Pub Date : 2023-06-06DOI: 10.1109/EuCNC/6GSummit58263.2023.10188239
Foivos Charalampakos, Thomas Tsouparopoulos, Yiannis Papageorgiou, G. Bologna, A. Panisson, A. Perotti, I. Koutsopoulos
The PRE-ACT project is a newly launched Horizon Europe project that aims to use Artificial Intelligence (AI) towards predicting the risk of side effects of radiotherapy treatment for breast cancer patients. In this paper, we outline four main threads pertaining to AI and computing that are part of the project's research agenda, namely: (i) Explainable AI techniques to make the risk prediction interpretable for the patient and the clinician; (ii) Fair AI techniques to identify and explain potential biases in clinical decision support systems; (iii) Training of AI models from distributed data through Federated Learning algorithms to ensure data privacy; (iv) Mobile applications to provide the patients and clinicians with an interface for the side effect risk prediction. For each of these directions, we provide an overview of the state-of-the-art, with emphasis on techniques that are more relevant for the project. Collectively, these four threads can be seen as enforcing Trustworthy AI and pave the way to transparent and responsible AI systems that are adopted by end-users and may thus unleash the full potential of AI.
{"title":"Research Challenges in Trustworthy Artificial Intelligence and Computing for Health: The Case of the PRE-ACT project","authors":"Foivos Charalampakos, Thomas Tsouparopoulos, Yiannis Papageorgiou, G. Bologna, A. Panisson, A. Perotti, I. Koutsopoulos","doi":"10.1109/EuCNC/6GSummit58263.2023.10188239","DOIUrl":"https://doi.org/10.1109/EuCNC/6GSummit58263.2023.10188239","url":null,"abstract":"The PRE-ACT project is a newly launched Horizon Europe project that aims to use Artificial Intelligence (AI) towards predicting the risk of side effects of radiotherapy treatment for breast cancer patients. In this paper, we outline four main threads pertaining to AI and computing that are part of the project's research agenda, namely: (i) Explainable AI techniques to make the risk prediction interpretable for the patient and the clinician; (ii) Fair AI techniques to identify and explain potential biases in clinical decision support systems; (iii) Training of AI models from distributed data through Federated Learning algorithms to ensure data privacy; (iv) Mobile applications to provide the patients and clinicians with an interface for the side effect risk prediction. For each of these directions, we provide an overview of the state-of-the-art, with emphasis on techniques that are more relevant for the project. Collectively, these four threads can be seen as enforcing Trustworthy AI and pave the way to transparent and responsible AI systems that are adopted by end-users and may thus unleash the full potential of AI.","PeriodicalId":65870,"journal":{"name":"公共管理高层论坛","volume":"28 1","pages":"629-634"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72682048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-06DOI: 10.1109/EuCNC/6GSummit58263.2023.10188263
I. Ajayi, Y. Medjahdi, L. Mroueh, R. Zayani, F. Kaddour
In this paper, we study the secrecy energy efficiency (SEE) in an artificial noise (AN)-aided secure massive multiple-input multiple-output (MIMO) scheme. The scheme uses instantaneous information to design a peak-to-average power (PAPR)-aware AN that simultaneously improves secrecy and reduces PAPR. High PAPR leads to non-linear in-band signal distortion and out-of-band radiation causing adjacent channel interference. To ensure optimal secrecy performance, high power amplifiers (HPAs) at the base station (BS) are backed off to operate in the linear region only. The amount of back-off needed to ensure linearity of the HPA has a direct impact on the energy efficiency of the system and by extension the SEE. For our scheme, the magnitude of this back-off is determined by the power allocation ratio between the data and AN. Hence, we propose an optimal power allocation ratio for the scheme. This is to ensure a good trade-off between the energy efficiency, security, and reliability of the system. Simulation results show a better SEE performance for our scheme compared to legacy massive MIMO schemes with or without random AN injection. Finally, we study the impact of spatially correlated Rayleigh fading on the proposed scheme.
{"title":"Secrecy Energy Efficiency in PAPR-Aware Artificial Noise Scheme for Secure Massive MIMO","authors":"I. Ajayi, Y. Medjahdi, L. Mroueh, R. Zayani, F. Kaddour","doi":"10.1109/EuCNC/6GSummit58263.2023.10188263","DOIUrl":"https://doi.org/10.1109/EuCNC/6GSummit58263.2023.10188263","url":null,"abstract":"In this paper, we study the secrecy energy efficiency (SEE) in an artificial noise (AN)-aided secure massive multiple-input multiple-output (MIMO) scheme. The scheme uses instantaneous information to design a peak-to-average power (PAPR)-aware AN that simultaneously improves secrecy and reduces PAPR. High PAPR leads to non-linear in-band signal distortion and out-of-band radiation causing adjacent channel interference. To ensure optimal secrecy performance, high power amplifiers (HPAs) at the base station (BS) are backed off to operate in the linear region only. The amount of back-off needed to ensure linearity of the HPA has a direct impact on the energy efficiency of the system and by extension the SEE. For our scheme, the magnitude of this back-off is determined by the power allocation ratio between the data and AN. Hence, we propose an optimal power allocation ratio for the scheme. This is to ensure a good trade-off between the energy efficiency, security, and reliability of the system. Simulation results show a better SEE performance for our scheme compared to legacy massive MIMO schemes with or without random AN injection. Finally, we study the impact of spatially correlated Rayleigh fading on the proposed scheme.","PeriodicalId":65870,"journal":{"name":"公共管理高层论坛","volume":"27 1","pages":"42-47"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80142639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-06DOI: 10.1109/EuCNC/6GSummit58263.2023.10188321
Hasan Qaq, Omkar Kulkarni, Yuming Jiang
Bluetooth mesh is a recent addition to the IoT connectivity landscape. It provides a simple and efficient short-range wireless mesh networking solution. This paper evaluates the performance of a Bluetooth mesh-based IoT sensor data gath-ering network in a real-world office environment. It provides sug-gestions to improve the reliability of the data gathering process. Specifically, the effect of various Bluetooth mesh protocol-related and non-protocol-related parameters is evaluated. The protocol-related parameters explored in this paper include the Publish Retransmit Count (PRC), the Network Transmit Count (NTC), and the Relay Retransmit Count (RRC). The non-protocol-related parameters include the packet-sending randomization interval and the packet payload redundancy. Through extensive experiments, the results show that a high degree of reliability, 99%, can be achieved with a combined use of these parameters. These results provide insights and shed light on configuring a Bluetooth mesh network to achieve high reliability for sensor data gathering.
{"title":"Reliable Sensor Data Gathering with Bluetooth Mesh: An Experimental Study","authors":"Hasan Qaq, Omkar Kulkarni, Yuming Jiang","doi":"10.1109/EuCNC/6GSummit58263.2023.10188321","DOIUrl":"https://doi.org/10.1109/EuCNC/6GSummit58263.2023.10188321","url":null,"abstract":"Bluetooth mesh is a recent addition to the IoT connectivity landscape. It provides a simple and efficient short-range wireless mesh networking solution. This paper evaluates the performance of a Bluetooth mesh-based IoT sensor data gath-ering network in a real-world office environment. It provides sug-gestions to improve the reliability of the data gathering process. Specifically, the effect of various Bluetooth mesh protocol-related and non-protocol-related parameters is evaluated. The protocol-related parameters explored in this paper include the Publish Retransmit Count (PRC), the Network Transmit Count (NTC), and the Relay Retransmit Count (RRC). The non-protocol-related parameters include the packet-sending randomization interval and the packet payload redundancy. Through extensive experiments, the results show that a high degree of reliability, 99%, can be achieved with a combined use of these parameters. These results provide insights and shed light on configuring a Bluetooth mesh network to achieve high reliability for sensor data gathering.","PeriodicalId":65870,"journal":{"name":"公共管理高层论坛","volume":"27 1","pages":"687-692"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77329976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-06DOI: 10.1109/EuCNC/6GSummit58263.2023.10188277
Andrea Gentili, H. Kokkoniemi-Tarkkanen, A. Heikkinen, M. Kasslin, M. Uusitalo
Continuous and reliable unlicensed wireless con-nectivity solutions could play a fundamental role in the next generation of ports. To provide secure and reliable video moni-toring, Automated Rubber- Tyred Gantry cranes (AutoRTGs) rely on wired cable reel connections. By adopting 5G technology, smart ports can eliminate the need for fixed wired connections in favour of low-latency wireless communication, allowing effective communication and control. However, occasionally it is better to leverage complementary wireless technologies to carry resource-intensive traffic like large amounts of video data in uplink (UL). As a result, Wi-Fi is being considered as a potential solution. Wireless networks are widely utilized for their quick installation and simplicity. However, the presence of multiple unlicensed Wireless Access Networks could impact the wireless connection performance due to the possibility of channel interference. This paper studies how the utilization of a Multipath Trans-mission Control Protocol (MPTCP) wireless system can serve as an alternative to a fixed fiber cable reel. To minimize the latency, we propose the simultaneous use of two Wi-Fi 6 networks and MPTCP's redundant scheduler to send video streams from the crane to a remote control center (RCC) desk. We compare different wired and wireless topology alternatives to assess the most reliable network configuration when the AutoRTG is in operation. Thus, we evaluate each topology with dynamic quality of service (QoS) measurements. We find that duplicating packets with MPTCP over two Wi-Fi 6 networks allows for stable and reliable low-latency video streaming, even in instances where one of the networks experiences sudden high delay peaks. Finally, we discuss how the utilization of Wi-Fi and MPTCP can be a choice to support and complement 5G in situations with heavy uplink traffic.
{"title":"Leveraging Wi-Fi 6 and MPTCP for Efficient and Reliable Real-Time Video Streaming in Safe Port Monitoring","authors":"Andrea Gentili, H. Kokkoniemi-Tarkkanen, A. Heikkinen, M. Kasslin, M. Uusitalo","doi":"10.1109/EuCNC/6GSummit58263.2023.10188277","DOIUrl":"https://doi.org/10.1109/EuCNC/6GSummit58263.2023.10188277","url":null,"abstract":"Continuous and reliable unlicensed wireless con-nectivity solutions could play a fundamental role in the next generation of ports. To provide secure and reliable video moni-toring, Automated Rubber- Tyred Gantry cranes (AutoRTGs) rely on wired cable reel connections. By adopting 5G technology, smart ports can eliminate the need for fixed wired connections in favour of low-latency wireless communication, allowing effective communication and control. However, occasionally it is better to leverage complementary wireless technologies to carry resource-intensive traffic like large amounts of video data in uplink (UL). As a result, Wi-Fi is being considered as a potential solution. Wireless networks are widely utilized for their quick installation and simplicity. However, the presence of multiple unlicensed Wireless Access Networks could impact the wireless connection performance due to the possibility of channel interference. This paper studies how the utilization of a Multipath Trans-mission Control Protocol (MPTCP) wireless system can serve as an alternative to a fixed fiber cable reel. To minimize the latency, we propose the simultaneous use of two Wi-Fi 6 networks and MPTCP's redundant scheduler to send video streams from the crane to a remote control center (RCC) desk. We compare different wired and wireless topology alternatives to assess the most reliable network configuration when the AutoRTG is in operation. Thus, we evaluate each topology with dynamic quality of service (QoS) measurements. We find that duplicating packets with MPTCP over two Wi-Fi 6 networks allows for stable and reliable low-latency video streaming, even in instances where one of the networks experiences sudden high delay peaks. Finally, we discuss how the utilization of Wi-Fi and MPTCP can be a choice to support and complement 5G in situations with heavy uplink traffic.","PeriodicalId":65870,"journal":{"name":"公共管理高层论坛","volume":"33 1","pages":"591-596"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88456152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-06DOI: 10.1109/EuCNC/6GSummit58263.2023.10188254
Muris Sarajli'c, N. Tervo, A. Pärssinen, Le-Hang Nguyen, H. Halbauer, Kilian Roth, Vaidyanathan Kumar, T. Svensson, Ahmad Nimr, Stephan Zeitz, Meik Dörpinghaus, G. Fettweis
The projected sub-THz (100 - 300 GHz) part of the upcoming 6G standard will require a careful design of the waveform and choice of slot structure. Not only that the design of the physical layer for 6G will be driven by ambitious system performance requirements, but also hardware limitations, specific to sub-THz frequencies, pose a fundamental design constraint for the waveform. In this contribution, general guidelines for the waveform design are given, together with a non-exhaustive list of exemplary waveforms that can be used to meet the design requirements.
{"title":"Waveforms for sub-THz 6G: Design Guidelines","authors":"Muris Sarajli'c, N. Tervo, A. Pärssinen, Le-Hang Nguyen, H. Halbauer, Kilian Roth, Vaidyanathan Kumar, T. Svensson, Ahmad Nimr, Stephan Zeitz, Meik Dörpinghaus, G. Fettweis","doi":"10.1109/EuCNC/6GSummit58263.2023.10188254","DOIUrl":"https://doi.org/10.1109/EuCNC/6GSummit58263.2023.10188254","url":null,"abstract":"The projected sub-THz (100 - 300 GHz) part of the upcoming 6G standard will require a careful design of the waveform and choice of slot structure. Not only that the design of the physical layer for 6G will be driven by ambitious system performance requirements, but also hardware limitations, specific to sub-THz frequencies, pose a fundamental design constraint for the waveform. In this contribution, general guidelines for the waveform design are given, together with a non-exhaustive list of exemplary waveforms that can be used to meet the design requirements.","PeriodicalId":65870,"journal":{"name":"公共管理高层论坛","volume":"34 1","pages":"168-173"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83124173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-06DOI: 10.1109/EuCNC/6GSummit58263.2023.10188298
Seungchan Woo, Jaehyoung Park, Soonhong Kwon, Kyungmin Park, Jong-Hoi Kim, Jong-Hyouk Lee
The5G mobile communication technology provides a faster transmission speed, larger bandwidth, and the ability to connect a greater number of devices than 4G. However, ensuring the successful transition to 5G-Advanced requires addressing various security vulnerabilities and threats. It is imperative in 5G-Advanced and higher mobile communications to address the security risks that have arisen in current mobile communication systems. In this paper, we perform a simulation of scenario-based data hijacking attacks for a 5G-Advanced core network. The conducted simulation results demonstrate that two different data hijacking attacks are possible, with sensitive information being vulnerable to exploitation through security weaknesses such as the lack of encryption for internal communication and inadequate authentication of internal components in the 5G-Advanced core network.
{"title":"Simulation of Data Hijacking Attacks for a 5G-Advanced Core Network","authors":"Seungchan Woo, Jaehyoung Park, Soonhong Kwon, Kyungmin Park, Jong-Hoi Kim, Jong-Hyouk Lee","doi":"10.1109/EuCNC/6GSummit58263.2023.10188298","DOIUrl":"https://doi.org/10.1109/EuCNC/6GSummit58263.2023.10188298","url":null,"abstract":"The5G mobile communication technology provides a faster transmission speed, larger bandwidth, and the ability to connect a greater number of devices than 4G. However, ensuring the successful transition to 5G-Advanced requires addressing various security vulnerabilities and threats. It is imperative in 5G-Advanced and higher mobile communications to address the security risks that have arisen in current mobile communication systems. In this paper, we perform a simulation of scenario-based data hijacking attacks for a 5G-Advanced core network. The conducted simulation results demonstrate that two different data hijacking attacks are possible, with sensitive information being vulnerable to exploitation through security weaknesses such as the lack of encryption for internal communication and inadequate authentication of internal components in the 5G-Advanced core network.","PeriodicalId":65870,"journal":{"name":"公共管理高层论坛","volume":"29 1","pages":"538-542"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84332629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-06DOI: 10.1109/EuCNC/6GSummit58263.2023.10188240
A. Lamminen, M. Kaunisto, J. Säily, M. Kantanen, Mario Schober, Alberto Chico, J. Ala-Laurinaho, V. Ermolov
This paper presents the design, manufacturing and characterization of a parasitic patch microstrip D-band antenna and a 16-element segmented antenna array on a multilayer printed circuit board (PCB) targeted for 5G applications. The antennas are manufactured using printed circuit board technology with semi-additive processing (mSAP) of conductors on a multilayered substrate. The measured maximum gains for a single antenna and a 16-element array are respectively 9 dBi and 16.5 dBi at 157 GHz. The measured antenna array input matching bandwidth is 20 GHz.
{"title":"D-Band Antenna and Array Designs for 5G Applications","authors":"A. Lamminen, M. Kaunisto, J. Säily, M. Kantanen, Mario Schober, Alberto Chico, J. Ala-Laurinaho, V. Ermolov","doi":"10.1109/EuCNC/6GSummit58263.2023.10188240","DOIUrl":"https://doi.org/10.1109/EuCNC/6GSummit58263.2023.10188240","url":null,"abstract":"This paper presents the design, manufacturing and characterization of a parasitic patch microstrip D-band antenna and a 16-element segmented antenna array on a multilayer printed circuit board (PCB) targeted for 5G applications. The antennas are manufactured using printed circuit board technology with semi-additive processing (mSAP) of conductors on a multilayered substrate. The measured maximum gains for a single antenna and a 16-element array are respectively 9 dBi and 16.5 dBi at 157 GHz. The measured antenna array input matching bandwidth is 20 GHz.","PeriodicalId":65870,"journal":{"name":"公共管理高层论坛","volume":"51 1","pages":"597-601"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84634918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-06DOI: 10.1109/EuCNC/6GSummit58263.2023.10188250
Babak Mafakheri, Chao Yan, Kiran Narayanaswamy, Isabelle Trang, Tobias Betz, Konrad Pientka, L. Goratti
The vision of ubiquitous network connectivity to fuel uninterrupted services to any user has materialized with the Fifth-Generation (5G) of mobile technology and will probably find maturity on the way to developing 6G. To reach this goal, 5G technology and its evolution (B5G), as well as Multi-access Edge Computing (MEC), alongside Machine Learning (ML) will play pivotal roles. This work sheds light onto a test bed development and initial experimentation results obtained to enable airlines' passengers on-board an aircraft with broadband connectivity as an advancement toward ubiquitous access. We detail our research and experimentation activity as part of the H2020 AI@EDGE research project around a 5G network and an edge-cloud built on top of aviation-certified hardware and off-the-shelf servers. The edge-cloud is used to develop and test MEC applications that can be seen as the next generation of services offered to airlines and to airlines' passengers and that rely on machine learning. The 5G network is integrated into a larger test-bed and connected to a 5G core on the ground by means of a Low Earth Orbit (LEO) satellite backhaul such as Starlink.
{"title":"Edge Intelligence in 5G and Beyond Aeronautical Network with LEO Satellite Backhaul","authors":"Babak Mafakheri, Chao Yan, Kiran Narayanaswamy, Isabelle Trang, Tobias Betz, Konrad Pientka, L. Goratti","doi":"10.1109/EuCNC/6GSummit58263.2023.10188250","DOIUrl":"https://doi.org/10.1109/EuCNC/6GSummit58263.2023.10188250","url":null,"abstract":"The vision of ubiquitous network connectivity to fuel uninterrupted services to any user has materialized with the Fifth-Generation (5G) of mobile technology and will probably find maturity on the way to developing 6G. To reach this goal, 5G technology and its evolution (B5G), as well as Multi-access Edge Computing (MEC), alongside Machine Learning (ML) will play pivotal roles. This work sheds light onto a test bed development and initial experimentation results obtained to enable airlines' passengers on-board an aircraft with broadband connectivity as an advancement toward ubiquitous access. We detail our research and experimentation activity as part of the H2020 AI@EDGE research project around a 5G network and an edge-cloud built on top of aviation-certified hardware and off-the-shelf servers. The edge-cloud is used to develop and test MEC applications that can be seen as the next generation of services offered to airlines and to airlines' passengers and that rely on machine learning. The 5G network is integrated into a larger test-bed and connected to a 5G core on the ground by means of a Low Earth Orbit (LEO) satellite backhaul such as Starlink.","PeriodicalId":65870,"journal":{"name":"公共管理高层论坛","volume":"37 1","pages":"579-584"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83995062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-06DOI: 10.1109/EuCNC/6GSummit58263.2023.10188347
Vincent Charpentier, Nina Slamnik-Kriještorac, J. Brenes, A. Gavrielides, Marius Iordache, Georgios Tsiouris, Xiangyu Lian, J. Márquez-Barja
The proliferation of 5G technology is enabling vertical industries to improve their day-to-day operations by leveraging enhanced Quality of Service (QoS). One of the key enablers for such 5G performance is network slicing, which allows telco operators to logically split the network into various virtualized networks, whose configuration and thus performance can be tailored to verticals and their low-latency and high throughput requirements. However, given the end-to-end perspective of 5G ecosystems where slicing needs to be applied on all network segments, including radio, edge, transport, and core, managing the deployment of slices is becoming excessively demanding. There are also various verticals with strict requirements that need to be fulfilled. Thus, in this paper, we focus on the solution for dynamic and quality-aware network slice management and orchestration, which is simultaneously orchestrating network slices that are deployed on top of the three 5G testbeds built for transport and logistics use cases. The slice orchestration system is dynamically interacting with the testbeds, while at the same time monitoring the real-time performance of allocated slices, which is triggering decisions to either allocate new slices or reconfigure the existing ones. In this paper, we illustrate the scenarios where dynamic provisioning of slices is required in one of the testbeds while taking into account specific latency/throughput/location requirements coming from the verticals and their end users.
{"title":"Dynamic and Quality-aware Network Slice Management in 5G Testbeds","authors":"Vincent Charpentier, Nina Slamnik-Kriještorac, J. Brenes, A. Gavrielides, Marius Iordache, Georgios Tsiouris, Xiangyu Lian, J. Márquez-Barja","doi":"10.1109/EuCNC/6GSummit58263.2023.10188347","DOIUrl":"https://doi.org/10.1109/EuCNC/6GSummit58263.2023.10188347","url":null,"abstract":"The proliferation of 5G technology is enabling vertical industries to improve their day-to-day operations by leveraging enhanced Quality of Service (QoS). One of the key enablers for such 5G performance is network slicing, which allows telco operators to logically split the network into various virtualized networks, whose configuration and thus performance can be tailored to verticals and their low-latency and high throughput requirements. However, given the end-to-end perspective of 5G ecosystems where slicing needs to be applied on all network segments, including radio, edge, transport, and core, managing the deployment of slices is becoming excessively demanding. There are also various verticals with strict requirements that need to be fulfilled. Thus, in this paper, we focus on the solution for dynamic and quality-aware network slice management and orchestration, which is simultaneously orchestrating network slices that are deployed on top of the three 5G testbeds built for transport and logistics use cases. The slice orchestration system is dynamically interacting with the testbeds, while at the same time monitoring the real-time performance of allocated slices, which is triggering decisions to either allocate new slices or reconfigure the existing ones. In this paper, we illustrate the scenarios where dynamic provisioning of slices is required in one of the testbeds while taking into account specific latency/throughput/location requirements coming from the verticals and their end users.","PeriodicalId":65870,"journal":{"name":"公共管理高层论坛","volume":"82 1","pages":"611-616"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83525861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-06DOI: 10.1109/EuCNC/6GSummit58263.2023.10188303
A. Weinand, C. Lipps, Michael Karrenbauer, H. Schotten
Physical Layer Authentication (PLA) can be a lightweight alternative to conventional security schemes such as certificates or Message Authentication Codes (MACs) for secure message transmission within Ultra Reliable Low Latency Communication (URLLC) scenarios. Single features such as Received Signal Strength Indicator (RSSI) are however not providing sufficient authentication accuracy. Therefore, multi-feature techniques for PLA are introduced within this work and evaluated using a Universal Software Radio Peripheral (USRP) based testbed in a mobile URLLC campus network scenario. Linear supervised classification is proposed for PLA and evaluated under different attacker scenarios. The results show promising authentication performances in most of the evaluated senarions and can be increased by the application of multi-feature authentication.
{"title":"Multi-Feature Physical Layer Authentication for URLLC based on Linear Supervised Learning","authors":"A. Weinand, C. Lipps, Michael Karrenbauer, H. Schotten","doi":"10.1109/EuCNC/6GSummit58263.2023.10188303","DOIUrl":"https://doi.org/10.1109/EuCNC/6GSummit58263.2023.10188303","url":null,"abstract":"Physical Layer Authentication (PLA) can be a lightweight alternative to conventional security schemes such as certificates or Message Authentication Codes (MACs) for secure message transmission within Ultra Reliable Low Latency Communication (URLLC) scenarios. Single features such as Received Signal Strength Indicator (RSSI) are however not providing sufficient authentication accuracy. Therefore, multi-feature techniques for PLA are introduced within this work and evaluated using a Universal Software Radio Peripheral (USRP) based testbed in a mobile URLLC campus network scenario. Linear supervised classification is proposed for PLA and evaluated under different attacker scenarios. The results show promising authentication performances in most of the evaluated senarions and can be increased by the application of multi-feature authentication.","PeriodicalId":65870,"journal":{"name":"公共管理高层论坛","volume":"306 1","pages":"30-35"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76498457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}