Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2024
CCSM: Building Cross-Cluster Security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters
- Mahmood GholipourChoubeh,
- Hugo Kermabon-Bobinnec,
- Suryadipta Majumdar,
- Yosr Jarraya,
- Lingyu Wang,
- Boubakr Nour,
- Makan Pourzandi
CODASPY '24: Proceedings of the Fourteenth ACM Conference on Data and Application Security and PrivacyPages 79–90https://doi.org/10.1145/3626232.3653253With the emergence of 5G networks and their large scale applications such as IoT and autonomous vehicles, telecom operators are increasingly offloading the computation closer to customers (i.e., on the edge). Such edge-core environments usually involve ...
- research-articleMay 2024
ASTRA-5G: Automated Over-the-Air Security Testing and Research Architecture for 5G SA Devices
- Syed Khandker,
- Michele Guerra,
- Evangelos Bitsikas,
- Roger Piqueras Jover,
- Aanjhan Ranganathan,
- Christina Pöpper
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 89–100https://doi.org/10.1145/3643833.3656141Despite the widespread deployment of 5G technologies, there exists a critical gap in security testing for 5G Standalone (SA) devices. Existing methods, largely manual and labor-intensive, are ill-equipped to fully uncover the state of security in the ...
- research-articleMay 2024
Performance Evaluation of Transport Layer Security in the 5G Core Control Plane
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 78–88https://doi.org/10.1145/3643833.3656140As 5G is currently being rolled out, security considerations for this critical infrastructure are getting more into focus. Hereby, the security investigation of the 5G core as the central element plays a pivotal role. The structure of the core is based ...
- research-articleOctober 2023
Know Your Vulnerable Neighbors: Awareness Model for 5G C-V2X Communications Mode 2
DIVANet '23: Proceedings of the Int'l ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and ApplicationsPages 17–21https://doi.org/10.1145/3616392.3623416The proliferation of cellular networks has become instrumental in the implementation of road safety applications due to the extensive penetration rate of this technology among road users and its promise to reduce message exchange latency times. Among ...
- research-articleOctober 2023
Performance Evaluation of Congestion Control Over B5G/6G Fluctuating Scenarios
DIVANet '23: Proceedings of the Int'l ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and ApplicationsPages 85–92https://doi.org/10.1145/3616392.3623408In recent years, Internet traffic has grown constantly, and new high-throughput applications have been introduced and widely used by mobile users. This has necessitated improvements in the access networks and transport protocols. Beyond 5G and 6G (B5G/...
-
- research-articleOctober 2023
dNextG: A Zero-Trust Decentralized Mobile Network User Plane
Q2SWinet '23: Proceedings of the 19th ACM International Symposium on QoS and Security for Wireless and Mobile NetworksPages 15–24https://doi.org/10.1145/3616391.3623427Recent technological and regulatory changes are paving the way to enable decentralized, zero-trust mobile network. Properly secured decentralization allows or improves "inherently distributed'' use cases such as military coalition mobile networks ...
- research-articleOctober 2023
IHGWO-Based Optimization of IoT Wireless Sensor Networks
Q2SWinet '23: Proceedings of the 19th ACM International Symposium on QoS and Security for Wireless and Mobile NetworksPages 97–104https://doi.org/10.1145/3616391.3622769The Internet of Things (IoT) is a rapidly expanding field, with billions of devices now online. This expansion has increased demand for efficient and dependable wireless sensor connectivity. A new method for reducing wireless sensor connectivity time in ...
- research-articleOctober 2023
Quantifying Network Level Improvement due to Beamforming on the Performance of Large-Scale Dense Urban IoT Networks
MobiWac '23: Proceedings of the Int'l ACM Symposium on Mobility Management and Wireless AccessPages 1–7https://doi.org/10.1145/3616390.3618285There have been many papers that show the physical layer advantages of beamforming. However, to the best of our knowledge, none have dealt with the large-scale network level performance evaluation. While it is clear that beamforming brings a positive ...
- research-articleOctober 2023
Accurate E-CID Framework for Indoor Positioning in 5G using Path Tracing and Machine Learning
MSWiM '23: Proceedings of the Int'l ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile SystemsPages 9–17https://doi.org/10.1145/3616388.3623406Locating at-risk workers in hospitals using legacy private 5G networks is a daunting task that involves solving the problem of indoor localization using commercial off-the-shelf proprietary hardware. Currently, no full-stack schemes or realistic indoor ...
- research-articleOctober 2023
Federated Learning for V2X Misbehavior Detection System in 5G Edge Networks
MSWiM '23: Proceedings of the Int'l ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile SystemsPages 155–163https://doi.org/10.1145/3616388.3617533The emergence of 5G Cellular Vehicle-to-Everything (C-V2X) has made it the predominant technology for enabling Vehicle-to-Everything (V2X) communications. As a result, this has created an opportunity for telecommunications service providers to leverage ...
- research-articleOctober 2023
Blind Modulation Classification of Wi-Fi 6 and 5G signals for Spectrum Sensing
MSWiM '23: Proceedings of the Int'l ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile SystemsPages 137–145https://doi.org/10.1145/3616388.3617527Classification of modulation of Wi-Fi~6 and 5G downlink (DL) user data signals for spectrum sensing is studied. First, the orthogonal frequency division multiplexing (OFDM) symbol duration and cyclic prefix (CP) length are estimated based on the cyclic ...
- research-articleOctober 2023
Towards Optimising Transport Protocols on the 5G Edge for Mobile Augmented Reality
IXR '23: Proceedings of the 2nd International Workshop on Interactive eXtended RealityPages 3–9https://doi.org/10.1145/3607546.3616806Mobile augmented reality (MAR) achieves immersive real-time experiences by offloading computation-intensive computer vision tasks. 5G NR (5G) networks and edge computing enable optimised latency and enhanced throughput for MAR offloading. However, ...
- research-articleOctober 2023
Performance of Cellular Networks on the Wheels
IMC '23: Proceedings of the 2023 ACM on Internet Measurement ConferencePages 678–695https://doi.org/10.1145/3618257.3624814After 4 years of rapid deployment in the US, 5G is expected to have significantly improved the performance and overall user experience of mobile networks. However, recent measurement studies have focused either on static performance or a single aspect (...
- abstractJune 2023
Switching in the Rain: Predictive Wireless x-haul Network Reconfiguration
SIGMETRICS '23: Abstract Proceedings of the 2023 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer SystemsPages 101–102https://doi.org/10.1145/3578338.35935744G, 5G, and smart city networks often rely on microwave and millimeter-wave x-haul links. A major challenge associated with these high frequency links is their susceptibility to weather conditions. In particular, precipitation may cause severe signal ...
Also Published in:
ACM SIGMETRICS Performance Evaluation Review: Volume 51 Issue 1 - abstractJune 2023
PEACH: Proactive and Environment Aware Channel State Information Prediction with Depth Images
SIGMETRICS '23: Abstract Proceedings of the 2023 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer SystemsPages 33–34https://doi.org/10.1145/3578338.3593563Up-to-date and accurate prediction of Channel State Information (CSI) is of paramount importance in Ultra-Reliable Low-Latency Communications (URLLC), specifically in dynamic environments where unpredictable mobility is inherent. CSI can be meticulously ...
Also Published in:
ACM SIGMETRICS Performance Evaluation Review: Volume 51 Issue 1 - research-articleJune 2023
A Scalable Platform for Single-Snapshot Direction Of Arrival (DOA) Estimation in Massive MIMO Systems
GLSVLSI '23: Proceedings of the Great Lakes Symposium on VLSI 2023Pages 631–637https://doi.org/10.1145/3583781.3590212With the development of Radio Frequency (RF) massive Multiple Inputs-Multiple Outputs (MIMO) array systems for Beyond 5G (B5G) applications, real-time DOA estimation has become challenging due to large antenna architectures producing a staggering amount ...
- research-articleJune 2023
UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework
- Evangelos Bitsikas,
- Syed Khandker,
- Ahmad Salous,
- Aanjhan Ranganathan,
- Roger Piqueras Jover,
- Christina Pöpper
WiSec '23: Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 121–132https://doi.org/10.1145/3558482.3590194Security flaws and vulnerabilities in cellular networks lead to severe security threats given the data-plane services that are involved, from calls to messaging and Internet access. While the 5G Standalone (SA) system is currently being deployed ...
- research-articleJune 2023
Provable Non-Frameability for 5G Lawful Interception
WiSec '23: Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 109–120https://doi.org/10.1145/3558482.3581780Mobile networks have grown in size and relevance, with novel applications in areas including transportation, finance, and health. The wide use of mobile networks generates rich data about users, raising interest in using such data for law enforcement ...
- research-articleJune 2023
BigMac: Performance Overhead of User Plane Integrity Protection in 5G Networks
WiSec '23: Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 145–150https://doi.org/10.1145/3558482.35817775G introduces a series of new security features that overcome known issues of the previous mobile generations. One of these features is integrity protection for user plane data. While this addition protects against manipulations like DNS spoofing, it ...
- research-articleJune 2023
European 5G Security in the Wild: Reality versus Expectations
WiSec '23: Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 13–18https://doi.org/10.1145/3558482.35817765G cellular systems are slowly being deployed worldwide delivering the promised unprecedented levels of throughput and latency to hundreds of millions of users. At such scale security is crucial, and consequently, the 5G standard includes a new series ...