Skip to main content
Entropy logoLink to Entropy
. 2023 Jun 21;25(7):966. doi: 10.3390/e25070966

LERMS: A Low-Latency and Reliable Downlink Packet-Level Encoding Transmission Method in Untrusted 5GA Edge Network

Zhongfu Guo 1,*, Xinsheng Ji 2,3,*, Wei You 1, Mingyan Xu 1, Yu Zhao 1, Zhimo Cheng 1, Deqiang Zhou 1, Lingwei Wang 1
Editor: T Aaron Gulliver
PMCID: PMC10377979  PMID: 37509913

Abstract

The increasing demand for end-to-end low-latency and high-reliability transmissions between edge computing nodes and user elements in 5G Advance edge networks has brought new challenges to the transmission of data. In response, this paper proposes LERMS, a packet-level encoding transmission scheme designed for untrusted 5GA edge networks that may encounter malicious transmission situations such as data tampering, discarding, and eavesdropping. LERMS achieves resiliency against such attacks by using 5GA Protocol data unit (PDU) coded Concurrent Multipath Transfer (CMT) based on Lagrangian interpolation and Raptor’s two-layer coding, which provides redundancy to eliminate the impact of an attacker’s malicious behavior. To mitigate the increased queuing delay resulting from encoding in data blocks, LERMS is queue-aware with variable block length. Its strategy is modeled as a Markov chain and optimized using a matrix method. Numerical results demonstrate that LERMS achieves the optimal trade-off between delay and reliability while providing resiliency against untrusted edge networks.

Keywords: 5G-A core network, robust concurrent multipath transfer, interface diversity edge network, raptor codes, security

1. Introduction

In the era of 5G [1], edge computing provides customized computing services for data-intensive [2] and time-sensitive [3] applications such as healthcare [4] and traffic management [5]; edge networks (ENs) [6] are designed to address the challenges of centralized cloud computing and unreliable communications [7,8]. 5G-Advanced networks [9] are expected to offer more powerful capabilities, including wide coverage [10], low latency [11], and highly reliable transmission [12].

The EN transmits important and sensitive data related to safety [13], but it is closer to users and vulnerable to wireless eavesdropping [14], network-layer attacks [15], and tampering [16]. The edge network often finds itself in a predicament of weak protection capabilities and urgent security needs.

Previous studies have focused on addressing these pressing demands [17], and researchers have conducted extensive studies on point-to-point (UE-gNB) security at both the physical layer [18] and MAC-layer [19]. Providing secure end-to-end (UE-DN) transmission in an untrusted network incurs additional performance and resource overheads [20]. Commonly used confidentiality protection schemes include 5G voice communication using IPSec encryption [21], control plane TLS authentication [22], and secret-sharing proposed by Shamir et al. [23]. In the secret-sharing scheme, each share is delivered by a different courier to the recipient, providing an information-theoretic provable confidentiality transmission scheme.

The enhanced core network (ECN) proposed by 3GPP in ([1], clause 5.33), as shown in Figure 1, could establish multiple PDU sessions (MP), which can provide end-to-end reliable communication by redundancy transmission. The multiplex transport protocol stack is deployed on both the data network (DN) and user elements (UEs). Additionally, the high-layer (above the IP layer [1]) splits and aggregates the service flows. However, implementing concurrent multipath transmission (CMT) in an untrusted MPEN faces many challenges, including increased attack surface due to MPEN [17], additional delays due to asynchronous delay and bandwidth [24,25], making it not feasible to interact with the PDU bearer from the perspective of the 5G session mechanism [26].

Figure 1.

Figure 1

End-to-end redundant transmission in edge networks: A schematic illustration of MPEN utilizing redundant PDU sessions in an edge network with diversity interface for concurrent multipath transmission.

In this paper, we aim to design a low-latency, high-reliability transmission scheme suitable for untrusted edge networks. Randomly arriving source data packets are buffered and queued at the sending end before transmission. This article continues previous work [27] and uses Raptor coding for efficient CMT. We have introduced a Lagrangian interpolation coding [28] scheme to realize CMT based on secret sharing. Different coding parameters can be adjusted for different resilience levels, which is suitable for an untrusted network environment, as the concatenated encoder provides reliability and robustness against malicious behavior. Encoding is performed at the granularity of data packets. Longer encoding block length can ensure reliability, but the corresponding queuing delay will increase [29]. The length of encoding blocks must be carefully considered to balance delay and reliability. We use a Markov decision process to formulate the optimization problem and construct it as a matrix-based linear programming to obtain the optimal variable-length coding strategy. The contributions of this paper are as follows:

  • Proposes LERMS (LERMS is short for (Lagrangian–polynomial and Raptor Encoder concurrent Multiple-pdu-Sessions transmission)), which is the first concatenated encoder scheme that is suitable for untrusted edge network environments. LERMS provides secure, reliable downlink transmission capabilities in the face of an untrusted network, such as transmission failures, data theft, and malicious tampering.

  • A queue-aware variable block length encoding scheme is designed and optimized using a matrix-based approach to minimize queuing delay while ensuring reliability.

  • Proposes a multi-service flow aggregation transmission scheme that reduces the probability of data packet random idle filling, ensuring security when the flow is small, and improves the transmission efficiency of the edge network.

This paper is organized as follows: Section 2 presents the design of the secure transmission method and flow aggregation transmission scheme as preliminary work for 5GA LERMS. Section 3 describes the system model. In Section 4, the trade-off between delay and reliability for the LERMS strategy is demonstrated. Section 5 presents numerical results. This paper concludes in Section 6, with the future research directions proposed. Table 1 summarizes the important variables used throughout the paper.

Table 1.

Basic notations.

Symbol Definition
Ps,Pc The source packets, coded packets.
P,E The probability, expectation value.
F,N The finite field, the set of natural numbers.
The data collection operator for receiver.
T The time span of timeslot.
Ω(x) The degree distribution.
g The block-length of codes.
g[t],γυj[t] The encoding action within t-th timeslot.
dth The constraints of delay.
B The upper bounds of g[t].
Z The transmitting side queue buffer size.
ϕ The size of each data packet.
ευj=[ε1,,εj] The erasure probability of j sessions.
Λl[t], λ= The number Ps arrivals within t-th timeslot for user l.
[λl0,λl1,,λlN], The probability distribution of Λl[t]=n.
NL The number of disjoint PDU sessions established in MPEN.

2. 5GA LERMS Preliminary

We consider the business scenario in the edge network, as illustrated in Figure 1. The UE subscribes to the edge computing service, and the edge network that transmits is responsible for transmitting the downlink service flow to the UE. The downlink service flow requires low delay and high reliability in transmission. With abundant transmission resources, the 5GA network allows for the establishment of multiple PDU sessions to carry the downlink traffic. To ensure the secure transmission of the downlink traffic in an untrusted network environment, this section begins by analyzing the key performance indicators in the edge network environment. We then propose a multiplex transmission scheme based on the concept of secret sharing, which provides feasibility for secure transmission. Finally, we discuss a joint coding scheme for downlink traffic in the core network.

2.1. 5GA Edge Network Requirements Analysis and Challenges

As an emerging network architecture that provides high-performance communication between terminals (UE) and edge computing nodes (DN), the 5G Advance (5GA) edge network [6] aims to meet key requirements such as low latency, high reliability, and security in the 5GA mobile network. In this section, we will analyze these requirements in detail and discuss the challenges of implementing them in an untrusted network environment.

Latency (L). In classical transmission systems, the overall transmission latency comprises propagation latency (tp), signifying the physical delay of signals within the transmission medium, and transmission latency (tc), determined by tc=W/ϕ, where W represents the bandwidth and ϕ is the transmitted data volume. However, factors such as congestion and bit errors prevent the total latency from being a simple sum of tp and tc, causing transmission latency fluctuations within a specific range [30,31]. In coded transmission systems, end-to-end transmission delay must be reconsidered. Data are coded and transmitted in block units. Current application layer data enter the cache and queue up, waiting for the previous generation of coded data blocks to finish transmission [32]. Consequently, the end-to-end transmission delay is defined as T = T + ten + tde + tq, encompassing codec delay and queuing delay. This paper’s low latency discussion primarily centers on tq and tc.

Reliability (R). In this paper, we consider each PDU session as a packet erasure channel, denoted by ευj=[ε1,,εj] to represent the erasure probability of each PDU session [27]. High reliability refers to the transmission robustness against higher erasure probabilities. In other words, when a generation of source data packets departs from the sender within a specified time, and after applying redundancy/retransmission/coding and other reliable transmission techniques, we call it reliable transmission [17]. However, such losses may still be manipulated by malicious nodes, such as attackers, or intercepted by eavesdroppers. We define the total erasure probability as ENL=j=1NLγυjεj, where γυj=[γ1,,γj]T represents the traffic load weight of each path, with j=1NLγυj=1, and 0ENL<1. We refer to the current MPEN as ENL-Level reliability.

Security. Security performance refers to the robustness of maintaining correct data delivery in the face of attackers [33]. Unlike traditional trust management [34] to ensure system security, our focus is on enhancing communication security through the lens of information theory. It takes into account active attackers who may tamper with or pollute the data received by the destination, and passive attackers who attempt to eavesdrop on and steal the data. We consider rational attackers who target only a subset of PDU sessions in the edge network rather than all of them. By treating all malicious actions as packet errors, we can employ redundant coding techniques to protect and repair the corrupted or stolen data, thereby enhancing the security performance in the edge network environment. This approach ensures the integrity and confidentiality of data transmission, even in the presence of adversaries targeting edge networks. Therefore, we can regard the redundancy of multi-path coded transmission as the security level, and we can simply refer to the edge network where NL PDU sessions are transmitted as NL-level secure transmission.

To sum up, service flows carried by edge networks require low-latency, high-reliability transmission with elastic capabilities in an untrusted network environment. However, achieving these requirements in practice is not easy. Due to the untrustworthy characteristics of edge networks, such as congestion, bit errors, and malicious attacks, more advanced transmission schemes and technologies need to be researched and designed to meet these challenges and ensure safe and efficient data transmission in edge networks.

2.2. A Secure Transmission Method

In this section, we analyze the transfer security of secret sharing. Secret sharing is a method of splitting data and generating multiple pieces of data through Lagrangian interpolation to transmit data over untrusted multiple paths. This approach is designed to achieve a level of security that protects data from potential attackers while providing protection against partial data-tampering attacks.

The core idea of secret sharing technology is to decompose the original data into multiple derivative pieces of data using the Lagrangian interpolation method. Let us suppose we need to transmit the original data D and decompose its encoding into n pieces of derivative data, among which any k shares of data (kn) are sufficient to reconstruct the original data (In the secret-sharing technique [23,35], the original data is split into multiple parts, referred to as “shares” (derived data). These shares in LERMS are then transmitted through multiple paths, with each path carrying one share of the data). First, a polynomial of degree k1 is generated using Lagrange interpolation:

f(x)=a0+a1x+a2x2++a(k1)x(k1) (1)

where a0=D,a1,a2,,a(k1) are randomly selected coefficients. Then, we calculate the value of f(x) at n different points to generate n derivative data:

Di=f(xi),i=1,2,,n (2)

To reconstruct the original data, they can be calculated by Lagrangian interpolation:

D=L(0)=i=1kli(0)Di (3)

li(x) is a Lagrangian basis function that satisfies li(xj)=δij thatis,wheni=j,li(xj)=1;whenij,li(xj)=0,definedas:

li(x)=jik(xxj)(xixj),ji,j=1,2,,k (4)

In the edge network, each PDU session is considered an independent link provider, with a probability of being infiltrated by malicious behavior. The secret sharing transmission scheme based on Lagrangian interpolation in this scenario offers the following properties: Information security: In order to restore the original data through Lagrangian interpolation, the attacker must obtain at least k shares of derived data simultaneously, which increases the difficulty of their job and enhances information security. Integrity: Since the original data D is only dependent on the linear combination of the derived data Di, an attacker cannot change the value of the original data by tampering with part of the derived data unless they control at least k shares of the derived data at the same time. Reliability: As any k shares of derived data can be used to restore the original data, the reliability of the data can be guaranteed even if part of the derived data is lost or damaged during transmission.

To summarize, the CMT of secret sharing is robust and provides security guarantees for data transmission. We aim to further explain the resilient delivery methods that our proposed scheme LERMS can provide by identifying the types of security challenges it addresses. As shown in Figure 2, an untrusted edge network may contain invalid links that result in complete data loss, malicious links that tamper with or forge data, or colluding attackers that steal or modify data to launch a Byzantine attack. These malicious behaviors can be viewed as code errors that need to be corrected. Drawing from the concept of redundancy checks, we adjust the generation strategy of derived data to tolerate different types of malicious behaviors during transmission. In the next section, we will discuss more specific secure transmission schemes in the double-layer concatenated encoder.

Figure 2.

Figure 2

This diagram illustrates the transmission model (MPEN) with untrusted paths, which is an extended application of the problem model in [28]. The focus of this paper is to transmit X from the sender to the receiver through NL PDU sessions with low-latency and high-reliability characteristics, despite facing multiple threats. By carefully designing the LERMS strategies, the receiver can collect whole data from a subset of PDU sessions’ messages, even in the presence of failed links (F1,,Ff) and malicious links (M1,,Ma), while also ensuring data privacy from colluding links (C1,,Ct).

2.3. Downlink Multi-Service Stream Joint Coding

In an untrusted edge network environment, the data transmission of edge computing nodes faces numerous challenges, including transmission efficiency, privacy, security, and reliability [36]. Due to the minimum limit of the length of the data flow resulting from the splitting of path transmission data and security coding, padding short packets is often necessary to meet the requirement. However, this can lead to a waste of resources.

To tackle these issues and demonstrate the demand and advantages of aggregating and transmitting multiple downlink service flows, we have developed an approach based on the current core network data transmission process. This approach enables the efficient transmission of aggregated data flows while preserving data privacy. As an example, we introduce an illustrative scenario called Single-Owner Multi-Device Data Transmission with Joint Encoding (SOMD-JE), which serves to further prove the value and practical effect of aggregated transmission in 5GA edge networks.

In the SOMD-JE scenario, we jointly encode multiple downlink service flows, which may belong to different devices but share the same owner. By analyzing the data characteristics of these flows, we found that aggregating and transmitting them does not lead to privacy leakage, and instead, the SOMD-JE improves transfer efficiency through server flows aggregation. For instance, in a smart home scenario, users’ mobile phones, smart screens, VR devices, and elderly health monitoring devices all belong to the same owner (As shown in Figure 3, the receiver has multiple devices including terminals, medical monitoring devices, and smart home devices), so aggregated data flows can be transmitted without worrying about privacy leaks. Similar settings exist on hospital wards and factory floors.

Figure 3.

Figure 3

System model: downlink-server flow transmission with joint encoding.

This flows aggregation approach overcomes the waste of resources caused by traditional padding methods, makes full use of edge network transmission resources, and ensures safe, reliable, and efficient transmission while maintaining data privacy. The specific scheme for aggregating and transmitting downlink service flows needs to be adaptively adjusted within the current core network data transmission process. For further details, please refer to Appendix A.

3. System Model

3.1. PDU Session Queuing and Encoding Transmission Model

For data packets arriving from the application layer, we assume that the arrival of downlink data packets of different users is completely independent and identically distributed (i.i.d.). Let Λl[t] denote the number of Ps arriving in the t-th timeslot for user l (l=1,2,,L). Given that the maximum value of Λl[t] is N, the probability distribution of Λl[t] for user l is expressed as λ=[λl0,λl1,,λlN]T, where λln=P{Λl[t]=n} denotes the probability of user l receiving n packets in the t-th timeslot. The average arrival rate is defined as Λl¯=n=0NΛnλln.

For each user, a buffer with a size of Z, randomly arriving packets are accumulated, and gl[t] packets are selected from the user l’s cache once the encoding of the previous block of packets is completed. Therefore, ql[t]Z={0,1,,Z}, in the [t+1]-th timeslot, ql[t] evolves as (we define (x)*=max{x,0})

ql[t+1]=min{(ql[t]gl[t])*+Λl[t+1],Z}. (5)

We assume that the size of the data block gl[t] selected for each user and each generation of encoding does not exceed B, i.e., gl[t]N={0,1,,B}. The feasible region of each user’s cache queue length ql[t] is given by ql[t]Z. Under the block length selection strategy N, N(q)={gN|(0,qB+NΛ)*gmin(q,B)}, where the feasible range N(q) guarantees that each user’s sending buffer queue will not underflow or overflow, we also have BNΛ which ensures that the system will not be congested.

Under the LERMS strategies, at time slot t we encode and transmit a generation of gσ[t] data packets (Ps) (Assuming that all packets have the same length and carry ϕ bit information), where gσ[t]=Σl=1Lgl[t]. The specific encoder process will be described in detail in the next subsection. LERMS choose NL PDU sessions for transmission, and the transmission vector is denoted as γυj=[γ1,,γj]T, where γυj indicates which channels are used for transmission. The output share of Lagrangian coding is also determined based on the number of channels. In summary, we express the LERMS strategies action as (gl,γυj), which changes in units of time slots, i.e., (gl[t]=gl,γυj[n]=γυj), indicating that the LERMS strategy action in the t-th time slot is gl,γυj. The LERMS action of each generation of data remains unchanged in its occupied time slot, and gl,γυj is set to 0 for the time slot not occupied. Assuming that the number of data packets in each generation does not exceed B, we have γj{0,1}, and let γυ=j=1NLγj. Then, we have γυΓυ{1,,NL} as {γυΓυ|0γυNLC{gσ[t]>0}} (C{·} denotes the characteristic function), where NL represents the number of PDU sessions established in LERMS.

3.2. Concatenated Encoder Principle

In this section, we introduce a double-layer concatenated Algorithm 1 for processing data packets within PDU sessions, and the algorithm complexity is O(N·(K+M)·log(K+M)). This encoder scheme combines the advantages of two distinct encoders to ensure reliable, efficient, and secure transmission across multiple disjoint PDU sessions.

Algorithm 1 Concatenated Encoder
  •  Input: 

    Read Ps=(Ps1,Ps2,,Psg)T from the queue, Ωd=(Ω1,Ω2,,Ωmax), the PDU sessions number NL;

  •  Output: 

    P¯c

  • 1:

    Pcgγ×10gγ;                              ▹ Raptor code encoding procedure

  • 2:

    Ggγ×mRaptor=Ggγ×mLTGm×gpre;

  • 3:

    Pcgγ×1=Ggγ×gRaptorPsg×1;

  • 4:

    RP¯cPcgγ×1;           ▹ Packet-level Raptor code encoder output RP¯c

  • 5:

    Generate uniform random matrix X={X1,X2,,XM};

  • 6:

    Split RP¯c into K groups(RPc1,RPc2,,RPcK);     ▹ Lagrange encoding procedure

  • 7:

    for  i=1,2,,N  do

  • 8:

       LPcij[K]RPcj·k[K+M]{j}αiβkβjβk+j=K+1K+MXj·k[K+M]{j}αiβkβjβk; {αi}i=1K+M{βj}j=1K=

  • 9:

       P¯cappend[P¯c,LPci]

  • 10:

    end for               ▹ Fast Polynomial interpolation

  • 11:

    return P¯c;

As shown in Figure 4, the LERMS strategy incorporates a concatenated encoder scheme. The first-level encoder, known as the Raptor Encoder, primarily focuses on providing reliability by enhancing the decodability and dependability of data streams transmitted within PDU sessions. The second-level encoder, called the Lagrange Polynomial Encoder, is designed to offer resilient transmission over untrusted paths within the edge network. Through the implementation of the “Double-layer Concatenated Encoder” scheme, we aim to provide a robust encoding solution for PDU sessions. The concatenated encoder principle will be described in detail in two subsections.

Figure 4.

Figure 4

LERMS concatenated encoder scheme.

3.2.1. Packet-Level Raptor Code Encoder

In this subsection, we present a packet-level Raptor encoding scheme for enhancing the robustness of PDU session transmissions in MPEN. We model these PDU sessions as packet erasure channels, where data packets can either be received entirely or erased. To improve transmission reliability, Ps will be transmitted after the Raptor encoder.

We encode Ps in PDU sessions using a Raptor packet encoder. The LERMS strategy selects g data packets for encoding at each time slot. Raptor-encoded data packets Pc are generated through two stages: an outer coder (pre-code) Φ and LT encoder [37] (inner code). The pre-code Φ is a (g,m) block code that generates m intermediate coded symbols from gPs. The inner LT encoder generates gγ data packets through ξ(g,m,Ω(x)), where γ represents the encoding redundancy, which is the inverse of the code-rate. The LT encoding matrix is constructed from a predetermined degree distribution Ω(x)=d=1dmaxΩdxd, with the degree distribution following a probability distribution Ωd=(Ω1,Ω2,,Ωmax) and satisfying d=1dmaxΩd=1. The relationship between the encoder’s input and output is given by Pcgγ×1=Ggγ×mLTGm×gprePsg×1, where Gpre and GLT denote the outer and inner encoding matrices, respectively.

The Raptor coding scheme enhances the reliability of data transmission by mixing data packets. When transmitting over packet erasure channels, it offers higher robustness and resilience. Data transmissions do not require feedback, as the encoding redundancy can be determined based on the channel characteristics. The receiver only needs to receive slightly more than the number of source data packets g to complete decoding. Due to the encoding scheme’s data mixing approach, even if some encoded data packets are erased, the entire source data block can still be recovered by continuing to receive encoded data packets.

3.2.2. Encoder for Lagrangian Polynomial Code Multipath Transmission

LCMT performs encoding operations on the output of Raptor encoder, denoted as RPc, to provide safe and reliable transmission over multiple paths, some of which may be untrusted, while protecting data privacy. Let us suppose an MPEN has NL physically isolated paths. LCMT encodes RPc to generate LPc, which is the output of Lagrangian encoder. Each generation of LPc will be split into K groups, namely (LPc1,LPc2,,LPck), and transmitted to the receiver. Through the reasonable coding method of LCMT, the system aims to tolerate the failure of S paths in the MPEN, malicious behavior of A paths, and collusion of T paths to steal data while still obtaining safe and reliable data transmission. If the data are safely received, we call this transmission scheme realizing the triplet (S,A,T).

To achieve this level of resilience, it is necessary to satisfy the following condition:

NLK+T+S+2A (6)

At this point, we can say that LCMT can realize the triplet (S,A,T). The significance of this result is that, by adding one path, the link failure resilience can be increased by 1 or the robustness of the malicious behavior path can be increased by 1/2. Furthermore, data privacy can be improved at the same time.

Let us take the transmission of {Pc} as an example, where K=2, N=6, and (S,A,T)=(1,1,1). In this case, {Pc} is split into Pc1 and Pc2. The key point of LCMT is to select a uniform random matrix X and encode it through Lagrange interpolation polynomial (Pc1,Pc2,X). The encoding process is given by the following equation:

ψ(x)=ΔPc1(x2)(x3)(12)(13)+Pc2(x1)(x3)(21)(23)+X(x1)(x2)(31)(32) (7)

To transmit {Pc}, six different values {αi}i=16 in the finite field F are determined such that {αi}i=16{1,2}=. Then, NL PDU sessions transmit ψ(α1),ψ(α2),,ψ(α6), where each path transmits the value after interpolation. In other words, the linear combination of Pc1 and Pc2 is hidden by ξX, where ξ is a nonzero value. Since X is uniformly random, the data privacy of T=1 can be guaranteed. If there is one malicious path (A=1) and one invalid path (S=1), a Reed–Solomon decoder needs to be used at the receiver, and three additional shares of data are required (one additional copy for each invalid path and two additional shares for the malicious path). At the receiving end, Pc1 and Pc2 can be recovered by computing ψ(1) and ψ(2).

Double-layer concatenated encoder processes downlink data packets from the edge DN to the UE, enabling their transmission through multiple disjoint PDU sessions. By leveraging both Fountain and Lagrange encoders, a concatenated encoder can efficiently and securely handle data packets within the PDU sessions, simultaneously improving transmission reliability and resilience against untrusted path transmissions.

3.3. Edge Network with Untrusted Paths

In this section, we analyze the transmission characteristics of MPEN, which is a multipath transmission network consisting of multiple physically disjoint PDU sessions. Our aim is to determine the performance level that can be achieved with the number NL of multiple transmission paths through an analysis of encoding transmission characteristics.

The input and output of MPEN are denoted by X and Y, respectively, while MPEN provides the transmission capability of the edge network. To begin, we define the parameters of the channel model. We assume that MPEN establishes NL paths for the current transmission task, which are classified based on their behavioral characteristics. Specifically, we consider N paths that can be transmitted normally, F failed sessions that cannot be transmitted within a specified time, A malicious transmission paths, and T paths that may be compromised by Byzantine attackers or eavesdroppers.

We assume that the input data stream X is evenly divided into K sub-packets x1,x2,,xK, and these sub-packets are encoded into N packets as x˜1,x˜2,,x˜N, where KN. These encoded packets are distributed across NL PDU sessions for transmission, and the receiver obtains the result Y=y1,y2,,yN, where N=NL (Here, we assume that each PDU session has only one single behavioral feature) subject to the following constraints:

NL=N+F+A+T (8)

Let denote the data collection operator and define the receiving vector r, where its j-th element rj represents the received data of the j-th PDU session. We define four types of receiving situations: normal transmission, represented by rN, where rN=n=1Nrn=n=1Nx˜n; failed transmission, represented by rF, where rF=f=1Frf=f=1F(0·x˜f); malicious transmission, represented by rA, where rA=a=1Ara=a=1Aϵa(x˜a); and Byzantine attack, represented by rT, where rT=t=1Trt=t=1Tϵt(x˜t). Here, we introduce the functions ϵa and ϵt, which, respectively, represent the influence of malicious transmission channels and Byzantine attack channels on the output.

We assume that the PDU session is a memoryless erasure channel, meaning that the output ri depends only on the input xi. Additionally, each data packet has a certain probability of loss, denoted by ευj=[ε1,,εj], which represents the erasure probability of different sessions. This loss affects only the receiving result, so we have:

Y=j=1NLεjrj (9)

The above description about MPEN is fully in line with the 3GPP standard’s definition of PDU session [38].

3.4. MPEN with Untrusted Path Reliable Function

In this subsection, we analyze the reliability of the two-layer concatenated encoder CMT in the edge network and propose a generalized reliability model. For the enumeration of all possible session state characteristics described in Figure 2, we first employ a 2NL×NL matrix C:

C=110100T (10)

The value 0/1 of the elements in row i and column j indicates the i-th possibility of success/failure at the receiving end through the j-th PDU session. After decoding with the Reed–Solomon decoder [39], the malicious path is screened. Error correction and error detection are performed, and abnormal data can be discarded directly; considering that the transmission of this kind of PDU session failed, at this time, the corresponding ci,j is set to 0 to exclude malicious data packets (The defense level against Byzantine attacks is determined during the PDU session establishment and will not be analyzed here).

When transmitting through multiple PDU sessions, we assume that the maximum block error rate and bandwidth guaranteed by GBR QoS [40] for a set of PDU sessions are the same. Based on the delay model described in Section 2, the relationship between packet delivery ratio and transmission delay is established as the cumulative function of the delay probability distribution, called the delay reliability function [30]. Based on end-to-end network monitoring, the delay reliability function is available:

FLERMST,γυj,g=i=12NLχij=1NLHjT,γjg (11)

We consider that NL is at least greater than 3, and the relationship between delay and transmission reliability is given by FLERMS, where

χi=1,ifΣj=1NLci,jγjγd0,otherwise (12)

gi will exclude failed transmissions (i.e., exclude the output of malicious PDU sessions) to ensure that only the correct output of successful decoding is included, and γd is the threshold to ensure successful decoding, with a typical value of 1.05. Hj is defined as

HjT,γjg=FjT,γjg,ifci,j=10,ifci,j=0 (13)

Among them, the product of Hj(T,γjg) for j=1,,NL appears in the form of a cumulative distribution function (CDF). In the default working mode, the completion of the last data transmission is regarded as the completion of the reliable transmission process.

4. Trade-Off Delay-Security for Variable Block-Length LERMS Strategy

4.1. The Markov Chain under LERMS Strategies Formulation

Based on the LERMS strategy, we uniformly sample data packets from multiple downlink service flows, and perform joint encoding and transmission. We probabilistically determine the sampling and transmission strategies of different service flows based on the current queue length, and transmit them on the edge network. Specifically, given the queue length ql[n], l=1,,L, we establish the conditional probability fQG,γ to determine the concatenated encoder coding block length gσ[t], sample from L flows, and distribution and transmission strategy γυj[t] of J paths for the given queue length ql[n].

fQG,γ=PG[t]=G,γυj[t]=γυj|Q[t]=Q (14)

We denote the packet sampling size and buffer queue length of L server flows as vectors G[t]=[g1[t],g2[t],,gL[t]]T and Q[t]=[q1[t],q2[t],,qL[t]]T, respectively. The transmission selection and distribution strategy are determined based on the current queue length Q[t]. We denote specific queue lengths and sample sizes by vectors Q and G.

Based on Equation (14), the strategy function of LERMS can be obtained:

S=fQG,γ:QZL,GNL,1γυ<NL,γj{0,1}. (15)

Here, the value space of Q and G are ZL and NL, respectively, obtained by taking the Cartesian product i=1LQ(qi) and i=1LG(gi). To ensure feasibility of the transmission strategies, we set the value of fQG,γ to 0 for all infeasible strategies G and γ. In other words, if a given combination of packet sampling sizes G and transmission strategies γ is infeasible, its corresponding probability value is forced to 0. To prevent the sender buffer from overflowing or underflowing, the system state ql evolves based on Equation (5). We assume a temporary steady-state condition where no PDU session is being established or released, i.e., QZ,GN(Q)γυjΓυNL(G)fQG,γ=1.

Under the LERMS strategy, we consider the transmission process of downlink server flow in the edge network as a Markov chain, where the queue length Q[t] is the state value of the system. By analyzing the steady-state distribution of the Markov chain, we further analyze how to trade off between latency and reliability. Based on the given strategy S, we first analyze the state transition probability of different queue lengths βQ,Q=P{ql[t+1]=ql|ql[t]=ql}, where Q and Q are the vectors of buffer queue lengths at two consecutive time slots. Specifically, the state transition probability βQ,Q can be expressed as

βQ,Q=GNL(Q)γυjΓυNL(G)fQG,γl=1Ln=0NλlnC{min{(qlgl)*+n=ql} (16)

where λln denotes the probability of n packet arrivals during single time slot for l-th flow. The value range of Q is ZL.

Using βQ,Q, we can determine the steady-state probability πS(Q) for different queue lengths, wherein Q belongs to ZL. We can then obtain the Markovian steady-state probability balance equation:

QZL(Q)βQ,QπS(Q)=πS(Q) (17)

where ZL(Q) is a subset of ZL, that contains all possible values of Q under S. The collection branch is expressed as ZL(Q)={QZL|qlglqlql+n,l}

4.2. Constrained Optimization Problem Construction

Based on the steady-state analysis of the state value Q within the edge network, we aim to construct a constrained optimization problem to balance the delay and reliability of multiple downlink flows transmission. Intuitively, joint encoding of multiple service flows’ Ps not only improves the coding efficiency but also enhances the security compared to a single service flow. However, it also increases the corresponding queuing delay. Therefore, based on the LERMS strategy, we propose a safe and reliable multi-path transmission encoder strategy. This strategy can effectively utilize the edge network transmission resources and improve the transmission efficiency while satisfying the constraints of reliability functions.

In the constrained optimization problem, we aim to minimize the weighted sum of queuing delays for multiple users while satisfying reliability and system bandwidth constraints. The queuing delay DμS is determined based on Little’s Law:

DμS=l=1LμlλlQZLqZqπS(Q)C{ql=q} (18)

The weight coefficients are represented as μ=[μ1,μ2,,μL]T, where μ adheres to the conditions of non-negativity and sums up to 1. We can further compute the reliability and bandwidth using the following equations:

RS=QZLGNL(Q)γυjΓυNL(G)FLERMS(gσ,γ)fQG,γπS(Q) (19)
WS=QZLGNL(Q)γυjΓυNL(G)WSj(gσ,γυj)fQG,γπS(Q) (20)

We define the optimization variable as xQG,γ=fQG,γπS(Q), the optimization problem can be formulated as follows:

min{xQG,γ}QZLGNL(Q)γυjΓυNL(G)Dμ(Q)xQG,γ (21a)
s.t.QZLGNL(Q)γυjΓυNL(G)FLERMS(gσ,γ)xQG,γrth (21b)
QZLGNL(Q)γυjΓυNL(G)WSj(gσ,γυj)xQG,γWjthQZL(Q)GNL(Q)γυjΓυNL(G)xQG,γl=1Lλlqlqlgl (21c)
=GNL(Q)γυjΓυNL(G)xQG,γ,QZL (21d)
QZLGNL(Q)γυjΓυNL(G)xQG,γ=1 (21e)
xQG,γ0,QZL,GNL,γυjΓυNL(G) (21f)

where Dμ(Q)=Σl=1Lμlλlql.

By solving the optimization problem in Equation (21), we can obtain the minimum average queuing delay under the constraints of reliability and system bandwidth in an untrusted network environment. This allows us to determine the optimal trade-off between latency and reliability. We define the optimal solution of Equation (21) as x*QG,γ, and we will use the optimal strategy S* to determine the steady-state probability πS*(Q):

πS*(Q)=GNL(Q)γυjΓυNL(G)x*QG,γ (22)

among them, we define the lerms optimal strategy as f*

f*QG,γ=x*QG,γπS*(Q)ifπS*(Q)>0C{g=gσQmax}ifπS*(Q)=0, (23)

where we define gσQmax=argmaxgNL. In summary, the optimal strategy S* obtained from the solution of the optimization problem can be used to determine the transmission strategy G[t] and γυj[t] based on the current system state Q[t] using the conditional probability {f*QG,γ:GNL(Q),γυjΓυNL(G)}.

4.3. Matrix-Based Solving Methods

Considering the exponential growth of the value range of the cache queue Q and transmission policy with the increase in the number of business flows L and the number of paths NL, this subsection proposes a matrix-based approach to obtain the optimal trade-off for untrusted MPEN transmission. Firstly, we rewrite the linear programming problem in Equation (21) and then, using the unified matrix constraints in Algorithm 2, algorithm complexity is O(L(Z·N+2)), and we automatically generate the LP problem and solve for the LERMS optimal strategy for downlink transmission of multiple service flows.

We represent the optimization variable xQG,γ as a column vector, denoted by x with an index corresponding to the optimization variable xQG,γ. The dimension of x is given by

l=1L(|Z||N||ΓυNL|)l1(|Γ|(|N|ql+gl)+γυj)+1 (24)

where |·| denotes the number of elements in the set. We can express Equation (21) in matrix form as follows:

Algorithm 2 Algorithm to constraints matrix for Equation (21).
  •  Input: 

    Number of server flows, L; Peak flow rate, NΛ; The upper bounds of g[t], B; Number of PDU sessions, NL; The probability distribution of Ps, λl=[λl0,λl1,,λlNΛ]T, l=1,,L. Reliability function F(gσ,γ).

  •  Output: 

    Reliability vector, R; PDU Session Aggregate Maximum Bit Rate vector W; Delay vector, Dμ; Matrix for constraints, M.

  • 1:

    gσ0, g˙σ1|Z|[0,1,,B]T, W0;                    ▹ Generate R, W.

  • 2:

    for l=1 to L do

  • 3:

       WW1|N|×|Z|;

  • 4:

       gσgσ1|g˙|+1|gσ|g˙σ;

  • 5:

    end for

  • 6:

    WW[0,1,,B]T, R0|gσ|1|Γ|;

  • 7:

    for{γυ_ij}, i=1 to 2NL do

  • 8:

       RR+F(gσ,γυ_ij)e|Γ|,i;

  • 9:

    end for

  • 10:

    Dμ0                        ▹Generate delay vector, Dμ.

  • 11:

    for l=1 to L do

  • 12:

       DlμLl+1λll+1[0,1,,Z]T1|N|;

  • 13:

       DμDμ1|Dl|+1|Dμ|Dl;

  • 14:

    end for

  • 15:

    DD1|Γ|;

  • 16:

    M˙1, M¨1, M˜1;                         ▹ Generate delay vector, M.

  • 17:

    for l=1 to L do

  • 18:

       for q=1 to Z do

  • 19:

         M˙l,q1|Z|,|N|, M¨l,q1|Z|,|N|;

  • 20:

         for all gN(q) do

  • 21:

            Ml,q,g0qg,NΛ+1;diag(11,NΛ+1);0ZNΛ+gq,NΛ+1;

  • 22:

            M˙l,q(:,g+1)Ml,q,gλL+1l;

  • 23:

            M¨l,q(:,g+1)Ml,q,gλNΛ+1;

  • 24:

         end for

  • 25:

         M˙l[M˙l,M˙l,q], M¨l[M˙l,M¨l,q];

  • 26:

       end for

  • 27:

       M˙(M˙M¨l)(M¨M˙l), M¨M¨M¨l;

  • 28:

       M˜M˜(diag([1|Z|]T)([1|N|]T))

  • 29:

    end for

  • 30:

    MM˙M˜

minx0DμTx (25a)
s.t.rTrth (25b)
WTWjthj{1,2,,NL} (25c)
Mx=0 (25d)
1Tx=1 (25e)

where 0 and 1 are zero and one vectors, respectively, fQG,γ is the joint encoding and transmission strategy for the given queue length Q, βQ,Q is the state transition probability for different queue lengths, πS(Q) is the steady-state probability for the given queue length Q, and μl is the weight coefficient for user l. Dl and Bl represent the queuing delay and bandwidth for user l, respectively. The maximum values of queuing delay and bandwidth are denoted as Dmax and Bmax, respectively. We define the following vectors: Object delay vector Dμ; Reliability vector, R; Bandwidth vector W. We also construct Equation (21d) by the matrix M.

By Algorithm 2, we can automatically obtain Equation (25), where we only need to determine Dμ, R, W and M. In Algorithm 2, as shown in lines 10 to 28, we generate the feature matrices for each server flow, namely Dμ, M¨, and M˜ for the l-th flow. We then construct the target matrix by the Kronecker product ⊗ of these matrices. We define 1k and 0k as column vectors containing all ones and all zeros, respectively, with k items. We also define the sampling vector en,k as an N-dimensional column vector, where the k-th item is 1. By applying Algorithm 2, we effectively transform Equation (21) as well as Equation (25) into an LP problem in matrix form, allowing us to solve for the optimal strategy for aggregated transmission of downlink multi-service flows in MPEN.

5. Numerical Results

In this section, we validate the effectiveness of the LERMS strategy in improving low-latency and highly reliable transmission capabilities in an untrusted edge network environment. To conduct the evaluation, we set up an experimental mobile network and analyze the performance of the proposed LERMS scheme. The core network of LERMS is implemented by enhancing the Free5GC platform [41]. The RCMEN core network is deployed on a laptop equipped with an I7-11800 processor and 16 GB of memory, while the UPF is deployed on a desktop computer with an I7-10700 processor and 32 GB of memory. We simulate the transmission of data by modifying the provided script in the Free5GC.

Firstly, in Figure 5a,b we consider the simulation test of the secure transmission capability of the double-layer encoder. Considering establishing six PDU sessions according to the same situation as described in Section 3.2.2, that is, NL = 6. We will randomly add malicious behavior, including transmission failure link(red), malicious tampering link(purple), eavesdropping link(yellow), i.e., (S,A,T)=(1,1,1). For the concatenated encoder scheme encoding, we use the Reed–Solomon decoder to receive the P¯c. To decode, we will identify the decoding result, which can solve the Ps as recognition success, that is, we do not consider the potential safety hazards of Byzantine attackers and eavesdroppers, which is directly regarded as a system capability in the PDU session establishment phase. There is no need to pass the experimental analysis; as shown in Figure 5a, our encoding strategy can provide reliable transmission capabilities in an untrusted network environment. The system has (S,A,T)=(1,1,1) protection capability. As can be seen in Figure 5b, we conducted further tests to evaluate the maximum safety capability. We found that excluding malicious attacks, the maximum capability to recover Ps is (2,0,2). However, as malicious attacks can tamper with data packets, and every tampering of a data packet requires two more data packets for error correction. Thus, in the check matrix, we found that in the time slot corresponding to red, the number of malicious tampering and transmission failures exceeds the range defined by Equation (6). Therefore, it is not possible to provide transmission capability in an untrusted transmission network with NL=6.

Figure 5.

Figure 5

Untrusted edge network with concatenated encoder check results. In the malicious behaviors matrix: link failures are represented in red, malicious tampering in purple, and eavesdropping in yellow.

We analyze the effectiveness of the SOMD-JE strategy, with the aim of coding and ensuring transmission efficiency as well as data encoding security and CMT. The shortest coding block length of Ps is set to 100, and we assume that the arrival probabilities of data packets of different service flows i.i.d, as shown in Figure 6b, while the relationship between the number of aggregated service flows and the probability of padding occurrence is given in Figure 6a. It can be seen that with small Λ¯, the padding probability is high, and the transmission efficiency of the edge network is low at this time. As the number of aggregated flows L increases, P decreases. Therefore, aggregated data flows can significantly reduce the padding probability P; therefore, joint encoding improves transmission efficiency.

Figure 6.

Figure 6

Effectiveness test of SOME-JE strategy to improve LERMS transmission efficiency. (a) Relationship between aggregation number L and padding probability P. (b) Simulation parameter settings.

The LERMS strategy is designed to achieve an optimal trade-off between the average queuing delay, available bandwidth, and reliability, with εj set to 0.1 for all sessions, resulting in an upper limit of reliability of 1(0.1)6=0.999999. As shown in Figure 7, the resulting trade-off curve between latency and reliability is a segmented broken line that matches our theoretical analysis. Figure 7a demonstrates that as the reliability value FLERMS increases, the required queuing delay DμS also increases. Moreover, higher available bandwidth Wth can lead to lower queuing delays DμS at a given reliability level r. Figure 7b shows that a higher reliability threshold rth requires a higher average queuing delay DμS. These results illustrate the effectiveness of our LERMS strategy in achieving the optimal trade-off between delay and reliability.

Figure 7.

Figure 7

Optimal delay–reliability trade-off curves.

6. Conclusions and Future Directions

In this paper, we propose a low-latency and highly reliable transmission service for downlink traffic subscribed to edge services in untrusted edge network environments. To address potential failures, malicious tampering, and eavesdropping in the edge network, we introduce an encoder based on Lagrangian interpolation and Raptor double-layer cascading to fully utilize the multipath transmission resources of the edge network and provide secure CMT capabilities. Additionally, we design a variable block length encoding strategy that considers the accumulation of randomly arriving data packets at the sending end and selects an appropriate encoding block length based on queue length state information. We model this decision-making process as a Markov chain and obtain the optimal delay–reliability trade-off through matrix operation methods.

Effective communication and computing management is critical in the context of edge networks, where data is strongly related to the server flow. Currently, CMT is the primary focus, but it is essential to integrate distributed transmission and computing to meet the core requirements of edge networks. By distributing service flows based on computing requirements, we can enable the edge network to be more responsive to the service flow. This approach further enhances the core computing requirements of the edge network for corresponding scenarios, eliminates the single-point vulnerability of central cloud computing, and provides elastic edge network transmission and computing services. Our future research directions include exploring the integration of transmission and computing, multi-session transmission, and multi-DN computing in the edge network.

Acknowledgments

We would like to thank the editors and the anonymous reviewers for their efforts.

Appendix A. Multiple PDU Sessions Transmission Procedure for Aggregation Data of Downlink Multi-Service Flow

In the scenario of multiple-device single-owners service flow aggregation transmission, we propose a procedure to support data aggregation over multiple PDU sessions. This is in addition to the existing physical isolation multi-PDU session establishment [27]. Currently, the core network does not support the joint transmission of multiple service flows. In this context, we propose the use of multi-PDU sessions to transmit the downlink data flow of edge computing services. This supports the transmission of aggregated traffic streams through physically isolated PDU sessions on a per-session basis.

  • 1.

    The DN initiates the PDU session establishment request by sending a PDU Session Establishment Request message, which includes the requested DNN (identifier of the data flow from the core network to the UE), PDU session type, etc. The proposed procedure establishes a group of physically isolated multi-PDU sessions and assigns a session ID to this group of PDU sessions.

  • 2.

    All devices within the same aggregated service flow must be assigned the same session ID.

  • 3.

    Anchor UPF-A can identify the aggregated service flow through a specific session ID, facilitating unified management within the core network.

  • 4.

    The local DN (MEC nodes) must perform the operation of inserting tags. Before the service flow is aggregated, the data owner is identified by adding a unique tag to the data packet.

  • 5.

    After the device receives the aggregated data packet and completes decoding, it distinguishes the data according to the tag and extracts the data it needs. The rest of the data can be used to verified untrusted paths or discarded directly.

Author Contributions

Z.G.: Conceptualization, methodology, software, writing—original draft; X.J.: Formal analysis, project administration, supervision; W.Y.: Supervision, visualization; M.X.: Formal analysis, writing—review and editing; Y.Z.: Project administration; D.Z.: Supervision; Z.C.: Supervision; L.W.: Supervision; All authors have read and agreed to the published version of the manuscript.

Data Availability Statement

The 5G Core Network that support this study are available from https://github.com/free5gc/free5gc (accessed on 1 February 2021).

Conflicts of Interest

The authors declare no conflict of interest.

Funding Statement

Project supported by the National Key Research and Development Program of China (Nos. 2020YFB1806607 and 2022YFB2902204).

Footnotes

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

References

  • 1.Technical Specification (TS) 23.501. 3GPP; Antibes, France: 2022. version 17.6.0. System Architecture for the 5G System (5GS) [Google Scholar]
  • 2.Wu H., Xiang Z., Nguyen G.T., Shen Y., Fitzek F.H. Computing meets network: Coin-aware offloading for data-intensive blind source separation. IEEE Netw. 2021;35:21–27. doi: 10.1109/MNET.011.2100060. [DOI] [Google Scholar]
  • 3.Feng L., Li W., Lin Y., Zhu L., Guo S., Zhen Z. Joint computation offloading and URLLC resource allocation for collaborative MEC assisted cellular-V2X networks. IEEE Access. 2020;8:24914–24926. doi: 10.1109/ACCESS.2020.2970750. [DOI] [Google Scholar]
  • 4.Zhan K. Sports and health big data system based on 5G network and Internet of Things system. Microprocess. Microsyst. 2021;80:103363. doi: 10.1016/j.micpro.2020.103363. [DOI] [Google Scholar]
  • 5.Javed A.R., Shahzad F., ur Rehman S., Zikria Y.B., Razzak I., Jalil Z., Xu G. Future smart cities requirements, emerging technologies, applications, challenges, and future aspects. Cities. 2022;129:103794. doi: 10.1016/j.cities.2022.103794. [DOI] [Google Scholar]
  • 6.Adhikari M., Hazra A. 6G-enabled ultra-reliable low-latency communication in edge networks. IEEE Commun. Stand. Mag. 2022;6:67–74. doi: 10.1109/MCOMSTD.0001.2100098. [DOI] [Google Scholar]
  • 7.Ranaweera P., Jurcut A., Liyanage M. MEC-enabled 5G use cases: A survey on security vulnerabilities and countermeasures. ACM Comput. Surv. (CSUR) 2021;54:1–37. doi: 10.1145/3474552. [DOI] [Google Scholar]
  • 8.Tian W., Wang G. State estimation in mobile edge computing with unreliable communications. IEEE Commun. Lett. 2020;25:1149–1152. doi: 10.1109/LCOMM.2020.3047882. [DOI] [Google Scholar]
  • 9.Technical Report (TR) 21.917. 3GPP; Antibes, France: 2023. version 17.0.1. Summary of Rel-17 Work Items. [Google Scholar]
  • 10.Deng C., Liu D., Yektakhah B., Sarabandi K. Series-fed beam-steerable millimeter-wave antenna design with wide spatial coverage for 5G mobile terminals. IEEE Trans. Antennas Propag. 2020;68:3366–3376. doi: 10.1109/TAP.2019.2963583. [DOI] [Google Scholar]
  • 11.Khan B.S., Jangsher S., Ahmed A., Al-Dweik A. URLLC and eMBB in 5G Industrial IoT: A survey. IEEE Open J. Commun. Soc. 2022;3:1134–1163. doi: 10.1109/OJCOMS.2022.3189013. [DOI] [Google Scholar]
  • 12.Hui H., Ding Y., Shi Q., Li F., Song Y., Yan J. 5G network-based Internet of Things for demand response in smart grid: A survey on application potential. Appl. Energy. 2020;257:113972. doi: 10.1016/j.apenergy.2019.113972. [DOI] [Google Scholar]
  • 13.Abd EL-Latif A.A., Abd-El-Atty B., Venegas-Andraca S.E., Mazurczyk W. Efficient quantum-based security protocols for information sharing and data protection in 5G networks. Future Gener. Comput. Syst. 2019;100:893–906. doi: 10.1016/j.future.2019.05.053. [DOI] [Google Scholar]
  • 14.Wu Y., Duong T.Q., Swindlehurst A.L. Safeguarding 5G-and-beyond networks with physical layer security. IEEE Wirel. Commun. 2019;26:4–5. doi: 10.1109/MWC.2019.8883122. [DOI] [Google Scholar]
  • 15.Kim H. 5G core network security issues and attack classification from network protocol perspective. J. Internet Serv. Inf. Secur. 2020;10:1–15. [Google Scholar]
  • 16.Fang L., Zhao B., Li Y., Liu Z., Ge C., Meng W. Countermeasure based on smart contracts and AI against DoS/DDoS attack in 5G circumstances. IEEE Netw. 2020;34:54–61. doi: 10.1109/MNET.021.1900614. [DOI] [Google Scholar]
  • 17.Yoshizawa T., Baskaran S.B.M., Kunz A. Overview of 5g urllc system and security aspects in 3gpp; Proceedings of the 2019 IEEE Conference on Standards for Communications and Networking (CSCN); Granada, Spain. 28–30 October 2019; pp. 1–5. [Google Scholar]
  • 18.Chen R., Li C., Yan S., Malaney R., Yuan J. Physical layer security for ultra-reliable and low-latency communications. IEEE Wirel. Commun. 2019;26:6–11. doi: 10.1109/MWC.001.1900051. [DOI] [Google Scholar]
  • 19.Shrivastava V.K., Baek S., Baek Y. 5G evolution for multicast and broadcast services in 3GPP release 17. IEEE Commun. Stand. Mag. 2022;6:70–76. doi: 10.1109/MCOMSTD.0001.2100068. [DOI] [Google Scholar]
  • 20.Zhang S., Wang Y., Zhou W. Towards secure 5G networks: A Survey. Comput. Netw. 2019;162:106871. doi: 10.1016/j.comnet.2019.106871. [DOI] [Google Scholar]
  • 21.Park S., Cho H., Park Y., Choi B., Kim D., Yim K. Security problems of 5G voice communication; Proceedings of the Information Security Applications: 21st International Conference, WISA 2020; Jeju Island, Republic of Korea. 26–28 August 2020; Berlin/Heidelberg, Germany: Springer; 2020. pp. 403–415. Revised Selected Papers 21. [Google Scholar]
  • 22.Zhang J., Yang L., Cao W., Wang Q. Formal analysis of 5G EAP-TLS authentication protocol using proverif. IEEE Access. 2020;8:23674–23688. doi: 10.1109/ACCESS.2020.2969474. [DOI] [Google Scholar]
  • 23.Shamir A. How to share a secret. Commun. ACM. 1979;22:612–613. doi: 10.1145/359168.359176. [DOI] [Google Scholar]
  • 24.Chen H., Abbas R., Cheng P., Shirvanimoghaddam M., Hardjawana W., Bao W., Li Y., Vucetic B. Ultra-reliable low latency cellular networks: Use cases, challenges and approaches. IEEE Commun. Mag. 2018;56:119–125. doi: 10.1109/MCOM.2018.1701178. [DOI] [Google Scholar]
  • 25.Arianpoo N., Aydin I., Leung V.C. Network coding as a performance booster for concurrent multi-path transfer of data in multi-hop wireless networks. IEEE Trans. Mob. Comput. 2016;16:1047–1058. [Google Scholar]
  • 26.Ha J., Choi Y.I. Support of a multi-access session in 5g mobile network; Proceedings of the 2019 25th Asia-Pacific Conference on Communications (APCC); Ho Chi Minh City, Vietnam. 6–8 November 2019; pp. 378–383. [Google Scholar]
  • 27.Guo Z., Ji X., You W., Xu M., Zhao Y., Cheng Z., Zhou D. Delay optimal for reliability-guaranteed concurrent transmissions with raptor code in multi-access 6G edge network. Comput. Netw. 2023;228:109716. doi: 10.1016/j.comnet.2023.109716. [DOI] [Google Scholar]
  • 28.Yu Q., Li S., Raviv N., Kalan S.M.M., Soltanolkotabi M., Avestimehr S.A. Lagrange coded computing: Optimal design for resiliency, security, and privacy; Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics, PMLR; Naha, Japan. 16–18 April 2019; pp. 1215–1225. [Google Scholar]
  • 29.Abbas R., Shirvanimoghaddam M., Huang T., Li Y., Vucetic B. Novel design for short analog fountain codes. IEEE Commun. Lett. 2019;23:1306–1309. doi: 10.1109/LCOMM.2019.2910517. [DOI] [Google Scholar]
  • 30.Ström E.G., Popovski P., Sachs J. 5G ultra-reliable vehicular communication. arXiv. 20151510.01288 [Google Scholar]
  • 31.Zhao Y., Wang Q., Qi X., Feng L., Gao J., Yu P. Research on 5G Multipath Concurrent Transmission System and End to End Delay Measurement; Proceedings of the 11th International Conference on Computer Engineering and Networks; Dalian, China. 21–22 October 2023. [Google Scholar]
  • 32.Wang M., Liu J., Chen W., Ephremides A. Joint queue-aware and channel-aware delay optimal scheduling of arbitrarily bursty traffic over multi-state time-varying channels. IEEE Trans. Commun. 2018;67:503–517. doi: 10.1109/TCOMM.2018.2875119. [DOI] [Google Scholar]
  • 33.Stavrou E., Pitsillides A. A survey on secure multipath routing protocols in WSNs. Comput. Netw. 2010;54:2215–2238. doi: 10.1016/j.comnet.2010.02.015. [DOI] [Google Scholar]
  • 34.Dhelim S., Aung N., Kechadi M.T., Ning H., Chen L., Lakas A. Trust2Vec: Large-scale IoT trust management system based on signed network embeddings. IEEE Internet Things J. 2022;10:553–562. doi: 10.1109/JIOT.2022.3201772. [DOI] [Google Scholar]
  • 35.Beimel A. Secret-sharing schemes: A survey; Proceedings of the Coding and Cryptology: Third International Workshop, IWCC 2011; Qingdao, China. 30 May–3 June 2011; Berlin/Heidelberg, Germany: Springer; 2011. pp. 11–46. Proceedings 3. [Google Scholar]
  • 36.Zhang P., Pang X., Kumar N., Aujla G.S., Cao H. A reliable data-transmission mechanism using blockchain in edge computing scenarios. IEEE Internet Things J. 2020;9:14228–14236. doi: 10.1109/JIOT.2020.3021457. [DOI] [Google Scholar]
  • 37.Luby M. LT codes; Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science; Vancouver, BC, Canada. 19 November 2002; p. 271. [Google Scholar]
  • 38.Technical Specification (TS) 29.244. 3GPP; Antibes, France: 2022. version 18.0.1. Interface between the Control Plane and the User Plane Nodes. [Google Scholar]
  • 39.Halbawi W., Azizan N., Salehi F., Hassibi B. Improving distributed gradient descent using reed-solomon codes; Proceedings of the 2018 IEEE International Symposium on Information Theory (ISIT); Vail, CO, USA. 17–22 June 2018; pp. 2027–2031. [Google Scholar]
  • 40.Mannweiler C., Gajic B., Rost P., Ganesan R.S., Markwart C., Halfmann R., Gebert J., Wich A. Reliable and deterministic mobile communications for industry 4.0: Key challenges and solutions for the integration of the 3GPP 5G system with IEEE; Proceedings of the Mobile Communication-Technologies and Applications; Osnabrueck, Germany. 15–16 May 2019; pp. 1–6. 24. ITG–Symposium. VDE. [Google Scholar]
  • 41.jay16213, free5gc-org, turtle11311. free5GC. 2022. [(accessed on 3 May 2023)]. Available online: https://github.com/free5gc/free5gc.

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

The 5G Core Network that support this study are available from https://github.com/free5gc/free5gc (accessed on 1 February 2021).


Articles from Entropy are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES