A constrained optimization model for the provision of services in a 5G network with multi-level cybersecurity investments

被引:3
作者
Cappello, Giorgia M. [1 ]
Colajanni, Gabriella [1 ]
Daniele, Patrizia [1 ]
Sciacca, Daniele [1 ]
机构
[1] Univ Catania, Dept Math & Comp Sci, Viale A Doria 6, Catania, Italy
关键词
5G Network slicing; Constrained optimization; Cybersecurity; Modified genetic algorithm; MOBILE; MANAGEMENT; DELIVERY; SLICE;
D O I
10.1007/s00500-022-07117-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we present a multi-tiered network-based optimization model describing the provision of services by network slices of 5G-Service providers (e.g. through Unmanned Aerial Vehicles (UAVs) organized as Flying Ad hoc Networks (FANET)), taking into account the security levels of each provider. The three levels of the network consist of the infrastructure layers, which contain resources needed to execute a service, the slices layer, where services are served for the services layer, which represents the upper layer of the network and consists of services or applications required by users or devices. The objective of the proposed model is to establish the optimal flows between network layers and the optimal security levels in order to maximize the providers' profits, given by the difference between the revenues obtained by the sale of services and the rental of their resources and the costs. Numerical experiments are performed and solved with a new nature-inspired genetic algorithm adapted to the optimization 5G network problem.
引用
收藏
页码:12979 / 12996
页数:18
相关论文
共 59 条
[1]  
5G-PPP ERTICO EFFRA EUTC NEM & Networld2020 ETP, 2016, 5G EMP VERT IND
[2]  
Abounassar Eman M., 2022, Security and Interoperability Issues with Internet of Things (IoT) in Healthcare 1ndustry: A Survey, P159, DOI [10.1007/978-3-030-85428-77, DOI 10.1007/978-3-030-85428-77]
[3]  
Addad R.A., 2018, 2018 IEEE GLOBAL COM, P1
[4]   Overview of 5G Security Challenges and Solutions [J].
Ahmad, Ijaz ;
Kumar, Tanesh ;
Liyanage, Madhusanka ;
Okwuibe, Jude ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE Communications Standards Magazine, 2018, 2 (01) :36-43
[5]   Security for 5G and Beyond [J].
Ahmad, Ijaz ;
Shahabuddin, Shahriar ;
Kumar, Tanesh ;
Okwuibe, Jude ;
Gurtov, Andrei ;
Ylianttila, Mika .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3682-3722
[6]   Review of Recent Technologies for Tackling COVID-19 [J].
Alharbi A. ;
Abdur Rahman M. .
SN Computer Science, 2021, 2 (6)
[7]  
[Anonymous], 1991, Handbook of Genetic Algorithms
[8]   A 5G Mobile Network Architecture to Support Vertical Industries [J].
Banchs, Albert ;
Gutierrez-Estevez, David M. ;
Fuentes, Manuel ;
Boldi, Mauro ;
Prowedi, Silvia .
IEEE COMMUNICATIONS MAGAZINE, 2019, 57 (12) :38-44
[9]   A trust region method based on interior point techniques for nonlinear programming [J].
Byrd, RH ;
Gilbert, JC ;
Nocedal, J .
MATHEMATICAL PROGRAMMING, 2000, 89 (01) :149-185
[10]  
Colajanni G., 2022, Operations Research Forum, V3, P18