scholarly journals 5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks

2018 ◽  
Vol 2018 ◽  
pp. 1-21 ◽  
Author(s):  
Pablo Salva-Garcia ◽  
Jose M. Alcaraz-Calero ◽  
Qi Wang ◽  
Jorge Bernal Bernabe ◽  
Antonio Skarmeta

Internet of Things (IoT) is a key business driver for the upcoming fifth-generation (5G) mobile networks, which in turn will enable numerous innovative IoT applications such as smart city, mobile health, and other massive IoT use cases being defined in 5G standards. To truly unlock the hidden value of such mission-critical IoT applications in a large scale in the 5G era, advanced self-protection capabilities are entailed in 5G-based Narrowband IoT (NB-IoT) networks to efficiently fight off cyber-attacks such as widespread Distributed Denial of Service (DDoS) attacks. However, insufficient research has been conducted in this crucial area, in particular, few if any solutions are capable of dealing with the multiple encapsulated 5G traffic for IoT security management. This paper proposes and prototypes a new security framework to achieve the highly desirable self-organizing networking capabilities to secure virtualized, multitenant 5G-based IoT traffic through an autonomic control loop featured with efficient 5G-aware traffic filtering. Empirical results have validated the design and implementation and demonstrated the efficiency of the proposed system, which is capable of processing thousands of 5G-aware traffic filtering rules and thus enables timely protection against large-scale attacks.

Author(s):  
David Harborth ◽  
Maurice Pohl

According to Rahim Tafazolli from the University of Surrey, users can expect the “perception of infinite capacity” from the future of mobile networks. The fifth generation of mobile networks, 5G, is expected to be released in 2020 and steps up to fulfill various expectations. This article systematically reviews existing research on standardization of 5G and provides an outlook on how to continue best in the future. The review of existing literature shows areas in standardization research, like standardization from a user's perspective, that are rarely covered. In the second part, the focus shifts towards specific publications of relevant standardization organizations and stakeholders for the 5G standardization. By matching the current status of the 5G standardization with historical success factors derived in the first part, this research shows that the standardization process of 5G is on a good way but acknowledges that there is much work to do in the future.


Sensors ◽  
2020 ◽  
Vol 20 (22) ◽  
pp. 6622
Author(s):  
Gorka Velez ◽  
Ángel Martín ◽  
Giancarlo Pastor ◽  
Edward Mutafungwa

Fifth-generation (5G) mobile networks aim to be qualified as the core connectivity infrastructures to address connected automated mobility (CAM), both from a technological and from a business perspective, for the higher automation levels defined by the automotive industry. Specifically, in some territories such as the European Union the cross-border corridors have relevance, as they are the cohesive paths for terrestrial transport. Therefore, 5G for CAM applications is planned to be deployed there first. However, cross-border contexts imply paramount communication challenges, such as seamless roaming, not addressed by current technology. This paper identifies relevant future 5G enhancements, specifically those specified by Third-Generation Partnership Project (3GPP) releases beyond Release 15, and outlines how they will support the ambitions of highly automated driving in cross-border corridors. In order to conduct this study, a set of representative use cases and the related communication requirements were identified. Then, for each use case, the most relevant 5G features were proposed. Some open issues are described at the end.


2018 ◽  
Vol 2018 ◽  
pp. 1-18
Author(s):  
Lucas de Melo Guimarães ◽  
Jacir Luiz Bordim

The increasing demands for high-data rate traffic stimulated the development of the fifth-generation (5G) mobile networks. The envisioned 5G network is expected to meet its challenge by devising means to further improve spectrum usage. Many alternatives to enhance spectrum usage are being researched, such as massive MIMO, operation in mmWave frequency, cognitive radio, and the employment of full-duplex antennas. Efficient utilization of the potential of any of these technologies faces a set of challenges related to medium access control (MAC) schemes. This work focuses on MAC schemes tailored for full-duplex antennas, since they are expected to play a major role in the foreseeable 5G networks. In this context, this paper presents a MAC layer technique to improve total transmission time when full-duplex antennas are employed. Several evaluations in different scenarios are conducted to assess the proposed MAC scheme. Numerical results show that the proposed scheme provides gains up to 156% when compared to a state-of-the-art full-duplex antenna MAC protocol. Compared to traditional half-duplex antenna MAC protocols, the proposed scheme yields gain up to 412%.


2020 ◽  
Vol 10 (17) ◽  
pp. 5971 ◽  
Author(s):  
Sven Kuehn ◽  
Serge Pfeifer ◽  
Niels Kuster

In this study, the total electromagnetic dose, i.e., the combined dose from fixed antennas and mobile devices, was estimated for a number of hypothetical network topologies for implementation in Switzerland to support the deployment of fifth generation (5G) mobile communication systems while maintaining exposure guidelines for public safety. In this study, we consider frequency range 1 (FR1) and various user scenarios. The estimated dose in hypothetical 5G networks was extrapolated from measurements in one of the Swiss 4G networks and by means of Monte Carlo analysis. The results show that the peak dose is always dominated by an individual’s mobile phone and, in the case of non-users, by the bystanders’ mobile phones. The reduction in cell size and the separation of indoor and outdoor coverage can substantially reduce the total dose by >10 dB. The introduction of higher frequencies in 5G mobile networks, e.g., 3.6 GHz, reduces the specific absorption rate (SAR) in the entire brain by an average of −8 dB, while the SAR in the superficial tissues of the brain remains locally constant, i.e., within ±3 dB. Data from real networks with multiple-input multiple-output (MIMO) were not available; the effect of adaptive beam-forming antennas on the dose will need to be quantitatively revisited when 5G networks are fully established.


2021 ◽  
Author(s):  
Nicolai Spicher ◽  
Michael Schweins ◽  
Lennart Thielecke ◽  
Thomas Kurner ◽  
Thomas M. Deserno

2019 ◽  
pp. 689-693
Author(s):  
Veselka Stoyanova

The Internet of Things (IoT) will connect not only computers and mobile devices, but it will also interconnect smart buildings, homes, and cities, as well as electrical grids, gas, and water networks, automobiles, airplanes, etc. IoT will lead to the development of a wide range of advanced information services that need to be processed in real-time and require data centers with large storage and computing power. In this paper, we present an IoT security framework for smart infrastructures such as Smart Homes (SH) and smart buildings (SB). I also present a general threat model that can be used to develop a security protection methodology for IoT services against cyber-attacks (known or unknown).


2017 ◽  
Vol 15 (2) ◽  
pp. 1-24 ◽  
Author(s):  
David Harborth ◽  
Maurice Pohl

According to Rahim Tafazolli from the University of Surrey, users can expect the “perception of infinite capacity” from the future of mobile networks. The fifth generation of mobile networks, 5G, is expected to be released in 2020 and steps up to fulfill various expectations. This article systematically reviews existing research on standardization of 5G and provides an outlook on how to continue best in the future. The review of existing literature shows areas in standardization research, like standardization from a user's perspective, that are rarely covered. In the second part, the focus shifts towards specific publications of relevant standardization organizations and stakeholders for the 5G standardization. By matching the current status of the 5G standardization with historical success factors derived in the first part, this research shows that the standardization process of 5G is on a good way but acknowledges that there is much work to do in the future.


2021 ◽  
Author(s):  
Regonda Nagaraju ◽  
Selvanayaki Kolandapalayam Shanmugam ◽  
Sivaram Rajeyyagari ◽  
Jupeth Toriano Pentang ◽  
B Kiran Bala ◽  
...  

Abstract E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An established validation and management system could face a single failure point and the system is prone to Distributed Denial of Service Attacks (DDoS), denial of service attacks (DoS), malware and other cyber attacks. The execution of a privacy preserving and a secure decentralized system is enabled by the block chain technology. Here any third-party organizations do not have any control over the transactions of the Government. With the help of block chain technology, new and existing data are encapsulated within ledger or blocks, which are evenly distributed through the network in an enduring and sustainable way. The privacy and security of information are improved with the help of block chain technology, where distribution and encryption of data are performed through the total network. This analytical paper maps out the analysis of the security in the e-government system, utilizing the block chain technology that provides privacy and security of information and thereby enhancing the trust among the public sector. Qualitative and theoretical analysis is made for the proposed topic and implications of privacy and security of the proposed system is made.


2020 ◽  
Author(s):  
◽  
Alicia Esquivel-Morel

[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI--COLUMBIA AT REQUEST OF AUTHOR.] Unmanned Aerial Vehicle (UAV) systems with high-resolution video cameras are used for many operations such as aerial imaging, search and rescue, and precision agriculture. Multi-drone systems operating in Flying Ad Hoc Networks (FANETS) are inherently insecure and require efficient and end-to-end security schemes to defend against cyber-attacks (i.e., Man-in-the-middle (MITM), Replay and Denial of Service (DoS) attacks). In this work, we propose a cloud-based, intelligent security framework viz., "DroneNet-Sec" that provides network-edge connectivity and computation security for drone video analytics to defend against common attack vectors in UAV systems. The proposed framework includes three main research thrusts: (i) a secure hybrid testbed management that synergies simulation and emulation via an open-source network simulator (NS3) and a research platform for mobile wireless networks (POWDER), (ii) an intelligent and dynamic decision algorithm based on machine learning to detect anomaly events without decreasing the performance in a real-time FANET deployment, and (iii) a web-based experiment control module that features a graphical user interface to assist experimenters in the execution/visualization of repeatable and high-scale UAV security experiments. Our performance evaluation experiments in a holistic hybrid-testbed show that our proposed security framework successfully detects anomaly events and effectively protects containerized tasks execution in drones video analytics in a light-weight manner.


Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 567
Author(s):  
Muhammad Husnain ◽  
Khizar Hayat ◽  
Enrico Cambiaso ◽  
Ubaid U. Fayyaz ◽  
Maurizio Mongelli ◽  
...  

The advancement in the domain of IoT accelerated the development of new communication technologies such as the Message Queuing Telemetry Transport (MQTT) protocol. Although MQTT servers/brokers are considered the main component of all MQTT-based IoT applications, their openness makes them vulnerable to potential cyber-attacks such as DoS, DDoS, or buffer overflow. As a result of this, an efficient intrusion detection system for MQTT-based applications is still a missing piece of the IoT security context. Unfortunately, existing IDSs do not provide IoT communication protocol support such as MQTT or CoAP to validate crafted or malformed packets for protecting the protocol implementation vulnerabilities of IoT devices. In this paper, we have designed and developed an MQTT parsing engine that can be integrated with network-based IDS as an initial layer for extensive checking against IoT protocol vulnerabilities and improper usage through a rigorous validation of packet fields during the packet-parsing stage. In addition, we evaluate the performance of the proposed solution across different reported vulnerabilities. The experimental results demonstrate the effectiveness of the proposed solution for detecting and preventing the exploitation of vulnerabilities on IoT protocols.


Sign in / Sign up

Export Citation Format

Share Document