385 research outputs found

    5G-SRNG: 5G Spectrogram-based Random Number Generation for Devices with Low Entropy Sources

    Full text link
    Random number generation (RNG) is a crucial element in security protocols, and its performance and reliability are critical for the safety and integrity of digital systems. This is especially true in 5G networks with many devices with low entropy sources. This paper proposes 5G-SRNG, an end-to-end random number generation solution for devices with low entropy sources in 5G networks. Compared to traditional RNG methods, the 5G-SRNG relies on hardware or software random number generators, using 5G spectral information, such as from spectrum-sensing or a spectrum-aware feedback mechanism, as a source of entropy. The proposed algorithm is experimentally verified, and its performance is analysed by simulating a realistic 5G network environment. Results show that 5G-SRNG outperforms existing RNG in all aspects, including randomness, partial correlation and power, making it suitable for 5G network deployments.Comment: 6 Page

    A Nonlinear Directional Derivative Scheme for Edge Detection

    Get PDF
    In this paper, a new one-stage nonlinear directional derivative scheme has been proposed for edge detection. The directional edge detection method was applied to gray and color images. The results were compared to three well-known conventional edge detectors namely Canny, Prewitt, and Sobel. The directional derivative method is an efficient edge detection tool especially in capturing details.DOI:http://dx.doi.org/10.11591/ijece.v2i4.75

    Hydrate dissociation during drilling through in-situ hydrate formations

    Get PDF
    Natural gas hydrates are thought to be the future hydrocarbon source of the energy hungry world. Tremendous amount of research has been done to investigate the feasibility of gas production from the hydrate formations. In this direction, three basic production methods, thermal stimulation, depressurization and thermodynamic inhibitor injection have been proposed to produce hydrocarbons off the hydrates. On the other hand, they present high potential risk of drilling hazards, such as severe gasification of drilling fluid, casing collapse due to increase in pressure after dissociation of hydrate zone, and instability of ocean floor, which may cause a platform failure. Scientists and engineers have done very valuable research to understand the phase behavior of hydrates and to prevent hydrate formation throughout the well system during drilling. Reliable hydrate inhibitors have been developed for drilling and production activities. Common practice for the drilling industry has been avoidance of hydrate formations by either abandoning the project or drilling expensive directional wells to reach the target zones for many years. The goal of this project was to quantify the significance of potential problems to allow operational methods and well design to be adopted to minimize the impact of hydrate zone on drilling operations for Eastern Black Sea Offshore Exploration Project. Investigating the existing hydrate dissociation models and adopting a model to predict the amount of dissociated gas was the first step. Further steps were investigation of temperature distribution throughout the well using a thermal simulator and prediction of heat influx from the drilling fluid into the hydrate zone. In this study, hydrate dissociation mechanisms are described. Drilling and production hazards associated with dissociation are stated. For the investigation of hydrate stability/instability, well bore temperature distribution in the near well bore is determined. Hydrate dissociation rate is calculated, and results are evaluated for further changes in drilling program and well design parameters. Results obtained from the dissociation calculations were applied to a set of data from two wells drilled by ARCO/Turkish Petroleum Corporation Joint Venture in Western Black Sea, and were used to design the prospective Eastern Black Sea Offshore Exploration wells

    A remark on the q-hypergeometric integral Bailey pair and the solution to the star-triangle equation

    Full text link
    We rewrite the recently constructed q-hypergeometric integral Bailey pair in a general form. Then with the help of the Bailey pair and qq-beta hypergeometric sum-integral, we construct the star-triangle relation.Comment: 6 page

    Defensive Distillation-Based Adversarial Attack Mitigation Method for Channel Estimation Using Deep Learning Models in Next-Generation Wireless Networks

    Get PDF
    Future wireless networks (5G and beyond), also known as Next Generation or NextG, are the vision of forthcoming cellular systems, connecting billions of devices and people together. In the last decades, cellular networks have dramatically grown with advanced telecommunication technologies for high-speed data transmission, high cell capacity, and low latency. The main goal of those technologies is to support a wide range of new applications, such as virtual reality, metaverse, telehealth, online education, autonomous and flying vehicles, smart cities, smart grids, advanced manufacturing, and many more. The key motivation of NextG networks is to meet the high demand for those applications by improving and optimizing network functions. Artificial Intelligence (AI) has a high potential to achieve these requirements by being integrated into applications throughout all network layers. However, the security concerns on network functions of NextG using AI-based models, i.e., model poisoning, have not been investigated deeply. It is crucial to protect the next-generation cellular networks against cybersecurity threats, especially adversarial attacks. Therefore, it needs to design efficient mitigation techniques and secure solutions for NextG networks using AI-based methods. This paper proposes a comprehensive vulnerability analysis of deep learning (DL)-based channel estimation models trained with the dataset obtained from MATLAB\u27s 5G toolbox for adversarial attacks and defensive distillation-based mitigation methods. The adversarial attacks produce faulty results by manipulating trained DL-based models for channel estimation in NextG networks while mitigation methods can make models more robust against adversarial attacks. This paper also presents the performance of the proposed defensive distillation mitigation method for each adversarial attack. The results indicate that the proposed mitigation method can defend the DL-based channel estimation models against adversarial attacks in NextG networks

    Security Hardening of Intelligent Reflecting Surfaces Against Adversarial Machine Learning Attacks

    Get PDF
    Next-generation communication networks, also known as NextG or 5G and beyond, are the future data transmission systems that aim to connect a large amount of Internet of Things (IoT) devices, systems, applications, and consumers at high-speed data transmission and low latency. Fortunately, NextG networks can achieve these goals with advanced telecommunication, computing, and Artificial Intelligence (AI) technologies in the last decades and support a wide range of new applications. Among advanced technologies, AI has a significant and unique contribution to achieving these goals for beamforming, channel estimation, and Intelligent Reflecting Surfaces (IRS) applications of 5G and beyond networks. However, the security threats and mitigation for AI-powered applications in NextG networks have not been investigated deeply in academia and industry due to being new and more complicated. This paper focuses on an AI-powered IRS implementation in NextG networks along with its vulnerability against adversarial machine learning attacks. This paper also proposes the defensive distillation mitigation method to defend and improve the robustness of the AI-powered IRS model, i.e., reduce the vulnerability. The results indicate that the defensive distillation mitigation method can significantly improve the robustness of AI-powered models and their performance under an adversarial attack

    Security Hardening of Intelligent Reflecting Surfaces Against Adversarial Machine Learning Attacks

    Get PDF
    Next-generation communication networks, also known as NextG or 5G and beyond, are the future data transmission systems that aim to connect a large amount of Internet of Things (IoT) devices, systems, applications, and consumers at high-speed data transmission and low latency. Fortunately, NextG networks can achieve these goals with advanced telecommunication, computing, and Artificial Intelligence (AI) technologies in the last decades and support a wide range of new applications. Among advanced technologies, AI has a significant and unique contribution to achieving these goals for beamforming, channel estimation, and Intelligent Reflecting Surfaces (IRS) applications of 5G and beyond networks. However, the security threats and mitigation for AI-powered applications in NextG networks have not been investigated deeply in academia and industry due to being new and more complicated. This paper focuses on an AI-powered IRS implementation in NextG networks along with its vulnerability against adversarial machine learning attacks. This paper also proposes the defensive distillation mitigation method to defend and improve the robustness of the AI-powered IRS model, i.e., reduce the vulnerability. The results indicate that the defensive distillation mitigation method can significantly improve the robustness of AI-powered models and their performance under an adversarial attack.publishedVersio

    Defensive Distillation-based Adversarial Attack Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks

    Get PDF
    Future wireless networks (5G and beyond), also known as Next Generation or NextG, are the vision of forthcoming cellular systems, connecting billions of devices and people together. In the last decades, cellular networks have dramatically grown with advanced telecommunication technologies for high-speed data transmission, high cell capacity, and low latency. The main goal of those technologies is to support a wide range of new applications, such as virtual reality, metaverse, telehealth, online education, autonomous and flying vehicles, smart cities, smart grids, advanced manufacturing, and many more. The key motivation of NextG networks is to meet the high demand for those applications by improving and optimizing network functions. Artificial Intelligence (AI) has a high potential to achieve these requirements by being integrated into applications throughout all network layers. However, the security concerns on network functions of NextG using AI-based models, i.e., model poisoning, have not been investigated deeply. It is crucial to protect the next-generation cellular networks against cybersecurity threats, especially adversarial attacks. Therefore, it needs to design efficient mitigation techniques and secure solutions for NextG networks using AI-based methods. This paper proposes a comprehensive vulnerability analysis of deep learning (DL)-based channel estimation models trained with the dataset obtained from MATLAB’s 5G toolbox for adversarial attacks and defensive distillation-based mitigation methods. The adversarial attacks produce faulty results by manipulating trained DL-based models for channel estimation in NextG networks while mitigation methods can make models more robust against adversarial attacks. This paper also presents the performance of the proposed defensive distillation mitigation method for each adversarial attack. The results indicate that the proposed mitigation method can defend the DL-based channel estimation models against adversarial attacks in NextG networks.publishedVersio
    • …
    corecore