22 research outputs found
Teoria de jogos para utilização efetiva dos recursos em aplicações para 5G
Doutoramento em Engenharia Eletrotécnica - TelecomunicaçõesEsta tese tem como objetivo fornecer afirmações conclusivas em relação a
utilização eficiente de recursos para redes e aplicações de 5G (5a geração)
com recurso a teoria dos jogos. Neste contexto, investigamos dois cenários
principais, um relativo a comunicações móveis e um outro relativo a redes
inteligentes. Uma métrica importante para o desenho das redes móveis
emergentes é a eficiência energética, com particular ênfase no lado do dispositivo
móvel, onde as tecnologias das baterias são ainda limitadas. Alguns
trabalhos de investigação relacionados têm demonstrado que a cooperação
pode ser um paradigma útil no sentido de resolver o problema do défice
energético. Contudo, pretendemos ir mais além, ao definir a cooperação e
os utilizadores móveis como um grupo de jogadores racionais, que podem
atuar sobre estratégias e utilidades, por forma a escolher a retransmissão
mais apropriada para poupança de energia. Esta interpretação presta-se à
aplicação da teoria dos jogos, e recorremos assim aos jogos coalicionais para
solucionar conflitos de interesse entre dispositivos cooperantes, empregando
Programação Linear (LP) para resolver o problema da selecção da retransmissão e derivar a principal solução do jogo. Os resultados mostram que a escolha do jogo de retransmissão coalicional proposto pode potencialmente duplicar a duração da bateria, numa era em que a próxima geração de dispositivos móveis necessitará de cada vez mais energia para suportar serviços
e aplicações cada vez mais sofisticados. O segundo cenário investiga a resposta
da procura em aplicações smart grid, que está a ganhar interesse sob
a égide do 5G e que é considerada uma abordagem promissora, incentivando
os utilizadores a consumir electricidade de forma mais uniforme em horas de
vazio. Recorremos novamente à teoria dos jogos, imaginando as interacções
estratégicas entre a empresa fornecedora de energia eléctrica e os potenciais
utilizadores finais como um jogo de forma extensiva. São abordados
dois programas em tempo real de resposta à procura: Day-Ahead Pricing
(DAP) e Convex Pricing Tariffs. A resposta dos consumidores residenciais
conscientes dos preços destas tarifas, é formulada como um problema
de Mixed Integer Linear Programming (MILP) ou Quadratic Programming
(QP), nos quais as soluções potenciais são o agendamento dos seus electrodomésticos inteligentes de modo a minimizar os seus gastos diários de electricidade, satisfazendo as suas necessidades diárias de energia e níveis
de conforto. Os resultados demonstram que implementar o programa DAP
pode reduzir a razão Peak-to-Average (PAR) at e 71% e as faturas de consumo
das casas inteligentes at e 32%. Para além disso, a aplicação de tarifas
convexas em tempo real pode melhorar ainda mais estas métricas de desempenho,
alcançando uma redução de 80% do PAR e uma economia de
mais de 50% na faturação da energia residencial.This research thesis aims to provide conclusive statements towards effective
resource utilization for 5G (5th Generation) mobile networks and applications
using game theory. In this context, we investigate two key scenarios
pertaining to mobile communications and smart grids. A pivotal design
driver for the upcoming era of mobile communications is energy efficiency,
with particular emphasis on the mobile side where battery technology is still
limited. Related works have shown that cooperation can be a useful engineering
paradigm to take a step towards solving the energy deficit. However,
we go beyond by envisaging cooperation and mobile users as a game of rational
players, that can act on strategies and utilities in order to choose the
most appropriate relay for energy saving. This interpretation lends itself to
the application of game theory, and we look at coalitional games to settle
conflicts of interest among cooperating user equipments, and employ Linear
Programming (LP) to solve the relay selection problem and to derive the
core solution of the game. The results reveal that adopting the proposed
coalitional relaying game can potentially double battery lifetime, in an era
where the next wave of next generation handsets will be more energy demanding
supporting sophisticated services and applications. The second
scenario investigates demand response in smart grid applications, which is
also gaining momentum under the umbrella of 5G, which is a promising
approach urging end-users to consume electricity more evenly during nonpeak
hours of the day. Again, we resort to game theory and picture the
strategic interactions between the electric utility company and the potential
end-users as an extensive form game. Two real-time demand response
programmes are addressed, namely Day-Ahead Pricing (DAP) and convex
pricing tariffs. The response of price-aware residential consumers to these
programmes is formulated as Mixed Integer Linear Programming (MILP)
or Quadratic Programming (QP) problem, which optimally schedule their
smart home appliances so as to minimise their daily electricity expenses
while satisfying their daily energy needs and comfort levels. The results
demonstrate that implementing the DAP programme can reduce the Peakto-
Average Ratio (PAR) of demand by up to 71% and cut smart households
bill by 32%. Moreover, applying real-time convex pricing tariffs can push
these performance metrics even further, achieving 80% PAR reduction and
more than 50% saving on the household electricity bill
Recommended from our members
HIDROID: prototyping a behavioral host-based intrusion detection and prevention system for android
Previous research efforts on developing an Intrusion Detection and Prevention Systems (IDPS) for Android mobile devices rely mostly on centralized data collection and processing on a cloud server. However, this trend is characterized by two major limitations. First, it requires a continuous connection between monitored devices and the server, which might be infeasible, due to mobile network's outage or partial coverage. Second, it increases the risk of sensitive information leakage and the violation of user's privacy. To help alleviate these problems, in this paper, we develop a novel Host-based IDPS for Android (HIDROID), which runs completely on a mobile device, with a minimal computation burden. It collects data in run-time, by periodically sampling features reflecting the utilization of scarce resources on a mobile device (e.g. CPU, memory, battery, bandwidth, etc.). The detection engine exploits statistical and machine learning algorithms to build a data-driven model for the benign behavior. Any observation failing to match this model triggers an alert, and the preventive agent takes proper countermeasure(s) to minimize the risk. HIDROID requires no malicious data for training or tuning, which makes it handy for day-to-day usage. Experimental test results, on a real-life device, show that HIDROID is well able to learn and discriminate normal from malicious behavior, with very promising accuracy of up to 0.9, while maintaining false positive rate by 0.03
Towards a secure network architecture for smart grids in 5G era
Smart grid introduces a wealth of promising applications for upcoming fifth-generation mobile networks (5G), enabling households and utility companies to establish a two-way digital communications dialogue, which can benefit both of them. The utility can monitor real-time consumption of end users and take proper measures (e.g., real-time pricing) to shape their consumption profile or to plan enough supply to meet the foreseen demand. On the other hand, a smart home can receive real-time electricity prices and adjust its consumption to minimize its daily electricity expenditure, while meeting the energy need and the satisfaction level of the dwellers. Smart Home applications for smart phones are also a promising use case, where users can remotely control their appliances, while they are away at work or on their ways home. Although these emerging services can evidently boost the efficiency of the market and the satisfaction of the consumers, they may also introduce new attack surfaces making the grid vulnerable to financial losses or even physical damages. In this paper, we propose an architecture to secure smart grid communications incorporating an intrusion detection system, composed of distributed components collaborating with each other to detect price integrity or load alteration attacks in different segments of an advanced metering infrastructure
Towards an autonomous host-based intrusion detection system for android mobile devices
In the 5G era, mobile devices are expected to play a pivotal role in our daily life. They will provide a wide range of appealing features to enable users to access a rich set of high quality personalized services. However, at the same time, mobile devices (e.g., smartphones) will be one of the most attractive targets for future attackers in the upcoming 5G communications systems. Therefore, security mechanisms such as mobile Intrusion Detection Systems (IDSs) are essential to protect mobile devices from a plethora of known and unknown security breaches and to ensure user privacy. However, despite the fact that a lot of research effort has been placed on IDSs for mobile devices during the last decade, autonomous host-based IDS solutions for 5G mobile devices are still required to protect them in a more efficient and effective manner. Towards this direction, we propose an autonomous host-based IDS for Android mobile devices applying Machine Learning (ML) methods to inspect different features representing how the device’s resources (e.g., CPU, memory, etc.) are being used. The simulation results demonstrate a promising detection accuracy of above 85%, reaching up to 99.99%
Security framework for the semiconductor supply chain environment
This paper proposes a security framework for secure data communications across the partners in the Semiconductor Supply Chain Environment. The security mechanisms of the proposed framework will be based on the SSL/TLS and OAuth 2.0 protocols, which are two standard security protocols. However, both protocols are vulnerable to a number of attacks, and thus more sophisticated security mechanisms based on these protocols should be designed and implemented in order to address the specific security challenges of the Semiconductor Supply Chain in a more effective and efficient manner
OFDM-based Synchronous PNC Communications Using Higher Order QAM Modulations
Physical-layer Network Coding (PNC) has great potential to improve the throughput and latency in wireless networks. However, there are two main challenges in PNC systems that do not exist in the conventional Point-to-Point (P2P) communication systems: 1) time and frequency asynchrony of the paired PNC users; and 2) ambiguity of the PNC mapping at the relay node. To address these challenges, in this paper, we apply precoding for power control and phase synchronization of the paired PNC users, while we use modulo-√M addition for the PNC mapping ambiguity removal in higher-order M-ary Quadrature Amplitude Modulations (M-QAM). We evaluate the performance of the system in the framework of the Orthogonal Frequency Division Multiplexing (OFDM)-PNC systems with cyclic prefix extension under Rayleigh faded Tapped Delay Line (TDL)-C and Rician faded TDL-D channel models, proposed by the Third Generation Partnership Project (3GPP), as well as the Additive White Gaussian Noise (AWGN) channel model. The results reveal that our proposed technique can achieve a significant Signal-to-Noise Ratio (SNR) improvement of 12 dB over its asynchronous OFDM-PNC counterpart (without precoding) for Binary Phase Shift Modulation (BPSK) under a TDL-C faded channel model. Moreover, without channel coding, our proposed PNC technique requires an SNR of around 13dB to deliver a two-way 16-QAM communication at a Bit Error Rate of 10-3 under a Rayleigh faded TDL-C channel
Machine learning for DDoS attack detection in industry 4.0 CPPSs
The Fourth Industrial Revolution (Industry 4.0) has transformed factories into smart Cyber-Physical Production Systems (CPPSs), where man, product, and machine are fully interconnected across the whole supply chain. Although this digitalization brings enormous advantages through customized, transparent, and agile manufacturing, it introduces a significant number of new attack vectors—e.g., through vulnerable Internet-of-Things (IoT) nodes—that can be leveraged by attackers to launch sophisticated Distributed Denial-of-Service (DDoS) attacks threatening the availability of the production line, business services, or even the human lives. In this article, we adopt a Machine Learning (ML) approach for network anomaly detection and construct different data-driven models to detect DDoS attacks on Industry 4.0 CPPSs. Existing techniques use data either artificially synthesized or collected from Information Technology (IT) networks or small-scale lab testbeds. To address this limitation, we use network traffic data captured from a real-world semiconductor production factory. We extract 45 bidirectional network flow features and construct several labeled datasets for training and testing ML models. We investigate 11 different supervised, unsupervised, and semi-supervised algorithms and assess their performance through extensive simulations. The results show that, in terms of the detection performance, supervised algorithms outperform both unsupervised and semi-supervised ones. In particular, the Decision Tree model attains an Accuracy of 0.999 while confining the False Positive Rate to 0.001
A lightweight authentication mechanism for M2M communications in industrial IoT environment
In the emerging Industrial IoT era, Machine-to-Machine (M2M) communication technology is considered as a key underlying technology for building Industrial IoT environments where devices (e.g., sensors, actuators, gateways) are enabled to exchange information with each other in an autonomous way without human intervention. However, most of the existing M2M protocols that can be also used in the Industrial IoT domain provide security mechanisms based on asymmetric cryptography resulting in high computational cost. As a consequence, the resource-constrained IoT devices are not able to support them appropriately and thus, many security issues arise for the Industrial IoT environment. Therefore, lightweight security mechanisms are required for M2M communications in Industrial IoT in order to reach its full potential. As a step towards this direction, in this paper, we propose a lightweight authentication mechanism, based only on hash and XOR operations, for M2M communications in Industrial IoT environment. The proposed mechanism is characterized by low computational cost, communication and storage overhead, while achieving mutual authentication, session key agreement, device’s identity confidentiality, and resistance against the following attacks: replay attack, man-in-the-middle attack, impersonation attack, and modification attack
Distributed Sensing, Computing, Communication, and Control Fabric: A Unified Service-Level Architecture for 6G
With the advent of the multimodal immersive communication system, people can
interact with each other using multiple devices for sensing, communication
and/or control either onsite or remotely. As a breakthrough concept, a
distributed sensing, computing, communications, and control (DS3C) fabric is
introduced in this paper for provisioning 6G services in multi-tenant
environments in a unified manner. The DS3C fabric can be further enhanced by
natively incorporating intelligent algorithms for network automation and
managing networking, computing, and sensing resources efficiently to serve
vertical use cases with extreme and/or conflicting requirements. As such, the
paper proposes a novel end-to-end 6G system architecture with enhanced
intelligence spanning across different network, computing, and business
domains, identifies vertical use cases and presents an overview of the relevant
standardization and pre-standardization landscape