Enhancing Network Slicing Architectures with Machine Learning, Security,
Sustainability and Experimental Networks Integration
- URL: http://arxiv.org/abs/2307.09151v1
- Date: Tue, 18 Jul 2023 11:22:31 GMT
- Title: Enhancing Network Slicing Architectures with Machine Learning, Security,
Sustainability and Experimental Networks Integration
- Authors: Joberto S. B. Martins, Tereza C. Carvalho, Rodrigo Moreira, Cristiano
Both, Adnei Donatti, Jo\~ao H. Corr\^ea, Jos\'e A. Suruagy, Sand L. Corr\^ea,
Antonio J. G. Abelem, Mois\'es R. N. Ribeiro, Jose-Marcos Nogueira, Luiz C.
S. Magalh\~aes, Juliano Wickboldt, Tiago Ferreto, Ricardo Mello, Rafael
Pasquini, Marcos Schwarz, Leobino N. Sampaio, Daniel F. Macedo, Jos\'e F. de
Rezende, Kleber V. Cardoso, Fl\'avio O. Silva
- Abstract summary: Network Slicing (NS) is an essential technique extensively used in 5G networks computing strategies.
NS is foreseen as one of the leading enablers for 6G futuristic and highly demanding applications.
NS architecture proposals typically fulfill the needs of specific sets of domains with commonalities.
- Score: 0.21200026734831154
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Network Slicing (NS) is an essential technique extensively used in 5G
networks computing strategies, mobile edge computing, mobile cloud computing,
and verticals like the Internet of Vehicles and industrial IoT, among others.
NS is foreseen as one of the leading enablers for 6G futuristic and highly
demanding applications since it allows the optimization and customization of
scarce and disputed resources among dynamic, demanding clients with highly
distinct application requirements. Various standardization organizations, like
3GPP's proposal for new generation networks and state-of-the-art 5G/6G research
projects, are proposing new NS architectures. However, new NS architectures
have to deal with an extensive range of requirements that inherently result in
having NS architecture proposals typically fulfilling the needs of specific
sets of domains with commonalities. The Slicing Future Internet Infrastructures
(SFI2) architecture proposal explores the gap resulting from the diversity of
NS architectures target domains by proposing a new NS reference architecture
with a defined focus on integrating experimental networks and enhancing the NS
architecture with Machine Learning (ML) native optimizations, energy-efficient
slicing, and slicing-tailored security functionalities. The SFI2 architectural
main contribution includes the utilization of the slice-as-a-service paradigm
for end-to-end orchestration of resources across multi-domains and
multi-technology experimental networks. In addition, the SFI2 reference
architecture instantiations will enhance the multi-domain and multi-technology
integrated experimental network deployment with native ML optimization,
energy-efficient aware slicing, and slicing-tailored security functionalities
for the practical domain.
Related papers
- AI-Native Multi-Access Future Networks -- The REASON Architecture [4.323505243954935]
REASON project aims to address technical challenges in future network deployments, such as E2E service orchestration, sustainability, security and trust management.
This paper presents REASON's architecture and the identified requirements for future networks.
arXiv Detail & Related papers (2024-11-11T11:10:39Z) - An Intelligent Native Network Slicing Security Architecture Empowered by Federated Learning [0.0]
We propose an architecture-intelligent security mechanism to improve the Network Slicing solutions.
We identify Distributed Denial-of-Service (DDoS) and intrusion attacks within the slice using generic and non-native telemetry records.
arXiv Detail & Related papers (2024-10-04T21:12:23Z) - EM-DARTS: Hierarchical Differentiable Architecture Search for Eye Movement Recognition [54.99121380536659]
Eye movement biometrics have received increasing attention thanks to its high secure identification.
Deep learning (DL) models have been recently successfully applied for eye movement recognition.
DL architecture still is determined by human prior knowledge.
We propose EM-DARTS, a hierarchical differentiable architecture search algorithm to automatically design the DL architecture for eye movement recognition.
arXiv Detail & Related papers (2024-09-22T13:11:08Z) - Intelligent Data-Driven Architectural Features Orchestration for Network
Slicing [0.0]
Orchestration and machine learning are key elements with a crucial role in the network-slicing processes.
This paper discusses machine learning-based orchestration of features and capabilities in network slicing architectures.
An attack prevention security mechanism is developed for the SFI2 architecture using distributed embedded and cooperating ML agents.
arXiv Detail & Related papers (2024-01-12T12:32:36Z) - OFA$^2$: A Multi-Objective Perspective for the Once-for-All Neural
Architecture Search [79.36688444492405]
Once-for-All (OFA) is a Neural Architecture Search (NAS) framework designed to address the problem of searching efficient architectures for devices with different resources constraints.
We aim to give one step further in the search for efficiency by explicitly conceiving the search stage as a multi-objective optimization problem.
arXiv Detail & Related papers (2023-03-23T21:30:29Z) - Elastic Architecture Search for Diverse Tasks with Different Resources [87.23061200971912]
We study a new challenging problem of efficient deployment for diverse tasks with different resources, where the resource constraint and task of interest corresponding to a group of classes are dynamically specified at testing time.
Previous NAS approaches seek to design architectures for all classes simultaneously, which may not be optimal for some individual tasks.
We present a novel and general framework, called Elastic Architecture Search (EAS), permitting instant specializations at runtime for diverse tasks with various resource constraints.
arXiv Detail & Related papers (2021-08-03T00:54:27Z) - Intelligent Zero Trust Architecture for 5G/6G Tactical Networks:
Principles, Challenges, and the Role of Machine Learning [4.314956204483074]
We highlight the challenges and introduce the concept of an intelligent zero trust architecture (i-ZTA) as a security framework in 5G/6G networks with untrusted components.
This paper presents the architectural design of an i-ZTA upon which modern artificial intelligence (AI) algorithms can be developed to provide information security in untrusted networks.
arXiv Detail & Related papers (2021-05-04T13:14:29Z) - Auto-Panoptic: Cooperative Multi-Component Architecture Search for
Panoptic Segmentation [144.50154657257605]
We propose an efficient framework to simultaneously search for all main components including backbone, segmentation branches, and feature fusion module.
Our searched architecture, namely Auto-Panoptic, achieves the new state-of-the-art on the challenging COCO and ADE20K benchmarks.
arXiv Detail & Related papers (2020-10-30T08:34:35Z) - Stage-Wise Neural Architecture Search [65.03109178056937]
Modern convolutional networks such as ResNet and NASNet have achieved state-of-the-art results in many computer vision applications.
These networks consist of stages, which are sets of layers that operate on representations in the same resolution.
It has been demonstrated that increasing the number of layers in each stage improves the prediction ability of the network.
However, the resulting architecture becomes computationally expensive in terms of floating point operations, memory requirements and inference time.
arXiv Detail & Related papers (2020-04-23T14:16:39Z) - A Privacy-Preserving Distributed Architecture for
Deep-Learning-as-a-Service [68.84245063902908]
This paper introduces a novel distributed architecture for deep-learning-as-a-service.
It is able to preserve the user sensitive data while providing Cloud-based machine and deep learning services.
arXiv Detail & Related papers (2020-03-30T15:12:03Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.