2023
Joberto Sérgio Barbosa Martins, Tereza Cristina Melo Brito Carvalho, Rodrigo Moreira, Cristiano Bonato Both, Adnei Donatti, João H. Corrêa, José Augusto Suruagy Monteiro, Sand Luz Corrêa, Antônio Jorge Gomes Abelém, Moisés Renato Nunes Ribeiro, José Marcos Silva Nogueira, Luiz Claudio Schara Magalhães, Juliano Araujo Wickboldt, Tiago Coelho Ferreto, Ricardo Mello, Rafael Pasquini, Marcos Schwarz, Leobino Nascimento Sampaio, Daniel Fernandes Macedo, José Ferreira Rezende, Kleber Vieira Cardoso, Flávio Oliveira Silva
Enhancing Network Slicing Architectures With Machine Learning, Security, Sustainability and Experimental Networks Integration Journal Article
In: IEEE Access, 11 , pp. 69144-69163, 2023.
Abstract Links BibTeX Tags: Experimental Approach Machine Learning Network Orchestration Network Security Network Virtualization & Slicing
@article{journal/access/MartinsSFI223,
title = {Enhancing Network Slicing Architectures With Machine Learning, Security, Sustainability and Experimental Networks Integration},
author = {Joberto Sérgio Barbosa Martins and Tereza Cristina Melo Brito Carvalho and Rodrigo Moreira and Cristiano Bonato Both and Adnei Donatti and João H. Corrêa and José Augusto Suruagy Monteiro and Sand Luz Corrêa and Antônio Jorge Gomes Abelém and Moisés Renato Nunes Ribeiro and José Marcos Silva Nogueira and Luiz Claudio Schara Magalhães and Juliano Araujo Wickboldt and Tiago Coelho Ferreto and Ricardo Mello and Rafael Pasquini and Marcos Schwarz and Leobino Nascimento Sampaio and Daniel Fernandes Macedo and José Ferreira Rezende and Kleber Vieira Cardoso and Flávio Oliveira Silva},
doi = {10.1109/ACCESS.2023.3292788},
year = {2023},
date = {2023-07-05},
journal = {IEEE Access},
volume = {11},
pages = {69144-69163},
abstract = {Network Slicing (NS) is an essential technique extensively used in 5G networks computing strategies, mobile edge computing, mobile cloud computing, and verticals like the Internet of Vehicles and industrial IoT, among others. NS is foreseen as one of the leading enablers for 6G futuristic and highly demanding applications since it allows the optimization and customization of scarce and disputed resources among dynamic, demanding clients with highly distinct application requirements. Various standardization organizations, like 3GPP’s proposal for new generation networks and state-of-the-art 5G/6G research projects, are proposing new NS architectures. However, new NS architectures have to deal with an extensive range of requirements that inherently result in having NS architecture proposals typically fulfilling the needs of specific sets of domains with commonalities. The Slicing Future Internet Infrastructures (SFI2) architecture proposal explores the gap resulting from the diversity of NS architectures target domains by proposing a new NS reference architecture with a defined focus on integrating experimental networks and enhancing the NS architecture with Machine Learning (ML) native optimizations, energy-efficient slicing, and slicing-tailored security functionalities. The SFI2 architectural main contribution includes the utilization of the slice-as-a-service paradigm for end-to-end orchestration of resources across multi-domains and multi-technology experimental networks. In addition, the SFI2 reference architecture instantiations will enhance the multi-domain and multi-technology integrated experimental network deployment with native ML optimization, energy-efficient aware slicing, and slicing-tailored security functionalities for the practical domain.},
keywords = {Experimental Approach, Machine Learning, Network Orchestration, Network Security, Network Virtualization & Slicing},
pubstate = {published},
tppubtype = {article}
}
Rafael de Jesus Martins, Juliano Araujo Wickboldt, Lisandro Zambenedetti Granville
Assisted Monitoring and Security Provisioning for 5G Microservices-Based Network Slices with SWEETEN Journal Article
In: Journal of Network and Systems Management (JNSM), 31 (2), pp. 36, 2023, ISSN: 1573-7705.
Abstract Links BibTeX Tags: 5G Cloud Computing Microservices Network Orchestration Network Security Network Virtualization & Slicing
@article{journals/jnsm/Martins5GMS23,
title = {Assisted Monitoring and Security Provisioning for 5G Microservices-Based Network Slices with SWEETEN},
author = {Rafael de Jesus Martins and Juliano Araujo Wickboldt and Lisandro Zambenedetti Granville},
url = {https://link.springer.com/article/10.1007/s10922-023-09728-1},
doi = {10.1007/s10922-023-09728-1},
issn = {1573-7705},
year = {2023},
date = {2023-02-12},
urldate = {2023-02-12},
journal = {Journal of Network and Systems Management (JNSM)},
volume = {31},
number = {2},
pages = {36},
abstract = {5G networks have imposed a drastic shift in how mobile telecommunications must operate. In order to comply with the new requirements, solutions based on network function virtualization (NFV) and network slicing must be carried out. Regarding NFV in particular, the trend towards pulverizing the monolithic software in a microservices-based one carries network management challenges to operators. The deployment and integration of one or more network management software with the managed services is as important as it is delicate, as stringent requirements of 5G applications must be respected. In this paper, we propose SWEETEN as a solution for automating the deployment and transparently integrating network management solutions from different management disciplines, in this case, monitoring and security. Demonstrating its usability through a intelligent healthcare use case, SWEETEN is shown to transparently provide monitoring and security solutions for a complete network slice, enabling compliance with privacy requirements through minimal low-level interventions from the network slice tenant. The results show how SWEETEN integration of monitoring and security disciplines can assist users in guaranteeing the correct operation of their deployments regardless of the underlying software solutions used.},
keywords = {5G, Cloud Computing, Microservices, Network Orchestration, Network Security, Network Virtualization & Slicing},
pubstate = {published},
tppubtype = {article}
}
2016
Rafael de Jesus Martins, Vinicius Garcez Schaurich, Luis Augusto Dias Knob, Juliano Araujo Wickboldt, Alberto Egon Schaeffer-Filho, Lisandro Zambenedetti Granville, Marcelo Pias
Performance Analysis of 6LoWPAN and CoAP for Secure Communications in Smart Homes Inproceedings
In: 30th IEEE International Conference on Advanced Information Networking and Applications, AINA 2016, Crans-Montana, Switzerland, 23-25 March, 2016, pp. 1027–1034, IEEE Computer Society, 2016, ISSN: 1550-445X.
Abstract Links BibTeX Tags: Internet of Things (IoT) Network Security Smart Homes
@inproceedings{DBLP:conf/aina/MartinsSKWFGP16,
title = {Performance Analysis of 6LoWPAN and CoAP for Secure Communications in Smart Homes},
author = {Rafael de Jesus Martins and Vinicius Garcez Schaurich and Luis Augusto Dias Knob and Juliano Araujo Wickboldt and Alberto Egon Schaeffer-Filho and Lisandro Zambenedetti Granville and Marcelo Pias},
url = {https://doi.org/10.1109/AINA.2016.82},
doi = {10.1109/AINA.2016.82},
issn = {1550-445X},
year = {2016},
date = {2016-01-01},
booktitle = {30th IEEE International Conference on Advanced Information Networking and Applications, AINA 2016, Crans-Montana, Switzerland, 23-25 March, 2016},
pages = {1027--1034},
publisher = {IEEE Computer Society},
abstract = {Smart grids and smart homes improve energy management by coupling communication capabilities to their devices. Due to computational constraints of these devices, employment of simplified communication protocols is necessary. In this paper, we investigate the use of communication protocols based on CoAP and 6LoWPAN in smart home environments. Specifically, we analyze the vulnerabilities a smart home employing CoAP and 6LoWPAN may be susceptible to. We also present a performance analysis of the use of these protocols for ensuring secure communicationsin smart homes.},
keywords = {Internet of Things (IoT), Network Security, Smart Homes},
pubstate = {published},
tppubtype = {inproceedings}
}