咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Unmanned Aerial Vehicle Multi-... 收藏

Unmanned Aerial Vehicle Multi-Access Edge Computing as Security Enabler for Next-Gen 5G Security Frameworks

作     者:Jaime Ortiz Córdoba Alejandro Molina Zarca Antonio Skármeta 

作者机构:Department of Information and Communications EngineeringUniversity of MurciaMurcia30003Spain 

出 版 物:《Intelligent Automation & Soft Computing》 (智能自动化与软计算(英文))

年 卷 期:2023年第37卷第8期

页      面:2307-2333页

核心收录:

学科分类:0839[工学-网络空间安全] 08[工学] 

基  金:supported by the ONOFRE-3 project,Grant Agreement PID2020-112675RB-C44,funded by MCIN/AEI/10.13039/501100011033 funds from the Spanish Ministry of Economic Affairs and Digital Transformation and the European Union–nextGeneration EU[TSI-063000-2021-36,TSI-063000-2021-44,TSI-063000-2021-45,TSI-063000-2021-62].Antonio Skármeta received them 

主  题:UAV 5G AI NFV security 

摘      要:5G/Beyond 5G(B5G)networks provide connectivity to many heterogeneous devices,raising significant security and operational issues and making traditional infrastructure management increasingly *** this regard,new frameworks such as Anastacia-H2020 or INSPIRE-5GPlus automate the management of next-generation infrastructures,especially regarding policy-based security,abstraction,flexibility,and *** paper presents the design,workflow,and implementation of a security solution based on Unmanned Aerial Vehicles(UAVs),able to extend 5G/B5G security framework capabilities with UAV features like dynamic service provisioning in specific geographic *** proposed solution allows enforcing UAV security policies in proactive and reactive ways to automate UAV dynamic deployments and provisioning security Virtual Network Functions(VNFs)in the onboard Multi-access Edge Computing(MEC)node.A UAV has been ensembled from scratch to validate the proposal,and a raspberry-pi has been onboarded as compute *** implementation provides a VNF for dynamic UAV management,capable of dynamically loading waypoints into the flight controller to address reactive autonomous flights,and anMLbased VNF capable of detecting image *** to the security policies,the onboard VNFs can be dynamically configured to generate alerts to the framework and apply local reactions depending on the detection *** our experiments,we measured the time it takes for the solution to be ready after receiving a security policy for detecting patterns in a specific geographical *** time it takes for the solution to react automatically was also *** results show that the proactive flow configuration considering ten waypoints can be enforced in less than 3 s,and a local reactive flow can be enforced in around 1 *** consider that the results are promising and aligned with other security enabler solutions as part of existing 5G/6G security frameworks.

读者评论 与其他读者分享你的观点