Hierarchical, virtualised and distributed intelligence 5G architecture for low-latency and secure applications (original) (raw)
Related papers
2016 European Conference on Networks and Communications (EuCNC), 2016
5G networks aims to tackle the complex demands of emerging business paradigms, such as Smart Cities, eHealth, and Industry 4.0. In this paper, a hierarchical, distributedintelligence 5G architecture is described, offering low latency, security, and open access as features intrinsic to its design. SDN and NFV principles are employed to create a networking solution applicable to a large number of high-specification 5G use case scenarios.
Ultra-low latency 5G CHARISMA architecture for secure intelligent transportation verticals
2017
We describe low end-to-end latencies of 6.69 ms in the 5G CHARISMA network, that has been optimised for both device and system technologies speed, as well as with its virtualised, hierarchical and distributed, edge-centric architecture, that processes data as near as possible to their source and destination. Such an ultra-high speed 5G network can be utilised in intelligent transport system (ITS) applications, and we describe a public transport bus-based use case that takes advantage of the CHARISMA capabilities.
White Paper: Intelligent Security Architecture for 5G and Beyond Networks
2020
5G's capabilities and flexibility hold the promise of further facilitating the society's digitalization by enabling new services (e.g. remote surgery, advanced industrial applications) and communication modes (e.g. gestures, facial expressions and haptics). Current wireless communication systems do not meet the performance requirements of these new services, such as bandwidth, latency and reliability. Furthermore, the current COVID-19 crisis has fundamentally changed the way the world communicates and operates, accelerating the shift towards a more digital world. Such shift and the new requirements make the need of reliable and high-quality digital services promised by 5G more crucial than ever.<br> To fulfil 5G promises, a shift towards full automation of network and service management and operation is a necessity. However, a major challenge facing full automation is the protection of the network and system assets – services, data and network infrastructure – against ...
5G-Connected Virtualized Enterprise Infrastructure for Smart City
2018
In 5G context, Mobile Service Providers should provide future mobile networks that can support at least the following four demands: mobile broadband, ultra-low latency, dense broadband and massive connectivity. This paper is proposing a “all-in-one” solution that could deliver all the services, to every device, everywhere in the network in a viable option, from the Enterprise Network Segment perspective. The main role of this Segment will be to identify the key vertical sectors’ requirements, anticipating relevant trends early and mapping them into the 5G architecture. From the enterprise networks perspective, the challenge regarding 5G is to provide end-to-end network and cloud infrastructure slices over the physical infrastructure in order to fulfil specific requirements for the 5G use cases. In our case, the Enterprise Segment for Smart City will connect sensors, machines, city administrations and citizens to cloud-based IoT applications and we will prototype it. Our IoT platform...
A Security Architecture for 5G Networks
IEEE Access, 2018
5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarization, including network function virtualization and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modeling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of a large number of IoT devices and network softwarization.
Scrutinizing 5G Security Systems for V2X (Iot) Applications
2019
1Aishwarya Kshirsagar – Mtech Information security, VIT Vellore 2Dr.K.Rajakumar, Associate Professor, SCOPE, VIT Vellore, Tamil Nadu, India ------------------------------------------------------------------***-------------------------------------------------------------------Abstract The Internet of Things (IoT), uses a set of technologies permitting sensors, actuators, people, and alternative virtual entities to connect to the web. conjointly denotes a dynamic world network infrastructure with self-configuring capabilities, wherever users, data, processes, and things have identities, physical attributes, abstract personalities, intelligence, and network interfaces. Security could be a primary concern for the networks aiming at the employment of Cellular (C) services for connecting Vehicles to Everything (V2X). At present, C-V2X is perceptive a paradigm shift from long-run Evolution (LTE) – Evolved Universal Terrestrial Radio Access Network (E-UTRAN) to Fifth Generation (5G) primari...
Virtual security as a service for 5G verticals
2018 IEEE Wireless Communications and Networking Conference (WCNC), 2018
The future 5G systems ought to meet diverse requirements of new industry verticals, such as Massive Internet of Things (IoT), broadband access in dense networks and ultrareliable communications. Network slicing is an important concept that is expected to support these 5G verticals and cope with the conflicting requirements of their respective services. Network slicing allows the deployment of multiple virtual networks, or slices, over the same physical infrastructure as well as supporting on-demand resource allocation to those slices. In this paper, we propose an architecture that will explore how both Network Function Virtualization (NFV) and Software Defined Networking (SDN) may be leveraged to secure a network slice on-demand, addressing the new security concerns imposed to the network management by the flexibility and elasticity support. Our proposed framework aims to ensure an optimal resource allocation that manages the slice security strategy in an efficient way. Moreover, experimental performance evaluations are presented to evaluate the security overhead in virtualized environments.
5GinFIRE: An End-to-End Open5G Vertical Network Function Ecosystem
Ad Hoc Networks
Advanced communication networks, such as 5G and beyond, will be a complex ecosystem made of multiple physically interconnected elements, implying that the upcoming network will have to address capabilities such as flexibility, programmability and extensibility. This article, describes an Open and Extensible 5G Network Function Virtualisation (NFV) based Reference ecosystem of experimental facilities, named 5GinFIRE, that integrates existing facilities with new vertical-specific ones but also lays down the foundations for instantiation fully softwarised architectures of vertical industries and experimenting with them. Additionally, we present 5GinFIRE as the forerunner experimental playground, together with three uses cases, wherein new components, architecture designs and APIs may be tried and proposed before they are ported to more industrially mainstream 5G networks that are expected to emerge in large scale.
5G Applications: Requirements, Challenges, and Outlook
2018
The increasing demand for mobile network capacity driven by Internet of Things (IoT) applications results in the need for understanding better the potential and limitations of 5G networks. Vertical application areas like smart mobility, energy networks, industrial IoT applications, and AR/VR enhanced services all pose different requirements on the use of 5G networks. Some applications need low latency, whereas others need high bandwidth or security support. The goal of this paper is to identify the requirements and to understand the limitations for 5G driven applications. We review application areas and list the typical challenges and requirements posed on 5G networks. A main challenge will be to develop a network architecture being able to dynamically adapt to fluctuating traffic patterns and accommodating various technologies such as edge computing, blockchain based distributed ledger, software defined networking, and virtualization. To inspire future research, we reveal open prob...
The Disruptions of 5G on Data-Driven Technologies and Applications
IEEE Transactions on Knowledge and Data Engineering, 2020
With 5G on the verge of being adopted as the next mobile network, there is a need to analyze its impact on the landscape of computing and data management. In this paper, we analyze the impact of 5G on both traditional and emerging technologies and project our view on future research challenges and opportunities. With a predicted increase of 10-100x in bandwidth and 5-10x decrease in latency, 5G is expected to be the main enabler for smart cities, smart IoT and efficient healthcare, where machine learning is conducted at the edge. In this context, we investigate how 5G can help the development of federated learning. Network slicing, another key feature of 5G, allows running multiple isolated networks on the same physical infrastructure. However, security remains the main concern in the context of virtualization, multi-tenancy and high device density. Formal verification of 5G networks can be applied to detect security issues in massive virtualized environments. In summary, 5G will make the world even more densely and closely connected. What we have experienced in 4G connectivity will pale in comparison to the vast amounts of possibilities engendered by 5G.