385 research outputs found
5G-SRNG: 5G Spectrogram-based Random Number Generation for Devices with Low Entropy Sources
Random number generation (RNG) is a crucial element in security protocols,
and its performance and reliability are critical for the safety and integrity
of digital systems. This is especially true in 5G networks with many devices
with low entropy sources. This paper proposes 5G-SRNG, an end-to-end random
number generation solution for devices with low entropy sources in 5G networks.
Compared to traditional RNG methods, the 5G-SRNG relies on hardware or software
random number generators, using 5G spectral information, such as from
spectrum-sensing or a spectrum-aware feedback mechanism, as a source of
entropy. The proposed algorithm is experimentally verified, and its performance
is analysed by simulating a realistic 5G network environment. Results show that
5G-SRNG outperforms existing RNG in all aspects, including randomness, partial
correlation and power, making it suitable for 5G network deployments.Comment: 6 Page
A Nonlinear Directional Derivative Scheme for Edge Detection
In this paper, a new one-stage nonlinear directional derivative scheme has been proposed for edge detection. The directional edge detection method was applied to gray and color images. The results were compared to three well-known conventional edge detectors namely Canny, Prewitt, and Sobel. The directional derivative method is an efficient edge detection tool especially in capturing details.DOI:http://dx.doi.org/10.11591/ijece.v2i4.75
Hydrate dissociation during drilling through in-situ hydrate formations
Natural gas hydrates are thought to be the future hydrocarbon source of the energy hungry world. Tremendous amount of research has been done to investigate the feasibility of gas production from the hydrate formations. In this direction, three basic production methods, thermal stimulation, depressurization and thermodynamic inhibitor injection have been proposed to produce hydrocarbons off the hydrates. On the other hand, they present high potential risk of drilling hazards, such as severe gasification of drilling fluid, casing collapse due to increase in pressure after dissociation of hydrate zone, and instability of ocean floor, which may cause a platform failure. Scientists and engineers have done very valuable research to understand the phase behavior of hydrates and to prevent hydrate formation throughout the well system during drilling. Reliable hydrate inhibitors have been developed for drilling and production activities. Common practice for the drilling industry has been avoidance of hydrate formations by either abandoning the project or drilling expensive directional wells to reach the target zones for many years. The goal of this project was to quantify the significance of potential problems to allow operational methods and well design to be adopted to minimize the impact of hydrate zone on drilling operations for Eastern Black Sea Offshore Exploration Project. Investigating the existing hydrate dissociation models and adopting a model to predict the amount of dissociated gas was the first step. Further steps were investigation of temperature distribution throughout the well using a thermal simulator and prediction of heat influx from the drilling fluid into the hydrate zone. In this study, hydrate dissociation mechanisms are described. Drilling and production hazards associated with dissociation are stated. For the investigation of hydrate stability/instability, well bore temperature distribution in the near well bore is determined. Hydrate dissociation rate is calculated, and results are evaluated for further changes in drilling program and well design parameters. Results obtained from the dissociation calculations were applied to a set of data from two wells drilled by ARCO/Turkish Petroleum Corporation Joint Venture in Western Black Sea, and were used to design the prospective Eastern Black Sea Offshore Exploration wells
A remark on the q-hypergeometric integral Bailey pair and the solution to the star-triangle equation
We rewrite the recently constructed q-hypergeometric integral Bailey pair in
a general form. Then with the help of the Bailey pair and -beta
hypergeometric sum-integral, we construct the star-triangle relation.Comment: 6 page
Defensive Distillation-Based Adversarial Attack Mitigation Method for Channel Estimation Using Deep Learning Models in Next-Generation Wireless Networks
Future wireless networks (5G and beyond), also known as Next Generation or NextG, are the vision of forthcoming cellular systems, connecting billions of devices and people together. In the last decades, cellular networks have dramatically grown with advanced telecommunication technologies for high-speed data transmission, high cell capacity, and low latency. The main goal of those technologies is to support a wide range of new applications, such as virtual reality, metaverse, telehealth, online education, autonomous and flying vehicles, smart cities, smart grids, advanced manufacturing, and many more. The key motivation of NextG networks is to meet the high demand for those applications by improving and optimizing network functions. Artificial Intelligence (AI) has a high potential to achieve these requirements by being integrated into applications throughout all network layers. However, the security concerns on network functions of NextG using AI-based models, i.e., model poisoning, have not been investigated deeply. It is crucial to protect the next-generation cellular networks against cybersecurity threats, especially adversarial attacks. Therefore, it needs to design efficient mitigation techniques and secure solutions for NextG networks using AI-based methods. This paper proposes a comprehensive vulnerability analysis of deep learning (DL)-based channel estimation models trained with the dataset obtained from MATLAB\u27s 5G toolbox for adversarial attacks and defensive distillation-based mitigation methods. The adversarial attacks produce faulty results by manipulating trained DL-based models for channel estimation in NextG networks while mitigation methods can make models more robust against adversarial attacks. This paper also presents the performance of the proposed defensive distillation mitigation method for each adversarial attack. The results indicate that the proposed mitigation method can defend the DL-based channel estimation models against adversarial attacks in NextG networks
Security Hardening of Intelligent Reflecting Surfaces Against Adversarial Machine Learning Attacks
Next-generation communication networks, also known as NextG or 5G and beyond, are the future data transmission systems that aim to connect a large amount of Internet of Things (IoT) devices, systems, applications, and consumers at high-speed data transmission and low latency. Fortunately, NextG networks can achieve these goals with advanced telecommunication, computing, and Artificial Intelligence (AI) technologies in the last decades and support a wide range of new applications. Among advanced technologies, AI has a significant and unique contribution to achieving these goals for beamforming, channel estimation, and Intelligent Reflecting Surfaces (IRS) applications of 5G and beyond networks. However, the security threats and mitigation for AI-powered applications in NextG networks have not been investigated deeply in academia and industry due to being new and more complicated. This paper focuses on an AI-powered IRS implementation in NextG networks along with its vulnerability against adversarial machine learning attacks. This paper also proposes the defensive distillation mitigation method to defend and improve the robustness of the AI-powered IRS model, i.e., reduce the vulnerability. The results indicate that the defensive distillation mitigation method can significantly improve the robustness of AI-powered models and their performance under an adversarial attack
Security Hardening of Intelligent Reflecting Surfaces Against Adversarial Machine Learning Attacks
Next-generation communication networks, also known as NextG or 5G and beyond, are the future data transmission systems that aim to connect a large amount of Internet of Things (IoT) devices, systems, applications, and consumers at high-speed data transmission and low latency. Fortunately, NextG networks can achieve these goals with advanced telecommunication, computing, and Artificial Intelligence (AI) technologies in the last decades and support a wide range of new applications. Among advanced technologies, AI has a significant and unique contribution to achieving these goals for beamforming, channel estimation, and Intelligent Reflecting Surfaces (IRS) applications of 5G and beyond networks. However, the security threats and mitigation for AI-powered applications in NextG networks have not been investigated deeply in academia and industry due to being new and more complicated. This paper focuses on an AI-powered IRS implementation in NextG networks along with its vulnerability against adversarial machine learning attacks. This paper also proposes the defensive distillation mitigation method to defend and improve the robustness of the AI-powered IRS model, i.e., reduce the vulnerability. The results indicate that the defensive distillation mitigation method can significantly improve the robustness of AI-powered models and their performance under an adversarial attack.publishedVersio
Defensive Distillation-based Adversarial Attack Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks
Future wireless networks (5G and beyond), also known as Next Generation or NextG, are the vision of forthcoming cellular systems, connecting billions of devices and people together. In the last decades, cellular networks have dramatically grown with advanced telecommunication technologies for high-speed data transmission, high cell capacity, and low latency. The main goal of those technologies is to support a wide range of new applications, such as virtual reality, metaverse, telehealth, online education, autonomous and flying vehicles, smart cities, smart grids, advanced manufacturing, and many more. The key motivation of NextG networks is to meet the high demand for those applications by improving and optimizing network functions. Artificial Intelligence (AI) has a high potential to achieve these requirements by being integrated into applications throughout all network layers. However, the security concerns on network functions of NextG using AI-based models, i.e., model poisoning, have not been investigated deeply. It is crucial to protect the next-generation cellular networks against cybersecurity threats, especially adversarial attacks. Therefore, it needs to design efficient mitigation techniques and secure solutions for NextG networks using AI-based methods. This paper proposes a comprehensive vulnerability analysis of deep learning (DL)-based channel estimation models trained with the dataset obtained from MATLAB’s 5G toolbox for adversarial attacks and defensive distillation-based mitigation methods. The adversarial attacks produce faulty results by manipulating trained DL-based models for channel estimation in NextG networks while mitigation methods can make models more robust against adversarial attacks. This paper also presents the performance of the proposed defensive distillation mitigation method for each adversarial attack. The results indicate that the proposed mitigation method can defend the DL-based channel estimation models against adversarial attacks in NextG networks.publishedVersio
- …