{"title":"CEF: Connecting Elaborate Federal QKD Networks","authors":"Alin-Bogdan Popa, Pantelimon Popescu","doi":"arxiv-2409.12027","DOIUrl":"https://doi.org/arxiv-2409.12027","url":null,"abstract":"As QKD infrastructure becomes increasingly complex while being developed by\u0000different actors (typically national governments), interconnecting them into a\u0000federated network of very elaborate sub-networks that maintain a high degree of\u0000autonomy will pose unique challenges. We identify several such challenges and\u0000propose a 4-step orchestration framework to address them based on centralized\u0000research, target network planning, optimal QKD design, and protocol\u0000enforcement.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142260187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Age-of-Information and Energy Optimization in Digital Twin Edge Networks","authors":"Yongna Guo, Yaru Fu, Yan Zhang, Tony Q. S. Quek","doi":"arxiv-2409.11799","DOIUrl":"https://doi.org/arxiv-2409.11799","url":null,"abstract":"In this paper, we study the intricate realm of digital twin synchronization\u0000and deployment in multi-access edge computing (MEC) networks, with the aim of\u0000optimizing and balancing the two performance metrics Age of Information (AoI)\u0000and energy efficiency. We jointly consider the problems of edge association,\u0000power allocation, and digital twin deployment. However, the inherent randomness\u0000of the problem presents a significant challenge in identifying an optimal\u0000solution. To address this, we first analyze the feasibility conditions of the\u0000optimization problem. We then examine a specific scenario involving a static\u0000channel and propose a cyclic scheduling scheme. This enables us to derive the\u0000sum AoI in closed form. As a result, the joint optimization problem of edge\u0000association and power control is solved optimally by finding a minimum weight\u0000perfect matching. Moreover, we examine the one-shot optimization problem in the\u0000contexts of both frequent digital twin migrations and fixed digital twin\u0000deployments, and propose an efficient online algorithm to address the general\u0000optimization problem. This algorithm effectively reduces system costs by\u0000balancing frequent migrations and fixed deployments. Numerical results\u0000demonstrate the effectiveness of our proposed scheme in terms of low cost and\u0000high efficiency.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142260189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-Enabled IoV: Secure Communication and Trustworthy Decision-Making","authors":"Jingyi Sun, Qi Shi, Guodong Jin, Hao Xu, Erwu Liu","doi":"arxiv-2409.11621","DOIUrl":"https://doi.org/arxiv-2409.11621","url":null,"abstract":"The Internet of Vehicles (IoV), which enables interactions between vehicles,\u0000infrastructure, and the environment, faces challenges in maintaining\u0000communication security and reliable automated decisions. This paper introduces\u0000a decentralized framework comprising a primary layer for managing inter-vehicle\u0000communication and a sub-layer for securing intra-vehicle interactions. By\u0000implementing blockchain-based protocols like Blockchain-integrated Secure\u0000Authentication (BiSA) and Decentralized Blockchain Name Resolution (DBNR), the\u0000framework ensures secure, decentralized identity management and reliable data\u0000exchanges, thereby supporting safe and efficient autonomous vehicle operations.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142260190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiang Li, Mustafa Abdallah, Yuan-Yao Lou, Mung Chiang, Kwang Taik Kim, Saurabh Bagchi
{"title":"Dynamic DAG-Application Scheduling for Multi-Tier Edge Computing in Heterogeneous Networks","authors":"Xiang Li, Mustafa Abdallah, Yuan-Yao Lou, Mung Chiang, Kwang Taik Kim, Saurabh Bagchi","doi":"arxiv-2409.10839","DOIUrl":"https://doi.org/arxiv-2409.10839","url":null,"abstract":"Edge computing is deemed a promising technique to execute latency-sensitive\u0000applications by offloading computation-intensive tasks to edge servers.\u0000Extensive research has been conducted in the field of end-device to edge server\u0000task offloading for several goals, including latency minimization, energy\u0000optimization, and resource optimization. However, few of them consider our\u0000mobile computing devices (smartphones, tablets, and laptops) to be edge\u0000devices. In this paper, we propose a novel multi-tier edge computing framework,\u0000which we refer to as M-TEC, that aims to optimize latency, reduce the\u0000probability of failure, and optimize cost while accounting for the sporadic\u0000failure of personally owned devices and the changing network conditions. We\u0000conduct experiments with a real testbed and a real commercial CBRS 4G network,\u0000and the results indicate that M-TEC is capable of reducing the end-to-end\u0000latency of applications by at least 8% compared to the best baseline under a\u0000variety of network conditions, while providing reliable performance at an\u0000affordable cost.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142260221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LoRa Communication for Agriculture 4.0: Opportunities, Challenges, and Future Directions","authors":"Lameya Aldhaheri, Noor Alshehhi, Irfana Ilyas Jameela Manzil, Ruhul Amin Khalil, Shumaila Javaid, Nasir Saeed, Mohamed-Slim Alouini","doi":"arxiv-2409.11200","DOIUrl":"https://doi.org/arxiv-2409.11200","url":null,"abstract":"The emerging field of smart agriculture leverages the Internet of Things\u0000(IoT) to revolutionize farming practices. This paper investigates the\u0000transformative potential of Long Range (LoRa) technology as a key enabler of\u0000long-range wireless communication for agricultural IoT systems. By reviewing\u0000existing literature, we identify a gap in research specifically focused on\u0000LoRa's prospects and challenges from a communication perspective in smart\u0000agriculture. We delve into the details of LoRa-based agricultural networks,\u0000covering network architecture design, Physical Layer (PHY) considerations\u0000tailored to the agricultural environment, and channel modeling techniques that\u0000account for soil characteristics. The paper further explores relaying and\u0000routing mechanisms that address the challenges of extending network coverage\u0000and optimizing data transmission in vast agricultural landscapes. Transitioning\u0000to practical aspects, we discuss sensor deployment strategies and energy\u0000management techniques, offering insights for real-world deployments. A\u0000comparative analysis of LoRa with other wireless communication technologies\u0000employed in agricultural IoT applications highlights its strengths and\u0000weaknesses in this context. Furthermore, the paper outlines several future\u0000research directions to leverage the potential of LoRa-based agriculture 4.0.\u0000These include advancements in channel modeling for diverse farming\u0000environments, novel relay routing algorithms, integrating emerging sensor\u0000technologies like hyper-spectral imaging and drone-based sensing, on-device\u0000Artificial Intelligence (AI) models, and sustainable solutions. This survey can\u0000guide researchers, technologists, and practitioners to understand, implement,\u0000and propel smart agriculture initiatives using LoRa technology.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"118 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142260194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nikolaos Bartzoudis, José Rubio Fernández, David López-Bueno, Godfrey Kibalya, Angelos Antonopoulos
{"title":"Micro-orchestration of RAN functions accelerated in FPGA SoC devices","authors":"Nikolaos Bartzoudis, José Rubio Fernández, David López-Bueno, Godfrey Kibalya, Angelos Antonopoulos","doi":"arxiv-2409.11362","DOIUrl":"https://doi.org/arxiv-2409.11362","url":null,"abstract":"This work provides a vision on how to tackle the underutilization of compute\u0000resources in FPGA SoC devices used across 5G and edge computing\u0000infrastructures. A first step towards this end is the implementation of a\u0000resource management layer able to migrate and scale functions in such devices,\u0000based on context events. This layer sets the basis to design a hierarchical\u0000data-driven micro-orchestrator in charge of providing the lifecycle management\u0000of functions in FPGA SoC devices. In the O-RAN context, the micro-orchestrator\u0000is foreseen to take the form of an xApp/rApp tandem trained with RAN traffic\u0000and context data.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"55 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142260193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ufuk Usubütün, André Gomes, Shankaranarayanan Puzhavakath Narayanan, Matti Hiltunen, Shivendra Panwar
{"title":"Designing Reliable Virtualized Radio Access Networks","authors":"Ufuk Usubütün, André Gomes, Shankaranarayanan Puzhavakath Narayanan, Matti Hiltunen, Shivendra Panwar","doi":"arxiv-2409.11334","DOIUrl":"https://doi.org/arxiv-2409.11334","url":null,"abstract":"As virtualization of Radio Access Networks (RAN) gains momentum,\u0000understanding the impact of hardware and software disaggregation on resiliency\u0000becomes critical to meet the high availability requirements of mobile networks.\u0000Our paper presents an analytical model, using continuous time Markov chains, to\u0000study the impact of virtualization and disaggregation on RAN availability. Our\u0000evaluation, assuming typical parameter value ranges for failure and recovery\u0000rates, points to containerized platform reliability as a constraint on vRAN\u0000availability. We also find that with active-passive replication, increasing\u0000hardware replication factor beyond 2 may not bring any benefits unless failover\u0000times are reduced. We also compare the reliability of centralized and\u0000distributed virtualized central units.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"215 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142260220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Helena Rifa-Pous, Victor Garcia-Font, Carlos Nunez-Gomez, Julian Salas
{"title":"Security, Trust and Privacy challenges in AI-driven 6G Networks","authors":"Helena Rifa-Pous, Victor Garcia-Font, Carlos Nunez-Gomez, Julian Salas","doi":"arxiv-2409.10337","DOIUrl":"https://doi.org/arxiv-2409.10337","url":null,"abstract":"The advent of 6G networks promises unprecedented advancements in wireless\u0000communication, offering wider bandwidth and lower latency compared to its\u0000predecessors. This article explores the evolving infrastructure of 6G networks,\u0000emphasizing the transition towards a more disaggregated structure and the\u0000integration of artificial intelligence (AI) technologies. Furthermore, it\u0000explores the security, trust and privacy challenges and attacks in 6G networks,\u0000particularly those related to the use of AI. It presents a classification of\u0000network attacks stemming from its AI-centric architecture and explores\u0000technologies designed to detect or mitigate these emerging threats. The paper\u0000concludes by examining the implications and risks linked to the utilization of\u0000AI in ensuring a robust network.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"55 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142260235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Li-MSD: A lightweight mitigation solution for DAO insider attack in RPL-based IoT","authors":"Abhishek Verma, Sachin Kumar Verma, Avinash Chandra Pandey, Jyoti Grover, Girish Sharma","doi":"arxiv-2409.10020","DOIUrl":"https://doi.org/arxiv-2409.10020","url":null,"abstract":"Many IoT applications run on a wireless infrastructure supported by\u0000resource-constrained nodes which is popularly known as Low-Power and Lossy\u0000Networks (LLNs). Currently, LLNs play a vital role in digital transformation of\u0000industries. The resource limitations of LLNs restrict the usage of traditional\u0000routing protocols and therefore require an energy-efficient routing solution.\u0000IETF's Routing Protocol for Low-power Lossy Networks (RPL, pronounced 'ripple')\u0000is one of the most popular energy-efficient protocols for LLNs, specified in\u0000RFC 6550. In RPL, Destination Advertisement Object (DAO) control message is\u0000transmitted by a child node to pass on its reachability information to its\u0000immediate parent or root node. An attacker may exploit the insecure DAO sending\u0000mechanism of RPL to perform 'DAO insider attack' by transmitting DAO multiple\u0000times. This paper shows that an aggressive DAO insider attacker can drastically\u0000degrade network performance. We propose a Lightweight Mitigation Solution for\u0000DAO insider attack, which is termed as 'Li-MSD'. Li-MSD uses a blacklisting\u0000strategy to mitigate the attack and restore RPL performance, significantly. By\u0000using simulations, it is shown that Li-MSD outperforms the existing solution in\u0000the literature.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142260226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resilient UAVs Location Sharing Service Based on Information Freshness and Opportunistic Deliveries","authors":"Agnaldo Batista, Aldri Santos","doi":"arxiv-2409.10708","DOIUrl":"https://doi.org/arxiv-2409.10708","url":null,"abstract":"Unmanned aerial vehicles (UAV) have been recognized as a versatile platform\u0000for a wide range of services. During the flight, these vehicles must avoid\u0000collisions to operate safely. In this way, they demand to keep spatial\u0000awareness, i.e., to know others in their coverage area. However, mobility and\u0000positioning aspects hamper building UAV network infrastructure to support\u0000reliable basic services. Thus, such vehicles call for a location service with\u0000up-to-date information resilient to false location injection threats. This work\u0000proposes FlySafe, a resilient UAVs location sharing service that employs\u0000opportunistic approaches to deliver UAVs' location. FlySafe takes into account\u0000the freshness of UAVs' location to maintain their spatial awareness. Further,\u0000it counts on the age of the UAV's location information to trigger device\u0000discovery. Simulation results showed that FlySafe achieved spatial awareness up\u0000to 94.15% of UAV operations, being resilient to~false locations injected in the\u0000network. Moreover, the accuracy in device discovery achieved 94.53% with a\u0000location error of less than 2 m.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"199 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142260222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}