813 research outputs found
Multi-tenant slicing for spectrum management on the road to 5G
©2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.The explosive data traffic demand in the context of the 5G revolution has stressed the need for network capacity increase. As the network densification has almost reached its limits, mobile network operators are motivated to share their network infrastructure and the available resources through dynamic spectrum management. Although some initial efforts have been made in this direction by concluding sharing agreements at a coarse granularity (i.e., months or years), the 5G developments require fine timescale agreements, mainly enabled by network slicing. In this article, taking into account the radical changes foreseen for next generation networks, we provide a thorough discussion of the challenges that network slicing brings in the different network parts, while introducing a new entity capable of managing the end-to-end slicing in a coherent manner. In addition, according to the paradigm shift of operators sharing their resources in a common centralized pool, we design a cooperative game to study the potential cooperation aspects among the participants. The experimental results highlight the performance and financial gains achievable by operators through multi-tenant slicing, providing them with the necessary incentives for network upgrade toward 5G.Peer ReviewedPostprint (author's final draft
Mecanismos dinâmicos de segurança para redes softwarizadas e virtualizadas
The relationship between attackers and defenders has traditionally been
asymmetric, with attackers having time as an upper hand to devise an exploit
that compromises the defender. The push towards the Cloudification of
the world makes matters more challenging, as it lowers the cost of an attack,
with a de facto standardization on a set of protocols. The discovery of a vulnerability
now has a broader impact on various verticals (business use cases),
while previously, some were in a segregated protocol stack requiring independent
vulnerability research. Furthermore, defining a perimeter within a cloudified
system is non-trivial, whereas before, the dedicated equipment already
created a perimeter. This proposal takes the newer technologies of network
softwarization and virtualization, both Cloud-enablers, to create new dynamic
security mechanisms that address this asymmetric relationship using novel
Moving Target Defense (MTD) approaches. The effective use of the exploration
space, combined with the reconfiguration capabilities of frameworks like
Network Function Virtualization (NFV) and Management and Orchestration
(MANO), should allow for adjusting defense levels dynamically to achieve the
required security as defined by the currently acceptable risk. The optimization
tasks and integration tasks of this thesis explore these concepts. Furthermore,
the proposed novel mechanisms were evaluated in real-world use cases, such
as 5G networks or other Network Slicing enabled infrastructures.A relação entre atacantes e defensores tem sido tradicionalmente assimétrica,
com os atacantes a terem o tempo como vantagem para conceberem
uma exploração que comprometa o defensor. O impulso para a Cloudificação
do mundo torna a situação mais desafiante, pois reduz o custo de um
ataque, com uma padronização de facto sobre um conjunto de protocolos.
A descoberta de uma vulnerabilidade tem agora um impacto mais amplo em
várias verticais (casos de uso empresarial), enquanto anteriormente, alguns
estavam numa pilha de protocolos segregados que exigiam uma investigação
independente das suas vulnerabilidades. Além disso, a definição de um
perímetro dentro de um sistema Cloud não é trivial, enquanto antes, o equipamento
dedicado já criava um perímetro. Esta proposta toma as mais recentes
tecnologias de softwarização e virtualização da rede, ambas facilitadoras da
Cloud, para criar novos mecanismos dinâmicos de segurança que incidem sobre
esta relação assimétrica utilizando novas abordagens de Moving Target
Defense (MTD). A utilização eficaz do espaço de exploração, combinada com
as capacidades de reconfiguração de frameworks como Network Function
Virtualization (NFV) e Management and Orchestration (MANO), deverá permitir
ajustar dinamicamente os níveis de defesa para alcançar a segurança
necessária, tal como definida pelo risco actualmente aceitável. As tarefas de
optimização e de integração desta tese exploram estes conceitos. Além disso,
os novos mecanismos propostos foram avaliados em casos de utilização no
mundo real, tais como redes 5G ou outras infraestruturas de Network Slicing.Programa Doutoral em Engenharia Informátic
Design, implementation and experimental evaluation of a network-slicing aware mobile protocol stack
Mención Internacional en el título de doctorWith the arrival of new generation mobile networks, we currently observe a paradigm
shift, where monolithic network functions running on dedicated hardware are now
implemented as software pieces that can be virtualized on general purpose hardware
platforms. This paradigm shift stands on the softwarization of network functions and
the adoption of virtualization techniques. Network Function Virtualization (NFV)
comprises softwarization of network elements and virtualization of these components.
It brings multiple advantages: (i) Flexibility, allowing an easy management of the virtual
network functions (VNFs) (deploy, start, stop or update); (ii) efficiency, resources can be
adequately consumed due to the increased flexibility of the network infrastructure; and
(iii) reduced costs, due to the ability of sharing hardware resources. To this end, multiple
challenges must be addressed to effectively leverage of all these benefits.
Network Function Virtualization envisioned the concept of virtual network, resulting in
a key enabler of 5G networks flexibility, Network Slicing. This new paradigm represents
a new way to operate mobile networks where the underlying infrastructure is "sliced"
into logically separated networks that can be customized to the specific needs of the
tenant. This approach also enables the ability of instantiate VNFs at different locations
of the infrastructure, choosing their optimal placement based on parameters such as the
requirements of the service traversing the slice or the available resources. This decision
process is called orchestration and involves all the VNFs withing the same network slice.
The orchestrator is the entity in charge of managing network slices. Hands-on experiments
on network slicing are essential to understand its benefits and limits, and to validate the
design and deployment choices. While some network slicing prototypes have been built
for Radio Access Networks (RANs), leveraging on the wide availability of radio hardware
and open-source software, there is no currently open-source suite for end-to-end network
slicing available to the research community. Similarly, orchestration mechanisms must
be evaluated as well to properly validate theoretical solutions addressing diverse aspects
such as resource assignment or service composition.
This thesis contributes on the study of the mobile networks evolution regarding its
softwarization and cloudification. We identify software patterns for network function
virtualization, including the definition of a novel mobile architecture that squeezes the virtualization architecture by splitting functionality in atomic functions.
Then, we effectively design, implement and evaluate of an open-source network
slicing implementation. Our results show a per-slice customization without paying the
price in terms of performance, also providing a slicing implementation to the research
community. Moreover, we propose a framework to flexibly re-orchestrate a virtualized
network, allowing on-the-fly re-orchestration without disrupting ongoing services. This
framework can greatly improve performance under changing conditions. We evaluate
the resulting performance in a realistic network slicing setup, showing the feasibility and
advantages of flexible re-orchestration.
Lastly and following the required re-design of network functions envisioned during
the study of the evolution of mobile networks, we present a novel pipeline architecture
specifically engineered for 4G/5G Physical Layers virtualized over clouds. The proposed
design follows two objectives, resiliency upon unpredictable computing and parallelization
to increase efficiency in multi-core clouds. To this end, we employ techniques such as tight
deadline control, jitter-absorbing buffers, predictive Hybrid Automatic Repeat Request,
and congestion control. Our experimental results show that our cloud-native approach
attains > 95% of the theoretical spectrum efficiency in hostile environments where stateof-
the-art architectures collapse.This work has been supported by IMDEA Networks InstitutePrograma de Doctorado en Ingeniería Telemática por la Universidad Carlos III de MadridPresidente: Francisco Valera Pintor.- Secretario: Vincenzo Sciancalepore.- Vocal: Xenofon Fouka
Context-Aware Security for 6G Wireless The Role of Physical Layer Security
Sixth generation systems are expected to face new security challenges, while
opening up new frontiers towards context awareness in the wireless edge. The
workhorse behind this projected technological leap will be a whole new set of
sensing capabilities predicted for 6G devices, in addition to the ability to
achieve high precision localization. The combination of these enhanced traits
can give rise to a new breed of context-aware security protocols, following the
quality of security (QoSec) paradigm. In this framework, physical layer
security solutions emerge as competitive candidates for low complexity,
low-delay and low-footprint, adaptive, flexible and context aware security
schemes, leveraging the physical layer of the communications in genuinely
cross-layer protocols, for the first time.Comment: arXiv admin note: text overlap with arXiv:2011.0732
Developments of 5G Technology
This technology is the future of current LTE technology which would be a boost to the future of wireless and computer networks, as the speeds would be way higher than the current LTE networks, which will push the technology to a new level. This technology will make the radio channels to support data access speeds up to 10 Gb/s which will turn the bandwidth radio channels as WiFi. Comparing it with other LTE technology\u27s it has high speed and capacity, support interactive multimedia, voice, internet and its data rate is 1 Gbps which makes it faster than other LTE’s . This is much more effective than other technology’s due to its advanced billing interfaces. This paper provides detail explanation of 5G technology, its architecture, challenges, advantages and disadvantages, issues and ends with future of 5G technology
Five Facets of 6G: Research Challenges and Opportunities
Whilst the fifth-generation (5G) systems are being rolled out across the
globe, researchers have turned their attention to the exploration of radical
next-generation solutions. At this early evolutionary stage we survey five main
research facets of this field, namely {\em Facet~1: next-generation
architectures, spectrum and services, Facet~2: next-generation networking,
Facet~3: Internet of Things (IoT), Facet~4: wireless positioning and sensing,
as well as Facet~5: applications of deep learning in 6G networks.} In this
paper, we have provided a critical appraisal of the literature of promising
techniques ranging from the associated architectures, networking, applications
as well as designs. We have portrayed a plethora of heterogeneous architectures
relying on cooperative hybrid networks supported by diverse access and
transmission mechanisms. The vulnerabilities of these techniques are also
addressed and carefully considered for highlighting the most of promising
future research directions. Additionally, we have listed a rich suite of
learning-driven optimization techniques. We conclude by observing the
evolutionary paradigm-shift that has taken place from pure single-component
bandwidth-efficiency, power-efficiency or delay-optimization towards
multi-component designs, as exemplified by the twin-component ultra-reliable
low-latency mode of the 5G system. We advocate a further evolutionary step
towards multi-component Pareto optimization, which requires the exploration of
the entire Pareto front of all optiomal solutions, where none of the components
of the objective function may be improved without degrading at least one of the
other components
Cooperative Traffic Control Solution for Vehicle Transition from Autonomous to Manual Mode exploiting Cellular Vehicle-to-Everything (C-V2X) Technology
Nowadays, automated vehicles represent a promising technology to face the stringent requirements for safety and traffic efficiency in the automotive environment. Driving responsibilities will be gradually addressed to the machine, and the role of human pilots will be progressively reduced to passengers. The interaction between passengers and the automated system will create different risks that have not been considered in the past. In particular, the transition between autonomous and manual mode is understood as a risky situation. During the transition, the driver manifests driving irregularities and loss of situation awareness that may endanger himself and other participants on the road. Hence, the vehicle transitioning needs a higher quantity of space around it to be considered safe. However, no effective solution has been developed yet. This thesis aims to design a cooperative traffic control solution that will manage the movements of the group of vehicles to increase the free space around the one transitioning. It will exploit another tool that will play a fundamental role in the future of the automotive industry: connected vehicles technology. C-V2X technology will create a medium for vehicles to exchange information and cooperate. A controller managing the cooperation between vehicles has been developed to help a smooth and safe vehicle repositioning. The controller will be positioned in a centralized computing facility and it will communicate with all the vehicles. The controller defines rules to move vehicles together and enlarge the free space around the vehicle transitioning without collisions. The rules are modeled by a spring-mass-damper system, that can be exploited to control the longitudinal behavior of automated vehicles. In particular, the spring-mass-damper system can manage smooth migration between vehicle dispositions without oscillations. A computer simulation is used to test the performance of the proposed traffic control system. The simulation environment is constituted by three main components: traffic flow, controller and communication network. It has been tested with the software VEINS, which provides interaction between a network simulator (OMNeT++) and a traffic simulator (SUMO). The traffic flow represents the interactions between vehicles. The controller analyzes the data and sends control messages to all vehicles. The communication network will share the data concerning vehicles’ position and speed and control messages. The proposed cooperative vehicle control system demonstrated to reduce the risks of the transition with the smooth motion of vehicles. The controller is able to achieve the safety requirements without reducing the level of comfortability of vehicles’ passengers
- …