Protecting Physical Communications in 5G C-RAN Architectures through Resonant Mechanisms in Optical Media

Future 5G networks are characterized by three basic ideas: enhanced mobile broadband communications, massive machine-type communications, and ultra-low-latency communications. Any of these requirements needs, to be fulfilled, the implementation of high-efficiency technologies at all levels. This includes some of the costliest mechanisms in terms of computational time and bitrate: information protection solutions. Typical techniques in this area employ complex algorithms and large protocol headers, which strongly reduces the effective baud rate and latency of future 5G networks and communications. This is especially relevant in the access network, which in 5G networks will follow a cloud-based architecture, where thousands of different devices must communicate, before aggregating all those streams to be sent to the backbone. Then, new and more efficient mechanisms are needed in the cloud radio access networks (C-RAN) for future 5G systems. Therefore, in this paper it is proposed a novel information protection scheme for C-RAN architectures based on resonant phenomena in optical fibers communicating the fronthaul and backhaul in 5G networks. Resonant structures and physical nonlinearities generate a chaotic signal which may encrypt and hide at physical level every communication stream in a very efficient manner. To evaluate the proposed mechanism, an experimental validation based on simulation techniques is also described and results discussed.

[1]  Hu Jinling TD-SCDMA/TD-LTE evolution — Go Green , 2010, 2010 IEEE International Conference on Communication Systems.

[2]  Preecha P. Yupapin,et al.  Chaotic signal generation and cancellation using a micro ring resonator incorporating an optical add/drop multiplexer , 2007 .

[3]  Heidrun Grob-Lipski,et al.  Multiplexing gains achieved in pools of baseband computation units in 4G cellular networks , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[4]  Andreas Kunz,et al.  Overview of 5G security in 3GPP , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).

[5]  Xiqi Gao,et al.  A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.

[6]  Shantanu Sharma,et al.  A survey on 5G: The next generation of mobile communication , 2015, Phys. Commun..

[7]  Samee Ullah Khan,et al.  Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .

[8]  Christian Lanzani,et al.  Advanced multimode radio for wireless & mobile broadband communication , 2009, 2009 European Wireless Technology Conference.

[9]  Antti Toskala,et al.  LTE Advanced: 3GPP Solution for IMT-Advanced , 2012 .

[10]  Rose Qingyang Hu,et al.  Security for 5G Mobile Wireless Networks , 2018, IEEE Access.

[11]  Jemal H. Abawajy,et al.  Detecting and Mitigating HX-DoS Attacks against Cloud Web Services , 2012, 2012 15th International Conference on Network-Based Information Systems.

[12]  Tanesh Kumar,et al.  Overview of 5G Security Challenges and Solutions , 2018, IEEE Communications Standards Magazine.

[13]  Donatella Darsena,et al.  Cloud-Aided Cognitive Ambient Backscatter Wireless Sensor Networks , 2019, IEEE Access.

[14]  Xianbin Wang,et al.  Authentication handover and privacy protection in 5G hetnets using software-defined networking , 2015, IEEE Communications Magazine.

[15]  K. Ikeda,et al.  Optical Turbulence: Chaotic Behavior of Transmitted Light from a Ring Cavity , 1980 .

[16]  Su Hu,et al.  Physical Layer Security in 5G Based Large Scale Social Networks: Opportunities and Challenges , 2018, IEEE Access.

[17]  Borja Bordel,et al.  An Intra-slice Chaotic-Based Security Solution for Privacy Preservation in Future 5G Systems , 2018, WorldCIST.

[18]  Donatella Darsena,et al.  Design and Performance Analysis of Channel Estimators Under Pilot Spoofing Attacks in Multiple-Antenna Systems , 2020, IEEE Transactions on Information Forensics and Security.

[19]  Carsten Bockelmann,et al.  Massive machine-type communications in 5g: physical and MAC-layer solutions , 2016, IEEE Communications Magazine.

[20]  Kai-Kit Wong,et al.  Secrecy and Energy Efficiency in Massive MIMO Aided Heterogeneous C-RAN: A New Look at Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.

[21]  K. Alan Shore,et al.  Physics and applications of laser diode chaos , 2015 .

[22]  Kwang-Cheng Chen,et al.  Collaborative radio access of heterogeneous cloud radio access networks and edge computing networks , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).

[23]  Wenbo Wang,et al.  Physical layer security strategies for downlink heterogeneous cloud radio access networks , 2014 .

[24]  Borja Bordel,et al.  Physical Unclonable Functions based on silicon micro-ring resonators for secure signature delegation in Wireless Sensor Networks , 2018, J. Internet Serv. Inf. Secur..

[25]  Philip Levis,et al.  OpenRadio: a programmable wireless dataplane , 2012, HotSDN '12.

[26]  E. Snitzer Optical fiber telecommunications , 1982, IEEE Journal of Quantum Electronics.

[27]  SharmaShantanu,et al.  A survey on 5G , 2016 .

[28]  Diego Sánchez de Rivera,et al.  Using 5G Technologies in the Internet of Things Handovers, Problems and Challenges , 2015, 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[29]  Qing Wang,et al.  Wireless network cloud: Architecture and system requirements , 2010, IBM J. Res. Dev..

[30]  Gilberto Berardinelli,et al.  Achieving Ultra-Reliable Low-Latency Communications: Challenges and Envisioned System Enhancements , 2018, IEEE Network.

[31]  Andrei V. Gurtov,et al.  Enabling Secure Mobility with OpenFlow , 2013, 2013 IEEE SDN for Future Networks and Services (SDN4FNS).

[32]  Chongshan Ran,et al.  Security XACML access control model based on SOAP encapsulate , 2011, 2011 International Conference on Computer Science and Service System (CSSS).

[33]  Tanesh Kumar,et al.  5G security: Analysis of threats and solutions , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).

[34]  Aleksandra Checko,et al.  Optimizing small cell deployment by the use of C-RANs , 2014 .

[35]  Kai Ying,et al.  Coexistence of enhanced mobile broadband communications and ultra-reliable low-latency communications in mobile front-haul , 2018, OPTO.

[36]  Umberto Spagnolini,et al.  Cooperation and Cognitive Radio , 2007, 2007 IEEE International Conference on Communications.

[37]  Kai Yang Interference management in LTE wireless networks [Industry Perspectives] , 2012, IEEE Wireless Communications.

[38]  Felix Klaedtke,et al.  A Security Architecture for 5G Networks , 2018, IEEE Access.

[39]  Hong Wen,et al.  5G security architecture and light weight security authentication , 2015, 2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC).

[40]  Borja Bordel,et al.  Virtualization-Based Techniques for the Design, Management and Implementation of Future 5G Systems with Network Slicing , 2018, WorldCIST.

[41]  Michael S. Berger,et al.  Cloud RAN for Mobile Networks—A Technology Overview , 2015, IEEE Communications Surveys & Tutorials.

[42]  Alexandros Kaloxylos,et al.  5G Radio Access Network Architecture: Design Guidelines and Key Considerations , 2016, IEEE Communications Magazine.

[43]  Sampath Rangarajan,et al.  The case for re-configurable backhaul in cloud-RAN based small cell networks , 2013, 2013 Proceedings IEEE INFOCOM.

[44]  R. Moussu,et al.  Sur le théorème de Poincaré-Bendixson , 1974 .

[45]  Hugo Thienpont,et al.  Deterministic polarization chaos from a laser diode , 2012, Nature Photonics.

[46]  Elaine Wong,et al.  5G C-RAN With Optical Fronthaul: An Analysis From a Deployment Perspective , 2018, Journal of Lightwave Technology.

[47]  Ke Xiao,et al.  Opportunistic Multicast NOMA with Security Concerns in a 5G Massive MIMO System , 2018, IEEE Communications Magazine.

[48]  Mohsen Guizani,et al.  5G wireless backhaul networks: challenges and research advances , 2014, IEEE Network.

[49]  R. M. A. P. Rajatheva,et al.  Channel coding for enhanced mobile broadband communication in 5G systems , 2017, 2017 European Conference on Networks and Communications (EuCNC).

[50]  Ramona Trestian,et al.  5G RADIO ACCESS NETWORKS: CENTRALIZED RAN, CLOUD-RAN AND VIRTUALIZATION OF SMALL CELLS , 2019 .

[51]  Wei Yu,et al.  Cloud Radio Access Networks: Principles, Technologies, and Applications , 2016 .

[52]  Andrei V. Gurtov,et al.  SDN Based Inter-Technology Load Balancing Leveraged by Flow Admission Control , 2013, 2013 IEEE SDN for Future Networks and Services (SDN4FNS).

[53]  Ning Wang,et al.  Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities , 2019, IEEE Internet of Things Journal.

[54]  Borja Bordel,et al.  An Intra-Slice Security Solution for Emerging 5G Networks Based on Pseudo-Random Number Generators , 2018, IEEE Access.

[55]  Peng Zhang,et al.  A Survey on C-RAN Security , 2017, IEEE Access.

[56]  Troels E. Kolding,et al.  Cloud RAN challenges and solutions , 2017, Ann. des Télécommunications.

[57]  Yonggang Wen,et al.  Cloud radio access network (C-RAN): a primer , 2015, IEEE Network.

[58]  Borja Bordel,et al.  Service management in virtualization-based architectures for 5G systems with network slicing , 2020, Integr. Comput. Aided Eng..

[59]  Borja Bordel,et al.  Stochastic and Information Theory Techniques to Reduce Large Datasets and Detect Cyberattacks in Ambient Intelligence Environments , 2018, IEEE Access.

[60]  Ramón Alcarria,et al.  Protecting Private Communications in Cyber-Physical Systems through Physical Unclonable Functions , 2019, Electronics.

[61]  Olav Tirkkonen,et al.  NB-IoT Technology Overview and Experience from Cloud-RAN Implementation , 2017, IEEE Wireless Communications.

[62]  R. Poy,et al.  Optical communication with chaotic waveforms , 1999, 1999 IEEE LEOS Annual Meeting Conference Proceedings. LEOS'99. 12th Annual Meeting. IEEE Lasers and Electro-Optics Society 1999 Annual Meeting (Cat. No.99CH37009).

[63]  Shlomo Shamai,et al.  Fronthaul quantization as artificial noise for enhanced secret communication in C-RAN , 2017, 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[64]  Borja Bordel,et al.  Improving the Complexity of the Lorenz Dynamics , 2017, Complex..