-
Edge Rendering Architecture for multiuser XR Experiences and E2E Performance Assessment
Authors:
Inhar Yeregui,
Daniel Mejías,
Guillermo Pacho,
Roberto Viola,
Jasone Astorga,
Mario Montagud
Abstract:
Holographic communications are gaining ground among emerging eXtended-Reality (XR) applications due to their potential to revolutionize human communication. However, these technologies are characterized by higher requirements in terms of Quality of Service (QoS), such as high transmission data rates, very low latency, and high computation capacity, challenging current achievable capabilities. In t…
▽ More
Holographic communications are gaining ground among emerging eXtended-Reality (XR) applications due to their potential to revolutionize human communication. However, these technologies are characterized by higher requirements in terms of Quality of Service (QoS), such as high transmission data rates, very low latency, and high computation capacity, challenging current achievable capabilities. In this context, computation offloading techniques are being investigated, where resource-intensive computational tasks, like rendering XR experiences, are shifted from user devices to a separate processor, specifically an Edge Computing instance. This paper introduces an Edge Rendering architecture for multiuser XR experiences, implements it on top of widely employed XR and Web technologies, and proposes a method based on image and audio processing to evaluate its performance in terms of end-to-end media streaming latency, inter-device, and intra-media synchronization when employing different access networks.
△ Less
Submitted 11 June, 2024;
originally announced June 2024.
-
Multi-Layer Monitoring at the Edge for Vehicular Video Streaming: Field Trials
Authors:
Inhar Yeregui,
Juncal Uriol,
Roberto Viola,
Pablo Angueira,
Jasone Astorga,
Jon Montalban
Abstract:
In an increasingly connected world, wireless networks' monitoring and characterization are of vital importance. Service and application providers need to have a detailed understanding of network performance to offer new solutions tailored to the needs of today's society. In the context of mobility, in-vehicle infotainment services are expected to stand out among other popular connected vehicle ser…
▽ More
In an increasingly connected world, wireless networks' monitoring and characterization are of vital importance. Service and application providers need to have a detailed understanding of network performance to offer new solutions tailored to the needs of today's society. In the context of mobility, in-vehicle infotainment services are expected to stand out among other popular connected vehicle services, so it is essential that communication networks are able to satisfy the Quality of Service (QoS) and Quality of Experience (QoE) requirements needed for these type of services. This paper investigates a multi-layer network performance monitoring architecture at the edge providing QoS, QoE, and localization information for vehicular video streaming applications in real-time over 5G networks. In order to conduct field trials and show test results, Mobile Network Operators (MNOs)' 5G Standalone (SA) network and Multi-access Edge Computing (MEC) infrastructure are used to provide connectivity and edge computing resources to a vehicle equipped with a 5G modem.
△ Less
Submitted 13 November, 2023;
originally announced November 2023.
-
Too Many Options: A Survey of ABE Libraries for Developers
Authors:
Aintzane Mosteiro-Sanchez,
Marc Barcelo,
Jasone Astorga,
Aitor Urbieta
Abstract:
Attribute-based encryption (ABE) comprises a set of one-to-many encryption schemes that allow the encryption and decryption of data by associating it with access policies and attributes. Therefore, it is an asymmetric encryption scheme, and its computational requirements limit its deployment in IoT devices. There are different types of ABE and many schemes within each type. However, there is no co…
▽ More
Attribute-based encryption (ABE) comprises a set of one-to-many encryption schemes that allow the encryption and decryption of data by associating it with access policies and attributes. Therefore, it is an asymmetric encryption scheme, and its computational requirements limit its deployment in IoT devices. There are different types of ABE and many schemes within each type. However, there is no consensus on the default library for ABE, and those that exist implement different schemes. Developers, therefore, face the challenge of balancing efficiency and security by choosing the suitable library for their projects. This paper studies eleven ABE libraries, analyzing their main features, the mathematical libraries used, and the ABE schemes they provide. The paper also presents an experimental analysis of the four libraries which are still maintained and identifies some of the insecure ABE schemes they implement. In this experimental analysis, we implement the schemes offered by these libraries, measuring their execution times on architectures with different capabilities, i.e., ARMv6 and ARMv8. The experiments provide developers with the necessary information to choose the most suitable library for their projects, according to objective and well-defined criteria.
△ Less
Submitted 26 September, 2022;
originally announced September 2022.
-
Towards integrating hardware Data Plane acceleration in Network Functions Virtualization
Authors:
David Franco,
Asier Atutxa,
Jorge Sasiain,
Eder Ollora,
Marivi Higuero,
Jasone Astorga,
Eduardo Jacob
Abstract:
This paper proposes a framework for integrating data plane (DP) acceleration within the Network Functions Virtualization (NFV) architecture. Data plane programming (DPP) proves to be beneficial for NFV environments, as it provides full packet forwarding flexibility through the use of self-designed algorithms. Additionally, DPP provides high-performance networking, as the DP can be configured to ex…
▽ More
This paper proposes a framework for integrating data plane (DP) acceleration within the Network Functions Virtualization (NFV) architecture. Data plane programming (DPP) proves to be beneficial for NFV environments, as it provides full packet forwarding flexibility through the use of self-designed algorithms. Additionally, DPP provides high-performance networking, as the DP can be configured to execute specific functions on dedicated hardware. We present an integration of the DP acceleration within the ETSI NFV architecture that leverages custom DP functions implemented in hardware switches using P4 language. Besides, OpenStack and Kubernetes are used as Virtualized Infrastructure Managers (VIMs) and Open Source MANO (OSM) as the Management and Orchestration (MANO) element.
△ Less
Submitted 21 March, 2022;
originally announced March 2022.
-
End to End Secure Data Exchange in Value Chains with Dynamic Policy Updates
Authors:
Aintzane Mosteiro-Sanchez,
Marc Barcelo,
Jasone Astorga,
Aitor Urbieta
Abstract:
Data exchange among value chain partners provides them with a competitive advantage, but the risk of exposing sensitive data is ever-increasing. Information must be protected in storage and transmission to reduce this risk, so only the data producer and the final consumer can access or modify it. End-to-end (E2E) security mechanisms address this challenge, protecting companies from data breaches r…
▽ More
Data exchange among value chain partners provides them with a competitive advantage, but the risk of exposing sensitive data is ever-increasing. Information must be protected in storage and transmission to reduce this risk, so only the data producer and the final consumer can access or modify it. End-to-end (E2E) security mechanisms address this challenge, protecting companies from data breaches resulting from value chain attacks. Moreover, value chain particularities must also be considered. Multiple entities are involved in dynamic environments like these, both in data generation and consumption. Hence, a flexible generation of access policies is required to ensure that they can be updated whenever needed. This paper presents a CP-ABE-reliant data exchange system for value chains with E2E security. It considers the most relevant security and industrial requirements for value chains. The proposed solution can protect data according to access policies and update those policies without breaking E2E security or overloading field devices. In most cases, field devices are IIoT devices, limited in terms of processing and memory capabilities. The experimental evaluation has shown the proposed solution's feasibility for IIoT platforms.
△ Less
Submitted 13 September, 2022; v1 submitted 17 January, 2022;
originally announced January 2022.
-
Securing IIoT using Defence-in-Depth: Towards an End-to-End Secure Industry 4.0
Authors:
Aintzane Mosteiro-Sanchez,
Marc Barcelo,
Jasone Astorga,
Aitor Urbieta
Abstract:
Industry 4.0 uses a subset of the IoT, named Industrial IoT (IIoT), to achieve connectivity, interoperability, and decentralization. The deployment of industrial networks rarely considers security by design, but this becomes imperative in smart manufacturing as connectivity increases. The combination of OT and IT infrastructures in Industry 4.0 adds new security threats beyond those of traditional…
▽ More
Industry 4.0 uses a subset of the IoT, named Industrial IoT (IIoT), to achieve connectivity, interoperability, and decentralization. The deployment of industrial networks rarely considers security by design, but this becomes imperative in smart manufacturing as connectivity increases. The combination of OT and IT infrastructures in Industry 4.0 adds new security threats beyond those of traditional industrial networks. Defence-in-Depth (DiD) strategies tackle the complexity of this problem by providing multiple defense layers, each of these focusing on a particular set of threats. Additionally, the strict requirements of IIoT networks demand lightweight encryption algorithms. Nevertheless, these ciphers must provide E2E (End-to-End) security, as data passes through intermediate entities or middleboxes before reaching their destination. If compromised, middleboxes could expose vulnerable information to potential attackers if it is not encrypted throughout this path. This paper presents an analysis of the most relevant security strategies in Industry 4.0, focusing primarily on DiD. With these in mind, it proposes a combination of DiD, an encryption algorithm called Attribute-Based-Encryption (ABE), and object security (i.e., OSCORE) to get an E2E security approach. This analysis is a critical first step to develo** more complex and lightweight security frameworks suitable for Industry 4.0.
△ Less
Submitted 14 January, 2022;
originally announced January 2022.
-
Asymmetries in the Production of Lambda0 in 250 GeV/c pi+-, K+- and p -- Nucleon Interactions
Authors:
G. A. Alves,
S. Amato,
J. C. Anjos,
J. A. Appel,
J. Astorga,
T. Bernard,
S. B. Bracker,
L. M. Cremaldi,
W. D. Dagenhart,
C. L. Darling,
D. Errede,
H. C. Fenker,
C. Gay,
D. R. Green,
R. Jedicke,
P. E. Karchin,
S. Kwan,
L. H. Lueking,
J. R. T. de Mello Neto,
J. Metheny,
R. H. Milburn,
J. M. de Miranda,
H. da Motta,
A. Napier,
M. S. Nicola
, et al. (13 additional authors not shown)
Abstract:
Using data from Fermilab fixed-target experiment E769, we have measured particle-antiparticle production asymmetries for Lambda0 hyperons in 250 GeV/c pi+-, K+- and p -- nucleon interactions. The asymmetries are measured as functions of Feynman-x (x_F) and p_t^2 over the ranges -0.12<=x_F<=0.12 and 0<=p_t^2<=3 (GeV/c)^2 (for positive beam) and -0.12<=x_F<=0.4 and 0<=p_t^2<=10 (GeV/c)^2 (for nega…
▽ More
Using data from Fermilab fixed-target experiment E769, we have measured particle-antiparticle production asymmetries for Lambda0 hyperons in 250 GeV/c pi+-, K+- and p -- nucleon interactions. The asymmetries are measured as functions of Feynman-x (x_F) and p_t^2 over the ranges -0.12<=x_F<=0.12 and 0<=p_t^2<=3 (GeV/c)^2 (for positive beam) and -0.12<=x_F<=0.4 and 0<=p_t^2<=10 (GeV/c)^2 (for negative beam). We find substantial asymmetries, even at x_F around zero. We also observe leading-particle-type asymmetries. These latter effects are qualitatively as expected from valence-quark content of the target and variety of projectiles studied.
△ Less
Submitted 19 March, 2003;
originally announced March 2003.
-
Asymmetries between the production of D+ and D- mesons from 500 GeV/c pi- nucleon interactions as a function of xF and pt**2
Authors:
E. M. Aitala,
S. Amato,
J. C. Anjos,
J. A. Appel,
M. Aryal,
D. Ashery,
J. Astorga,
S. Banerjee,
I. Bediaga,
G. Blaylock,
S. B. Bracker,
P. R. Burchat,
R. A. Burnstein,
T. Carter,
H. S. Carvalho,
I. Costa,
L. M. Cremaldi,
C. Darling,
K. Denisenko,
A. Fernandez,
P. Gagnon,
S. Gerzon,
C. Gobel,
K. Gounder,
D. Granite
, et al. (53 additional authors not shown)
Abstract:
We present asymmetries between the production of D+ and D- mesons in Fermilab experiment E791 as a function of xF and pt**2. The data used here consist of 74,000 fully-reconstructed charmed mesons produced by a 500 GeV/c pi- beam on C and Pt foils. The measurements are compared to results of models which predict differences between the production of heavy-quark mesons that have a light quark in…
▽ More
We present asymmetries between the production of D+ and D- mesons in Fermilab experiment E791 as a function of xF and pt**2. The data used here consist of 74,000 fully-reconstructed charmed mesons produced by a 500 GeV/c pi- beam on C and Pt foils. The measurements are compared to results of models which predict differences between the production of heavy-quark mesons that have a light quark in common with the beam (leading particles) and those that do not (non-leading particles). While the default models do not agree with our data, we can reach agreement with one of them, PYTHIA, by making a limited number of changes to parameters used.
△ Less
Submitted 3 January, 1996;
originally announced January 1996.