Diego R. Lopez

Diego R. Lopez
Telefónica I+D | tid · Network Innovation and Virtualization - GCTO Unit

PhD

About

179
Publications
33,762
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,174
Citations
Additional affiliations
November 1992 - December 1999
Centro Informático Científico de Andalucía
Position
  • Head of Network Services

Publications

Publications (179)
Preprint
The proliferation of emergent network applications (e.g., telesurgery, metaverse) is increasing the difficulty of managing modern communication networks. These applications entail stringent network requirements (e.g., ultra-low deterministic latency), which hinders network operators to manage their resources efficiently. In this article, we introdu...
Preprint
Full-text available
With the growing demand for network connectivity and diversity of network applications, one primary challenge that network service providers are facing is managing the commitments for Service Level Agreements~(SLAs). Service providers typically monitor SLAs for management tasks such as improving their service quality, customer billing and future ne...
Preprint
The proliferation of emergent network applications (e.g., AR/VR, telesurgery, real-time communications) is increasing the difficulty of managing modern communication networks. These applications typically have stringent requirements (e.g., ultra-low deterministic latency), making it more difficult for network operators to manage their network resou...
Article
It is widely expected that future networks of 6G and beyond will substantially improve on 5G. Technologies such as Internet of Skills and Industry 4.0 will become stable and viable, as a direct consequence of networks that offer sustained and reliable mobile performance levels. The primary challenges for future technologies are not just low-latency...
Preprint
Full-text available
It is widely expected that future networks of 6G and beyond will deliver on the unachieved goals set by 5G. Technologies such as Internet of Skills and Industry 4.0 will become stable and viable, as a direct consequence of networks that offer sustained and reliable mobile performance levels. The primary challenges for future technologies are not ju...
Article
Full-text available
Network slicing is a powerful paradigm for network operators to support use cases with widely diverse requirements atop a common infrastructure. As 5G standards are completed, and commercial solutions mature, operators need to start thinking about how to integrate network slicing capabilities in their assets, so that customer-facing solutions can b...
Article
Full-text available
Quantum based technologies have been fundamental in our world. After producing the laser and the transistor, the devices that have shaped our modern information society, the possibilities enabled by the ability to create and manipulate individual quantum states opens the door to a second quantum revolution. In this paper we explore the possibilitie...
Article
Full-text available
The specific demands of supply chains built upon large and complex IoT systems, make it a must to design a coordinated framework for cyber resilience provisioning, intended to guarantee trusted supply chains of ICT systems, built upon distributed, dynamic, potentially insecure, and heterogeneous ICT infrastructures. As such, the solution proposed i...
Article
Full-text available
Network Functions Virtualization (NFV) is a key technology for network automation and has been instrumental to materialize the disruptive view of 5G and beyond mobile networks. In particular, 5G embraces NFV to support the automated and agile provision of telecommunication and vertical services as a composition of versatile virtualized components,...
Preprint
Quantum based technologies have been fundamental in our world. After producing the laser and the transistor, the devices that have shaped our modern information society, the possibilities enabled by the ability to create and manipulate individual quantum states opens the door to a second quantum revolution. In this paper we explore the possibilitie...
Preprint
Full-text available
Infrastructure sharing is a widely discussed and implemented approach and is successfully adopted in telecommunications networks today. In practice, it is implemented through prior negotiated Service Level Agreements (SLAs) between the parties involved. However, it is recognised that these agreements are difficult to negotiate, monitor and enforce....
Conference Paper
Full-text available
To fully cope with the requirements of innovative 5G use cases, evolving business models and flexible networking scenarios spanning multiple administrative domains are envisioned. In this context, transparent and trusted frameworks that enable network service providers and infrastructure providers to advertise, negotiate and acquire, in real time,...
Conference Paper
Full-text available
A recently proposed direction that is pursued by standardization organizations for 5G Network Function Virtualization (NFV) technologies at the core of next-generation works (5G and beyond) is the adoption of “Cloud-native” design principles. These principles are catalyzed by Platform as a Service (PaaS) solutions that allow re-usability of common...
Article
The essential propellant for any closed-loop management mechanism is data related to the managed entity. While this is a general evidence, it becomes even more true when dealing with advanced closed-loop systems like the ones supported by Artificial Intelligence (AI), as they require a trustworthy, up-to-date and steady flow of state data to be app...
Technical Report
Full-text available
This white paper on AI and ML as enablers of beyond 5G (B5G) networks is based on contributions from 5G PPP projects that research, implement and validate 5G and B5G network systems. The white paper introduces the main relevant mechanisms in Artificial Intelligence (AI) and Machine Learning (ML), currently investigated and exploited for 5G and B5G...
Preprint
Full-text available
The specific demands inherent to supply chains built upon large IoT systems, make a must the design of a coordinated framework for cyber resilience provisioning intended to guaranteeing trusted supply chains of ICT systems, built upon distributed, dynamic, potentially insecure and heterogeneous ICT infrastructures. As such, the proposed solution is...
Article
Full-text available
This article introduces the key innovations of the 5Growth service platform to empower vertical industries with an AI-driven automated 5G end-to-end slicing solution that allows industries to achieve their service requirements. Specifically, we present multiple vertical pilots (Industry 4.0, transportation, and energy), identify the key 5G requirem...
Article
Network Function Virtualization (NFV) has been regarded as one of the key enablers for the 5th Generation of mobile networks, or 5G. This paradigm allows to reduce the dependence on specialized hardware to deploy telecommunications and vertical services. To this purpose, it relies on virtualization techniques to softwarize network functions, simpli...
Chapter
Network functions virtualization (NFV) is consolidating as one of the base technologies for the design, deployment, and operation of network services. NFV can be seen as a natural evolution of the trend to cloud technologies in IT, and hence perceived as bringing them to the network provider environments. While this can be true for the simplest cas...
Article
Full-text available
We present a demonstration of software defined networking (SDN) services utilizing quantum key distribution (QKD) technology, fully integrated with standard telecommunication network connecting production facilities of Telefonica in Madrid. All communications “co-propagate” over the same fiber infrastructure.
Article
Full-text available
Nowadays, malware has become an epidemic problem. Among the attacks exploiting the computer resources of victims, one that has become usual is related to the massive amounts of computational resources needed for digital currency cryptomining. Cybercriminals steal computer resources from victims, associating these resources to the crypto-currency mi...
Conference Paper
Full-text available
The promise of disparate features envisioned by the 3GPP for 5G, such as offering enhanced Mobile Broadband connectivity while providing massive Machine Type Communications likely with very low data rates and maintaining Ultra Reliable Low Latency Communications requirements, create a very challenging environment for protecting the 5G networks them...
Article
Full-text available
Fifth-generation (5G) networks are envisioned to simultaneously support several services with different connectivity requirements. In this respect, service creation time is a key performance indicator (KPI) for service providers when planning the migration to 5G. For example, the European 5G infrastructure public private partnership (5G-PPP) sugges...
Article
Full-text available
European funded research into the Recursive Inter-Network Architecture (RINA) started with IRATI, which developed an initial prototype implementation for OS/Linux. IRATI was quickly succeeded by the PRISTINE project, which developed different policies, each tailored to specific use cases. Both projects were development-driven, where most experiment...
Conference Paper
The fifth generation (5G) of cellular networks shall host a number of tenants and provide services tailored to meet a wide range of requirements in terms of performance, dependability and security. Network slicing will be a key enabler, by assigning dedicated resources and functionalities to meet such requirements, where the isolation between slice...
Chapter
Data evidence, supported by appropriate measurements and metadata, is an essential component of any autonomous management applicable to next‐generation networks. To make this data evidence usable, different data engineering techniques have to be applied and, given the nature of network infrastructures and the constraints imposed on them, they canno...
Technical Report
Full-text available
The four main 5G sites of 5G-VINNI in UK, Norway, Spain and Greece are now operational. As stated in the project proposal, the target of these 5G sites was to demonstrate 1). that these sites can be accessed and used by vertical industries to set up research trials of innovative use cases and 2). that the key 5G PPP network KPIs can be met. This wh...
Article
Quantum key distribution (QKD) is a physical technology that enables the secure generation of bit streams (keys) in two separated locations. This technology is designed to provide a solution for very secure (quantum-safe) key agreement, which is nowadays at risk due to advances in quantum computing. The recent demonstration of a QKD network in the...
Article
Full-text available
In this paper, we identify the main challenges and problems related with the management and orchestration of Virtualized Network Functions (VNFs) over aerial networks built with Small Unmanned Aerial Vehicles (SUAVs). Our analysis starts from a reference scenario, where several SUAVs are deployed over a delimited geographic area, and provide a mobi...
Article
Quantum computers will change the cryptographic panorama. A technology once believed to lie far away in the future is increasingly closer to real-world applications. Quantum computers will break the algorithms used in our public key infrastructure and in our key exchange protocols, forcing a complete retooling of cryptography as we know it. Quantum...
Preprint
Full-text available
Quantum computers will change the cryptographic panorama. A technology once believed to lay far away into the future is increasingly closer to real world applications. Quantum computers will break the algorithms used in our public key infrastructure and in our key exchange protocols, forcing a complete retooling of the cryptography as we know it. Q...
Article
Full-text available
This paper introduces an approach towards automatic enforcement of security policies in NFV networks and dynamic adaptation to network changes. The approach relies on a refinement model that allows the dynamic transformation of high-level security requirements into configuration settings for the Network Security Functions (NSFs), and optimization m...
Article
Management and orchestration of virtual resources and functions, commonly referred to as MANO, are key functionalities of NFV environments. This article describes the design and deployment of the NFV MANO platform of 5TONIC, the open research and innovation laboratory on 5G technologies founded by Telefonica and IMDEA Networks. This NFV MANO platfo...
Conference Paper
We report on the Madrid Quantum Network, designed to demonstrate that a telecommunications network can also host quantum communications in a unified, logical and physical infrastructure. Using new Quantum Key Distribution systems paired with modern networking paradigms, we demonstrate a high technology readiness level of QKD installing the network...
Conference Paper
Machine Learning (ML) technologies applied to Cybersecurity, especially in the area of network cyber threat detection, are a promising choice, but they require additional research in the applicability of a wide range of available algorithms. Such algorithms usually require training using good-quality and quantitatively significant datasets, which a...
Preprint
Full-text available
Network slicing is considered a key mechanism to serve the multitude of tenants (e.g. vertical industries) targeted by forthcoming 5G systems in a flexible and cost-efficient manner. In this paper, we present a SDN/NFV architecture with multi-tenancy support. This architecture enables a network slice provider to deploy network slice instances for m...
Article
Full-text available
Next-generation systems are anticipated to be digital platforms supporting innovative services with rapidly changing traffic patterns. To cope with this dynamicity in a cost-efficient manner, operators need advanced service management capabilities such as those provided by NFV. NFV enables operators to scale network services with higher granularity...
Article
Full-text available
The nature of network services has drastically changed in recent years. New demands require new capabilities, forcing the infrastructure to dynamically adapt to new scenarios. Novel network paradigms, such as software-defined networking (SDN) and network functions virtualization, have appeared to provide flexibility for network management and servi...
Article
The evolution of the Internet has resulted in the deployment of new application-level solutions to enhance the scalability and efficiency of content dissemination (e.g., content delivery networks and peer-to-peer systems). However, despite of this improvement on performance, the utilization of this type of solutions introduces new security concerns...
Article
Reports on the standards activities of the IEEE Communications Society(ComSoc) The standards development activities are conducted in partnership with the IEEE-Standard Association (SA) Standards Board (SASB), with appropriate, as needed liaison with other standards bodies. The ComSoc Standards Development Board or, in IEEE-SA’s nomenclature, COM/SD...
Conference Paper
Full-text available
Here we demonstrate, for the first time, VPN services integrated within a virtual router using QKD to perform encryption and authentication. Any management operation is also secured using QKD, providing a whole quantum-safe ecosystem.
Article
Given the current expansion of cloud computing, the expected advent of the Internet of Things, and the requirements of future fifth-generation network infrastructures, significantly larger pools of computational and storage resources will soon be required. This emphasizes the need for more scalable data centers that are capable of providing such an...
Chapter
The SDN and NFV architectures heavily rely on specific software modules executed at distributed nodes. These modules may act differently from their expected behaviour due to errors or attacks. Remote attestation is a procedure able to reliably report the software state of a node to a third party. It can be used to evaluate the software integrity of...