Featured Researches

Networking And Internet Architecture

AI based Service Management for 6G Green Communications

Green communications have always been a target for the information industry to alleviate energy overhead and reduce fossil fuel usage. In current 5G and future 6G era, there is no doubt that the volume of network infrastructure and the number of connected terminals will keep exponentially increasing, which results in the surging energy cost. It becomes growing important and urgent to drive the development of green communications. However, 6G will inevitably have increasingly stringent and diversified requirements for Quality of Service (QoS), security, flexibility, and even intelligence, all of which challenge the improvement of energy efficiency. Moreover, the dynamic energy harvesting process, which will be adopted widely in 6G, further complicates the power control and network management. To address these challenges and reduce human intervene, Artificial Intelligence (AI) has been widely recognized and acknowledged as the only solution. Academia and industry have conducted extensive research to alleviate energy demand, improve energy efficiency, and manage energy harvesting in various communication scenarios. In this paper, we present the main considerations for green communications and survey the related research on AI-based green communications. We focus on how AI techniques are adopted to manage the network and improve energy harvesting toward the green era. We analyze how state-of-the-art Machine Learning (ML) and Deep Learning (DL) techniques can cooperate with conventional AI methods and mathematical models to reduce the algorithm complexity and optimize the accuracy rate to accelerate the applications in 6G. Finally, we discuss the existing problems and envision the challenges for these emerging techniques in 6G.

Read more
Networking And Internet Architecture

AI-Empowered VNF Migration as a Cost-Loss-Effective Solution for Network Resilience

With a wide deployment of Multi-Access Edge Computing (MEC) in the Fifth Generation (5G) mobile networks, virtual network functions (VNF) can be flexibly migrated between difference locations, and therewith significantly enhances the network resilience to counter the degradation in quality of service (QoS) due to network function outages. A balance has to be taken carefully, between the loss reduced by VNF migration and the operations cost generated thereby. To achieve this in practical scenarios with realistic user behavior, it calls for models of both cost and user mobility. This paper proposes a novel cost model and a AI-empowered approach for a rational migration of stateful VNFs, which minimizes the sum of operations cost and potential loss caused by outages, and is capable to deal with the complex realistic user mobility patterns.

Read more
Networking And Internet Architecture

ALOHA Receivers: a Network Calculus Approach for Analyzing Coded Multiple Access with SIC

Motivated by the need to hide the complexity of the physical layer from performance analysis in a layer 2 protocol, a class of abstract receivers, called Poisson receivers, was recently proposed in [1] as a probabilistic framework for providing differentiated services in uplink transmissions in 5G networks. In this paper, we further propose a deterministic framework of ALOHA receivers that can be incorporated into the probabilistic framework of Poisson receivers for analyzing coded multiple access with successive interference cancellation. An ALOHA receiver is characterized by a success function of the number of packets that can be successfully received. Inspired by the theory of network calculus, we derive various algebraic properties for several operations on success functions and use them to prove various closure properties of ALOHA receivers, including (i) ALOHA receivers in tandem, (ii) cooperative ALOHA receivers, (iii) ALOHA receivers with traffic multiplexing, and (iv) ALOHA receivers with packet coding. By conducting extensive simulations, we show that our theoretical results match extremely well with the simulation results.

Read more
Networking And Internet Architecture

Acting Selfish for the Good of All: Contextual Bandits for Resource-Efficient Transmission of Vehicular Sensor Data

as a novel client-based method for resource-efficient opportunistic transmission of delay-tolerant vehicular sensor data. BS-CB applies a hybrid approach which brings together all major machine learning disciplines - supervised, unsupervised, and reinforcement learning - in order to autonomously schedule vehicular sensor data transmissions with respect to the expected resource efficiency. Within a comprehensive real world performance evaluation in the public cellular networks of three Mobile Network Operators (MNOs), it is found that 1) The average uplink data rate is improved by 125%-195% 2) The apparently selfish goal of data rate optimization reduces the amount of occupied cell resources by 84%-89% 3) The average transmission-related power consumption can be reduced by 53%-75% 4) The price to pay is an additional buffering delay due to the opportunistic medium access strategy.

Read more
Networking And Internet Architecture

Actor-Critic Learning Based QoS-Aware Scheduler for Reconfigurable Wireless Networks

The flexibility offered by reconfigurable wireless networks, provide new opportunities for various applications such as online AR/VR gaming, high-quality video streaming and autonomous vehicles, that desire high-bandwidth, reliable and low-latency communications. These applications come with very stringent Quality of Service (QoS) requirements and increase the burden over mobile networks. Currently, there is a huge spectrum scarcity due to the massive data explosion and this problem can be solved by helps of Reconfigurable Wireless Networks (RWNs) where nodes have reconfiguration and perception capabilities. Therefore, a necessity of AI-assisted algorithms for resource block allocation is observed. To tackle this challenge, in this paper, we propose an actor-critic learning-based scheduler for allocating resource blocks in a RWN. Various traffic types with different QoS levels are assigned to our agents to provide more realistic results. We also include mobility in our simulations to increase the dynamicity of networks. The proposed model is compared with another actor-critic model and with other traditional schedulers; proportional fair (PF) and Channel and QoS Aware (CQA) techniques. The proposed models are evaluated by considering the delay experienced by user equipment (UEs), successful transmissions and head-of-the-line delays. The results show that the proposed model noticeably outperforms other techniques in different aspects.

Read more
Networking And Internet Architecture

Adaptive Bitrate Video Streaming for Wireless nodes: A Survey

In today's Internet, video is the most dominant application and in addition to this, wireless networks such as WiFi, Cellular, and Bluetooth have become ubiquitous. Hence, most of the Internet traffic is video over wireless nodes. There is a plethora of research to improve video streaming to achieve high Quality of Experience (QoE) over the Internet. Many of them focus on wireless nodes. Recent measurement studies often show QoE of video suffers in many wireless clients over the Internet. Recently, many research papers have presented models and schemes to optimize the Adaptive BitRate (ABR) based video streaming for wireless and mobile users. In this survey, we present a comprehensive overview of recent work in the area of Internet video specially designed for wireless network. Recent research has suggested that there are some new challenges added by the connectivity of clients through wireless. Also these challenges become more difficult to handle when these nodes are mobile. This survey also discusses new potential areas of future research due to the increasing scarcity of wireless spectrum.

Read more
Networking And Internet Architecture

Adaptive Transmission Parameters Selection Algorithm for URLLC Traffic in Uplink

Ultra-Reliable Low-Latency Communications (URLLC) is a novel feature of 5G cellular systems. To satisfy strict URLLC requirements for uplink data transmission, the specifications of 5G systems introduce the grant-free channel access method. According to this method, a User Equipment (UE) performs packet transmission without requesting channel resources from a base station (gNB). With the grant-free channel access, the gNB configures the uplink transmission parameters in a long-term time scale. Since the channel quality can significantly change in time and frequency domains, the gNB should select robust transmission parameters to satisfy the URLLC requirements. Many existing studies consider fixed robust uplink transmission parameter selection that allows satisfying the requirements even for UEs with poor channel conditions. However, the more robust transmission parameters are selected, the lower is the network capacity. In this paper, we propose an adaptive algorithm that selects the transmission parameters depending on the channel quality based on the signal-to-noise ratio statistics analysis at the gNB. Simulation results obtained with NS-3 show that the algorithm allows meeting the URLLC latency and reliability requirements while reducing the channel resource consumption more than twice in comparison with the fixed transmission parameters selection.

Read more
Networking And Internet Architecture

Addressless: A New Internet Server Model to Prevent Network Scanning

Eliminating unnecessary exposure is a principle of server security. The huge IPv6 address space enhances security by making scanning infeasible, however, with recent advances of IPv6 scanning technologies, network scanning is again threatening server security. In this paper, we propose a new model named addressless server, which separates the server into an entrance module and a main service module, and assigns an IPv6 prefix instead of an IPv6 address to the main service module. The entrance module generates a legitimate IPv6 address under this prefix by encrypting the client address, so that the client can access the main server on a destination address that is different in each connection. In this way, the model provides isolation to the main server, prevents network scanning, and minimizes exposure. Moreover it provides a novel framework that supports flexible load balancing, high-availability, and other desirable features. The model is simple and does not require any modification to the client or the network. We implement a prototype and experiments show that our model can prevent the main server from being scanned at a slight performance cost.

Read more
Networking And Internet Architecture

Adversarial Machine Learning for 5G Communications Security

Machine learning provides automated means to capture complex dynamics of wireless spectrum and support better understanding of spectrum resources and their efficient utilization. As communication systems become smarter with cognitive radio capabilities empowered by machine learning to perform critical tasks such as spectrum awareness and spectrum sharing, they also become susceptible to new vulnerabilities due to the attacks that target the machine learning applications. This paper identifies the emerging attack surface of adversarial machine learning and corresponding attacks launched against wireless communications in the context of 5G systems. The focus is on attacks against (i) spectrum sharing of 5G communications with incumbent users such as in the Citizens Broadband Radio Service (CBRS) band and (ii) physical layer authentication of 5G User Equipment (UE) to support network slicing. For the first attack, the adversary transmits during data transmission or spectrum sensing periods to manipulate the signal-level inputs to the deep learning classifier that is deployed at the Environmental Sensing Capability (ESC) to support the 5G system. For the second attack, the adversary spoofs wireless signals with the generative adversarial network (GAN) to infiltrate the physical layer authentication mechanism based on a deep learning classifier that is deployed at the 5G base station. Results indicate major vulnerabilities of 5G systems to adversarial machine learning. To sustain the 5G system operations in the presence of adversaries, a defense mechanism is presented to increase the uncertainty of the adversary in training the surrogate model used for launching its subsequent attacks.

Read more
Networking And Internet Architecture

Adversarial Machine Learning for Flooding Attacks on 5G Radio Access Network Slicing

Network slicing manages network resources as virtual resource blocks (RBs) for the 5G Radio Access Network (RAN). Each communication request comes with quality of experience (QoE) requirements such as throughput and latency/deadline, which can be met by assigning RBs, communication power, and processing power to the request. For a completed request, the achieved reward is measured by the weight (priority) of this request. Then, the reward is maximized over time by allocating resources, e.g., with reinforcement learning (RL). In this paper, we introduce a novel flooding attack on 5G network slicing, where an adversary generates fake network slicing requests to consume the 5G RAN resources that would be otherwise available to real requests. The adversary observes the spectrum and builds a surrogate model on the network slicing algorithm through RL that decides on how to craft fake requests to minimize the reward of real requests over time. We show that the portion of the reward achieved by real requests may be much less than the reward that would be achieved when there was no attack. We also show that this flooding attack is more effective than other benchmark attacks such as random fake requests and fake requests with the minimum resource requirement (lowest QoE requirement). Fake requests may be detected due to their fixed weight. As an attack enhancement, we present schemes to randomize weights of fake requests and show that it is still possible to reduce the reward of real requests while maintaining the balance on weight distributions.

Read more

Ready to get started?

Join us today