144 results
Search Results
2. Call for Papers.
- Subjects
- *
MANUSCRIPTS - Abstract
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
3. Call for Papers.
- Subjects
- *
MANUSCRIPTS - Abstract
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
4. Call for Papers.
- Subjects
- *
MANUSCRIPTS - Abstract
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
5. Call for Papers.
- Subjects
- *
MANUSCRIPTS - Abstract
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
6. Call for Papers.
- Subjects
- *
MANUSCRIPTS - Abstract
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
7. Call for Papers.
- Subjects
- *
AUGMENTED reality , *WORLD Wide Web , *MIXED reality , *COMPUTER vision - Published
- 2022
- Full Text
- View/download PDF
8. Call for Papers.
- Subjects
- *
DIGITAL twins , *5G networks , *DATA privacy - Published
- 2022
- Full Text
- View/download PDF
9. ICC 2022 call for papers and proposals.
- Subjects
- *
MANUSCRIPTS , *AUTHORS - Abstract
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
10. Call for Papers.
- Subjects
- *
VOCATION , *MANUSCRIPTS - Abstract
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
11. Call for Papers.
- Subjects
- *
EDGE computing , *COMPUTER network protocols , *TELECOMMUNICATION systems , *INTELLIGENT networks , *REINFORCEMENT learning , *5G networks , *EMAIL - Published
- 2020
- Full Text
- View/download PDF
12. Call for Papers.
- Subjects
- *
5G networks , *TELECOMMUNICATION satellites , *INTERNET of things , *VIRTUAL machine systems , *COMPUTER architecture - Abstract
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
13. Call for Papers.
- Subjects
- *
COMPUTER networks , *MANUSCRIPTS - Abstract
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers. [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
14. Call for Papers.
- Subjects
- *
AUTHORS , *COMPUTER networks - Abstract
Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers. [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
15. Call for Papers.
- Abstract
Advertisement. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
16. Call for Papers.
- Subjects
- *
INFORMATION sharing , *ARTIFICIAL intelligence , *EMBEDDED computer systems , *5G networks , *INTERNET of things , *WIRELESS communications - Published
- 2017
- Full Text
- View/download PDF
17. Working papers and primary sources.
- Author
-
Liebeherr, Jorg
- Subjects
ARCHIVAL materials ,COMPUTER networks ,WORKING papers - Abstract
Editorial. Focuses on the increase number of references to working papers and primary sources in networking area. Problem with nonarchival working papers; Link between working papers and primary sources; Distinction between a nonreferred and nonedited contribution in an archival journal; Benefits in maintaining public archives for working papers.
- Published
- 1999
18. IEEE Access.
- Subjects
INTERNET publishing ,RESEARCH papers (Students) ,DIGITAL library access control - Abstract
Advertisement, IEEE. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
19. Guest Editorial: Trust, Security and Privacy of 6G.
- Author
-
Yan, Zheng, Yang, Laurence T., Li, Tieyan, Miche, Yoan, Yu, Shui, and Yau, Stephen S.
- Subjects
- *
TRUST , *QUANTUM communication , *TECHNOLOGICAL innovations , *PRIVACY , *SOCIAL networks - Abstract
With 5G adoption for commercial use, researchers and practitioners have engaged into exploring 6G telecommunication technologies. In early 2020, they specified 6G basic concepts, perspectives, proposals and suggestions in a number of white papers, including the one about 6G trust, security and privacy (TSP) [1]. 6G is expected to offer the 6th sense. It follows the footsteps of 5G and pursues the integration of communications and sensing. Through sensing the physical world and human-beings, 6G should be capable of programming to offer automation systems that span a rich variety of devices, several types of network and communication technologies and humans. Thus theoretically, 6G should timely offer user expected and satisfied networking services for social communications, health, logistic, entertainment, business, and so on. It will embrace emerging technologies, such as quantum communication, molecular communication, real-time intelligent edge, Internet of everything, etc. As a consequence, personal and national safety will highly depend on network and information security. Anticipating future development, ITU-T specifies that Trustworthy Networking should be provided [2]. 6G TSP white paper [1] also indicates that trust should be embedded into networking. On the other hand, security is always a mandatory requirement, which is one of key performance indicators of trust. But sensing human-beings and physical world brings serious concern on privacy preservation, which however, conflicts with trust. All above drives us to pursue a trust management solution for trustworthy networking in 6G, which should ensure security and overcome privacy leakage in an integrated way. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
20. Adaptive C-RAN Architecture with Moving Nodes Toward Beyond the 5G Era.
- Author
-
Nakayama, Yu, Hisano, Daisuke, and Maruta, Kazuki
- Subjects
- *
PASSIVE optical networks , *COMPUTER simulation , *5G networks , *ALGORITHMS , *WIRELESS communications - Abstract
The C-RAN architecture has been prevailing in mobile networks for 5G and beyond. Along with the significant increase in the amount of mobile data, network operators must consider the spatio-temporal pattern of traffi c demand due to human mobility and lifestyles. It has been an important problem to efficiently deploy mobile networks avoiding the underutilization of cell capacities in off -peak times. To address this problem, in this paper we propose a concept of an adaptive C-RAN architecture toward the beyond 5G era. The proposed architecture enables flexible reconfi guration of the radio unit (RU) states and movable DU locations considering the changes in demand distribution. The DUs and RUs compose wireless relay fronthaul networks to forward fronthaul streams satisfying the strict latency requirements. This paper also proposes the joint scheduling algorithm to activate RUs, relocate DUs, and determine forwarding paths of fronthaul streams. It was confi rmed with computer simulations that mobile networks can be efficiently reconstructed with the proposed idea by activating/deactivating RUs and relocating/ migrating DUs. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
21. Service Delivery Models for Converged Satellite-Terrestrial 5G Network Deployment: A Satellite-Assisted CDN Use-Case.
- Author
-
Luglio, Michele, Romano, Simon Pietro, Roseti, Cesare, and Zampognaro, Francesco
- Subjects
- *
CONTENT delivery networks , *TELECOMMUNICATION satellites , *5G networks , *VIRTUAL networks , *MULTICASTING (Computer networks) - Abstract
The current shift toward the virtualization of network infrastructure components enables a dynamic instantiation, deployment and configuration of virtual network functions (VNFs), which can be offered "as-a-service" to multiple tenants, thus enabling 5G architectures. Simultaneously, the recent high throughput satellite (HTS) systems can play an important role in the 5G era thanks to their characteristics, such as their large coverage, fast deployment of the ground infrastructure and native broadcast/multicast broadband capabilities. In this context, this paper proposes a review of the satellite service delivery models in order to identify viable alternatives to deploy converged satellite-terrestrial services. This objective is pursued by taking as a reference a satellite-assisted IP streaming service for the enhancement of current Content Delivery Network (CDN) infrastructures, as tackled by the European Space Agency within the SHINE ("Secure Hybrid In Network caching Environment") project. SHINE aims at efficiently extending terrestrial CDN services to satellite-enabled scenarios, by designing innovative mechanisms for the secure distribution of real-time multimedia information across hybrid channels, leveraging both unicast and multicast communication paradigms. The original contribution of the paper is the analysis of satellite architectures and configurations tailored to efficiently support the SHINE solution, together with a high-level applicability assessment taking into account different satellite-enabled service models. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
22. Service Delivery Models for Converged Satellite-Terrestrial 5G Network Deployment: A Satellite-Assisted CDN Use-Case.
- Author
-
Luglio, Michele, Romano, Simon Pietro, Roseti, Cesare, and Zampognaro, Francesco
- Subjects
- *
TELECOMMUNICATION satellites , *5G networks , *VIRTUAL networks , *CONTENT delivery networks - Abstract
The current shift toward the virtualization of network infrastructure components enables a dynamic instantiation, deployment and configuration of virtual network functions (VNFs), which can be offered "as-a-service" to multiple tenants, thus enabling 5G architectures. Simultaneously, the recent high throughput satellite (HTS) systems can play an important role in the 5G era thanks to their characteristics, such as their large coverage, fast deployment of the ground infrastructure and native broadcast/multicast broadband capabilities. In this context, this paper proposes a review of the satellite service delivery models in order to identify viable alternatives to deploy converged satellite-terrestrial services. This objective is pursued by taking as a reference a satellite-assisted IP streaming service for the enhancement of current Content Delivery Network (CDN) infrastructures, as tackled by the European Space Agency within the SHINE ("Secure Hybrid In Network caching Environment") project. SHINE aims at efficiently extending terrestrial CDN services to satellite-enabled scenarios, by designing innovative mechanisms for the secure distribution of real-time multimedia information across hybrid channels, leveraging both unicast and multicast communication paradigms. The original contribution of the paper is the analysis of satellite architectures and configurations tailored to efficiently support the SHINE solution, together with a high-level applicability assessment taking into account different satellite-enabled service models. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
23. Scanning the Literature.
- Subjects
- *
LITERATURE , *AUTHORS , *WISHES - Abstract
Presents concise summaries of selected papers that have recently been published in the field of networking. Each summary describes the paper's main idea, methodology, and technical contributions. The purpose of the column is to bring the state of the art of networking research to readers of IEEE Network. Authors are also welcome to recommend their recently published work to the column, and papers with novel ideas, solid work, and significant contributions to the field are especially appreciated. Authors wishing to have their papers presented in the column should contact the Editor. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
24. The new automated IEEE INFOCOM review assignment system.
- Author
-
Li, Baochun and Hou, Y. Thomas
- Subjects
- *
COMPUTER networks , *SCALABILITY , *SYSTEMS design , *SYSTEMS engineering , *LARGE scale systems - Abstract
In academic conferences, the structure of the review process has always been considered a critical aspect of ensuring the quality of the conferences. Assigning reviews manually, by either the TPC chairs or Area Chairs, is time-consuming, and the process does not scale well to the number of submitted papers. Organizing a conference with multiple symposia (or tracks) helps its scalability, but predetermined boundaries between tracks may lead to inefficient use of reviewer expertise and suboptimal review assignment. Inspired by a rich literature on the problem of automated review assignment, we have designed and implemented a new review assignment system, called Erie, and successfully deployed it for IEEE INFOCOM 2015 and INFOCOM 2016. Implemented in Python, Erie is designed to use Latent Semantic Indexing to compute the suitability score between a submitted paper and a reviewer's representative papers, and to solve an optimization problem that maximizes the total suitability score across all submitted papers to the conference. Anecdotal evidence shows that Erie outperformed the accuracy of manual assignments by Area Chairs, and helped to improve the percentage of expert reviewers by a substantial margin. [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
25. Byzantine Resistant Secure Blockchained Federated Learning at the Edge.
- Author
-
Li, Zonghang, Yu, Hongfang, Zhou, Tianyao, Luo, Long, Fan, Mochan, Xu, Zenglin, and Sun, Gang
- Subjects
- *
EDGE computing , *EDGES (Geometry) , *ARTIFICIAL intelligence , *RECONNAISSANCE operations - Abstract
The emerging blockchained federated learning, known for its security properties such as decentralization, immutability and traceability, is evolving into an important direction of next-generation AI. With the booming edge computing technologies, blockchained federated learning can take advantage of computing, communication and storage resources geo-distributed at the edge, so that blockchained federated learning can gather edge intelligence from more widely distributed devices more efficiently. However, untrustworthy devices at the edge also bring serious security threats, namely byzantine attacks. Existing solutions focus on selecting local models that are most likely to be honest, rather than detecting byzantine models and identifying attackers, because verifying each local model separately brings intolerable verification delay. In this paper, we propose a byzantine resistant secure blockchained federated learning framework named BytoChain. BytoChain improves the efficiency of model verification by introducing verifiers to execute heavy verification workflows in parallel, and detects byzantine attacks through a byzantine resistant consensus Proof-of-Accuracy (PoA). We analyze how BytoChain can mitigate five types of attacks, and demonstrate its effectiveness by simulations. Finally, we envision some open issues about security, including attacks on privacy, confidentiality, and backdoors. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
26. A Machine Learning Approach for Blockchain-Based Smart Home Networks Security.
- Author
-
Khan, Muhammad Adnan, Abbas, Sagheer, Rehman, Abdur, Saeed, Yousaf, Zeb, Asim, Uddin, M. Irfan, Nasser, Nidal, and Ali, Asmaa
- Subjects
- *
SMART homes , *HOME computer networks , *MACHINE learning , *DEEP learning , *INTERNET of things , *COMPUTER network security , *BLOCKCHAINS , *INTERNET privacy - Abstract
Realizing secure and private communications on the Internet of Things (IoT) is challenging, primarily due to IoT's projected vast scale and extensive deployment. Recent efforts have explored the use of blockchain in decentralized protection and privacy supported. Such solutions, however, are highly demanding in terms of computation and time requirements, barring these solutions from the majority of IoT applications. Specifically, in this paper, we introduce a resource-efficient, blockchain-based solution for secure and private IoT. The solution is made possible through novel exploitation of computational resources in a typical IoT environment (e.g., smart homes), along with the use of an instance of Deep Extreme Learning Machine (DELM). In this proposed approach, the Smart Home Architecture based in Blockchain is protected by carefully evaluating its reliability in regard to the essential security aims of privacy, integrity, and accessibility. In addition, we present simulation results to emphasize that the overheads created by our method (in terms of distribution, processing time, and energy consumption) are marginal related to their protection and privacy benefits. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
27. Scanning the Literature – From AR/VR to Metaverse.
- Subjects
- *
LITERATURE , *AUTHORS , *WISHES - Abstract
This column provides concise summaries of selected papers that have recently been published in the field of networking. Each summary describes the paper's main idea, methodology, and technical contributions. The purpose of the column is to bring the state of the art of networking research to readers of IEEE Network. Authors are also welcome to recommend their recently published work to the column, and papers with novel ideas, solid work, and significant contributions to the field are especially appreciated. Authors wishing to have their papers presented in the column should contact the Editor. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
28. Scanning the Literature.
- Subjects
- *
LITERATURE , *AUTHORS , *WISHES - Abstract
Presents concise summaries of selected papers that are recently published in the field of networking. Each summary describes the paper's main idea, methodology, and technical contributions. The purpose of the column is to bring the state of the art of networking research to readers of IEEE Network. Authors are also welcome to recommend their recently published work to the column, and papers with novel ideas, solid work, and significant contributions to the field are especially appreciated. Authors wishing to have their papers presented in the column should contact the editor. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
29. Blockchain Enabled Named Data Networking for Secure Vehicle-to-Everything Communications.
- Author
-
Rawat, Danda B., Doku, Ronald, Adebayo, Abdulhamid, Bajracharya, Chandra, and Kamhoua, Charles
- Subjects
- *
BLOCKCHAINS , *INTELLIGENT transportation systems , *PEDESTRIANS , *VEHICULAR ad hoc networks - Abstract
A huge amount of information is expected to be exchanged in vehicular networks through vehicle-to-everything (V2X) communications for enhancing overall traffic efficiency and road safety. However, there are several critical challenges to be addressed before completely realizing the full potential of V2X networking. Privacy-aware security is one of the central components to be addressed for V2X communications. This paper presents a novel framework by leveraging the best features of two emerging technologies: blockchain technology and named data networking (NDN) for privacy-aware secure V2X communications. The proposed framework does not use the private information of users (owners, drivers, pedestrians, passengers, cyclists, etc.) in vehicular networks while providing verifiable secure V2X communications by using non-private information such as number plate of the vehicle (like in ParkMobile App or E-ZPass systems use) for integrity and accountability of the communications. Specifically, integrity and accountability in the proposed framework for its users are achieved by amalgamating the best features of blockchain technology and NDN. Furthermore, the proposed approach aims to increase the trust and transparency and reduce the business friction in smart transplantation systems. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
30. Scanning the Literature.
- Author
-
Tian, Xiaohua
- Subjects
- *
LEAKY-wave antennas , *LITERATURE - Abstract
The Scanning the Literature column provides concise summaries of selected papers that have recently been published in the field of networking. Each summary describes the paper's main idea, methodology, and technical contributions. The purpose of the column is to bring the state of the art of networking research to readers of IEEE Network. Authors are also welcome to recommend their recently published work to the column, and papers with novel ideas, solid work, and significant contributions to the field are especially appreciated. Authors wishing to have their papers presented in the column should contact the Editor. Metamaterials are artificially engineered materials with electromagnetic (EM) properties that are not owned by natural materials, which could be composed of subwavelength-scale meta-particles arranged periodically or quasi-periodically. How to utilize such materials to enhance capabilities of communication has become an interesting issue attracting attention from both the science and engineering communities. The column in this issue focuses on recent research on electromagnetic metamaterials, in particular, Chiral Metamaterials, leaky-wave antennas, and digital coding and programmable metasurfaces. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
31. Toward ML/AI-Based Prediction of Mobile Service Usage in Next-Generation Networks.
- Author
-
Taleb, Tarik, Laghrissi, Abdelquoddouss, and Bensalem, Djamel Eddine
- Subjects
- *
FORECASTING , *NEXT generation networks , *COMPUTER architecture , *MACHINE learning , *SCIENTIFIC community - Abstract
The adoption of machine learning techniques in next-generation networks has increasingly attracted the attention of the research community. This is to provide adaptive learning and decision-making approaches to meet the requirements of different verticals, and to guarantee the appropriate performance requirements in complex mobility scenarios. In this perspective, the characterization of mobile service usage represents a fundamental step. In this vein, this paper highlights the new features and capabilities offered by the "Network Slice Planner" (NSP) in its second version [12]. It also proposes a method combining both supervised and unsupervised learning techniques to analyze the behavior of a mass of mobile users in terms of service consumption. We exploit the data provided by the NSP v2 to conduct our analysis. Furthermore, we provide an evaluation of both the accuracy of the predictor and the performance of the underlying MEC infrastructure. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
32. Service Function Chaining in 5G & Beyond Networks: Challenges and Open Research Issues.
- Author
-
Hantouti, Hajar, Benamar, Nabil, and Taleb, Tarik
- Subjects
- *
SOFTWARE-defined networking , *5G networks , *CUSTOMER services , *TECHNOLOGICAL innovations , *COMPUTER architecture - Abstract
Service Function Chaining (SFC) is a trending paradigm, which has helped to introduce unseen flexibility in telecom networks. Network service providers, as well as big network infrastructure providers, are competing to offer personalized services for their customers. Hence, added value services require the invocation of various elementary functions called Service Functions (SFs). The SFC concept composes and imposes the order in which SFs are invoked for a particular service. Emerging technologies such as Software Defined Networking and Network Function Virtualization support the dynamic creation and management of SFC. Even though SFC is an active technical area where several aspects were already standardized and many SFC architecture flavors are currently deployed, yet some challenges and open issues are still to be solved. In this paper, we present different research problems related to SFC and investigate several key challenges that should be addressed to realize more reliable SFC operations. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
33. Group Password Strength Meter Based on Attention Mechanism.
- Author
-
He, Daojing, Zhou, Beibei, Yang, Xiao, Chan, Sammy, Cheng, Yao, and Guiana, Nadra
- Subjects
- *
COMPUTER passwords , *ARTIFICIAL neural networks , *COMPUTER password security , *EVALUATION methodology , *MACHINE learning , *SECURITY systems , *PATTERN matching - Abstract
User authentication is an important means to ensure the security of users' cyber accounts. Although there are various authentication means such as irises and fingerprints, passwords are still the main authentication method for the foreseeable future due to their low cost and easy implementation. Password strength evaluation is to measure the security strength of passwords, which has been widely studied. However, we found that the current password strength evaluation methods ignore the characteristics from password creators and do not consider the impact of regional groups on password generation. In this paper, we propose the concept of group passwords to analyze the password characteristics of different groups. Based on this notion, a group-based password strength evaluation method is proposed. In addition, we analyze the vulnerabilities of largescale real-world password groups leaked in previous security incidents. The analysis results show that different password groups have different characteristics. Then, we use the attention mechanism (AM) in the neural network model to learn the dependence between group characteristics and password context features. A long short-term memory (LSTM) model with natural advantages in processing timing features is used to process the password to achieve a more accurate password strength evaluation. We demonstrate the effectiveness of groupbased password evaluation using the real-world password data sets. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
34. Peak Power Shaving for Reduced Electricity Costs in Cloud Data Centers: Opportunities and Challenges.
- Author
-
Dabbagh, Mehiar, Hamdaoui, Bechir, and Rayes, Ammar
- Subjects
- *
SERVER farms (Computer network management) , *COST control , *UNINTERRUPTIBLE power supply , *COST , *PUBLIC utilities , *ELECTRICITY , *ENERGY storage - Abstract
An electricity bill of a data center (DC) is determined not only by how much energy the DC consumes, but especially by how the consumed energy is spread over time during the billing cycle. More specifically, these electricity costs are essentially made up of two major charges: the Energy Charge, a cost based on the amount of consumed energy (in kWh), and a Peak Charge, a cost based on the maximum power (in kW) requested during the billing cycle. The latter charge component is forced to encourage DCs to balance and regulate their power demands over the billing cycle, allowing the utility company to manage congestion without increasing supply. This billing model has thus called for the development of peak power shaving approaches that reduce costs by smoothing peak power demands over the billing cycle to minimize the Peak Charge component. In this paper, we investigate peak power shaving approaches, and begin by using Google data traces to quantify and provide a real sense of how much electricity cost reduction can peak power demand shaving achieve on a Google DC cluster. We then discuss why peak power shaving is well-suited for reducing electricity costs of DCs, and describe two commonly used peak shaving approaches, namely energy storage and workload modulation. We finally identify and describe key research problems that remain unsolved and require further investigation. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
35. ZSM Security: Threat Surface and Best Practices.
- Author
-
Benzaid, Chafika and Taleb, Tarik
- Subjects
- *
BEST practices , *5G networks , *SURFACE potential , *SECURITY management , *ARTIFICIAL intelligence , *COMPUTER software reusability , *COMPUTER network security , *SECURITY systems - Abstract
The ETSI's Zero touch network and Service Management (ZSM) framework is a prominent initiative to tame the envisioned complexity in operating and managing 5G and beyond networks. To this end, the ZSM framework promotes the shift toward full Automation of Network and Service Management and Operation (ANSMO) by leveraging the flexibility of SDN/NFV technologies along with Artificial Intelligence, combined with the portability and reusability of model-driven, open interfaces. Besides its benefits, each leveraged enabler will bring its own security threats, which should be carefully tackled to make the ANSMO vision a reality. This paper introduces the ZSM's potential attack surface and recommends possible mitigation measures along with some research directions to safeguard ZSM system security. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
36. A Detailed Security Assessment of the EV Charging Ecosystem.
- Author
-
Antoun, Joseph, Kabir, Mohammad Ekramul, Moussa, Bassam, Atallah, Ribal, and Assi, Chadi
- Subjects
- *
ELECTRIC vehicles , *SECURITY systems , *DATA privacy , *ECOSYSTEMS , *SMART cities , *SUSTAINABLE transportation - Abstract
The drive for efficient, reliable, green, and connected smart cities has promoted the use of electric vehicles (EVs) as the main future means of transportation. This resulted in a breakthrough in the anticipated number of adopted EVs by the year 2020, and consequently an urge for an available and trustworthy EV charging infrastructure. The diversity of the involved players, the used technologies, the bulk data exchange, and the widespread nature of the charging network give rise to security concerns in the form of message tampering, spoofing, or delaying among others to disconcert the charging service along with the underlying power layer. Furthermore, confidentiality and privacy of user information (i.e. identity, location, payment information, etc.) is another major concern associated with the deployment and use of the charging infrastructure. Thus, there is a need to identify and classify such concerns, and devise suitable solutions for a secure charging infrastructure. In this paper, we present a security assessment of the EV charging infrastructure. We highlight and categorize cyber threats targeting different players in a charging system, along with the security solutions presented in the literature. Finally, we present a gap analysis and insights into future research directions for EV charging system security. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
37. Computational Learning Approaches for Personalized Pregnancy Care.
- Author
-
Moreira, Mario W. L., Rodrigues, Joel J. P. C., Saleem, Kashif, and Korotaev, Valery V.
- Subjects
- *
EARLY diagnosis , *PREGNANCY , *DISEASES , *CHRONICALLY ill , *DIAGNOSIS - Abstract
The increasing use of interconnected sensors to monitor patients with chronic diseases, integrated with tools for the management of shared information, can guarantee a better performance of health information systems (HISs) by performing personalized healthcare. The early diagnosis of chronic diseases such as hypertensive disorders of pregnancy represents a significant challenge in women's healthcare. Computational learning techniques are useful tools for pattern recognition in the assessment of an increasing amount of integrated data related to these diseases. Hence, in this paper, the use of machine learning (ML) techniques is proposed for the assessment of real data referred to hypertensive disorders in pregnancy. The results show that the averaged one-dependence estimator algorithm can help in the decision- making process in uncertain moments, thus improving the early detection of these chronic diseases. The best-evaluated computational learning algorithm improves the performance of HISs through its precise diagnosis. This method can be applied in electronic health (e-health) environments as a useful tool for handling uncertainty in the decision-making process related to high-risk pregnancy. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
38. Toward Slicing-Enabled Multi-Access Edge Computing in 5G.
- Author
-
Ksentini, Adlen and Frangoudis, Pantelis A.
- Subjects
- *
5G networks , *EDGES (Geometry) , *COMPUTER architecture - Abstract
Multi-access Edge Computing (MEC) and Network Slicing are two key enablers for 5G, particularly to empower low-latency services, known as Ultra-Reliable Low Latency Communications (URLLC). However, MEC and Network Slicing are evolving in parallel, and are being defined by two different standardization bodies, ETSI and 3GPP, which limits their integration and their benefits as complementary solutions. In this paper, we fill this gap by providing a novel scheme, compliant with both ETSI and 3GPP, that integrates these two key technologies and brings enhanced slicing capabilities to the edge of the 5G network. In particular, we devise a novel management and orchestration architecture, based on the latest 3GPP specifications, which integrates MEC as a 5G sub-slice. Furthermore, we highlight several issues that emerge when extending Network Slicing to the edge, security and isolation included, providing a solution for each issue. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
39. The Road beyond 5G: A Vision and Insight of the Key Technologies.
- Author
-
Samdanis, Konstantinos and Taleb, Tarik
- Subjects
- *
SERVICE-oriented architecture (Computer science) , *MARKET penetration , *TECHNOLOGY , *5G networks , *VISION , *NOISE measurement , *RADIO technology , *MICROTECHNOLOGY - Abstract
As 5G enters a stable phase in terms of system architecture, 3GPP Release 17 starts to investigate advanced features that would shape the evolution toward 6G. This paper provides an insightful analysis for mobile networks Beyond 5G (B5G) considering the advancements and implications introduced by the evolution of softwarization, agile control and deterministic services. It elaborates the 5G landscape, also investigating new business prospects and the emerging use cases, which will open new horizons for accelerating the market penetration of vertical services. It then overviews the key technologies that constitute the pillars for the evolution beyond 5G considering new radio paradigms, micro-service oriented core network, native IP based user plane, network analytics and the support of the low latency- high reliability transport layer. The open challenges considering both technical and business aspects are then overviewed, elaborating the footprint of softwarization, security and trust as well as distributed architectures and services toward 6G. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
40. AI-Driven Zero Touch Network and Service Management in 5G and Beyond: Challenges and Research Directions.
- Author
-
Benzaid, Chafika and Taleb, Tarik
- Subjects
- *
ARTIFICIAL intelligence , *5G networks , *HUMAN error , *OPERATING costs , *NEXT generation networks , *AUTOMATION , *MIXED reality - Abstract
The foreseen complexity in operating and managing 5G and beyond networks has propelled the trend toward closed-loop automation of network and service management operations. To this end, the ETSI Zero-touch network and Service Management (ZSM) framework is envisaged as a next-generation management system that aims to have all operational processes and tasks executed automatically, ideally with 100 percent automation. Artificial Intelligence (AI) is envisioned as a key enabler of self-managing capabilities, resulting in lower operational costs, accelerated time-tovalue and reduced risk of human error. Nevertheless, the growing enthusiasm for leveraging AI in a ZSM system should not overlook the potential limitations and risks of using AI techniques. The current paper aims to introduce the ZSM concept and point out the AI-based limitations and risks that need to be addressed in order to make ZSM a reality. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
41. An Edge-Computing Paradigm for Internet of Things over Power Line Communication Networks.
- Author
-
Qian, Yuwen, Shi, Long, Li, Jun, Zhou, Xiangwei, Shu, Feng, and Wang, Jiangzhou
- Subjects
- *
CARRIER transmission on electric lines , *TELECOMMUNICATION systems , *INTERNET of things , *CLOUD computing , *DATA transmission systems - Abstract
Power line communication (PLC) technology has created a niche use in the Internet of Things (IoT) by offering flexible and reliable connection among power-driven IoT devices/sensors over existing wired networks. In IoT over PLC networks, massive real-time data generated by the ever-growing connected devices will eventually pose an overwhelming burden on the IoT cloud, which in turn severely degrades the network performance. To cope with these issues, edge computing (EC) has emerged as a complement to cloud computing, aiming at offloading a portion of computing in the cloud to the network edges closer to the IoT devices. However, confronting a practical scenario that some electrical devices cannot communicate with wireless and mobile networks directly, existing EC paradigms may not be directly applied to IoT over PLC networks. In this paper, we propose a novel EC-IoT over PLC paradigm to reduce the transmission latency while migrating a portion of computing from the cloud to the edges. First, we develop a distributed EC platform to serve terminal users (TUs) in different IoT systems with various IoT services. Second, we put forth a cache-enabled scheme to store the popular contents from the cloud and edge sensors to reduce redundant data transmissions between TUs and the cloud. Finally, our experimental results demonstrate that the proposed EC-IoT over PLC network can significantly reduce energy consumption and transmission latency. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
42. Scanning the Literature.
- Author
-
Tian, Xiaohua
- Subjects
- *
LITERATURE - Abstract
Presents concise summaries of selected papers that are recently published in the field of networking. Each summary describes the paper's main idea, methodology, and technical contributions. The purpose of the column is to bring the state of the art of networking research to readers of IEEE Network. Authors are also welcome to recommend their recently published work to the column, and papers with novel ideas, solid work, and significant contributions to the field are especially appreciated. Authors wishing to have their papers presented in the column should contact the editor. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
43. Cyber Security Based on Artificial Intelligence for Cyber-Physical Systems.
- Author
-
Sedjelmaci, Hichem, Guenab, Fateh, Senouci, Sidi-Mohammed, Moustafa, Hassnaa, Liu, Jiajia, and Han, Shuai
- Subjects
- *
INTERNET security , *CYBER intelligence (Computer security) , *ARTIFICIAL intelligence , *CYBER physical systems , *COMPUTER security , *COMPUTER crimes , *FORECASTING - Abstract
The ten papers in this special issue focus on cybersecurity for cyber-physical systems (CPSs). The systems have become very complex, more sophisticated, intelligent and autonomous. They offer very complex interaction between heterogeneous cyber and physical components; additionally to this complexity, they are exposed to important disturbances due to unintentional and intentional events which make the prediction of their behaviors a very difficult task. Meanwhile, cyber security for CPS is attracting the attention of research scientists in both industry and academia since the number of cyber-attacks have increased and their behaviors have become more sophisticated, commonly known as zero-day threats. the papers in this issue aim to bring together researchers from academic and industry to share their vision of AI application in the cyber security context, and present challenges and recent works and advances related to AI-based cyber security applied to CPSs. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
44. Scanning the Literature.
- Author
-
Tian, Xiaohua
- Subjects
- *
LITERATURE - Abstract
Presents concise summaries of selected papers that are recently published in the field of networking. Each summary describes the paper's main idea, methodology, and technical contributions. The purpose of the column is to bring the state of the art of networking research to readers of IEEE Network. Authors are also welcome to recommend their recently published work to the column, and papers with novel ideas, solid work, and significant contributions to the field are especially appreciated. Authors wishing to have their papers presented in the column should contact the editor. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
45. Scanning the Literature.
- Author
-
Tian, Xiaohua
- Subjects
- *
RADIO frequency identification systems , *HUMAN skeleton , *THREE-dimensional imaging , *WIRELESS localization , *ACCIDENTAL falls , *HUMAN locomotion , *WIRELESS Internet , *BACKSCATTERING - Abstract
Presents concise summaries of selected papers that are recently published in the field of networking. Each summary describes the paper's main idea, methodology, and technical contributions. The purpose of the column is to bring the state of the art of networking research to readers of IEEE Network. Authors are also welcome to recommend their recently published work to the column, and papers with novel ideas, solid work, and significant contributions to the field are especially appreciated. Authors wishing to have their papers presented in the column should contact the editor. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
46. Multicasting over Emerging 5G Networks: Challenges and Perspectives.
- Author
-
Araniti, Giuseppe, Condoluci, Massimo, Scopelliti, Pasquale, Molinaro, Antonella, and Iera, Antonio
- Subjects
- *
5G networks , *INTERNET of things , *MULTICASTING (Computer networks) , *VIDEO downloading (Computers) , *VIDEOCONFERENCING - Abstract
The number and variety of mobile multicast applications are growing at an unprecedented and unanticipated pace. Mobile network providers are in front of a dramatic increase in multicast traffic load, and this growth is forecasted to continue in fifth-generation (5G) networks. The major challenges come from the fact that multicast traffic not only targets groups of end-user devices; it also involves machine-type communications (MTC) for the Internet of Things (IoT). The increase in the MTC load, predicted for 5G, calls into question the effectiveness of the current multimedia broadcast multicast service (MBMS). The aim of this paper is to provide a survey of 5G challenges in the view of effective management of multicast applications, and to identify how to enhance the mobile network architecture to enable multicast applications in future 5G scenarios. By accounting for the presence of both human and machine-related traffic, strengths and weaknesses of the state-of-the-art achievements in multicasting are critically analyzed to provide guidelines for future research on 5G networks and more conscious design choices. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
47. Scanning the Literature.
- Author
-
Tian, Xiaohua
- Subjects
- *
DRONE aircraft , *WIRELESS communications , *AD hoc computer networks , *CONTROL theory (Engineering) , *NEXT generation networks - Abstract
Presents concise summaries of selected papers that are recently published in the field of networking. Each summary describes the paper's main idea, methodology, and technical contributions. The purpose of the column is to bring the state of the art of networking research to readers of IEEE Network. Authors are also welcome to recommend their recently published work to the column, and papers with novel ideas, solid work, and significant contributions to the field are especially appreciated. Authors wishing to have their papers presented in the column should contact the editor. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
48. Scanning the Literature.
- Subjects
- *
COMPUTER networks , *INFORMATION networks , *PERIODICAL publishing , *PUBLISHING - Abstract
Presents concise summaries of selected papers that are recently published in the field of networking. Each summary describes the paper's main idea, methodology, and technical contributions. The purpose of the column is to bring the state of the art of networking research to readers of IEEE Network. Authors are also welcome to recommend their recently published work to the column, and papers with novel ideas, solid work, and significant contributions to the field are especially appreciated. Authors wishing to have their papers presented in the column should contact the editor. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
49. When big data meets software-defined networking: SDN for big data and big data for SDN.
- Author
-
Cui, Laizhong, Yu, F. Richard, and Yan, Qiao
- Subjects
- *
BIG data , *SOFTWARE-defined networking , *COMPUTER networks , *DATA libraries , *COMPUTER network security - Abstract
Both big data and software-defined networking (SDN) have attracted great interests from both academia and industry. These two important areas have traditionally been addressed separately in the most of previous works. However, on the one hand, the good features of SDN can greatly facilitate big data acquisition, transmission, storage, and processing. On the other hand, big data will have profound impacts on the design and operation of SDN. In this paper, we present the good features of SDN in solving several issues prevailing with big data applications, including big data processing in cloud data centers, data delivery, joint optimization, scientific big data architectures and scheduling issues. We show that SDN can manage the network efficiently for improving the performance of big data applications. In addition, we show that big data can benefit SDN as well, including traffic engineering, cross-layer design, defeating security attacks, and SDN-based intra and inter data center networks. Moreover, we discuss a number of open issues that need to be addressed to jointly consider big data and SDN in future research. [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
50. Information-centric network function virtualization over 5g mobile wireless networks.
- Author
-
Liang, Chengchao, Yu, F. Richard, and Zhang, Xi
- Subjects
- *
WIRELESS communications , *INFORMATION technology research , *COMPUTER network resources , *SOFTWARE-defined networking , *WIRELESS LANs - Abstract
Wireless network virtualization and information-centric networking (ICN) are two promising techniques in software-defined 5G mobile wireless networks. Traditionally, these two technologies have been addressed separately. In this paper we show that integrating wireless network virtualization with ICN techniques can significantly improve the end-to-end network performance. In particular, we propose an information- centric wireless network virtualization architecture for integrating wireless network virtualization with ICN. We develop the key components of this architecture: radio spectrum resource, wireless network infrastructure, virtual resources (including content-level slicing, network-level slicing, and flow-level slicing), and informationcentric wireless virtualization controller. Then we formulate the virtual resource allocation and in-network caching strategy as an optimization problem, considering the gain of not only virtualization but also in-network caching in our proposed information-centric wireless network virtualization architecture. The obtained simulation results show that our proposed information-centric wireless network virtualization architecture and the related schemes significantly outperform the other existing schemes. [ABSTRACT FROM PUBLISHER]
- Published
- 2015
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.