13 research outputs found
Security for network services delivery of 5G enabled device-to-device communications mobile network
The increase in mobile traffic led to the development of Fifth Generation (5G) mobile network. 5G will provide Ultra Reliable Low Latency Communication (URLLC), Massive Machine Type Communication (mMTC), enhanced Mobile Broadband (eMBB). Device-to-Device (D2D) communications will be used as the underlaying technology to offload traffic from 5G Core Network (5GC) and push content closer to User Equipment (UE). It will be supported by a variety of Network Service (NS) such as Content-Centric Networking (CCN) that will provide access to other services and deliver content-based services. However, this raises new security and delivery challenges. Therefore, research was conducted to address the security issues in delivering NS in 5G enabled D2D communications network.
To support D2D communications in 5G, this thesis introduces a Network Services Delivery (NSD) framework defining an integrated system model. It incorporates Cloud Radio Access Network (C-RAN) architecture, D2D communications, and CCN to support 5Gâs objectives in Home Network (HN), roaming, and proximity scenarios. The research explores the security of 5G enabled D2D communications by conducting a comprehensive investigation on security threats. It analyses threats using Dolev Yao (DY) threat model and evaluates security requirements using a systematic approach based on X.805 security framework. Which aligns security requirements with network connectivity, service delivery, and sharing between entities.
This analysis highlights the need for security mechanisms to provide security to NSD in an integrated system, to specify these security mechanisms, a security framework to address the security challenges at different levels of the system model is introduced. To align suitable security mechanisms, the research defines underlying security protocols to provide security at the network, service, and D2D levels. This research also explores 5G authentication protocols specified by the Third Generation Partnership Project (3GPP) for securing communication between UE and HN, checks the security guarantees of two 3GPP specified protocols, 5G-Authentication and Key Agreement (AKA) and 5G Extensive Authentication Protocol (EAP)-AKAâ that provide primary authentication at Network Access Security (NAC).
The research addresses Service Level Security (SLS) by proposing Federated Identity Management (FIdM) model to integrate federated security in 5G, it also proposes three security protocols to provide secondary authentication and authorization of UE to Service Provider (SP). It also addresses D2D Service Security (DDS) by proposing two security protocols that secure the caching and sharing of services between two UEs in different D2D communications scenarios. All protocols in this research are verified for functional correctness and security guarantees using a formal method approach and semi-automated protocol verifier.
The research conducts security properties and performance evaluation of the protocols for their effectiveness. It also presents how each proposed protocol provides an interface for an integrated, comprehensive security solution to secure communications for NSD in a 5G enabled D2D communications network. The main contributions of this research are the design and formal verification of security protocols. Performance evaluation is supplementary
A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions
Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A
Integration of an IEEE802.15.4g compliant transceiver into the Linux-based AMBER platform
Nowadays the world is continuously discovering new strategies and methods to effectively organize the enormous quantity of information that has become accessible to us. Internet of Things is considered to be the next important breakthrough technology. In this work we illustrate a whole stack of protocols and software architecture tipically involved in modern IoT systems and report the experience of integrating a transceiver from Texas Instruments into the Amber embedded platform running Linu
View on 5G Architecture: Version 2.0
The 5G Architecture Working Group as part of the 5GPPP Initiative is looking at capturing novel trends and key technological enablers for the realization of the 5G architecture. It also targets at presenting in a harmonized way the architectural concepts developed in various projects and initiatives (not limited to 5GPPP projects only) so as to provide a consolidated view on the technical directions for the architecture design in the 5G era. The first version of the white paper was released in July 2016, which captured novel trends and key technological enablers for the realization of the 5G architecture vision along with harmonized architectural concepts from 5GPPP Phase 1 projects and initiatives. Capitalizing on the architectural vision and framework set by the first version of the white paper, this Version 2.0 of the white paper presents the latest findings and analyses with a particular focus on the concept evaluations, and accordingly it presents the consolidated overall architecture design
Building upon NB-IoT networks : a roadmap towards 5G new radio networks
Narrowband Internet of Things (NB-IoT) is a type of low-power wide-area (LPWA) technology
standardized by the 3rd-Generation Partnership Project (3GPP) and based on long-term evolution (LTE)
functionalities. NB-IoT has attracted significant interest from the research community due to its support for
massive machine-type communication (mMTC) and various IoT use cases that have stringent specifications
in terms of connectivity, energy efficiency, reachability, reliability, and latency. However, as the capacity
requirements for different IoT use cases continue to grow, the various functionalities of the LTE evolved
packet core (EPC) system may become overladen and inevitably suboptimal. Several research efforts are
ongoing to meet these challenges; consequently, we present an overview of these efforts, mainly focusing on
the Open System Interconnection (OSI) layer of the NB-IoT framework. We present an optimized architecture of the LTE EPC functionalities, as well as further discussion about the 3GPP NB-IoT standardization
and its releases. Furthermore, the possible 5G architectural design for NB-IoT integration, the enabling
technologies required for 5G NB-IoT, the 5G NR coexistence with NB-IoT, and the potential architectural
deployment schemes of NB-IoT with cellular networks are introduced. In this article, a description of
cloud-assisted relay with backscatter communication, a comprehensive review of the technical performance
properties and channel communication characteristics from the perspective of the physical (PHY) and
medium-access control (MAC) layer of NB-IoT, with a focus on 5G, are presented. The different limitations
associated with simulating these systems are also discussed. The enabling market for NB-IoT, the benefits
for a few use cases, and possible critical challenges related to their deployment are also included. Finally,
present challenges and open research directions on the PHY and MAC properties, as well as the strengths,
weaknesses, opportunities, and threats (SWOT) analysis of NB-IoT, are presented to foster the prospective
research activities.http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639pm2021Electrical, Electronic and Computer Engineerin
Kommunikation und Bildverarbeitung in der Automation
In diesem Open-Access-Tagungsband sind die besten BeitrÀge des 9. Jahreskolloquiums "Kommunikation in der Automation" (KommA 2018) und des 6. Jahreskolloquiums "Bildverarbeitung in der Automation" (BVAu 2018) enthalten. Die Kolloquien fanden am 20. und 21. November 2018 in der SmartFactoryOWL, einer gemeinsamen Einrichtung des Fraunhofer IOSB-INA und der Technischen Hochschule Ostwestfalen-Lippe statt. Die vorgestellten neuesten Forschungsergebnisse auf den Gebieten der industriellen Kommunikationstechnik und Bildverarbeitung erweitern den aktuellen Stand der Forschung und Technik. Die in den BeitrÀgen enthaltenen anschaulichen Beispiele aus dem Bereich der Automation setzen die Ergebnisse in den direkten Anwendungsbezug
Privacidade em redes de próxima geração
Doutoramento em Engenharia InformĂĄticaIn the modern society, communications and digital transactions are becoming
the norm rather than the exception. As we allow networked computing devices
into our every-day actions, we build a digital lifestyle where networks and
devices enrich our interactions. However, as we move our information towards
a connected digital environment, privacy becomes extremely important as most
of our personal information can be found in the network. This is especially
relevant as we design and adopt next generation networks that provide
ubiquitous access to services and content, increasing the impact and pervasiveness
of existing networks.
The environments that provide widespread connectivity and services usually
rely on network protocols that have few privacy considerations, compromising
user privacy. The presented work focuses on the network aspects of privacy,
considering how network protocols threaten user privacy, especially on next
generation networks scenarios. We target the identifiers that are present in
each network protocol and support its designed function. By studying how the
network identifiers can compromise user privacy, we explore how these threats
can stem from the identifier itself and from relationships established between
several protocol identifiers.
Following the study focused on identifiers, we show that privacy in the network
can be explored along two dimensions: a vertical dimension that establishes
privacy relationships across several layers and protocols, reaching the user,
and a horizontal dimension that highlights the threats exposed by individual
protocols, usually confined to a single layer. With these concepts, we outline an
integrated perspective on privacy in the network, embracing both vertical and
horizontal interactions of privacy. This approach enables the discussion of several
mechanisms to address privacy threats on individual layers, leading to
architectural instantiations focused on user privacy. We also show how the
different dimensions of privacy can provide insight into the relationships that
exist in a layered network stack, providing a potential path towards designing
and implementing future privacy-aware network architectures.Na sociedade moderna, as comunicaçÔes e transacçÔes digitais estão a
tornar-se a regra e não a excepção. à medida que permitimos a intromissão de
dispositivos electrĂłnicos de rede no nosso quotidiano, vamos construĂndo um
estilo de vida digital onde redes e dispositivos enrirquecem as nossas interacçÔes.
Contudo, ao caminharmos para um ambiente digital em rede, a nossa
privacidade vai-se revestindo de maior importãncia, pois a nossa informação
pessoal passa a encontrar-se cada vez mais na rede. Isto torna-se particularmente
relevante ao adoptarmos redes de próxima geração, que permitem
acesso ubĂquo a redes, serviços e conteĂșdos, aumentando o impacte e
pervasividade das redes actuais.
Os ambientes onde a conectividade e os serviços se tornam uma constante,
assentam em protocolos de rede que normalmente contemplam poucas
consideraçÔes sobre privacidade, comprometendo desta forma o utlizador. O
presente trabalho centra-se nos aspectos de privacidade que dizem respeito Ă
rede devido Ă forma como os protocolos sĂŁo utilizados nas diferentes camadas,
e que resultando em ameaças à privacidade do utilizador. Abordamos especificamente
os identificadores presentes nos protocolos de rede, e que sĂŁo
essenciais à sua função. Neste contexto exploramos a possibilidade destes
identificadores comprometerem a privacidade do utilizador através da
informação neles contida, bem como das relaçÔes que podem ser estabelecidas
entre identificadores de diferentes protocolos.
ApĂłs este estudo centrado nos identificadores, mostramos como a privacidade
em redes pode ser explorada ao longo de duas dimensÔes: uma dimensão que
acentua as relaçÔes verticais de privacidade, cruzando vårios protocolos até
chegar ao utilizador, e uma dimensão horizontal que destaca as ameaças
causadas por cada protocolo, de forma individual, normalmente limitadas a
uma Ășnica camada. AtravĂ©s destes conceitos, mostramos uma visĂŁo integrada
de privacidade em redes, abrangendo tanto as interacçoes de privacidade
verticais como as horizontais. Esta visĂŁo permite discutir vĂĄrios mecanismos
para mitigar ameaças especĂficas a cada camada de rede, resultando em
instùnciaçÔes arquitecturais orientadas à privacidade do utilizador. Finalmente,
mostramos como as diferentes dimensÔes de privacidade podem fornecer uma
visão diferente sobre as relaçÔes estabelecidas na pilha protocolar que
assenta em camadas, mostrando um caminho possĂvel para o desenvolvimento
de futuras arquitecturas de rede com suporte para privacidade
AN EFFICIENT INTERFERENCE AVOIDANCE SCHEME FOR DEVICE-TODEVICE ENABLED FIFTH GENERATION NARROWBAND INTERNET OF THINGS NETWOKSâ
Narrowband Internet of Things (NB-IoT) is a low-power wide-area (LPWA) technology built on long-term evolution (LTE) functionalities and standardized by the 3rd-Generation Partnership Project (3GPP). Due to its support for massive machine-type communication (mMTC) and different IoT use cases with rigorous standards in terms of connection, energy efficiency, reachability, reliability, and latency, NB-IoT has attracted the research community. However, as the capacity needs for various IoT use cases expand, the LTE evolved packet core (EPC) system's numerous functionalities may become overburdened and suboptimal. Several research efforts are currently in progress to address these
challenges. As a result, an overview of these efforts with a specific focus on the optimized architecture of the LTE EPC functionalities, the 5G architectural design for NB-IoT integration, the enabling technologies necessary for 5G NB-IoT, 5G new radio (NR) coexistence with NB-IoT, and feasible architectural deployment schemes of NB-IoT with cellular networks is discussed. This thesis also presents cloud-assisted relay with backscatter communication as part of a detailed study of the technical performance attributes and channel communication characteristics from the physical (PHY) and medium access control
(MAC) layers of the NB-IoT, with a focus on 5G. The numerous drawbacks that come with simulating these systems are explored. The enabling market for NB-IoT, the benefits for a few use cases, and the potential critical challenges associated with their deployment are all highlighted. Fortunately, the cyclic prefix orthogonal frequency division multiplexing (CPOFDM) based waveform by 3GPP NR for improved mobile broadband (eMBB) services does not prohibit the use of other waveforms in other services, such as the NB-IoT service for mMTC. As a result, the coexistence of 5G NR and NB-IoT must be manageably orthogonal (or quasi-orthogonal) to minimize mutual interference that limits the form of
freedom in the waveform's overall design. As a result, 5G coexistence with NB-IoT will introduce a new interference challenge, distinct from that of the legacy network, even though the NR's coexistence with NB-IoT is believed to improve network capacity and expand the coverage of the user data rate, as well as improves robust communication through frequency reuse. Interference challenges may make channel estimation difficult for NB-IoT devices,
limiting the user performance and spectral efficiency. Various existing interference mitigation solutions either add to the network's overhead, computational complexity and delay or are hampered by low data rate and coverage. These algorithms are unsuitable for an NB-IoT network owing to the low-complexity nature. As a result, a D2D communication based interference-control technique becomes an effective strategy for addressing this problem.
This thesis used D2D communication to decrease the network bottleneck in dense 5G NBIoT networks prone to interference. For D2D-enabled 5G NB-IoT systems, the thesis presents an interference-avoidance resource allocation that considers the less favourable cell edge NUEs. To simplify the algorithm's computing complexity and reduce interference power, the system divides the optimization problem into three sub-problems. First, in an orthogonal deployment technique using channel state information (CSI), the channel gain
factor is leveraged by selecting a probable reuse channel with higher QoS control. Second, a bisection search approach is used to find the best power control that maximizes the network sum rate, and third, the Hungarian algorithm is used to build a maximum bipartite matching strategy to choose the optimal pairing pattern between the sets of NUEs and the D2D pairs. The proposed approach improves the D2D sum rate and overall network SINR of the 5G NB-IoT system, according to the numerical data. The maximum power constraint of the D2D
pair, D2D's location, Pico-base station (PBS) cell radius, number of potential reuse channels, and cluster distance impact the D2D pair's performance. The simulation results achieve 28.35%, 31.33%, and 39% SINR performance higher than the ARSAD, DCORA, and RRA algorithms when the number of NUEs is twice the number of D2D pairs, and 2.52%, 14.80%, and 39.89% SINR performance higher than the ARSAD, RRA, and DCORA when the number of NUEs and D2D pairs are equal. As a result, a D2D sum rate increase of 9.23%, 11.26%, and 13.92% higher than the ARSAD, DCORA, and RRA when the NUEâs number is twice the number of D2D pairs, and a D2Dâs sum rate increase of 1.18%, 4.64% and
15.93% higher than the ARSAD, RRA and DCORA respectively, with an equal number of NUEs and D2D pairs is achieved. The results demonstrate the efficacy of the proposed scheme. The thesis also addressed the problem where the cell-edge NUE's QoS is critical to challenges such as long-distance transmission, delays, low bandwidth utilization, and high system overhead that affect 5G NB-IoT network performance. In this case, most cell-edge NUEs boost their transmit power to maximize network throughput. Integrating cooperating D2D relaying technique into 5G NB-IoT heterogeneous network (HetNet) uplink spectrum sharing increases the system's spectral efficiency and interference power, further degrading the network. Using a max-max SINR (Max-SINR) approach, this thesis proposed an interference-aware D2D relaying strategy for 5G NB-IoT QoS improvement for a cell-edge NUE to achieve optimum system performance. The Lagrangian-dual technique is used to optimize the transmit power of the cell-edge NUE to the relay based on the average interference power constraint, while the relay to the NB-IoT base station (NBS) employs a fixed transmit power. To choose an optimal D2D relay node, the channel-to-interference plus noise ratio (CINR) of all available D2D relays is used to maximize the minimum cell-edge NUE's data rate while ensuring the cellular NUEs' QoS requirements are satisfied. Best harmonic mean, best-worst, half-duplex relay selection, and a D2D communication scheme were among the other relaying selection strategies studied. The simulation results reveal that the Max-SINR selection scheme outperforms all other selection schemes due to the high channel gain between the two communication devices except for the D2D communication scheme. The proposed algorithm achieves 21.27% SINR performance, which is nearly identical to the half-duplex scheme, but outperforms the best-worst and harmonic selection techniques by 81.27% and 40.29%, respectively. As a result, as the number of D2D relays increases, the capacity increases by 14.10% and 47.19%, respectively, over harmonic and half-duplex techniques. Finally, the thesis presents future research works on interference control in addition with the open research directions on PHY and MAC properties and a SWOT (Strengths, Weaknesses, Opportunities, and Threats) analysis presented in Chapter 2 to encourage further study on 5G NB-IoT