Latest Research

Delayering the business: is breaking up key to telco growth? – TM Forum

This report sets out to explore the benefits – and challenges – of structural separation and delayering, as well as defining those concepts and the specific characteristics of netcos, servcos and infracos. And it provides some case studies of CSPs that have embarked on those processes.

A physical layer security scheme for 6G wireless networks using post-quantum cryptography – Science Direct

This paper presents the design and implementation of an encryption scheme that ensures the confidentiality of data transmission in the physical layer of 6G networks. Our findings indicate that the proposed scheme offers satisfactory security protection against eavesdropping attacks by significantly enhancing the confidentiality of the transmitted signal.

Context-Aware Spectrum Coexistence of Terrestrial Beyond 5G Networks in Satellite Bands – Arxiv

Spectrum sharing between terrestrial 5G and incumbent networks in the satellite bands presents a promising avenue to satisfy the ever-increasing bandwidth demand of the next generation wireless networks. However, protecting incumbent operations from harmful interference poses a fundamental challenge. This paper proposes a context-aware method of managing interference.

6G Architecture Design: from Overall, Logical and Networking Perspective – IEEE

6G Architecture Design: from Overall, Logical and Networking Perspective – IEEE

Architecture determines what and how the network services are provided, as well as the overall system efficiency, scalability, etc. This article proposes high-level designs of the 6G architecture. Three key innovation motivations are analysed and the gaps of 5G network are identified according to the operator’s experience in real large-scale network deployment. Those observations help to generate the key “Design Principles” about the 6G architecture.

Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses – Arxiv

Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses – Arxiv

Edge learning is a new and powerful approach to training models across distributed clients while protecting the privacy of their data.
This approach is expected to be embedded within future network infrastructures, including 6G, to solve challenging problems such as resource management and behaviour prediction. However, edge learning in general, and distributed deep learning, in particular, have been discovered to be susceptible to tampering and manipulation. This survey article provides a holistic review of the most recent research focused on edge learning vulnerabilities and defenses for 6G-enabled IoT.

A Survey on Explainable AI for 6G O-RAN: Architecture, Use Cases, Challenges and Research Directions – IEEE

A Survey on Explainable AI for 6G O-RAN: Architecture, Use Cases, Challenges and Research Directions – IEEE

Aided by Artificial Intelligence (AI) and Machine Learning (ML), novel solutions targeting traditionally unsolved RAN management issues can be devised. Nevertheless, the adoption of such smart and autonomous systems is limited by the current inability of human operators to understand the decision process of such AI/ML solutions, affecting their trust in such novel tools. eXplainable AI (XAI) aims at solving this issue, enabling human users to better understand and effectively manage the emerging generation of artificially intelligent schemes, reducing the human-to machine barrier.

eBPF: A New Approach to Cloud-Native Observability, Networking and Security for Current (5G) and Future Mobile Networks (6G and Beyond) – Rakuten

eBPF: A New Approach to Cloud-Native Observability, Networking and Security for Current (5G) and Future Mobile Networks (6G and Beyond) – Rakuten

Modern mobile communication networks and new service applications are deployed on cloud-native platforms.
Kubernetes (K8s) is the de facto distributed operating system for container orchestration, and the extended version of the Berkeley Packet Filter (eBPF) is to the Linux and Microsoft Windows kernel what JavaScript is to the web browser.
In this paper, we introduce what eBPF is – referring to some of the most important open-source projects (such as Cilium and Calico), books (e.g. the recent one by Liz Rice) and presentations (e.g., the ones by Thomas Graf and his team members at Isovalent) – its potential for Telco cloud, and review some of the most promising pricing and billing models applied to this revolutionary operating system (OS) technology.

The Role of Optical Transport Networks in 6G and Beyond: A Vision and Call to Action – JSAN

The Role of Optical Transport Networks in 6G and Beyond: A Vision and Call to Action – JSAN

The work presented in this paper outlines the role of Optical Transport Networks (OTNs) in future networking generations. Furthermore, key emerging OTN technologies are discussed. Additionally, the role intelligence will play in the Management and Orchestration (MANO) of next-generation OTNs is discussed. Moreover, a set of challenges and opportunities for innovation to guide the development of future OTNs is considered.

eBPF for Telco: A New Approach to Observability, Networking and Security – Rakuten Symphony

eBPF for Telco: A New Approach to Observability, Networking and Security – Rakuten Symphony

Modern mobile communication networks and new service applications are deployed on cloud-native platforms. Kubernetes (K8s) is the de facto distributed operating system for container orchestration, and the extended version of the Berkeley Packet Filter (eBPF) – in Linux (and MS Windows) kernel – is fundamentally changing the approach to cloud-native networking, security, and observability. This white paper from Rakuten Symphony outlines the impact the eBPF could and should have on future networking.

Pin It on Pinterest