17 research outputs found

    Characteristics for verifying 5G applications in production

    Get PDF
    5G offers the manufacturing industry a wireless, fast and secure transmission technology with high range, low latency and the ability to connect a large number of devices. Existing transmission technologies are reaching their limits due to the increasing number of networked devices and high demands on reliability, data volume, security and latency. 5G fulfills these requirements and also combines the potential and use cases of previous transmission technologies so that unwanted isolated solutions can be merged. Use cases of transmission technologies that previously required a multitude of solutions can now be realized with a single technology. However, the general literature often refers to 5G use cases that can also be realized over cables in particular. In this paper, a literature review presents the current state of research on the various 5G application scenarios in production . Furthermore, concrete characteristics of 5G use cases are identified and assigned to the identified application scenarios. The goal is to verify the identified 5G use cases and to work out their 5G relevance in order to be able to concretely differentiate them from already existing Industrie 4.0 applications

    Modular architecture providing convergent and ubiquitous intelligent connectivity for networks beyond 2030

    Get PDF
    The transition of the networks to support forthcoming beyond 5G (B5G) and 6G services introduces a number of important architectural challenges that force an evolution of existing operational frameworks. Current networks have introduced technical paradigms such as network virtualization, programmability and slicing, being a trend known as network softwarization. Forthcoming B5G and 6G services imposing stringent requirements will motivate a new radical change, augmenting those paradigms with the idea of smartness, pursuing an overall optimization on the usage of network and compute resources in a zero-trust environment. This paper presents a modular architecture under the concept of Convergent and UBiquitous Intelligent Connectivity (CUBIC), conceived to facilitate the aforementioned transition. CUBIC intends to investigate and innovate on the usage, combination and development of novel technologies to accompany the migration of existing networks towards Convergent and Ubiquitous Intelligent Connectivity (CUBIC) solutions, leveraging Artificial Intelligence (AI) mechanisms and Machine Learning (ML) tools in a totally secure environment

    Privacy-Aware Access Protocols for MEC Applications in 5G

    Get PDF
    Multi-access edge computing (MEC) is one of the emerging key technologies in fifth generation (5G) mobile networks, providing reduced end-to-end latency for applications and reduced load in the transport network. This paper proposes mechanisms to enhance user privacy in MEC within 5G. We consider a basic MEC usage scenario, where the user accesses an application hosted in the MEC platform via the radio access network of the mobile network operator (MNO). First, we create a system model based on this scenario. Second, we define the adversary model and give the list of privacy requirements for this system model. We also analyze the impact on user privacy when some of the parties in our model share information that is not strictly needed for providing the service. Third, we introduce a privacy-aware access protocol for the system model and analyze this protocol against the privacy requirements

    On the Rollout of Network Slicing in Carrier Networks: A Technology Radar

    Get PDF
    Network slicing is a powerful paradigm for network operators to support use cases with widely diverse requirements atop a common infrastructure. As 5G standards are completed, and commercial solutions mature, operators need to start thinking about how to integrate network slicing capabilities in their assets, so that customer-facing solutions can be made available in their portfolio. This integration is, however, not an easy task, due to the heterogeneity of assets that typically exist in carrier networks. In this regard, 5G commercial networks may consist of a number of domains, each with a different technological pace, and built out of products from multiple vendors, including legacy network devices and functions. These multi-technology, multi-vendor and brownfield features constitute a challenge for the operator, which is required to deploy and operate slices across all these domains in order to satisfy the end-to-end nature of the services hosted by these slices. In this context, the only realistic option for operators is to introduce slicing capabilities progressively, following a phased approach in their roll-out. The purpose of this paper is to precisely help designing this kind of plan, by means of a technology radar. The radar identifies a set of solutions enabling network slicing on the individual domains, and classifies these solutions into four rings, each corresponding to a different timeline: (i) as-is ring, covering today’s slicing solutions; (ii) deploy ring, corresponding to solutions available in the short term; (iii) test ring, considering medium-term solutions; and (iv) explore ring, with solutions expected in the long run. This classification is done based on the technical availability of the solutions, together with the foreseen market demands. The value of this radar lies in its ability to provide a complete view of the slicing landscape with one single snapshot, by linking solutions to information that operators may use for decision making in their individual go-to-market strategies.H2020 European Projects 5G-VINNI (grant agreement No. 815279) and 5G-CLARITY (grant agreement No. 871428)Spanish national project TRUE-5G (PID2019-108713RB-C53

    Hardening the Security of Multi-Access Edge Computing through Bio-Inspired VM Introspection

    Get PDF
    The extreme bandwidth and performance of 5G mobile networks changes the way we develop and utilize digital services. Within a few years, 5G will not only touch technology and applications, but dramatically change the economy, our society and individual life. One of the emerging technologies that enables the evolution to 5G by bringing cloud capabilities near to the end users is Edge Computing or also known as Multi-Access Edge Computing (MEC) that will become pertinent towards the evolution of 5G. This evolution also entails growth in the threat landscape and increase privacy in concerns at different application areas, hence security and privacy plays a central role in the evolution towards 5G. Since MEC application instantiated in the virtualized infrastructure, in this paper we present a distributed application that aims to constantly introspect multiple virtual machines (VMs) in order to detect malicious activities based on their anomalous behavior. Once suspicious processes detected, our IDS in real-time notifies system administrator about the potential threat. Developed software is able to detect keyloggers, rootkits, trojans, process hiding and other intrusion artifacts via agent-less operation, by operating remotely or directly from the host machine. Remote memory introspection means no software to install, no notice to malware to evacuate or destroy data. Experimental results of remote VMI on more than 50 different malicious code demonstrate average anomaly detection rate close to 97%. We have established wide testbed environment connecting networks of two universities Kyushu Institute of Technology and The City College of New York through secure GRE tunnel. Conducted experiments on this testbed deliver high response time of the proposed system

    5G-CLARITY: 5G-Advanced Private Networks Integrating 5GNR, WiFi, and LiFi

    Get PDF
    The future of the manufacturing industry highly depends on digital systems that transform existing production and monitoring systems into autonomous systems fulfilling stringent requirements in terms of availability, reliability, security, low latency, and positioning with high accuracy. In order to meet such requirements, private 5G networks are considered as a key enabling technology. In this article, we introduce the 5G-CLARITY system that integrates 5GNR, WiFi, and LiFi access networks, and develops novel management enablers to operate 5G-Advanced private networks. We describe three core features of 5G-CLARITY, including a multi-connectivity framework, a high-precision positioning server, and a management system to orchestrate private network slices. These features are evaluated by means of packet-level simulations and an experimental testbed demonstrating the ability of 5G-CLARITY to police access network traffic, to achieve centimeter-level positioning accuracy, and to provision private network slices in less than one minuteThis work is supported by the European Commission’s Horizon 2020 research and innovation program under grant agreement No 871428, 5G-CLARITY project

    Performance and efficiency optimization of multi-layer IoT edge architecture

    Get PDF
    Abstract. Internet of Things (IoT) has become a backbone technology that connects together various devices with diverse capabilities. It is a technology, which enables ubiquitously available digital services for end-users. IoT applications for mission-critical scenarios need strict performance indicators such as of latency, scalability, security and privacy. To fulfil these requirements, IoT also requires support from relevant enabling technologies, such as cloud, edge, virtualization and fifth generation mobile communication (5G) technologies. For Latency-critical applications and services, long routes between the traditional cloud server and end-devices (sensors /actuators) is not a feasible approach for computing at these data centres, although these traditional clouds provide very high computational and storage for current IoT system. MEC model can be used to overcome this challenge, which brings the CC computational capacity within or next on the access network base stations. However, the capacity to perform the most critical processes at the local network layer is often necessary to cope with the access network issues. Therefore, this thesis compares the two existing IoT models such as traditional cloud-IoT model, a MEC-based edge-cloud-IoT model, with proposed local edge-cloud-IoT model with respect to their performance and efficiency, using iFogSim simulator. The results consolidate our research team’s previous findings that utilizing the three-tier edge-IoT architecture, capable of optimally utilizing the computational capacity of each of the three tiers, is an effective measure to reduce energy consumption, improve end-to-end latency and minimize operational costs in latency-critical It applications

    Progressive introduction of network softwarization in operational telecom networks: advances at architectural, service and transport levels

    Get PDF
    Technological paradigms such as Software Defined Networking, Network Function Virtualization and Network Slicing are altogether offering new ways of providing services. This process is widely known as Network Softwarization, where traditional operational networks adopt capabilities and mechanisms inherit form the computing world, such as programmability, virtualization and multi-tenancy. This adoption brings a number of challenges, both from the technological and operational perspectives. On the other hand, they provide an unprecedented flexibility opening opportunities to developing new services and new ways of exploiting and consuming telecom networks. This Thesis first overviews the implications of the progressive introduction of network softwarization in operational networks for later on detail some advances at different levels, namely architectural, service and transport levels. It is done through specific exemplary use cases and evolution scenarios, with the goal of illustrating both new possibilities and existing gaps for the ongoing transition towards an advanced future mode of operation. This is performed from the perspective of a telecom operator, paying special attention on how to integrate all these paradigms into operational networks for assisting on their evolution targeting new, more sophisticated service demands.Programa de Doctorado en Ingeniería Telemática por la Universidad Carlos III de MadridPresidente: Eduardo Juan Jacob Taquet.- Secretario: Francisco Valera Pintor.- Vocal: Jorge López Vizcaín

    5G-CLARITY : 5G-advanced private networks integrating 5GNR, WiFi, and LiFi

    Get PDF
    The future of the manufacturing industry highly depends on digital systems that transform existing production and monitoring systems into autonomous systems fulfilling stringent requirements in terms of availability, reliability, security, low latency, and positioning with high accuracy. In order to meet such requirements, private 5G networks are considered as a key enabling technology. In this article, we introduce the 5G-CLARITY system that integrates 5GNR, WiFi, and LiFi access networks, and develops novel management enablers to operate 5G-Advanced private networks. We describe three core features of 5G-CLARITY, including a multi-connectivity framework, a high-precision positioning server, and a management system to orchestrate private network slices. These features are evaluated by means of packet-level simulations and an experimental testbed demonstrating the ability of 5G-CLARITY to police access network traffic, to achieve centimeter-level positioning accuracy, and to provision private network slices in less than one minute

    Challenges and Limitation Analysis of an IoT-Dependent System for Deployment in Smart Healthcare Using Communication Standards Features

    Get PDF
    The use of IoT technology is rapidly increasing in healthcare development and smart healthcare system for fitness programs, monitoring, data analysis, etc. To improve the efficiency of monitoring, various studies have been conducted in this field to achieve improved precision. The architecture proposed herein is based on IoT integrated with a cloud system in which power absorption and accuracy are major concerns. We discuss and analyze development in this domain to improve the performance of IoT systems related to health care. Standards of communication for IoT data transmission and reception can help to understand the exact power absorption in different devices to achieve improved performance for healthcare development. We also systematically analyze the use of IoT in healthcare systems using cloud features, as well as the performance and limitations of IoT in this field. Furthermore, we discuss the design of an IoT system for efficient monitoring of various healthcare issues in elderly people and limitations of an existing system in terms of resources, power absorption and security when implemented in different devices as per requirements. Blood pressure and heartbeat monitoring in pregnant women are examples of high-intensity applications of NB-IoT (narrowband IoT), technology that supports widespread communication with a very low data cost and minimum processing complexity and battery lifespan. This article also focuses on analysis of the performance of narrowband IoT in terms of delay and throughput using singleand multinode approaches. We performed analysis using the message queuing telemetry transport protocol (MQTTP), which was found to be efficient compared to the limited application protocol (LAP) in sending information from sensors.Ministerio Español de Ciencia e Innovación under project number PID2020-115570GB-C22 (DemocratAI::UGR)Cátedra de Empresa Tecnología para las Personas (UGR-Fujitsu
    corecore