Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








12 Hits in 7.5 sec

Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment

Seongmin Park, Sekwon Kim, Kyungho Son, Hwankuk Kim, Junyoung Park, Kangbin Yim
2017 International Journal of Web and Grid Services  
In this paper, we present the types of real threats on a 4G mobile grid computing environment that uses a GTP protocol and provides algorithms studied to protect the network from such threats.  ...  In particular, a 4G network is exposed to multiple forms of attacks that can maliciously use a GPRS Tunneling Protocol (GTP), which is used in LTE communications.  ...  We analyse the threats on a 4G grid environment using the GTP protocol and present the tested results for a real network in Section 3.  ... 
doi:10.1504/ijwgs.2017.082060 fatcat:igjjikle4jc2tfz6grt6espgbe

Will SDN be part of 5G?

Zainab Zaidi, Vasilis Friderikos, Zarrar Yousaf, Simon Fletcher, Mischa Dohler, Hamid Aghvami
2018 IEEE Communications Surveys and Tutorials  
This paper provides a comprehensive survey on the state of the art of SDNbased mobile networks and clearly points out the gaps in the technology.  ...  This survey is different from the previous surveys on SDN-based mobile networks as it focuses on the salient problems and discusses solutions proposed within and outside SDN literature.  ...  On the other hand, the SDN controller provides unprecedented opportunities to develop adaptive and dynamic countermeasures for security threats.  ... 
doi:10.1109/comst.2018.2836315 fatcat:4pto3cjdffebhbqxiuav44pm74

Will SDN be part of 5G? [article]

Zainab Zaidi, Vasilis Friderikos, Zarrar Yousaf, Simon Fletcher, Mischa Dohler, Hamid Aghvami
2018 arXiv   pre-print
This paper provides a comprehensive survey on the state of the art of SDN-based RAN and clearly points out the gaps in the technology.  ...  This survey is different from the previous surveys on SDN-based RAN as it focuses on the salient problems and discusses solutions proposed within and outside SDN literature.  ...  On the other hand, the SDN controller provides unprecedented opportunities to develop adaptive and dynamic countermeasures for security threats.  ... 
arXiv:1708.05096v2 fatcat:keyjxky2u5gobgeehu6zl2z6xq

A Survey on XAI for Beyond 5G Security: Technical Aspects, Use Cases, Challenges and Research Directions [article]

Thulitha Senevirathna, Vinh Hoa La, Samuel Marchal, Bartlomiej Siniarski, Madhusanka Liyanage, Shen Wang
2023 arXiv   pre-print
, from IoT devices and edge computing to cloud-based infrastructures.  ...  However, existing B5G ML-security surveys tend to place more emphasis on AI/ML model performance and accuracy than on the models' accountability and trustworthiness.  ...  ACKNOWLEDGEMENT This work is partly supported by European Union in SPA-TIAL Project (Grant No: 101021808), Academy of Finland in 6Genesis (grant no. 318927) and Science Foundation Ireland under CONNECT  ... 
arXiv:2204.12822v2 fatcat:5d7zsklqrrg4bplpnfgrvmigee

Deep Neural Mobile Networking [article]

Chaoyun Zhang
2020 arXiv   pre-print
This makes monitoring and managing the multitude of network elements intractable with existing tools and impractical for traditional machine learning algorithms that rely on hand-crafted feature engineering  ...  In this context, embedding machine intelligence into mobile networks becomes necessary, as this enables systematic mining of valuable information from mobile big data and automatically uncovering correlations  ...  conduct our experiments on real-world 3G/4G mobile network traffic collected by a major operator in a large European metropolitan area during 85 consecutive days, as we discuss in Sec. 4.2.1.  ... 
arXiv:2011.05267v1 fatcat:yz2zp5hplzfy7h5kptmho7mbhe

AI and ML – Enablers for Beyond 5G Networks

Alexandros Kaloxylos, Anastasius Gavras, Daniel Camps Mur, Mir Ghoraishi, Halid Hrasnica
2020 Zenodo  
They are typically used to model complex relationships between input and output parameters of a system or to find patterns in data.  ...  In the sequel the white paper elaborates on use case and optimisation problems that are being tackled with AI/ML, partitioned in three major areas, namely: network planning, network diagnostics/insights  ...  Besides, it can also be used for threat comparison and analysis.  ... 
doi:10.5281/zenodo.4299895 fatcat:ngzbopfm6bb43lnrmep6nz5icm

Research on Evolved Security Threats and Solutions for Healthcare IoT (IoMT)

Sukhpreet Kaur Khalsa
2022
In other words, S-GW is an IP router with support for a mobile-specific tunneling protocol (GTP) and charging functionality.  ...  computers and Electronics on one platform.  ...  However, there is a need to develop new security mechanisms to make the system robust and secure. The report presents research on evolved security threats and solutions for Healthcare IoT (IoMT).  ... 
doi:10.7939/r3-gqct-1n34 fatcat:4ozdhj2qizdfhjx6zzeen24gve

Design, Implementation, and Research on Security Vulnerabilities of Smart Water Meter Network

Sparsh Sharma
2022
Furthermore, we studied how massive IoT will be built on top of NB-IoT and one use case of massive IoT.  ...  The fourth-generation (4G) provides access to a wide range of telecommunication services, including advanced mobile services, which are supported by increasingly packet-based mobile and fixed networks,  ...  GTP-U carries the protocol data units between NG-RAN and UPF.  ... 
doi:10.7939/r3-cwvm-zt68 fatcat:iy5kddfrh5fdhfiquov4ca4pvy

ICNS 2014 Committee ICNS Advisory Chairs

France Chamonix, Tao Zheng, Pedro Andrés, Aranda Gutiérrez, Telefónica I+d -Madrid, Spain Carlos, Becker Westphall, Abdulrahman Yarali, Emmanuel Bertin, Rui Aguiar, Iain Murray, Pedro Andrés (+165 others)
ICNS 2014 The Tenth International Conference on Networking and Services Foreword The Tenth International Conference on Networking and Services   unpublished
Grids offer a uniform interface to a distributed collection of heterogeneous computational, storage and network resources.  ...  a series of events targeting general networking and services aspects in multi-technologies environments.  ...  based on GTP and WLAN Access In 3 PP T [11] , S2a mobility based on GTP and WLAN Access is studied: The addition of an S2a based on GTP option.  ... 
fatcat:odq26lgfineyjbq5asllvoyzey

The University of Texas at Dallas-Richardson, USA Monique P. Fargues, Naval Postgraduate School

Pascal Lorenz, Eugen Borcoci, Javier Del, Ser Lorente, Michel Diaz, France Ghita, Pascal Lorenz, Joel Rodrigues, Zary Segall, Maria Striki, Eugen Borcoci, Joel Rodrigues (+44 others)
CTRQ 2011 The Fourth International Conference on Communication Theory, Reliability, and Andras Farago   unpublished
Successful deployment of communication mechanisms guarantees a decent network stability and offers a reasonable control on the quality of service expected by the end users.  ...  The processing and transmission speed and increasing memory capacity might be a satisfactory solution on the resources needed to deliver ubiquitous services, under guaranteed reliability and satisfying  ...  ACKNOWLEDGMENT The authors thank to all the members of ETSI STF 360, and also thank to the members of ANR's project UBIS for their work on our platform.  ... 
fatcat:elfp25yypbb6jkaytdpm4aa6l4

Dagstuhl Reports, Volume 4, Issue 11, November 2014, Complete Issue [article]

2015
There is no 4G service in the area. The mobile data charges are also expensive.  ...  for expressing interactions between mobile entities in not well-stirred environments.  ...  The algorithm and software can also be used as an on-line POMDP solver when there's no changes in the model. Participants  ... 
doi:10.4230/dagrep.4.11 fatcat:zzps76cx7rfldla5z5dikvsqbe

dtec.bw-Beiträge der Helmut-Schmidt-Universität / Universität der Bundeswehr Hamburg: Forschungsaktivitäten im Zentrum für Digitalisierungs- und Technologieforschung der Bundeswehr dtec.bw - Band 1 · 2022 [article]

(:Unkn) Unknown, Helmut-Schmidt-Universität Hamburg, Detlef Schulz, Alexander Fay, Wenzel Matiaske, Manuel Schulz
2022
Finally, the collaboration with industrial partners will allow for a fast transfer into real production environments.  ...  in one digital description and computerized process chain.  ...  We also gratefully acknowledge the support of the entire project team, the Fab City Hamburg e.V. and the HSU administration that help us realizing this project.  ... 
doi:10.24405/14522 fatcat:s4hq2okqcjfdxlnymxvgbkoani