704 research outputs found

    Swarm of UAVs for Network Management in 6G: A Technical Review

    Full text link
    Fifth-generation (5G) cellular networks have led to the implementation of beyond 5G (B5G) networks, which are capable of incorporating autonomous services to swarm of unmanned aerial vehicles (UAVs). They provide capacity expansion strategies to address massive connectivity issues and guarantee ultra-high throughput and low latency, especially in extreme or emergency situations where network density, bandwidth, and traffic patterns fluctuate. On the one hand, 6G technology integrates AI/ML, IoT, and blockchain to establish ultra-reliable, intelligent, secure, and ubiquitous UAV networks. 6G networks, on the other hand, rely on new enabling technologies such as air interface and transmission technologies, as well as a unique network design, posing new challenges for the swarm of UAVs. Keeping these challenges in mind, this article focuses on the security and privacy, intelligence, and energy-efficiency issues faced by swarms of UAVs operating in 6G mobile networks. In this state-of-the-art review, we integrated blockchain and AI/ML with UAV networks utilizing the 6G ecosystem. The key findings are then presented, and potential research challenges are identified. We conclude the review by shedding light on future research in this emerging field of research.Comment: 19,

    The Potential Short- and Long-Term Disruptions and Transformative Impacts of 5G and Beyond Wireless Networks: Lessons Learnt from the Development of a 5G Testbed Environment

    Get PDF
    The capacity and coverage requirements for 5 th generation (5G) and beyond wireless connectivity will be significantly different from the predecessor networks. To meet these requirements, the anticipated deployment cost in the United Kingdom (UK) is predicted to be between £30bn and £50bn, whereas the current annual capital expenditure (CapEX) of the mobile network operators (MNOs) is £2.5bn. This prospect has vastly impacted and has become one of the major delaying factors for building the 5G physical infrastructure, whereas other areas of 5G are progressing at their speed. Due to the expensive and complicated nature of the network infrastructure and spectrum, the second-tier operators, widely known as mobile virtual network operators (MVNO), are entirely dependent on the MNOs. In this paper, an extensive study is conducted to explore the possibilities of reducing the 5G deployment cost and developing viable business models. In this regard, the potential of infrastructure, data, and spectrum sharing is thoroughly investigated. It is established that the use of existing public infrastructure (e.g., streetlights, telephone poles, etc.) has a potential to reduce the anticipated cost by about 40% to 60%. This paper also reviews the recent Ofcom initiatives to release location-based licenses of the 5G-compatible radio spectrum. Our study suggests that simplification of infrastructure and spectrum will encourage the exponential growth of scenario-specific cellular networks (e.g., private networks, community networks, micro-operators) and will potentially disrupt the current business models of telecommunication business stakeholders - specifically MNOs and TowerCos. Furthermore, the anticipated dense device connectivity in 5G will increase the resolution of traditional and non-traditional data availability significantly. This will encourage extensive data harvesting as a business opportunity and function within small and medium-sized enterprises (SMEs) as well as large social networks. Consequently, the rise of new infrastructures and spectrum stakeholders is anticipated. This will fuel the development of a 5G data exchange ecosystem where data transactions are deemed to be high-value business commodities. The privacy and security of such data, as well as definitions of the associated revenue models and ownership, are challenging areas - and these have yet to emerge and mature fully. In this direction, this paper proposes the development of a unified data hub with layered structured privacy and security along with blockchain and encrypted off-chain based ownership/royalty tracking. Also, a data economy-oriented business model is proposed. The study found that with the potential commodification of data and data transactions along with the low-cost physical infrastructure and spectrum, the 5G network will introduce significant disruption in the Telco business ecosystem

    Taking Computation to Data: Integrating Privacy-preserving AI techniques and Blockchain Allowing Secure Analysis of Sensitive Data on Premise

    Get PDF
    PhD thesis in Information technologyWith the advancement of artificial intelligence (AI), digital pathology has seen significant progress in recent years. However, the use of medical AI raises concerns about patient data privacy. The CLARIFY project is a research project funded under the European Union’s Marie Sklodowska-Curie Actions (MSCA) program. The primary objective of CLARIFY is to create a reliable, automated digital diagnostic platform that utilizes cloud-based data algorithms and artificial intelligence to enable interpretation and diagnosis of wholeslide-images (WSI) from any location, maximizing the advantages of AI-based digital pathology. My research as an early stage researcher for the CLARIFY project centers on securing information systems using machine learning and access control techniques. To achieve this goal, I extensively researched privacy protection technologies such as federated learning, differential privacy, dataset distillation, and blockchain. These technologies have different priorities in terms of privacy, computational efficiency, and usability. Therefore, we designed a computing system that supports different levels of privacy security, based on the concept: taking computation to data. Our approach is based on two design principles. First, when external users need to access internal data, a robust access control mechanism must be established to limit unauthorized access. Second, it implies that raw data should be processed to ensure privacy and security. Specifically, we use smart contractbased access control and decentralized identity technology at the system security boundary to ensure the flexibility and immutability of verification. If the user’s raw data still cannot be directly accessed, we propose to use dataset distillation technology to filter out privacy, or use locally trained model as data agent. Our research focuses on improving the usability of these methods, and this thesis serves as a demonstration of current privacy-preserving and secure computing technologies

    Blockchain and SDN Architecture for Spectrum Management in Cellular Networks

    Get PDF
    Whereas 4G LTE networks have brought about an increase in data rates of mobile networks, they are unable to meet the capacity demands of future networks. Specifically, the centralized nature of the evolved packet core (EPC) makes the network non-scalable to match the exponential increase in number of wireless devices in addition to the complexities of diverse service requirements. The SDN concept has recently attracted a lot of research interest as a viable proposition for bringing about programmability and ease of network management while also offering flexibility for innovative network designs. However, current SDN implementations are not adapted to support business agreements that foster interoperability among mobile network operators (MNOs). This paper is an extended version of our earlier work and we intend to present a unified SDN and blockchain architecture with enhanced spectrum management features for enabling seamless user roaming capabilities between MNOs. Our simulation results show that users can experience no disruption in service with very minimal delay as they traverse between operators

    Beyond Certificates: 6G-ready Access Control for the Service-Based Architecture with Decentralized Identifiers and Verifiable Credentials

    Full text link
    In 6G, mobile networks are poised to transition from monolithic structures owned and operated by single mobile network operators into multi-stakeholder networks where various parties contribute with infrastructure, resources, and services. This shift brings forth a critical challenge: Ensuring secure and trustful cross-domain access control. This paper introduces a novel technical concept and a prototype, outlining and implementing a 5G Service-based Architecture that utilizes Decentralized Identifiers and Verifiable Credentials to authenticate and authorize network functions among each other rather than relying on traditional X.509 certificates or OAuth2.0 access tokens. This decentralized approach to identity and permission management for network functions in 6G reduces the risk of a single point of failure associated with centralized public key infrastructures, unifies access control mechanisms, and paves the way for lesser complex and more trustful cross-domain key management for highly collaborative network functions of a future Service-based Architecture in 6G.Comment: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessibl

    An introduction of a modular framework for securing 5G networks and beyond

    Get PDF
    Fifth Generation Mobile Network (5G) is a heterogeneous network in nature, made up of multiple systems and supported by different technologies. It will be supported by network services such as device-to-device (D2D) communications. This will enable the new use cases to provide access to other services within the network and from third-party service providers (SPs). End-users with their user equipment (UE) will be able to access services ubiquitously from multiple SPs that might share infrastructure and security management, whereby implementing security from one domain to another will be a challenge. This highlights a need for a new and effective security approach to address the security of such a complex system. This article proposes a network service security (NSS) modular framework for 5G and beyond that consists of different security levels of the network. It reviews the security issues of D2D communications in 5G, and it is used to address security issues that affect the users and SPs in an integrated and heterogeneous network such as the 5G enabled D2D communications network. The conceptual framework consists of a physical layer, network access, service and D2D security levels. Finally, it recommends security mechanisms to address the security issues at each level of the 5G-enabled D2D communications network
    corecore