Conference paper Open Access

AI-driven Zero-touch Operations, Security and Trust in Multi-operator 5G Networks: a Conceptual Architecture

Carrozzo, Gino; Siddiqui, Shuaib; Betzler, August; Bonnet, Josep; Martinez Perez, Gregorio; Ramos, Aurora; Subramanya, Tejas


DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd">
  <identifier identifierType="URL">https://zenodo.org/record/4244063</identifier>
  <creators>
    <creator>
      <creatorName>Carrozzo, Gino</creatorName>
      <givenName>Gino</givenName>
      <familyName>Carrozzo</familyName>
      <affiliation>Nextworks</affiliation>
    </creator>
    <creator>
      <creatorName>Siddiqui, Shuaib</creatorName>
      <givenName>Shuaib</givenName>
      <familyName>Siddiqui</familyName>
      <affiliation>i2cat</affiliation>
    </creator>
    <creator>
      <creatorName>Betzler, August</creatorName>
      <givenName>August</givenName>
      <familyName>Betzler</familyName>
      <affiliation>i2cat</affiliation>
    </creator>
    <creator>
      <creatorName>Bonnet, Josep</creatorName>
      <givenName>Josep</givenName>
      <familyName>Bonnet</familyName>
      <affiliation>Altice Labs</affiliation>
    </creator>
    <creator>
      <creatorName>Martinez Perez, Gregorio</creatorName>
      <givenName>Gregorio</givenName>
      <familyName>Martinez Perez</familyName>
      <affiliation>Univ.Murcia</affiliation>
    </creator>
    <creator>
      <creatorName>Ramos, Aurora</creatorName>
      <givenName>Aurora</givenName>
      <familyName>Ramos</familyName>
      <affiliation>ATOS</affiliation>
    </creator>
    <creator>
      <creatorName>Subramanya, Tejas</creatorName>
      <givenName>Tejas</givenName>
      <familyName>Subramanya</familyName>
      <affiliation>Foundazione Bruno Kessler</affiliation>
    </creator>
  </creators>
  <titles>
    <title>AI-driven Zero-touch Operations, Security and Trust in Multi-operator 5G Networks: a Conceptual Architecture</title>
  </titles>
  <publisher>Zenodo</publisher>
  <publicationYear>2020</publicationYear>
  <subjects>
    <subject>5G</subject>
    <subject>Zero Touch Automation</subject>
    <subject>Spectrum Sharing</subject>
    <subject>Artificial Intelligence, Distributed Ledger Technologies</subject>
  </subjects>
  <dates>
    <date dateType="Issued">2020-11-04</date>
  </dates>
  <language>en</language>
  <resourceType resourceTypeGeneral="ConferencePaper"/>
  <alternateIdentifiers>
    <alternateIdentifier alternateIdentifierType="url">https://zenodo.org/record/4244063</alternateIdentifier>
  </alternateIdentifiers>
  <relatedIdentifiers>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsIdenticalTo">10.1109/EuCNC48522.2020.9200928</relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="URL" relationType="IsPartOf">https://zenodo.org/communities/5gzorro-h2020</relatedIdentifier>
  </relatedIdentifiers>
  <rightsList>
    <rights rightsURI="https://creativecommons.org/licenses/by/4.0/legalcode">Creative Commons Attribution 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
  </rightsList>
  <descriptions>
    <description descriptionType="Abstract">&lt;p&gt;The 5G network solutions currently standardised and deployed do not yet enable the full potential of pervasive networking and computing envisioned in 5G initial visions: network services and slices with different QoS profiles do not span multiple operators; security, trust and automation is limited. The evolution of 5G towards a truly production-level stage needs to heavily rely on automated end-to-end network operations, use of distributed Artificial Intelligence (AI) for cognitive network orchestration and management and minimal manual interventions (zero-touch automation). All these elements are key to implement highly pervasive network infrastructures. Moreover, Distributed Ledger Technologies (DLT) can be adopted to implement distributed security and trust&lt;br&gt;
through Smart Contracts among multiple non-trusted parties. In this paper, we propose an initial concept of a zero-touch&lt;br&gt;
security and trust architecture for ubiquitous computing and connectivity in 5G networks. Our architecture aims at crossdomain&lt;br&gt;
security &amp;amp; trust orchestration mechanisms by coupling DLTs with AI-driven operations and service lifecycle automation in multi-tenant and multi-stakeholder environments. Three representative use cases are identified through which we will&lt;br&gt;
validate the work which will be validated in the test facilities at 5GBarcelona and 5TONIC/Madrid.&lt;/p&gt;</description>
  </descriptions>
  <fundingReferences>
    <fundingReference>
      <funderName>European Commission</funderName>
      <funderIdentifier funderIdentifierType="Crossref Funder ID">10.13039/501100000780</funderIdentifier>
      <awardNumber awardURI="info:eu-repo/grantAgreement/EC/H2020/871533/">871533</awardNumber>
      <awardTitle>Zero-touch security and trust for ubiquitous computing and connectivity in 5G networks.</awardTitle>
    </fundingReference>
  </fundingReferences>
</resource>
209
237
views
downloads
Views 209
Downloads 237
Data volume 166.7 MB
Unique views 184
Unique downloads 225

Share

Cite as