6 research outputs found

    A Comprehensive Survey of the Tactile Internet: State of the art and Research Directions

    Get PDF
    The Internet has made several giant leaps over the years, from a fixed to a mobile Internet, then to the Internet of Things, and now to a Tactile Internet. The Tactile Internet goes far beyond data, audio and video delivery over fixed and mobile networks, and even beyond allowing communication and collaboration among things. It is expected to enable haptic communication and allow skill set delivery over networks. Some examples of potential applications are tele-surgery, vehicle fleets, augmented reality and industrial process automation. Several papers already cover many of the Tactile Internet-related concepts and technologies, such as haptic codecs, applications, and supporting technologies. However, none of them offers a comprehensive survey of the Tactile Internet, including its architectures and algorithms. Furthermore, none of them provides a systematic and critical review of the existing solutions. To address these lacunae, we provide a comprehensive survey of the architectures and algorithms proposed to date for the Tactile Internet. In addition, we critically review them using a well-defined set of requirements and discuss some of the lessons learned as well as the most promising research directions

    6G wireless communications networks: a comprehensive survey

    Get PDF
    The commercial fifth-generation (5G) wireless communications networks have already been deployed with the aim of providing high data rates. However, the rapid growth in the number of smart devices and the emergence of the Internet of Everything (IoE) applications, which require an ultra-reliable and low-latency communication, will result in a substantial burden on the 5G wireless networks. As such, the data rate that could be supplied by 5G networks will unlikely sustain the enormous ongoing data traffic explosion. This has motivated research into continuing to advance the existing wireless networks toward the future generation of cellular systems, known as sixth generation (6G). Therefore, it is essential to provide a prospective vision of the 6G and the key enabling technologies for realizing future networks. To this end, this paper presents a comprehensive review/survey of the future evolution of 6G networks. Specifically, the objective of the paper is to provide a comprehensive review/survey about the key enabling technologies for 6G networks, which include a discussion about the main operation principles of each technology, envisioned potential applications, current state-of-the-art research, and the related technical challenges. Overall, this paper provides useful information for industries and academic researchers and discusses the potentials for opening up new research directions

    Provisioning Ultra-Low Latency Services in Softwarized Network for the Tactile Internet

    Get PDF
    The Internet has made several giant leaps over the years, from a fixed to a mobile Internet, then to the Internet of Things, and now to a Tactile Internet. The Tactile Internet is envisioned to deliver real-time control and physical tactile experiences remotely in addition to conventional audiovisual data to enable immersive human-to-machine interaction and allow skill-set delivery over networks. To realize the Tactile Internet, two key performance requirements, namely ultra-low latency and ultra-high reliability need to be achieved. However, currently deployed networks are far from meeting these stringent requirements and cannot efficiently cope with dynamic service arrivals/departures and the significant growth of traffic demands. To fulfill these requirements, a softwarized network enabled by network function virtualization (NFV) and software-defined network (SDN) technologies is introduced as a new promising concept of a future network due to its flexibility, agility, scalability and cost efficiency. Despite these benefits, provisioning Tactile Internet network services (NSs) in an NFV-based infrastructure remains a challenge, as network resources must be allocated for virtual network function (VNF) deployment and traffic routing in such a way that the stringent requirements are met, and network operator’s objectives are optimized. This problem is also well-known, as NFV resource allocation (NFV-RA) and can be further divided into three stages: (i) VNF composition, (ii) VNF embedding/placement and (iii) VNF scheduling. This thesis addresses challenges on NFV-RA for Tactile Internet NSs, especially ultra-low latency NSs. We first conduct a survey on architectural and algorithmic solutions proposed so far for the Tactile Internet. Second, we propose a joint VNF composition and embedding algorithm to efficiently determine the number of VNF instances to form a VNF forward graph (VNF-FG) and their embedding locations to serve ultra-low latency NSs, as in some cases, multiple instances of each VNF type with proper embedding may be needed to guarantee the stringent latency requirements. The proposed algorithm relies on a Tabu search method to solve the problem with a reasonable time. Third, we introduce real-time VNF embedding algorithms to efficiently support ultra-low latency NSs that require fast service provisioning. By assuming that a VNF-FG is given, our proposed algorithms aim to minimize the cost while meeting the stringent latency requirement. Finally, we focus on a joint VNF embedding and scheduling problem, assuming that ultra-low latency NSs can arrive in the network any time and have specific service deadlines. Moreover, VNF instances once deployed can be shared by multiple NSs. With these assumptions, we aim to optimally determine whether to schedule NSs on already deployed VNFs or to deploy new VNFs and schedule them on newly deployed VNFs to maximize profits while guaranteeing the stringent service deadlines. Two efficient heuristics are introduced to solve this problem with a feasible time

    Cyber-Physical Threat Intelligence for Critical Infrastructures Security

    Get PDF
    Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies
    corecore