4.7 Article

A Model-Driven Security Analysis Approach for 5G Communications in Industrial Systems

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Multiagent Deep-Reinforcement-Learning-Based Virtual Resource Allocation Through Network Function Virtualization in Internet of Things

Hurmat Ali Shah et al.

Summary: Resource allocation is a critical task in the IoT domain, and this article proposes a deep reinforcement learning-based approach to optimize SFC placement under system constraints. Multiagent DRL algorithm is employed to address the Markovian decision process (MDP) problem, utilizing two Q-networks to solve SFC placement and update weights for long-term policy changes. Virtual agents serving SFCs interact with the environment, receive rewards collectively, and update policies based on learned experiences.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Engineering, Electrical & Electronic

A Unified Architectural Approach for Cyberattack-Resilient Industrial Control Systems

Chunjie Zhou et al.

Summary: This article presents a global and systematic architectural approach for industrial control system cybersecurity to address the threats posed by cyberattacks on ICSs. Through the integration of secure networks, secure control systems, and secure physical processes, layer-by-layer defense is implemented to enhance the network security risk management level of ICSs.

PROCEEDINGS OF THE IEEE (2021)

Article Automation & Control Systems

Deep Reinforcement Learning-Based Dynamic Resource Management for Mobile Edge Computing in Industrial Internet of Things

Ying Chen et al.

Summary: This article investigates the dynamic resource management problem for mobile edge computing in Industrial Internet of Things (IIoT) and proposes a deep reinforcement learning-based algorithm that can effectively reduce the long-term average delay of tasks.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Engineering, Electrical & Electronic

Intelligent Resource Slicing for eMBB and URLLC Coexistence in 5G and Beyond: A Deep Reinforcement Learning Based Approach

Madyan Alsenwi et al.

Summary: This paper investigates the resource slicing problem in a dynamic multiplexing scenario of two distinct 5G services, proposing an optimization-aided Deep Reinforcement Learning (DRL) framework to maximize eMBB data rate and maintain URLLC reliability constraint. By decomposing and transforming the optimization problem, as well as intelligently distributing traffic, the proposed approach can ensure URLLC reliability while keeping eMBB reliability above 90%.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2021)

Proceedings Paper Computer Science, Information Systems

Priority-Based Dynamic Resource Allocation Scheme in Network Slicing

Haneul Ko et al.

Summary: In this paper, a priority-based dynamic resource allocation scheme (PDRAS) is proposed, using a constrained Markov decision process (CMDP) problem and linear programming (LP) to achieve the optimal allocation policy. Extensive evaluation results demonstrate the effectiveness of PDRAS in terms of QoS and resource usage efficiency when compared to other schemes.

35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021) (2021)

Article Engineering, Electrical & Electronic

Playback of 5G and Beyond Measured MIMO Channels by an ANN-Based Modeling and Simulation Framework

Xiongwen Zhao et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

Analysis of Traffic Performance on Network Slicing Using Complex Network Theory

Wanqing Guan et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Engineering, Electrical & Electronic

Optimal Virtual Network Function Deployment for 5G Network Slicing in a Hybrid Cloud Infrastructure

Antonio De Domenico et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

A Secure Group-Oriented Device-to-Device Authentication Protocol for 5G Wireless Networks

Zhengyi Shang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2020)

Article Computer Science, Information Systems

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

Rabia Khan et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Telecommunications

Cost and Security-Aware Resource Allocation in Optical Data Center Networks

Bo Yi et al.

IEEE COMMUNICATIONS LETTERS (2019)

Article Computer Science, Information Systems

Security for 5G and Beyond

Ijaz Ahmad et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

NFV Security Survey: From Use Case Driven Threat Analysis to State-of-the-Art Countermeasures

Montida Pattaranantakul et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Proceedings Paper Computer Science, Theory & Methods

A Formal Analysis of 5G Authentication

David Basin et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Article Engineering, Electrical & Electronic

The Cybersecurity Landscape in Industrial Control Systems

Stephen McLaughlin et al.

PROCEEDINGS OF THE IEEE (2016)

Proceedings Paper Computer Science, Hardware & Architecture

A Survey on Interfaces to Network Security Functions in Network Virtualization

Hyunsu Jang et al.

2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015 (2015)

Proceedings Paper Computer Science, Interdisciplinary Applications

Heterogeneous Hierarchical Coloured Petri Net Software/Hardware Architectural View of Embedded System based on System Behaviours

Mahdi Sahlabadi et al.

4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICEEI 2013) (2013)