152 research outputs found

    Building blocks for the internet of things

    Get PDF

    Radio Communications

    Get PDF
    In the last decades the restless evolution of information and communication technologies (ICT) brought to a deep transformation of our habits. The growth of the Internet and the advances in hardware and software implementations modified our way to communicate and to share information. In this book, an overview of the major issues faced today by researchers in the field of radio communications is given through 35 high quality chapters written by specialists working in universities and research centers all over the world. Various aspects will be deeply discussed: channel modeling, beamforming, multiple antennas, cooperative networks, opportunistic scheduling, advanced admission control, handover management, systems performance assessment, routing issues in mobility conditions, localization, web security. Advanced techniques for the radio resource management will be discussed both in single and multiple radio technologies; either in infrastructure, mesh or ad hoc networks

    Accurate and Resource-Efficient Monitoring for Future Networks

    Get PDF
    Monitoring functionality is a key component of any network management system. It is essential for profiling network resource usage, detecting attacks, and capturing the performance of a multitude of services using the network. Traditional monitoring solutions operate on long timescales producing periodic reports, which are mostly used for manual and infrequent network management tasks. However, these practices have been recently questioned by the advent of Software Defined Networking (SDN). By empowering management applications with the right tools to perform automatic, frequent, and fine-grained network reconfigurations, SDN has made these applications more dependent than before on the accuracy and timeliness of monitoring reports. As a result, monitoring systems are required to collect considerable amounts of heterogeneous measurement data, process them in real-time, and expose the resulting knowledge in short timescales to network decision-making processes. Satisfying these requirements is extremely challenging given today’s larger network scales, massive and dynamic traffic volumes, and the stringent constraints on time availability and hardware resources. This PhD thesis tackles this important challenge by investigating how an accurate and resource-efficient monitoring function can be realised in the context of future, software-defined networks. Novel monitoring methodologies, designs, and frameworks are provided in this thesis, which scale with increasing network sizes and automatically adjust to changes in the operating conditions. These achieve the goal of efficient measurement collection and reporting, lightweight measurement- data processing, and timely monitoring knowledge delivery

    Achieving network resiliency using sound theoretical and practical methods

    Get PDF
    Computer networks have revolutionized the life of every citizen in our modern intercon- nected society. The impact of networked systems spans every aspect of our lives, from financial transactions to healthcare and critical services, making these systems an attractive target for malicious entities that aim to make financial or political profit. Specifically, the past decade has witnessed an astounding increase in the number and complexity of sophisti- cated and targeted attacks, known as advanced persistent threats (APT). Those attacks led to a paradigm shift in the security and reliability communities’ perspective on system design; researchers and government agencies accepted the inevitability of incidents and malicious attacks, and marshaled their efforts into the design of resilient systems. Rather than focusing solely on preventing failures and attacks, resilient systems are able to maintain an acceptable level of operation in the presence of such incidents, and then recover gracefully into normal operation. Alongside prevention, resilient system design focuses on incident detection as well as timely response. Unfortunately, the resiliency efforts of research and industry experts have been hindered by an apparent schism between theory and practice, which allows attackers to maintain the upper hand advantage. This lack of compatibility between the theory and practice of system design is attributed to the following challenges. First, theoreticians often make impractical and unjustifiable assumptions that allow for mathematical tractability while sacrificing accuracy. Second, the security and reliability communities often lack clear definitions of success criteria when comparing different system models and designs. Third, system designers often make implicit or unstated assumptions to favor practicality and ease of design. Finally, resilient systems are tested in private and isolated environments where validation and reproducibility of the results are not publicly accessible. In this thesis, we set about showing that the proper synergy between theoretical anal- ysis and practical design can enhance the resiliency of networked systems. We illustrate the benefits of this synergy by presenting resiliency approaches that target the inter- and intra-networking levels. At the inter-networking level, we present CPuzzle as a means to protect the transport control protocol (TCP) connection establishment channel from state- exhaustion distributed denial of service attacks (DDoS). CPuzzle leverages client puzzles to limit the rate at which misbehaving users can establish TCP connections. We modeled the problem of determining the puzzle difficulty as a Stackleberg game and solve for the equilibrium strategy that balances the users’ utilizes against CPuzzle’s resilience capabilities. Furthermore, to handle volumetric DDoS attacks, we extend CPuzzle and implement Midgard, a cooperative approach that involves end-users in the process of tolerating and neutralizing DDoS attacks. Midgard is a middlebox that resides at the edge of an Internet service provider’s network and uses client puzzles at the IP level to allocate bandwidth to its users. At the intra-networking level, we present sShield, a game-theoretic network response engine that manipulates a network’s connectivity in response to an attacker who is moving laterally to compromise a high-value asset. To implement such decision making algorithms, we leverage the recent advances in software-defined networking (SDN) to collect logs and security alerts about the network and implement response actions. However, the programma- bility offered by SDN comes with an increased chance for design-time bugs that can have drastic consequences on the reliability and security of a networked system. We therefore introduce BiFrost, an open-source tool that aims to verify safety and security proper- ties about data-plane programs. BiFrost translates data-plane programs into functionally equivalent sequential circuits, and then uses well-established hardware reduction, abstrac- tion, and verification techniques to establish correctness proofs about data-plane programs. By focusing on those four key efforts, CPuzzle, Midgard, sShield, and BiFrost, we believe that this work illustrates the benefits that the synergy between theory and practice can bring into the world of resilient system design. This thesis is an attempt to pave the way for further cooperation and coordination between theoreticians and practitioners, in the hope of designing resilient networked systems

    Models, Simulations, and the Reduction of Complexity

    Get PDF
    Modern science is a model-building activity. But how are models contructed? How are they related to theories and data? How do they explain complex scientific phenomena, and which role do computer simulations play? To address these questions which are highly relevant to scientists as well as to philosophers of science, 8 leading natural, engineering and social scientists reflect upon their modeling work, and 8 philosophers provide a commentary

    Models, Simulations, and the Reduction of Complexity

    Get PDF
    Modern science is a model-building activity. But how are models contructed? How are they related to theories and data? How do they explain complex scientific phenomena, and which role do computer simulations play? To address these questions which are highly relevant to scientists as well as to philosophers of science, 8 leading natural, engineering and social scientists reflect upon their modeling work, and 8 philosophers provide a commentary

    Social, Private, and Trusted Wearable Technology under Cloud-Aided Intermittent Wireless Connectivity

    Get PDF
    There has been an unprecedented increase in the use of smart devices globally, together with novel forms of communication, computing, and control technologies that have paved the way for a new category of devices, known as high-end wearables. While massive deployments of these objects may improve the lives of people, unauthorized access to the said private equipment and its connectivity is potentially dangerous. Hence, communication enablers together with highly-secure human authentication mechanisms have to be designed.In addition, it is important to understand how human beings, as the primary users, interact with wearable devices on a day-to-day basis; usage should be comfortable, seamless, user-friendly, and mindful of urban dynamics. Usually the connectivity between wearables and the cloud is executed through the user’s more power independent gateway: this will usually be a smartphone, which may have potentially unreliable infrastructure connectivity. In response to these unique challenges, this thesis advocates for the adoption of direct, secure, proximity-based communication enablers enhanced with multi-factor authentication (hereafter refereed to MFA) that can integrate/interact with wearable technology. Their intelligent combination together with the connection establishment automation relying on the device/user social relations would allow to reliably grant or deny access in cases of both stable and intermittent connectivity to the trusted authority running in the cloud.The introduction will list the main communication paradigms, applications, conventional network architectures, and any relevant wearable-specific challenges. Next, the work examines the improved architecture and security enablers for clusterization between wearable gateways with a proximity-based communication as a baseline. Relying on this architecture, the author then elaborates on the social ties potentially overlaying the direct connectivity management in cases of both reliable and unreliable connection to the trusted cloud. The author discusses that social-aware cooperation and trust relations between users and/or the devices themselves are beneficial for the architecture under proposal. Next, the author introduces a protocol suite that enables temporary delegation of personal device use dependent on different connectivity conditions to the cloud.After these discussions, the wearable technology is analyzed as a biometric and behavior data provider for enabling MFA. The conventional approaches of the authentication factor combination strategies are compared with the ‘intelligent’ method proposed further. The assessment finds significant advantages to the developed solution over existing ones.On the practical side, the performance evaluation of existing cryptographic primitives, as part of the experimental work, shows the possibility of developing the experimental methods further on modern wearable devices.In summary, the set of enablers developed here for wearable technology connectivity is aimed at enriching people’s everyday lives in a secure and usable way, in cases when communication to the cloud is not consistently available

    Enhanced mobility management mechanisms for 5G networks

    Get PDF
    Many mechanisms that served the legacy networks till now, are being identified as being grossly sub-optimal for 5G networks. The reason being, the increased complexity of the 5G networks compared previous legacy systems. One such class of mechanisms, important for any wireless standard, is the Mobility Management (MM) mechanisms. MM mechanismsensure the seamless connectivity and continuity of service for a user when it moves away from the geographic location where it initially got attached to the network. In this thesis, we firstly present a detailed state of the art on MM mechanisms. Based on the 5G requirements as well as the initial discussions on Beyond 5G networks, we provision a gap analysis for the current technologies/solutions to satisfy the presented requirements. We also define the persistent challenges that exist concerning MM mechanisms for 5G and beyond networks. Based on these challenges, we define the potential solutions and a novel framework for the 5G and beyond MM mechanisms. This framework specifies a set of MM mechanisms at the access, core and the extreme edge network (users/devices) level, that will help to satisfy the requirements for the 5G and beyond MM mechanisms. Following this, we present an on demand MM service concept. Such an on-demand feature provisions the necessary reliability, scalability and flexibility to the MM mechanisms. It's objective is to ensure that appropriate resources and mobility contexts are defined for users who will have heterogeneous mobility profiles, versatile QoS requirements in a multi-RAT network. Next, in this thesis we tackle the problem of core network signaling that occurs during MM in 5G/4G networks. A novel handover signaling mechanism has been developed, which eliminates unnecessary handshakes during the handover preparation phase, while allowing the transition to future softwarized network architectures. We also provide a handover failure aware handover preparation phase signaling process. We then utilize operator data and a realistic network deployment to perform a comparative analysis of the proposed strategy and the 3GPP handover signaling strategy on a network wide deployment scenario. We show the benefits of our strategy in terms of latency of handover process, and the transmission and processing cost incurred. Lastly, a novel user association and resource allocation methodology, namely AURA-5G, has been proposed. AURA-5G addresses scenarios wherein applications with heterogeneous requirements, i.e., enhanced Mobile Broadband (eMBB) and massive Machine Type Communications (mMTC), are present simultaneously. Consequently, a joint optimization process for performing the user association and resource allocation while being cognizant of heterogeneous application requirements, has been performed. We capture the peculiarities of this important mobility management process through the various constraints, such as backhaul requirements, dual connectivity options, available access resources, minimum rate requirements, etc., that we have imposed on a Mixed Integer Linear Program (MILP). The objective function of this established MILP problem is to maximize the total network throughput of the eMBB users, while satisfying the minimum requirements of the mMTC and eMBB users defined in a given scenario. Through numerical evaluations we show that our approach outperforms the baseline user association scenario significantly. Moreover, we have presented a system fairness analysis, as well as a novel fidelity and computational complexity analysis for the same, which express the utility of our methodology given the myriad network scenarios.Muchos mecanismos que sirvieron en las redes actuales, se están identificando como extremadamente subóptimos para las redes 5G. Esto es debido a la mayor complejidad de las redes 5G. Un tipo de mecanismo importante para cualquier estándar inalámbrico, consiste en el mecanismo de gestión de la movilidad (MM). Los mecanismos MM aseguran la conectividad sin interrupciones y la continuidad del servicio para un usuario cuando éste se aleja de la ubicación geográfica donde inicialmente se conectó a la red. En esta tesis, presentamos, en primer lugar, un estado del arte detallado de los mecanismos MM. Bas ándonos en los requisitos de 5G, así como en las discusiones iniciales sobre las redes Beyond 5G, proporcionamos un análisis de las tecnologías/soluciones actuales para satisfacer los requisitos presentados. También definimos los desafíos persistentes que existen con respecto a los mecanismos MM para redes 5G y Beyond 5G. En base a estos desafíos, definimos las posibles soluciones y un marco novedoso para los mecanismos 5G y Beyond 5G de MM. Este marco especifica un conjunto de mecanismos MM a nivel de red acceso, red del núcleo y extremo de la red (usuarios/dispositivos), que ayudarán a satisfacer los requisitos para los mecanismos MM 5G y posteriores. A continuación, presentamos el concepto de servicio bajo demanda MM. Tal característica proporciona la confiabilidad, escalabilidad y flexibilidad necesarias para los mecanismos MM. Su objetivo es garantizar que se definan los recursos y contextos de movilidad adecuados para los usuarios que tendrán perfiles de movilidad heterogéneos, y requisitos de QoS versátiles en una red multi-RAT. Más adelante, abordamos el problema de la señalización de la red troncal que ocurre durante la gestión de la movilidad en redes 5G/4G. Se ha desarrollado un nuevo mecanismo de señalización de handover, que elimina los intercambios de mensajes innecesarios durante la fase de preparación del handover, al tiempo que permite la transición a futuras arquitecturas de red softwarizada. Utilizamos los datos de operadores y consideramos un despliegue de red realista para realizar un análisis comparativo de la estrategia propuesta y la estrategia de señalización de 3GPP. Mostramos los beneficios de nuestra estrategia en términos de latencia del proceso de handover y los costes de transmisión y procesado. Por último, se ha propuesto una nueva asociación de usuarios y una metodología de asignación de recursos, i.e, AURA-5G. AURA-5G aborda escenarios en los que las aplicaciones con requisitos heterogéneos, i.e., enhanced Mobile Broadband (eMBB) y massive Machine Type Communications (mMTC), están presentes simultáneamente. En consecuencia, se ha llevado a cabo un proceso de optimización conjunta para realizar la asociación de usuarios y la asignación de recursos mientras se tienen en cuenta los requisitos de aplicaciónes heterogéneas. Capturamos las peculiaridades de este importante proceso de gestión de la movilidad a través de las diversas restricciones impuestas, como son los requisitos de backhaul, las opciones de conectividad dual, los recursos de la red de acceso disponibles, los requisitos de velocidad mínima, etc., que hemos introducido en un Mixed Integer Linear Program (MILP). La función objetivo de este problema MILP es maximizar el rendimiento total de la red de los usuarios de eMBB, y a la vez satisfacer los requisitos mínimos de los usuarios de mMTC y eMBB definidos en un escenario dado. A través de evaluaciones numéricas, mostramos que nuestro enfoque supera significativamente el escenario de asociación de usuarios de referencia. Además, hemos presentado un análisis de la justicia del sistema, así como un novedoso análisis de fidelidad y complejidad computacional para el mismo, que expresa la utilidad de nuestra metodología

    Enhanced mobility management mechanisms for 5G networks

    Get PDF
    Many mechanisms that served the legacy networks till now, are being identified as being grossly sub-optimal for 5G networks. The reason being, the increased complexity of the 5G networks compared previous legacy systems. One such class of mechanisms, important for any wireless standard, is the Mobility Management (MM) mechanisms. MM mechanismsensure the seamless connectivity and continuity of service for a user when it moves away from the geographic location where it initially got attached to the network. In this thesis, we firstly present a detailed state of the art on MM mechanisms. Based on the 5G requirements as well as the initial discussions on Beyond 5G networks, we provision a gap analysis for the current technologies/solutions to satisfy the presented requirements. We also define the persistent challenges that exist concerning MM mechanisms for 5G and beyond networks. Based on these challenges, we define the potential solutions and a novel framework for the 5G and beyond MM mechanisms. This framework specifies a set of MM mechanisms at the access, core and the extreme edge network (users/devices) level, that will help to satisfy the requirements for the 5G and beyond MM mechanisms. Following this, we present an on demand MM service concept. Such an on-demand feature provisions the necessary reliability, scalability and flexibility to the MM mechanisms. It's objective is to ensure that appropriate resources and mobility contexts are defined for users who will have heterogeneous mobility profiles, versatile QoS requirements in a multi-RAT network. Next, in this thesis we tackle the problem of core network signaling that occurs during MM in 5G/4G networks. A novel handover signaling mechanism has been developed, which eliminates unnecessary handshakes during the handover preparation phase, while allowing the transition to future softwarized network architectures. We also provide a handover failure aware handover preparation phase signaling process. We then utilize operator data and a realistic network deployment to perform a comparative analysis of the proposed strategy and the 3GPP handover signaling strategy on a network wide deployment scenario. We show the benefits of our strategy in terms of latency of handover process, and the transmission and processing cost incurred. Lastly, a novel user association and resource allocation methodology, namely AURA-5G, has been proposed. AURA-5G addresses scenarios wherein applications with heterogeneous requirements, i.e., enhanced Mobile Broadband (eMBB) and massive Machine Type Communications (mMTC), are present simultaneously. Consequently, a joint optimization process for performing the user association and resource allocation while being cognizant of heterogeneous application requirements, has been performed. We capture the peculiarities of this important mobility management process through the various constraints, such as backhaul requirements, dual connectivity options, available access resources, minimum rate requirements, etc., that we have imposed on a Mixed Integer Linear Program (MILP). The objective function of this established MILP problem is to maximize the total network throughput of the eMBB users, while satisfying the minimum requirements of the mMTC and eMBB users defined in a given scenario. Through numerical evaluations we show that our approach outperforms the baseline user association scenario significantly. Moreover, we have presented a system fairness analysis, as well as a novel fidelity and computational complexity analysis for the same, which express the utility of our methodology given the myriad network scenarios.Muchos mecanismos que sirvieron en las redes actuales, se están identificando como extremadamente subóptimos para las redes 5G. Esto es debido a la mayor complejidad de las redes 5G. Un tipo de mecanismo importante para cualquier estándar inalámbrico, consiste en el mecanismo de gestión de la movilidad (MM). Los mecanismos MM aseguran la conectividad sin interrupciones y la continuidad del servicio para un usuario cuando éste se aleja de la ubicación geográfica donde inicialmente se conectó a la red. En esta tesis, presentamos, en primer lugar, un estado del arte detallado de los mecanismos MM. Bas ándonos en los requisitos de 5G, así como en las discusiones iniciales sobre las redes Beyond 5G, proporcionamos un análisis de las tecnologías/soluciones actuales para satisfacer los requisitos presentados. También definimos los desafíos persistentes que existen con respecto a los mecanismos MM para redes 5G y Beyond 5G. En base a estos desafíos, definimos las posibles soluciones y un marco novedoso para los mecanismos 5G y Beyond 5G de MM. Este marco especifica un conjunto de mecanismos MM a nivel de red acceso, red del núcleo y extremo de la red (usuarios/dispositivos), que ayudarán a satisfacer los requisitos para los mecanismos MM 5G y posteriores. A continuación, presentamos el concepto de servicio bajo demanda MM. Tal característica proporciona la confiabilidad, escalabilidad y flexibilidad necesarias para los mecanismos MM. Su objetivo es garantizar que se definan los recursos y contextos de movilidad adecuados para los usuarios que tendrán perfiles de movilidad heterogéneos, y requisitos de QoS versátiles en una red multi-RAT. Más adelante, abordamos el problema de la señalización de la red troncal que ocurre durante la gestión de la movilidad en redes 5G/4G. Se ha desarrollado un nuevo mecanismo de señalización de handover, que elimina los intercambios de mensajes innecesarios durante la fase de preparación del handover, al tiempo que permite la transición a futuras arquitecturas de red softwarizada. Utilizamos los datos de operadores y consideramos un despliegue de red realista para realizar un análisis comparativo de la estrategia propuesta y la estrategia de señalización de 3GPP. Mostramos los beneficios de nuestra estrategia en términos de latencia del proceso de handover y los costes de transmisión y procesado. Por último, se ha propuesto una nueva asociación de usuarios y una metodología de asignación de recursos, i.e, AURA-5G. AURA-5G aborda escenarios en los que las aplicaciones con requisitos heterogéneos, i.e., enhanced Mobile Broadband (eMBB) y massive Machine Type Communications (mMTC), están presentes simultáneamente. En consecuencia, se ha llevado a cabo un proceso de optimización conjunta para realizar la asociación de usuarios y la asignación de recursos mientras se tienen en cuenta los requisitos de aplicaciónes heterogéneas. Capturamos las peculiaridades de este importante proceso de gestión de la movilidad a través de las diversas restricciones impuestas, como son los requisitos de backhaul, las opciones de conectividad dual, los recursos de la red de acceso disponibles, los requisitos de velocidad mínima, etc., que hemos introducido en un Mixed Integer Linear Program (MILP). La función objetivo de este problema MILP es maximizar el rendimiento total de la red de los usuarios de eMBB, y a la vez satisfacer los requisitos mínimos de los usuarios de mMTC y eMBB definidos en un escenario dado. A través de evaluaciones numéricas, mostramos que nuestro enfoque supera significativamente el escenario de asociación de usuarios de referencia. Además, hemos presentado un análisis de la justicia del sistema, así como un novedoso análisis de fidelidad y complejidad computacional para el mismo, que expresa la utilidad de nuestra metodología.Postprint (published version

    State of the Art and Future Perspectives in Smart and Sustainable Urban Development

    Get PDF
    This book contributes to the conceptual and practical knowledge pools in order to improve the research and practice on smart and sustainable urban development by presenting an informed understanding of the subject to scholars, policymakers, and practitioners. This book presents contributions—in the form of research articles, literature reviews, case reports, and short communications—offering insights into the smart and sustainable urban development by conducting in-depth conceptual debates, detailed case study descriptions, thorough empirical investigations, systematic literature reviews, or forecasting analyses. This way, the book forms a repository of relevant information, material, and knowledge to support research, policymaking, practice, and the transferability of experiences to address urbanization and other planetary challenges
    corecore