Next Article in Journal
Modeling and Optimization of Hydraulic and Thermal Performance of a Tesla Valve Using a Numerical Method and Artificial Neural Network
Previous Article in Journal
Channel Modeling and Quantization Design for 3D NAND Flash Memory
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

LERMS: A Low-Latency and Reliable Downlink Packet-Level Encoding Transmission Method in Untrusted 5GA Edge Network

1
Department of Next-Generation Mobile Communication and Cyber Space Security, Information Engineering University, Zhengzhou 450001, China
2
National Digital Switching System Engineering and Technological Research and Development Center, Zhengzhou 450000, China
3
Purple Mountain Laboratories: Networking, Communications and Security, Nanjing 211111, China
*
Authors to whom correspondence should be addressed.
Entropy 2023, 25(7), 966; https://doi.org/10.3390/e25070966
Submission received: 4 May 2023 / Revised: 11 June 2023 / Accepted: 20 June 2023 / Published: 21 June 2023
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
The increasing demand for end-to-end low-latency and high-reliability transmissions between edge computing nodes and user elements in 5G Advance edge networks has brought new challenges to the transmission of data. In response, this paper proposes LERMS, a packet-level encoding transmission scheme designed for untrusted 5GA edge networks that may encounter malicious transmission situations such as data tampering, discarding, and eavesdropping. LERMS achieves resiliency against such attacks by using 5GA Protocol data unit (PDU) coded Concurrent Multipath Transfer (CMT) based on Lagrangian interpolation and Raptor’s two-layer coding, which provides redundancy to eliminate the impact of an attacker’s malicious behavior. To mitigate the increased queuing delay resulting from encoding in data blocks, LERMS is queue-aware with variable block length. Its strategy is modeled as a Markov chain and optimized using a matrix method. Numerical results demonstrate that LERMS achieves the optimal trade-off between delay and reliability while providing resiliency against untrusted edge networks.

1. Introduction

In the era of 5G [1], edge computing provides customized computing services for data-intensive [2] and time-sensitive [3] applications such as healthcare [4] and traffic management [5]; edge networks (ENs) [6] are designed to address the challenges of centralized cloud computing and unreliable communications [7,8]. 5G-Advanced networks [9] are expected to offer more powerful capabilities, including wide coverage [10], low latency [11], and highly reliable transmission [12].
The EN transmits important and sensitive data related to safety [13], but it is closer to users and vulnerable to wireless eavesdropping [14], network-layer attacks [15], and tampering [16]. The edge network often finds itself in a predicament of weak protection capabilities and urgent security needs.
Previous studies have focused on addressing these pressing demands [17], and researchers have conducted extensive studies on point-to-point (UE-gNB) security at both the physical layer [18] and MAC-layer [19]. Providing secure end-to-end (UE-DN) transmission in an untrusted network incurs additional performance and resource overheads [20]. Commonly used confidentiality protection schemes include 5G voice communication using IPSec encryption [21], control plane TLS authentication [22], and secret-sharing proposed by Shamir et al. [23]. In the secret-sharing scheme, each share is delivered by a different courier to the recipient, providing an information-theoretic provable confidentiality transmission scheme.
The enhanced core network (ECN) proposed by 3GPP in ([1], clause 5.33), as shown in Figure 1, could establish multiple PDU sessions (MP), which can provide end-to-end reliable communication by redundancy transmission. The multiplex transport protocol stack is deployed on both the data network (DN) and user elements (UEs). Additionally, the high-layer (above the IP layer [1]) splits and aggregates the service flows. However, implementing concurrent multipath transmission (CMT) in an untrusted MPEN faces many challenges, including increased attack surface due to MPEN [17], additional delays due to asynchronous delay and bandwidth [24,25], making it not feasible to interact with the PDU bearer from the perspective of the 5G session mechanism [26].
In this paper, we aim to design a low-latency, high-reliability transmission scheme suitable for untrusted edge networks. Randomly arriving source data packets are buffered and queued at the sending end before transmission. This article continues previous work [27] and uses Raptor coding for efficient CMT. We have introduced a Lagrangian interpolation coding [28] scheme to realize CMT based on secret sharing. Different coding parameters can be adjusted for different resilience levels, which is suitable for an untrusted network environment, as the concatenated encoder provides reliability and robustness against malicious behavior. Encoding is performed at the granularity of data packets. Longer encoding block length can ensure reliability, but the corresponding queuing delay will increase [29]. The length of encoding blocks must be carefully considered to balance delay and reliability. We use a Markov decision process to formulate the optimization problem and construct it as a matrix-based linear programming to obtain the optimal variable-length coding strategy. The contributions of this paper are as follows:
  • Proposes LERMS (LERMS is short for (Lagrangian–polynomial and Raptor Encoder concurrent Multiple-pdu-Sessions transmission)), which is the first concatenated encoder scheme that is suitable for untrusted edge network environments. LERMS provides secure, reliable downlink transmission capabilities in the face of an untrusted network, such as transmission failures, data theft, and malicious tampering.
  • A queue-aware variable block length encoding scheme is designed and optimized using a matrix-based approach to minimize queuing delay while ensuring reliability.
  • Proposes a multi-service flow aggregation transmission scheme that reduces the probability of data packet random idle filling, ensuring security when the flow is small, and improves the transmission efficiency of the edge network.
This paper is organized as follows: Section 2 presents the design of the secure transmission method and flow aggregation transmission scheme as preliminary work for 5GA LERMS. Section 3 describes the system model. In Section 4, the trade-off between delay and reliability for the LERMS strategy is demonstrated. Section 5 presents numerical results. This paper concludes in Section 6, with the future research directions proposed. Table 1 summarizes the important variables used throughout the paper.

2. 5GA LERMS Preliminary

We consider the business scenario in the edge network, as illustrated in Figure 1. The UE subscribes to the edge computing service, and the edge network that transmits is responsible for transmitting the downlink service flow to the UE. The downlink service flow requires low delay and high reliability in transmission. With abundant transmission resources, the 5GA network allows for the establishment of multiple PDU sessions to carry the downlink traffic. To ensure the secure transmission of the downlink traffic in an untrusted network environment, this section begins by analyzing the key performance indicators in the edge network environment. We then propose a multiplex transmission scheme based on the concept of secret sharing, which provides feasibility for secure transmission. Finally, we discuss a joint coding scheme for downlink traffic in the core network.

2.1. 5GA Edge Network Requirements Analysis and Challenges

As an emerging network architecture that provides high-performance communication between terminals (UE) and edge computing nodes (DN), the 5G Advance (5GA) edge network [6] aims to meet key requirements such as low latency, high reliability, and security in the 5GA mobile network. In this section, we will analyze these requirements in detail and discuss the challenges of implementing them in an untrusted network environment.
Latency (L). In classical transmission systems, the overall transmission latency comprises propagation latency ( t p ), signifying the physical delay of signals within the transmission medium, and transmission latency ( t c ), determined by t c = W / ϕ , where W represents the bandwidth and ϕ is the transmitted data volume. However, factors such as congestion and bit errors prevent the total latency from being a simple sum of t p and t c , causing transmission latency fluctuations within a specific range [30,31]. In coded transmission systems, end-to-end transmission delay must be reconsidered. Data are coded and transmitted in block units. Current application layer data enter the cache and queue up, waiting for the previous generation of coded data blocks to finish transmission [32]. Consequently, the end-to-end transmission delay is defined as T = T + ten + tde + tq, encompassing codec delay and queuing delay. This paper’s low latency discussion primarily centers on tq and tc.
Reliability (R). In this paper, we consider each PDU session as a packet erasure channel, denoted by ε υ j = [ ε 1 , , ε j ] to represent the erasure probability of each PDU session [27]. High reliability refers to the transmission robustness against higher erasure probabilities. In other words, when a generation of source data packets departs from the sender within a specified time, and after applying redundancy/retransmission/coding and other reliable transmission techniques, we call it reliable transmission [17]. However, such losses may still be manipulated by malicious nodes, such as attackers, or intercepted by eavesdroppers. We define the total erasure probability as E N L = j = 1 N L γ υ j ε j , where γ υ j = [ γ 1 , , γ j ] T represents the traffic load weight of each path, with j = 1 N L γ υ j = 1 , and 0 E N L < 1 . We refer to the current MPEN as E N L -Level reliability.
Security. Security performance refers to the robustness of maintaining correct data delivery in the face of attackers [33]. Unlike traditional trust management [34] to ensure system security, our focus is on enhancing communication security through the lens of information theory. It takes into account active attackers who may tamper with or pollute the data received by the destination, and passive attackers who attempt to eavesdrop on and steal the data. We consider rational attackers who target only a subset of PDU sessions in the edge network rather than all of them. By treating all malicious actions as packet errors, we can employ redundant coding techniques to protect and repair the corrupted or stolen data, thereby enhancing the security performance in the edge network environment. This approach ensures the integrity and confidentiality of data transmission, even in the presence of adversaries targeting edge networks. Therefore, we can regard the redundancy of multi-path coded transmission as the security level, and we can simply refer to the edge network where N L PDU sessions are transmitted as N L -level secure transmission.
To sum up, service flows carried by edge networks require low-latency, high-reliability transmission with elastic capabilities in an untrusted network environment. However, achieving these requirements in practice is not easy. Due to the untrustworthy characteristics of edge networks, such as congestion, bit errors, and malicious attacks, more advanced transmission schemes and technologies need to be researched and designed to meet these challenges and ensure safe and efficient data transmission in edge networks.

2.2. A Secure Transmission Method

In this section, we analyze the transfer security of secret sharing. Secret sharing is a method of splitting data and generating multiple pieces of data through Lagrangian interpolation to transmit data over untrusted multiple paths. This approach is designed to achieve a level of security that protects data from potential attackers while providing protection against partial data-tampering attacks.
The core idea of secret sharing technology is to decompose the original data into multiple derivative pieces of data using the Lagrangian interpolation method. Let us suppose we need to transmit the original data D and decompose its encoding into n pieces of derivative data, among which any k shares of data ( k n ) are sufficient to reconstruct the original data (In the secret-sharing technique [23,35], the original data is split into multiple parts, referred to as “shares” (derived data). These shares in LERMS are then transmitted through multiple paths, with each path carrying one share of the data). First, a polynomial of degree k 1 is generated using Lagrange interpolation:
f ( x ) = a 0 + a 1 x + a 2 x 2 + + a ( k 1 ) x ( k 1 )
where a 0 = D , a 1 , a 2 , , a ( k 1 ) are randomly selected coefficients. Then, we calculate the value of f ( x ) at n different points to generate n derivative data:
D i = f ( x i ) , i = 1 , 2 , , n
To reconstruct the original data, they can be calculated by Lagrangian interpolation:
D = L ( 0 ) = i = 1 k l i ( 0 ) D i
l i ( x ) is a Lagrangian basis function that satisfies l i ( x j ) = δ i j   that is , when i = j , l i ( x j ) = 1 ; when i j , l i ( x j ) = 0 , defined as :
l i ( x ) = j i k ( x x j ) ( x i x j ) , j i , j = 1 , 2 , , k
In the edge network, each PDU session is considered an independent link provider, with a probability of being infiltrated by malicious behavior. The secret sharing transmission scheme based on Lagrangian interpolation in this scenario offers the following properties: Information security: In order to restore the original data through Lagrangian interpolation, the attacker must obtain at least k shares of derived data simultaneously, which increases the difficulty of their job and enhances information security. Integrity: Since the original data D is only dependent on the linear combination of the derived data D i , an attacker cannot change the value of the original data by tampering with part of the derived data unless they control at least k shares of the derived data at the same time. Reliability: As any k shares of derived data can be used to restore the original data, the reliability of the data can be guaranteed even if part of the derived data is lost or damaged during transmission.
To summarize, the CMT of secret sharing is robust and provides security guarantees for data transmission. We aim to further explain the resilient delivery methods that our proposed scheme LERMS can provide by identifying the types of security challenges it addresses. As shown in Figure 2, an untrusted edge network may contain invalid links that result in complete data loss, malicious links that tamper with or forge data, or colluding attackers that steal or modify data to launch a Byzantine attack. These malicious behaviors can be viewed as code errors that need to be corrected. Drawing from the concept of redundancy checks, we adjust the generation strategy of derived data to tolerate different types of malicious behaviors during transmission. In the next section, we will discuss more specific secure transmission schemes in the double-layer concatenated encoder.

2.3. Downlink Multi-Service Stream Joint Coding

In an untrusted edge network environment, the data transmission of edge computing nodes faces numerous challenges, including transmission efficiency, privacy, security, and reliability [36]. Due to the minimum limit of the length of the data flow resulting from the splitting of path transmission data and security coding, padding short packets is often necessary to meet the requirement. However, this can lead to a waste of resources.
To tackle these issues and demonstrate the demand and advantages of aggregating and transmitting multiple downlink service flows, we have developed an approach based on the current core network data transmission process. This approach enables the efficient transmission of aggregated data flows while preserving data privacy. As an example, we introduce an illustrative scenario called Single-Owner Multi-Device Data Transmission with Joint Encoding (SOMD-JE), which serves to further prove the value and practical effect of aggregated transmission in 5GA edge networks.
In the SOMD-JE scenario, we jointly encode multiple downlink service flows, which may belong to different devices but share the same owner. By analyzing the data characteristics of these flows, we found that aggregating and transmitting them does not lead to privacy leakage, and instead, the SOMD-JE improves transfer efficiency through server flows aggregation. For instance, in a smart home scenario, users’ mobile phones, smart screens, VR devices, and elderly health monitoring devices all belong to the same owner (As shown in Figure 3, the receiver has multiple devices including terminals, medical monitoring devices, and smart home devices), so aggregated data flows can be transmitted without worrying about privacy leaks. Similar settings exist on hospital wards and factory floors.
This flows aggregation approach overcomes the waste of resources caused by traditional padding methods, makes full use of edge network transmission resources, and ensures safe, reliable, and efficient transmission while maintaining data privacy. The specific scheme for aggregating and transmitting downlink service flows needs to be adaptively adjusted within the current core network data transmission process. For further details, please refer to Appendix A.

3. System Model

3.1. PDU Session Queuing and Encoding Transmission Model

For data packets arriving from the application layer, we assume that the arrival of downlink data packets of different users is completely independent and identically distributed ( i . i . d . ). Let Λ l [ t ] denote the number of P s arriving in the t-th timeslot for user l ( l = 1 , 2 , , L ). Given that the maximum value of Λ l [ t ] is N, the probability distribution of Λ l [ t ] for user l is expressed as λ = [ λ l 0 , λ l 1 , , λ l N ] T , where λ l n = P { Λ l [ t ] = n } denotes the probability of user l receiving n packets in the t-th timeslot. The average arrival rate is defined as Λ l ¯ = n = 0 N Λ n λ l n .
For each user, a buffer with a size of Z , randomly arriving packets are accumulated, and g l [ t ] packets are selected from the user l’s cache once the encoding of the previous block of packets is completed. Therefore, q l [ t ] Z = { 0 , 1 , , Z } , in the [ t + 1 ] -th timeslot, q l [ t ] evolves as (we define ( x ) * = max { x , 0 } )
q l [ t + 1 ] = min { ( q l [ t ] g l [ t ] ) * + Λ l [ t + 1 ] , Z } .
We assume that the size of the data block g l [ t ] selected for each user and each generation of encoding does not exceed B, i.e., g l [ t ] N = { 0 , 1 , , B } . The feasible region of each user’s cache queue length q l [ t ] is given by q l [ t ] Z . Under the block length selection strategy N , N ( q ) = { g N | ( 0 , q B + N Λ ) * g min ( q , B ) } , where the feasible range N ( q ) guarantees that each user’s sending buffer queue will not underflow or overflow, we also have B N Λ which ensures that the system will not be congested.
Under the LERMS strategies, at time slot t we encode and transmit a generation of g σ [ t ] data packets ( P s ) (Assuming that all packets have the same length and carry ϕ bit information), where g σ [ t ] = Σ l = 1 L g l [ t ] . The specific encoder process will be described in detail in the next subsection. LERMS choose N L PDU sessions for transmission, and the transmission vector is denoted as γ υ j = [ γ 1 , , γ j ] T , where γ υ j indicates which channels are used for transmission. The output share of Lagrangian coding is also determined based on the number of channels. In summary, we express the LERMS strategies action as ( g l , γ υ j ) , which changes in units of time slots, i.e., ( g l [ t ] = g l , γ υ j [ n ] = γ υ j ) , indicating that the LERMS strategy action in the t-th time slot is g l , γ υ j . The LERMS action of each generation of data remains unchanged in its occupied time slot, and g l , γ υ j is set to 0 for the time slot not occupied. Assuming that the number of data packets in each generation does not exceed B, we have γ j { 0 , 1 } , and let γ υ = j = 1 N L γ j . Then, we have γ υ Γ υ { 1 , , N L } as { γ υ Γ υ | 0 γ υ N L C { g σ [ t ] > 0 } } ( C { · } denotes the characteristic function), where N L represents the number of PDU sessions established in LERMS.

3.2. Concatenated Encoder Principle

In this section, we introduce a double-layer concatenated Algorithm 1 for processing data packets within PDU sessions, and the algorithm complexity is O ( N · ( K + M ) · log ( K + M ) ) . This encoder scheme combines the advantages of two distinct encoders to ensure reliable, efficient, and secure transmission across multiple disjoint PDU sessions.
Algorithm 1 Concatenated Encoder
 Input: 
Read P s = ( P s 1 , P s 2 , , P s g ) T from the queue, Ω d = ( Ω 1 , Ω 2 , , Ω max ) , the PDU sessions number N L ;
 Output: 
P ¯ c
1:
P c g γ × 1 0 g γ ;                              ▹ Raptor code encoding procedure
2:
G g γ × m R a p t o r = G g γ × m L T G m × g p r e ;
3:
P c g γ × 1 = G g γ × g R a p t o r P s g × 1 ;
4:
RP ¯ c P c g γ × 1 ;           ▹ Packet-level Raptor code encoder output RP ¯ c
5:
Generate uniform random matrix X = { X 1 , X 2 , , X M } ;
6:
Split RP ¯ c into K groups( R P c 1 , R P c 2 , , R P c K );     ▹ Lagrange encoding procedure
7:
for  i = 1 , 2 , , N   do
8:
    L P c i j [ K ] R P c j · k [ K + M ] { j } α i β k β j β k + j = K + 1 K + M X j · k [ K + M ] { j } α i β k β j β k ; { α i } i = 1 K + M { β j } j = 1 K =
9:
    P ¯ c a p p e n d [ P ¯ c , L P c i ]
10:
end for               ▹ Fast Polynomial interpolation
11:
return  P ¯ c ;
As shown in Figure 4, the LERMS strategy incorporates a concatenated encoder scheme. The first-level encoder, known as the Raptor Encoder, primarily focuses on providing reliability by enhancing the decodability and dependability of data streams transmitted within PDU sessions. The second-level encoder, called the Lagrange Polynomial Encoder, is designed to offer resilient transmission over untrusted paths within the edge network. Through the implementation of the “Double-layer Concatenated Encoder” scheme, we aim to provide a robust encoding solution for PDU sessions. The concatenated encoder principle will be described in detail in two subsections.

3.2.1. Packet-Level Raptor Code Encoder

In this subsection, we present a packet-level Raptor encoding scheme for enhancing the robustness of PDU session transmissions in MPEN. We model these PDU sessions as packet erasure channels, where data packets can either be received entirely or erased. To improve transmission reliability, P s will be transmitted after the Raptor encoder.
We encode P s in PDU sessions using a Raptor packet encoder. The LERMS strategy selects g data packets for encoding at each time slot. Raptor-encoded data packets P c are generated through two stages: an outer coder (pre-code) Φ and LT encoder [37] (inner code). The pre-code Φ is a ( g , m ) block code that generates m intermediate coded symbols from g P s . The inner LT encoder generates g γ data packets through ξ ( g , m , Ω ( x ) ) , where γ represents the encoding redundancy, which is the inverse of the code-rate. The LT encoding matrix is constructed from a predetermined degree distribution Ω ( x ) = d = 1 d max Ω d x d , with the degree distribution following a probability distribution Ω d = ( Ω 1 , Ω 2 , , Ω max ) and satisfying d = 1 d max Ω d = 1 . The relationship between the encoder’s input and output is given by P c g γ × 1 = G g γ × m L T G m × g p r e P s g × 1 , where G p r e and G L T denote the outer and inner encoding matrices, respectively.
The Raptor coding scheme enhances the reliability of data transmission by mixing data packets. When transmitting over packet erasure channels, it offers higher robustness and resilience. Data transmissions do not require feedback, as the encoding redundancy can be determined based on the channel characteristics. The receiver only needs to receive slightly more than the number of source data packets g to complete decoding. Due to the encoding scheme’s data mixing approach, even if some encoded data packets are erased, the entire source data block can still be recovered by continuing to receive encoded data packets.

3.2.2. Encoder for Lagrangian Polynomial Code Multipath Transmission

LCMT performs encoding operations on the output of Raptor encoder, denoted as R P c , to provide safe and reliable transmission over multiple paths, some of which may be untrusted, while protecting data privacy. Let us suppose an MPEN has N L physically isolated paths. LCMT encodes R P c to generate L P c , which is the output of Lagrangian encoder. Each generation of L P c will be split into K groups, namely ( L P c 1 , L P c 2 , , L P c k ) , and transmitted to the receiver. Through the reasonable coding method of LCMT, the system aims to tolerate the failure of S paths in the MPEN, malicious behavior of A paths, and collusion of T paths to steal data while still obtaining safe and reliable data transmission. If the data are safely received, we call this transmission scheme realizing the triplet ( S , A , T ) .
To achieve this level of resilience, it is necessary to satisfy the following condition:
N L K + T + S + 2 A
At this point, we can say that LCMT can realize the triplet ( S , A , T ) . The significance of this result is that, by adding one path, the link failure resilience can be increased by 1 or the robustness of the malicious behavior path can be increased by 1/2. Furthermore, data privacy can be improved at the same time.
Let us take the transmission of { P c } as an example, where K = 2 , N = 6 , and ( S , A , T ) = ( 1 , 1 , 1 ) . In this case, { P c } is split into Pc 1 and Pc 2 . The key point of LCMT is to select a uniform random matrix X and encode it through Lagrange interpolation polynomial ( Pc 1 , Pc 2 , X ) . The encoding process is given by the following equation:
ψ ( x ) = Δ P c 1 ( x 2 ) ( x 3 ) ( 1 2 ) ( 1 3 ) + P c 2 ( x 1 ) ( x 3 ) ( 2 1 ) ( 2 3 ) + X ( x 1 ) ( x 2 ) ( 3 1 ) ( 3 2 )
To transmit { P c } , six different values { α i } i = 1 6 in the finite field F are determined such that { α i } i = 1 6 { 1 , 2 } = . Then, N L PDU sessions transmit ψ ( α 1 ) , ψ ( α 2 ) , , ψ ( α 6 ) , where each path transmits the value after interpolation. In other words, the linear combination of Pc 1 and Pc 2 is hidden by ξ X , where ξ is a nonzero value. Since X is uniformly random, the data privacy of T = 1 can be guaranteed. If there is one malicious path ( A = 1 ) and one invalid path ( S = 1 ), a Reed–Solomon decoder needs to be used at the receiver, and three additional shares of data are required (one additional copy for each invalid path and two additional shares for the malicious path). At the receiving end, P c 1 and P c 2 can be recovered by computing ψ ( 1 ) and ψ ( 2 ) .
Double-layer concatenated encoder processes downlink data packets from the edge DN to the UE, enabling their transmission through multiple disjoint PDU sessions. By leveraging both Fountain and Lagrange encoders, a concatenated encoder can efficiently and securely handle data packets within the PDU sessions, simultaneously improving transmission reliability and resilience against untrusted path transmissions.

3.3. Edge Network with Untrusted Paths

In this section, we analyze the transmission characteristics of MPEN, which is a multipath transmission network consisting of multiple physically disjoint PDU sessions. Our aim is to determine the performance level that can be achieved with the number N L of multiple transmission paths through an analysis of encoding transmission characteristics.
The input and output of MPEN are denoted by X and Y , respectively, while MPEN provides the transmission capability of the edge network. To begin, we define the parameters of the channel model. We assume that MPEN establishes N L paths for the current transmission task, which are classified based on their behavioral characteristics. Specifically, we consider N paths that can be transmitted normally, F failed sessions that cannot be transmitted within a specified time, A malicious transmission paths, and T paths that may be compromised by Byzantine attackers or eavesdroppers.
We assume that the input data stream X is evenly divided into K sub-packets x 1 , x 2 , , x K , and these sub-packets are encoded into N packets as x ˜ 1 , x ˜ 2 , , x ˜ N , where K N . These encoded packets are distributed across N L PDU sessions for transmission, and the receiver obtains the result Y = y 1 , y 2 , , y N , where N = N L (Here, we assume that each PDU session has only one single behavioral feature) subject to the following constraints:
N L = N + F + A + T
Let denote the data collection operator and define the receiving vector r , where its j-th element r j represents the received data of the j-th PDU session. We define four types of receiving situations: normal transmission, represented by r N , where r N = n = 1 N r n = n = 1 N x ˜ n ; failed transmission, represented by r F , where r F = f = 1 F r f = f = 1 F ( 0 · x ˜ f ) ; malicious transmission, represented by r A , where r A = a = 1 A r a = a = 1 A ϵ a ( x ˜ a ) ; and Byzantine attack, represented by r T , where r T = t = 1 T r t = t = 1 T ϵ t ( x ˜ t ) . Here, we introduce the functions ϵ a and ϵ t , which, respectively, represent the influence of malicious transmission channels and Byzantine attack channels on the output.
We assume that the PDU session is a memoryless erasure channel, meaning that the output r i depends only on the input x i . Additionally, each data packet has a certain probability of loss, denoted by ε υ j = [ ε 1 , , ε j ] , which represents the erasure probability of different sessions. This loss affects only the receiving result, so we have:
Y = j = 1 N L ε j r j
The above description about MPEN is fully in line with the 3GPP standard’s definition of PDU session [38].

3.4. MPEN with Untrusted Path Reliable Function

In this subsection, we analyze the reliability of the two-layer concatenated encoder CMT in the edge network and propose a generalized reliability model. For the enumeration of all possible session state characteristics described in Figure 2, we first employ a 2 N L × N L matrix C :
C = 1 1 0 1 0 0 T
The value 0/1 of the elements in row i and column j indicates the i-th possibility of success/failure at the receiving end through the j-th PDU session. After decoding with the Reed–Solomon decoder [39], the malicious path is screened. Error correction and error detection are performed, and abnormal data can be discarded directly; considering that the transmission of this kind of PDU session failed, at this time, the corresponding c i , j is set to 0 to exclude malicious data packets (The defense level against Byzantine attacks is determined during the PDU session establishment and will not be analyzed here).
When transmitting through multiple PDU sessions, we assume that the maximum block error rate and bandwidth guaranteed by GBR QoS [40] for a set of PDU sessions are the same. Based on the delay model described in Section 2, the relationship between packet delivery ratio and transmission delay is established as the cumulative function of the delay probability distribution, called the delay reliability function [30]. Based on end-to-end network monitoring, the delay reliability function is available:
F L E R M S T , γ υ j , g = i = 1 2 N L χ i j = 1 N L H j T , γ j g
We consider that N L is at least greater than 3, and the relationship between delay and transmission reliability is given by F L E R M S , where
χ i = 1 , if Σ j = 1 N L c i , j γ j γ d 0 , otherwise
g i will exclude failed transmissions (i.e., exclude the output of malicious PDU sessions) to ensure that only the correct output of successful decoding is included, and γ d is the threshold to ensure successful decoding, with a typical value of 1.05. Hj is defined as
H j T , γ j g = F j T , γ j g , if c i , j = 1 0 , if c i , j = 0
Among them, the product of H j ( T , γ j g ) for j = 1 , , N L appears in the form of a cumulative distribution function (CDF). In the default working mode, the completion of the last data transmission is regarded as the completion of the reliable transmission process.

4. Trade-Off Delay-Security for Variable Block-Length LERMS Strategy

4.1. The Markov Chain under LERMS Strategies Formulation

Based on the LERMS strategy, we uniformly sample data packets from multiple downlink service flows, and perform joint encoding and transmission. We probabilistically determine the sampling and transmission strategies of different service flows based on the current queue length, and transmit them on the edge network. Specifically, given the queue length q l [ n ] , l = 1 , , L , we establish the conditional probability f Q G , γ to determine the concatenated encoder coding block length g σ [ t ] , sample from L flows, and distribution and transmission strategy γ υ j [ t ] of J paths for the given queue length q l [ n ] .
f Q G , γ = P G [ t ] = G , γ υ j [ t ] = γ υ j | Q [ t ] = Q
We denote the packet sampling size and buffer queue length of L server flows as vectors G [ t ] = [ g 1 [ t ] , g 2 [ t ] , , g L [ t ] ] T and Q [ t ] = [ q 1 [ t ] , q 2 [ t ] , , q L [ t ] ] T , respectively. The transmission selection and distribution strategy are determined based on the current queue length Q [ t ] . We denote specific queue lengths and sample sizes by vectors Q and G .
Based on Equation (14), the strategy function of LERMS can be obtained:
S = f Q G , γ : Q Z L , G N L , 1 γ υ < N L , γ j { 0 , 1 } .
Here, the value space of Q and G are Z L and N L , respectively, obtained by taking the Cartesian product i = 1 L Q ( q i ) and i = 1 L G ( g i ) . To ensure feasibility of the transmission strategies, we set the value of f Q G , γ to 0 for all infeasible strategies G and γ . In other words, if a given combination of packet sampling sizes G and transmission strategies γ is infeasible, its corresponding probability value is forced to 0. To prevent the sender buffer from overflowing or underflowing, the system state q l evolves based on Equation (5). We assume a temporary steady-state condition where no PDU session is being established or released, i.e., Q Z , G N ( Q ) γ υ j Γ υ N L ( G ) f Q G , γ = 1 .
Under the LERMS strategy, we consider the transmission process of downlink server flow in the edge network as a Markov chain, where the queue length Q [ t ] is the state value of the system. By analyzing the steady-state distribution of the Markov chain, we further analyze how to trade off between latency and reliability. Based on the given strategy S , we first analyze the state transition probability of different queue lengths β Q , Q = P { q l [ t + 1 ] = q l | q l [ t ] = q l } , where Q and Q are the vectors of buffer queue lengths at two consecutive time slots. Specifically, the state transition probability β Q , Q can be expressed as
β Q , Q = G N L ( Q ) γ υ j Γ υ N L ( G ) f Q G , γ l = 1 L n = 0 N λ l n C { min { ( q l g l ) * + n = q l }
where λ l n denotes the probability of n packet arrivals during single time slot for l-th flow. The value range of Q is Z L .
Using β Q , Q , we can determine the steady-state probability π S ( Q ) for different queue lengths, wherein Q belongs to Z L . We can then obtain the Markovian steady-state probability balance equation:
Q Z L ( Q ) β Q , Q π S ( Q ) = π S ( Q )
where Z L ( Q ) is a subset of Z L , that contains all possible values of Q under S . The collection branch is expressed as Z L ( Q ) = { Q Z L | q l g l q l q l + n , l }

4.2. Constrained Optimization Problem Construction

Based on the steady-state analysis of the state value Q within the edge network, we aim to construct a constrained optimization problem to balance the delay and reliability of multiple downlink flows transmission. Intuitively, joint encoding of multiple service flows’ P s not only improves the coding efficiency but also enhances the security compared to a single service flow. However, it also increases the corresponding queuing delay. Therefore, based on the LERMS strategy, we propose a safe and reliable multi-path transmission encoder strategy. This strategy can effectively utilize the edge network transmission resources and improve the transmission efficiency while satisfying the constraints of reliability functions.
In the constrained optimization problem, we aim to minimize the weighted sum of queuing delays for multiple users while satisfying reliability and system bandwidth constraints. The queuing delay D μ S is determined based on Little’s Law:
D μ S = l = 1 L μ l λ l Q Z L q Z q π S ( Q ) C { q l = q }
The weight coefficients are represented as μ = [ μ 1 , μ 2 , , μ L ] T , where μ adheres to the conditions of non-negativity and sums up to 1. We can further compute the reliability and bandwidth using the following equations:
R S = Q Z L G N L ( Q ) γ υ j Γ υ N L ( G ) F L E R M S ( g σ , γ ) f Q G , γ π S ( Q )
W S = Q Z L G N L ( Q ) γ υ j Γ υ N L ( G ) W S j ( g σ , γ υ j ) f Q G , γ π S ( Q )
We define the optimization variable as x Q G , γ = f Q G , γ π S ( Q ) , the optimization problem can be formulated as follows:
min { x Q G , γ } Q Z L G N L ( Q ) γ υ j Γ υ N L ( G ) D μ ( Q ) x Q G , γ
s . t . Q Z L G N L ( Q ) γ υ j Γ υ N L ( G ) F L E R M S ( g σ , γ ) x Q G , γ r th
Q Z L G N L ( Q ) γ υ j Γ υ N L ( G ) W S j ( g σ , γ υ j ) x Q G , γ W j th Q Z L ( Q ) G N L ( Q ) γ υ j Γ υ N L ( G ) x Q G , γ l = 1 L λ l q l q l g l
= G N L ( Q ) γ υ j Γ υ N L ( G ) x Q G , γ , Q Z L
Q Z L G N L ( Q ) γ υ j Γ υ N L ( G ) x Q G , γ = 1
x Q G , γ 0 , Q Z L , G N L , γ υ j Γ υ N L ( G )
where D μ ( Q ) = Σ l = 1 L μ l λ l q l .
By solving the optimization problem in Equation (21), we can obtain the minimum average queuing delay under the constraints of reliability and system bandwidth in an untrusted network environment. This allows us to determine the optimal trade-off between latency and reliability. We define the optimal solution of Equation (21) as x * Q G , γ , and we will use the optimal strategy S * to determine the steady-state probability π S * ( Q ) :
π S * ( Q ) = G N L ( Q ) γ υ j Γ υ N L ( G ) x * Q G , γ
among them, we define the lerms optimal strategy as f *
f * Q G , γ = x * Q G , γ π S * ( Q ) if π S * ( Q ) > 0 C { g = g σ Q max } if π S * ( Q ) = 0 ,
where we define g σ Q max = arg max g N L . In summary, the optimal strategy S * obtained from the solution of the optimization problem can be used to determine the transmission strategy G [ t ] and γ υ j [ t ] based on the current system state Q [ t ] using the conditional probability { f * Q G , γ : G N L ( Q ) , γ υ j Γ υ N L ( G ) } .

4.3. Matrix-Based Solving Methods

Considering the exponential growth of the value range of the cache queue Q and transmission policy with the increase in the number of business flows L and the number of paths N L , this subsection proposes a matrix-based approach to obtain the optimal trade-off for untrusted MPEN transmission. Firstly, we rewrite the linear programming problem in Equation (21) and then, using the unified matrix constraints in Algorithm 2, algorithm complexity is O ( L ( Z · N + 2 ) ) , and we automatically generate the LP problem and solve for the LERMS optimal strategy for downlink transmission of multiple service flows.
We represent the optimization variable x Q G , γ as a column vector, denoted by x with an index corresponding to the optimization variable x Q G , γ . The dimension of x is given by
l = 1 L ( | Z | | N | | Γ υ N L | ) l 1 ( | Γ | ( | N | q l + g l ) + γ υ j ) + 1
where | · | denotes the number of elements in the set. We can express Equation (21) in matrix form as follows:
Algorithm 2 Algorithm to constraints matrix for Equation (21).
 Input: 
Number of server flows, L; Peak flow rate, N Λ ; The upper bounds of g [ t ] , B; Number of PDU sessions, N L ; The probability distribution of P s , λ l = [ λ l 0 , λ l 1 , , λ l N Λ ] T , l = 1 , , L . Reliability function F ( g σ , γ ) .
 Output: 
Reliability vector, R ; PDU Session Aggregate Maximum Bit Rate vector W ; Delay vector, D μ ; Matrix for constraints, M .
1:
g σ 0 , g ˙ σ 1 | Z | [ 0 , 1 , , B ] T , W 0 ;                    ▹ Generate R , W .
2:
for  l = 1 to L do
3:
    W W 1 | N | × | Z | ;
4:
    g σ g σ 1 | g ˙ | + 1 | g σ | g ˙ σ ;
5:
end for
6:
W W [ 0 , 1 , , B ] T , R 0 | g σ | 1 | Γ | ;
7:
for { γ υ _ i j } , i = 1 to 2 N L  do
8:
    R R + F ( g σ , γ υ _ i j ) e | Γ | , i ;
9:
end for
10:
D μ 0                         ▹Generate delay vector, D μ .
11:
for  l = 1 to L do
12:
    D l μ L l + 1 λ l l + 1 [ 0 , 1 , , Z ] T 1 | N | ;
13:
    D μ D μ 1 | D l | + 1 | D μ | D l ;
14:
end for
15:
D D 1 | Γ | ;
16:
M ˙ 1 , M ¨ 1 , M ˜ 1 ;                         ▹ Generate delay vector, M .
17:
for  l = 1 to L do
18:
   for  q = 1 to Z do
19:
      M ˙ l , q 1 | Z | , | N | , M ¨ l , q 1 | Z | , | N | ;
20:
     for  all   g N ( q )  do
21:
         M l , q , g 0 q g , N Λ + 1 ; diag ( 1 1 , N Λ + 1 ) ; 0 Z N Λ + g q , N Λ + 1 ;
22:
         M ˙ l , q ( : , g + 1 ) M l , q , g λ L + 1 l ;
23:
         M ¨ l , q ( : , g + 1 ) M l , q , g λ N Λ + 1 ;
24:
     end for
25:
      M ˙ l [ M ˙ l , M ˙ l , q ] , M ¨ l [ M ˙ l , M ¨ l , q ] ;
26:
   end for
27:
    M ˙ ( M ˙ M ¨ l ) ( M ¨ M ˙ l ) , M ¨ M ¨ M ¨ l ;
28:
    M ˜ M ˜ ( diag ( [ 1 | Z | ] T ) ( [ 1 | N | ] T ) )
29:
end for
30:
M M ˙ M ˜
min x 0 D μ T x
s . t . r T r th
W T W j th j { 1 , 2 , , N L }
M x = 0
1 T x = 1
where 0 and 1 are zero and one vectors, respectively, f Q G , γ is the joint encoding and transmission strategy for the given queue length Q , β Q , Q is the state transition probability for different queue lengths, π S ( Q ) is the steady-state probability for the given queue length Q , and μ l is the weight coefficient for user l. D l and B l represent the queuing delay and bandwidth for user l, respectively. The maximum values of queuing delay and bandwidth are denoted as D max and B max , respectively. We define the following vectors: Object delay vector D μ ; Reliability vector, R ; Bandwidth vector W . We also construct Equation (21d) by the matrix M .
By Algorithm 2, we can automatically obtain Equation (25), where we only need to determine D μ , R , W and M . In Algorithm 2, as shown in lines 10 to 28, we generate the feature matrices for each server flow, namely D μ , M ¨ , and M ˜ for the l-th flow. We then construct the target matrix by the Kronecker product ⊗ of these matrices. We define 1 k and 0 k as column vectors containing all ones and all zeros, respectively, with k items. We also define the sampling vector e n , k as an N-dimensional column vector, where the k-th item is 1. By applying Algorithm 2, we effectively transform Equation (21) as well as Equation (25) into an LP problem in matrix form, allowing us to solve for the optimal strategy for aggregated transmission of downlink multi-service flows in MPEN.

5. Numerical Results

In this section, we validate the effectiveness of the LERMS strategy in improving low-latency and highly reliable transmission capabilities in an untrusted edge network environment. To conduct the evaluation, we set up an experimental mobile network and analyze the performance of the proposed LERMS scheme. The core network of LERMS is implemented by enhancing the Free5GC platform [41]. The RCMEN core network is deployed on a laptop equipped with an I7-11800 processor and 16 GB of memory, while the UPF is deployed on a desktop computer with an I7-10700 processor and 32 GB of memory. We simulate the transmission of data by modifying the provided script in the Free5GC.
Firstly, in Figure 5a,b we consider the simulation test of the secure transmission capability of the double-layer encoder. Considering establishing six PDU sessions according to the same situation as described in Section 3.2.2, that is, N L = 6. We will randomly add malicious behavior, including transmission failure link(red), malicious tampering link(purple), eavesdropping link(yellow), i.e., ( S , A , T ) = ( 1 , 1 , 1 ) . For the concatenated encoder scheme encoding, we use the Reed–Solomon decoder to receive the P ¯ c . To decode, we will identify the decoding result, which can solve the P s as recognition success, that is, we do not consider the potential safety hazards of Byzantine attackers and eavesdroppers, which is directly regarded as a system capability in the PDU session establishment phase. There is no need to pass the experimental analysis; as shown in Figure 5a, our encoding strategy can provide reliable transmission capabilities in an untrusted network environment. The system has ( S , A , T ) = ( 1 , 1 , 1 ) protection capability. As can be seen in Figure 5b, we conducted further tests to evaluate the maximum safety capability. We found that excluding malicious attacks, the maximum capability to recover P s is ( 2 , 0 , 2 ) . However, as malicious attacks can tamper with data packets, and every tampering of a data packet requires two more data packets for error correction. Thus, in the check matrix, we found that in the time slot corresponding to red, the number of malicious tampering and transmission failures exceeds the range defined by Equation (6). Therefore, it is not possible to provide transmission capability in an untrusted transmission network with N L = 6 .
We analyze the effectiveness of the SOMD-JE strategy, with the aim of coding and ensuring transmission efficiency as well as data encoding security and CMT. The shortest coding block length of P s is set to 100, and we assume that the arrival probabilities of data packets of different service flows i.i.d, as shown in Figure 6b, while the relationship between the number of aggregated service flows and the probability of padding occurrence is given in Figure 6a. It can be seen that with small Λ ¯ , the padding probability is high, and the transmission efficiency of the edge network is low at this time. As the number of aggregated flows L increases, P decreases. Therefore, aggregated data flows can significantly reduce the padding probability P ; therefore, joint encoding improves transmission efficiency.
The LERMS strategy is designed to achieve an optimal trade-off between the average queuing delay, available bandwidth, and reliability, with ε j set to 0.1 for all sessions, resulting in an upper limit of reliability of 1 ( 0.1 ) 6 = 0.999999 . As shown in Figure 7, the resulting trade-off curve between latency and reliability is a segmented broken line that matches our theoretical analysis. Figure 7a demonstrates that as the reliability value F L E R M S increases, the required queuing delay D μ S also increases. Moreover, higher available bandwidth Wth can lead to lower queuing delays D μ S at a given reliability level r. Figure 7b shows that a higher reliability threshold rth requires a higher average queuing delay D μ S . These results illustrate the effectiveness of our LERMS strategy in achieving the optimal trade-off between delay and reliability.

6. Conclusions and Future Directions

In this paper, we propose a low-latency and highly reliable transmission service for downlink traffic subscribed to edge services in untrusted edge network environments. To address potential failures, malicious tampering, and eavesdropping in the edge network, we introduce an encoder based on Lagrangian interpolation and Raptor double-layer cascading to fully utilize the multipath transmission resources of the edge network and provide secure CMT capabilities. Additionally, we design a variable block length encoding strategy that considers the accumulation of randomly arriving data packets at the sending end and selects an appropriate encoding block length based on queue length state information. We model this decision-making process as a Markov chain and obtain the optimal delay–reliability trade-off through matrix operation methods.
Effective communication and computing management is critical in the context of edge networks, where data is strongly related to the server flow. Currently, CMT is the primary focus, but it is essential to integrate distributed transmission and computing to meet the core requirements of edge networks. By distributing service flows based on computing requirements, we can enable the edge network to be more responsive to the service flow. This approach further enhances the core computing requirements of the edge network for corresponding scenarios, eliminates the single-point vulnerability of central cloud computing, and provides elastic edge network transmission and computing services. Our future research directions include exploring the integration of transmission and computing, multi-session transmission, and multi-DN computing in the edge network.

Author Contributions

Z.G.: Conceptualization, methodology, software, writing—original draft; X.J.: Formal analysis, project administration, supervision; W.Y.: Supervision, visualization; M.X.: Formal analysis, writing—review and editing; Y.Z.: Project administration; D.Z.: Supervision; Z.C.: Supervision; L.W.: Supervision; All authors have read and agreed to the published version of the manuscript.

Funding

Project supported by the National Key Research and Development Program of China (Nos. 2020YFB1806607 and 2022YFB2902204).

Data Availability Statement

The 5G Core Network that support this study are available from https://github.com/free5gc/free5gc (accessed on 1 February 2021).

Acknowledgments

We would like to thank the editors and the anonymous reviewers for their efforts.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Multiple PDU Sessions Transmission Procedure for Aggregation Data of Downlink Multi-Service Flow

In the scenario of multiple-device single-owners service flow aggregation transmission, we propose a procedure to support data aggregation over multiple PDU sessions. This is in addition to the existing physical isolation multi-PDU session establishment [27]. Currently, the core network does not support the joint transmission of multiple service flows. In this context, we propose the use of multi-PDU sessions to transmit the downlink data flow of edge computing services. This supports the transmission of aggregated traffic streams through physically isolated PDU sessions on a per-session basis.
1.
The DN initiates the PDU session establishment request by sending a PDU Session Establishment Request message, which includes the requested DNN (identifier of the data flow from the core network to the UE), PDU session type, etc. The proposed procedure establishes a group of physically isolated multi-PDU sessions and assigns a session ID to this group of PDU sessions.
2.
All devices within the same aggregated service flow must be assigned the same session ID.
3.
Anchor UPF-A can identify the aggregated service flow through a specific session ID, facilitating unified management within the core network.
4.
The local DN (MEC nodes) must perform the operation of inserting tags. Before the service flow is aggregated, the data owner is identified by adding a unique tag to the data packet.
5.
After the device receives the aggregated data packet and completes decoding, it distinguishes the data according to the tag and extracts the data it needs. The rest of the data can be used to verified untrusted paths or discarded directly.

References

  1. Technical Specification (TS) 23.501, version 17.6.0; System Architecture for the 5G System (5GS); 3GPP: Antibes, France, 2022.
  2. Wu, H.; Xiang, Z.; Nguyen, G.T.; Shen, Y.; Fitzek, F.H. Computing meets network: Coin-aware offloading for data-intensive blind source separation. IEEE Netw. 2021, 35, 21–27. [Google Scholar] [CrossRef]
  3. Feng, L.; Li, W.; Lin, Y.; Zhu, L.; Guo, S.; Zhen, Z. Joint computation offloading and URLLC resource allocation for collaborative MEC assisted cellular-V2X networks. IEEE Access 2020, 8, 24914–24926. [Google Scholar] [CrossRef]
  4. Zhan, K. Sports and health big data system based on 5G network and Internet of Things system. Microprocess. Microsyst. 2021, 80, 103363. [Google Scholar] [CrossRef]
  5. Javed, A.R.; Shahzad, F.; ur Rehman, S.; Zikria, Y.B.; Razzak, I.; Jalil, Z.; Xu, G. Future smart cities requirements, emerging technologies, applications, challenges, and future aspects. Cities 2022, 129, 103794. [Google Scholar] [CrossRef]
  6. Adhikari, M.; Hazra, A. 6G-enabled ultra-reliable low-latency communication in edge networks. IEEE Commun. Stand. Mag. 2022, 6, 67–74. [Google Scholar] [CrossRef]
  7. Ranaweera, P.; Jurcut, A.; Liyanage, M. MEC-enabled 5G use cases: A survey on security vulnerabilities and countermeasures. ACM Comput. Surv. (CSUR) 2021, 54, 1–37. [Google Scholar] [CrossRef]
  8. Tian, W.; Wang, G. State estimation in mobile edge computing with unreliable communications. IEEE Commun. Lett. 2020, 25, 1149–1152. [Google Scholar] [CrossRef]
  9. Technical Report (TR) 21.917, version 17.0.1; Summary of Rel-17 Work Items; 3GPP: Antibes, France, 2023.
  10. Deng, C.; Liu, D.; Yektakhah, B.; Sarabandi, K. Series-fed beam-steerable millimeter-wave antenna design with wide spatial coverage for 5G mobile terminals. IEEE Trans. Antennas Propag. 2020, 68, 3366–3376. [Google Scholar] [CrossRef]
  11. Khan, B.S.; Jangsher, S.; Ahmed, A.; Al-Dweik, A. URLLC and eMBB in 5G Industrial IoT: A survey. IEEE Open J. Commun. Soc. 2022, 3, 1134–1163. [Google Scholar] [CrossRef]
  12. Hui, H.; Ding, Y.; Shi, Q.; Li, F.; Song, Y.; Yan, J. 5G network-based Internet of Things for demand response in smart grid: A survey on application potential. Appl. Energy 2020, 257, 113972. [Google Scholar] [CrossRef]
  13. Abd EL-Latif, A.A.; Abd-El-Atty, B.; Venegas-Andraca, S.E.; Mazurczyk, W. Efficient quantum-based security protocols for information sharing and data protection in 5G networks. Future Gener. Comput. Syst. 2019, 100, 893–906. [Google Scholar] [CrossRef]
  14. Wu, Y.; Duong, T.Q.; Swindlehurst, A.L. Safeguarding 5G-and-beyond networks with physical layer security. IEEE Wirel. Commun. 2019, 26, 4–5. [Google Scholar] [CrossRef]
  15. Kim, H. 5G core network security issues and attack classification from network protocol perspective. J. Internet Serv. Inf. Secur. 2020, 10, 1–15. [Google Scholar]
  16. Fang, L.; Zhao, B.; Li, Y.; Liu, Z.; Ge, C.; Meng, W. Countermeasure based on smart contracts and AI against DoS/DDoS attack in 5G circumstances. IEEE Netw. 2020, 34, 54–61. [Google Scholar] [CrossRef]
  17. Yoshizawa, T.; Baskaran, S.B.M.; Kunz, A. Overview of 5g urllc system and security aspects in 3gpp. In Proceedings of the 2019 IEEE Conference on Standards for Communications and Networking (CSCN), Granada, Spain, 28–30 October 2019; pp. 1–5. [Google Scholar]
  18. Chen, R.; Li, C.; Yan, S.; Malaney, R.; Yuan, J. Physical layer security for ultra-reliable and low-latency communications. IEEE Wirel. Commun. 2019, 26, 6–11. [Google Scholar] [CrossRef] [Green Version]
  19. Shrivastava, V.K.; Baek, S.; Baek, Y. 5G evolution for multicast and broadcast services in 3GPP release 17. IEEE Commun. Stand. Mag. 2022, 6, 70–76. [Google Scholar] [CrossRef]
  20. Zhang, S.; Wang, Y.; Zhou, W. Towards secure 5G networks: A Survey. Comput. Netw. 2019, 162, 106871. [Google Scholar] [CrossRef]
  21. Park, S.; Cho, H.; Park, Y.; Choi, B.; Kim, D.; Yim, K. Security problems of 5G voice communication. In Proceedings of the Information Security Applications: 21st International Conference, WISA 2020, Jeju Island, Republic of Korea, 26–28 August 2020; Revised Selected Papers 21. Springer: Berlin/Heidelberg, Germany, 2020; pp. 403–415. [Google Scholar]
  22. Zhang, J.; Yang, L.; Cao, W.; Wang, Q. Formal analysis of 5G EAP-TLS authentication protocol using proverif. IEEE Access 2020, 8, 23674–23688. [Google Scholar] [CrossRef]
  23. Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
  24. Chen, H.; Abbas, R.; Cheng, P.; Shirvanimoghaddam, M.; Hardjawana, W.; Bao, W.; Li, Y.; Vucetic, B. Ultra-reliable low latency cellular networks: Use cases, challenges and approaches. IEEE Commun. Mag. 2018, 56, 119–125. [Google Scholar] [CrossRef] [Green Version]
  25. Arianpoo, N.; Aydin, I.; Leung, V.C. Network coding as a performance booster for concurrent multi-path transfer of data in multi-hop wireless networks. IEEE Trans. Mob. Comput. 2016, 16, 1047–1058. [Google Scholar]
  26. Ha, J.; Choi, Y.I. Support of a multi-access session in 5g mobile network. In Proceedings of the 2019 25th Asia-Pacific Conference on Communications (APCC), Ho Chi Minh City, Vietnam, 6–8 November 2019; pp. 378–383. [Google Scholar]
  27. Guo, Z.; Ji, X.; You, W.; Xu, M.; Zhao, Y.; Cheng, Z.; Zhou, D. Delay optimal for reliability-guaranteed concurrent transmissions with raptor code in multi-access 6G edge network. Comput. Netw. 2023, 228, 109716. [Google Scholar] [CrossRef]
  28. Yu, Q.; Li, S.; Raviv, N.; Kalan, S.M.M.; Soltanolkotabi, M.; Avestimehr, S.A. Lagrange coded computing: Optimal design for resiliency, security, and privacy. In Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics, PMLR, Naha, Japan, 16–18 April 2019; pp. 1215–1225. [Google Scholar]
  29. Abbas, R.; Shirvanimoghaddam, M.; Huang, T.; Li, Y.; Vucetic, B. Novel design for short analog fountain codes. IEEE Commun. Lett. 2019, 23, 1306–1309. [Google Scholar] [CrossRef]
  30. Ström, E.G.; Popovski, P.; Sachs, J. 5G ultra-reliable vehicular communication. arXiv 2015, arXiv:1510.01288. [Google Scholar]
  31. Zhao, Y.; Wang, Q.; Qi, X.; Feng, L.; Gao, J.; Yu, P. Research on 5G Multipath Concurrent Transmission System and End to End Delay Measurement. In Proceedings of the 11th International Conference on Computer Engineering and Networks, Dalian, China, 21–22 October 2023. [Google Scholar]
  32. Wang, M.; Liu, J.; Chen, W.; Ephremides, A. Joint queue-aware and channel-aware delay optimal scheduling of arbitrarily bursty traffic over multi-state time-varying channels. IEEE Trans. Commun. 2018, 67, 503–517. [Google Scholar] [CrossRef] [Green Version]
  33. Stavrou, E.; Pitsillides, A. A survey on secure multipath routing protocols in WSNs. Comput. Netw. 2010, 54, 2215–2238. [Google Scholar] [CrossRef]
  34. Dhelim, S.; Aung, N.; Kechadi, M.T.; Ning, H.; Chen, L.; Lakas, A. Trust2Vec: Large-scale IoT trust management system based on signed network embeddings. IEEE Internet Things J. 2022, 10, 553–562. [Google Scholar] [CrossRef]
  35. Beimel, A. Secret-sharing schemes: A survey. In Proceedings of the Coding and Cryptology: Third International Workshop, IWCC 2011, Qingdao, China, 30 May–3 June 2011; Proceedings 3. Springer: Berlin/Heidelberg, Germany, 2011; pp. 11–46. [Google Scholar]
  36. Zhang, P.; Pang, X.; Kumar, N.; Aujla, G.S.; Cao, H. A reliable data-transmission mechanism using blockchain in edge computing scenarios. IEEE Internet Things J. 2020, 9, 14228–14236. [Google Scholar] [CrossRef]
  37. Luby, M. LT codes. In Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science, Vancouver, BC, Canada, 19 November 2002; p. 271. [Google Scholar]
  38. Technical Specification (TS) 29.244, version 18.0.1; Interface between the Control Plane and the User Plane Nodes; 3GPP: Antibes, France, 2022.
  39. Halbawi, W.; Azizan, N.; Salehi, F.; Hassibi, B. Improving distributed gradient descent using reed-solomon codes. In Proceedings of the 2018 IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 17–22 June 2018; pp. 2027–2031. [Google Scholar]
  40. Mannweiler, C.; Gajic, B.; Rost, P.; Ganesan, R.S.; Markwart, C.; Halfmann, R.; Gebert, J.; Wich, A. Reliable and deterministic mobile communications for industry 4.0: Key challenges and solutions for the integration of the 3GPP 5G system with IEEE. In Proceedings of the Mobile Communication-Technologies and Applications, Osnabrueck, Germany, 15–16 May 2019; 24. ITG–Symposium. VDE. pp. 1–6. [Google Scholar]
  41. jay16213, free5gc-org, turtle11311. free5GC. 2022. Available online: https://github.com/free5gc/free5gc (accessed on 3 May 2023).
Figure 1. End-to-end redundant transmission in edge networks: A schematic illustration of MPEN utilizing redundant PDU sessions in an edge network with diversity interface for concurrent multipath transmission.
Figure 1. End-to-end redundant transmission in edge networks: A schematic illustration of MPEN utilizing redundant PDU sessions in an edge network with diversity interface for concurrent multipath transmission.
Entropy 25 00966 g001
Figure 2. This diagram illustrates the transmission model (MPEN) with untrusted paths, which is an extended application of the problem model in [28]. The focus of this paper is to transmit X from the sender to the receiver through N L PDU sessions with low-latency and high-reliability characteristics, despite facing multiple threats. By carefully designing the LERMS strategies, the receiver can collect whole data from a subset of PDU sessions’ messages, even in the presence of failed links ( F 1 , , F f ) and malicious links ( M 1 , , M a ), while also ensuring data privacy from colluding links ( C 1 , , C t ).
Figure 2. This diagram illustrates the transmission model (MPEN) with untrusted paths, which is an extended application of the problem model in [28]. The focus of this paper is to transmit X from the sender to the receiver through N L PDU sessions with low-latency and high-reliability characteristics, despite facing multiple threats. By carefully designing the LERMS strategies, the receiver can collect whole data from a subset of PDU sessions’ messages, even in the presence of failed links ( F 1 , , F f ) and malicious links ( M 1 , , M a ), while also ensuring data privacy from colluding links ( C 1 , , C t ).
Entropy 25 00966 g002
Figure 3. System model: downlink-server flow transmission with joint encoding.
Figure 3. System model: downlink-server flow transmission with joint encoding.
Entropy 25 00966 g003
Figure 4. LERMS concatenated encoder scheme.
Figure 4. LERMS concatenated encoder scheme.
Entropy 25 00966 g004
Figure 5. Untrusted edge network with concatenated encoder check results. In the malicious behaviors matrix: link failures are represented in red, malicious tampering in purple, and eavesdropping in yellow.
Figure 5. Untrusted edge network with concatenated encoder check results. In the malicious behaviors matrix: link failures are represented in red, malicious tampering in purple, and eavesdropping in yellow.
Entropy 25 00966 g005
Figure 6. Effectiveness test of SOME-JE strategy to improve LERMS transmission efficiency. (a) Relationship between aggregation number L and padding probability P . (b) Simulation parameter settings.
Figure 6. Effectiveness test of SOME-JE strategy to improve LERMS transmission efficiency. (a) Relationship between aggregation number L and padding probability P . (b) Simulation parameter settings.
Entropy 25 00966 g006
Figure 7. Optimal delay–reliability trade-off curves.
Figure 7. Optimal delay–reliability trade-off curves.
Entropy 25 00966 g007
Table 1. Basic notations.
Table 1. Basic notations.
SymbolDefinition
P s , P c The source packets, coded packets.
P , E The probability, expectation value.
F , N The finite field, the set of natural numbers.
The data collection operator for receiver.
TThe time span of timeslot.
Ω ( x ) The degree distribution.
gThe block-length of codes.
g [ t ] , γ υ j [ t ] The encoding action within t-th timeslot.
d th The constraints of delay.
BThe upper bounds of g [ t ] .
Z The transmitting side queue buffer size.
ϕ The size of each data packet.
ε υ j = [ ε 1 , , ε j ] The erasure probability of j sessions.
Λ l [ t ] , λ = The number P s arrivals within t-th timeslot for user l.
[ λ l 0 , λ l 1 , , λ l N ] ,The probability distribution of Λ l [ t ] = n .
N L The number of disjoint PDU sessions established in MPEN.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Guo, Z.; Ji, X.; You, W.; Xu, M.; Zhao, Y.; Cheng, Z.; Zhou, D.; Wang, L. LERMS: A Low-Latency and Reliable Downlink Packet-Level Encoding Transmission Method in Untrusted 5GA Edge Network. Entropy 2023, 25, 966. https://doi.org/10.3390/e25070966

AMA Style

Guo Z, Ji X, You W, Xu M, Zhao Y, Cheng Z, Zhou D, Wang L. LERMS: A Low-Latency and Reliable Downlink Packet-Level Encoding Transmission Method in Untrusted 5GA Edge Network. Entropy. 2023; 25(7):966. https://doi.org/10.3390/e25070966

Chicago/Turabian Style

Guo, Zhongfu, Xinsheng Ji, Wei You, Mingyan Xu, Yu Zhao, Zhimo Cheng, Deqiang Zhou, and Lingwei Wang. 2023. "LERMS: A Low-Latency and Reliable Downlink Packet-Level Encoding Transmission Method in Untrusted 5GA Edge Network" Entropy 25, no. 7: 966. https://doi.org/10.3390/e25070966

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop