-
xApp Distillation: AI-based Conflict Mitigation in B5G O-RAN
Authors:
Hakan Erdol,
Xiaoyang Wang,
Robert Piechocki,
George Oikonomou,
Arjun Parekh
Abstract:
The advancements of machine learning-based (ML) decision-making algorithms created various research and industrial opportunities. One of these areas is ML-based near-real-time network management applications (xApps) in Open-Radio Access Network (O-RAN). Normally, xApps are designed solely for the desired objectives, and fine-tuned for deployment. However, telecommunication companies can employ mul…
▽ More
The advancements of machine learning-based (ML) decision-making algorithms created various research and industrial opportunities. One of these areas is ML-based near-real-time network management applications (xApps) in Open-Radio Access Network (O-RAN). Normally, xApps are designed solely for the desired objectives, and fine-tuned for deployment. However, telecommunication companies can employ multiple xApps and deploy them in overlapping areas. Consider the different design objectives of xApps, the deployment might cause conflicts. To prevent such conflicts, we proposed the xApp distillation method that distills knowledge from multiple xApps, then uses this knowledge to train a single model that has retained the capabilities of Previous xApps. Performance evaluations show that compared conflict mitigation schemes can cause up to six times more network outages than xApp distillation in some cases.
△ Less
Submitted 3 July, 2024;
originally announced July 2024.
-
Challenges in the Design and Implementation of IoT Testbeds in Smart-Cities: A Systematic Review
Authors:
Vijay Kumar,
Sam Gunner,
Theodoros Spyridopoulos,
Antonis Vafeas,
James Pope,
Poonam Yadav,
George Oikonomou,
Theo Tryfonas
Abstract:
Advancements in wireless communication and the increased accessibility to low-cost sensing and data processing IoT technologies have increased the research and development of urban monitoring systems. Most smart city research projects rely on deploying proprietary IoT testbeds for indoor and outdoor data collection. Such testbeds typically rely on a three-tier architecture composed of the Endpoint…
▽ More
Advancements in wireless communication and the increased accessibility to low-cost sensing and data processing IoT technologies have increased the research and development of urban monitoring systems. Most smart city research projects rely on deploying proprietary IoT testbeds for indoor and outdoor data collection. Such testbeds typically rely on a three-tier architecture composed of the Endpoint, the Edge, and the Cloud. Managing the system's operation whilst considering the security and privacy challenges that emerge, such as data privacy controls, network security, and security updates on the devices, is challenging. This work presents a systematic study of the challenges of developing, deploying and managing urban monitoring testbeds, as experienced in a series of urban monitoring research projects, followed by an analysis of the relevant literature. By identifying the challenges in the various projects and organising them under the V-model development lifecycle levels, we provide a reference guide for future projects. Understanding the challenges early on will facilitate current and future smart-cities IoT research projects to reduce implementation time and deliver secure and resilient testbeds.
△ Less
Submitted 21 February, 2023;
originally announced February 2023.
-
Resource-Interaction Graph: Efficient Graph Representation for Anomaly Detection
Authors:
James Pope,
Jinyuan Liang,
Vijay Kumar,
Francesco Raimondo,
Xinyi Sun,
Ryan McConville,
Thomas Pasquier,
Rob Piechocki,
George Oikonomou,
Bo Luo,
Dan Howarth,
Ioannis Mavromatis,
Adrian Sanchez Mompo,
Pietro Carnelli,
Theodoros Spyridopoulos,
Aftab Khan
Abstract:
Security research has concentrated on converting operating system audit logs into suitable graphs, such as provenance graphs, for analysis. However, provenance graphs can grow very large requiring significant computational resources beyond what is necessary for many security tasks and are not feasible for resource constrained environments, such as edge devices. To address this problem, we present…
▽ More
Security research has concentrated on converting operating system audit logs into suitable graphs, such as provenance graphs, for analysis. However, provenance graphs can grow very large requiring significant computational resources beyond what is necessary for many security tasks and are not feasible for resource constrained environments, such as edge devices. To address this problem, we present the \textit{resource-interaction graph} that is built directly from the audit log. We show that the resource-interaction graph's storage requirements are significantly lower than provenance graphs using an open-source data set with two container escape attacks captured from an edge device. We use a graph autoencoder and graph clustering technique to evaluate the representation for an anomaly detection task. Both approaches are unsupervised and are thus suitable for detecting zero-day attacks. The approaches can achieve f1 scores typically over 80\% and in some cases over 90\% for the selected data set and attacks.
△ Less
Submitted 16 December, 2022;
originally announced December 2022.
-
LE3D: A Lightweight Ensemble Framework of Data Drift Detectors for Resource-Constrained Devices
Authors:
Ioannis Mavromatis,
Adrian Sanchez-Mompo,
Francesco Raimondo,
James Pope,
Marcello Bullo,
Ingram Weeks,
Vijay Kumar,
Pietro Carnelli,
George Oikonomou,
Theodoros Spyridopoulos,
Aftab Khan
Abstract:
Data integrity becomes paramount as the number of Internet of Things (IoT) sensor deployments increases. Sensor data can be altered by benign causes or malicious actions. Mechanisms that detect drifts and irregularities can prevent disruptions and data bias in the state of an IoT application. This paper presents LE3D, an ensemble framework of data drift estimators capable of detecting abnormal sen…
▽ More
Data integrity becomes paramount as the number of Internet of Things (IoT) sensor deployments increases. Sensor data can be altered by benign causes or malicious actions. Mechanisms that detect drifts and irregularities can prevent disruptions and data bias in the state of an IoT application. This paper presents LE3D, an ensemble framework of data drift estimators capable of detecting abnormal sensor behaviours. Working collaboratively with surrounding IoT devices, the type of drift (natural/abnormal) can also be identified and reported to the end-user. The proposed framework is a lightweight and unsupervised implementation able to run on resource-constrained IoT devices. Our framework is also generalisable, adapting to new sensor streams and environments with minimal online reconfiguration. We compare our method against state-of-the-art ensemble data drift detection frameworks, evaluating both the real-world detection accuracy as well as the resource utilisation of the implementation. Experimenting with real-world data and emulated drifts, we show the effectiveness of our method, which achieves up to 97% of detection accuracy while requiring minimal resources to run.
△ Less
Submitted 18 November, 2022; v1 submitted 3 November, 2022;
originally announced November 2022.
-
Federated Meta-Learning for Traffic Steering in O-RAN
Authors:
Hakan Erdol,
Xiaoyang Wang,
Peizheng Li,
Jonathan D. Thomas,
Robert Piechocki,
George Oikonomou,
Rui Inacio,
Abdelrahim Ahmad,
Keith Briggs,
Shipra Kapoor
Abstract:
The vision of 5G lies in providing high data rates, low latency (for the aim of near-real-time applications), significantly increased base station capacity, and near-perfect quality of service (QoS) for users, compared to LTE networks. In order to provide such services, 5G systems will support various combinations of access technologies such as LTE, NR, NR-U and Wi-Fi. Each radio access technology…
▽ More
The vision of 5G lies in providing high data rates, low latency (for the aim of near-real-time applications), significantly increased base station capacity, and near-perfect quality of service (QoS) for users, compared to LTE networks. In order to provide such services, 5G systems will support various combinations of access technologies such as LTE, NR, NR-U and Wi-Fi. Each radio access technology (RAT) provides different types of access, and these should be allocated and managed optimally among the users. Besides resource management, 5G systems will also support a dual connectivity service. The orchestration of the network therefore becomes a more difficult problem for system managers with respect to legacy access technologies. In this paper, we propose an algorithm for RAT allocation based on federated meta-learning (FML), which enables RAN intelligent controllers (RICs) to adapt more quickly to dynamically changing environments. We have designed a simulation environment which contains LTE and 5G NR service technologies. In the simulation, our objective is to fulfil UE demands within the deadline of transmission to provide higher QoS values. We compared our proposed algorithm with a single RL agent, the Reptile algorithm and a rule-based heuristic method. Simulation results show that the proposed FML method achieves higher caching rates at first deployment round 21% and 12% respectively. Moreover, proposed approach adapts to new tasks and environments most quickly amongst the compared methods.
△ Less
Submitted 13 September, 2022;
originally announced September 2022.
-
Securing Synchronous Flooding Communications: An Atomic-SDN Implementation
Authors:
Charles Lockie,
Ioannis Mavromatis,
Aleksandar Stanoev,
Yichao Jin,
George Oikonomou
Abstract:
Synchronous Flooding (SF) protocols can enhance the wireless connectivity between Internet of Things (IoT) devices. However, existing SF solutions fail to introduce sufficient security measures due to strict time synchronisation requirements, making them vulnerable to malicious actions. Our paper presents a design paradigm for encrypted SF communications. We describe a mechanism for synchronising…
▽ More
Synchronous Flooding (SF) protocols can enhance the wireless connectivity between Internet of Things (IoT) devices. However, existing SF solutions fail to introduce sufficient security measures due to strict time synchronisation requirements, making them vulnerable to malicious actions. Our paper presents a design paradigm for encrypted SF communications. We describe a mechanism for synchronising encryption parameters in a network-wide fashion. Our solution operates with minimal overhead and without compromising communication reliability. Evaluating our paradigm on a real-world, large-scale IoT testbed, we have proven that a communication layer impervious to a range of attacks is established without sacrificing the network performance.
△ Less
Submitted 3 August, 2022;
originally announced August 2022.
-
6TiSCH++ with Bluetooth 5 and Concurrent Transmissions
Authors:
Michael Baddeley,
Adnan Aijaz,
Usman Raza,
Aleksandar Stanoev,
Yichao Jin,
Markus Schuß,
Carlo Alberto Boano,
George Oikonomou
Abstract:
Targeting dependable communications for industrial Internet of Things applications, IETF 6TiSCH provides mechanisms for efficient scheduling, routing, and forwarding of IPv6 traffic across low-power mesh networks. Yet, despite an overwhelming body of literature covering both centralized and distributed scheduling schemes for 6TiSCH, an effective control solution for large-scale multi-hop mesh netw…
▽ More
Targeting dependable communications for industrial Internet of Things applications, IETF 6TiSCH provides mechanisms for efficient scheduling, routing, and forwarding of IPv6 traffic across low-power mesh networks. Yet, despite an overwhelming body of literature covering both centralized and distributed scheduling schemes for 6TiSCH, an effective control solution for large-scale multi-hop mesh networks remains an open challenge. This paper addresses this with a novel approach that eliminates much of the routing and link-layer overhead incurred by centralized schedulers, and provides a robust mechanism for data dissemination synchronization within 6TiSCH. Specifically, we leverage the physical layer (PHY) switching capabilities of modern low-power wireless platforms to build on recent work demonstrating the viability of Concurrent Transmission (CT)-based flooding protocols across the Bluetooth 5 (BT 5) PHYs. By switching the PHY and MAC layer at runtime, we inject a BT 5-based CT flood within a standard IEEE 802.15.4 TSCH slotframe, thereby providing a reliable, low-latency scheme for 6TiSCH control messaging. We present an analytical model and experimental evaluation showing how our solution not only exploits the BT 5 high data-rate PHY layers for rapid data dissemination, but can also provide reliable 6TiSCH association and synchronization even under external radio interference. We further discuss how the proposed technique can be used to address other open challenges within the standard.
△ Less
Submitted 19 October, 2020;
originally announced October 2020.
-
Atomic-SDN: Is Synchronous Flooding the Solution to Software-Defined Networking in IoT?
Authors:
Michael Baddeley,
Usman Raza,
Aleksandar Stanoev,
George Oikonomou,
Reza Nejabati,
Mahesh Sooriyabandara,
Dimitra Simeonidou
Abstract:
The adoption of Software Defined Networking (SDN) within traditional networks has provided operators the ability to manage diverse resources and easily reconfigure networks as requirements change. Recent research has extended this concept to IEEE 802.15.4 low-power wireless networks, which form a key component of the Internet of Things (IoT). However, the multiple traffic patterns necessary for SD…
▽ More
The adoption of Software Defined Networking (SDN) within traditional networks has provided operators the ability to manage diverse resources and easily reconfigure networks as requirements change. Recent research has extended this concept to IEEE 802.15.4 low-power wireless networks, which form a key component of the Internet of Things (IoT). However, the multiple traffic patterns necessary for SDN control makes it difficult to apply this approach to these highly challenging environments. This paper presents Atomic-SDN, a highly reliable and low-latency solution for SDN in low-power wireless. Atomic-SDN introduces a novel Synchronous Flooding (SF) architecture capable of dynamically configuring SF protocols to satisfy complex SDN control requirements, and draws from the authors' previous experiences in the IEEE EWSN Dependability Competition: where SF solutions have consistently outperformed other entries. Using this approach, Atomic-SDN presents considerable performance gains over other SDN implementations for low-power IoT networks. We evaluate Atomic-SDN through simulation and experimentation, and show how utilizing SF techniques provides latency and reliability guarantees to SDN control operations as the local mesh scales. We compare Atomic-SDN against other SDN implementations based on the IEEE 802.15.4 network stack, and establish that Atomic-SDN improves SDN control by orders-of-magnitude across latency, reliability, and energy-efficiency metrics.
△ Less
Submitted 29 May, 2019; v1 submitted 19 December, 2018;
originally announced December 2018.
-
Evolving SDN for Low-Power IoT Networks
Authors:
Michael Baddeley,
Reza Nejabati,
George Oikonomou,
Mahesh Sooriyabandara,
Dimitra Simeonidou
Abstract:
Software Defined Networking (SDN) offers a flexible and scalable architecture that abstracts decision making away from individual devices and provides a programmable network platform. However, implementing a centralized SDN architecture within the constraints of a low-power wireless network faces considerable challenges. Not only is controller traffic subject to jitter due to unreliable links and…
▽ More
Software Defined Networking (SDN) offers a flexible and scalable architecture that abstracts decision making away from individual devices and provides a programmable network platform. However, implementing a centralized SDN architecture within the constraints of a low-power wireless network faces considerable challenges. Not only is controller traffic subject to jitter due to unreliable links and network contention, but the overhead generated by SDN can severely affect the performance of other traffic. This paper addresses the challenge of bringing high-overhead SDN architecture to IEEE 802.15.4 networks. We explore how traditional SDN needs to evolve in order to overcome the constraints of low-power wireless networks, and discuss protocol and architectural optimizations necessary to reduce SDN control overhead - the main barrier to successful implementation. We argue that interoperability with the existing protocol stack is necessary to provide a platform for controller discovery and coexistence with legacy networks. We consequently introduce μSDN, a lightweight SDN framework for Contiki, with both IPv6 and underlying routing protocol interoperability, as well as optimizing a number of elements within the SDN architecture to reduce control overhead to practical levels. We evaluate μSDN in terms of latency, energy, and packet delivery. Through this evaluation we show how the cost of SDN control overhead (both bootstrapping and management) can be reduced to a point where comparable performance and scalability is achieved against an IEEE 802.15.4-2012 RPL-based network. Additionally, we demonstrate μSDN through simulation: providing a use-case where the SDN configurability can be used to provide Quality of Service (QoS) for critical network flows experiencing interference, and we achieve considerable reductions in delay and jitter in comparison to a scenario without SDN.
△ Less
Submitted 29 May, 2019; v1 submitted 19 September, 2018;
originally announced September 2018.
-
Isolating SDN Control Traffic with Layer-2 Slicing in 6TiSCH Industrial IoT Networks
Authors:
Michael Baddeley,
Reza Nejabati,
George Oikonomou,
Sedat Gormus,
Mahesh Sooriyabandara,
Dimitra Simeonidou
Abstract:
Recent standardization efforts in IEEE 802.15.4-2015 Time Scheduled Channel Hopping (TSCH) and the IETF 6TiSCH Working Group (WG), aim to provide deterministic communications and efficient allocation of resources across constrained Internet of Things (IoT) networks, particularly in Industrial IoT (IIoT) scenarios. Within 6TiSCH, Software Defined Networking (SDN) has been identified as means of pro…
▽ More
Recent standardization efforts in IEEE 802.15.4-2015 Time Scheduled Channel Hopping (TSCH) and the IETF 6TiSCH Working Group (WG), aim to provide deterministic communications and efficient allocation of resources across constrained Internet of Things (IoT) networks, particularly in Industrial IoT (IIoT) scenarios. Within 6TiSCH, Software Defined Networking (SDN) has been identified as means of providing centralized control in a number of key situations. However, implementing a centralized SDN architecture in a Low Power and Lossy Network (LLN) faces considerable challenges: not only is controller traffic subject to jitter due to unreliable links and network contention, but the overhead generated by SDN can severely affect the performance of other traffic. This paper proposes using 6TiSCH tracks, a Layer-2 slicing mechanism for creating dedicated forwarding paths across TSCH networks, in order to isolate the SDN control overhead. Not only does this prevent control traffic from affecting the performance of other data flows, but the properties of 6TiSCH tracks allows deterministic, low-latency SDN controller communication. Using our own lightweight SDN implementation for Contiki OS, we firstly demonstrate the effect of SDN control traffic on application data flows across a 6TiSCH network. We then show that by slicing the network through the allocation of dedicated resources along a SDN control path, tracks provide an effective means of mitigating the cost of SDN control overhead in IEEE 802.15.4-2015 TSCH networks.
△ Less
Submitted 29 May, 2019; v1 submitted 18 September, 2018;
originally announced September 2018.
-
A Guide to the SPHERE 100 Homes Study Dataset
Authors:
Atis Elsts,
Tilo Burghardt,
Dallan Byrne,
Massimo Camplani,
Dima Damen,
Xenofon Fafoutis,
Sion Hannuna,
William Harwin,
Michael Holmes,
Balazs Janko,
Victor Ponce Lopez,
Alessandro Masullo,
Majid Mirmehdi,
George Oikonomou,
Robert Piechocki,
R. Simon Sherratt,
Emma Tonkin,
Niall Twomey,
Antonis Vafeas,
Przemyslaw Woznowski,
Ian Craddock
Abstract:
The SPHERE project has developed a multi-modal sensor platform for health and behavior monitoring in residential environments. So far, the SPHERE platform has been deployed for data collection in approximately 50 homes for duration up to one year. This technical document describes the format and the expected content of the SPHERE dataset(s) under preparation. It includes a list of some data qualit…
▽ More
The SPHERE project has developed a multi-modal sensor platform for health and behavior monitoring in residential environments. So far, the SPHERE platform has been deployed for data collection in approximately 50 homes for duration up to one year. This technical document describes the format and the expected content of the SPHERE dataset(s) under preparation. It includes a list of some data quality problems (both known to exist in the dataset(s) and potential ones), their workarounds, and other information important to people working with the SPHERE data, software, and hardware. This document does not aim to be an exhaustive descriptor of the SPHERE dataset(s); it also does not aim to discuss or validate the potential scientific uses of the SPHERE data.
△ Less
Submitted 30 October, 2018; v1 submitted 30 May, 2018;
originally announced May 2018.
-
Ready for Rain? A View from SPEC Research on the Future of Cloud Metrics
Authors:
Nikolas Herbst,
Rouven Krebs,
Giorgos Oikonomou,
George Kousiouris,
Athanasia Evangelinou,
Alexandru Iosup,
Samuel Kounev
Abstract:
In the past decade, cloud computing has emerged from a pursuit for a service-driven information and communication technology (ICT), into a signifcant fraction of the ICT market. Responding to the growth of the market, many alternative cloud services and their underlying systems are currently vying for the attention of cloud users and providers. Thus, benchmarking them is needed, to enable cloud us…
▽ More
In the past decade, cloud computing has emerged from a pursuit for a service-driven information and communication technology (ICT), into a signifcant fraction of the ICT market. Responding to the growth of the market, many alternative cloud services and their underlying systems are currently vying for the attention of cloud users and providers. Thus, benchmarking them is needed, to enable cloud users to make an informed choice, and to enable system DevOps to tune, design, and evaluate their systems. This requires focusing on old and new system properties, possibly leading to the re-design of classic benchmarking metrics, such as expressing performance as throughput and latency (response time), and the design of new, cloud-specififc metrics. Addressing this requirement, in this work we focus on four system properties: (i) elasticity of the cloud service, to accommodate large variations in the amount of service requested, (ii) performance isolation between the tenants of shared cloud systems, (iii) availability of cloud services and systems, and the (iv) operational risk of running a production system in a cloud environment.Focusing on key metrics, for each of these properties we review the state-of-the-art, then select or propose new metrics together with measurement approaches. We see the presented metrics as a foundation towards upcoming, industry-standard, cloud benchmarks.
Keywords: Cloud Computing; Metrics; Measurement; Benchmarking; Elasticity; Isolation; Performance; Service Level Objective; Availability; Operational Risk.
△ Less
Submitted 12 April, 2016;
originally announced April 2016.