-
Research Article
Virtualization of a 4G Evolved Packet Core Network Using Network Function Virtualization (NFV) Technology with NS3 for Enterprise and Educational Purpose
Tonye Emmanuel,
Deussom Djomadji Eric Michel*,
Ebai Oben Brolynes Agbor
Issue:
Volume 13, Issue 1, June 2024
Pages:
1-18
Received:
2 February 2024
Accepted:
22 February 2024
Published:
7 March 2024
Abstract: The current networks of many operators dispose an increasing variety of purpose built, vertically integrated, and vendor-locked hardware equipment. This makes it difficult to easily scale their radio access and core networks as it requires yet another variety of equipment, leading to increased Time-to-Market and inefficient resource utilization. Furthermore, network equipment are expensive to procure and upgrade (increased CAPEX), and are difficult to adapt and program for new services (increased OPEX). These trends have recently spurred several efforts to redesign various components of mobile networks, notably the 4G Evolved Packet Core (EPC). With regards to this, the present work proposes a solution based on Network Function Virtualization (NFV), which can be deployed for educational or enterprises purpose like in Data Centers, or network nodes with a fine-grained QoS, while maintaining the scalability of the virtualized network function entities, and optimum resource utilization. The actual work develops a mobile network simulation module centered on the 4G Core network comprising its major components; MME, SGW, and PGW (vEPC), as well as the networking amongst these entities, core network related aspects such as its interaction with the Enhanced Radio Access Network (E-UTRAN) and the Packet Data Network Services (Internet). This solution gives to core network engineers and EPC network agents the possibility to design, analyze and test variable types of network scenarios. The solution can be also integrated in engineering schools and college for labs’ practical work or to any e-laboratory initiative to allow students in virtual environment to analyze signaling, modify the network configuration and better understand some theoretical concepts taught during the courses. The results obtained from the present work can be of great help during the final deployment phase of the network for full production for engineers of carriers’ network or improve the engineering understanding of core network in academic domain. In this light, the network can easily be scaled, adjust virtually for the time to commercialize a service reduced for carrier or enterprises’ solutions or for testing in e-laboratories.
Abstract: The current networks of many operators dispose an increasing variety of purpose built, vertically integrated, and vendor-locked hardware equipment. This makes it difficult to easily scale their radio access and core networks as it requires yet another variety of equipment, leading to increased Time-to-Market and inefficient resource utilization. Fu...
Show More
-
Research Article
A Proposed Approach to Integrate Application Security Vulnerability Data with Incidence Response Systems
Santanam Kasturi*,
Xiaolong Li,
Peng Li,
John Pickard
Issue:
Volume 13, Issue 1, June 2024
Pages:
19-29
Received:
5 February 2024
Accepted:
22 February 2024
Published:
7 March 2024
Abstract: This paper has proposed a method to develop an attack tree, from application vulnerability data discovered through tests and scans and correlation analysis using incoming transaction requests monitored by a Web Application Firewall (WAF) tool. The attack tree shows multiple pathways for an attack to shape through vulnerability linkages and a deeper analysis of the Common Weakness Enumeration (CWE) and Common Vulnerability Exposure (CVE) mapping to individual vulnerabilities. By further relating to a parent, peer, or child CWE (including CWEs that follow another CWE and in some cases precede other CWEs) will provide more insight into the attack patterns. These patterns will reveal a multi-vulnerability, multi-application attack pattern which will be hard to visualize without data consolidation and correlation analysis. The correlation analysis tied to the test and scan data supports a vulnerability lineage starting from incoming requests to individual vulnerabilities found in the code that traces a possible attack path. This solution, if automated, can provide threat alerts and immediate focus on vulnerabilities that need to be remedied as a priority. SOAR (Security Orchestration, Automation, and Response), XSOAR (Extended Security Orchestration, Automation, and Response), SIEM (Security Information and Event Management), and XDR (Extended Detection and Response) are more constructed to suit networks, infrastructure and devices, and sensors; not meant for application security vulnerability information as collected. So, this paper makes a special case that must be made for integration of application security information as part of threat intelligence, and threat and incident response systems.
Abstract: This paper has proposed a method to develop an attack tree, from application vulnerability data discovered through tests and scans and correlation analysis using incoming transaction requests monitored by a Web Application Firewall (WAF) tool. The attack tree shows multiple pathways for an attack to shape through vulnerability linkages and a deeper...
Show More
-
Research Article
Genetic Algorithm for Mode Selection in Device-to-Device (D2D) Communication for 5G Cellular Networks
Eric Michel Deussom Djomadji*,
Maniba Garga,
Bienvenue Arsene Roger Fouba,
Thomas Bouetou Bouetou
Issue:
Volume 13, Issue 1, June 2024
Pages:
30-43
Received:
5 February 2024
Accepted:
23 February 2024
Published:
7 March 2024
Abstract: The widespread use of smart devices and mobile applications is leading to a massive growth of wireless data traffic. With the rapidly growing of the customers’ data traffic demand, improving the system capacity and increasing the user throughput have become essential concerns for the future fifth-generation (5G) wireless communication network. In a conventional cellular system, devices are not allowed to directly communicate with each other in the licensed cellular spectrum and all communications take place through the base stations (BS) and core network. Device-to-Device (D2D) communication refers to a technology that enables devices to communicate directly with each other, without sending data to the base station and the core network. This technology has the potential to improve system performance, enhance the user experience, increase spectral efficiency, reduce the terminal transmitting power, reduce the burden of the cellular network, and reduce end to end latency. In D2D communication user equipment’s (UEs) are enabled to select among different modes of communication which are defined based on the frequency resource sharing. Dedicated mode where D2D devices directly transmit by using dedicated resources. Reuse mode where D2D devices reuse some resources of the cellular network. Outband mode where D2D communication uses unlicensed spectrum (e.g. the free 2.4 GHz Industrial Scientific and Medical (ISM) band or the 38 GHz millimetre wave band) where cellular communication does not take place. Cellular mode where the D2D communication is relayed via gNode B (gNB) and it is treated as cellular users. In this work, the target was to reach the optimal mode selection policy and genetic algorithm method was used with the objective of maximizing the total fitness function. Optimal mode selection policy was presented and analysed amongst cellular, dedicated, reused and outband mode. In the present study of mode selection issues in D2D enabled networks, genetic algorithm was proposed for the case when the cellular user equipment (UE) moves in the network. Quality of service (QoS) parameters, mobility parameters and Analytic Hierarchy Process (AHP) method were used to define the mode selection algorithm. To evaluate the performance of the proposed genetic algorithm, a study of the convergence of the algorithm and the signal-to-interference plus noise ratio (SINR) was done.
Abstract: The widespread use of smart devices and mobile applications is leading to a massive growth of wireless data traffic. With the rapidly growing of the customers’ data traffic demand, improving the system capacity and increasing the user throughput have become essential concerns for the future fifth-generation (5G) wireless communication network. In a...
Show More
-
Research Article
Wifi Pentesting Roadmap for Classic-Future Attacks and Defenses
Ramafiarisona Hajasoa Malalatiana,
Rakotondramanana Radiarisainana Sitraka*
Issue:
Volume 13, Issue 1, June 2024
Pages:
44-63
Received:
20 February 2024
Accepted:
5 March 2024
Published:
20 March 2024
DOI:
10.11648/j.ajnc.20241301.14
Downloads:
Views:
Abstract: The most advanced attack on the Wireless Fidelity (WIFI) network uses social engineering. The hacker makes portal captive and forces the victim for disconnecting to internet instead of entering the real password of the WIFI. In normal actions, asking WIFI password on the web interface is not the real process, but sometimes the victim is not experience enough on security and thinks that it is a technical problem. Also, the victim didn’t have internet connection due to the hard deauthentication and the select open access, which is not his WIFI network. The future generation of WIFI could be use a secure deauthentication. So, this article proposed how the actual attack will be processed, how is the secure deauthentication and how hacker could use this same attack with more secure network. Like conclusion, solutions to resolve this problem will be proposed. New hacking arsenal for replacing the deauthentication is the smart-jamming. With the secure deauthentication, reforging the packet for telling the victim to deauthenticate to the network will not be possible anymore. The smart-jamming select the frequency of the access point of the victim and jam only this specific frequency by sending a noise. In this scenario, the same effect of the first attack is still possible. For the best security of network, two solutions will be proposed: secure deauthentication and hopping frequency. A defensive proposition about secure deauthentication will be found in this article by using cryptographic key exchange like Diffie Hellman (DH), Elliptic Curve Diffie Hellman (ECDH) and Super Isogenies Diffie Hellman (CSIDH).
Abstract: The most advanced attack on the Wireless Fidelity (WIFI) network uses social engineering. The hacker makes portal captive and forces the victim for disconnecting to internet instead of entering the real password of the WIFI. In normal actions, asking WIFI password on the web interface is not the real process, but sometimes the victim is not experie...
Show More
-
Research Article
Trajectory Optimization and Power Allocation Scheme for a UAV Relay-aided Network in the Presence of an Eavesdropper
Issue:
Volume 13, Issue 1, June 2024
Pages:
64-74
Received:
22 March 2024
Accepted:
22 April 2024
Published:
27 May 2024
DOI:
10.11648/j.ajnc.20241301.15
Downloads:
Views:
Abstract: The information theoretical security for a cellular network in the presence of an eavesdropper is investigated in this research. The network is single-input-single-output (SISO) in nature. A small unmanned aerial vehicle (UAV) is aiding the network as a relay that follows the decode-and-forward (DF) protocol. The relay decodes the transmitted signal and retransmits it to the destination while repositioning itself if required. The allotted power of the UAV may not be enough for long-distance and long-duration travel. This article deals with the power needed for the data transmission so that the UAV can operate as a relay with less transmit power. However, the confidential data transmission between a base station and a mobile device is being intercepted by a passive eavesdropper. The security issue affects the transmit power and the outage situation. The theory of physical layer security is employed to ensure a secure wireless transmission. The secrecy parameters, namely, the secrecy capacity and the secrecy outage probability are investigated via mathematical derivations and computer programming. Additionally, optimizing the trajectory and allocation of the transmit power budget of the UAV will increase the network’s reliability. Our results show that the UAV relay can handle a secure transmission with its limited resources if a budget power allocation can be achieved along with an optimized trajectory.
Abstract: The information theoretical security for a cellular network in the presence of an eavesdropper is investigated in this research. The network is single-input-single-output (SISO) in nature. A small unmanned aerial vehicle (UAV) is aiding the network as a relay that follows the decode-and-forward (DF) protocol. The relay decodes the transmitted signa...
Show More
-
Research/Technical Note
Mobility Management in Next Generation Wireless Networks
Md. Shohidul Islam*,
Shah Ariful Hoque Chowdhury
Issue:
Volume 13, Issue 1, June 2024
Pages:
75-83
Received:
20 April 2024
Accepted:
28 May 2024
Published:
12 June 2024
DOI:
10.11648/j.ajnc.20241301.16
Downloads:
Views:
Abstract: Living in a modern society without smart devices is impossible now a days. Every sector related to human lifestyle is either smart or controlled devices which was rare a decade back. Expectations are not limited to network connection but extend to mobility as well. As a result, mobility management becomes an essential and challenging task to accomplish. The revolution in wireless technologies expects more scalability and flexibility in resource management. Handover is one of the vital parts of radio resource management. Execution with perfection and optimization of the handover technique increases the reliability of the system deployed to meet the requirement of high mobility. The cell became small as the wireless cell size adjusted with the revolution of relevant technologies like fifth generation (5G) and beyond. Traffic profile and its density are always in a growing trend. This pattern draws the attention of ultra-dense networks (UDN). The UDN of small cells requires an extra number of handovers with higher accuracy and less delay in execution. In this context, this paper proposed an algorithm where a cross-examination to reduce unnecessary handover that improves the handover performance in next-generation wireless networks.
Abstract: Living in a modern society without smart devices is impossible now a days. Every sector related to human lifestyle is either smart or controlled devices which was rare a decade back. Expectations are not limited to network connection but extend to mobility as well. As a result, mobility management becomes an essential and challenging task to accomp...
Show More