2023 Joint European Conference on Networks and Communications &Amp; 6G Summit (EuCNC/6G Summit) 2023
DOI: 10.1109/eucnc/6gsummit58263.2023.10188316
|View full text |Cite
|
Sign up to set email alerts
|

XcARet: XAI based Green Security Architecture for Resilient Open Radio Access Networks in 6G

Pawani Porambage,
Jarno Pinola,
Yasintha Rumesh
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…However, during device operation, the degree of security required may vary depending on the specific use case and user security requirements specified in the SSLA. From an energy-aware perspective, the optimization of security configurations can be integrated with the delivery of recommendations for dynamically adjusting security policies [4]. This adjustment can be based on the availability of energy resources and the network's assessed risk level.…”
Section: Use Case: Energy-aware Ran Slice Sslamentioning
confidence: 99%
See 1 more Smart Citation
“…However, during device operation, the degree of security required may vary depending on the specific use case and user security requirements specified in the SSLA. From an energy-aware perspective, the optimization of security configurations can be integrated with the delivery of recommendations for dynamically adjusting security policies [4]. This adjustment can be based on the availability of energy resources and the network's assessed risk level.…”
Section: Use Case: Energy-aware Ran Slice Sslamentioning
confidence: 99%
“…Considering the aforementioned security considerations and the characteristics of O-RAN architecture, we identify that digital twin (DT) has a greater applicability in guaranteeing the deployment and functioning of a resilient and intelligent RAN in 6G [4]. In this paper, we present a network digital twin (NDT)-based security framework for O-RAN and its applicability for ML model training.…”
Section: Introductionmentioning
confidence: 99%
“…These may entail the access control, authentication, authorization, and accountability processes as well as the maintenance of trust matrices. For instance, in [8] an example is provided to utilize AI training models and explain their behavior for security-related actions to bring more transparent decisions for human-machine interaction in IBN life-cycle management.…”
Section: Ibn In 6gmentioning
confidence: 99%