A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment
2017
International Journal of Web and Grid Services
In this paper, we present the types of real threats on a 4G mobile grid computing environment that uses a GTP protocol and provides algorithms studied to protect the network from such threats. ...
In particular, a 4G network is exposed to multiple forms of attacks that can maliciously use a GPRS Tunneling Protocol (GTP), which is used in LTE communications. ...
We analyse the threats on a 4G grid environment using the GTP protocol and present the tested results for a real network in Section 3. ...
doi:10.1504/ijwgs.2017.082060
fatcat:igjjikle4jc2tfz6grt6espgbe
Will SDN be part of 5G?
2018
IEEE Communications Surveys and Tutorials
This paper provides a comprehensive survey on the state of the art of SDNbased mobile networks and clearly points out the gaps in the technology. ...
This survey is different from the previous surveys on SDN-based mobile networks as it focuses on the salient problems and discusses solutions proposed within and outside SDN literature. ...
On the other hand, the SDN controller provides unprecedented opportunities to develop adaptive and dynamic countermeasures for security threats. ...
doi:10.1109/comst.2018.2836315
fatcat:4pto3cjdffebhbqxiuav44pm74
Will SDN be part of 5G?
[article]
2018
arXiv
pre-print
This paper provides a comprehensive survey on the state of the art of SDN-based RAN and clearly points out the gaps in the technology. ...
This survey is different from the previous surveys on SDN-based RAN as it focuses on the salient problems and discusses solutions proposed within and outside SDN literature. ...
On the other hand, the SDN controller provides unprecedented opportunities to develop adaptive and dynamic countermeasures for security threats. ...
arXiv:1708.05096v2
fatcat:keyjxky2u5gobgeehu6zl2z6xq
A Survey on XAI for Beyond 5G Security: Technical Aspects, Use Cases, Challenges and Research Directions
[article]
2023
arXiv
pre-print
, from IoT devices and edge computing to cloud-based infrastructures. ...
However, existing B5G ML-security surveys tend to place more emphasis on AI/ML model performance and accuracy than on the models' accountability and trustworthiness. ...
ACKNOWLEDGEMENT This work is partly supported by European Union in SPA-TIAL Project (Grant No: 101021808), Academy of Finland in 6Genesis (grant no. 318927) and Science Foundation Ireland under CONNECT ...
arXiv:2204.12822v2
fatcat:5d7zsklqrrg4bplpnfgrvmigee
Deep Neural Mobile Networking
[article]
2020
arXiv
pre-print
This makes monitoring and managing the multitude of network elements intractable with existing tools and impractical for traditional machine learning algorithms that rely on hand-crafted feature engineering ...
In this context, embedding machine intelligence into mobile networks becomes necessary, as this enables systematic mining of valuable information from mobile big data and automatically uncovering correlations ...
conduct our experiments on real-world 3G/4G mobile network traffic collected by a major operator in a large European metropolitan area during 85 consecutive days, as we discuss in Sec. 4.2.1. ...
arXiv:2011.05267v1
fatcat:yz2zp5hplzfy7h5kptmho7mbhe
AI and ML – Enablers for Beyond 5G Networks
2020
Zenodo
They are typically used to model complex relationships between input and output parameters of a system or to find patterns in data. ...
In the sequel the white paper elaborates on use case and optimisation problems that are being tackled with AI/ML, partitioned in three major areas, namely: network planning, network diagnostics/insights ...
Besides, it can also be used for threat comparison and analysis. ...
doi:10.5281/zenodo.4299895
fatcat:ngzbopfm6bb43lnrmep6nz5icm
Research on Evolved Security Threats and Solutions for Healthcare IoT (IoMT)
2022
In other words, S-GW is an IP router with support for a mobile-specific tunneling protocol (GTP) and charging functionality. ...
computers and Electronics on one platform. ...
However, there is a need to develop new security mechanisms to make the system robust and secure. The report presents research on evolved security threats and solutions for Healthcare IoT (IoMT). ...
doi:10.7939/r3-gqct-1n34
fatcat:4ozdhj2qizdfhjx6zzeen24gve
Design, Implementation, and Research on Security Vulnerabilities of Smart Water Meter Network
2022
Furthermore, we studied how massive IoT will be built on top of NB-IoT and one use case of massive IoT. ...
The fourth-generation (4G) provides access to a wide range of telecommunication services, including advanced mobile services, which are supported by increasingly packet-based mobile and fixed networks, ...
GTP-U carries the protocol data units between NG-RAN and UPF. ...
doi:10.7939/r3-cwvm-zt68
fatcat:iy5kddfrh5fdhfiquov4ca4pvy
ICNS 2014 Committee ICNS Advisory Chairs
ICNS 2014 The Tenth International Conference on Networking and Services Foreword The Tenth International Conference on Networking and Services
unpublished
Grids offer a uniform interface to a distributed collection of heterogeneous computational, storage and network resources. ...
a series of events targeting general networking and services aspects in multi-technologies environments. ...
based on GTP and WLAN Access In 3 PP T [11] , S2a mobility based on GTP and WLAN Access is studied: The addition of an S2a based on GTP option. ...
fatcat:odq26lgfineyjbq5asllvoyzey
The University of Texas at Dallas-Richardson, USA Monique P. Fargues, Naval Postgraduate School
CTRQ 2011 The Fourth International Conference on Communication Theory, Reliability, and Andras Farago
unpublished
Successful deployment of communication mechanisms guarantees a decent network stability and offers a reasonable control on the quality of service expected by the end users. ...
The processing and transmission speed and increasing memory capacity might be a satisfactory solution on the resources needed to deliver ubiquitous services, under guaranteed reliability and satisfying ...
ACKNOWLEDGMENT The authors thank to all the members of ETSI STF 360, and also thank to the members of ANR's project UBIS for their work on our platform. ...
fatcat:elfp25yypbb6jkaytdpm4aa6l4
Dagstuhl Reports, Volume 4, Issue 11, November 2014, Complete Issue
[article]
2015
There is no 4G service in the area. The mobile data charges are also expensive. ...
for expressing interactions between mobile entities in not well-stirred environments. ...
The algorithm and software can also be used as an on-line POMDP solver when there's no changes in the model.
Participants ...
doi:10.4230/dagrep.4.11
fatcat:zzps76cx7rfldla5z5dikvsqbe
dtec.bw-Beiträge der Helmut-Schmidt-Universität / Universität der Bundeswehr Hamburg: Forschungsaktivitäten im Zentrum für Digitalisierungs- und Technologieforschung der Bundeswehr dtec.bw - Band 1 · 2022
[article]
2022
Finally, the collaboration with industrial partners will allow for a fast transfer into real production environments. ...
in one digital description and computerized process chain. ...
We also gratefully acknowledge the support of the entire project team, the Fab City Hamburg e.V. and the HSU administration that help us realizing this project. ...
doi:10.24405/14522
fatcat:s4hq2okqcjfdxlnymxvgbkoani