-
TIMESAFE: Timing Interruption Monitoring and Security Assessment for Fronthaul Environments
Authors:
Joshua Groen,
Simone Di Valerio,
Imtiaz Karim,
Davide Villa,
Yiewi Zhang,
Leonardo Bonati,
Michele Polese,
Salvatore D'Oro,
Tommaso Melodia,
Elisa Bertino,
Francesca Cuomo,
Kaushik Chowdhury
Abstract:
5G and beyond cellular systems embrace the disaggregation of Radio Access Network (RAN) components, exemplified by the evolution of the fronthual (FH) connection between cellular baseband and radio unit equipment. Crucially, synchronization over the FH is pivotal for reliable 5G services. In recent years, there has been a push to move these links to an Ethernet-based packet network topology, lever…
▽ More
5G and beyond cellular systems embrace the disaggregation of Radio Access Network (RAN) components, exemplified by the evolution of the fronthual (FH) connection between cellular baseband and radio unit equipment. Crucially, synchronization over the FH is pivotal for reliable 5G services. In recent years, there has been a push to move these links to an Ethernet-based packet network topology, leveraging existing standards and ongoing research for Time-Sensitive Networking (TSN). However, TSN standards, such as Precision Time Protocol (PTP), focus on performance with little to no concern for security. This increases the exposure of the open FH to security risks. Attacks targeting synchronization mechanisms pose significant threats, potentially disrupting 5G networks and impairing connectivity.
In this paper, we demonstrate the impact of successful spoofing and replay attacks against PTP synchronization. We show how a spoofing attack is able to cause a production-ready O-RAN and 5G-compliant private cellular base station to catastrophically fail within 2 seconds of the attack, necessitating manual intervention to restore full network operations. To counter this, we design a Machine Learning (ML)-based monitoring solution capable of detecting various malicious attacks with over 97.5% accuracy.
△ Less
Submitted 17 December, 2024;
originally announced December 2024.
-
Securing O-RAN Open Interfaces
Authors:
Joshua Groen,
Salvatore D'Oro,
Utku Demir,
Leonardo Bonati,
Davide Villa,
Michele Polese,
Tommaso Melodia,
Kaushik Chowdhury
Abstract:
The next generation of cellular networks will be characterized by openness, intelligence, virtualization, and distributed computing. The Open Radio Access Network (Open RAN) framework represents a significant leap toward realizing these ideals, with prototype deployments taking place in both academic and industrial domains. While it holds the potential to disrupt the established vendor lock-ins, O…
▽ More
The next generation of cellular networks will be characterized by openness, intelligence, virtualization, and distributed computing. The Open Radio Access Network (Open RAN) framework represents a significant leap toward realizing these ideals, with prototype deployments taking place in both academic and industrial domains. While it holds the potential to disrupt the established vendor lock-ins, Open RAN's disaggregated nature raises critical security concerns. Safeguarding data and securing interfaces must be integral to Open RAN's design, demanding meticulous analysis of cost/benefit tradeoffs.
In this paper, we embark on the first comprehensive investigation into the impact of encryption on two pivotal Open RAN interfaces: the E2 interface, connecting the base station with a near-real-time RAN Intelligent Controller, and the Open Fronthaul, connecting the Radio Unit to the Distributed Unit. Our study leverages a full-stack O-RAN ALLIANCE compliant implementation within the Colosseum network emulator and a production-ready Open RAN and 5G-compliant private cellular network. This research contributes quantitative insights into the latency introduced and throughput reduction stemming from using various encryption protocols. Furthermore, we present four fundamental principles for constructing security by design within Open RAN systems, offering a roadmap for navigating the intricate landscape of Open RAN security.
△ Less
Submitted 23 April, 2024;
originally announced April 2024.
-
T-PRIME: Transformer-based Protocol Identification for Machine-learning at the Edge
Authors:
Mauro Belgiovine,
Joshua Groen,
Miquel Sirera,
Chinenye Tassie,
Ayberk Yarkın Yıldız,
Sage Trudeau,
Stratis Ioannidis,
Kaushik Chowdhury
Abstract:
Spectrum sharing allows different protocols of the same standard (e.g., 802.11 family) or different standards (e.g., LTE and DVB) to coexist in overlapping frequency bands. As this paradigm continues to spread, wireless systems must also evolve to identify active transmitters and unauthorized waveforms in real time under intentional distortion of preambles, extremely low signal-to-noise ratios and…
▽ More
Spectrum sharing allows different protocols of the same standard (e.g., 802.11 family) or different standards (e.g., LTE and DVB) to coexist in overlapping frequency bands. As this paradigm continues to spread, wireless systems must also evolve to identify active transmitters and unauthorized waveforms in real time under intentional distortion of preambles, extremely low signal-to-noise ratios and challenging channel conditions. We overcome limitations of correlation-based preamble matching methods in such conditions through the design of T-PRIME: a Transformer-based machine learning approach. T-PRIME learns the structural design of transmitted frames through its attention mechanism, looking at sequence patterns that go beyond the preamble alone. The paper makes three contributions: First, it compares Transformer models and demonstrates their superiority over traditional methods and state-of-the-art neural networks. Second, it rigorously analyzes T-PRIME's real-time feasibility on DeepWave's AIR-T platform. Third, it utilizes an extensive 66 GB dataset of over-the-air (OTA) WiFi transmissions for training, which is released along with the code for community use. Results reveal nearly perfect (i.e. $>98\%$) classification accuracy under simulated scenarios, showing $100\%$ detection improvement over legacy methods in low SNR ranges, $97\%$ classification accuracy for OTA single-protocol transmissions and up to $75\%$ double-protocol classification accuracy in interference scenarios.
△ Less
Submitted 4 March, 2024; v1 submitted 9 January, 2024;
originally announced January 2024.
-
From Classification to Optimization: Slicing and Resource Management with TRACTOR
Authors:
Joshua Groen,
Zixian Yang,
Divyadharshini Muruganandham,
Mauro Belgiovine,
Lei Ying,
Kaushik Chowdhury
Abstract:
5G and beyond networks promise advancements in bandwidth, latency, and connectivity. The Open Radio Access Network (O-RAN) framework enhances flexibility through network slicing and closed-loop RAN control. Central to this evolution is integrating machine learning (ML) for dynamic network control. This paper presents a framework to optimize O-RAN operation. First, we build and share a robust O-RAN…
▽ More
5G and beyond networks promise advancements in bandwidth, latency, and connectivity. The Open Radio Access Network (O-RAN) framework enhances flexibility through network slicing and closed-loop RAN control. Central to this evolution is integrating machine learning (ML) for dynamic network control. This paper presents a framework to optimize O-RAN operation. First, we build and share a robust O-RAN dataset from real-world traffic captured across diverse locations and mobility scenarios, replicated within a full-stack srsRAN-based O-RAN system using the Colosseum RF emulator. This dataset supports ML training and deployment. We then introduce a traffic classification approach leveraging various ML models, demonstrating rapid training, testing, and refinement to improve accuracy. With up to 99% offline accuracy and 92% online accuracy for specific slices, our framework adapts efficiently to different models and network conditions. Finally, we present a physical resource block (PRB) assignment optimization strategy using reinforcement learning to refine resource allocation. Our learned policy achieves a mean performance score (0.631), surpassing a manually configured expert policy (0.609) and a random baseline (0.588), demonstrating improved PRB utilization. More importantly, our approach exhibits lower variability, with the Coefficient of Variation (CV) reduced by up to an order of magnitude in three out of four cases, ensuring more consistent performance. Our contributions, including open-source tools and datasets, accelerate O-RAN and ML-driven network control research.
△ Less
Submitted 11 March, 2025; v1 submitted 12 December, 2023;
originally announced December 2023.
-
Implementing and Evaluating Security in O-RAN: Interfaces, Intelligence, and Platforms
Authors:
Joshua Groen,
Salvatore DOro,
Utku Demir,
Leonardo Bonati,
Michele Polese,
Tommaso Melodia,
Kaushik Chowdhury
Abstract:
The Open Radio Access Network (RAN) is a networking paradigm that builds on top of cloud-based, multi-vendor, open and intelligent architectures to shape the next generation of cellular networks for 5G and beyond. While this new paradigm comes with many advantages in terms of observatibility and reconfigurability of the network, it inevitably expands the threat surface of cellular systems and can…
▽ More
The Open Radio Access Network (RAN) is a networking paradigm that builds on top of cloud-based, multi-vendor, open and intelligent architectures to shape the next generation of cellular networks for 5G and beyond. While this new paradigm comes with many advantages in terms of observatibility and reconfigurability of the network, it inevitably expands the threat surface of cellular systems and can potentially expose its components to several cyber attacks, thus making securing O-RAN networks a necessity. In this paper, we explore the security aspects of O-RAN systems by focusing on the specifications and architectures proposed by the O-RAN Alliance. We address the problem of securing O-RAN systems with a holistic perspective, including considerations on the open interfaces used to interconnect the different O-RAN components, on the overall platform, and on the intelligence used to monitor and control the network. For each focus area we identify threats, discuss relevant solutions to address these issues, and demonstrate experimentally how such solutions can effectively defend O-RAN systems against selected cyber attacks. This article is the first work in approaching the security aspect of O-RAN holistically and with experimental evidence obtained on a state-of-the-art programmable O-RAN platform, thus providing unique guideline for researchers in the field.
△ Less
Submitted 25 July, 2024; v1 submitted 21 April, 2023;
originally announced April 2023.
-
Energy-based survival modelling using harmoniums
Authors:
Hylke C. Donker,
Harry J. M. Groen
Abstract:
Survival analysis concerns the study of timeline data where the event of interest may remain unobserved (i.e., censored). Studies commonly record more than one type of event, but conventional survival techniques focus on a single event type. We set out to integrate both multiple independently censored time-to-event variables as well as missing observations. An energy-based approach is taken with a…
▽ More
Survival analysis concerns the study of timeline data where the event of interest may remain unobserved (i.e., censored). Studies commonly record more than one type of event, but conventional survival techniques focus on a single event type. We set out to integrate both multiple independently censored time-to-event variables as well as missing observations. An energy-based approach is taken with a bi-partite structure between latent and visible states, known as harmoniums (or restricted Boltzmann machines). The present harmonium is shown, both theoretically and experimentally, to capture non-linearly separable patterns between distinct time recordings. We illustrate on real world data that, for a single time-to-event variable, our model is on par with established methods. In addition, we demonstrate that discriminative predictions improve by leveraging an extra time-to-event variable. In conclusion, multiple time-to-event variables can be successfully captured within the harmonium paradigm.
△ Less
Submitted 28 February, 2023; v1 submitted 5 October, 2021;
originally announced October 2021.
-
Synthesis of Frame Field-Aligned Multi-Laminar Structures
Authors:
Florian Cyril Stutz,
Tim Felle Olsen,
Jeroen Peter Groen,
Niels Aage,
Ole Sigmund,
Justin Solomon,
Jakob Andreas Bærentzen
Abstract:
In the field of topology optimization, the homogenization approach has been revived as an important alternative to the established, density-based methods because it can represent the microstructural design at a much finer length-scale than the computational grid. The optimal microstructure for a single load case is an orthogonal rank-3 laminate. A rank-3 laminate can be described in terms of frame…
▽ More
In the field of topology optimization, the homogenization approach has been revived as an important alternative to the established, density-based methods because it can represent the microstructural design at a much finer length-scale than the computational grid. The optimal microstructure for a single load case is an orthogonal rank-3 laminate. A rank-3 laminate can be described in terms of frame fields, which are also an important tool for mesh generation in both 2D and 3D.
We propose a method for generating multi-laminar structures from frame fields. Rather than relying on integrative approaches that find a parametrization based on the frame field, we find stream surfaces, represented as point clouds aligned with frame vectors, and we solve an optimization problem to find well-spaced collections of such stream surfaces. The stream surface tracing is unaffected by the presence of singularities outside the region of interest. Neither stream surface tracing nor selecting well-spaced surface rely on combed frame fields.
In addition to stream surface tracing and selection, we provide two methods for generating structures from stream surface collections. One of these methods produces volumetric solids by summing basis functions associated with each point of the stream surface collection. The other method reinterprets point sampled stream surfaces as a spatial twist continuum and produces a hexahedralization by dualizing a graph representing the structure.
We demonstrate our methods on several frame fields produced using the homogenization approach for topology optimization, boundary-aligned, algebraic frame fields, and frame fields computed from closed-form expressions.
△ Less
Submitted 12 April, 2021;
originally announced April 2021.
-
De-homogenization of optimal multi-scale 3D topologies
Authors:
Jeroen Groen,
Florian Stutz,
Niels Aage,
J. Andreas Bærentzen,
Ole Sigmund
Abstract:
This paper presents a highly efficient method to obtain high-resolution, near-optimal 3D topologies optimized for minimum compliance on a standard PC. Using an implicit geometry description we derive a single-scale interpretation of optimal multi-scale designs on a very fine mesh (de-homogenization). By performing homogenization-based topology optimization, optimal multi-scale designs are obtained…
▽ More
This paper presents a highly efficient method to obtain high-resolution, near-optimal 3D topologies optimized for minimum compliance on a standard PC. Using an implicit geometry description we derive a single-scale interpretation of optimal multi-scale designs on a very fine mesh (de-homogenization). By performing homogenization-based topology optimization, optimal multi-scale designs are obtained on a relatively coarse mesh resulting in a low computational cost. As microstructure parameterization we use orthogonal rank-3 microstructures, which are known to be optimal for a single loading case. Furthermore, a method to get explicit control of the minimum feature size and complexity of the final shapes will be discussed. Numerical examples show excellent performance of these fine-scale designs resulting in objective values similar to the homogenization-based designs. Comparisons with well-established density-based topology optimization methods show a reduction in computational cost of 3 orders of magnitude, paving the way for giga-scale designs on a standard PC.
△ Less
Submitted 28 October, 2019;
originally announced October 2019.
-
Simple single-scale microstructures based on optimal rank-3 laminates
Authors:
Erik Träff,
Ole Sigmund,
Jeroen Groen
Abstract:
With the goal of identifying optimal elastic single-scale microstructures for multiple loading situations, the paper shows that qualified starting guesses, based on knowledge of optimal rank-3 laminates, significantly improves chances of convergence to near optimal designs. Rank-3 laminates, optimal for a given set of anisotropic loading conditions, are approximated on a single scale using a simpl…
▽ More
With the goal of identifying optimal elastic single-scale microstructures for multiple loading situations, the paper shows that qualified starting guesses, based on knowledge of optimal rank-3 laminates, significantly improves chances of convergence to near optimal designs. Rank-3 laminates, optimal for a given set of anisotropic loading conditions, are approximated on a single scale using a simple mapping approach. We demonstrate that these mapped microstructures perform relatively close to theoretical energy bounds. Microstructures with performance even closer to the bounds can be obtained by using the approximated rank-3 structures in a further step as starting guesses for inverse homogenization problems. Due to the non-convex nature of inverse homogenization problems, the starting guesses based on rank-3 laminates outperform classical starting guesses with homogeneous or random material distributions. Furthermore, the obtained single-scale microstructures are relatively simple, which enhances manufacturability. Results, obtained for a wide range of loading cases, indicate that microstructures with performance within 5-8% of the theoretical optima can be guarantied, as long as feature sizes are not limited by minimium size constraints.
△ Less
Submitted 11 September, 2018;
originally announced September 2018.
-
Optimization and projection of coated structures with orthotropic infill material
Authors:
Jeroen Groen,
Jun Wu,
Ole Sigmund
Abstract:
The purpose of this work is two-fold. First, we introduce an efficient homogenization-based approach to perform topology optimization of coated structures with orthotropic infill material. By making use of the relaxed design space, we can obtain designs with complex microstructures on a relatively coarse mesh. In the second part of this work, a method is presented to project the homogenization-bas…
▽ More
The purpose of this work is two-fold. First, we introduce an efficient homogenization-based approach to perform topology optimization of coated structures with orthotropic infill material. By making use of the relaxed design space, we can obtain designs with complex microstructures on a relatively coarse mesh. In the second part of this work, a method is presented to project the homogenization-based designs on a fine but realizable scale. A novel method to adaptively refine the lattice structure is presented to allow for a regular spacing of the infill. Numerical experiments show excellent behavior of the projected designs, which perform almost identical to the homogenization-based designs. Furthermore, a reduction in computational cost of at least an order of magnitude is achieved, compared to a related approach in which the infill is optimized using a density-based approach.
△ Less
Submitted 14 August, 2018;
originally announced August 2018.