
Tarik TalebNEC Laboratories Europe | NEC
Tarik Taleb
About
398
Publications
85,093
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
18,124
Citations
Introduction
Skills and Expertise
Publications
Publications (398)
Cloud-native services face unique cybersecurity challenges due to their distributed infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man-in-the-Middle (MITM) attacks. Additionally, these services often process sensitive data that must be protected from unauthorized access. On top of that, the dynamic and scala...
Network slicing in 5G networks can be modeled as a Virtual Network Embedding (VNE) problem, wherein the slice requests must be efficiently mapped on the core network. This process faces two major challenges: covering the maximum number of requests and providing slice isolation. Slice isolation is a mechanism for protecting the slices against Distri...
Device-to-device (D2D) communications underlaid cellular networks have emerged as a promising network architecture to provide extended coverage and high data rate for various Internet of Things (IoT) applications. However, because of the inherent openness and broadcasting nature of wireless communications, such networks face severe risks of data pr...
Multi-services are of fundamental importance in Unmanned Aerial Vehicle (UAV)-enabled aerial communications for the Internet of Things (IoT). However, the multi-services are challenging in terms of requirements and use of shared resources such that the traditional solutions for a single service are unsuitable for the multi-services. In this paper,...
Metaverse is the concept of a fully immersive and universal virtual space for multiuser interaction, collaboration, and socializing; forming the next evolution of the Internet. Metaverse depends on the convergence of multiple broad technologies that enable eXtended Reality (XR), which is an umbrella term for technologies that lie on the reality-vir...
In the era of big data, the unprecedented growth of data has been regarded as an important asset and the commercial application of data acquisition markets has emerged accordingly. With the advancement of vehicle manufacturing and sensor technologies, a large amount of data can be collected and stored in electric vehicles (EV), making the data acqu...
This paper investigates the covert communications via cooperative jamming and relay selection in a wireless relay system, where a source intends to transmit a message to its destination with the help of a selected relay, and a warden attempts to detect the existence of wireless transmissions from both the source and relay, while friendly jammers se...
In optical networks, failure localization is essential to stable operation and service restoration. Several approaches have been presented to achieve accurate failure localization of nodes and inter-nodes. However, due to increasing traffic and demand for flexibility, the reconfigurable optical add/drop multiplexer (ROADM) is evolving towards a mul...
3GPP specified 5G and provided improvements in terms of the system performance and support for the integration of new scenarios for accommodating various vertical segments. The upcoming Release 18 defines “5G Advanced” as a milestone towards 6G, introducing several enhancements in terms of the network architecture, physical layer, new services, sec...
Artificial IntelligenceandMachineLearning (AI/ML) cantransformmobilecommunications,enablenew applications andservices,andpavethewaybeyond5G.The adoption ofAI/MLmayalsoadvancenetworkoptimizations and servicelife-cyclemanagement.Thisarticleprovidesan overviewofAI/MLanalyticsexploringthemainconceptsin relationtonetworkautomationandservice-basedarchite...
Driven by the emerging mission-critical applications, the need for the deterministic networking (DetNet) capabilities of the current network infrastructure is becoming increasingly important, and that is to enable assured bandwidth, latency/jitter and reliability for these services. Recently, the technological advancements of non-terrestrial networ...
This paper explores a new secure wireless communication scenario for the data collection in the Internet of Things (IoT) where the physical layer security technology is applied to counteract both the detection and eavesdropping attacks, such that the critical covertness and secrecy properties of the communication are jointly guaranteed. We first pr...
Nowadays, as the need for capacity continues to grow, entirely novel services are emerging. A solid cloud-network integrated infrastructure is necessary to supply these services in a real-time responsive, and scalable way. Due to their diverse characteristics and limited capacity, communication and computing resources must be collaboratively manage...
Network slicing is envisaged as the key to unlocking revenue growth in 5 G and beyond (B5G) networks. However, the dynamic nature of network slicing and the growing sophistication of DDoS attacks rises the menace of reshaping a stealthy DDoS into an Economical Denial of Sustainability (EDoS) attack. EDoS aims at incurring economic damages to servic...
This paper investigates the covert communications via cooperative jamming and relay selection in a wireless relay system, where a source intends to transmit a message to its destination with the help of a selected relay, and a warden attempts to detect the existence of wireless transmissions from both the source and relay, while friendly jammers se...
The Quantum Internet (QI) is a hypothetical global network infrastructure that exploits quantum mechanics principles to distribute qubits worldwide. The QI will enable breakthrough applications like unconditional security, distributed quantum computing, and quantum metrology. Nonetheless, the QI is currently a research-stage technology with dauntin...
Multi-access Edge Computing (MEC) provides services for resource-sensitive and delay-sensitive Internet of Things (IoT) applications by extending the capabilities of cloud computing to the edge of the networks. However, the high mobility of IoT devices (e.g., vehicles) and the limited resources of edge servers (ESs) affect the service continuity an...
Unmanned Aerial Vehicles (UAVs) are an emerging technology in the 5G and beyond systems with the promise of assisting cellular communications and supporting IoT deployment in remote and density areas. Safe and secure navigation is essential for UAV remote and autonomous deployment. Indeed, the open-source simulator can use commercial software-defin...
Even a wider set of highly critical and latency-sensitive applications with resource needs from the access network and the edge will be supported by the 6G networks. Therefore, the 6G network will deal with diversification of service platforms. Optimizing the resource consumption of network slicing on top of a shared infrastructure will become esse...
With the evolution of 5G networks, the demand for Ultra-Reliable Low Latency Communications (URLLC) services is increasing. Software-Defined Networking (SDN) offers flexible network management to prioritize URLLC services coexisting with best-effort traffic. Utilizing the network programmability feature of SDN, Software-Defined Queueing (SDQ) frame...
The vital importance of securing 5G and beyond networks while meeting their stringent performance requirements has promoted the recent shift towards fully automated and smart security management. In this paper, we introduce a novel autonomic and cognitive security management framework that empowers fine-grained zero-touch security management throug...
We propose DeepDefrag, a model-assisted reinforcement learning for spatio-temporal defragmentation of time-varying virtual networks in a cross-layer optical network testbed, which realizes the efficient utilization of computing nodes and lightpaths by co-optimizing scheduling and embedding with fragment matching, reduces >13.5% cost of computing po...
To address the energy-efficiency issue in Information-Centric Networking (ICN), this article proposes a novel Green ICN design, which adapts the power consumption of network nodes to the optimized utilization level proportionally. By learning over the consumers interactive data traffic pattern/behavior, we introduce a new concept of cross-layer pow...
This paper investigates traffic flow modeling issue in multi-services oriented unmanned aerial vehicle (UAV)-enabled wireless networks, which is critical for supporting future various applications of such networks. We propose a general traffic flow model for multi-services oriented UAV-enable wireless networks. Under this model, we first classify t...
Dynamic Adaptive Streaming over HTTP(DASH) is becoming the defacto method for effective video traffic delivery at large scale.Its primer success factor returns to the full autonomy given to the streaming clients making them smarter and enabling decentralized logic of video quality decision at granular video chunks following a pull-based paradigm. H...
Network Function Virtualization (NFV) and Software Distributed Networking (SDN) technologies play a crucial role in enabling 5G system and beyond. A synergy between these both technologies has been identified for enabling a new concept dubbed service function chains (SFC) that aims to reduce both the capital expenditures (CAPEX) and operating expen...
Artificial Intelligence (AI) is envisioned to play a pivotal role in empowering intelligent, adaptive and autonomous security management in 5G and beyond networks, thanks to its potential to uncover hidden patterns from a large set of time-varying multi-dimensional data, and deliver faster and accurate decisions. Unfortunately, AI's capabilities an...
Network slicing allows different applications and network services to be deployed on virtualized resources running on a common underlying physical infrastructure. Developing a scalable system for the orchestration of end-to-end (E2E) mobile network slices requires careful planning and very reliable algorithms. In this paper, we propose a novel E2E...
Self-driving vehicles are expected to bring many benefits among which enhancing traffic efficiency and relia-bility, and reducing fuel consumption which would have a great economical and environmental impact. The success of this technology heavily relies on the full situational awareness of its surrounding entities. This is achievable only when eve...
We present an architecture for the provision of video Content Delivery Network (CDN) functionality as a service over a multi-domain cloud. We introduce the concept of a CDN slice, that is, a CDN service instance which is created upon a content provider's request, is autonomously managed, and spans multiple potentially heterogeneous edge cloud infra...
The trend towards the cloudification of the 3GPP LTE mobile network architecture and the emergence of federated cloud infrastructures call for alternative service delivery strategies for improved user experience and efficient resource utilization. We propose Follow-Me Cloud (FMC), a design tailored to this environment, but with a broader applicabil...
The adoption of machine learning techniques in next-generation networks has increasingly attracted the attention of the research community. This is to provide adaptive learning and decision-making approaches to meet the requirements of different verticals, and to guarantee the appropriate performance requirements in complex mobility scenarios. In t...
Service Function Chaining (SFC) is a trending paradigm, which has helped to introduce unseen flexibility in telecom networks. Network service providers, as well as big network infrastructure providers, are competing to offer personalized services for their customers. Hence, added value services require the invocation of various elementary functions...
This paper provides an overview of enhanced network services, while emphasizing on the role of Unmanned Aerial Vehicles (UAVs) as core network equipment with radio and backhaul capabilities. Initially, we elaborate the various deployment options, focusing on UAVs as airborne radio, backhaul and core network equipment, pointing out the benefits and...
The past few years have witnessed a remarkable rise in interest in driver-less cars; and naturally, in parallel, the demand for an accurate and reliable object localization and mapping system is higher than ever. Such a system would have to provide its subscribers with precise information within close range. There have been many previous research w...
Given the indispensable need for a reliable network architecture to cope with 5G networks, 3GPP introduced a covet technology dubbed 5G Service Based Architecture (5G-SBA). Meanwhile, Multi-access Edge Computing (MEC) combined with SBA conveys a better experience to end-users by bringing application hosting from centralized data centers down to the...
Through network slicing, different requirements of different applications and services can be met. These requirements can be in terms of latency, bandwidth, mobility support, defining service area, as well as security. Through fine and dynamic tuning of network slices, services can have their delivery platforms constantly customized according to th...
A sophisticated and efficient network slicing architecture is needed to support the orchestration of network slices across multiple administrative domains. Such multi-domain architecture shall be agnostic of the underlying virtualization and network infrastructure technologies. Its objective is to extend the traditional orchestration, management an...
Industry 4.0 aims at shaking the current manufacturing landscape by leveraging the adoption of smart industrial equipment with increased connectivity, sensing, and actuation capabilities. By exploring access to real-time production information and advanced remote control features, servitization of manufacturing firms promises novel added value serv...
The fifth generation (5G) and beyond wireless networks are foreseen to operate in a fully automated manner, in order to fulfill the promise of ultra-short latency, meet the exponentially increasing resource requirements, and offer the quality of experience (QoE) expected from end-users. Among the ingredients involved in such environments, network s...
The consideration of mobile networks as a communication infrastructure for unmanned aerial vehicles (UAVs) creates a new plethora of emerging services and opportunities. In particular, the availability of different mobile network operators (MNOs) can be exploited by the UAVs to steer connection to the MNO ensuring the best quality of experience (Qo...
The increased use of Unmanned Aerial Vehicles (UAVs) in numerous domains will result in high traffic densities in the low-altitude airspace. Consequently, UAVs Traffic Management (UTM) systems that allow the integration of UAVs in the low-altitude airspace are gaining a lot of momentum. Furthermore, the 5th generation of mobile networks (5G) will m...
The use cases of the upcoming 5G mobile networks introduce new and complex user demands that will require support for fast reconfiguration of network resources. Software Defined Network (SDN) is a key technology that can address these requirements, as it decouples the control plane from the data plane of the network devices and logically centralize...
Several solutions have been proposed in the literature to address the Unmanned Aerial Vehicles (UAVs) collision avoidance problem. Most of these solutions consider that the ground controller system (GCS) determines the path of a UAV before starting a particular mission at hand. Furthermore, these solutions expect the occurrence of collisions based...
Cellular-based Unmanned Aerial Vehicle (UAV) systems are a promising paradigm to provide reliable and fast Beyond Visual Line of Sight (BVLoS) communication services for UAV operations. However, such systems are facing a serious GPS spoofing threat for UAV's position. To enable safe and secure UAV navigation BVLoS, this paper proposes a cellular ne...
HTTP Adaptive Streaming (HAS) is becoming the de-facto video delivery technology over best-effort networks nowadays, thanks to the myriad advantages it brings. However, many studies have shown that HAS suffers from many Quality of Experience (QoE)-related issues in the presence of competing players. This is mainly caused by the selfishness of the p...
Network Slicing (NS) is expected to be a key functionality of the upcoming 5G systems. Coupled with Software Defined Networking (SDN) and Network Function Virtualization (NFV),NS will enable a flexible deployment of Network Functions belonging to multiple Service Function Chains (SFC) over a shared infrastructure. To address the complexities that a...
Along with the increasing demand for latencysensitive services and applications, Deterministic Network (DetNet) concept has been recently proposed to investigate deterministic latency assurance for services featured with bounded latency requirements in 5G edge networks. The Network Function Virtualization (NFV) technology enables Internet Service P...
Cellular networks are expected to be the main communication infrastructure to support the expanding applications of Unmanned Aerial Vehicles (UAVs). As these networks are deployed to serve ground User Equipment (UES), several issues need to be addressed to enhance cellular UAVs'services.In this paper, we propose a realistic communication model on t...
In this article, we leverage Network Function Virtualization (NFV) and Multi-Access Edge Computing (MEC) technologies, proposing a system which integrates ICN (Information-Centric Network) with CDN (Content Delivery Network) to provide an efficient content delivery service. The proposed system combines the dynamic CDN slicing concept with the NDN (...
Network Function Virtualization (NFV), network slicing, and Software-Defined Networking (SDN) are the key enablers of the fifth generation of mobile networks (5G). Service Function Chaining (SFC) plays a critical role in delivering sophisticated service per slice and enables traffic traversal through a set of ordered Service Functions (SFs). In ful...
In recent years, the emergence of XR (eXtended Reality) applications, including Holography, Augmented, Virtual and Mixed Reality, has resulted in the creation of rather demanding requirements for Quality of Experience (QoE) and Quality of Service (QoS). In order to cope with requirements such as ultra-low latency and increased bandwidth, it is of p...
This article investigates the covertness and secrecy of wireless communications in an untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base station (BS), a user equipment (UE), and an untrusted relay
${R}$
. For the covertness, we attempt to prevent Willie from detecting the very existence of communications via...
This paper investigates the fundamental rate performances in the highly promising cellular-enabled unmanned aerial vehicle (UAV) swarm networks, which can provide ubiquitous wireless connectivity for supporting various Internet of things (IoT) applications. We first provide the formulations for the sum rate maximization and max-min rate, which are...
The recent technological advances in many fields have significantly contributed to the development of the Advanced Driver Assistance System (ADAS), which in turn will greatly contribute to the flourishing of self-driving vehicles that can operate autonomously in all road scenarios. Until then, keeping the human input in the loop remains vital to ei...
The world is moving towards a fully connected digital world, where objects produce and consume data, at a sultry pace. Autonomous vehicles will play a key role in bolstering the digitization of the world. These connected vehicles must communicate timely data with their surrounding objects and road participants to fully and accurately understand the...
In comparison with cloud computing, edge computing offers processing at locations closer to end devices and reduces the user experienced latency. The new recent paradigm of innetwork computing employs programmable network elements to compute on the path and prior to traffic reaching the edge or cloud servers. It advances common edge/cloud server ba...
Deterministic networking (DetNet) has recently drawn much attention by investigating deterministic flow scheduling. Combined with artificial intelligent (AI) technologies, it can be leveraged as a promising network technology for facilitating automated network configuration in the Industrial Internet of Things (IIoT). However, the stricter requirem...
Emerging XR applications, including Holography, Augmented, Virtual and Mixed Reality, are characterized by unprecedented requirements for Quality of experience (QoE), largely exceeding those currently attainable. To cope with these requirements, noticeable efforts and a number of initiatives are ongoing to enhance the current communications technol...
The management of remote services, such as remote surgery, remote sensing, or remote driving, has become increasingly important, especially with the emerging 5G and Beyond 5G technologies. However, the strict network requirements of these remote services represent one of the major challenges that hinders their fast and large-scale deployment in cri...
Service Function Chaining (SFC) is regarded as an important concept for next-generation communication networks because it can flexibly tackle diverse usage scenarios. Due to SFC requests’ life-cycle and resource adjustment, the distribution of the remaining physical resources may become unbalanced, which brings negative effects to subsequent SFC re...