We gratefully acknowledge support from
the Simons Foundation and member institutions.

Networking and Internet Architecture

New submissions

[ total of 4 entries: 1-4 ]
[ showing up to 2000 entries per page: fewer | more ]

New submissions for Mon, 13 May 24

[1]  arXiv:2405.06507 [pdf, other]
Title: EcoEdgeTwin: Enhanced 6G Network via Mobile Edge Computing and Digital Twin Integration
Subjects: Networking and Internet Architecture (cs.NI)

In the 6G era, integrating Mobile Edge Computing (MEC) and Digital Twin (DT) technologies presents a transformative approach to enhance network performance through predictive, adaptive control for energy-efficient, low-latency communication. This paper presents the EcoEdgeTwin model, an innovative framework that harnesses the synergy between MEC and DT technologies to ensure efficient network operation. We optimize the utility function within the EcoEdgeTwin model to balance enhancing users' Quality of Experience (QoE) and minimizing latency and energy consumption at edge servers. This approach ensures efficient and adaptable network operations, utilizing DT to synchronize and integrate real-time data seamlessly.
Our framework achieves this by implementing robust mechanisms for task offloading, service caching, and cost-effective service migration. Additionally, it manages energy consumption related to task processing, communication, and the influence of DT predictions, all essential for optimizing latency and minimizing energy usage.
Through the utility model, we also prioritize QoE, fostering a user-centric approach to network management that balances network efficiency with user satisfaction. A cornerstone of our approach is integrating the advantage actor-critic algorithm, marking a pioneering use of deep reinforcement learning for dynamic network management. This strategy addresses challenges in service mobility and network variability, ensuring optimal network performance matrices. Our extensive simulations demonstrate that compared to benchmark models lacking DT integration, EcoEdgeTwin framework significantly reduces energy usage and latency while enhancing QoE.

Cross-lists for Mon, 13 May 24

[2]  arXiv:2405.06074 (cross-list from cs.CR) [pdf, other]
Title: Protocols to Code: Formal Verification of a Next-Generation Internet Router
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Programming Languages (cs.PL)

We present the first formally-verified Internet router, which is part of the SCION Internet architecture. SCION routers run a cryptographic protocol for secure packet forwarding in an adversarial environment. We verify both the protocol's network-wide security properties and low-level properties of its implementation. More precisely, we develop a series of protocol models by refinement in Isabelle/HOL and we use an automated program verifier to prove that the router's Go code satisfies memory safety, crash freedom, freedom from data races, and adheres to the protocol model. Both verification efforts are soundly linked together. Our work demonstrates the feasibility of coherently verifying a critical network component from high-level protocol models down to performance-optimized production code, developed by an independent team. In the process, we uncovered critical bugs in both the protocol and its implementation, which were confirmed by the code developers, and we strengthened the protocol's security properties. This paper explains our approach, summarizes the main results, and distills lessons for the design and implementation of verifiable systems, for the handling of continuous changes, and for the verification techniques and tools employed.

[3]  arXiv:2405.06126 (cross-list from quant-ph) [pdf, other]
Title: Quantum Secure Anonymous Communication Networks
Comments: Accepted for publication in QCNC2024
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)

Anonymous communication networks (ACNs) enable Internet browsing in a way that prevents the accessed content from being traced back to the user. This allows a high level of privacy, protecting individuals from being tracked by advertisers or governments, for example. The Tor network, a prominent example of such a network, uses a layered encryption scheme to encapsulate data packets, using Tor nodes to obscure the routing process before the packets enter the public Internet. While Tor is capable of providing substantial privacy, its encryption relies on schemes, such as RSA and Diffie-Hellman for distributing symmetric keys, which are vulnerable to quantum computing attacks and are currently in the process of being phased out.
To overcome the threat, we propose a quantum-resistant alternative to RSA and Diffie-Hellman for distributing symmetric keys, namely, quantum key distribution (QKD). Standard QKD networks depend on trusted nodes to relay keys across long distances, however, reliance on trusted nodes in the quantum network does not meet the criteria necessary for establishing a Tor circuit in the ACN. We address this issue by developing a protocol and network architecture that integrates QKD without the need for trusted nodes, thus meeting the requirements of the Tor network and creating a quantum-secure anonymous communication network.

Replacements for Mon, 13 May 24

[4]  arXiv:2212.11850 (replaced) [pdf, other]
Title: DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data
Comments: 19 pages
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[ total of 4 entries: 1-4 ]
[ showing up to 2000 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, recent, 2405, contact, help  (Access key information)