78 research outputs found

    Placement of Social Digital Twins at the Edge for Beyond 5G IoT Networks

    Get PDF
    As the fifth-generation (5G) and beyond (5G+/6G) networks move forward, and a wide variety of new advanced Internet of Things (IoT) applications are offered, effective methodologies for discovering time-relevant information, services, and resources are being demanded. To this end, computing-, storage-, and battery-constrained IoT devices are progressively augmented via digital twins (DTs) hosted on edge servers. According to recent research results, a further feature these devices may acquire is social behavior; this latter offers enormous possibilities for fast and trustworthy service discovery, although it requires new orchestration policies of DTs at the network edge. This work addresses the dynamic placement of DTs with social capabilities [social digital twins (SDTs)] at the edge, by providing an optimal solution under IoT device mobility and by accounting for edge network deployment specifics, types of devices, and their social peculiarities. The optimization problem is formulated as a particular case of the quadratic assignment problem (QAP); also, an approximation algorithm is proposed and two relaxation techniques are applied to reduce computation complexity. Results show that the proposed placement policy ensures a latency among SDTs up to 1.4 times lower than the one obtainable with a traditional proximity-based only placement while still guaranteeing appropriate proximity between physical devices and their virtual counterparts. Moreover, the proposed heuristic closely approximates the optimal solution while guaranteeing the lowest computational time

    Enhancing the navigability in a social network of smart objects: a Shapley-value based approach

    Get PDF
    The Internet of Things (IoT) holds the promise to interconnect any possible object capable of providing useful information about the physical world for the benefit of humans' quality of life. The increasing number of heterogeneous objects that the IoT has to manage introduces crucial scalability issues that still need appropriate solutions. In this respect, one promising proposal is the Social IoT (SIoT) paradigm, whose main principle is to enable objects to autonomously establish social links with each other (adhering to rules set by their owners). "Friend" objects exchange data in a distributed manner and this avoids centralized solutions to implement major functions, such as: node discovery, information search, and trustworthiness management. However, the number and types of established friendships affect network navigability. This issue is the focus of this paper, which proposes an efficient, distributed and dynamic solution for the objects to select the right friends for the benefit of the overall network connectivity. The proposed friendship selection mechanism relies on a game theoretic model and a Shapley-value based algorithm. Two different utility functions are defined and evaluated based on either a group degree centrality and an average local clustering parameter. The comparison in terms of global navigability is measured in terms of average path length for the interconnection of any couple of nodes in the network. Results show that the group degree centrality brings to an enhanced degree of navigability thanks to the ability to create a suitable core of hubs

    A subjective model for trustworthiness evaluation in the social Internet of Things

    Get PDF
    The integration of social networking concepts into the Internet of Things (IoT) has led to the so called Social Internet of Things (SIoT) paradigm, according to which the objects are capable of establishing social relationships in an autonomous way with respect to their owners. The benefits are those of improving scalability in information/service discovery when the SIoT is made of huge numbers of heterogeneous nodes, similarly to what happens with social networks among humans. In this paper we focus on the problem of understanding how the information provided by the other members of the SIoT has to be processed so as to build a reliable system on the basis of the behavior of the objects. We define a subjective model for the management of trustworthiness which builds upon the solutions proposed for P2P networks. Each node computes the trustworthiness of its friends on the basis of its own experience and on the opinion of the common friends with the potential service providers. We employ a feedback system and we combine the credibility and centrality of the nodes to evaluate the trust level. Preliminary simulations show the benefits of the proposed model towards the isolation of almost any malicious node in the network

    MIFaaS: A Mobile-IoT-Federation-as-a-Service Model for dynamic cooperation of IoT Cloud Providers

    Get PDF
    In the Internet of Things (IoT) arena, a constant evolution is observed towards the deployment of integrated environments, wherein heterogeneous devices pool their capacities to match wide-ranging user requirements. Solutions for efficient and synergistic cooperation among objects are, therefore, required. This paper suggests a novel paradigm to support dynamic cooperation among private/public local clouds of IoT devices. Differently from . device-oriented approaches typical of Mobile Cloud Computing, the proposed paradigm envisages an . IoT Cloud Provider (ICP)-oriented cooperation, which allows all devices belonging to the same private/public owner to participate in the federation process. Expected result from dynamic federations among ICPs is a remarkable increase in the amount of service requests being satisfied. Different from the Fog Computing vision, the network edge provides only management support and supervision to the proposed Mobile-IoT-Federation-as-a-Service (MIFaaS), thus reducing the deployment cost of peripheral micro data centers. The paper proposes a coalition formation game to account for the interest of rational cooperative ICPs in their own payoff. A proof-of-concept performance evaluation confirms that obtained coalition structures not only guarantee the satisfaction of the players' requirements according to their utility function, but also these introduce significant benefits for the cooperating ICPs in terms of number of tasks being successfully assigned

    On the impact of the user terminal velocity on HSPA performance in MBMS multicast mode

    Get PDF
    Multimedia Broadcast/Multicast Services (MBMS), introduced in Universal Mobile Telecommunication System (UMTS), have the aim to allow transmissions from a single source entity to multiple destinations. From the radio perspective, MBMS foresees both pointto- point (PtP) and point-to-multipoint (PtM) transmission mode, supported by Dedicated, Common, and Shared channels. The High Speed Downlink Packet Access (HSDPA), analyzed in this paper, can guarantee a higher data rate through the introduction of High Speed Downlink Shared Channel (HS-DSCH), thus improving the performance of MBMS transmissions. The aim of this paper is to investigate the impact of the User Equipment (UE) speed on the maximum number of users that the HS-DSCH can support for MBMS applications. In particular, two different mobility profiles are taken into account (Pedestrian and Vehicular) and the obtained results are validated by considering different transmission power levels, cell coverage sizes and bit rates.Postprint (published version

    D2D-based Cooperative Positioning Paradigm for Future Wireless Systems: A Survey

    Get PDF
    Emerging communication network applications require a location accuracy of less than 1m in more than 95% of the service area. For this purpose, 5G New Radio (NR) technology is designed to facilitate high-accuracy continuous localization. In 5G systems, the existence of high-density small cells and the possibility of the device-to-device (D2D) communication between mobile terminals paves the way for cooperative positioning applications. From the standardization perspective, D2D technology is already under consideration (5G NR Release 16) for ultra-dense networks enabling cooperative positioning and is expected to achieve the ubiquitous positioning of below one-meter accuracy, thereby fulfilling the 5G requirements. In this survey, the strengths and weaknesses of D2D as an enabling technology for cooperative cellular positioning are analyzed (including two D2D approaches to perform cooperative positioning); lessons learned and open issues are highlighted to serve as guidelines for future research

    Slicing on the road: enabling the automotive vertical through 5G network softwarization

    Get PDF
    The demanding requirements of Vehicle-to-Everything (V2X) applications, such as ultra-low latency, high-bandwidth, highly-reliable communication, intensive computation and near-real time data processing, raise outstanding challenges and opportunities for fifth generation (5G) systems. By allowing an operator to flexibly provide dedicated logical networks with (virtualized) functionalities over a common physical infrastructure, network slicing candidates itself as a prominent solution to support V2X over upcoming programmable and softwarized 5G systems in a business-agile manner. In this paper, a network slicing framework is proposed along with relevant building blocks and mechanisms to support V2X applications by flexibly orchestrating multi-access and edge-dominated 5G network infrastructures, especially with reference to roaming scenarios. Proof of concept experiments using the Mininet emulator showcase the viability and potential benefits of the proposed framework for cooperative driving use cases1812não temMinistério da Ciência, Tecnologia, Inovações e Comunicações - MCTICThe research of Prof. Christian Esteve Rothenberg was partially supported by the H2020 4th EUBR Collaborative Call, under the grant agreement number 777067 (NECOS - Novel Enablers for Cloud Slicing), funded by the European Commission and the Brazilian Ministry of Science, Technology, Innovation, and Communication (MCTIC) through RNP and CTI

    On the optimization of power assignment to support multicast applications in HAP-based systems

    Get PDF
    The goal of this research work is to investigate how efficient High Altitude Platforms (HAPs) can be in supporting Multimedia Broadcast/Multicast Service (MBMS) in scenarios in which the terrestrial coverage is not available. Specifically, we propose to implement an effective Radio Resources Management (RRM) policy into the HAP Radio Network Controller (H-RNC), whose main aim is to increase the overall system capacity. The proposed technique achieves its goal by dynamically selecting the most efficient multicast transport channel in terms of power consumption, chosen amongst Dedicated Channel (DCH), Forward Access Channel (FACH), and High Speed Downlink Shared Channel (HS-DSCH). Advantages deriving from the joint use of channels belonging to different categories are exploited. Results achieved when using the proposed RRM are quite manifest and witnesses to the necessity of providing such a feature when deploying integrated HAP/Terrestrial platforms supporting MBMS services.Peer ReviewedPostprint (published version

    A systemic and cognitive approach for IoT security

    Get PDF
    Invited PaperInternational audienceThe Internet of Things (IoT) will enable objects to become active participants of everyday activities. Introducing objects into the control processes of complex systems makes IoT security very difficult to address. Indeed, the Internet of Things is a complex paradigm in which people interact with the technological ecosystem based on smart objects through complex processes. The interactions of these four IoT components, person, intelligent object, technological ecosystem, and process, highlight a systemic and cognitive dimension within security of the IoT. The interaction of people with the technological ecosystem requires the protection of their privacy. Similarly, their interaction with control processes requires the guarantee of their safety. Processes must ensure their reliability and realize the objectives for which they are designed. We believe that the move towards a greater autonomy for objects will bring the security of technologies and processes and the privacy of individuals into sharper focus. Furthermore, in parallel with the increasing autonomy of objects to perceive and act on the environment, IoT security should move towards a greater autonomy in perceiving threats and reacting to attacks, based on a cognitive and systemic approach. In this work, we will analyze the role of each of the mentioned actors in IoT security and their relationships, in order to highlight the research challenges and present our approach to these issues based on a holistic vision of IoT security

    Interplay of User Behavior, Communication, and Computing in Immersive Reality 6G Applications

    Get PDF
    Emerging extended reality (XR) services and applications that submerge users into a virtual universe pave the way towards ubiquitous contextualized experiences. Immersive interactions on-the-go not only bring new use cases but also distract users from the real world and modify their behavior and motion, which in turn may affect the operation of communication networks. This article explores the effects of XR user motion from the communication and computing perspectives. To this end, we offer a review of mobility patterns in XR and a detailed simulation study on the impact of interaction-dependent gait patterns on the delay and resource utilization. The results confirm the uniqueness of XR applications in terms of the user behavior patterns, which calls for novel application-centric algorithms, protocols, and mechanisms to facilitate high-performance connectivity under demanding XR requirements.acceptedVersionPeer reviewe
    • …
    corecore