3 research outputs found

    Characterization and Identification of Cloudified Mobile Network Performance Bottlenecks

    Get PDF
    This study is a first attempt to experimentally explore the range of performance bottlenecks that 5G mobile networks can experience. To this end, we leverage a wide range of measurements obtained with a prototype testbed that captures the key aspects of a cloudified mobile network. We investigate the relevance of the metrics and a number of approaches to accurately and efficiently identify bottlenecks across the different locations of the network and layers of the system architecture. Our findings validate the complexity of this task in the multi-layered architecture and highlight the need for novel monitoring approaches that intelligently fuse metrics across network layers and functions. In particular, we find that distributed analytics performs reasonably well both in terms of bottleneck identification accuracy and incurred computational and communication overhead.Comment: 17 pages, 16 figures, documentclass[journal,comsoc]{IEEEtran}, corrected titl

    Network Slicing in 5G: Survey and Challenges

    Get PDF

    Denial of Service attacks in vehicle platoons. Jamming resistence and mitigation.

    Get PDF
    This master thesis overviews the fields of Intelligent Transportation Systems (ITS) and Vehicular Ad hoc Networks (VANETs) and their role in future transport. It describes the key challenges in security with a focus on low-level attacks and vehicle platooning applications. It points out that denial of service attacks could prove particularly disruptive and dangerous in a vehicular network. The project focuses on prevention, detection and mitigation of denial of service attacks in a vehicle platoon. To achieve this, a simulator was created using MATLAB and Simulink that can reproduce the physical workings of a vehicle platoon as well as the wireless communication between the vehicles and the possibility of malicious interference. Defence methods are implemented and tested against jamming attacks. These include methods of interference reduction, data redundancy and warning systems based on on-board vehicle sensors. The results presented are positive and successful in increasing a vehicle platoon s resiliency to attacks. It is the hope of the author that this work along with the simulating environment created, will provide an incentive for further development and examination
    corecore