-
CN2F: A Cloud-Native Cellular Network Framework
Authors:
Sepehr Ganji,
Shirin Behnaminia,
Ali Ahangarpour,
Erfan Mazaheri,
Sara Baradaran,
Zeinab Zali,
Mohammad Reza Heidarpour,
Ali Rakhshan,
Mahsa Faraji Shoyari
Abstract:
Upcoming 5G and Beyond 5G (B5G) cellular networks aim to improve the efficiency and flexibility of mobile networks by incorporating various technologies, such as Software Defined Networking (SDN), Network Function Virtualization (NFV), and Network Slicing (NS). In this paper, we share our findings, accompanied by a comprehensive online codebase, about the best practice of using different open-sour…
▽ More
Upcoming 5G and Beyond 5G (B5G) cellular networks aim to improve the efficiency and flexibility of mobile networks by incorporating various technologies, such as Software Defined Networking (SDN), Network Function Virtualization (NFV), and Network Slicing (NS). In this paper, we share our findings, accompanied by a comprehensive online codebase, about the best practice of using different open-source projects in order to realize a flexible testbed for academia and industrial Research and Development (R&D) activities on the future generation of cellular networks. In particular, a Cloud-Native Cellular Network Framework (CN2F) is presented which uses OpenAirInterface's codebase to generate cellular Virtual Network Functions (VNFs) and deploys Kubernetes to disperse and manage them among some worker nodes. Moreover, CN2F leverages ONOS and Mininet to emulate the effect of the IP transport networks in the fronthaul and backhaul of real cellular networks. In this paper, we also showcase two use cases of CN2F to demonstrate the importance of Edge Computing (EC) and the capability of Radio Access Network (RAN) slicing.
△ Less
Submitted 30 May, 2023;
originally announced May 2023.
-
A Branch-and-Price Approach to a Variant of the Cognitive Radio Resource Allocation Problem
Authors:
Hossein Falsafain,
Mohammad Reza Heidarpour,
Soroush Vahidi
Abstract:
Radio-frequency portion of the electromagnetic spectrum is a scarce resource. Cognitive radio technology has emerged as a promising solution to overcome the spectrum scarcity bottleneck. Through this technology, secondary users (SUs) sense the spectrum opportunities free from primary users (PUs), and opportunistically take advantage of these (temporarily) idle portions, known as spectrum holes. In…
▽ More
Radio-frequency portion of the electromagnetic spectrum is a scarce resource. Cognitive radio technology has emerged as a promising solution to overcome the spectrum scarcity bottleneck. Through this technology, secondary users (SUs) sense the spectrum opportunities free from primary users (PUs), and opportunistically take advantage of these (temporarily) idle portions, known as spectrum holes. In this correspondence, we consider a variant of the cognitive radio resource allocation problem posed by Martinovic et al. in 2017. The distinguishing feature of this version of the problem is that each SU, due to its hardware limitations, imposes the requirement that the to-be-aggregated spectrum holes cannot be arbitrarily far from each other. We call this restriction as the Maximal Aggregation Range (MAR) constraint, and refer to this variant of the problem as the MAR-constrained hole assignment problem. The problem can be formalized as an NP-hard combinatorial optimization problem. We propose a novel binary integer linear programming (ILP) formulation to the problem. The number of constraints in this formulation is the number of spectrum holes plus the number of SUs. On the other hand, the number of binary decision variables in the formulation can be prohibitively large, as for each legitimate spectrum allocation to each SU, one variable is needed. We propose a branch-and-price (B&P) framework to tackle this challenge. This framework is in fact a branch-and-bound procedure in which at each node of the search tree, we utilize the so-called (delayed) column generation technique for solving the LP relaxation of the corresponding subproblem. As evidenced by the numerical results, the LP relaxation bounds are very tight. This allows for a very effective pruning of the search space. Compared to the previously suggested formulations, the proposed technique can require much less computational effort.
△ Less
Submitted 27 April, 2022;
originally announced April 2022.
-
Optimal Association Strategy of Multi-gateway Wireless Sensor Networks Against Smart Jammers
Authors:
Mohammad Reza Heidarpour,
Mohammad Hossein Manshaei
Abstract:
Engineers have numerous low-power wireless sensor devices in the current network setup for the Internet of Things, such as ZigBee, LoRaWAN, ANT, or Bluetooth. These low-power wireless sensors are the best candidates to transfer and collect data. But they are all vulnerable to the physical jamming attack since it is not costly for the attackers to run low power jammer sources in these networks. Hav…
▽ More
Engineers have numerous low-power wireless sensor devices in the current network setup for the Internet of Things, such as ZigBee, LoRaWAN, ANT, or Bluetooth. These low-power wireless sensors are the best candidates to transfer and collect data. But they are all vulnerable to the physical jamming attack since it is not costly for the attackers to run low power jammer sources in these networks. Having multiple gateways and providing alternative connections to sensors would help these networks to mitigate successful jamming. In this paper, we propose an analytical model to solve the problem of gateway selection and association based on a Stackelberg game, where the jammer is the follower. We first formulate the payoffs of both sensor network and attacker and then establish and prove the conditions leading to NASH equilibrium. With numerical investigation, we also present how our model can capture the performance of sensor networks under jamming with a varying number of gateways. Our results show that compared to the single gateway scenario, the network's throughput will improve by 26% and 60% when we deploy two and four gateways in the presence of a single jammer.
△ Less
Submitted 18 November, 2021;
originally announced November 2021.
-
Wide-AdGraph: Detecting Ad Trackers with a Wide Dependency Chain Graph
Authors:
Amir Hossein Kargaran,
Mohammad Sadegh Akhondzadeh,
Mohammad Reza Heidarpour,
Mohammad Hossein Manshaei,
Kave Salamatian,
Masoud Nejad Sattary
Abstract:
Websites use third-party ads and tracking services to deliver targeted ads and collect information about users that visit them. These services put users' privacy at risk, and that is why users' demand for blocking these services is growing. Most of the blocking solutions rely on crowd-sourced filter lists manually maintained by a large community of users. In this work, we seek to simplify the upda…
▽ More
Websites use third-party ads and tracking services to deliver targeted ads and collect information about users that visit them. These services put users' privacy at risk, and that is why users' demand for blocking these services is growing. Most of the blocking solutions rely on crowd-sourced filter lists manually maintained by a large community of users. In this work, we seek to simplify the update of these filter lists by combining different websites through a large-scale graph connecting all resource requests made over a large set of sites. The features of this graph are extracted and used to train a machine learning algorithm with the aim of detecting ads and tracking resources. As our approach combines different information sources, it is more robust toward evasion techniques that use obfuscation or changing the usage patterns. We evaluate our work over the Alexa top-10K websites and find its accuracy to be 96.1% biased and 90.9% unbiased with high precision and recall. It can also block new ads and tracking services, which would necessitate being blocked by further crowd-sourced existing filter lists. Moreover, the approach followed in this paper sheds light on the ecosystem of third-party tracking and advertising.
△ Less
Submitted 10 May, 2021; v1 submitted 29 April, 2020;
originally announced April 2020.