79 research outputs found

    Resource Management in Converged Optical and Millimeter Wave Radio Networks: A Review

    Get PDF
    Three convergent processes are likely to shape the future of the internet beyond-5G: The convergence of optical and millimeter wave radio networks to boost mobile internet capacity, the convergence of machine learning solutions and communication technologies, and the convergence of virtualized and programmable network management mechanisms towards fully integrated autonomic network resource management. The integration of network virtualization technologies creates the incentive to customize and dynamically manage the resources of a network, making network functions, and storage capabilities at the edge key resources similar to the available bandwidth in network communication channels. Aiming to understand the relationship between resource management, virtualization, and the dense 5G access and fronthaul with an emphasis on converged radio and optical communications, this article presents a review of how resource management solutions have dealt with optimizing millimeter wave radio and optical resources from an autonomic network management perspective. A research agenda is also proposed by identifying current state-of-the-art solutions and the need to shift all the convergent issues towards building an advanced resource management mechanism for beyond-5G

    An Implementation of 5G-AKA and a Usability Analysis of OpenLDAP Access Control Lists (ACLs)

    Get PDF
    We address two pieces of work: (i) an implementation of the Authentication and Key Agreement protocol suite from the 5th generation cellular communications standards (5G-AKA) that we intend to make available as open-source, and, (ii) a categorization using Hierarchical Task Analysis (HTA) of errors made by human participants in a study carried out on the usability of Access Control Lists (ACLs) in the OpenLDAP directory. Our work (i) on 5G-AKA is motivated by the lack of availability of such an implementation that can then be used by researchers and practitioners for further work. We discuss design choices we have made; for example, our choice of the Java programming language and cryptographic packages, and our choice to model the three entities that communicate using 5G-AKA, the User Equipment (UE), the Serving Network (SN), and the Home Network (HN) as three distinct processes that communicate over TCP sockets. We also discuss challenges we encountered in carrying out our work, and the manner in which we plan to make our work available as open-source. Our work (ii) on error-identification in the use of ACLs in OpenLDAP is part of a broader human-subject study that, in turn, is motivated by public pronouncements of their poor usability. We discuss what HTAs are, and why they are appropriate for our work. We present our design of the HTAs, the errors we identified using them, and observe that this work helps with a prospective redesign of ACLs for OpenLDAP

    A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

    Get PDF
    Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A
    corecore