The concept of Intent-Based Networking (IBN) centers on enhancing user experience by aligning network operations with application usage. IBN is an innovative technology that introduces an abstraction layer, focusing on achieving desired network service outcomes instead of specifying exact configurations. Intent is expressed as a high-level, abstract depiction of a network service, along with relevant attributes. For instance, in an enterprise context, a common intent might read as "The finance department users require strong data security measures." Subsequently, this simplified intent needs to be automatically translated and executed as a network security service, utilizing the available infrastructure. This service involves configuring and deploying multiple network functions, whether in physical appliances or virtualized forms.
With the rise of the Internet of Things (IoT), there has been a significant surge in the number of devices, magnifying their quantity substantially. Furthermore, a notable concern stems from a considerable portion of these IoT devices lacking inherent security features and often running on outdated operating systems with embedded passwords. This vulnerability renders them prone to breaches, potentially establishing unauthorized entry points into critical systems.
Given these challenges, IBN emerges as a plausible solution capable of tackling many of the security and management issues associated with IoT. In this context, various questions come to the forefront. For instance, how can intent be effectively expressed, considering the diverse nature of an IoT network? Secondly, assuming intent has been captured adequately, how can multiple intent expressions be clearly understood? Lastly, assuming intent capture is comprehensive and conflict-free, how can efficient automation of instances be achieved, considering the existing IoT network topology and available resources?
This Research Topic will cover the latest contributions of researchers in, but not limited to, the following topics:
- IoT IBN concepts, architectures, and mechanisms
- IoT IBN enabling techniques: Policy Definition and Abstraction, Intent Translation and Validation, Real-time Monitoring and Telemetry, Machine Learning and AI, Closed-Loop Automation, Continuous Verification and Compliance
- IoT IBN applications and use cases including 5G and beyond and 6G adaptations
- IoT IBN proof-of-concepts, experimentations; report on field trials and real-world deployments
- Availability, resiliency, performance, trust, and security considerations for IoT IBN
- Recent advances in standardization and open sourcing
Keywords:
IoT, IBN, IoT policies, IoT assurance, IoT automation
Important Note:
All contributions to this Research Topic must be within the scope of the section and journal to which they are submitted, as defined in their mission statements. Frontiers reserves the right to guide an out-of-scope manuscript to a more suitable section or journal at any stage of peer review.
The concept of Intent-Based Networking (IBN) centers on enhancing user experience by aligning network operations with application usage. IBN is an innovative technology that introduces an abstraction layer, focusing on achieving desired network service outcomes instead of specifying exact configurations. Intent is expressed as a high-level, abstract depiction of a network service, along with relevant attributes. For instance, in an enterprise context, a common intent might read as "The finance department users require strong data security measures." Subsequently, this simplified intent needs to be automatically translated and executed as a network security service, utilizing the available infrastructure. This service involves configuring and deploying multiple network functions, whether in physical appliances or virtualized forms.
With the rise of the Internet of Things (IoT), there has been a significant surge in the number of devices, magnifying their quantity substantially. Furthermore, a notable concern stems from a considerable portion of these IoT devices lacking inherent security features and often running on outdated operating systems with embedded passwords. This vulnerability renders them prone to breaches, potentially establishing unauthorized entry points into critical systems.
Given these challenges, IBN emerges as a plausible solution capable of tackling many of the security and management issues associated with IoT. In this context, various questions come to the forefront. For instance, how can intent be effectively expressed, considering the diverse nature of an IoT network? Secondly, assuming intent has been captured adequately, how can multiple intent expressions be clearly understood? Lastly, assuming intent capture is comprehensive and conflict-free, how can efficient automation of instances be achieved, considering the existing IoT network topology and available resources?
This Research Topic will cover the latest contributions of researchers in, but not limited to, the following topics:
- IoT IBN concepts, architectures, and mechanisms
- IoT IBN enabling techniques: Policy Definition and Abstraction, Intent Translation and Validation, Real-time Monitoring and Telemetry, Machine Learning and AI, Closed-Loop Automation, Continuous Verification and Compliance
- IoT IBN applications and use cases including 5G and beyond and 6G adaptations
- IoT IBN proof-of-concepts, experimentations; report on field trials and real-world deployments
- Availability, resiliency, performance, trust, and security considerations for IoT IBN
- Recent advances in standardization and open sourcing
Keywords:
IoT, IBN, IoT policies, IoT assurance, IoT automation
Important Note:
All contributions to this Research Topic must be within the scope of the section and journal to which they are submitted, as defined in their mission statements. Frontiers reserves the right to guide an out-of-scope manuscript to a more suitable section or journal at any stage of peer review.