scholarly journals Secure Drone Network Edge Service Architecture Guaranteed by DAG-Based Blockchain for Flying Automation under 5G

Sensors ◽  
2020 ◽  
Vol 20 (21) ◽  
pp. 6209
Author(s):  
Ying Gao ◽  
Yangliang Liu ◽  
Quansi Wen ◽  
Hongliang Lin ◽  
Yijian Chen

With the development of the Internet of Things (IoT), the number of drones, as a consumer-level IoT device, is rapidly increasing. The existence of a large number of drones increases the risk of misoperation during manual control. Therefore, it has become an inevitable trend to realize drone flying automation. Drone flying automation mainly relies on massive drone applications and services as well as third-party service providers, which not only complicate the drone network service environment but also raise some security and privacy issues. To address these challenges, this article proposes an innovative architecture called Secure Drone Network Edge Service (SDNES), which integrates edge computing and blockchain into the drone network to provide real-time and reliable network services for drones. To design a feasible and rational SDNES architecture, we first consider the real-time performance and apply edge computing technology in it to provide low-latency edge services for drones under 5G mobile network. We use DAG-based blockchain to guarantee the security and reliability of the drone network service environment and effectively avoid malicious behaviors. In order to illustrate the feasibility of this architecture, we design and implement a specific service case named Drone Collision Avoidance Navigation Service based on SDNES. Finally, a simulation experiment for the specific service case and a series of other performance-related experiments were carried out to verify the feasibility and rationality of our proposed architecture. The experimental results demonstrate that SDNES is a promising architecture to assist and accelerate drone flying automation.

Network ◽  
2021 ◽  
Vol 1 (2) ◽  
pp. 75-94
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to the edge for quick, seamless, and secure access. After being granted access to a service, the end-user will be able to cache and share data with other users. However, security measures should be in place for SP not only to secure the provisioning and access of those services but also, should be able to restrict what the end-users can do with the accessed data in or out of coverage. This can be facilitated by federated service authorization and access control mechanisms that restrict the caching and sharing of data accessed by the UE in different security domains. In this paper, we propose a Data Caching and Sharing Security (DCSS) protocol that leverages federated authorization to provide secure caching and sharing of data from multiple SPs in multiple security domains. We formally verify the proposed DCSS protocol using ProVerif and applied pi-calculus. Furthermore, a comprehensive security analysis of the security properties of the proposed DCSS protocol is conducted.


2021 ◽  
pp. 178359172110553
Author(s):  
Ishani Patharia ◽  
Anjana Pandey ◽  
Sanjay Gupta

Technological developments have a major impact on user behavior. The rapidly evolving communication system and technology have provided numerous choices for people. The ever-shifting changes in the generation of communication networks have posed challenges for mobile network service providers to attract and retain customers. This study aims to prioritize the determinants of the adoption of mobile network service providers using the unified theory of acceptance and use of technology (UTAUT-2). In this study, data were collected from 660 mobile phone users in Haryana, India. A fuzzy analytical hierarchy process (F-AHP) was applied to arrange the priority or rank the factors based on the significance of the factors in explaining the adoption of mobile network service providers. Results of the study reveal that efforts expectancy is the highest-ranked and prioritized factor for the adoption of mobile network service providers followed by performance expectancy and facilitating conditions. However, social influence emerged as the least important factor. The present study provides theoretical implications for future researchers by synthesizing and prioritizing the important factors affecting technology acceptance. The practical implications offer a clearer insight to marketers for developing focused pragmatic strategies to retain customer loyalty. The study has considered only UTAUT-2 model constructs and used the F-AHP technique. Other factors may be considered in future studies. Other priority analysis techniques can also be used such as ISM and MICMAC analysis for further study. The research has been conducted in Haryana, India, and therefore, it needs to be tested in other areas/countries for generalizability. JEL Classification: O1, O2, O4


Author(s):  
А.А. ХАКИМОВ ◽  
А.С. МУТХАННА ◽  
А.И. ВЫБОРНОВА

Рассмотрена возможность размещения интернет-сервисов как на удаленных облаках, так и на распределенных граничных вычислительных системах. Предложена динамическая топология сети и размещения сервисов в граничных вычислительных системах с использованием генетического алгоритма для анализа и прогнозирования трафика сервисов. Представлены эффективные методы прогнозирования и предиктивной миграции сервисов для граничных вычислительных систем. Проанализированы проблемы построения высоконагруженных сетей и метода их решения путем выгрузки сервисов на граничные периферийные устройства. Предложена модель взаимодействий оператора сети и сторонних сервис-провайдеров для оптимальной выгрузки услуг. Показано, что эффективность сетевого оборудования может быть увеличена более чем на 30%. The possibility of hosting Internet services both in remote clouds and in distributed edge computing systems is considered. Dynamic network topology and placement of services in edge computing systems using a genetic algorithm to analyze and predict service traffic are proposed. Effective methods for forecasting and predictive migration of services for edge computing systems are presented. An analysis of the problems of constructing high-load networks and the method of their solution by offloading services to edge peripheral devices are given. A model of interactions between the network operator and third-party service providers for optimal offloading of services is proposed. It is shown that the efficiency of network equipment can be increased by more than 30%.


2013 ◽  
pp. 258-294
Author(s):  
George Kakaletris ◽  
Dimitris Varoutas ◽  
Dimitris Katsianis ◽  
Thomas Sphicopoulos

The globally observed recession of mobile services market has pushed mobile network operators into looking for opportunities to provide value added services on top of their high cost infrastructures. Recent advances in mobile positioning technologies enable services that make use of the mobile user location information, offering intuitive, attractive applications to the potential customer. Mobile tourism services are among the primary options to be considered by service providers for this new market. This chapter presents the key concepts, capabilities, and considerations of infrastructures and applications targeted to the mobile tourist, covering data and content delivery, positioning, systems’ interactions, platforms, protocols, security, and privacy as well as business modelling aspects.


2020 ◽  
Vol 16 (1) ◽  
pp. 116-141
Author(s):  
Bertin Martens ◽  
Frank Mueller-Langer

Abstract Before the arrival of digital car data, car manufacturers had already partly foreclosed the maintenance market through franchising contracts with a network of exclusive official dealers. EU regulation endorsed this foreclosure but mandated access to maintenance data for independent service providers to keep competition in these markets. The arrival of digital car data upsets this balance because manufacturers can collect real-time maintenance data on their servers and send messages to drivers. These can be used to price discriminate and increase the market share of official dealers. There are at least four alternative technical gateways that could give independent service providers similar data access options. However, they suffer in various degrees from data portability issues, switching costs and weak network effects, and insufficient economies of scale and scope in data analytics. Multisided third-party consumer media platforms appear to be better placed to overcome these economic hurdles, provided that an operational real-time data portability regime could be established.


2019 ◽  
Vol 9 (11) ◽  
pp. 2308 ◽  
Author(s):  
Juyong Lee ◽  
Daeyoub Kim ◽  
Jihoon Lee

Recently, new mobile applications and services have appeared thanks to the rapid development of mobile devices and mobile network technology. Cloud computing has played an important role over the past decades, providing powerful computing capabilities and high-capacity storage space to efficiently deliver these mobile services to mobile users. Nevertheless, existing cloud computing delegates computing to a cloud server located at a relatively long distance, resulting in significant delays due to additional time to return processing results from a cloud server. These unnecessary delays are inconvenient for mobile users because they are not suitable for applications that require a real-time service environment. To cope with these problems, a new computing concept called Multi-Access Edge Computing (MEC) has emerged. Instead of sending all requests to the central cloud to handle mobile users’ requests, the MEC brings computing power and storage resources to the edge of the mobile network. It enables the mobile user device to run the real-time applications that are sensitive to latency to meet the strict requirements. However, there is a lack of research on the efficient utilization of computing resources and mobility support when mobile users move in the MEC environment. In this paper, we propose the MEC-based mobility management scheme that arranges MEC server (MECS) as the concept of Zone so that mobile users can continue to receive content and use server resources efficiently even when they move. The results show that the proposed scheme reduce the average service delay compared to the existing MEC scheme. In addition, the proposed scheme outperforms the existing MEC scheme because mobile users can continuously receive services, even when they move frequently.


Author(s):  
Luis Contreras

The advent of 5G introduces the concept of network slicing which is meant to permit network service providers to overcome the great challenge of forthcoming 5G services: how to support and operate different kinds of services with very distinct needs onto the same infrastructure. Deploying altogether on the same network makes it quite difficult to define a common architecture capable of keeping the diverse requirements of all of them. The network slicing concept foresees a number of logically independent slices, each comprising different network nodes and service functions, which are interconnected and are involved in the delivery and the operation of a specific service. By instantiating network slices, the network will be able to provide completely different services in a dynamic way over the same infrastructure. This chapter overviews the challenges raised by the implementation of the network slicing concept and which will be faced by the network operators.


Author(s):  
Stelios C.A. Thomopoulos ◽  
Nikolaos Argyreas

The globally observed recession of mobile services market has pushed mobile network operators into looking for opportunities to provide value added services on top of their high cost infrastructures. Recent advances in mobile positioning technologies enable services that make use of the mobile user location information, offering intuitive, attractive applications to the potential customer. Mobile tourism services are among the primary options to be considered by service providers for this new market. This chapter presents the key concepts, capabilities, and considerations of infrastructures and applications targeted to the mobile tourist, covering data and content delivery, positioning, systems’ interactions, platforms, protocols, security, and privacy as well as business modelling aspects.


Author(s):  
George Kakaletris ◽  
Dimitris Varoutas ◽  
Dimitris Katsianis ◽  
Thomas Sphicopoulos

The globally observed recession of mobile services market has pushed mobile network operators into looking for opportunities to provide value added services on top of their high cost infrastructures. Recent advances in mobile positioning technologies enable services that make use of the mobile user location information, offering intuitive, attractive applications to the potential customer. Mobile tourism services are among the primary options to be considered by service providers for this new market. This chapter presents the key concepts, capabilities, and considerations of infrastructures and applications targeted to the mobile tourist, covering data and content delivery, positioning, systems’ interactions, platforms, protocols, security, and privacy as well as business modelling aspects.


Sign in / Sign up

Export Citation Format

Share Document