Trust-Aware Resource Management for Secure and Optimal Network Slicing in 5G Mobile Edge Networks

Chen Peng, Quanyan Zhu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In 5G mobile edge networks, the increased attack surface promotes the need for trust management while maintaining optimal resource provisioning. This work addresses this challenge by proposing a trust management scheme that monitors tasks' end-to-end delay to secure the network against denial-of-service attacks. We formulate an optimal network slicing problem that minimizes the overall end-to-end delay. Leveraging techniques from distributed optimization and Bayesian methods, we develop iterative algorithms to achieve a trust-aware resource management scheme that can achieve efficient and resilient network resource provisioning. We use the edge network in hierarchical tree topology and three kinds of 5G edge devices to evaluate the proposed scheme. Extensive simulation results show the effectiveness and scalability of the proposed scheme, which can quickly help services recover from cyber-attacks.

Original languageEnglish (US)
Title of host publicationIEEE INFOCOM 2023 - Conference on Computer Communications Workshops, INFOCOM WKSHPS 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781665494274
DOIs
StatePublished - 2023
Event2023 IEEE INFOCOM Conference on Computer Communications Workshops, INFOCOM WKSHPS 2023 - Hoboken, United States
Duration: May 20 2023 → …

Publication series

NameIEEE INFOCOM 2023 - Conference on Computer Communications Workshops, INFOCOM WKSHPS 2023

Conference

Conference2023 IEEE INFOCOM Conference on Computer Communications Workshops, INFOCOM WKSHPS 2023
Country/TerritoryUnited States
CityHoboken
Period5/20/23 → …

Keywords

  • 5G networks
  • Multi-Access Edge Computing
  • Network Slicing
  • Resource Management
  • Trust Management

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Hardware and Architecture
  • Signal Processing
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Trust-Aware Resource Management for Secure and Optimal Network Slicing in 5G Mobile Edge Networks'. Together they form a unique fingerprint.

Cite this