22 research outputs found

    Teoria de jogos para utilização efetiva dos recursos em aplicações para 5G

    Get PDF
    Doutoramento em Engenharia Eletrotécnica - TelecomunicaçõesEsta tese tem como objetivo fornecer afirmações conclusivas em relação a utilização eficiente de recursos para redes e aplicações de 5G (5a geração) com recurso a teoria dos jogos. Neste contexto, investigamos dois cenários principais, um relativo a comunicações móveis e um outro relativo a redes inteligentes. Uma métrica importante para o desenho das redes móveis emergentes é a eficiência energética, com particular ênfase no lado do dispositivo móvel, onde as tecnologias das baterias são ainda limitadas. Alguns trabalhos de investigação relacionados têm demonstrado que a cooperação pode ser um paradigma útil no sentido de resolver o problema do défice energético. Contudo, pretendemos ir mais além, ao definir a cooperação e os utilizadores móveis como um grupo de jogadores racionais, que podem atuar sobre estratégias e utilidades, por forma a escolher a retransmissão mais apropriada para poupança de energia. Esta interpretação presta-se à aplicação da teoria dos jogos, e recorremos assim aos jogos coalicionais para solucionar conflitos de interesse entre dispositivos cooperantes, empregando Programação Linear (LP) para resolver o problema da selecção da retransmissão e derivar a principal solução do jogo. Os resultados mostram que a escolha do jogo de retransmissão coalicional proposto pode potencialmente duplicar a duração da bateria, numa era em que a próxima geração de dispositivos móveis necessitará de cada vez mais energia para suportar serviços e aplicações cada vez mais sofisticados. O segundo cenário investiga a resposta da procura em aplicações smart grid, que está a ganhar interesse sob a égide do 5G e que é considerada uma abordagem promissora, incentivando os utilizadores a consumir electricidade de forma mais uniforme em horas de vazio. Recorremos novamente à teoria dos jogos, imaginando as interacções estratégicas entre a empresa fornecedora de energia eléctrica e os potenciais utilizadores finais como um jogo de forma extensiva. São abordados dois programas em tempo real de resposta à procura: Day-Ahead Pricing (DAP) e Convex Pricing Tariffs. A resposta dos consumidores residenciais conscientes dos preços destas tarifas, é formulada como um problema de Mixed Integer Linear Programming (MILP) ou Quadratic Programming (QP), nos quais as soluções potenciais são o agendamento dos seus electrodomésticos inteligentes de modo a minimizar os seus gastos diários de electricidade, satisfazendo as suas necessidades diárias de energia e níveis de conforto. Os resultados demonstram que implementar o programa DAP pode reduzir a razão Peak-to-Average (PAR) at e 71% e as faturas de consumo das casas inteligentes at e 32%. Para além disso, a aplicação de tarifas convexas em tempo real pode melhorar ainda mais estas métricas de desempenho, alcançando uma redução de 80% do PAR e uma economia de mais de 50% na faturação da energia residencial.This research thesis aims to provide conclusive statements towards effective resource utilization for 5G (5th Generation) mobile networks and applications using game theory. In this context, we investigate two key scenarios pertaining to mobile communications and smart grids. A pivotal design driver for the upcoming era of mobile communications is energy efficiency, with particular emphasis on the mobile side where battery technology is still limited. Related works have shown that cooperation can be a useful engineering paradigm to take a step towards solving the energy deficit. However, we go beyond by envisaging cooperation and mobile users as a game of rational players, that can act on strategies and utilities in order to choose the most appropriate relay for energy saving. This interpretation lends itself to the application of game theory, and we look at coalitional games to settle conflicts of interest among cooperating user equipments, and employ Linear Programming (LP) to solve the relay selection problem and to derive the core solution of the game. The results reveal that adopting the proposed coalitional relaying game can potentially double battery lifetime, in an era where the next wave of next generation handsets will be more energy demanding supporting sophisticated services and applications. The second scenario investigates demand response in smart grid applications, which is also gaining momentum under the umbrella of 5G, which is a promising approach urging end-users to consume electricity more evenly during nonpeak hours of the day. Again, we resort to game theory and picture the strategic interactions between the electric utility company and the potential end-users as an extensive form game. Two real-time demand response programmes are addressed, namely Day-Ahead Pricing (DAP) and convex pricing tariffs. The response of price-aware residential consumers to these programmes is formulated as Mixed Integer Linear Programming (MILP) or Quadratic Programming (QP) problem, which optimally schedule their smart home appliances so as to minimise their daily electricity expenses while satisfying their daily energy needs and comfort levels. The results demonstrate that implementing the DAP programme can reduce the Peakto- Average Ratio (PAR) of demand by up to 71% and cut smart households bill by 32%. Moreover, applying real-time convex pricing tariffs can push these performance metrics even further, achieving 80% PAR reduction and more than 50% saving on the household electricity bill

    Towards a secure network architecture for smart grids in 5G era

    Get PDF
    Smart grid introduces a wealth of promising applications for upcoming fifth-generation mobile networks (5G), enabling households and utility companies to establish a two-way digital communications dialogue, which can benefit both of them. The utility can monitor real-time consumption of end users and take proper measures (e.g., real-time pricing) to shape their consumption profile or to plan enough supply to meet the foreseen demand. On the other hand, a smart home can receive real-time electricity prices and adjust its consumption to minimize its daily electricity expenditure, while meeting the energy need and the satisfaction level of the dwellers. Smart Home applications for smart phones are also a promising use case, where users can remotely control their appliances, while they are away at work or on their ways home. Although these emerging services can evidently boost the efficiency of the market and the satisfaction of the consumers, they may also introduce new attack surfaces making the grid vulnerable to financial losses or even physical damages. In this paper, we propose an architecture to secure smart grid communications incorporating an intrusion detection system, composed of distributed components collaborating with each other to detect price integrity or load alteration attacks in different segments of an advanced metering infrastructure

    Towards an autonomous host-based intrusion detection system for android mobile devices

    Get PDF
    In the 5G era, mobile devices are expected to play a pivotal role in our daily life. They will provide a wide range of appealing features to enable users to access a rich set of high quality personalized services. However, at the same time, mobile devices (e.g., smartphones) will be one of the most attractive targets for future attackers in the upcoming 5G communications systems. Therefore, security mechanisms such as mobile Intrusion Detection Systems (IDSs) are essential to protect mobile devices from a plethora of known and unknown security breaches and to ensure user privacy. However, despite the fact that a lot of research effort has been placed on IDSs for mobile devices during the last decade, autonomous host-based IDS solutions for 5G mobile devices are still required to protect them in a more efficient and effective manner. Towards this direction, we propose an autonomous host-based IDS for Android mobile devices applying Machine Learning (ML) methods to inspect different features representing how the device’s resources (e.g., CPU, memory, etc.) are being used. The simulation results demonstrate a promising detection accuracy of above 85%, reaching up to 99.99%

    Security framework for the semiconductor supply chain environment

    Get PDF
    This paper proposes a security framework for secure data communications across the partners in the Semiconductor Supply Chain Environment. The security mechanisms of the proposed framework will be based on the SSL/TLS and OAuth 2.0 protocols, which are two standard security protocols. However, both protocols are vulnerable to a number of attacks, and thus more sophisticated security mechanisms based on these protocols should be designed and implemented in order to address the specific security challenges of the Semiconductor Supply Chain in a more effective and efficient manner

    OFDM-based Synchronous PNC Communications Using Higher Order QAM Modulations

    Get PDF
    Physical-layer Network Coding (PNC) has great potential to improve the throughput and latency in wireless networks. However, there are two main challenges in PNC systems that do not exist in the conventional Point-to-Point (P2P) communication systems: 1) time and frequency asynchrony of the paired PNC users; and 2) ambiguity of the PNC mapping at the relay node. To address these challenges, in this paper, we apply precoding for power control and phase synchronization of the paired PNC users, while we use modulo-√M addition for the PNC mapping ambiguity removal in higher-order M-ary Quadrature Amplitude Modulations (M-QAM). We evaluate the performance of the system in the framework of the Orthogonal Frequency Division Multiplexing (OFDM)-PNC systems with cyclic prefix extension under Rayleigh faded Tapped Delay Line (TDL)-C and Rician faded TDL-D channel models, proposed by the Third Generation Partnership Project (3GPP), as well as the Additive White Gaussian Noise (AWGN) channel model. The results reveal that our proposed technique can achieve a significant Signal-to-Noise Ratio (SNR) improvement of 12 dB over its asynchronous OFDM-PNC counterpart (without precoding) for Binary Phase Shift Modulation (BPSK) under a TDL-C faded channel model. Moreover, without channel coding, our proposed PNC technique requires an SNR of around 13dB to deliver a two-way 16-QAM communication at a Bit Error Rate of 10-3 under a Rayleigh faded TDL-C channel

    Machine learning for DDoS attack detection in industry 4.0 CPPSs

    Get PDF
    The Fourth Industrial Revolution (Industry 4.0) has transformed factories into smart Cyber-Physical Production Systems (CPPSs), where man, product, and machine are fully interconnected across the whole supply chain. Although this digitalization brings enormous advantages through customized, transparent, and agile manufacturing, it introduces a significant number of new attack vectors—e.g., through vulnerable Internet-of-Things (IoT) nodes—that can be leveraged by attackers to launch sophisticated Distributed Denial-of-Service (DDoS) attacks threatening the availability of the production line, business services, or even the human lives. In this article, we adopt a Machine Learning (ML) approach for network anomaly detection and construct different data-driven models to detect DDoS attacks on Industry 4.0 CPPSs. Existing techniques use data either artificially synthesized or collected from Information Technology (IT) networks or small-scale lab testbeds. To address this limitation, we use network traffic data captured from a real-world semiconductor production factory. We extract 45 bidirectional network flow features and construct several labeled datasets for training and testing ML models. We investigate 11 different supervised, unsupervised, and semi-supervised algorithms and assess their performance through extensive simulations. The results show that, in terms of the detection performance, supervised algorithms outperform both unsupervised and semi-supervised ones. In particular, the Decision Tree model attains an Accuracy of 0.999 while confining the False Positive Rate to 0.001

    A lightweight authentication mechanism for M2M communications in industrial IoT environment

    Get PDF
    In the emerging Industrial IoT era, Machine-to-Machine (M2M) communication technology is considered as a key underlying technology for building Industrial IoT environments where devices (e.g., sensors, actuators, gateways) are enabled to exchange information with each other in an autonomous way without human intervention. However, most of the existing M2M protocols that can be also used in the Industrial IoT domain provide security mechanisms based on asymmetric cryptography resulting in high computational cost. As a consequence, the resource-constrained IoT devices are not able to support them appropriately and thus, many security issues arise for the Industrial IoT environment. Therefore, lightweight security mechanisms are required for M2M communications in Industrial IoT in order to reach its full potential. As a step towards this direction, in this paper, we propose a lightweight authentication mechanism, based only on hash and XOR operations, for M2M communications in Industrial IoT environment. The proposed mechanism is characterized by low computational cost, communication and storage overhead, while achieving mutual authentication, session key agreement, device’s identity confidentiality, and resistance against the following attacks: replay attack, man-in-the-middle attack, impersonation attack, and modification attack

    Distributed Sensing, Computing, Communication, and Control Fabric: A Unified Service-Level Architecture for 6G

    Full text link
    With the advent of the multimodal immersive communication system, people can interact with each other using multiple devices for sensing, communication and/or control either onsite or remotely. As a breakthrough concept, a distributed sensing, computing, communications, and control (DS3C) fabric is introduced in this paper for provisioning 6G services in multi-tenant environments in a unified manner. The DS3C fabric can be further enhanced by natively incorporating intelligent algorithms for network automation and managing networking, computing, and sensing resources efficiently to serve vertical use cases with extreme and/or conflicting requirements. As such, the paper proposes a novel end-to-end 6G system architecture with enhanced intelligence spanning across different network, computing, and business domains, identifies vertical use cases and presents an overview of the relevant standardization and pre-standardization landscape
    corecore