Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Secure and energy-efficient resource allocation in network slicing
Download
Secure_and_Energy_Efficient_Resource_Allocation_in_Network_Slicing.pdf
Date
2022-9-2
Author
Gülmez, Umut Can
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
213
views
58
downloads
Cite This
The one-size-fits-all idea of the previous telecommunication generations is no longer suitable for current applications. The current network systems need to satisfy the Quality of Service requirements of the different types of use cases such as enhanced mobile broadband, ultra-reliable and low latency communications and massive machine type communications in the same physical infrastructure. 5G telecommunication networks aim to provide a solution to this problem through the network slicing concept. Virtual Network Functions (VNF) play an essential role in the network slicing concept and embedding these functions into the network is an important task to achieve. As state-of-the-art research focuses on allocating these functions in-network taking only energy efficiency into consideration, this research proposes a solution that considers the security aspects too. We propose a VNF placement strategy using an integer linear programming (ILP) model for 5G network slicing under strict security requirements, which optimizes energy consumption by the core network nodes. As an improvement to this approach, we also propose using Deep Reinforcement Learning (DRL) methods to provide a dynamic, energy-efficient, resilient, and secure resource allocation framework for network slicing. Hence, in this research, we compared varv ious state-of-the-art DRL methods to find a suitable algorithm for energy-efficient resource allocation under stringent security constraints. Simulation results demonstrate that the proposed DRL-based models achieve significant energy optimization compared to the ILP-based optimization model performing VNF placement under the same QoS and security constraints. The results of the study show that DRL-based methods provide faster allocation than ILP-based methods. Also, the results show that DRL-based methods provide faster allocation than ILP-based methods.
Subject Keywords
5G and Beyond Mobile Networks
,
Network Slicing
,
Deep Reinforcement Learning
,
Integer Linear Programming
,
Network Security
,
Energy Efficiency
URI
https://hdl.handle.net/11511/99546
Collections
Graduate School of Natural and Applied Sciences, Thesis
Suggestions
OpenMETU
Core
Dynamic Resource Management in Next Generation Networks with Dense User Traffic
Aslan, Aysun; Bal Bozkurt, Gülce; Toker, Cenk (IEEE; 2020-12-04)
With the era of the fifth generation (5G) networks, supporting all mobile service users who have different Quality of Service (QoS) requirements becomes the main challenge. To manage and satisfy the heterogeneous requirements, network slicing concept can be a solution over a common physical infrastructure. Splitting the network into slices which have different properties (e.g., bandwidth requirements, delay tolerance, user density, etc.) allows to schedule and optimize the requests under the constraint of l...
Network density estimators and density-aware wireless networks
Eroğlu, Alperen; Onur, Ertan; Department of Computer Engineering (2020-11)
New network architectures and communication technologies continue to emerge to meet rapidly increasing and changing user demands requiring continuous connectivity and high data rate transmissions. These ubiquitous infrastructures result in a paradigm shift in mobile communications with the advent of mobile robots equipped with sensors, unmanned aerial vehicles, and mobile small-cells, which makes the future networks highly dynamic. This dynamism poses unpredictable variations in the network density causing ...
Wireless Communication Aspects in the Internet of Things: An Overview
ULUŞAR, ÜMİT DENİZ; Celik, Gurkan; Al-Turjman, Fadi (2017-10-12)
Recent advances in technology propelled the development of resource constrained tiny devices and the concept of Internet of Things (IoT). Potential applications spanning various fields of science from environmental to medical have been emerged. Different architectures, routing protocols, performance issues and goals have been suggested. In this work, we review fundamental concepts, recent developments and critical design factors under IoT-specific constraints and objectives such as energy efficiency and env...
NETWORK INTRUSION DETECTION WITH A DEEP LEARNING APPROACH
Kültür, Ebru; Acar, Aybar Can; Department of Cybersecurity (2022-2-7)
With the rapid growth of the information technology in several areas, providing security of those systems has gained more importance. As a result of this development in information technology, the complexity of cyber-attacks has also significantly increased. Therefore, traditional security tools such as Signature-based Intrusion Detection Systems (SIDS) have become insufficient for detecting new attacks. Intrusion Detection Systems (IDS) are used to monitor network traffic and capture malicious traffic. Tra...
An Intelligent fuzzy clustering approach for energy-efficient data aggregation in wireless sensor networks
Sert, Seyyit Alper; Yazıcı, Adnan; Department of Computer Engineering (2018)
Technological developments have made the generation and usage of wireless sensor nodes possible. Although an individual node is capable of gathering data alone, these nodes generally cooperate to extract high-level semantic information from the sensed region. Networks consisting such nodes are referred to as Wireless Sensor Networks (WSNs). There is generally a balance between energy-efficiency and accuracy, which are two desirable but incompatible features of these networks, because of the resource-restric...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
U. C. Gülmez, “Secure and energy-efficient resource allocation in network slicing,” M.S. - Master of Science, Middle East Technical University, 2022.