learning models that safeguards data privacy. Federated learning facilitates collaborative model training across various entities. In this approach, each user trains models locally and shares only the local model parameters with a central server, which then generates a global model based on these individual updates. This approach ensures data privacy since the training data itself is never directly shared with a central entity. However, existing federated machine learning frameworks are not without challenges. In terms of server design, these frameworks exhibit limited scalability with an increasing number of clients and are highly vulnerable to system faults, particularly as the central server becomes a single point of failure. This paper introduces Micro-FL, a federated learning framework that uses a microservices architecture to implement the federated learning system. It demonstrates that the framework is fault-tolerant and scalable, showing its ability to handle an increasing number of clients. A comprehensive performance evaluation confirms that Micro-FL proficiently handles component faults, enabling a smooth and uninterrupted operation.
随着机器学习应用数量的增加,人们对数据隐私日益关注,这暴露了依赖集中式数据收集和处理的传统云机器学习方法的局限性。联合学习是一种很有前途的替代方法,它为训练机器学习模型提供了一种保护数据隐私的新方法。联合学习有利于在不同实体间进行协作模型训练。在这种方法中,每个用户都在本地训练模型,只与中央服务器共享本地模型参数,然后中央服务器根据这些单个更新生成全局模型。这种方法可以确保数据隐私,因为训练数据本身不会直接与中央实体共享。然而,现有的联合机器学习框架并非没有挑战。在服务器设计方面,随着客户端数量的增加,这些框架表现出有限的可扩展性,而且极易受到系统故障的影响,特别是当中央服务器成为单点故障时。本文介绍了联合学习框架 Micro-FL,它使用微服务架构来实现联合学习系统。它证明了该框架的容错性和可扩展性,展示了其处理不断增加的客户端数量的能力。一项全面的性能评估证实,Micro-FL 能熟练处理组件故障,从而实现平稳、不间断的运行。
{"title":"Micro-FL: A Fault-Tolerant Scalable Microservice-Based Platform for Federated Learning","authors":"Mikael Sabuhi, Petr Musilek, C. Bezemer","doi":"10.3390/fi16030070","DOIUrl":"https://doi.org/10.3390/fi16030070","url":null,"abstract":"As the number of machine learning applications increases, growing concerns about data privacy expose the limitations of traditional cloud-based machine learning methods that rely on centralized data collection and processing. Federated learning emerges as a promising alternative, offering a novel approach to training machine learning models that safeguards data privacy. Federated learning facilitates collaborative model training across various entities. In this approach, each user trains models locally and shares only the local model parameters with a central server, which then generates a global model based on these individual updates. This approach ensures data privacy since the training data itself is never directly shared with a central entity. However, existing federated machine learning frameworks are not without challenges. In terms of server design, these frameworks exhibit limited scalability with an increasing number of clients and are highly vulnerable to system faults, particularly as the central server becomes a single point of failure. This paper introduces Micro-FL, a federated learning framework that uses a microservices architecture to implement the federated learning system. It demonstrates that the framework is fault-tolerant and scalable, showing its ability to handle an increasing number of clients. A comprehensive performance evaluation confirms that Micro-FL proficiently handles component faults, enabling a smooth and uninterrupted operation.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140438557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas 关于 5G 和 6G 安全考虑因素、挑战、趋势和研究领域的系统调查
Pub Date : 2024-02-20 DOI: 10.3390/fi16030067
Paul Scalise, Matthew Boeding, M. Hempel, H. Sharif, Joseph Delloiacovo, John Reed
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology. Numerous security capabilities need to work together to ensure and maintain a sufficiently secure 5G environment that places user privacy and security at the forefront. Confidentiality, integrity, and availability are all pillars of a privacy and security framework that define major aspects of 5G operations. They are incorporated and considered in the design of the 5G standard by the 3rd Generation Partnership Project (3GPP) with the goal of providing a highly reliable network operation for all. Through a comprehensive review, we aim to analyze the ever-evolving landscape of 5G, including any potential attack vectors and proposed measures to mitigate or prevent these threats. This paper presents a comprehensive survey of the state-of-the-art research that has been conducted in recent years regarding 5G systems, focusing on the main components in a systematic approach: the Core Network (CN), Radio Access Network (RAN), and User Equipment (UE). Additionally, we investigate the utilization of 5G in time-dependent, ultra-confidential, and private communications built around a Zero Trust approach. In today’s world, where everything is more connected than ever, Zero Trust policies and architectures can be highly valuable in operations containing sensitive data. Realizing a Zero Trust Architecture entails continuous verification of all devices, users, and requests, regardless of their location within the network, and grants permission only to authorized entities. Finally, developments and proposed methods of new 5G and future 6G security approaches, such as Blockchain technology, post-quantum cryptography (PQC), and Artificial Intelligence (AI) schemes, are also discussed to understand better the full landscape of current and future research within this telecommunications domain.
随着 3GPP 第五代(5G)蜂窝服务的快速推广和日益普及,包括在关键基础设施领域的应用,对这一重要技术的安全机制、风险和潜在漏洞进行审查非常重要。众多安全功能需要协同工作,以确保和维护足够安全的 5G 环境,将用户隐私和安全放在首位。保密性、完整性和可用性都是隐私和安全框架的支柱,定义了 5G 操作的主要方面。第三代合作伙伴计划(3GPP)在设计 5G 标准时纳入并考虑了这些因素,目的是为所有人提供高度可靠的网络运行。通过全面回顾,我们旨在分析 5G 不断发展的前景,包括任何潜在的攻击载体以及减轻或预防这些威胁的建议措施。本文全面介绍了近年来有关 5G 系统的最新研究成果,并以系统化的方法重点介绍了核心网络 (CN)、无线接入网络 (RAN) 和用户设备 (UE) 等主要组成部分。此外,我们还围绕 "零信任 "方法,研究了 5G 在时间依赖性、超机密和私人通信中的应用。在当今世界,万物之间的联系比以往任何时候都更加紧密,零信任策略和架构在包含敏感数据的操作中极具价值。实现零信任架构需要对所有设备、用户和请求(无论其在网络中的位置如何)进行持续验证,并只向授权实体授予许可。最后,还讨论了新的 5G 和未来 6G 安全方法的发展和拟议方法,如区块链技术、后量子密码学 (PQC) 和人工智能 (AI) 方案,以便更好地了解这一电信领域当前和未来研究的全貌。
{"title":"A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas","authors":"Paul Scalise, Matthew Boeding, M. Hempel, H. Sharif, Joseph Delloiacovo, John Reed","doi":"10.3390/fi16030067","DOIUrl":"https://doi.org/10.3390/fi16030067","url":null,"abstract":"With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology. Numerous security capabilities need to work together to ensure and maintain a sufficiently secure 5G environment that places user privacy and security at the forefront. Confidentiality, integrity, and availability are all pillars of a privacy and security framework that define major aspects of 5G operations. They are incorporated and considered in the design of the 5G standard by the 3rd Generation Partnership Project (3GPP) with the goal of providing a highly reliable network operation for all. Through a comprehensive review, we aim to analyze the ever-evolving landscape of 5G, including any potential attack vectors and proposed measures to mitigate or prevent these threats. This paper presents a comprehensive survey of the state-of-the-art research that has been conducted in recent years regarding 5G systems, focusing on the main components in a systematic approach: the Core Network (CN), Radio Access Network (RAN), and User Equipment (UE). Additionally, we investigate the utilization of 5G in time-dependent, ultra-confidential, and private communications built around a Zero Trust approach. In today’s world, where everything is more connected than ever, Zero Trust policies and architectures can be highly valuable in operations containing sensitive data. Realizing a Zero Trust Architecture entails continuous verification of all devices, users, and requests, regardless of their location within the network, and grants permission only to authorized entities. Finally, developments and proposed methods of new 5G and future 6G security approaches, such as Blockchain technology, post-quantum cryptography (PQC), and Artificial Intelligence (AI) schemes, are also discussed to understand better the full landscape of current and future research within this telecommunications domain.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140448075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-Efficient De-Duplication Mechanism for Healthcare Data Aggregation in IoT 物联网中医疗保健数据聚合的高能效重复数据删除机制
Pub Date : 2024-02-19 DOI: 10.3390/fi16020066
Muhammad Nafees Ulfat Khan, Weiping Cao, Zhiling Tang, A. Ullah, Wanghua Pan
The rapid development of the Internet of Things (IoT) has opened the way for transformative advances in numerous fields, including healthcare. IoT-based healthcare systems provide unprecedented opportunities to gather patients’ real-time data and make appropriate decisions at the right time. Yet, the deployed sensors generate normal readings most of the time, which are transmitted to Cluster Heads (CHs). Handling these voluminous duplicated data is quite challenging. The existing techniques have high energy consumption, storage costs, and communication costs. To overcome these problems, in this paper, an innovative Energy-Efficient Fuzzy Data Aggregation System (EE-FDAS) has been presented. In it, at the first level, it is checked that sensors either generate normal or critical readings. In the first case, readings are converted to Boolean digit 0. This reduced data size takes only 1 digit which considerably reduces energy consumption. In the second scenario, sensors generating irregular readings are transmitted in their original 16 or 32-bit form. Then, data are aggregated and transmitted to respective CHs. Afterwards, these data are further transmitted to Fog servers, from where doctors have access. Lastly, for later usage, data are stored in the cloud server. For checking the proficiency of the proposed EE-FDAS scheme, extensive simulations are performed using NS-2.35. The results showed that EE-FDAS has performed well in terms of aggregation factor, energy consumption, packet drop rate, communication, and storage cost.
物联网(IoT)的快速发展为包括医疗保健在内的众多领域带来了变革性的进步。基于物联网的医疗保健系统为收集患者的实时数据并适时做出适当决策提供了前所未有的机遇。然而,所部署的传感器在大部分时间都会生成正常读数,并将这些读数传输给簇头(CH)。处理这些大量重复的数据具有相当大的挑战性。现有技术的能耗、存储成本和通信成本都很高。为了克服这些问题,本文提出了一种创新的高能效模糊数据聚合系统(EE-FDAS)。在该系统中,首先要检查传感器是否产生正常或临界读数。在第一种情况下,读数被转换为布尔数字 0。这样减少的数据量只需 1 位数,大大降低了能耗。在第二种情况下,产生不规则读数的传感器以原始的 16 位或 32 位形式传输。然后,数据被汇总并传输到相应的 CH。然后,这些数据被进一步传输到雾服务器,医生可以从那里访问这些数据。最后,数据存储在云服务器中,以供日后使用。为了验证所提出的 EE-FDAS 方案的准确性,我们使用 NS-2.35 进行了大量模拟。结果表明,EE-FDAS 在聚合系数、能耗、数据包丢失率、通信和存储成本方面表现良好。
{"title":"Energy-Efficient De-Duplication Mechanism for Healthcare Data Aggregation in IoT","authors":"Muhammad Nafees Ulfat Khan, Weiping Cao, Zhiling Tang, A. Ullah, Wanghua Pan","doi":"10.3390/fi16020066","DOIUrl":"https://doi.org/10.3390/fi16020066","url":null,"abstract":"The rapid development of the Internet of Things (IoT) has opened the way for transformative advances in numerous fields, including healthcare. IoT-based healthcare systems provide unprecedented opportunities to gather patients’ real-time data and make appropriate decisions at the right time. Yet, the deployed sensors generate normal readings most of the time, which are transmitted to Cluster Heads (CHs). Handling these voluminous duplicated data is quite challenging. The existing techniques have high energy consumption, storage costs, and communication costs. To overcome these problems, in this paper, an innovative Energy-Efficient Fuzzy Data Aggregation System (EE-FDAS) has been presented. In it, at the first level, it is checked that sensors either generate normal or critical readings. In the first case, readings are converted to Boolean digit 0. This reduced data size takes only 1 digit which considerably reduces energy consumption. In the second scenario, sensors generating irregular readings are transmitted in their original 16 or 32-bit form. Then, data are aggregated and transmitted to respective CHs. Afterwards, these data are further transmitted to Fog servers, from where doctors have access. Lastly, for later usage, data are stored in the cloud server. For checking the proficiency of the proposed EE-FDAS scheme, extensive simulations are performed using NS-2.35. The results showed that EE-FDAS has performed well in terms of aggregation factor, energy consumption, packet drop rate, communication, and storage cost.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140451323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoTwins: Implementing Distributed and Hybrid Digital Twins in Industrial Manufacturing and Facility Management Settings IoTwins:在工业制造和设施管理环境中实施分布式和混合式数字孪生系统
Pub Date : 2024-02-17 DOI: 10.3390/fi16020065
Paolo Bellavista, G. Modica
A Digital Twin (DT) refers to a virtual representation or digital replica of a physical object, system, process, or entity. This concept involves creating a detailed, real-time digital counterpart that mimics the behavior, characteristics, and attributes of its physical counterpart. DTs have the potential to improve efficiency, reduce costs, and enhance decision-making by providing a detailed, real-time understanding of the physical systems they represent. While this technology is finding application in numerous fields, such as energy, healthcare, and transportation, it appears to be a key component of the digital transformation of industries fostered by the fourth Industrial revolution (Industry 4.0). In this paper, we present the research results achieved by IoTwins, a European research project aimed at investigating opportunities and issues of adopting DTs in the fields of industrial manufacturing and facility management. Particularly, we discuss a DT model and a reference architecture for use by the research community to implement a platform for the development and deployment of industrial DTs in the cloud continuum. Guided by the devised architectures’ principles, we implemented an open platform and a development methodology to help companies build DT-based industrial applications and deploy them in the so-called Edge/Cloud continuum. To prove the research value and the usability of the implemented platform, we discuss a simple yet practical development use case.
数字孪生(DT)是指物理对象、系统、流程或实体的虚拟表示或数字复制品。这一概念涉及创建一个详细、实时的数字对应物,模仿其物理对应物的行为、特征和属性。DT 有可能通过提供对其所代表的物理系统的详细、实时了解来提高效率、降低成本和加强决策。这项技术正在能源、医疗保健和交通等众多领域得到应用,它似乎是第四次工业革命(工业 4.0)推动的工业数字化转型的关键组成部分。在本文中,我们介绍了 IoTwins 项目取得的研究成果,这是一个欧洲研究项目,旨在研究在工业制造和设施管理领域采用 DT 的机遇和问题。特别是,我们讨论了一种 DT 模型和参考架构,供研究界用于在云连续体中实施工业 DT 的开发和部署平台。在所设计架构原则的指导下,我们实施了一个开放平台和一种开发方法,以帮助企业构建基于 DT 的工业应用,并将其部署到所谓的边缘/云连续体中。为了证明所实施平台的研究价值和可用性,我们讨论了一个简单而实用的开发用例。
{"title":"IoTwins: Implementing Distributed and Hybrid Digital Twins in Industrial Manufacturing and Facility Management Settings","authors":"Paolo Bellavista, G. Modica","doi":"10.3390/fi16020065","DOIUrl":"https://doi.org/10.3390/fi16020065","url":null,"abstract":"A Digital Twin (DT) refers to a virtual representation or digital replica of a physical object, system, process, or entity. This concept involves creating a detailed, real-time digital counterpart that mimics the behavior, characteristics, and attributes of its physical counterpart. DTs have the potential to improve efficiency, reduce costs, and enhance decision-making by providing a detailed, real-time understanding of the physical systems they represent. While this technology is finding application in numerous fields, such as energy, healthcare, and transportation, it appears to be a key component of the digital transformation of industries fostered by the fourth Industrial revolution (Industry 4.0). In this paper, we present the research results achieved by IoTwins, a European research project aimed at investigating opportunities and issues of adopting DTs in the fields of industrial manufacturing and facility management. Particularly, we discuss a DT model and a reference architecture for use by the research community to implement a platform for the development and deployment of industrial DTs in the cloud continuum. Guided by the devised architectures’ principles, we implemented an open platform and a development methodology to help companies build DT-based industrial applications and deploy them in the so-called Edge/Cloud continuum. To prove the research value and the usability of the implemented platform, we discuss a simple yet practical development use case.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140453394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Merging Ontologies and Data from Electronic Health Records 合并电子健康记录中的本体和数据
Pub Date : 2024-02-17 DOI: 10.3390/fi16020062
Salvatore Calcagno, Andrea Calvagna, E. Tramontana, Gabriella Verga
The Electronic Health Record (EHR) is a system for collecting and storing patient medical records as data that can be mechanically accessed, hence facilitating and assisting the medical decision-making process. EHRs exist in several formats, and each format lists thousands of keywords to classify patients data. The keywords are specific and are medical jargon; hence, data classification is very accurate. As the keywords constituting the formats of medical records express concepts by means of specific jargon without definitions or references, their proper use is left to clinicians and could be affected by their background, hence the interpretation of data could become slow or less accurate than that desired. This article presents an approach that accurately relates data in EHRs to ontologies in the medical realm. Thanks to ontologies, clinicians can be assisted when writing or analysing health records, e.g., our solution promptly suggests rigorous definitions for scientific terms, and automatically connects data spread over several parts of EHRs. The first step of our approach consists of converting selected data and keywords from several EHR formats into a format easier to parse, then the second step is merging the extracted data with specialised medical ontologies. Finally, enriched versions of the medical data are made available to professionals. The proposed approach was validated by taking samples of medical records and ontologies in the real world. The results have shown both versatility on handling data, precision of query results, and appropriate suggestions for relations among medical records.
电子病历(EHR)是一种收集和存储病人医疗记录的系统,这些记录是可以通过机械方式获取的数据,从而促进和协助医疗决策过程。电子病历有多种格式,每种格式都列出了数千个关键字,用于对病人数据进行分类。这些关键词都是特定的医学术语,因此数据分类非常准确。由于构成病历格式的关键字都是用特定的行话表达概念,没有定义或参考资料,因此只能由临床医生来正确使用这些关键字,而且可能会受到其背景的影响,因此数据解读可能会变得缓慢或不够准确。本文介绍了一种将电子病历中的数据与医学领域的本体准确联系起来的方法。有了本体论,临床医生在撰写或分析健康记录时就能得到帮助,例如,我们的解决方案能及时建议科学术语的严格定义,并自动连接电子病历中多个部分的数据。我们方法的第一步包括将多个电子病历格式中的选定数据和关键字转换为更易于解析的格式,然后第二步是将提取的数据与专门的医学本体论合并。最后,向专业人员提供丰富的医疗数据版本。通过采集现实世界中的医疗记录和本体样本,对所提出的方法进行了验证。结果表明,该方法具有处理数据的多功能性、查询结果的精确性以及对医疗记录之间关系的适当建议。
{"title":"Merging Ontologies and Data from Electronic Health Records","authors":"Salvatore Calcagno, Andrea Calvagna, E. Tramontana, Gabriella Verga","doi":"10.3390/fi16020062","DOIUrl":"https://doi.org/10.3390/fi16020062","url":null,"abstract":"The Electronic Health Record (EHR) is a system for collecting and storing patient medical records as data that can be mechanically accessed, hence facilitating and assisting the medical decision-making process. EHRs exist in several formats, and each format lists thousands of keywords to classify patients data. The keywords are specific and are medical jargon; hence, data classification is very accurate. As the keywords constituting the formats of medical records express concepts by means of specific jargon without definitions or references, their proper use is left to clinicians and could be affected by their background, hence the interpretation of data could become slow or less accurate than that desired. This article presents an approach that accurately relates data in EHRs to ontologies in the medical realm. Thanks to ontologies, clinicians can be assisted when writing or analysing health records, e.g., our solution promptly suggests rigorous definitions for scientific terms, and automatically connects data spread over several parts of EHRs. The first step of our approach consists of converting selected data and keywords from several EHR formats into a format easier to parse, then the second step is merging the extracted data with specialised medical ontologies. Finally, enriched versions of the medical data are made available to professionals. The proposed approach was validated by taking samples of medical records and ontologies in the real world. The results have shown both versatility on handling data, precision of query results, and appropriate suggestions for relations among medical records.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140453731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Future Internet
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1