M. Corici, Teodora Sandra Buda, Ranjan Shrestha, E. Cau, T. Metin, H. Assem
{"title":"Practical Performance Degradation Mitigation Solution Using Anomaly Detection for Carrier-Grade Software Networks","authors":"M. Corici, Teodora Sandra Buda, Ranjan Shrestha, E. Cau, T. Metin, H. Assem","doi":"10.1109/CSCN.2018.8581818","DOIUrl":"https://doi.org/10.1109/CSCN.2018.8581818","url":null,"abstract":"One of the critical technologies required for the large scale acceptance of network functions virtualization within carrier-grade communication systems is the maintenance of a predictable performance level for the software network functions. However, due to the specific resource allocation and to the implementation of the software itself, the performance of the network functions tends to degrade in time, thus, reducing the capacity of the system to serve the specific service requirements. This article introduces a practical solution for performance degradation detection and mitigation for telecom oriented software networks. Also. It includes the mechanisms to interact with the software network and a mechanism for abnormal behaviour detection, as basis for the performance degradation automatic decisions. Furthermore, the solution is exemplified as an addition to the current 5G core network architecture and evaluated on a testbed based on the Fraunhofer FOKUS Open5GCore toolkit and IBM DeepAD. The measured results show that such a solution is feasible and should be further investigated to be integrated in the next generation carrier-grade software networks management for enabling an autonomous long duration functioning of the network.","PeriodicalId":311896,"journal":{"name":"2018 IEEE Conference on Standards for Communications and Networking (CSCN)","volume":"292 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116113293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samir Ferdi, Yogendra Shah, Vinod KumwrChoyi, A. Brusilovsky
{"title":"Dynamic Authorization for 5G Systems","authors":"Samir Ferdi, Yogendra Shah, Vinod KumwrChoyi, A. Brusilovsky","doi":"10.1109/CSCN.2018.8581725","DOIUrl":"https://doi.org/10.1109/CSCN.2018.8581725","url":null,"abstract":"5G Networks are being designed to provide a diverse set of services using Network Slices (NS) that are enabled by Network Function Virtualization (NFV) and Software Defined Network (SDN) technologies. Given the expected diversity of service offerings and variety of connected devices, it's desirable to have a service authorization architecture that accommodates delivery of services from a variety of infrastructure service providers, while simultaneously protecting these infrastructure service providers from unauthorized service consumption. We illustrate an authorization framework to enable dynamic, context-based authorization for services offered over 5G networks.","PeriodicalId":311896,"journal":{"name":"2018 IEEE Conference on Standards for Communications and Networking (CSCN)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124587799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
David Manuel Gutiérrez Estévez, N. Dipietro, A. Dedomenico, M. Gramaglia, Uri Elzur, Yue Wang
{"title":"5G-MoNArch Use Case for ETSI ENI: Elastic Resource Management and Orchestration","authors":"David Manuel Gutiérrez Estévez, N. Dipietro, A. Dedomenico, M. Gramaglia, Uri Elzur, Yue Wang","doi":"10.1109/CSCN.2018.8581789","DOIUrl":"https://doi.org/10.1109/CSCN.2018.8581789","url":null,"abstract":"5G networks will grant spectacular improvements of the most relevant Key Performance Indicators (KPIs) while allowing resource multi-tenancy through network slicing. However, the other side of the coin is represented by the huge increase of the management complexity and the need for efficient algorithms for resource orchestration. Therefore, the management and orchestration of the network through Artificial Intelligence (AI) and Machine Learning (ML) algorithms is considered a promising solution, as it allows to reduce the human interaction (usually expensive and error-prone) and scale to large scenario composed by thousands of slices in heterogeneous environments. In this paper, we provide a review of the current standardization efforts in this field, mostly due to the work performed by the Experiential Network Intelligence (ENI) industry specification group (ISG) within the European Telecommunications Standards Institute (ETSI). Then, we thoroughly describe an exemplary use case on elastic network management and orchestration through learning solutions proposed by the 5GPPP project 5G-MoNArch and recently approved at ETSI ENI.","PeriodicalId":311896,"journal":{"name":"2018 IEEE Conference on Standards for Communications and Networking (CSCN)","volume":"637 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116473853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method for Improving Physical Layer Security in Visible Light Communication Networks","authors":"Zhe Chen, Xin Wang","doi":"10.1109/CSCN.2018.8581712","DOIUrl":"https://doi.org/10.1109/CSCN.2018.8581712","url":null,"abstract":"In this paper, a method is proposed for improving the physical layer security for indoor visible light communication (VLC) networks with angle diversity transmitters. An angle diversity transmitter usually consists of multiple narrow-beam light-emitting diode (LED) elements with different orientations. Angle diversity transmitters are suitable for confidential data transmission, since data transmission via narrow light beams can effectively avoid the leakage of messages. In order to improve security performance, protection zones are introduced to the systems with angle diversity transmitters. Simulation results show that over 50% performance improvement can be obtained by adding protection zones.","PeriodicalId":311896,"journal":{"name":"2018 IEEE Conference on Standards for Communications and Networking (CSCN)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114829421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdulkadir Karaagac, Matthias VanEeghem, Jen Rossey, Bart Moons, E. D. Poorter, J. Hoebeke
{"title":"Extensions to LwM2M for Intermittent Connectivity and Improved Efficiency","authors":"Abdulkadir Karaagac, Matthias VanEeghem, Jen Rossey, Bart Moons, E. D. Poorter, J. Hoebeke","doi":"10.1109/CSCN.2018.8581821","DOIUrl":"https://doi.org/10.1109/CSCN.2018.8581821","url":null,"abstract":"In order to extend the Internet technologies into constrained networks, there have been several research efforts and innovations over the past few years. These efforts resulted in several networking standards and protocols which have led to the emergence of the Internet of Things (IoT). Within this enormous ecosystem of protocols, the Lightweight Machine-to-Machine (LwM2M), a standard for device and service management, is a very promising candidate to achieve global interoperability, especially when constrained devices are involved. In this paper, we propose extensions to the LwM2M in order to improve communication efficiency and introduce Intermittent Connectivity, which will improve support for Low-Power Wide Area Networks (LPWANs) in LwM2M. For this purpose, we introduce two new object models, namely, Notify and Batch. The Notify Object enables the creation of reverse interaction models and Ready-to-Receive (RTR) functionality, which allows LwM2M clients to send periodic updates of resources without any need for a request and to notify LwM2M servers that it is ready to receive downlink messages and to keep the network connectivity open if it is necessary for downlink communication. Finally, the Batch object allows LwM2M servers to perform actions on multiple resources in a device via a single request.","PeriodicalId":311896,"journal":{"name":"2018 IEEE Conference on Standards for Communications and Networking (CSCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129824841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reputation-Based Blockchain for Secure NDN Caching in Vehicular Networks","authors":"Hakima Khelifi, Senlin Luo, Boubakr Nour, Hassine Moungla, Syed Hassan Ahmed","doi":"10.1109/CSCN.2018.8581849","DOIUrl":"https://doi.org/10.1109/CSCN.2018.8581849","url":null,"abstract":"Enormous research efforts have been investigated in Vehicular Ad Hoc Networking to improve users safety, traffic condition, and provide different reliable services, that are challenging tasks to accomplish in the current Internet model. In-network caching is one of the promising features of Named Data Networking, a new future Internet architecture based on content name instead of the host address. It aims to enhance the network performance, data availability, distribution, and access. The applicability of NDN in VANET introduced several issues, especially in the security and trust relationships. In this paper, we present a reputation-based blockchain mechanism to secure the cache in the vehicular environment and enhance the trust between cache stores and consumer vehicles. The obtained results demonstrate that our scheme outperforms the normal NDN behavior by providing only trust content in the network.","PeriodicalId":311896,"journal":{"name":"2018 IEEE Conference on Standards for Communications and Networking (CSCN)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115616945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Heterogeneous Vehicular Communications-Multi-Standard Solutions to Enable Interoperability","authors":"L. Baltar, M. Muck, D. Sabella","doi":"10.1109/CSCN.2018.8581726","DOIUrl":"https://doi.org/10.1109/CSCN.2018.8581726","url":null,"abstract":"Vehicular communication is considered to be a key enabler for future automated driving applications, which is considered one of the most promising vertical sectors for mobile networks. The 5.9 GHz frequency band has been allocated for safety and non-safety critical services in various regions of the world. Two radio access technologies have being defined and are currently competing for market adoption: IEEE Wireless Access in Vehicular Environments (WAVE)/Dedicated Short-Range Communications (DSRC) based on the IEEE 802.11p and 3GPP LTE Cellular Vehicle-to-Everything (C-V2X). Standard bodies have independently specified these technologies, which rely on different channel access schemes. Consequently, three major challenges arise when the two technologies are supposed to access the spectrum in the 5.9 GHz band: Coexistence, Interoperability and Backwards Compatibility. Moreover, multi-operator interoperability is another key issue for a wide market acceptance. In this paper, we propose an innovative way to use Multi-access Edge Computing (MEC) infrastructure, preferably colocated with Coud-RAN, to enable interoperability between distinct vehicular communication systems operating in the same band at the same location. Moreover, we also show how MEC enables vehicles from multiple OEMs to communicate via multiple Mobile Network Operators (MNOs) and Intelligent Transport Systems (ITS) service providers.","PeriodicalId":311896,"journal":{"name":"2018 IEEE Conference on Standards for Communications and Networking (CSCN)","volume":"18 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123623795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"2018 IEEE Conference on Standards for Communications and Networking, CSCN 2018, Paris, France, October 29-31, 2018","authors":"","doi":"10.1109/cscn.2018.8581754","DOIUrl":"https://doi.org/10.1109/cscn.2018.8581754","url":null,"abstract":"","PeriodicalId":311896,"journal":{"name":"2018 IEEE Conference on Standards for Communications and Networking (CSCN)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122066782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New 3GPP Security Features in 5G Phase 1","authors":"A. Kunz, Xiaowei Zhang","doi":"10.1109/CSCN.2018.8581763","DOIUrl":"https://doi.org/10.1109/CSCN.2018.8581763","url":null,"abstract":"The Third Generation Partnership Project 3GPP finished the normative specifications of 5th Generation Wireless System 5G Phase 1 in 3GPP Release 15. While many new ideas and approaches were discussed and evaluated in the study phase for security aspects, the final specification is often different due to the consensus process of all stakeholders. This paper provides an overview of the new security features compared to the Evolved Packet System, which have passed the conclusions of the study and the final step into the normative specification in 3GPP for 5G Phase 1.","PeriodicalId":311896,"journal":{"name":"2018 IEEE Conference on Standards for Communications and Networking (CSCN)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126413136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}