BEN SAAD Sabra Thesev2 2023
BEN SAAD Sabra Thesev2 2023
BEN SAAD Sabra Thesev2 2023
5G and beyond
Sabra Ben Saad
Doctor of Philosophy
in Information and Communication Engineering
by
EURECOM
i
ACKNOWLEDGEMENT
ii
TABLE OF CONTENTS
ABSTRACT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i
ACKNOWLEDGEMENT . . . . . . . . . . . . . . . . . . . . . . . . . . ii
LIST OF FIGURES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
LIST OF TABLES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
LIST OF TERMS AND ABBREVIATIONS . . . . . . . . . . . . . . xii
1 General Introduction 1
1.1 Context and challenges . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Objectives and contributions . . . . . . . . . . . . . . . . . . . . . . . 4
1.3 Structure of thesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
iv
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
3.2 Blockchain and Smart Contract . . . . . . . . . . . . . . . . . . . . . 23
3.3 Proposed Trust Architecture . . . . . . . . . . . . . . . . . . . . . . . 26
3.3.1 Trust architecture for end-to-end network slice negotiation and
creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
3.3.2 A Trust architecture for SLA management . . . . . . . . . . . 30
3.4 Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . 38
3.4.1 End-to-end network slice resource selection . . . . . . . . . . . 40
3.4.2 Performance evolution of the Smart Contract . . . . . . . . . . 41
3.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
v
5.2.1 Local Model Poisoning . . . . . . . . . . . . . . . . . . . . . . 78
5.2.2 Data Poisoning . . . . . . . . . . . . . . . . . . . . . . . . . . 80
5.2.3 Discussion and comparison . . . . . . . . . . . . . . . . . . . . 80
5.3 Our Trust federated deep learning Framework . . . . . . . . . . . . . 81
5.3.1 Overview of TQFL Framework . . . . . . . . . . . . . . . . . . 81
5.3.2 Generation of Realistic Dataset . . . . . . . . . . . . . . . . . 81
5.3.3 Latency KPI Prediction in Federated Way . . . . . . . . . . . 83
5.3.4 Poisoning Attack Detection . . . . . . . . . . . . . . . . . . . 84
5.3.5 Poisoning Attacks Mitigation . . . . . . . . . . . . . . . . . . . 92
5.4 Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . 93
5.4.1 Experiment Setting . . . . . . . . . . . . . . . . . . . . . . . . 93
5.4.2 Evaluation of Latency prediction in Federated way . . . . . . . 94
5.4.3 Evaluation of Trust Participant Selection . . . . . . . . . . . . 96
5.4.4 Evaluation of Data Poisoning Attack Detection . . . . . . . . . 96
5.4.5 Evaluation of Model Poisoning Attack Detection . . . . . . . . 104
5.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
7 Conclusions 118
7.1 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
7.2 Perspectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
7.2.1 Trust management between 5G stakeholders . . . . . . . . . . 120
vi
7.2.2 5G Iot devices threats . . . . . . . . . . . . . . . . . . . . . . 120
7.2.3 A secure isolation among network slices . . . . . . . . . . . . . 121
LIST OF PUBLICATIONS . . . . . . . . . . . . . . . . . . . . 122
REFERENCES . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
vii
LIST OF FIGURES
viii
5.1 Overview of TQFL Architecture. . . . . . . . . . . . . . . . . . . . 82
5.2 Latency of multiple attach with different configurations of CPU and
RAM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
5.3 LDA visualization with 3 dimensional applied on the nodes update. 88
5.4 LDA visualization with 2 dimensional applied on the nodes updates. 88
5.5 Mean Squared error of our FL model when using ADAM Optimizer. 96
5.6 Mean Squared error of our FL model when using SGD Optimizer. . 97
5.7 LDA + K-means for different number of malicious nodes (ADAM
optimizer). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
5.8 LDA + KNN for different number of malicious nodes (ADAM op-
timizer). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
5.9 LDA + K-means for different number of malicious nodes (SGD
optimizer). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
5.10 LDA + KNN for different number of malicious nodes (SGD optimizer). 99
5.11 PCA + k-means for different number of malicious nodes (ADAM
optimizer). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
5.12 PCA + KNN for different number of malicious nodes (ADAM op-
timizer). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
5.13 PCA + k-means for different number of malicious nodes (SGD op-
timizer). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
5.14 PCA + kNN for different number of malicious nodes (SGD optimizer).101
5.15 Mean Squared error of the FL global model (ADAM optimizer). . . 102
5.16 LDA + K-means on top of the ADAM optimizer. . . . . . . . . . . 103
5.17 PCA + K-means on top of the SGD optimizer. . . . . . . . . . . . . . 103
6.1 The proposed trust B5G Architecture of our XAI-Empowered FL Frame-
work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
6.2 Partial Dependence Plots on EARCD dataset. . . . . . . . . . . . . . . 111
6.3 Partial Dependence Plots on EARCD dataset. . . . . . . . . . . . . 112
6.4 SHAP value (impact on model output). . . . . . . . . . . . . . . . . . 113
6.5 SHAP value ( average impact on model output). . . . . . . . . . . . . . 113
6.6 Feature Importance using Rulefit on EARCD Dataset. . . . . . . . . . 113
6.7 Rulefit results: Top 15 Rows of the Un-filtered Rules Features. . . . . . 114
ix
6.8 Rulefit results: Top 5 Rows of the Filtered Rules. . . . . . . . . . . 115
6.9 Lime results displaying the predicted label and the top five features impact. 116
x
LIST OF TABLES
xi
LIST OF TERMS AND ABBREVIATIONS
5G Fifth generation networks . . . . . . 2, 3, 6, 18, 22, 25, 26, 30, 33, 42, 119
AI Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . i, 3, 4
AR Augmented Reality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
CN Core Network . . . . . . . . . . . . . . . . . . . . . . . . . . . 3, 5, 6, 50
CU Central Unit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
xii
DU Distributed Unit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
EM Element Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
eMBB enhanced Mobile BroadBand . . . . . . 3, 22, 30, 33, 34, 37, 42, 45, 47
ETH Ether . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
ID IDentity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
IP Internet Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
KPI Key Performance Indicator . . . . . . . . . . . 5, 23, 36, 37, 76, 77, 119
LP Linear Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
ML Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
mMTC massive Machine Type Communications 3, 22, 25, 30, 33, 34, 49, 119
xiii
NIDS Network Intrusion Detection System . . . . . . . . . . . . . . . . . . 54
RO Resource Orchestrator . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
SLA Service Level Agreements . i, 3–6, 22, 23, 26, 28–30, 32–38, 40–42, 45–47,
76, 77, 81, 119
SO Slice Orchestrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
xiv
TCP Transmission Control Protocol . . . . . . . . . . . . . . . . . . . . . . 52
TD Technological Domains . . . . . . . . 22, 23, 26–29, 32, 37, 38, 40, 41, 45
uRLLC ultra-Reliable Low Latency Communications . 3, 22, 25, 30, 33, 34, 38,
42, 45
VNF Virtual Network Functions . . . . . . . . . . . . . 11, 26, 27, 76, 77, 119
ZSM Zero touch network and Service Management . . . . . . . 3–6, 50, 76, 81
xv
CHAPTER 1
General Introduction
1
CHAPTER 1. THE GENERAL INTRODUCTION
Since their initial arrival in the late 1970s, cellular networks have evolved rapidly,
with successive generations, 2th generation mobile network (2G) through Fourth
generation mobile network (4G), representing significant milestones in the develop-
ment of mobile connectivity. This evolution was accompanied by a diversified and
growing demand, and an overwhelming consumption of data and information. In
fact, the cellular communication began with the transmission of voice in 2G, and
then the transfer of simple images in 3th generation mobile network (3G). It did
not stop here, but it was able to transmit a greater/a larger amount of information
such as multimedia videos in 4G. However, driven by emerging technologies, such
as autonomous vehicles, Augmented Reality (AR), and the exponential growth of
the Internet of Things (IoT), global demand for mobile bandwidth is growing at an
explosive rate and 4G networks are already struggling to cope with the demands
placed upon them.
In this context, the new fifth generation of wireless communications comes to us
faster than can be imagined to deal with the technical limits of 4G. It provides a
significant improvement in the perceived Quality of Service (QoS) to users com-
pared to the 4G LTE network and, more importantly, opens new perspectives for
the vertical industry [5]. Fifth generation networks (5G) focuses on several key
perspectives, (cf. Fig. 1.1) mainly: (i) Very low latency, which is a very impor-
tant metric in the definition of the 5G network. 5G aims to minimize latency
up to 1 ms since it promises to support life-critical systems, services with a very
low tolerance for delays, and real-time applications. (ii) Ubiquitous connectivity,
due to the continued exploding demand of data, the 5G network aims to meet
the demand for capacity. It also seeks to allow large numbers of device types
to connect ubiquitously. Besides, it targets to provide an uninterrupted user ex-
perience by achieving a user-centric vision through ubiquitous connectivity. (iii)
High-speed connection, 5G will greatly improve the high-speed connection with
fast data transmission and reception. It aims to achieve download speeds of one
gigabit per seconds, and more than 10 times faster than what 4G provided.
2
CHAPTER 1. THE GENERAL INTRODUCTION
3
CHAPTER 1. THE GENERAL INTRODUCTION
• The ZSM paradigm is featured by the large usage of advanced deep learning
algorithms in order to dynamically build efficient decisions. In this con-
text, FL proved its efficiency in not only building collaborative deep learn-
ing models among several network slices but also ensuring the privacy and
isolation of such network slices. Indeed, FL-based solutions give ”machine-
centric” decisions about running network slices and their performance, which
will be then executed/applied by managers, i.e., slice manager staff/module.
However, FL-enabled solutions do not provide any details about why and
how such decisions were made, and thus such decisions cannot be properly
4
CHAPTER 1. THE GENERAL INTRODUCTION
In this section, we summarize the content of each chapter of our thesis for the ease
of the reader:
5
CHAPTER 1. THE GENERAL INTRODUCTION
• The chapter 2 introduces the state of the art on the 5G network in general
and on network slicing in particular, as well as pertinent related works. In
this chapter, We begin by describing a few 5G architectures that have been
proposed by the research community, along with the primary difficulties that
it faces. We then present an appropriate study on the new technologies used
to successfully deploy 5G networks and network slicing, such as SDN and
NFV. After that, we give a thorough overview of the end-to-end network
slicing, including the CN, RAN, and transport network. Finally, We list the
5G network slicing challenges and open issues.
• The chapter 3 is organized as follows: The section 3.1 presents the introduc-
tion of the chapter. Section 3.2 introduces the concept of Blockchain and
Smart Contracts. Section 3.3 details our proposed trust architecture for an
end-to-end network slice negotiation, creation, and SLA management. Sec-
tion 3.4 presents the performance evaluation of the proposed algorithms and
trust model framework.
• The chapter 4 is organized as follows: The section 4.1 presents the introduc-
tion of the chapter. In section 4.2, we present a review of related works. We
provide general background about the used mechanisms to detect and mit-
igate DDoS attacks. Section 4.3 details the contributions related to attach
events and attack detection, including the devised ML method. We propose
a ZSM solution that uses a closed-control loop featuring Machine Learning
(ML), to detect and mitigate in-slice attacks on 5G CN components, focus-
ing on DDoS attacks. Section 4.4 presents our attack mitigation algorithm.
In section 4.4, we introduce the proof of concept implementation and ex-
tensive performance results of the proposed detection algorithm, comparing
it with a statistical-based solution. Finally, section 4.7 concludes the chapter.
• The chapter 5 is organized as follows: The section 5.1 presents the introduc-
tion of the chapter. In Section 5.2, we present a review of related works. We
provide general background about the used mechanisms to detect/mitigate
poisoning attacks in FL. Section 5.3 describes the design and specification
of the proposed framework. This section presents a novel framework to au-
tomatically detect malicious participants in FL process. In particular, our
framework is first based on deep reinforcement network to dynamically se-
lect a network slice as a trusted participant based mainly on its reputation.
The selected participant will then be in charge of identifying the poisoning
models updates by leveraging unsupervised machine learning. In Section 5.4,
6
CHAPTER 1. THE GENERAL INTRODUCTION
we evaluate and validate our framework. Finally, section 5.5 concludes the
chapter.
• The chapter 6 is organized as follows: The section 6.1 presents the intro-
duction of the chapter. In Section 6.2, we present a review of related works.
In Section 6.3, we propose a novel trusted framework, using the XAI algo-
rithms.We evaluate and validate our novel XAI-powered FL-enabled frame-
work. We design a novel XAI-powered framework to explain FL-based de-
cisions. In Section 6.4, we evaluate and validate our novel XAI-powered
FL-enabled framework. Finally, section 6.5 concludes the chapter.
7
CHAPTER 2
8
CHAPTER 2. STATE OF THE ART
2.1 5G Networks
The advantages of lower backbone costs, adjustable QoS, the potential for quick
and new service development, interoperability between wireless and fixed net-
works, network management, were formed as the basis for the decision to migrate
networking systems from traditional wireless networks to the Next Generation
Networks (5G). In comparison to earlier networking systems, 5G plans to provide
the highest performance in terms of data throughput, low latency, coverage ca-
pacity, and improved security and energy efficiency over spectrum [9]. Numerous
organizations, groups, and standardization forums have started the research on
5G, although it has not yet been formally defined and classified [10]. Such 5G
research may be motivated by the limitations of earlier technology, namely:
2.2 5G technologies
The existing network infrastructure is unfit to meet the needs of the 5G network,
since it lacks the capability required by the new generation. In particular, network
administration for traditional infrastructure is quite difficult and not suitable for
5G networks, because network configuration updates were usually made manually.
SDN and NFV therefore propose a developing technology to address the limits of
the current networks [11]. Virtualizing entire classes of network functions is made
possible by SDN and NFV, which allow network control to be separated from
the underlying data planes or switch hardware, accordingly. SDN allows for easy
hardware deployment and flexibility when altering network policies, and promotes
network innovation and development. Due to its design, which uses a centralized
SDN controller, it disrupts the virtual integration between the data and control
plane.
Using an open interface like OpenFlow and the centralized network controller, the
combination of SDN and NFV offers a global view of the entire network. SDN can
accommodate brand-new initiatives and services at every level of user demand or
need. Academies and businesses have recently expressed a great deal of interest
in SDN and NFV. They serve as a crucial stage in the evolution and creation of
9
CHAPTER 2. STATE OF THE ART
• The application plane and data plane are connected via the SDN controller,
which oversees the control plane. It converts the demands of the apps into
suitable forwarding rules that the underlying network switches can imple-
ment. The SDN controller can access the features offered by the SDN-
capable switching devices thanks to the southbound API. These tasks could
involve reporting network status and controlling packet forwarding rules.
• The data plane includes the network components (such as routers and switches)
that gather network status data and handle packets in accordance with in-
structions from the SDN controller, such as traffic statistics and network
topology.
10
CHAPTER 2. STATE OF THE ART
The virtual network function is the main NFV concept. Specific network func-
tions that are run on one or more Virtual Machine (VM)s on the hardware network
infrastructure are managed using Virtual Network Functions (VNF) (switches,
routers, etc.). To offer excellent network communication service, these VNFs can
be joined or combined as different components. They are made to supply network
components and consolidate resources to support a fully virtual environment. Fur-
thermore, E2E services should be unaffected by the efficient deployment of VNF
instances at the carrier level.
The three main distinctions between NFV and existing practice are introduced
below:
As shown in Fig. 2.1, there are three key functional blocks in the NFV archi-
tecture:
• NFV Infrastructure (NFVI): The hardware and software resources that com-
pose the NFV environment are all included in the NFV infrastructure. NFVI
covers inter-location network connectivity, such as that between data centers
and public or private hybrid clouds. Computing, storage, and networking
hardware are all examples of physical resources. The virtualization layer,
which is just above the hardware and summarizes the physical resources,
provides processing, storage, and communication for NFVs.
11
CHAPTER 2. STATE OF THE ART
These blocks offer the functionality needed for VNF management opera-
tions, including provisioning and configuration. In order to facilitate infras-
tructure virtualization and VNF lifecycle management, NFV-MANO offers
orchestration and lifecycle management of physical or virtual resources.
The ORAN standards will change the confidential nature of the RAN market,
where RAN vendors have proprietary equipment and software. ORAN separates
software and hardware, known as disaggregation. You no longer need to use spe-
cific software for particular hardware. Therefore, an O RAN architecture makes
the network more flexible and interoperable. The engineers are developing the
ORAN technology using virtual RAN (vRAN) principles and technologies sim-
ply because vRAN has improved network malleability and security and reduced
CAPEX and OPEX costs.
12
CHAPTER 2. STATE OF THE ART
The O-RAN architecture is well documented in the O-RAN alliance. The key
elements of the O-RAN architecture are:
• RAN Intelligent Controller (RIC) – There are two types of RICs – non-
real-time and near-real-time. Both are logical functions for controlling and
optimizing the elements and resources of an O-RAN. A near-real-time RIC
controls and optimizes elements and resources with granular data collection
and communication over the E2 interface. The E2 interface connects the
near-real-time RIC with the O-CU and O-DU. O-Cloud is a cloud computing
platform made up of the physical infrastructure nodes using the O-RAN
architecture. It also creates and hosts the various virtual network functions
(VNFs) used by the RICs and other infrastructure elements.
• O-RAN central unit (O-CU) – Logical node that hosts a handful of protocols,
which are the radio resource control (RRC), service data adaptation protocol
(SDAP), and packet data convergence protocol (PDCP).
• O-RAN distributed unit (O-DU) is a logical node that hosts another set of
protocols, which are the radio link control (RLC) protocol, medium access
control (MAC) protocol, and the physical interface (PHY).
Recent technological advancements like network slicing are important to the in-
troduction of the future 5G network generation. It is an emergent paradigm that
is considered as the basis of 5G networks. In [10], the Next Generation Mo-
bile Network (NGMN) Alliance defines network slicing in the context of 5G. It
is described as a technology that makes it possible to combine physical and/or
logical network resources with cloud computing resources in a multi-tenant, open
software-oriented network environment. It entails deploying a number of inde-
pendent logical networks on top of a shared and common physical infrastructure
13
CHAPTER 2. STATE OF THE ART
The increased throughput need should be addressed by 5G, which should also offer
more elasticity, scalability, and adaptability. The CN architecture established by
earlier generations aims to be better adaptable to these new 5G network specifi-
cations. In order to accomplish these specifications, the 3GPP in [19] introduces a
new CN design, named Next Generation core, where they rearrange the EPC en-
tity into more fine-grained network functions. According to 3GPP specifications,
14
CHAPTER 2. STATE OF THE ART
The following are the main network functions listed in the new CN, as shown
in Fig.2.2:
• Policy Control Function (PCF) for providing policy rules to Control Plane
(CP) functions, and access subscription information for policy decisions.
In order to meet the networks’ increased bandwidth demands, the transport net-
work in 5G is completely redesigned. The integration of the backhaul and fronthaul
segments on the same transport substrate and the inclusion of deep programming
in the transport network are the foundations for the transport network’s evolution.
15
CHAPTER 2. STATE OF THE ART
Fronthaul refers to the network that connects remote radio heads to Baseband
units (BBU)s, and the Backhaul represents the link between the Centralized Unit
(CU) and the core network. The upcoming 5G Backhaul/Fronthaul must be capa-
ble of integrating different transmission technologies, such as optical Ethernet, IP,
and millimeter-wave, in order to satisfy the 5G requirements. Additionally, while
considering the needs of the use case and the network conditions, a flexible split
of base stations is crucial. The split of base station functions affects the roles of
backhaul and fronthaul, resulting in an integrated transport network architecture
that mixes both the flexibility and reflecting of RAN centralization. The authors
of [21] introduce an architecture based on the development of an overlay network.
It is a combined control plane and data plane-based upstream and downstream
transport architecture. Network nodes that can combine several upstream and
downstream transport technologies using the same data frame are necessary for
it.
An architecture based on merging an optical and wireless backhaul/fronthaul was
presented by the authors of [22]. Moreover, the network circumstances and service
requirements determine the functional distribution of RAN and the level of cen-
tralization. Additionally, implementing network slicing can be a crucial enabler for
ensuring performance and isolation between various logical networks, that employ
various functional RAN distributions. In this context, network operators employ
slicing techniques and jointly optimize VNF embedding based on the links’ avail-
ability and the transport network’s architecture.
16
CHAPTER 2. STATE OF THE ART
Infrastructure Layer
Idr Idr
Infrastructure Infrastructure
IDM IDM
Domain 1 Domain 2
Iii Iii
Itp Itp
Infrastructure Provider 1 Infrastructure Provider 2
17
CHAPTER 2. STATE OF THE ART
Imt
Slice Management Provider NSI3 Tenant MonB5G System Operator
Imt
unsp. NSI2 Tenant Itp Iop NSI1 Tenant
Imp Business Layer
Itp Itp
Management and
MonB5G Portal Its
Orchestration Layer
Ipi
B NSI2,3 (MaaS) NSI1a A unsp. unsp. NSI1b
IDSM1
(SFL/SML) (SFL/SML)
unsp. unsp.
NSI2 (SFL) NSI3 (SFL)
Slice IDMO Slice
unsp. unsp. IOMF
DSF Orchestration Iid Iid Orchestration
Domain 1 DMO DMO Domain 2
C
Idr Idr Infrastructure
unsp.
Layer
Infrastructure Domain 1 IDM IdrIDM Infrastructure Domain 2
Iii Iii
Itp Itp
Infrastructure Provider 1 Infrastructure Provider 2
The proposed slice management approach can also be used for end-to-end slice
management, when slices are implemented across multiple domains as shown in
Fig. 2.4. In such a case, the entity called Inter-Domain Slice Manager (IDSM)
is responsible for the end-to-end slice management. It interacts with SMLs of all
domain slices (DSM), that compose the E2E slice. The IDSM is a part of the slice
template (a set of VNFs), and in some cases, it can be generated automatically
by the IDMO. When IDSM is in use, it provides to the slice tenant with the
management interface. The IDSM is also responsible for the calculation of slice-
related KPIs. Fig. 2.4 shows a multi-domain slice, with the IDSM is deployed
(Domain 1 and Domain 2). The single domain slice is the internal structure of a
self-managed. It includes functions for monitoring (Monitoring System Function
(MS)), anomaly detection (Analytic Engine Function (AE)), and decision-making
(Decision Engine Function (DE)).
18
CHAPTER 2. STATE OF THE ART
for the core network of Long Term Evolution (LTE), where a distributed database
is used instead of having a centralized database Home Subscriber Server (HSS)
to maintain subscriber information. Indeed, when an operator configures a new
Subscriber Identification Module (SIM) card, the SIM information is distributed
within the Consortium Blockchain through a new block. Then, this block will
be available to all the nodes (core networks) in the chain. Furthermore, when
a user performs any activity such as subscribing to a new offer or charging the
SIM card, this information is stored in another block. After its validation by
the other nodes, the block will be published to all the other nodes within the
chain as a copy in the distributed ledger. The ledger can have the same role as
HSS to store user subscription information. When a user sends an attach request
to Evolved Packet Core (EPC), the latter retrieves the information of Mobile
Subscriber Identity (IMSI) from the message and performs a null transaction to
the Smart Contract. Then, the Smart Contract will check if the user belongs to
one of the operators who are already in agreement with Consortium Blockchain.
Hence, the Smart Contract acts as distributed Self Organizing Network (SON)
features to handle self-transactions among mobile operators in return for sharing
small cells’ infrastructure.
19
CHAPTER 2. STATE OF THE ART
20
CHAPTER 3
21
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
3.1 Introduction
The evolution of 5G comes to us faster than can be imagined offering a great op-
portunity for new business model innovations [32]. Network Slicing is one of the
key enablers of 5G, which consists of creating virtual end-to-end mobile networks
tailored to the application needs [33, 34]. The network slicing concept allows mul-
tiplexing virtualized and distinct logical networks on the same physical network
infrastructure. Through network slicing, 5G supports three types of network slices
supporting services with specific performance requirements: eMBB, mMTC, and
uRLLC [35, 36]. Usually, an end-to-end network slice comprises three main sub-
slices: RAN, Core, and Transport networks [33] corresponding to three distinct
Technological Domains (TD). Therefore, to deploy an end-to-end network slice,
the Slice Provider (SP) has to lease resources for each sub-slice on each TD and
from different Resource Providers (RP)s.
First of all, the Vertical (V) chooses the network slice type that perfectly matches
its needs, requesting the creation of a new network slice using a blueprint or a
network slice template provided by the SP. Next, this template will be translated
by SP into specific slice resource requirements for each sub-slice component or TD,
such as needed computing resources, network resources, radio resources, etc. SP
uses a resource broker mechanism to select which RP will deploy a sub-slice for
each TD. The selection process relies on SP’s specific algorithm, which considers
several criteria [37], such as cost, QoS, reputation, etc.
Once the needed resources by each sub-slice are allocated, meaning that the end-
to-end network slice is ready to be deployed, SLA contracts are signed between V
and SP as well as between RPs and SP. The SLA specifies what customers can
expect from SP. SLA is used to check if a defined service is delivered as contracted
and helps managing QoS degradation. Indeed, SLA defines QoS requirements such
as bandwidth, throughput, and latency, without specifying the technology to be
used to deliver a particular service. Moreover, SLAs include different sections on
the concerned parties, the service fee, the validity period, and the compensation
value used in case of SLA is not respected (i.e., when the performance levels are
not met). In 5G, SLA should indicate the QoS related to the pre-defined slice
types, i.e. mMTC, eMBB, and uRLLC.
In this chapter, we propose a trust architecture to create and manage end-to-end
network slices in 5G ensuring security and anonymous transactions. The proposed
architecture relies on Blockchain and Smart Contracts to (1) negotiate and deploy
an end-to-end network slice; (2) manage automatically SLA signed between all the
involved actors, the slice tenant, SP, and RPs. First, we propose a trust architec-
ture model that allows the resource broker, used by SP, to select the appropriate
22
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
RP that will deploy a sub-slice for each TD. The resource selection is formulated
as an Integer Linear Program (ILP), where the aim is to maximize the RP’s rep-
utation while minimizing the cost.
Once the RPs are selected and SLA established, the proposed trust architecture
framework allows monitoring the KPI of the deployed end-to-end network slices,
in order to verify if SLAs are violated by RPs, and hence automatically compen-
sate V and SP. Finally, the RP reputation is build using the information on the
SLA violation; RP’s reputation increases if it has respected the established SLA,
otherwise it decreases. Computer simulation has been used to validate the pro-
posed framework in terms of (1) resource negotiation and RP selection to deploy
an end-to-end network slice; (2) ability to detect SLA violation and compensate
both V and SP.
A previous work [38] has introduced a Blockchain-based brokering mechanism
to deploy end-to-end network slices. Although we share the same concept of using
a Blockchain-based broker, in this chapter we devise a selection algorithm based on
RP reputation, which is an important criterion to establish trust relations among
the involved actors. Regarding SLA management, the work in [39] introduces SLA
trust management in the context of a simple scenario of a Cloud Resource Provider
and a tenant. Despite the fact that we share the concept of using Blockchain, we
address in this chapter a more complex scenario where not only one SLA has to
be managed, but different SLAs involving different stakeholders.
The next sections of this chapter are organized as follows: section 3.2 introduces
the concept of Blockchain and Smart Contracts. Section 3.3 details our proposed
trust architecture for an end-to-end network slice negotiation, creation and SLA
management. Section 3.4 presents the performance evaluation of the proposed
algorithms and trust model framework.
Blockchain [40] is a chain of blocks, in other words a database that stores infor-
mation about transactions like date, persons participating in transactions, time,
and amount transferred. A copy of the Blockchain is spread over many computers.
These computers are called nodes constituting a network. It also stores unique
codes called ”hash” which are cryptographic codes created by special algorithms
such as ”Proof of work” used in Bitcoin transactions [41]. Actually, when a trans-
action occurs, it will be checked by all nodes. For each transaction, a new block
is created. This block is sent to every node in the network. If a transaction is
approved by the majority of the nodes using a special algorithm, then the block
23
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
24
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
is validated and agreed on by all distributed and trusted nodes of the network.
Moreover, DApps are frontend user apps that interact with the Smart Contracts
by initiating specific transactions that call functions within the Smart Contract.
Several works advocate for the usage of Blockchain and Smart Contracts in 5G. In
[47], the authors summarize the key opportunities offered by Blockchain and Smart
Contract technologies in 5G networks. The authors propose using Blockchain-
based security techniques for 5 scenarios in 5G. The first scenario, ”5G Infras-
tructure for Crowdsourcing”, allows smaller infrastructure investors to roll out
cellular towers that will be a part of the overall operator’s infrastructure. These
investors are registered, managed, and also automatically paid upon the use of the
resources implicating secure technologies such as Blockchain and Smart Contracts.
The second scenario, ” 5G Infrastructure Sharing”, in which a seller Mobile Net-
work Operator (MNO) offers telecommunication services either (i) cellular towers
or (ii) a subset of these towers. Here, Blockchain can be used in managing and
tracking resource usage and sharing. The third scenario, ”International Roam-
ing”, is one of the challenging issues in the telecom sector as it involves brokers
and third parties to settle down payment, and charges rules among them. In 5G,
many parties are going to be involved in the usage of networks. These parties may
include multiple operators, intermediary networks, and international intermediary
exchanges.
Smart Contracts can be implemented to accomplish a Blockchain-based pay-
ment and roaming in which charges and consumption per usage are recorded and
tracked. The fourth scenario,”Network Slicing (NS)”, where a Network Slice Bro-
ker (NSB) is used to perform network slicing by exposing service capabilities of
the mobile operator network during the brokering mechanism. A Blockchain and
Smart Contract with decentralized storage, like Storj1 or IPFS2 , can be used to re-
place NSB functionalities. The fifth scenario is “Management and Authentication
of mMTC/ uRLLC” where millions of IoT devices are expected to be connected,
and some scenarios may require few milliseconds of latency. Incorporating such
a large number of different IoT devices opens up the possibility for new business
models and services to be offered to mobile customers. Blockchain and Smart
Contracts, with decentralized storage, are more powerful and attractive alterna-
tives to these centralized operators, in which such management functionalities can
be performed in a decentralized manner.
1
https://storj.io/
2
https://ipfs.io/
25
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
Slice Provider
Resources Broker
Reputation SSDC/Hash/Reputation
Resource Provider 2
Resource Provider 3
As stated earlier, there are two separate steps to create and manage an end-
to-end network slice. Firstly, SP selects the RPs in which the different sub-slices
composing the end-to-end network slice requested by V will be deployed. This step
ends when the SLAs are signed between, on one hand the SP and V actors and
on the other hand, between the SP and RPs actors. The second step concerns the
SLA management, which consists of monitoring the SLA violation and applying
for penalties and compensation if deemed appropriate. For both steps, we are
proposing a trust architecture to guarantee the well-functioning of such a complex
system that involves different stakeholders and actors.
3.3.1 Trust architecture for end-to-end network slice negotiation and creation
26
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
latter decomposes it to sub-slices and negotiates for each sub-slice the necessary
resources from the TD Resource Providers. This procedure is defined in [38] and
is as follows. V or the slice owner requests the creation of a network slice using a
template or a blueprint. This template may contain high-level information. The
SP will translate the template to specific slice resource requirements, such as the
number and types of sub-slices, PNF, VNF, Central Processing Unit (CPU), I/O,
memory, storage, etc. The sub-slice components are translated to resources of a
TD. Actually, these resources of a TD can be computing (such as CPU, I/O),
storage, radio evolved Node B (eNB), Central Unit (CU), Distributed Unit (DU),
Remote Radio Head (RRH) / Remote Radio Unit (RRU)), and transport (e.g.,
Virtual Local Area Network (VLAN), Virtual Private Network (VPN). We assume
that a slice is composed of several TDs, noted as NS = {T D1 , T D2 , T D3 , . . . , T Dn }.
For each TD, SP describes the needed resources according to the slice type. For
instance, in the computing resource domain, they could include the number of
CPUs, number of VM or container instances, etc. For the radio domain, resources
could be related to the functional split type, the Medium Access Control (MAC)
scheduler algorithm, the number of Physical Resource Blocks (PRB), etc. On the
other hand, transport domain resources may include the type of link (bandwidth,
latency), number of VLANs, front haul link capacity, VPN links, QoS, etc. We
define R(T Di ) = {p1 , p2 , p3 , . . . , pm }, as the set of parameters requested by T Di . In
this context, a trusted model is needed to guarantee the creation and the instanti-
ation of the sub-slices to build the end-to-end network slice, particularly knowing
the presence of different business actors, namely V or slice owner, SP, RP.
We illustrate in Fig. 3.1 a novel trust architecture that allows negotiating and
deploying an end-to-end network slice. The proposed architecture includes all
the above-mentioned actors in addition to a third-tier entity that creates and
maintains the reputation of RP, namely Resource Provider Trust. SP owns the
Blockchain layer, which is used to generate and negotiate contracts between the
slice and RPs. The negotiation between the SP and RPs is done per sub-slice. The
sub-entity at the SP in charge of this negotiation is the resources broker. The lat-
ter selects the different RPs, per TD, that maximizes a specific objective function.
An example of the latter could be the reduction of the deployment cost [38]. In
this chapter, we envision a sub-slice deployment brokering mechanism as series of
small contracts. Each contract has a unique identifier and some data fields and can
also perform actions such as creating a new contract or updating the Blockchain
state. Contract actions are triggered by on-chain data updates (i.e., the creation
of a new contract). Each sub-slice generates a contract. The end-to-end slice is
ready for deployment once all the contracts regarding its sub-slices are negotiated
and finalized.
27
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
Once each sub-slice is described in terms of resources (i.e., R(T Di )), the request
for each sub-slice is sent to the Blockchain layer. Each sub-slice will generate a
contract to be negotiated. Once the query for a sub-slice arrives at the Blockchain
layer, a Sub-Slice Contract (SSC) is created and published. This contract specifies
the necessary resources needed by the sub-slice (i.e., R(T Di )) and the duration of
the sub-slice. The different RPs are notified of the new SSC. Here, all the SSCs are
visible on the Blockchain. RPs respond by publishing Sub-Slice Deployment Costs
(SSDC), which specify the cost that the RPs are willing to charge for providing
the necessary resources for each component of the sub-slice R(T Di ).
The Resource Provider Trust module records the trust value of the corresponding
resource in the SSDC as appended information in the Blockchain layer. The
original SSC collects all the related SSDC and arbitrates according to specific
objectives (e.g., cheapest, best in terms of quality, or other criteria). All other
contracts are terminated, and the winning contract is used to deploy the sub-
slice components. All the related information about the sub-slice deployment are
recorded in the Blockchain managed by SP. Relevant information on the different
interfaces allowing to access to the sub-slices, such as the stitching interface (the
Resource Orchestrator (RO) interfaces and their description), are compiled in a
Sub-Slice Deployment (SSD) document.
Once the resources are negotiated and transcribed in SLAs, which are established,
on one hand, between the SP and V and on the other hand, between the SP and
each RP. Details on how the SLA is established using a trust architecture will be
described in section 3.3.2.
Once everything is settled, the Slice Orchestrator (SO) handling the Life Life Cycle
Management (LCM) of the deployed network slices, will use the RO interfaces
indicated in each SSD to: (i) instantiate and create the sub-slice; (ii) stitch the
sub-slice with the other sub-slices to build the end-to-end network slice. Note that
each RP uses its domain RO to manage and orchestrate its resources. RP exposes
interfaces to allow other ROs or the SO to interact with the local RO.
The Resource Provider Trust module relies on the precedent experiences with RP,
particularly on the respect of the SLA signed with a SP for a served TD resource.
Indeed, a RP manages and provides resources for more than one TD. To this
aim, the Resource Provider Trust module monitors all SLA signed between a SP
28
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
Where △R is the reputation increase step, α.△R is the reputation decrease step,
ℜpmax is the maximum value of the reputation, and ℜpmin is the minimum value
of the reputation. Details on the SLA monitoring will be introduced in the coming
sections.
As stated earlier, the SP relies on a resource broker to select RPs that will serve
the different sub-slices for each TD. In this chapter, the resource broker will im-
plement a local algorithm that selects the best offer from the received SSDC. The
proposed algorithm uses two criteria for the selection, namely, cost and Resource
Provider reputation. The cost is included in the SSDC, while the reputation is
obtained from the Resource Provider trust entity (i.e., Rep(i)).
The problem of selecting the RP for the resource of TD is to find an optimal
trade-off between reducing the cost of deployment while increasing the Resource
Provider’s reputation. We formulate this problem using a Linear Program (LP).
First, we denote by Ci, j the cost of T D j resource of RP(i) , and Rep(i, j) is the repu-
tation of RP(i) when serving resource of T D j . Second, we assume that the network
slice is composed of K sub-slices that need to be deployed using K TD resources.
In addition, we assume that L RPs have responded to the SSCs published by the
resource broker. We define a binary decision variable x(i, j) that indicates whether
T Di is deployed on resources provider j.
Knowing that the objective of the resource broker is to minimize the deployment
cost and maximize the reputation of the user RP, we can formulate the problem
as follows:
K X
X L
Minimize [α(C(i, j) x(i, j) /Cmax ) − (1 − α)(Rep(i, j) x(i, j) /Repmax )] (3.3)
i=1 j=1
29
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
α ∈ {0, 1} (3.6)
Equation 3.3 reflects the objective function that aims to minimize the cost and
maximize the reputation. A weight (α) is used in order to balance between the two
objectives. A higher value of α means that the targeted solution prioritizes the
reduction of the cost, while a low value of α indicates that the solution is giving
more priority for maximizing the reputation. Repmax and Cmax are the maximum
values of Rep(i, j) and Ci j . They are used to normalize the reputation and cost
values to be used in the same objective function.
Constraint 3.4 ensures that a sub-slice resource of T D j is deployed only once.
Constraints 3.5 and 3.6 guarantee that X(i, j) variables are binary and α is between
0 and 1, respectively. By solving the ILP, the resource broker can select the optimal
RP in which a sub-slice should be deployed. We will study the solutions obtained
by solving the ILP with Gurobi solver.
Once the resources are negotiated and the SP has selected RPs in which each
sub-slice will be deployed, SLAs have to be established. On one hand, between
the SP and V and on the other hand, between SP and each RP.
Generally speaking, SLAs are contracts between consumers and a service provider.
An SLA specifies what customers can expect from a service provider. In 5G, SLA
should reflect the QoS as related to the pre-defined type of slices, i.e. mMTC,
eMBB, and uRLLC. The established SLA needs to be managed and monitored in
order to ensure that the service is well functioning, and hence build the reputation
of RPs.
The SLA management can be divided into eight phases, as shown in Fig. 3.2.
The first SLA establishment is between V and SP, while the second establishment
is between SP and RPs. In the first step, V identifies which SP can deliver the
necessary resources that meet a network slice’s needs.
The second step is the negotiation between SP and V. The two actors should
agree on the terms, target performance level for the end-to-end network slice, and
the trust monitoring system. When one party does not agree, then the process has
30
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
Begin
V identifies SPs
Agree on the
Yes
terms ?
No
i=1
i = i+1 i> K
i<=K
j=1
j<=L
Selection TD(i)
from RP(j) Yes
No
Agree on the
Yes terms ?
End End
No
Terminate of SLAs
End
to start again until a consensus is reached between the different actors. The third
step is the established agreement between V and SP. It involves the structure and
31
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
definition of the SLA template that is going to be placed. In this phase, the two
parties (V, SP) sign the contract and agree about the obligations and penalties.
The fourth step is the negotiation between SP and RPs. SP should select RPs
to serve sub-slices, hence to deploy the end-to-end slice. SP should select K TDs
from L RPs. They should agree on the terms, target performance level for the
sub-slice, and the trust monitoring system.
The fifth step is the established agreement between SP and RP. It involves
the structure and definition of the SLA template that is going to be placed. In
this phase, the parties (SP, RP) sign the contract and agree about the obligations
and penalties. It is worth noting that steps four and five are repeated for each
sub-slice to deploy.
The sixth step is the SLAs violation monitoring, which consists of monitoring
the slice and sub-slice performance metrics. This step is important to detect if
SP or RPs are meeting the defined performance level signed in SLAs. When the
service is not as expected, V must be compensated by the SP, and the latter must
be compensated by RP that did not respect the SLAs. All parties, i.e., V, RPs,
and SP, should actively monitor the metric of the slice and the sub-slices using
a trust monitoring system, which should provide reliable measurements. The last
step is the SLA termination. Based on the terms defined in the definition of SLA,
the termination of an SLA happens when the SLA validity expires or when an
SLA violation is detected. Also, they end when V wants to finish this service.
On the other hand, a calculation of the compensation in the case of SLA violation
should be calculated automatically. Finally, in the phase of the penalties for SLA
violation, the payment of the compensation, calculated based on the penalties de-
fined in the SLA will be transferred to the account of V and the SP automatically.
The period of validity: As shown in Fig. 3.3, the period of validity of a SLA
is defined by the date of beginning and the end of the network slice lifecycle. The
latter can be modified in accordance with the conditions of termination.
The parties: This section describes the parties involved in the contract, i.e.,
the three signatory parties: V, SP, and RPs. It includes the signatory parties as
32
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
SLA Structure
The date of beginning & the end of the Slice lifecycle The Slice Provider & Slice Consumer
Address
Effective Until: End date
Email
The template
The type of the services The parameters The guarantees The Billing The terminations
well as the trusted fourth party, i.e., the trust monitoring system, which is used
to prove that the wanted service worked as expected, or was unavailable or less
than the performance level signed in SLA. This part presents the properties of
the parties, such as, the name, and the contact elements. In the studied case of
Network Slicing in 5G, the first SLA is established between V and SPs. Later on,
other SLAs are established between the SP and the selected RPs.
The template: It presents an essential part of the SLA. The template defines
the parameters to ensure that the QoS offered are realistic and achievable. This
part includes five elements: the services type, the parameters, the guarantees, the
billing, and the termination condition.
The type of services: In 5G, there are different types of SLA signed. In this
new generation, we have different types of slices with distinctive prioritization.
Actually, 5G presents three network slice types, based on the typical characteristics
required for use cases and Vs. The first type is eMBB slice which is basically
an extension of the 4G mobile broadband service. The second is uRLLC which
provides low-latency and reliable communication. The third type is mMTC which
supports massive IoT devices with narrow bandwidth requirements.
Also, Slices are independent from each other and provide unique services without
33
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
interference with other slices. The core network slicing technology will facilitate
the diversity of the new services offered. The variation of each slice priority needs
dissimilar SLAs with different services. Moreover, the service provided can have
one or more operating modes. For example, SP can offer a specific service with
two modes: “normal mode” and “degraded mode”. The advantage of degrading
functionality is that SP can better plan its resources in short-term load peaks,
without bothering V. Also, the service price will be adjusted according to the
modes and is used to be attractive to V and profitable for SP.
The parameters: The parameters define the variables used in other contract
sections by presenting particular elements such as the metric and the monitoring
types. The metric is defined according to an identifier, a description (e.g., latency,
throughput, reliability), and a corresponding unit (e.g., ms, bps, %). The mon-
itoring specifies the nature of the evaluated metric such as average, maximum,
and minimum. It also presents the evaluation window and the frequency of the
values collection (period of the monitoring). As an example, for uRLLC slice, it
is important to control the maximum value of latency.
The guarantees: This part presents three elements: requirements, terms, and
penalties.
- The Requirements:
It presents the essential specifications for the slice’s good functionality; a specifica-
tion may be mandatory or optional. Moreover, it describes one or more preliminary
technical elements to be completed, such as the version of a sensor used to connect
to the mMTC slice.
- The terms of guarantees:
The terms of guarantees detail the Service Level Objectives (SLO) of the con-
tract. A guarantee is a composition of terms (e.g., reliability, latency, bandwidth,
throughput) and objectives via operators such as ”Or” and ”And”. As an example,
for the good performance of an uRLLC slice, V needs 4 objectives: the bandwidth
of the slice should be between 20 Mbps (as a minimum threshold) and 50 Mbps (as
a maximum threshold) ”and” also the slice reliability should be equal to 99.9999
%, ”and”, End-to-End latency should be between 20 ms and 100 ms, from RPs
until the end-user ”and” finally, the throughput of eMBB slice be required to
100Mbps and 1Gbps.
- Penalties:
In case of a degradation of the end-to-end network slice performance (i.e., SLA
violation), SP must pay compensation to V. In turn, the RPs involved in the SLA
violation due to sub-slice resource degradation must compensate SP. The amount
34
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
of reimbursement of each term is agreed upon among the parties and described in
the penalties section of the SLA. As an example, when the latency of the end to
end slice exceeds the threshold, it means that one or several RPs are not respecting
the performance signed in the SLA, which leads that the end-to-end SLA is not
respected. Accordingly, SP firstly pays compensation to V. Then, RPs responsible
for this bad performance of latency will pay compensation to SP.
The Billing: In general, billing follows two types: “a pay package” or “pay as
you go”. In our case, we use the billing “pay as you go” which means that the
service’s price depends on the operating modes, performance and penalties.
KPI monitoring
Vertical/Slice Owner
SLA Violation
KPI monitoring
Monitoring System
Smart Resource Trust
Contract Blockchain
KPI monitoring
SLA Violation
Resource Provider 1
SLA Violation
SLAs Violation
Resource Provider 2
SLA Violation
Resource Provider 3
Slice Provider
35
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
36
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
The first function works as follows: when the measured value sent by the moni-
toring system is above the target performance level defined in the SLA, and the
SLA life-cycle is not over yet, the number of violations will increase by one. These
functions rely on time and use the block timestamp as a reference for the current
time. As the Smart Contract is not able to automatically execute the function
by itself, the monitoring solution must periodically call the Smart Contract to
verify if the SLA is still valid or not. If the current block timestamp is above
the SLA end time, the Smart Contract verifies if there is compensation to be
paid. If not, it transfers the remaining Smart Contract balance to SP and RPs.
Else, when the terms exceed the threshold during the life-cycle of SLA, a viola-
tion compensation value will be calculated. Then, the final price will be sent to
both V and SP addresses stored by the Smart Contract, using the second function.
X
S umViolation(metrick ) = S LAviolated(metrick ) (3.7)
Inside the Smart Contract, the dynamic calculation of the compensation value
assumes that the monitoring solution performs measurements every second. Dur-
ing the SLA life-cycle, if the end-to-end slice’s measured performance is different
from the agreed performance level (threshold of latency or throughput in SLA
signed between V and SP), then one or more RPs are not delivering the defined
performance level. Thus, it is crucial to check which RP is responsible for this
issue. Let’s suppose that the slice is deployed using three TDs, where each TD is
provided by one RP (RP1 , RP2 , RP3 ). In addition, our Smart Contract contains
the SLA information, such as:
• ”Initial SLA price RP1 ” that is the initial price supposed to be paid RP1 by
SP as defined in the SLA,
For the sake of clarity, the proposed algorithm is not repeated for the two con-
sidered metrics. Hence, we will consider the following notation for the metrics
(KPIs): ”Latency/Throughput”. For the eMBB slice, the metric to control is
37
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
the ”Throughput” while for the uRLLC slice, the latency is to control. Therefore,
”Latency/Throughput” corresponds to throughput and ”Latency”, respectively. If
we aim to control more than one metric (latency and throughput) per algorithm,
then we have to add another function similar to ”CalculateCompensation” with
different inputs.
It should be noted that:
• ”CompensationPerUnitV” is the compensation value to be paid by SP to
V in the case of one violation,
38
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
24: function SendPrice(S LA Price V, S LA Price RP1 , S LA Price RP2 , S LA Price RP3 )
25: if EndofSLA = True then
26: send (S LA Price V) to (addressS P) ;
27: send (S LA Price RP1 ) to (addressRP1 ) ;
28: send (S LA Price RP2 ) to (addressRP2 ) ;
29: send (S LA Price RP3 ) to (addressRP3 ) ;
30: end if
31: end function
39
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
For the simulations, we consider that four RPs respond to the SP’s SSC. We
assume that each RP provides an offer to run sub-slices for three TDs. We have
changed the value of α (weight) for each run to observe the impact on the trade-off
(between cost and reputation) when selecting the RPs to host sub-slices.
We use the Gurobi Jupyter Notebook to solve the ILP that allows selecting the
RPs for each TD. Gurobi is useful for a wide variety of industries including manu-
facturing, financial services, energy and telecommunications as well as marketing
campaign optimization and supply network design. As explained in the previous
section, our objective function aims to find the resources based on their cost and
reputation.
Table 3.1 summarizes the simulation results. First, we randomly generate
cost and reputation for each couple (RPi ,T D j ). For each couple, the 2nd column
indicates the reputation of RPi when serving resources of T D j , while the 3rd column
corresponds to the cost of RPi to run a sub-slice in T D j . For each value of α (from
column 4th to 9th), 1 indicates that RPi has been selected to host a sub-slice of
type T D j ; 0 otherwise.
To illustrate better the results of Table 3.1, we draw three Figures: Fig. 3.5,
Fig. 3.6 and Fig. 3.7. Each figure shows, per TD, the reputation and cost of the
fourth RP and the selected RP for each value of α.
For T D1 (Fig. 3.5), we remark that RP2 is selected for low values of α (between
0 and 0.6), while for high values, RP4 is selected. We argue this by the fact that
RP2 has the highest reputation and the second lowest cost. Hence, it is selected
when the reputation is privileged over cost. Nevertheless, when α is higher than
0.6, i.e., the cost is prioritized, RP4 offering the lowest cost is selected. For T D2
(Fig. 3.6), RP1 is always selected as it has the highest reputation and proposes the
lowest cost.
Regarding T D3 (Fig. 3.7), three different RP are selected. When α is low (between
0 and 0.2), i.e., reputation is privileged, RP1 is selected as it has the highest
reputation to serve T D3 sub-slices. In contrast, when α is high (equal to 1), i.e., a
lower-cost solution is privileged, RP2 is selected. The latter offers the lowest price.
Finally, when a trade-off is sought (α between 0.4 and 0.8), RP4 is selected as it
provides the better trade-off between reputation and cost.
Clearly, from these results, we deduce that the proposed selection algorithm to be
run by the resource broker is able to find the best trade-off between maximizing
the reputation and reducing the cost by well fixing α.
40
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
Table 3.1 Results of simulation for the algorithm of resource selection while varying α.
(RP, TD) Reputation Cost α=0 α = 0.2 α = 0.4 α = 0.6 α = 0.8 α = 1.0
(1, 1) 123.0292121 1303.276056 0 0 0 0 0 0
(1, 2) 415.0614412 848.8607873 1 1 1 1 1 1
(1, 3) 389.0051414 942.9657908 1 1 0 0 0 0
(2, 1) 174.4518733 1153.495538 1 1 1 1 0 0
(2, 2) 302.9867984 1837.715308 0 0 0 0 0 0
(2, 3) 266.1766331 542.1692793 0 0 0 0 0 1
(3, 1) 113.8639498 1224.255528 0 0 0 0 0 0
(3, 2) 361.1993909 1047.50991 0 0 0 0 0 0
(3, 3) 330.9289954 830.3358363 0 0 0 0 0 0
(4, 1) 114.0687306 1050.376848 0 0 0 0 1 1
(4, 2) 379.1780584 1241.622399 0 0 0 0 0 0
(4, 3) 350.4639782 548.1868774 0 0 1 1 1 0
To evaluate the proposed SLA trust management framework, we choose two dif-
ferent metrics: the latency and throughput. In fact, these quantitative metrics are
defined in SLAs, and it is possible to be controlled by the Smart Contract. We
simulate a network slice deployed on three different TD; a different RP provides
each one. V application is represented by a client and a server. We focused on
measuring both the latency and bandwidth as key performances, which are peri-
odically sent to Smart Contract by the monitoring system.
The deployment of the Smart Contract was performed using Ethereum [48], a
Blockchain-based distributed computing platform. This program is executed by
nodes on the Blockchain in the Ethereum Virtual Machine. Also, we use Ganache
[49], a local Blockchain designed for developing and testing. It stimulates a real
Ethereum network, including the availability of accounts number funded with 100
Ether by default. It presents an interface that can be accessed on a port of the
localhost in the same way one would connect to a real Ethereum node. Also,
we use truffle [50], which is a development environment for the compilation and
deployment of Smart Contracts. Solidity [51] is the programming language used
to write the contract code, and truffle looks for ”.sol” files to compile and migrate
to the Blockchain.
Moreover, we use Postman, which is an API testing tool. It can send the value
of the metrics (throughput or latency) to the Smart Contract. The evaluation
scenario stared from the monitoring system performing periodic requests. It sends
the current values of the two metrics to the Smart Contract, every defined pe-
riod. During a 100 seconds interval, the evolution of the latency performed in V
41
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
Parameters Value
Price SLA (V - SP) 100 ETH
Price1 SLA (SP - RP1 ) 20 ETH
Price2 SLA (SP - RP2 ) 20 ETH
Price3 SLA (SP - RP3 ) 20 ETH
Compensation 1 ETH
Compensation1 0.2 ETH
Compensation2 0.2 ETH
Compensation3 0.2 ETH
Threshold of latency defined in SLA SP V 30 ms
Threshold of latency defined in SLA RP1 10 ms
Threshold of latency defined in SLA RP2 10 ms
Threshold of latency defined in SLA RP3 10 ms
Threshold of throughput defined in SLA SP V 100 Mbps
Threshold of throughput defined in SLA RP1 100 Mbps
Threshold of throughput defined in SLA RP2 100 Mbps
Threshold of throughput defined in SLA RP3 100 Mbps
Validity 100 s
is depicted in Fig. 3.8. The test works as follows, to evaluate the proposed solu-
tion. Firstly, the Smart Contract is deployed, and a new SLA is created following
the parameters presented in Table 2. Secondly, the measurements of latency or
throughput are considered the output of the trusted monitoring agent that per-
forms periodic calls to the Smart Contract informing about SLA violations. If
the monitored latency or throughput is above the threshold defined in the SLA;
then the Smart Contract increases the number of SLA violations for the period
until the end of the lifecycle of SLA. We have considered two use cases: when V
requests uRLLC slice or requests eMBB slice.
42
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
Selected RPs
Reputation and Cost of TD1
Reputation Cost T D1
1500
RP4
1000 RP3
RPs
RP2
500
RP1
0
Selected RPs
Reputation and Cost of TD2
Reputation Cost
T D2
2000
RP4
1500
RP3
RPs
1000
RP2
500
RP1
0
Selected RPs
Reputation and Cost of TD3
Reputation Cost
T D3
1000
RP4
750
RP3
RPs
500
RP2
250
RP1
0
43
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
RP1 RP2
Real Latency (ms) 30 Real Latency (ms)
Threshold of latency defined in SLA_RP1 (ms) Threshold of latency defined in SLA_RP2 (ms)
20 Number of detected SLA violations Number of detected SLA violations
Initial SLA Price: Price defined in the SLA_RP1(ETH) 25 Final SLA Price: Price transferred to RP2 (ETH)
Final SLA Price: Price transferred to RP1 (ETH) Compensation (ETH)
Compensation (ETH) Initial SLA Price: Price defined in the SLA_RP2 (ETH)
15 20
Latency(ms)
Latency(ms)
15
10
10
5
5
0 0
0 20 40 60 80 100 0 20 40 60 80 100
Time(s) Time(s)
(a) Evolution of latency and balance of RP1 (b) Evolution of latency and balance of RP2
Latency(ms)
40 40
20 20
0 0
0 20 40 60 80 100 0 20 40 60 80 100
Time(s) Time(s)
(c) Evolution of latency and balance of RP3 (d) Evolution of latency and balance of V
44
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
latency experienced in each TD. During the 100 seconds interval, the evolution of
the latency performed in the V and RPs is depicted in Fig. 3.8; represented by
a blue line. After that, the latency values in the end-to-end slice, RP1 , RP2 and
RP3 , are iterated to verify each one against the target performance level defined
in the SLA (i.e., 30 ms for V (Fig. 3.8d) and 10 ms for RPs 1, 2 and 3 (Fig. 3.8a,
Fig. 3.8b, Fig. 3.8c). If the value is above the threshold, then the number of
detected SLA violations will increase by one, which is depicted using an orange
line in Fig. 3.8. As a result, the initial price that is supposed to be sent to SP
(Fig. 3.8) will be decreased.
After the end of SLA, the billing model allows the dynamic compensation to V
and SP and automatic payment, without need to TTP using the Smart Contract
to realize these transfers. First, it is expected that V sends the price of the
network slice before the start of the slice. The blue rectangle, in Fig.8, presents
the initial price defined in SLA signed between V and SP. V deposits 100 ETH in
the beginning. This fee is locked in the Smart Contract until the end of the SLA
lifecycle. Once the SLA is finished, the funds are transferred to SP and RPs. The
green rectangle presents the real price of SLA to be paid by V after the calculation
process, and the red rectangle value depicts the compensation that will be paid
to V. At the end of the SLA lifecycle, the compensation will be calculated based
on the counter during the slice usage. Actually, the real price that will be paid
at the end is the difference between the initial price and the compensation. In
our case, the initial price is 100 ETH, and the compensation value per unit is
1 ETH. So, the final price to pay is 100 - 1 x 12 (number of violations) = 88
ETH. Consequently, the final price will be 88 ETH. Meanwhile, the monitoring
system also sends the measured values of latency at RPs 1, 2 and 3, which are
participating in the running of uRLLC slice. As shown in Fig. 3.8a, Fig. 3.8b,
Fig. 3.8c, when the SLA is starting, RP1 should receive 20 ETH at the end of
the SLA. But when the performance of latency in RP1 , RP2 , or RP3 , exceeds the
threshold (10 ms), their counters of the SLA violation will increase by one. At the
end, RP1 will not receive 20 ETH, but it will receive the difference between the
initial price and the compensation. The latter is calculated in the Smart Contract.
Similarly, the same process will happen to RP2 and RP3 , as shown in Fig. 3.8 b
and c, respectively.
Another example we considered is the eMBB slice, which needs a high throughput
between 100 Mbps and 1Gbps. Based on these values, the violation threshold was
fixed to 100 Mbps, which is depicted using a red line in Fig. 3.9d. It is worth noting
45
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
that unlike latency, the end-to-end throughput is not composed of the throughput
observed in each domain; each RP should support the same throughput. The
Smart Contract will be used to ensure that the throughput observed at V and
provided by RPs is higher than this threshold.
It can be seen in Fig. 3.9a, Fig. 3.9b, Fig. 3.9c that when the throughput is lower
than the threshold, the counter of SLA violations will be increased by one, which
is depicted using an orange line. Consequently, the initial price supposed to be
sent to SP will be decreased, which is depicted using a green dashed line in the
figures. The blue rectangle presents the initial price defined in the SLA signed
between V and SP. At the end of the SLA lifecycle, the compensation will be
calculated based on the counter during the slice use.
RP1 RP2
600 600
Throughput(Mbps) Throughput(Mbps)
Threshold of Throughput defined in SLA_RP1 (Mbps) Threshold of Throughput defined in SLA_RP2 (Mbps)
Number of detected SLA violations 500 Number of detected SLA violations
500 Final SLA Price: Price transferred to RP2 (ETH)
Initial SLA Price: Price defined in the SLA_RP1(ETH)
Final SLA Price: Price transferred to RP1 (ETH) Compensation (ETH)
Compensation (ETH) Initial SLA Price: Price defined in the SLA_RP2 (ETH)
400 400
Throughput(Mbps)
Throughput(Mbps)
300 300
200 200
100 100
0 0
0 20 40 60 80 100 0 20 40 60 80 100
Time(s) Time(s)
(a) Evolution of throughput and balance of RP1 (b) Evolution of throughput and balance of RP2
Throughput(Mbps)
300 300
200 200
100 100
0 0
0 20 40 60 80 100 0 20 40 60 80 100
Time(s) Time(s)
(c) Evolution of throughput and balance of RP3 (d) Evolution of throughput and balance of V
Actually, the real price that will be paid at the end is the difference between
the initial price and the compensation. In our case, the initial price is 100 ETH,
and the compensation value per unit is 1 ETH. So, the final price to pay is 100 -
1 x 8 (number of violations) = 92 ETH. Therefore, the final price will be 92 ETH.
On the other hand, the monitoring system also sends the value of throughput
46
CHAPTER 3. AN END-TO-END TRUSTED ARCHITECTURE FOR NETWORK SLICING
IN 5G AND BEYOND NETWORKS
provided by RPs 1, 2 and 3, participating in deploying the eMBB slice. When the
SLA is starting, RPs 1, 2 and 3 should receive 20 ETH at the end of the SLA, as
signed in SLAs. However, when throughput in RP1 , RP2 or RP3 are less than the
threshold (100 mbps), their counters of the SLA violations will increase by one.
At the end, RP1 , RP2 and RP3 will not receive 20 ETH, but they will receive the
difference between the initial price and the compensation, which is calculated in
the Smart Contract.
3.5 Conclusion
This chapter has introduced a trust management architecture that allows negoti-
ating and deploying end-to-end network slices and managing automatically estab-
lished SLA among involved actors. The proposed framework relies, on one hand,
on Blockchain and Smart Contracts to ensure security and anonymous transac-
tions, and on the other hand, on an ILP-based optimization model to select the
most adequate resource provides.
Through simulations, we proved the ability of the proposed framework to select
the optimal RP for each sub-slice. In addition, results showed that the SLA man-
agement process was successfully automated using a decentralized solution and
removing a third tiers player’s dependency to handle the billing process.
47
CHAPTER 4
48
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
4.1 Introduction
In recent years, computing has evolved to support the growing market of IoT,
which involves pieces of hardware, such as sensors, smart door locks, smartwatches,
etc., having the ability to connect to the network, transmit and receive data. A
recent forecast estimates the number of IoT devices that should be connected to
the network will exceed 25.4 billion in 2030 [52].
In terms of connectivity to the network, several technologies are candidates to
connect these devices. We can mention LORA, SigFox, IEEE 802.14.5, and 5G.
The latter is seen as an excellent alternative as it allows continuous connectivity of
the IoT devices, supporting even mobile devices (i.e., embedded in cars or drones).
5G is the latest generation of mobile networks promising the support of several
new emerging services, including those relying on IoT.
5G envisions the running of network services relying on IoT as a network slices
of mMTC type. As its name indicates, this type of network slice is intended
and optimized to connect a massive number of IoT devices to a service or an
application. 5G supports multi-tenancy, as network slices run in parallel, and a
high degree of isolation is ensured among them; a network slice component (control
or data plane) cannot access other network slice components. In this chapter, we
focus on mMTC network slices since they are used to deploy IoT applications and
services using MTC devices.
Meanwhile, the growing market of IoT devices has increased cyber security
threats and widened attack surfaces; hence securing modern networks is a chal-
lenging task. Indeed, IoT devices are often weak when it comes to security, con-
sidering: (1) their usual low-cost and the lack of the necessary built-in security
controls to defend against threats; (2) their constrained environment and limited
computational capacity. Besides, they are a high-value asset to attackers. Indeed,
finding a vulnerability of a type of device allows attackers to infect more devices of
that type and, hence, conduct attacks from the infected equipment. For example,
in 2016, a Malware called Mirai infected between 800,000 and 2.5 million devices
through default passwords and used them to conduct DDoS attacks against some
public web applications [52].
5G was designed with built-in security controls to address many of the threats
found in 4G/3G/2G networks, such as enforcing mutual authentication to prevent
fake base-station attacks, encrypting subscriber identities, and enforcing more se-
cure cipher suites. However, more functionality always comes with new risks and
attack vectors when opening the network to IoT devices, particularly. Some of
these risks can affect the performances of 5G network functions (mainly the service
availability). By embracing network slicing, 5G networks can mitigate inter-slice
49
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
attacks as isolation is one of the key features. Indeed, the isolation guaranteed
by network slicing offers performance guarantees to the applications and ensures
isolation, such that attacks (e.g., leakage, breach, DDoS remain contained and do
not propagate to the network. However, an in-slice attack may correspond to a
subset of the UEs attached to a specific network slice issuing malicious traffic to-
wards the infrastructure services. A typical example is compromised MTC devices
(i.e., IoT devices) generating a massive number of network attachment requests.
These attacks need to be quickly identified and mitigated to avoid system failure.
It is worth noting that 3GPP stated clearly in [53] that 5G networks should be
protected from DDoS attacks, where mechanisms detecting and mitigating this
type of attack are needed.
In this chapter, we propose ZSM solution that addresses the challenges of
in-slice DDoS attack detection and mitigation, considering the case of mMTC
network slices. Generally, this type of attack targets the 5G CN elements shared
among the network slices. The proposed ZSM solution relies on a closed-control
loop composed of a triplet (MS, AE, and DE), that interacts with the 5G CN in
order to detect attacks and automatically react by mitigating the attacks. The
critical challenge addressed in this chapter is how to detect a DDoS attack initiated
by a compromised set of MTC devices inside a network slice. Indeed, there is no
available traces or dataset that reproduce abnormal traffic in 5G, unlike other types
of networks where many datasets are available. Besides, it is very challenging to
detect during an event if there is an attack and what are the involved devices in the
attack. To overcome these limitations, we followed 3GPP traffic models [54, 55]
for MTC to identify normal traffic and train an ML model to recognize the normal
traffic, and hence abnormal traffic. Our solution waits until the end of an event
to analyze the traffic (normal or abnormal), and deduce if an attack happened
and what are the involved devices. Then, all the devices will be detached and
banned from future access to the network. We believe our solution is pertinent to
mitigating a DDoS attack as the latter loses its intensity, if the number of involved
devices is reduced by detaching and blocking them.
The main chapter’s contributions are:
• A novel approach that detects MTC attach events over a time duration,
50
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
• A novel DDoS detection algorithm that defines a detection rate of all MTC
devices involved in an attack,
• A novel mitigation algorithm that detaches and blocks all MTC devices that
have been suspected to be part of an attack,
In this section, we provide the necessary background and related work to un-
derstand the concepts presented in this chapter. First, we start by highlighting
the 5G thread landscape. Second, we present how ML is used to detect different
threats. Then, we end the section by focusing on DDoS attacks in 5G that rely
on IoT devices.
A 5G network comprises four major technological domains: the RAN, CN, trans-
port network, and inter-connect network [56]. From a security perspective, some
threats affect all of these planes, and others affect only specific ones. [57]. Threats
in 5G can be classified according to the parts (or the technological domains) of
the network they are impacting [57]:
• RAN threats: Rogue base station threats for conducting Man in the Middle
(MitM) attacks, this class of attacks can compromise user information, break
privacy and track users, and cause a Denial of Service.
51
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
• Network slicing threats: attacks that can break the isolation between net-
work slices [57].
• SDN threats: Separation of control and user (data) plane that allows a
malicious user to attack the link between the control and the user planes.
For instance, a DDoS attack could be performed, or control could be gained
over network devices (ex., Topology Poisoning attacks) [59].
ML has gained a broad interest in many applications and fields of study, particu-
larly cybersecurity. With hardware and computing power becoming more accessi-
ble, ML methods can be used to analyze and classify bad actors from a huge set
of available data. There are hundreds of ML algorithms and approaches, broadly
categorized into supervised and unsupervised learning [60]. Supervised learning
approaches are made in the context of classification, where input matches to an
output, or regression, where input is mapped to continuous output. Unsupervised
learning is mostly accomplished through clustering and has been applied to ex-
ploratory analysis and dimension reduction. Both clustering and regression meth-
ods can be applied in cybersecurity for analyzing malware in near real-time, thus
eliminating the weaknesses of traditional detection methods [60]. ML techniques
have been used to detect and mitigate DDoS attacks on networks effectively. Suc-
cessful approaches have always used a variety of features to achieve great results,
and have targeted DDoS attacks that are either very popular (that have public
datasets available), or that are easy to reproduce (for which creating a dataset
similar to real-world behavior is possible). Most of these approaches target com-
mon application protocols like Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP). Table 4.1 summarizes some of the existing research in
this area.
However, the difference in the used datasets complicates the comparison among
the different solutions. Moreover, accuracy levels can be misleading since these
solutions consider that a packet is a sample in the dataset instead of a malicious
host. Therefore, with the flooding nature of the DDoS attacks, even a naive
decision of considering that all the traffic is malicious would yield an accuracy
higher than 80%. Finally, the lack of publicly-available data and datasets for
attack detection on 5G networks makes it hard to understand, reproduce and
mitigate 5G attacks.
52
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
One of the main threats in 5G networks is DDoS. Hence, many works relying on
ML have designed algorithms and tools to detect and mitigate this type of attacks.
In [67], a ML algorithm is proposed to circumvent attacks through an automated
solution in 5G networks. It has been integrated with the Deep Packet Inspection
(DPI) function to detect unfamiliar attacks in the traffic of IoT devices. A solution
named “Corero” has been introduced in [68]. It aims to help organizations to
comprehend 5G attacks and specifically prevent DDoS attacks, using automatic
and real-time detection algorithms. However, the presented approach needs to use
a very high-cost infrastructure.
In [69], the authors present an IoT security framework, including Azure, AWS
IoT, and SmartThings. The AWS framework supports mutual authentication
of IoT devices, which can be done using certificates, groups, roles, and AWS
Cognito identities. The used authorization is policy-based, with the rules mapped
to each certificate, allowing the owners of IoT devices to define their rules. All IoT
traffic is encrypted to secure communications. In [70], the authors propose using
53
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
security monitoring methods to detect and prevent massive IoT devices from being
attacked or controlled. The proposed solution prevents IoT devices from being
used maliciously to launch, for instance, DDoS attacks. The detection mechanism
of the proposed solution is based on a randomization technique to defend against
DDoS signaling attacks that emerged in the new 5G RRC three-state model.
The work in [71] proposes a modified Network Intrusion Detection System
(NIDS) that defends against DDoS attacks on the mobile edge of multi-tenant 5G
networks. The proposed approach solves the problem by combining traditional
NIDSs with a classifier based on SVM to obtain the needed information on the
device’s traffic. Two filters are implemented: the first filter is placed at the mobile
edge computing servers to prevent spoofing attacks close to the source, and the
second filter is located in cloud servers to classify the complete network traffic.
Unfortunately, the few works mentioned in this section propose solutions that
need new software or specific protocols, which are not standard and need high-
cost implementation. Besides, they do not consider the context of network slicing,
where most of the addressed challenges are solved thanks to network slice isola-
tion. Therefore, the main remaining security threats and challenges come from
compromised devices running inside the slice. In this case, shared network com-
ponents are vulnerable to in-slice attacks since the devices are under the tenant’s
control and have the green light to access the network. To the best of the authors’
knowledge, our work is the first one that addresses the challenge of in-slice attack
detection and mitigation in 5G considering mMTC network slices.
54
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
The first one is “Periodic”, where the devices emit data periodically, which may
correspond to the case of meteorological data. The second type is “Event-Driven”.
In this case, the devices emit data when a specific event occurs; for example,
smoke (the signal of a possible fire) is detected. Detecting anomalous traffic in the
first type is simple, as most of the anomaly detection algorithms can directly be
applied to the problem. However, for the second type of traffic, predicting when
an event will occur consistently is very challenging. While there exist models for
the traffic during activity periods, it is difficult to solve the problem of finding
anomalies just by trying to learn the function the data distribution follows; if
we consider time-series data. To detect malicious traffic of MTC devices, we
will consider the traffic model proposed by 3GPP, which suggests that traffic of
MTC devices’ connection after detecting an event follows the β(3, 4) probability
distribution [73]. Accordingly, we assume that (1) normal traffic follows the β(3, 4)
probability distribution; (2) the detection events do not overlap (i.e., each event is
independent of the other). We argue the latter assumption by the fact that most
of the devices run only one type of application, which monitors a single event.
Fig. 4.1 illustrates the high-level vision of the system, which is composed of
the closed-control loop components (MS, AE, and DE) that interact and protect
the shared sub-slice components (5G CN and gNBs) against DDoS attacks. Here,
we focus on protecting the AMF as it is the entry point of the 5G CN and treats
all the Attach Requests coming from the different gNB under its control.
The closed-control loop is composed of three entities: MS, which collects in-
formation from the AMF, AE, which uses ML to predict attacks, and DE, which
55
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
User Equipment 5G Core Network Monitoring System (MS) Analytic Engine (AE) Detection Engine (DE)
[Yes]
[No]
Registration Reject
SUPI blacklisted?
Do basic filtering
Process the
Forward the request whole event Detection rates
Classify UE as malicious?
Fig. 4.2 Interaction of the mMTC network slice and the closed-control loop to detect
and mitigate attacks.
reacts to the alert sent by AE by acting on AMF (block and blacklist UE). The
control-control loop runs as software and can be co-located with the orchestrator
managing the life cycle of the shared sub-slice [74]. It should be noted that AMF,
via an Element Manager (EM), exposes API for an orchestrator or a manager
to extract and monitor information on the AMF’s functioning or to change the
configuration of the latter. In the proposed framework, MS monitors the Attach
Request received by the AMF, while DE requests AMF to send Registration Reject
to suspected devices.
Fig. 4.2 highlights the interaction among the different actors involved in de-
tecting and mitigating DDoS attacks: the mMTC network slice components (UEs
and 5G CN) and the closed-control loop elements (MS, AE, and DE). It is worth
noting that the closed-control loop runs in parallel to the mMTC network slice
elements and only monitors Attach Requests to detect and mitigate attacks. In
the considered scenario, the MTC devices (or UEs), when detecting an event or
56
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
participating in an attack, first send a Attach Request to AMF. The latter must
first authenticate the devices and then give them access to the network resources
(register the device), mainly to the data plane, to send data to the remote ap-
plication. During the authentication process, the AMF checks with the Unified
Data Management (UDM) if a device is blacklisted or not. To recall, UDM is
the 5G CN function, which stores subscribers’ information (Subscriber Permanent
Identifier -SUPI - Quality of Service -QoS- Policy, the key k, Operator key, etc.).
A device is blacklisted if it has participated in an attack. Meanwhile, MS, via
the EM/AMF API, monitors the Attach Requests received by AMF. MS filters
the data to extract the needed information, such as timestamps and SUPI. This
information is communicated to AE that processes the whole event (attach period
that may correspond to an attack) in order to classify if the event corresponds
to an attack or not. When the event finishes, AE communicates the list of in-
volved UEs; for each UE, a probability of being part of the attack is included.
DE then mitigates the attack by requesting AMF to send a Registration Reject
message to UEs having a high probability of being in the attack while adding the
concerned UEs to a blacklist maintained by the UDM. The following sections will
detail each component of the closed-control loop with an important focus on the
AE functions, as they represent the critical components of the framework.
MS collects data from AMF on every Attach Request received from the MTC de-
vices. This data is accessible through the API exposed by EM of AMF. For each
Attach Request, MS extracts the device identifier SUPI and a precise timestamp.
Indeed, in the 5G protocol, each UE is identified with a unique identifier called
SUPI. The latter is encrypted to provide better privacy and prevent the IMSI
catcher attacks that were popular on previous-generation telecommunication pro-
tocols. The SUPI should not be transferred in clear text over the RAN except
routing information, e.g., Mobile Country Code (MCC) and Mobile Network Code
(MNC) [75]. For this reason, it is challenging to identify devices from the traffic
received on the radio layer; hence our solution has to intervene at the 5G CN (i.e.,
AMF), which can decrypt the SUPI information. The extracted information is
then forwarded to AE via a communication bus based on the Publish/Subscribe
concept.
57
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
Fig. 4.3 illustrates a detailed vision of the AE components, which are: Sampler,
Activity Detector, DataBase (DB), Event Detector, and Analysis components.
They interact together to: (1) detect when an event starts and ends. It can
correspond to MTC devices report (normal traffic) or attacks; (2) analyze the
event to detect if it is normal or abnormal traffic; (3) compute the detection rate
for each device (probability that a device has participated in the attack) and send
a report to DE. We decided to separate the event detection from event analysis to
improve performances and consider all the relevant data when running the overall
attack detection algorithm. Indeed, we decided to detect activity periods (i.e.,
events) in the network traffic and only feed data to the ML algorithm at the end
of an event, which provides the advantage that the resource-intensive component
(detection analysis) runs once every event. We also consider two corner cases: (1)
after a duration clearly greater than the maximum length of an event; (2) when
peak traffic exceeds a limit indicating that it is definitely an attack. For both
cases, we tag the devices as malicious.
The only downside of separating event detection from the analysis is that UEs
participating in an attack will not get banned right away when the attack starts.
However, since the damage in DDoS attacks stems from their duration in time,
the devices will get disconnected and blacklisted a few seconds or minutes after
the event starts by DE. The detection algorithm does not need to run in real-time,
and it can look at data of the whole event.
58
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
Number of attach
4
0
0 1 2 3 4 5 6
Time
5
Number of attach
0
0 1 2 3 4 5 6
Time
upper part of the figure shows the real Attach Request timestamp reception, while
the down part of the figure shows the output of the sampler that groups the Attach
Request every 3 seconds. The Sampler outputs allow detecting the start and end
of an event. If there is traffic, and we are not already in an event, we consider
that an event has started. If we are in an event and detect that the system has
not received traffic for a given duration, we assume that the event has ended. We
use a DB for storing all the data relevant to the event. To have a modular system,
we separate the Activity Detector (the part that detects whether there is traffic
or not) and the Event Detector (the part that delimits an event’s start and end
timestamps).
As stated earlier, a DB is used to store information about the event, namely
the number of Attach Requests received for each event, a list of SUPI values that
identify the devices that emitted each Attach Request, and timestamps. The
DB is accessible and used by: (1) the Sampler to store pairs (timestamp, supi),
retrieve the largest timestamp stored, retrieve all the data stored, and delete all
the data stored; (2) Activity and Event Detectors to store and edit a boolean value
is event. It is worth noting that a relational database is not an optimal choice in
terms of the database model. A better choice is a Time Series DB, as we will store
time events. After many considerations, we finally opted for a key-value database.
59
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
The core component of AE is the Analysis Component, which receives data about
one event, including the SUPI identifiers of all the devices that sent an Attach
Request; then, it calculates a percentage for each device being part of an attack.
The Analysis Component output (i.e., a percentage) should be zero ideally for
normal traffic, as no abnormal behavior is present. When some devices misbehave
and send Attach Requests that clearly do not correspond to normal traffic, the
Analysis Component output should be higher than 0. The detection rate should
increase as the traffic rate increases above the normal level. We also want high
detection rates (preferably 100%) for traffic likely to cause a DDoS attack.
Many algorithms can be applied to solve this problem. However, not all of
them can be used as we have two important considerations:
• We already have a model for our data, the β(3,4) probability distribution,
but the goal of ML algorithms is usually to estimate a function we do not
know from its inputs and sometimes its outputs (in the case of supervised
learning).
• New equipment can be introduced so that the event lengths can vary. Hence,
the envisioned algorithm should not detect these changes as anomalies.
While malicious traffic that triggers DDoS is easily discernible from normal
traffic, it is hard to evaluate the detection rates for anomalies that are not blatant
attacks (i.e., when the traffic rate is just a bit above the prediction interval bound,
for example).
In what follows, we enumerated a list of algorithms that can be used for this
purpose.
60
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
• Statistical tests, checking the mean, median, extremums, variance, and more,
and comparing them with the properties of the β(3, 4) distribution. Note
that we will compare our solution against a statistical-based solution.
We discarded Deep Learning based algorithms as learning from data is not some-
thing we want. It would break our second consideration, and the change in the
number of connected devices could trigger wrong predictions. Further, we believe
that a neural network trained on normal traffic will not give a gradually higher
detection probability on outliers because it does not consider outliers as elements
that are more distant from normal data. It instead works with the combination
of linear and non-linear mathematical operations. We considered the algorithms
that can calculate prediction intervals, which are intervals that likely include our
data. Indeed, if we can get an interval that includes our data, we can use the
distance from its upper bound to calculate a prediction percentage. The most
popular ML algorithm for calculating prediction intervals is Gradient Boosting. It
is an extension of Boosting, where the additive generation of weak models is based
on the gradient descent algorithm over an objective function [76]. The Gradient
Boosting decision tree algorithm has demonstrated great performances on many
machine learning tasks, including global contests [77]. It produces a prediction
model in the form of an ensemble of weak prediction models, often decision or
regression trees. It combines weak ”learners” into a single strong learner in an
iterative fashion, lowering the error estimated with the chosen loss function at
each stage.
We generated data for training the ML algorithm in the same format as the data
we run our detection on, i.e., timestamps of Attach Requests in a simulated event.
We used a 5G testbed with emulated UE to emulate an event and generate data.
The details on the 5G testbed are provided in section 4.5.
Algorithm 2 is used for generating data. The complexity of this algorithm is
O(n2 ), where n ∗ n operations are required for inputs, while each outer loop runs n
times. We consider that the average number of equipments that would take part
in an event is duration×3
7
. We argue this by the fact that the mean of the β(a, b)
distribution is a+b , where a=3 and b=4. We generate random numbers following
a
61
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
62
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
the β(3, 4) probability distribution. These numbers represent the expected times-
tamps of Attach Requests. We send Attach Requests and sleep for a duration
equal to the difference between the random numbers generated to simulate the
event. When this step ends, the data is stored in a file, where each entry corre-
sponds to a sample period. Let us note by S the sample vector defined as {s1 , s2 ,
s3 , . . . , sn }, where s1 corresponds to the sample period 1, and noted in an entry
of the file as (t1 - 0) (t1 = ∆); si is (ti+1 − 0) (ti+1 = i + 1 ∗ ∆). The duration of the
sample period is identical and obtained as follows: ∆ = T otal Duration n
Event
. For the
training phase, we will use the data generated earlier to train a Gradient Boosting
algorithm to predict for each sample si , the upper bound of the number of Attach
Request expected during that sample period; we note it by Predicti . Here we are
interested in the upper bound value as it corresponds to the maximum intensity of
normal traffic; hence exceeding this value means that we are most probably facing
a DDoS attack. Once the training is done, we obtain a vector P that contains
n predicted values corresponding to the maximum expected Attach Requests per
sample period. The Predictedi values are also stored in the file with each corre-
sponding entry. The file will be used later as an input to analyze an event and
calculate the detection rate.
During the detection step, the event detected by the Sampler is stored in the DB.
The event is organized in sample periods equal to n with a duration ∆ (the same
value used for the training phase). This will allow us to normalize the number
of samples of an event since each event has a different duration period, and the
β(3, 4) intensity depends on the duration. Thus, we do not need to train the
model using different durations, as the normalization step will allow training on
a single duration corresponding to β(3, 4) distribution. Since the event has been
organized by sample periods with the total number of Attach received during the
sample period as well as the SUPI of the UE, we use the ML model (mainly the
file obtained in the precedent step) to extract the Predicti values for each sample
period. Then, we derive another bound for each sample period as follows: Predicti
× (AE DETECTION THRESHOLD - 1); a limit above which any traffic gets a
100% detection rate and gets classified as malicious. For each sample period, we
calculate the detection rate as follows:
63
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
64
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
The reason behind using 3 categories is based on the AE analysis and the
results accuracy of the employed ML algorithm. Indeed, we notice that when the
detection values associated with the connected devices sent by AE are high, the
devices’ generated traffic does not follow the Beta distribution. Hence, they should
be immediately blacklisted as they present abnormal behavior, justifying the need
for the first category. The latter is considered a red alert, and the associated
devices SUPI are blacklisted. However, when the values are neither too high nor
too low, it means that the traffic is almost close to the Beta distribution. In
this case, the detected devices have malicious behavior, or the values are due to
technical failure. So we introduced the second category, which means that the
devices are not blacklisted, but DE will memorize the associated SUPI for future
events. If the devices are classified in the second category more than 2 times, they
will be considered malicious and moved to the first category to be blacklisted.
The last category corresponds to the detected traffic being very close to the Beta
distribution. This case can be either an error in the ML calculation or a delay in
sending the Attach Request.
65
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
• Activity and Event Detectors: These components receive the sampled data
and should detect an event. For each event, these components only emit
data at its end, with the number of requests on each time-slice and all the
UEs that emitted traffic during the event.
• DE: This component receives data from the Analysis Component and decides
which devices should be disconnected from the network and then blacklisted.
66
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
67
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
68
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
69
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
Last but not least, readers may see a video6 showing a demonstration of all the
components, i.e., closed-control loop as well as AMF and UEs, working together
to detect DDoS attacks. The following section will provide some results on the
model accuracy obtained via the experiments.
70
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
Fig. 4.8 The result of the detection algorithm over normal traffic.
Fig. 4.9 The result of the detection algorithm over abnormal traffic.
71
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
Table 4.4 Impact of the AE detection threshold on the Gradient Boosting accuracy
70
Limit Path (b(3,4))
60 Event data outside the b(3,4))
Event data inside the b(3,4)
50
Registrations
40
30
20
10
0
0 2 4 6 Time8 10 12 14
Fig. 4.10 The result of the statics method over abnormal traffic.
the AE DET ECT ION T HRES HOLD value increases, FP is reduced as the FN
increases, whereas when it is reduced, both FP and FN increase.
Statistical Method For the sake of comparison, we used the same scenarios as
for Gradient Boosting to generate normal and abnormal traffic. Then, we applied
the statistical method and verified its accuracy in detecting attacks. Fig. 4.10
illustrates the usage of the statistical method in case of an abnormal event. The
discontinue green line shows the β(3, 4) curve obtained according to the event
duration. The β(3, 4) curve allows us to have a limited path from which all the
outside points are considered anomalies, hence potential attacks. The statistical
method’s results show that 36.0% of the Attach requests are not following the
β(3,4) distribution (they are out of the limit path). Therefore, they can be con-
sidered potential attacks. On the other hand, Fig. 4.11 presents a test of a normal
event. The results show that 90.0% of the Attach Requests follow the β(3,4) distri-
bution. The accuracy of the statistical method to detect anomaly are : ((1 − T N+FP
FP
72
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
70
Limit Path (b(3,4))
60 Event data outside the b(3,4))
Event data inside the b(3,4)
50
Registrations
40
30
20
10
0
0 2 4 6 Time8 10 12 14
Fig. 4.11 The result of the statics method over normal traffic.
Table 4.5 The accuracy of the statistical model considering different Duration values.
Static
GB
Method D - ∆t D D + ∆t
Normal traffic 96.76859 45.18924 84.21052 80.24568
Abnormal traffic 83.633191 30.4156 57.142857 51.86854
pacts the accuracy. For instance, we change the duration by +/- ϵ = 2sec, and the
obtained results are summarized in Table 4.5. We see clearly from this table the
impact of the duration on the accuracy as a small error on the duration drastically
yields a drop in the accuracy. Particularly, if the duration is less than the real
one, many points will be out of the curve. In the Gradient Boosting algorithm,
we do not have this concern, as the latter normalizes the sample period duration
and uses the trained model to detect the interval.
73
CHAPTER 4. ZERO-TOUCH SECURITY MANAGEMENT FOR MMTC NETWORK
SLICES: DDOS ATTACK DETECTION AND MITIGATION
While a higher threshold value (ex. 0.8) may be less strict and reduce the number
of banned UE. We advise two solutions to fix the DE DETECTION THRESHOLD
value. The first one considers the performance limit of the element to protect
against DDoS attacks. In our case, we computed the response time of the AMF
to Attach Requests while increasing their number. After a certain number of At-
tach Requests, we noticed that the AMF started to be very slow, which can be
caused by a DDoS attack. Therefore, after some tests, we found that the value of
DE DETECTION THRESHOLD equal to 0.35, which avoids reaching the number
of Attach Request that yields bad AMF performances. Another solution is to use
a dynamic threshold value that decreases or increases over time according to the
number of consecutive events classified as an attack.
4.7 Conclusion
74
CHAPTER 5
75
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
5.1 Introduction
76
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
model, in such way that the aggregated global model cannot then detect/predict
latency-related SLA violations. Another example for an analytic function that
implements an intrusion detection system, building poisoning models by one or
several participant(s) can prevent the detection of system intrusions, even with
presence. Thus, poisoning attacks may affect the global performance of FL-based
models for running network slices as well as the whole system. Therefore, it is
crucial to design security means to detect and mitigate such threats.
• We use OAI to generate a real dataset about the latency KPI of the AMF, as
a VNF. This service-oriented KPI corresponds to the response time for han-
dling UEs attach requests, when different configurations, such as available
Random Access Memory (RAM) memory and number of CPU, are taken
into account.
77
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
to detect/mitigate poisoning attacks in FL. Section 5.3 describes the design and
specification of the proposed framework. In Section 5.4, we evaluate and validate
our framework. Finally, section 5.5 concludes the chapter.
A few solutions have been designed to deal with poisoning attacks, when building
learning models in FL way. These works can be classified into two main categories:
works dealing with poisoned local models [82, 83] and those to deal with data
poisoning of malicious participants [84, 85].
The objective of model poisoning attacks is to poison the local model updates
of the FL clients, before sending them to the FL server or inserting hidden back-
doors into the FL global model. This attack impacts the performance of the global
model by giving mis-classifications or wrong predictions.
In [82], the authors demonstrated how FL model can be poisoned. They showed
that any malicious client can introduce hidden backdoor functionality into the
joint global model, e.g., to ensure that an image classifier model can predict la-
bels, for some input data, which were introduced (labels) by the malicious client.
The authors designed a new model-poisoning attack based on model replacement,
and evaluate it on top of several assumption on the standard FL.
Another scheme is proposed in [83], to study the resilience of of distributed im-
plementations of Stochastic Gradient Descent (SGD) against Byzantine failures,
including network asynchrony, software bugs, attackers aiming to compromise the
whole system as well as biases in local datasets. The authors first showed that
current approaches do not tolerate Byzantine failures. Then, they proposed a
resilience property of the aggregation rule that can ensure model convergence de-
spite Byzantine participants.
78
Table 5.1 Comparison of poisoning attack detection solutions.
79
ATTACKS IN ZERO TOUCH B5G NETWORKS
This type of attack is known as contamination of the training data, it takes place
during the FL training phase of machine learning model. Generally, a malicious
node tries to poison the training data by injecting carefully designed samples to
compromise the whole FL learning process. This attack is also called, ”dirty-label
poisoning attack”.
In [84], the authors first studied the threats that may target federated learning,
in terms of sybil-based poisoning attacks. Then, they designed a new detection
and mitigation scheme that enables to identify poisoning sybils based on clients’
updates. The basic idea of this scheme is to use an adaptive learning rate at each
client level, based on the similarity between inter-client contribution.
The authors also showed that their scheme may deal with the existing poisoning
attacks, such as backdoor poisoning attacks and sybil-based label-flipping. Noting
that label-flipping attack is a special case of data poisoning, where the labels of two
input observations are flipped, while data features (inputs) are kept unchanged.
Another example of poisoning attack is backdoor data poisoning [85], where an
adversary can modify individual features or small regions of the original training
dataset (some pixels of images) to embed backdoors into the FL model. As an
example, in the images processing, the attacker creates a stamp on an input image,
so that the FL model behaves according to the adversary’s objective, if the input
contains the backdoor feature.
In Table. 5.1, we compare between existing works according to several criteria such
as, targeted poisoning attack, the used techniques, secure side (client or central
node), and B5G context or not. Even there are some works addressing the chal-
lenge of how to deal with poisoning attacks in FL context. However, most of them
focused on how to adjust learning parameters at the clients side, such as learning
rate [84], or designing new rules for local models aggregation at the central node
side [83], in order to be able in detecting malicious participants. In addition, these
works dealt with either local model poisoning, or data poisoning attacks, and not
with both.
In B5G networks context, few works have been proposed where are mainly based
on blockchain, to prevent the participation of malicious clients [86]. However,
blockchain will require more computing and storage resources in addition to those
needed by B5G networks for their management and orchestration.
Additionally, the proposed framework is a costly solution.
80
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
As depicted in Fig. 5.1, we consider n running network slices that may be initi-
ated by different vertical industries, such as intelligent transportation, Industrial
IoT, and eHealth verticals. The running network slices are interconnected to an
Inter-Domain Slice Manager (IDSM), which is in charge for the management and
orchestration of network slices. To enable ZSM, the IDSM side includes an AE
for building learning models and a DE, to make suitable decisions based on AE’s
outputs. On the other side, each running network slice is managed locally by a
Domain Slice Manager (DSM), which also includes a MS for monitoring data and
in-slice traffic, and an AE for building learning models.
With the lack of real dataset, we conducted a real testbed using the Eurecom
81
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
MSk
MSn
DE: Poisoning Attacks Mitgation AEk
AEn
DSM k DEn
DEk
(FL client k) Domain Slice Manager n (DSMn)
(FL client n)
OAI platform, to generate a realistic dataset, called EARCD for Eurecom AMF
Resource Consumption Dataset. OAI implements 5G radio access and core net-
works, as open source software. We emulated ten instances of AMF, running as
VNFs inside ten isolated network slices. The network slices differ from each other,
in terms of their AMFs’ configurations, for instance: the AMF of network slice 1
has 1GB of memory and 1 CPU, the AMF of network slice 2 has 2GB of memory
and 2 CPUs, etc.
In addition, we used my5G-RANTester tool to emulate user equipments (UEs),
one gNB and to generate attach requests, that will be then handled by the dif-
ferent network slices’ AMFs. By increasing the number of UEs, we are able to
generate up to 560 attach request per second, covering different traffic density.
Besides, it is clear that the latency values increase as the number of attach re-
quest increases. However, the latency values depend greatly to the configurations
of network slices’ AMFs. Fig. 5.2 depicts the average latency values according to
the received number of attach requests, for two different configurations of AMFs’
VNFs. We clearly observe that AMF with 2048 MByte of memory and 2 CPUs
succeeds to decrease the latency, when compared to AMF with 1024 MByte and
1 CPU.
Therefore, ten local datasets (ten network slices) were generated, by varying
the number of handled attach request/s, where each dataset contains 2813 samples
82
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
80
40
20
0
0 100 200 300 400 500
Number of attach
Fig. 5.2 Latency of multiple attach with different configurations of CPU and RAM.
(rows).
In addition, each local dataset presents five features, where the feature ”ram
−limit” presents the memory allocated to the container in megabytes, and the fea-
ture ”cpu −limit” shows the CPU allocated to the container. The feature ”ram
−usage” presents the amount of memory used by the container at the time of the
metrics collection in byte. And the feature ”cpu −usage” presents the amount of
CPU used by the container at the time of the metrics collection. Finally, the fea-
ture n shows the number of parallel registration requests sent to the AMF. Also,
the dataset presents the label mean that represents the mean registration time for
all the registration requests in microseconds.
To enable zero touch management of the latency KPI related to the UEs attach
requests, we built a deep learning model, that enables each domain slice manager
(DSM) to predict the average needed latency for UEs attach requests, in federated
way. As depicted in Fig. 5.1, we recall that each running network slice includes
MS, AE, and DE, which allow it to monitor needed information (used CPU, used
memory, etc.), build local learning models, and make the suitable decisions based
on made predictions, respectively. Thus, we create a deep learning model in
federated manner, that comprises four main steps:
83
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
3. Training of Local Models: each network slice’s DSM, through its AE, up-
dates parameters of its local model. Indeed, each DSM gathers needed data
through its MS and splits it into many batches. Then, the DSM’s AE per-
forms the average gradient on each batch, with respect to the current model,
during several epochs and with a particular learning rate. Once done, the
network slices’ DSMs send their local models back to the central IDSM.
4. Building of Global model: the central IDSM aggregates the DSMs’ local
models, using FedAvg algorithm proposed in [93], which is based on dis-
tributed SGD, as weights optimizer. The aggregated global model is then
sent back to the DSM nodes.
In this section, we present our poisoning attack detection scheme, which begins
with the election of a network slice participant as a trusted entity. Then, the
latter will be in charge of detecting malicious clients, by leveraging unsupervised
learning.
In each FL round, the central IDSM of running network slices selects a running
network slice (DSM), as a trusted node. To do so, we design a new deep reinforce-
ment learning-based model, to derive an optimal policy about trust node selection,
84
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
while considering several criteria related to such nodes, such as their reputation,
detection rate of malicious nodes, and its accuracy in building learning models.
Deep Reinforcement learning is a process that enables one or set of agents to
learn how to make suitable decisions, through error and trial, and based on their
(agents) previous experiences. Specifically, each agent interacts with the environ-
ment to receive either penalties or rewards, for the actions it makes. Hence, the
main objective of deep reinforcement learning is to derive an optimal policy about
agents’ actions, that maximizes agents’ cumulative reward.
In our study, the central IDSM is the agent that interacts with running network
slices’ DSM (environment), in discrete time steps, as shown in Fig.5.1. In what
follow, we first formalize our problem using Markov Decision Process (MDP).
Then, we apply Deep Q-Network algorithm (DQN), to predict the best trusted
participant to select, at each federated learning stage.
a. Markov Decision Process Model
The problem is often modeled using a MDP, where, at every timestamp t, the
central IDSM manager, is in a state st , takes an action at . Then, it (IDSM) will
receive a scalar reward from the network slices’ DSM (environment). In addition,
the system passes from the state st to a state st+1 , according to environment dy-
namics p(st+1 |st , at ). Therefore, the central IDSM manager attempts to learn a
policy π(a|s), that helps to map from observations to actions, and maximizing its
rewards.
In our study, a state s ∈ S is a three-sized tuple (MC; TC; GMA), where:
• TCi is the number of trust models, that are detected by network slice’s DS Mi ;
• GMAi is the accuracy of the global model, after detecting and removing
malicious models, by network slice’s DS Mi ;
At every timestep t and when aiming to take an action a, the central IDSM can
select a network slice i, among the n running slices, that has the highest reputation
Rep. Then, the system may transit to a new state st+1 , that corresponds to the
number of detected malicious clients MCi , the number of trust clients as well as
the new accuracy of the new global model.
Furthermore, when the system moves to a new state st+1 , a reward rt+1 = R(s, a)
is associated with the transition p(st+1 |st , at ). For this end, we model the reward
that the central IDSM expects to get from the selected network slices’ DSM, as
follows:
85
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
GMAt+1 if MCi >= 1 or GMAt+1 >= GMAt
=
rt+1 (5.1)
otherwise
0
It is clear that the received reward from a participant i affects directly its rep-
utation in the federated learning process, and as the reward increases, as the
reputation of the network slice i increases as follows:
Based on equation 5.1, the central IDSM’s reward will be affected not only by
the number of observed malicious participants, but also by the accuracy of the new
global model. Therefore, the IDSM manager aims to derive the optimal policy in
selecting a trust participant, which optimizes the accuracy of the learning model
as well as its detection of poisoning attacks.
b. Deep Reinforcement Learning
As we mentioned before, our reinforcement scheme is based on DQN, which com-
bines Q-learning and deep neural network, to learn an optimal policy from input
data. Q-learning is a reinforcement learning algorithm that aims to identify the
optimal policy of action-selection, maximizing the total reward, called Q-value,
for any finite MDP. The Q-value of each action is calculated and stored in a table,
named Q-table. In addition, at every timestamp (learning episode), the Q-values
are updated using the following formula:
Q (st , at ) = Q (st , at ) + Θ rt+1 + λ max Q(st+1 , a) (5.3)
a∈A
With Θ is the learning rate and λ is the discount factor, indicating the future
rewards importance.
Besides, the basic idea of DQN is to use neural network to predict the Q-value of all
possible actions, based on current state. In particular,DQN comprises two neural
networks: target network Q′ (s′ ; a; θ′ ) and a prediction network Q(s; a; θ). The
prediction network is updated after each learning epoch, while the target network
is directly updated from the prediction network, after every several iterations.
Hence, DQN aims to reduce the loss function between both neural networks, as
follows: 2
L = r + λ max
′
Q (s , a , θ ) − Q(s, a, θ)
′ ′ ′ ′
(5.4)
a ∈A
Where θ is the learning weights of the Q-network, that is updated using gradient
86
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
Once a trust client is selected, it will be in charge of detecting whether the re-
ceived updates include a malicious model or not.
First of all, the selected trust client receives the n model updates of network slices
from the central IDSM, and then applies a dimensionality reduction techniques to
be able in presenting the model updates in 2D dimensions. Indeed, the dimension
reduction is the transformation of dataset from a high-dimensional space into a
low-dimensional space, in such a way, the low-dimensional representation retains
the meaningful properties of the original data.
Fig. 5.3 shows a dimensionality reduction of our FL model updates in 3D, when
applying linear discriminant analysis reduction technique. The different color of
the points, which are defined by 3 axes (x:0, y:1, z:2), present the updates of dif-
ferent nodes (10 clients). However, as we can notice, the reduction to 3D will not
provide a clear visualization, to interrupt and classify the model updates. That is
why we decided to apply dimensionality reduction to 2dimensions (2D) (Fig. 5.4).
In our study, to design an efficient detection scheme, we are based on two differ-
ent techniques: Principal Component Analysis (PCA) as unsupervised technique
(ignores class labels), and Linear Discriminant Analysis (LDA) as a supervised
technique.
87
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
Fig. 5.3 LDA visualization with 3 dimensional applied on the nodes update.
LDA2
LDA1
Fig. 5.4 LDA visualization with 2 dimensional applied on the nodes updates.
equation:
(value − mean)
S tr(value) = (5.5)
standarddeviation
2. Covariance Matrix: The second step is the calculation of the ”Covariance
Matrix” between the input features of our dataset. Notably, the aim is to
understand how these input features vary from the mean, with respect to
each other. The covariance matrix is a m × m symmetric matrix (where
m is the number of input features, 5 in our case). In fact, the covariance
matrix describes the correlations between all the possible pairs of our input
features, as follows:
88
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
The correlation between two features depends mainly on the the covariance
sign. If it is positive, both features increase or decrease together, which
means that they are strongly correlated. Nevertheless, if it is negative, one
increases whereas the other decreases, which signifies that they are inversely
correlated.
Cov(input f eatures) ∗ v = λ ∗ v
Where :
- Cov(input features) is the covariance matrix (5.6)
- v is the eigen vectors
- λ is the eigen value
89
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
2. Compute the Scatter matrix (in between class and within the class scatter
matrix): The second step is to compute the “Scatter Matrices” which are
equivalent to the variance. In fact, we have two matrices of E x N dimensions
to calculate: “The within-class” and the “between-class scatter matrix”. The
objective of these matrices is to determine the variability within a class (Intra
class scatter) as well as between different classes (inter class Scatter). Both
consist to calculate the distance between different points( inter/intra classes).
The first matrix ( within-class scatter) Sca is calculated as follows:
90
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
n
X
S ca = S sj
j=1
Where :
(number X
o f samples)
S sj = (x − mi )(x − mi )T ,
x∈Di (5.8)
S s j is a scatter matrix for every class,
m is the mean vector,
(number X
o f samples)
1
mi = xk
ni x∈Di
(number Xo f samples)
1
ξi = (x − mi )(x − mi )T
N−1 x∈Di
n
(5.9)
X
S cj = (Ni − 1)ξi
i=1
n
X
SB = Ni (mi − m)(mi − m)T (5.10)
i=1
where m is the overall mean, and mi and Ni are the sample mean and sizes
of the respective classes.
4. Selecting linear discriminant for the new feature subspace: Following, the
sort of eigenvectors should be applied by decreasing eigenvalues and choose k
eigenvectors with the largest eigenvalues to form a d × k dimensional matrix
(where every column represents an eigenvector).
91
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
5. Transforming the samples onto the new subspace: Next, the selected d ×
k eigenvector matrix will be used to transform the samples onto the new
subspace dimension.
92
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
93
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
Following, we present the results without malicious nodes, for two different opti-
mizer: ADAM and SGD.
Fig. 5.5 depicts the MSE metric of our FL model during several FL rounds,
with and without presence of malicious network slices. On top of the ADAM
optimizer, we clearly observe that MSE of our model without malicious nodes
is lower than with malicious nodes, around 0.1035681. However, it increases as
we add more malicious nodes, that will inject more malicious/incorrect data in
terms of latency KPI. Therefore, poisoning data attack affects highly not only the
performance of our FL model in terms of MSE, but also the model convergence
towards an accurate global model.
Similarly, Fig. 5.6 shows the MSE metric of our FL model on top of the SGD
optimizer. We also see that the MSE increases as the number of malicious network
slices is increased as well, and the FL model without malicious nodes outperforms
the other models (with malicious nodes), with a MSE of 0.173584. Hence, these
results confirm the results of Fig. 5.5, and show that data poisoning attack can
have a negative impact on the performance of our FL model, especially in terms of
global model convergence, whatever the used learning optimizer (ADAM or SGD).
94
Table 5.3 The Selection results.
t : t1
RepDSM1 RepDSM2 RepDSM3 RepDSM4 RepDSM5 RepDSM6 RepDSM7 RepDSM8 RepDSM9 RepDSM10
0.2 0.4 0.3 0.7 0.61 0.48 0.37 0.68 0.54 0.62
95
Selected DSM
ATTACKS IN ZERO TOUCH B5G NETWORKS
t : t2
RepDSM1 RepDSM2 RepDSM3 RepDSM4 RepDSM5 RepDSM6 RepDSM7 RepDSM8 RepDSM9 RepDSM10
0.1 0.22 0.15 0.74 0.58 0.52 0.31 0.8 0.60 0.71
Selected DSM
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
1.0
0 Malicious nodes
1 Malicious node
0.8 2 Malicious nodes
3 Malicious nodes
0.4
0.2
0 1 2 3 4 5 6 7
Rounds
Fig. 5.5 Mean Squared error of our FL model when using ADAM Optimizer.
TABLE. 5.3 shows the results of the selected DSM based on our DQN-based
scheme, for two different time instances t1, and t2. These results are obtained
based on the nodes’ reputations (Repi , i ∈ [1, 10]). As we observe, when t = t1,
the DS M4 was selected as trust node, since it maximizes the reputation value.
Similarly, when t = t2, the network slices’ DSMs have different reputation values,
however, DS M8 is selected, because it presents the highest value. In other words,
at each FL round, our DQN-based algorithm enables to select the network slice
maximizing the reward, since the reputation value is determined based on the
reward using equation 5.2.
After showing the negative effect of the poisoning attacks on the performance
of the global FL model, in this subsection, we evaluate the performance of our
combined dimensionality reduction and unsupervised clustering scheme against
data poisoning attacks, and on top of the two different optimizers: ADAM and
SGD. Noting that for data poisoning attacks, the malicious node tries to inject
incorrect latency values, e.g. high latency value, even when the node has high
resource capacity, in terms of memory and computing.
Combining LDA with k-means Fig. 5.7 and Fig. 5.9 depict the detection
results when combining LDA and K-means, on top of ADAM and SGD optimizers,
respectively. We also vary the percentage of malicious network slices’ DSM and
96
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
0 Malicious nodes
1 Malicious nodes
0.8 2 Malicious nodes
mean squared error 3 Malicious nodes
0.6
0.4
0.2
0 1 2 3 4 5
Rounds
Fig. 5.6 Mean Squared error of our FL model when using SGD Optimizer.
3
4
3 2
2 1
1 0
LDA2
LDA2
0 1
1 2
2 3
3 4
10.0 7.5 5.0 2.5 0.0 2.5 5.0 7.5 10.0 5 0 5 10 15 20 25 30
LDA1 LDA1
4
3
2
1
LDA2
0
1
2
3
3 2 1 0 1 2 3
LDA1
c: Nb of malicious nodes = 0.
Fig. 5.7 LDA + K-means for different number of malicious nodes (ADAM optimizer).
97
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
2.5 2
2.0
1
1.5
LDA2 1.0 0
LDA2
0.5
1
0.0
0.5 2
0.4
0.2
0.0
LDA2
0.2
0.4
c: Nb of malicious nodes = 0.
Fig. 5.8 LDA + KNN for different number of malicious nodes (ADAM optimizer).
4 4
3
2 2
1
0
LDA2
LDA2
0
1
2 2
3
4 4
3 2 1 0 1 2 3 4 6 4 2 0 2 4
LDA1 LDA1
4
3
2
1
LDA2
0
1
2
3
4 2 0 2
LDA1
c: Nb of malicious nodes = 0.
Fig. 5.9 LDA + K-means for different number of malicious nodes (SGD optimizer).
98
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
0.6
1.00
0.4
0.75
0.2 0.50
0.0 0.25
LDA2
LDA2
0.00
0.2
0.25
0.4
0.50
0.6 0.75
2 1 0 1 2 3 4 5 2 1 0 1 2 3 4
LDA1 LDA1
0.8
0.6
0.4
0.2
LDA2
0.0
0.2
0.4
c: Nb of malicious nodes = 0.
Fig. 5.10 LDA + KNN for different number of malicious nodes (SGD optimizer).
0.15 0.15
0.10
0.10
0.05
0.05
PC2
PC2
0.00
0.00
0.05
0.05
0.10
0.1 0.0 0.1 0.2 0.3 0.4 0.1 0.0 0.1 0.2 0.3 0.4 0.5
PC1 PC1
0.20
0.15
0.10
PC2
0.05
0.00
0.05
c: Nb of malicious nodes = 0
Fig. 5.11 PCA + k-means for different number of malicious nodes (ADAM optimizer).
99
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
0.075 0.15
0.050
0.10
0.025
0.000
0.05
PC2
PC2
0.025
0.050 0.00
0.075
0.05
0.100
0.10 0.05 0.00 0.05 0.10 0.15 0.20 0.05 0.00 0.05 0.10 0.15 0.20 0.25
PC1 PC1
0.06
0.04
0.02
0.00
PC2
0.02
0.04
0.06
c: Nb of malicious nodes = 0.
Fig. 5.12 PCA + KNN for different number of malicious nodes (ADAM optimizer).
0.25
0.20
0.10
0.15
0.05 0.10
0.05
PC2
PC2
0.00 0.00
0.05
0.05 0.10
0.15
0.2 0.1 0.0 0.1 0.2 0.3 0.4 0.5 0.2 0.0 0.2 0.4 0.6 0.8
PC1 PC1
0.003
0.002
0.001
PC2
0.000
0.001
0.002
0.05 0.00 0.05 0.10 0.15 0.20
PC1
c: Nb of malicious nodes = 0.
Fig. 5.13 PCA + k-means for different number of malicious nodes (SGD optimizer).
100
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
0.06
0.05
0.04 0.04
PC2
0.03
PC2
0.02
0.02
0.00 0.01
0.00
0.02 0.01
0.02 0.00 0.02 0.04 0.06 0.08 0.10 0.01 0.00 0.01 0.02 0.03 0.04 0.05
PC1 PC1
0.015
0.010
0.005
PC2
0.000
0.005
0.010
0.015
0.02 0.01 0.00 0.01 0.02 0.03 0.04 0.05 0.06
PC1
c: Nb of malicious nodes = 0.
Fig. 5.14 PCA + kNN for different number of malicious nodes (SGD optimizer).
show the trusted nodes that are selected at each FL round (nodes in green colour).
As we see, our scheme can clearly detect the malicious nodes, even with only one
of malicious node. Specifically, the trusted node applies both LDA and K-means,
and then all nodes that are in the same cluster with it, are considered as correct
updates, while the nodes (models) that are in the other (s) cluster (s) will be
considered as malicious. Therefore, our trust participant selection algorithm helps
us not only to select a trusted node, but also to determine malicious nodes when
performing the dimensionality reduction and unsupervised clustering. Moreover,
determining the trusted cluster of nodes will also help the FL server (IDSM) to
select a trusted participant for the next FL round.
Combining LDA with KNN Fig. 5.8 and Fig. 5.10 also show the clustering
of local models when applying both LDA and KNN, on top of ADAM and SGD
optimizers, respectively. Whatever the number of malicious nodes, we also observe
that there are always some isolated points that represent the infected models sent
by the malicious DSMs. However, for the LDA technique, we see that the isolated
models (infected) are identified better with the ADAM optimizer than with the
SGD optimizer (Figs. 5.7 and 5.8). Hence, the LDA (with KNN or k-means)
technique give better detection on top of the ADAM optimizer. In fact, these
last combinations show the clearest clustering (two separate groups) compared to
101
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
Fig. 5.15 Mean Squared error of the FL global model (ADAM optimizer).
other algorithms.
Combining PCA with K-means As we did for LDA, we also evaluated the
performance of PCA technique when combined with clustering unsupervised al-
gorithms. Figs. 5.11 and 5.13 show the clustering detection when combining PCA
with K-means, on top of the ADAM and SGD optimizers, respectively. We remark
that both optimizers succeed in separating and identifying infected models by in-
correct data. However, infected models are better identified on top of the SGD
optimizer, as compared to the ADAM optimizer. Thus, PCA with K-means gives
better performance in detecting infected models on top of the SGD optimizer.
Indeed, this last combination shows the clearest clustering (two separate groups)
compared to other algorithms.
Combining PCA with KNN Similarly, Figs. 5.12 and 5.14 depict the de-
tection when combining PCA with KNN on top of the ADAM and SGD opti-
mizers, respectively. As in Figs. 5.11 and 5.13, PCA with KNN on top of both
optimizers clearly separate correct local models from infected ones and thus en-
ables to detect/identify malicious DSMs. We also see that infected models are
better identified when leveraging the SGD optimizer than the ADAM optimizer.
Therefore, the PCA technique with either K-means or KNN gives better detec-
tion of malicious models on top of the SGD optimizer, which is confirmed in
Figs. 5.11, 5.13, 5.12, 5.14. In fact, these last combinations show the clearest
clustering (two separate groups) compared to other algorithms.
102
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
3
3
2
2
1
1
LDA2
LDA2
0
0
1
1
2
2
3
3
4 3 2 1 0 1 2 3 4 3 2 1 0 1 2
LDA1 LDA1
0.15
0.10 0.10
0.05 0.05
PCA2
PCA2
0.00
0.00
0.05
0.05
0.10
0.10
0.1 0.0 0.1 0.2 0.3 0.4 0.5 0.1 0.0 0.1 0.2 0.3 0.4
PCA1 PCA1
103
CHAPTER 5. TOWARD SECURING FEDERATED LEARNING AGAINST POISONING
ATTACKS IN ZERO TOUCH B5G NETWORKS
In this subsection, we evaluate our scheme against model poisoning attacks, where
malicious DSMs try to send incorrect learning models, which are generated ran-
domly for instance. Fig. 5.16 shows the results when combining LDA and K-means
on top of the ADAM optimizer. We remark that LDA with K-means does not
clearly succeed to identify the malicious models Fig. 5.16-b. However, when com-
bining PCA and K-means on top of the SGD optimizer, the malicious models
are better detected, as depicted in Fig. 5.17-b. Therefore, we can deduce that
model poisoning attacks are better detected and identified, when using PCA with
K-means techniques, as compared to LDA and K-means combination.
In general, we can deduce that our scheme succeeds to provide stable perfor-
mance in dealing with both data and model poisoning attacks that can target fed-
erated learning-based models. In particular, combining dimensionality reduction
and clustering unsupervised learning helps us to not only detect/identify infected
learning models, but also to improve the global accuracy of the FL model.
5.5 Conclusion
104
CHAPTER 6
105
CHAPTER 6. A TRUST AND EXPLAINABLE FEDERATED DEEP LEARNING
FRAMEWORK IN ZERO TOUCH B5G NETWORKS
6.1 Introduction
106
CHAPTER 6. A TRUST AND EXPLAINABLE FEDERATED DEEP LEARNING
FRAMEWORK IN ZERO TOUCH B5G NETWORKS
tion of the FL-based decisions, to different B5G network stakeholders, such as slice
managers. Noting that our framework leverages a real dataset about latency KPI
that, we generate using OpenAirInterface platform.
The rest of this chapter is organized as follows. In section 6.2, we present a review
of related works. Section 6.3 describes the design and specification of the pro-
posed framework. In Section 6.4, we evaluate and validate our XAI-empowered
FL framework. Finally, section 6.5 concludes the chapter.
In this section, we present the few works, that addressed the explainability of FL-
based models. In [95], the authors proposed a novel scheme to interpret FL-based
models. They leveraged shapley value to compromise the data-privacy protection
and model explainability in FL. This scheme enables each FL participant to get
feature importance for its own features (data), and a unified feature importance
for the features of the other participants.
In [96], the author proposed an explainable horizontal federated learning approach,
leveraging integrated gradients explainability method. The authors compared be-
tween centralized and federated models, and applied integrated gradients to show
the score of each feature related to each prediction for both models.
We observe that few studies have been proposed to deal with the explanation issue
of FL-based models. These studies addressed this issue either in general way, i.e.
whatever the use case [95], or focusing on a specific and simple use case, such
as Taxi travel time prediction [96], which is very simple and different from B5G-
enabled use cases.
In this chapter, we designed a novel framework that leverages RuleFit, LIME,
SHAPE and PDP as XAI approaches, to explain and interpret an FL-based model
of latency prediction. We note that our framework enables not only to deduce the
most relevant features conducting to each FL-based latency prediction, but also
providing both local and global explanations related to latency predictions of run-
ning network slices.
In this section, we present our XAI-empowered FL framework for the B5G net-
works. First, we give an overview about the architecture of our proposed FL
framework. Then, we describe our deep neural architecture we build to predict
the latency related to the B5G networks, and our XAI-FL approaches we applied
to interpret and explain the outputs of our deep learning model, trained on local
107
CHAPTER 6. A TRUST AND EXPLAINABLE FEDERATED DEEP LEARNING
FRAMEWORK IN ZERO TOUCH B5G NETWORKS
Fig. 6.1 The proposed trust B5G Architecture of our XAI-Empowered FL Framework.
Fig. 6.1 gives an overview about the architecture related to our FL framework.
Our architecture presents different 5GB parties, including the slice provider, the
slice managers, and inter-slice manager (orchestrator), that collaboratively train a
deep learning model, in federated way. First of all, the slice orchestrator initiates
the federated learning process to build a learning model about latency KPI predic-
tion. It defines the learning parameters such as, learning rate, neural architecture
(number of layers/neurons), activation functions, and neural weights optimizer, in
addition to the needed data.
The orchestrator then sends such information to the involved slice managers in
the FL process (step 1 in Fig. 6.1). After that, the slice managers start to build
their local learning models, using their own data. Once done, the slice managers
send their local models to the slice orchestrator for aggregation ∆wi , in order to
generate a global model (steps 1 and 2 in Fig. 6.1). The latter will be deployed at
the slice managers level, to predict the latency KPI in real time (steps 3 and 1 in
Fig. 6.1).
108
CHAPTER 6. A TRUST AND EXPLAINABLE FEDERATED DEEP LEARNING
FRAMEWORK IN ZERO TOUCH B5G NETWORKS
In addition, we apply four different XAI approaches, to generate local, global, and
feature importance-based explanations, related to the latency predictions. Thus,
our framework allows the slice provider’s decision makers to not only monitoring
the latency KPI of running network slices, but also how and why predictions are
made, through a graphical XAI user interface (step 4 in Fig 6.1).
It is worth noting that our study is mainly based on a realistic B5G dataset, that
we generate using OpenAirInterface, implementing the network slicing concept,
called EARCD (Eurecom AMF Resource Consumption Dataset). Our dataset
provides the response time (latency) of the Access Mobility Function (AMF),
running as virtual network functions (VNF) inside the network slices, to handle
user attach requests, while considering various parameters, including available and
consumed CPU and RAM memory resources. Therefore, we consider ten running
network slices and we generate a sub-dataset for each network slice of 2813 sam-
ples (rows). Each sub-dataset comprises five input features (CPU capacity, RAM
capacity, used CPU, used RAM, and number of attach request), and one output
feature, which corresponds to latency in terms of average duration to process users
attachments, by the network slices’ AMFs.
Noting that we also leverage 5G UE emulator, my5G-RANTester, to emulate mul-
tiple number of users that send a high number of attach request packets, to the
ten network slices (AMF functions). Furthermore, each slice manager implements
a neural network of one input layer of five neurons (our five input features), four
connected hidden layers of 20 neuron nodes, and one output layer of one neuron
(latency prediction). The activation function in all layers is the rectified linear
activation function.
Several ML/DL explainable approaches were proposed to show the features im-
pact, on the target labels. In order to interpret ”Black-Box” of our FL-based
model, we apply model agnostic approaches [24], which aim to understand the in-
ner working of learning models. The model agnostic methods can be divided into
two main categories: local model-agnostic and global model-agnostic. In what
follow, we present the model-agnostic approaches, that we apply to explain our
FL model.
The Global methods aim interpret learning model working in general way. We
apply Partial Dependence Plots (PDP) method [24].
109
CHAPTER 6. A TRUST AND EXPLAINABLE FEDERATED DEEP LEARNING
FRAMEWORK IN ZERO TOUCH B5G NETWORKS
110
CHAPTER 6. A TRUST AND EXPLAINABLE FEDERATED DEEP LEARNING
FRAMEWORK IN ZERO TOUCH B5G NETWORKS
(a) (b)
(c) (d)
Fig. 6.2 Partial Dependence Plots on EARCD dataset.
lationship between features in the form of decision rules [24]. RuleFit builds a
sparse linear model, leveraging both the dataset features and a set of new fea-
tures that generated from the interactions between the original dataset features
(decision rules). These new features are automatically built from decision trees,
where each tree path is transformed to a decision rule. In our study, we apply
RuleFit to generate hundreds of new decision rules. We then apply additional fil-
tering/combining to determine the most important/informative rules. Therefore,
such new rules will help slice provider’s decision makers to better interpret and
understand our FL-based model predictions.
111
CHAPTER 6. A TRUST AND EXPLAINABLE FEDERATED DEEP LEARNING
FRAMEWORK IN ZERO TOUCH B5G NETWORKS
tensorflow library as well as XAI libraries, including SHAP, and PDPBox. Fol-
lowing sections, we present the obtained results of the different XAI-techniques
used.
Fig. 6.2 shows the obtain partial dependence plots trained on our EARCD dataset.
The left plot in the Fig. 6.2 depicts the effect of the number of attach requests on
the latency; we can clearly see a linear relationship among them (Straight line),
when the number of attach requests is superior to 200. Similarly, we analyze the
effect of the used CPU on the latency (Fig. 6.2-b) as well as on the number of
attach requests (Fig. 6.2-c), to show the interaction between these two features.
We clearly see an interaction (different stripes and colors from purple to yellow)
between the “Number of attach” and “CPU Used” features. Furthermore, the
purple/blue color reflects the low dependence, while the green/yellow presents the
high dependence of the features. For a number of attach less than 300 requests,
the latency is nearly independent (=2.92%) of the CPU used, shown in purple and
blue; whereas for values greater than 300 there is a strong dependence (30.00%)
on CPU used (shown in green, and yellow color). Similarly, there is also a strong
dependence between the ”number of attach” feature and ”RAM used”, ”CPU
Limit”, and ”RAM Limit” features (Fig. 6.3), when their values are greater than
”300”, ”200”, and ”300”, respectively.
112
CHAPTER 6. A TRUST AND EXPLAINABLE FEDERATED DEEP LEARNING
FRAMEWORK IN ZERO TOUCH B5G NETWORKS
113
CHAPTER 6. A TRUST AND EXPLAINABLE FEDERATED DEEP LEARNING
FRAMEWORK IN ZERO TOUCH B5G NETWORKS
Fig. 6.4 and Fig. 6.5 show the most informative features in an orderly manner.
For a particular observation, each input feature has either a positive or a negative
contribution to the final latency prediction (Fig. 6.4). Moreover, the blue color
reflects the low value of the feature, while the Red color presents the high value
of the features. Based on the obtained plots, we can notice that the most impor-
tant feature is the number of received attach request. Also, the more number of
attach is high, the more the latency is high. It is reasonable explanation because
the processing duration of the received attach requests increases as the number of
received requests increases as well.
After that, the second important feature is the ”CPU Limit” feature. Indeed,
the AMF functions with a high number of CPUs will generate a less latency, as
compared with AMFs with low number of CPUs. Hence, the more resources al-
located to AMFs are high, the more attach request treatment is faster, so the
latency of attach requests decreases. Similarly, using the RuleFit method, Fig. 6.6
shows similar results of feature importance, which confirms the obtained results
in Fig. 6.4 and Fig. 6.5 for the SHAP method. In Fig. 6.6, the highest scoring
features corresponds to the following features: (1) number of attach: corresponds
to the number of Attach Requests sent to the AMF; (2) CPU Limit: corresponds
to the Number of CPU allocated to AMF; (3) RAM Used: corresponds to the
memory used during AMF processing; (4) CPU Used: corresponds to the CPU
used during the AMF processing; (5) RAM Limit: corresponds to the memory al-
located to the AMF. Additionally, RuleFit method enables to generate new rules
about dataset features and their combinations. Such rules will help to show the
importance of the features for the model predictions.
Fig. 6.7 illustrates some rules of the RuleFit method through a table containing
five main columns: ”Rule” which is either an existing feature or a rule formula
(combining more features). ”Type”, which is either linear for the existing fea-
tures, or rule for a new generated rule. ”Coef” which is the coefficient of the rules
114
CHAPTER 6. A TRUST AND EXPLAINABLE FEDERATED DEEP LEARNING
FRAMEWORK IN ZERO TOUCH B5G NETWORKS
and features. ”Support” presents what proportion of the dataset supports the
corresponding rule/feature. ”Importance”, which reflects the importance of each
rule on the predictions. Noting that the feature importance is deduced from the
weights of the regression model. Besides, in Fig. 6.8, we eliminate the insignifi-
cant features based on several criteria, such as (1) eliminate the rules with 0.00
coefficient since they are not significant; (2) sort the rules based on their support
value; and (3) eliminate the leanest rules to keep more important rules.
As results, all the most significant rules involves the ”Nb of attach” feature, which
confirms the previous results (Fig. 6.4, Fig. 6.5, and Fig. 6.6). Therefore, we notice
that the most significant rule combinations also mostly contain these features. As
an example, the first rules above work as follow: IF ”Nb of attach” ≤ 305 and
(and) ”Nb of attach” ≤ 205, THEN we have 3.58 as a feature importance for
the KPI predictions. The second rule is very similar to the first one. Therefore,
it might make sense to combine or eliminate some of the similar rules for a more
interpretable set of rules. Ideally, we need to apply some filtered methods to group
the similar rules and create a leaner model, which would cover all the interaction
effects, which would ultimately help the ML analyzer to understand the working
mechanism of our FL trained model.
Fig. 6.9 depicts the positive/negative impact of the features on our FL model
predictions (latency KPI), using the LIME method. Using a test instance, the
value of the predicted label, which is the latency, is equal to 12.06 seconds. It is
presented by a bar on the left, and depicted by the given vector. We can see the
colors blue and orange, depicting negative and positive associations, respectively.
As we observe, the ”number of attach” feature has a higher and positive impact
(sign (+)) on the predicted latency, and when the number of attach is more than
230 requests, the higher latency we obtain. In addition, we also see that the ”CPU
Limit” feature has a lower/negative impact on the predicted latency (sign (−) in
Fig. 6.9).
115
CHAPTER 6. A TRUST AND EXPLAINABLE FEDERATED DEEP LEARNING
FRAMEWORK IN ZERO TOUCH B5G NETWORKS
Features Impact
Nb of attach > 230.00, 40.1456199741355
Fig. 6.9 Lime results displaying the predicted label and the top five features impact.
prediction. Therefore, our XAI-based framework will help decision makers of slice
providers, to not only detecting latency SLA-related violations for each running
network slice, but also to determine the main reasons that conduct to such SLA
violations, and hence studying how to anticipate them and use the results for the
most advantageous network slice re-configuration (i.e, the resource allocated for
the slice: RAM, CPU, etc.).
Additionally, according to the FL concept and the characteristics of the XAI
algorithms, the latter can be classified into 2 categories: (1) XAI models run in
the FL client side, which are PDP and Rulefit (because these algorithms are related
to the local dataset and the local model (model fit)), and (2) XAI models run in
the FL server side, which are LIME and SHAP (because these algorithms are
related to the label prediction). However, for PDP, the FL clients will only share
the plots that show the percentage of feature impact on the target label, in order
to save their data privacy. Moreover, the reasons behind the usage of different
XAI algorithms, that present similar results, is about increasing confidence in the
outcomes of XAI algorithms.
6.5 Conclusion
116
CHAPTER 6. A TRUST AND EXPLAINABLE FEDERATED DEEP LEARNING
FRAMEWORK IN ZERO TOUCH B5G NETWORKS
117
CHAPTER 7
Conclusions
118
CHAPTER 7. THE GENERAL CONCLUSION
7.1 Conclusions
The first contribution of this thesis, i.e., chapter 3, addressed the problem of
trust between the different stakeholders in 5G network slices. The Network Slice
provider sells end-to-end network slices (virtual end-to-end mobile network) to the
vertical while leasing virtual and physical resources from Infrastructure Providers
to enforce these end-to-end network slices. Accordingly, there is a need to estab-
lish SLA among these actors to ensure: (1) that the service is well-delivered to
the vertical and (2) the infrastructure providers are respecting their involvement
with the network slice provider. In the first contribution, we have proposed a
trust architecture that establishes trust communication between different stake-
holders with the introduction of Network Slicing, namely the vertical or tenant,
the network slice provider, and the infrastructure provider. Actually, we propose
a trust architecture to automatically manage the SLAs and apply penalties and
compensations if the SLAs are not respected by one of the involved actors.
119
CHAPTER 7. THE GENERAL CONCLUSION
7.2 Perspectives
The trust system is crucial to the security of network slicing. Trust between the
different 5G stakeholders, and the tenants must be taken into consideration at
several layers, since it is directly tied to the business model and overall architec-
ture. There must be a level of confidence between the 5G parties, which should
be reflected through legal agreements. This applies in the relation to tenants at
any of the different architectural layers: resources, and slice providers. As an ex-
ample, a slice manager cannot ,by default, trust the host platforms, and the host
platforms cannot, by default, trust the slice manager, especially when the network
slice utilizes resources from several physical networks. In our work, we introduce
an end-to-end trusted architecture for network slicing between the tenants, slice
provider, and infrastructure providers. However, the Monitoring Module of the
different 5G stakeholders, used in the proposed 5G framework, should also be
trusted.
The security in the 5G network has evolved and is more efficient than in the pre-
vious generations. The used 5G technologies increase the attack surface for threat
actors. One of the primary points of attack has been identified as 5G customer
120
CHAPTER 7. THE GENERAL CONCLUSION
devices. Priorities in research should focus on reducing risks associated with end
devices. Additionally, security measures brought by emergency access must be
taken into account. Emergency services have proven to be a vulnerable point of
access. Thus it will be further examined how to handle them at the slice level.
Moreover, The growth of the Internet of Things is accompanied by serious cyber-
security risks, especially with the emergence of IoT botnets. In this context, intru-
sion detection systems (IDSs) proved their efficiency in detecting various attacks
that may target IoT networks, especially when leveraging ML techniques. How-
ever, the proposed ML-based solutions make “machine-centric” decisions about
intrusion detection in the IoT network, which are then executed by cyber secu-
rity. One of the future work is to integrate XAI algorithms, which is a promising
paradigm that helps to explain the decisions of Ml-based IDSs to make them
understandable to cyber-security experts.
121
LIST OF PUBLICATIONS
1. BEN SAAD Sabra, KSENTINI Adlen, and BRIK Bouziane: ”A Trust ar-
chitecture for the SLA management in 5G networks”, In : ICC 2021-IEEE
International Conference on Communications, 2021. p. 1-6.
2. BEN SAAD Sabra, KSENTINI Adlen, and BRIK Bouziane: ”An end-to-end
trusted architecture for network slicing in 5G and beyond networks”, Wi-
ley International Journal of Communication Systems: Security and Privacy,
2022, vol. 5, no 1, p. e186.
3. BEN SAAD Sabra, BRIK Bouziane, and KSENTINI Adlen: ”A Trust and
Explainable Federated Deep Learning Framework in Zero Touch B5G Net-
works”, in : IEEE Global Communications Conference, 2022. p. 1-6.
4. BEN SAAD, Sabra, BRIK Bouziane, and KSENTINI Adlen: ”Toward Se-
curing Federated Learning against Poisoning Attacks in Zero Touch B5G net-
works”, in IEEE Transactions on Network and Service Management, 2023.
5. Redouane Niboucha, Sabra Ben Saad, Adlen Ksentini, and Yacine Challal:
”Zero-touch security management for mMTC network slices: DDoS attack
detection and mitigation”, in IEEE Internet of Things Journal, vol. 10, no.
9, pp. 7800-7812, 2023.
122
REFERENCES
[6] A. Ksentini and N. Nikaein, “Toward enforcing network slicing on ran: Flex-
ibility and resources abstraction,” IEEE Communications Magazine, vol. 55,
no. 6, pp. 102–108, 2017.
[7] X. Li, M. Samaka, and H. A. Chan et al, “Network slicing for 5g: Challenges
and opportunities,” IEEE Internet Computing, vol. 21, no. 5, pp. 20–27, 2017.
123
REFERENCES
[10] NGMN Alliance, “The next generation mobile networks (ngmn) ,,” 5g white
paper, Frankfurt, Germany, Feb. 2015.
[11] Symeon Papavassiliou, “Software defined networking (sdn) and network func-
tion virtualization (nfv),” Future Internet, 2020.
[12] 3GPP, “Study on architecture for next generation system, release 14,” Sophia
Antipolis, France, Rep. TR 23.799,, Dec. 2016.
[16] Y. Zaki, Liang Zhao, C. Goerg, and A. Timm-Giel, “Lte wireless virtualiza-
tion and spectrum management,” in WMNC2010, 2010, pp. 1–6.
[19] 3GPP, “Feasibility study on new services and markets technology enablers –
stage 1,,” vol. TR 22.891 release 14.
124
REFERENCES
[23] Hui Yang, Yizhen Wu, Jie Zhang, Haowei Zheng, Yuefeng Ji, and Young
Lee, “Blockonet: Blockchain-based trusted cloud radio over optical fiber net-
work for 5g fronthaul,” Optical Fiber Communication Conference, San Diego,
California United States, 2018.
[24] Hui Yang, Haowei Zheng, Jie Zhang, Yizhen Wu, Young Lee and Yuefeng Ji,
“Blockchain-based trusted authentication in cloud radio over fiber network for
5g,” 16th International Conference on Optical Communications and Networks
(ICOCN), Wuzhen, 2017.
[25] Babak Mafakheri, Tejas Subramanya, Leonardo Goratti and Roberto Rig-
gio, “lockchain-based infrastructure sharing in 5g small cell networks,” 14th
International Conference on Network and Service Management, Rome, 2018.
[26] Morocho-Cayamcela, M.E.; Lee, H.; Lim, W, “Machine learning for 5g/b5g
mobile and wireless communications: Potential, limitations, and future direc-
tions,,” IEEE Access 2019, 7, 137184–137206.
[27] Le, H.A.; Van Chien, T.; Nguyen, T.H.; Choo, H.; Nguyen, V.D, “Machine
learning-based 5g-and-beyond channel estimation for mimo-ofdm communi-
cation systems,,” Sensors 2021, 21, 4861.
[28] Aldossari, S.M.; Chen, K.C, “Machine learning for wireless communication
channel modeling: An overview,,” Wirel. Pers. Commun. 2019, 106, 41–70.
[29] Zakaria Abou El Houda, Bouziane Brik, and Lyes Khoukhi, “Ensemble learn-
ing for intrusion detection in sdn-based zero touch smart grid systems,” 2022
IEEE 47th Conference on Local Computer Networks (LCN), 2022.
[30] N. Marir, H. Wang, G. Feng, B. Li, and M. Jia, “Distributed abnormal be-
havior detection approach based on deep belief network and ensemble svm
using spark,” IEEE Access, vol. 6, pp. 59 657–59 671, 2018.
[31] N. Moustafa, B. Turnbull, and K.-K. R. Choo, “An ensemble intrusion de-
tection technique based on proposed statistical flow features for protecting
network traffic of internet of things,” IEEE Internet of Things Journal, vol.
6, no. 3, pp. 4815–4830, 2019.
125
REFERENCES
[32] B. Brik and A. Ksentini, “On predicting service-oriented network slices per-
formances in 5g: A federated learning approach,” International conference on
Local Communications Networks, nov 2020.
[34] Bakri, Sihem and Brik, Bouziane and Ksentini, Adlen, “On using
reinforcement learning for network slice admission control in 5g: Offline
vs. online,” International Journal of Communication Systems, vol. 34,
no. 7, p. e4757, 2021, e4757 dac.4757. [Online]. Available: https:
//onlinelibrary.wiley.com/doi/abs/10.1002/dac.4757
[35] O. Petar Popovski, Kasper F. Trillingsgaard and Giuseppe Durisi, “5g wireless
network slicing for embb, urllc, and mmtc: A communication-theoretic view,”
IEEE Access, 2018.
[40] Euromoney, “How does a transaction get into the blockchain?” Avail-
able: https://www.euromoney.com/learning/blockchain-explained/how-
transactions-get-into-the-blockchain, 2020.
[41] Widya Nita Suliyanti, Riri Fitri Sari, “Evaluation of hash rate-based double-
spending based on proof-of-work blockchain,” International Conference on
Information and Communication Technology Convergence (ICTC), Jeju, Ko-
rea (South), 2019.
126
REFERENCES
[42] Li Zhetao, Kang Jiawen, Ye Dongdong, Deng Qingyong and Zhang Yan,
“Consortium blockchain for secure energy trading in industrial internet of
things,” EEE Transactions on Industrial Informatics, 2017.
[43] Nada Chendeb, Nour Khaled, and Nazim Agoulmine, “Integrating blockchain
with iot for a secure healthcare digital system,” 8th International Work-
shop on ADVANCEs in ICT Infrastructures and Services (ADVANCE 2020),
Candy E,2020.
[44] J. H. Noh and H.-Y. Kwon, “A study on smart city security policy based on
blockchain in 5g age,” International Conference on Platform Technology and
Service (PlatCon), Jeju, Korea (South), 2019.
[47] Chaer Abdulla, Salah Khaled, Lima Claudio, Ray Partha and Sheltami Tarek,
“Blockchain for 5g: Opportunities and challenges,” IEEE Globecom, USA,
2019.
127
REFERENCES
[54] Ahmed Amokrane, Adlen Ksentini, Yassine Hadjadj Aoul, and Tarik Taleb,
“Congestion control for machine type communications,” pp. 778–782, 2012.
[Online]. Available: https://doi.org/10.1109/ICC.2012.6364152
[57] Jordan Lam and Robert Abbas, “Machine Learning based Anomaly Detection
for 5G Networks,” Mar. 2020, uRL: https://arxiv.org/abs/2003.03474.
[Online]. Available: https://arxiv.org/abs/2003.03474
[60] Antoine Delplace, Sheryl Hermoso, and Kristofer Anandita, “Cyber Attack
Detection thanks to Machine Learning Algorithms,” Jan. 2020, uRL:
https://arxiv.org/abs/2001.06309. [Online]. Available: https://arxiv.org/
abs/2001.06309
128
REFERENCES
[62] Rohan DDoShi, Noah Apthorpe, and Nick Feamster, “Machine Learning
DDoS Detection for Consumer Internet of Things Devices,” apr 2018.
[65] Maryam Ghanbari and Witold Kinsner, “Extracting Features from Both
the Input and the Output of a Convolutional Neural Network to
Detect Distributed Denial of Service Attacks,” in IEEE 17th International
Conference on Cognitive Informatics and Cognitive Computing (ICCI*CC),
Jul. 2018, uRL: https://ieeexplore.ieee.org/document/8482019. [Online].
Available: https://ieeexplore.ieee.org/document/8482019
[67] A. Michael Schachter, “DDoS and 5G: The bigger the pipe, the stronger the
threat,,” June 26 2018.
[68] Sean Newman, Enterprises Beware:, “Variations on the mirai malware still
feeding ddos attacks,” 2022.
129
REFERENCES
[72] Florian Metzger, Tobias Hoßfeld, André Bauer, Samuel Kounev, and Poul
E. Heegaard, “Modeling of Aggregated IoT Traffic and its Application to
an IoT Cloud,” Proceedings of the IEEE, Mar. 2019. [Online]. Available:
https://ieeexplore.ieee.org/abstract/document/8674845
[73] Markus Laner, Philipp Svoboda, Navid Nikaein, and Markus Rupp, “Traffic
Models for Machine Type Communications,” in ISWCS 2013; The Tenth
International Symposium on Wireless Communication Systems. VDE, Aug.
2013. [Online]. Available: https://www.eurecom.fr/en/publication/4079
[74] Hatim Chergui, Adlen Ksentini, and Luis Blonco, et al, “Toward zero-touch
management and orchestration of massive deployment of network slices in
6g,” accepted in IEEE Wireless Magazine, special issue on 6G: The paradigm
for future wireless comunications, 2021.
[76] Mason, Llew and Baxter, Jonathan and Bartlett, Peter and
Frean, Marcus, “Boosting algorithms as gradient descent,” in Ad-
vances in Neural Information Processing Systems, vol. 12. MIT Press,
1999. [Online]. Available: https://proceedings.neurips.cc/paper/1999/file/
96a93ba89a5b5c6c226e49b88973f46e-Paper.pdf
[77] Vu, Quang and Ruta, Dymitr and Cen, Ling, “Gradient boosting decision
trees for cyber security threats detection based on network events logs,” 2019,
pp. 5921–5928.
[78] Shah Zeb, Aamir Mahmood, Syed Ali Hassan, et al, “Industrial digital twins
at the nexus of nextg wireless networks and computational intelligence: A sur-
vey,” Journal of Network and Computer Applications, Volume 200, 103309,
ISSN 1084-8045, https://doi.org/10.1016/j.jnca.2021.103309, 2022.
130
REFERENCES
[81] Virat Shejwalkar, Amir Houmansadr, Peter Kairouz , et al, “Back to the
drawing board: A critical evaluation of poisoning attacks on production fed-
erated learning,” the IEEE Symposium on Security Privacy, 2022.
[82] Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, and Vitaly
Shmatikov, “How to backdoor federated learning,” CoRR,2018.
[83] Peva Blanchard, Rachid Guerraoui, Julien Stainer, et al, “Machine learning
with adversaries: Byzantine tolerant gradient descent,” In NeurIPS, pages
119–129, 2017.
[84] Clement Fung, Chris J.M. Yoon, Ivan Beschastnikh, “Mitigating sybils in
federated learning poisoning,” CoRR, 02 Sep 2018.
[86] Yi Liu, Jialiang Peng, Jiawen Kang, et al, “A secure federated learning frame-
work for 5g networks,” IEEE wireless communications magazine, March 2020.
[87] Phillip Rieger, Thien Duc Nguyen, Markus Miettinen, et al., “Deepsight:
Mitigating backdoor attacks in federated learning through deep model in-
spection,” CoRR, 2022.
[88] Mustafa Safa Ozdayi, Murat Kantarcioglu, Yulia R. Gel, “Defending against
backdoors in federated learning with robust learning rate,” CoRR, 2020.
[89] Matthew Jagielski, Alina Oprea, Battista Biggio , et al., “Manipulating ma-
chine learning: Poisoning attacks and countermeasures for regression learn-
ing,” 2018 IEEE Symposium on Security and Privacy, 2018.
[91] Mahesh Subedar, Nilesh A. Ahuja, Ranganath Krishnan, et al. , “Deep prob-
abilistic models to detect data poisoning attacks,” CoRR, 2019.
131
REFERENCES
[92] Close J. Steinhardt, et al., “Certified defenses for data poisoning attacks
proceedings of neurips,” pp. 3518-3530, 2017.
[95] Guan Wang, “Digital and smart analytics, interpret federated learning with
shapley values,” FML Workshop, Hong Kong, 2019.
[96] Jelena Fiosina, “Explainable federated learning for taxi travel time predic-
tion,” VEHITS, 2021.
[97] Christoph Molnar, “Interpretable machine learning a guide for making black
box models explainable,” Chapter 6, 2022.
132