2022
DOI: 10.1007/s00500-022-07117-5
|View full text |Cite
|
Sign up to set email alerts
|

A constrained optimization model for the provision of services in a 5G network with multi-level cybersecurity investments

Abstract: In this paper, we present a multi-tiered network-based optimization model describing the provision of services by network slices of 5G-Service providers (e.g. through Unmanned Aerial Vehicles (UAVs) organized as Flying Ad hoc Networks (FANET)), taking into account the security levels of each provider. The three levels of the network consist of the infrastructure layers, which contain resources needed to execute a service, the slices layer, where services are served for the services layer, which represents the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 49 publications
0
4
0
Order By: Relevance
“…In this paper, the static penalty function is used because of its simplicity. The mathematical form of static penalty is shown in (4).…”
Section: B Constraint Handling Techniquementioning
confidence: 99%
See 1 more Smart Citation
“…In this paper, the static penalty function is used because of its simplicity. The mathematical form of static penalty is shown in (4).…”
Section: B Constraint Handling Techniquementioning
confidence: 99%
“…Many engineering practices involve the solution of a constrained optimization problem [1], [2], [3], [4]. A constrained optimization problem (COP) aims at finding the optimal solution of a numerical function (called an objective function) with some equality or inequality constraints.…”
Section: Introductionmentioning
confidence: 99%
“…Some of the recent few literatures based on the multi-level framework protection are given below, The service investment of the cyber security is based on the multi-level cyber security. Thus, Cappello et al (2022) have proposed a method of Flying Ad hoc Networks which establishes the flow of optimal layers of network and also the optimal layers of security in terms of highest providers gain the revenue difference of service sales which is obtained by the cost as well as the resources is retained. However, the implementation of this technique is more complex.…”
Section: Related Workmentioning
confidence: 99%
“…The main objective is to design the network with low-cost of failure nodes for the construction of problem based on constructing the vertex of minimum network. To overcome the demerits from this method several techniques were proposed in past such as flying Ad hoc Networks [Cappello et al (2022)], ADMM [Ma et al (2021)] is used in this research work. However, the suitable solution is not found because of the attack harmfulness.…”
Section: Introductionmentioning
confidence: 99%