Secure and energy-efficient resource allocation in network slicing

2022-9-2
Gülmez, Umut Can
The one-size-fits-all idea of the previous telecommunication generations is no longer suitable for current applications. The current network systems need to satisfy the Quality of Service requirements of the different types of use cases such as enhanced mobile broadband, ultra-reliable and low latency communications and massive machine type communications in the same physical infrastructure. 5G telecommunication networks aim to provide a solution to this problem through the network slicing concept. Virtual Network Functions (VNF) play an essential role in the network slicing concept and embedding these functions into the network is an important task to achieve. As state-of-the-art research focuses on allocating these functions in-network taking only energy efficiency into consideration, this research proposes a solution that considers the security aspects too. We propose a VNF placement strategy using an integer linear programming (ILP) model for 5G network slicing under strict security requirements, which optimizes energy consumption by the core network nodes. As an improvement to this approach, we also propose using Deep Reinforcement Learning (DRL) methods to provide a dynamic, energy-efficient, resilient, and secure resource allocation framework for network slicing. Hence, in this research, we compared varv ious state-of-the-art DRL methods to find a suitable algorithm for energy-efficient resource allocation under stringent security constraints. Simulation results demonstrate that the proposed DRL-based models achieve significant energy optimization compared to the ILP-based optimization model performing VNF placement under the same QoS and security constraints. The results of the study show that DRL-based methods provide faster allocation than ILP-based methods. Also, the results show that DRL-based methods provide faster allocation than ILP-based methods.

Suggestions

Dynamic Resource Management in Next Generation Networks with Dense User Traffic
Aslan, Aysun; Bal Bozkurt, Gülce; Toker, Cenk (IEEE; 2020-12-04)
With the era of the fifth generation (5G) networks, supporting all mobile service users who have different Quality of Service (QoS) requirements becomes the main challenge. To manage and satisfy the heterogeneous requirements, network slicing concept can be a solution over a common physical infrastructure. Splitting the network into slices which have different properties (e.g., bandwidth requirements, delay tolerance, user density, etc.) allows to schedule and optimize the requests under the constraint of l...
Network density estimators and density-aware wireless networks
Eroğlu, Alperen; Onur, Ertan; Department of Computer Engineering (2020-11)
New network architectures and communication technologies continue to emerge to meet rapidly increasing and changing user demands requiring continuous connectivity and high data rate transmissions. These ubiquitous infrastructures result in a paradigm shift in mobile communications with the advent of mobile robots equipped with sensors, unmanned aerial vehicles, and mobile small-cells, which makes the future networks highly dynamic. This dynamism poses unpredictable variations in the network density causing ...
Wireless Communication Aspects in the Internet of Things: An Overview
ULUŞAR, ÜMİT DENİZ; Celik, Gurkan; Al-Turjman, Fadi (2017-10-12)
Recent advances in technology propelled the development of resource constrained tiny devices and the concept of Internet of Things (IoT). Potential applications spanning various fields of science from environmental to medical have been emerged. Different architectures, routing protocols, performance issues and goals have been suggested. In this work, we review fundamental concepts, recent developments and critical design factors under IoT-specific constraints and objectives such as energy efficiency and env...
NETWORK INTRUSION DETECTION WITH A DEEP LEARNING APPROACH
Kültür, Ebru; Acar, Aybar Can; Department of Cybersecurity (2022-2-7)
With the rapid growth of the information technology in several areas, providing security of those systems has gained more importance. As a result of this development in information technology, the complexity of cyber-attacks has also significantly increased. Therefore, traditional security tools such as Signature-based Intrusion Detection Systems (SIDS) have become insufficient for detecting new attacks. Intrusion Detection Systems (IDS) are used to monitor network traffic and capture malicious traffic. Tra...
An Intelligent fuzzy clustering approach for energy-efficient data aggregation in wireless sensor networks
Sert, Seyyit Alper; Yazıcı, Adnan; Department of Computer Engineering (2018)
Technological developments have made the generation and usage of wireless sensor nodes possible. Although an individual node is capable of gathering data alone, these nodes generally cooperate to extract high-level semantic information from the sensed region. Networks consisting such nodes are referred to as Wireless Sensor Networks (WSNs). There is generally a balance between energy-efficiency and accuracy, which are two desirable but incompatible features of these networks, because of the resource-restric...
Citation Formats
U. C. Gülmez, “Secure and energy-efficient resource allocation in network slicing,” M.S. - Master of Science, Middle East Technical University, 2022.