11 research outputs found

    Mobile Service Continuity for Edge Train Networks

    Get PDF
    This paper has been presented at : IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE PIMRC 2019). 8-11 September 2019 Istanbul, TurkeyIn press / En prensaIn moving train networks, two-hop architecture is adopted to improve users experience by reducing the interaction between on-board users and base stations on the train route. In addition, edge networking have emerged as a solution for bringing services to the proximity of the users. However, deploying two-hop and edge networks do not guarantee a continuous service delivery for train users. When a large number of users transit from the train to the land, they experience service interruption due to control signalling storm and backhaul latency. In this paper, we propose a holistic edge service management system to provide mobile service continuity. The contribution of this paper is twofold. First, we develop an enhanced handover scheme that reduces control signals by handling user mobility at the edge. Second, we develop a pre-copy migration scheme that eliminates backhaul latency by relocating containerized applications to the user proximity across edge train networks. Our experimental results show that the two proposed solution can reduce the control signals and migration downtime by 50% and 36%, respectively.This work has been partially funded by the H2020 col-laborative Europe/Taiwan research project 5G-CORAL (grant no. 761586). This research is also partially supported by the Ministry of Science and Technology, under the Grant Number MOST 108-2634-F-009-006 - through Pervasive Artificial Intelligence Research (PAIR) Labs, Taiwan

    Enabling Mobile Service Continuity across Orchestrated Edge Networks

    Get PDF
    Edge networking has become an important technology for providing low-latency services to end users. However, deploying an edge network does not guarantee continuous service for mobile users. Mobility can cause frequent interruptions and network delays as users leave the initial serving edge. In this paper, we propose a solution to provide transparent service continuity for mobile users in large-scale WiFi networks. The contribution of this work has three parts. First, we propose ARNAB architecture to achieve mobile service continuity. The term ARNAB means rabbit in Arabic, which represents an Architecture for Transparent Service Continuity via Double-tier Migration. The first tier migrates user connectivity, while the second tier migrates user containerized applications. ARNAB provides mobile services just like rabbits hop through the WiFi infrastructure. Second, we identify the root-causes for prolonged container migration downtime. Finally, we enhance the container migration scheme by improving system response time. Our experimental results show that the downtime of ARNAB container migration solution is 50% shorter than that of the state-of-the-art migration.This work has been partially funded by the H2020 Europe/Taiwan joint action 5G-DIVE (Grant #859881) and also partially funded by the Ministry of Science and Technology, under the Grant Number MOST 108-2634-F-009-006 - through Pervasive Artificial Intelligence Research (PAIR) Labs, Taiwan

    ARNAB: Transparent Service Continuity across Orchestrated Edge Networks

    Get PDF
    Paper presented at: IEEE GLOBECOM 2018 Workshops: Intelligent Network orchestration and interaction in 5G and beyond. Abu Dabhi. 9-13 December 2018In this paper, we present an architecture for transparent service continuity for cloud-enabled WiFi networks called ARNAB: ARchitecture for traNsparent service continuity viA douBle-tier migration. The term arnab means rabbit in Arabic. It is dubbed for the proposed service architecture because a mobileuser service with ARNAB behaves like a rabbit hopping through the WiFi infrastructure. To deliver continuous services, deploying edge clouds is not sufficient. Users may travel far from the initial serving edge and also perform multiple WiFi handoffs during mobility. To solve this, ARNAB employs a double-tier migration scheme. One migration tier is for user connectivity, and the other one is for edge applications. Our experimental results show that ARNAB can not only enable continuous service delivery but also outperform the existing work in the area of container live migration across edge clouds.This work has been partially supported by the H2020 collaborative Europe/Taiwan research project 5G-CORAL (grant num. 761586)

    Opportunities and Challenges of Joint Edge and Fog Orchestration

    Get PDF
    Pushing contents, applications, and network functions closer to end users is necessary to cope with the huge data volume and low latency required in future 5G networks. Edge and fog frameworks have emerged recently to address this challenge. Whilst the edge framework was more infrastructure focused and more mobile operator-oriented, the fog was more pervasive and included any node (stationary or mobile), including terminal devices. This article analyzes the opportunities and challenges to integrate, federate, and jointly orchestrate the edge and fog resources into a unified framework.This work has been partially funded by the H2020 collaborative Europe/Taiwan research project 5G-CORAL (grant num. 761586

    Information hiding in internet protocol networks

    No full text
    In this thesis, we develop network information hiding methods which can be utilized to transmit external information between two network end-systems as stealthy as possible. Here, we propose three network information hiding methods namely, Packet Payload Byte Parity Based Steganography, Alternative Packet Payload Bit Parity Based Steganography and finally, the IP Identification Based Steganographic method. In the first and second methods, we exploit the parity of the payload to encode external information. We examine and analyze the packet lengths of normal traffic to show that the methods can cope with traffic anomaly detection methods and do not introduce noticeable overhead. Results suggest that the proposed methods achieve high undetectability at 1 bit per packet of channel capacity. On the other hand, we propose to utilize the IP identification field to establish steganographic communication in operating systems which manifest randomness in their IP identification generation

    A survey of network protocol based steganographic techniques

    No full text
    Steganography is a sub-discipline of information hiding, which hides external information into an innocuous carrier to establish stealthy communication. Steganography in network protocols however, is an emerging research area, which exploits network protocols specifications, protocol mechanisms, network applications, and network services to realize covert channels between network end-systems. In this paper, we aim to clarify topics related to information hiding and its applications especially steganography. We also provide a brief comparison between steganography and cryptography. Eventually, we categorize and present some of the current work related steganography in networks

    Network packet payload parity based steganography

    No full text
    Network steganography is an emerging research field, which exploits packet protocol headers, protocol mechanism, packet payload, etc. to establish secret communication between two parties over a computer network. The detection of such hidden communication has not been part of intrusion detection systems that are primarily used to detect malicious activities such as viruses and malwares. In this paper, we propose two packet-length based steganographic techniques to implement a covert channel. We examine and analyze the packet lengths of normal traffic to show that our techniques can cope with traffic anomaly detection methods and does not introduce noticeable traffic overhead

    HiAuth: Hidden Authentication for Protecting Software Defined Networks

    No full text

    AIPISteg: An active IP identification based steganographic method

    No full text
    IP identification (IPID) is an IP header field which is designed to identify a packet in a communication session. The main purpose of IPID is to recover from IP fragmentation. To the best of our knowledge, most existing IPID based information hiding methods assume that the IPID number is a pseudo random number, which is found to be false. In this paper, we propose a steganographic method by exploiting the IPID field while considering the information from the user data field. First, we analyze the IPID distribution of various operating systems. Subsequently, we put forward a simple data embedding method, which is then refined to mimic the ordinary IPID traffic. Experiments are carried out and the results empirically prove that the proposed method is of high undetectability as compared to the existing IPID based steganographic methods

    EagleEYE: Aerial Edge-enabled Disaster Relief Response System

    Get PDF
    This paper has been presented at 2020 European Conference on Networks and Communications (EuCNC).The fifth generation (5G) mobile network has paved the way for innovations across vertical industries. The integration of distributed intelligent edge into the 5G orchestrated architecture brings the benefits of low-latency and automation. A successful example of this integration is exhibited by the 5G-DIVE project, which aims at proving the technical merits and business value proposition of vertical industries such as autonomous drone surveillance and navigation. In this paper, and as part of 5G-DIVE, we present an aerial disaster relief system, called EagleEYE, which utilizes edge computing and machine learning to detect emergency situations in real-time. EagleEYE reduces training time by devising an object fusion mechanism which enables reusing existing datasets. Furthermore, EagleEYE parallelizes the detection tasks to enable real-time response. Finally, EagleEYE is evaluated in a real-world testbed and the results show that EagleEYE can reduce the inference latency by 90% with a high detection accuracy of 87%.This work has been partially funded by the H2020 EU/TW joint action 5G-DIVE (Grant #859881)
    corecore