Pub Date : 2023-04-05DOI: 10.1109/LNET.2023.3264827
Hawa Singh Gurjar;Gaurav Somani
Amplification and reflection attacks represent flavors of DDoS attacks which use servers such as DNS, NTP, SNMP, SSDP and CoAP as amplifier to launch the attacks. In this letter, we describe a method to minimize the effects of reflection and amplification DDoS attacks by separating the victim service under the attack. We propose three approaches involving container level separation, packet limiting, and network hardware level separation. Our detailed experimental results on DNS based amplification attacks show a ‘near-no-attack’ performance with an improvement of up to 88% in the test completion time while using the proposed approaches.
{"title":"Amplification/Reflection Attack Suppression Using Victim Separation","authors":"Hawa Singh Gurjar;Gaurav Somani","doi":"10.1109/LNET.2023.3264827","DOIUrl":"https://doi.org/10.1109/LNET.2023.3264827","url":null,"abstract":"Amplification and reflection attacks represent flavors of DDoS attacks which use servers such as DNS, NTP, SNMP, SSDP and CoAP as amplifier to launch the attacks. In this letter, we describe a method to minimize the effects of reflection and amplification DDoS attacks by separating the victim service under the attack. We propose three approaches involving container level separation, packet limiting, and network hardware level separation. Our detailed experimental results on DNS based amplification attacks show a ‘near-no-attack’ performance with an improvement of up to 88% in the test completion time while using the proposed approaches.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 2","pages":"140-143"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49949967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The centralized-link-scheduling problem in a wireless network graph involves solving the maximum-weighted-independent-set (MWIS) problem on the conflict graph. In this letter, we propose a novel regularized off-policy reinforcement learning-based MWIS solver and use for the scheduling problem. The proposed MWIS algorithm achieves 17% improvement over state-of-the-art heuristic solver KaMIS, 60% over greedy solver, 16% and 17% over RL-based solvers LwD and S2V-DQN, respectively. We show that our scheduler achieves stable throughput values 14% and 22% higher than LwD and a distributed greedy scheduler, respectively. We demonstrate the flexibility of our RL algorithm by modifying it to create a time-since-last-service-aware scheduler.
{"title":"Fast Link Scheduling in Wireless Networks Using Regularized Off-Policy Reinforcement Learning","authors":"Sagnik Bhattacharya;Ayan Banerjee;Subrahmanya Swamy Peruru;Kothapalli Venkata Srinivas","doi":"10.1109/LNET.2023.3264486","DOIUrl":"https://doi.org/10.1109/LNET.2023.3264486","url":null,"abstract":"The centralized-link-scheduling problem in a wireless network graph involves solving the maximum-weighted-independent-set (MWIS) problem on the conflict graph. In this letter, we propose a novel regularized off-policy reinforcement learning-based MWIS solver and use for the scheduling problem. The proposed MWIS algorithm achieves 17% improvement over state-of-the-art heuristic solver KaMIS, 60% over greedy solver, 16% and 17% over RL-based solvers LwD and S2V-DQN, respectively. We show that our scheduler achieves stable throughput values 14% and 22% higher than LwD and a distributed greedy scheduler, respectively. We demonstrate the flexibility of our RL algorithm by modifying it to create a time-since-last-service-aware scheduler.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 2","pages":"86-90"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49978592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-05DOI: 10.1109/LNET.2023.3264622
Marc Jayson Baucas;Petros Spachos
Device monitoring services have increased in popularity with the evolution of recent technology and the continuously increased number of Internet of Things (IoT) devices. Among the popular services are the ones that use device location information. However, these services run into privacy issues due to the nature of data collection and transmission. In this letter, we introduce a platform incorporating Federated Kalman Filter (FKF) with a federated learning approach and private blockchain technology for privacy preservation. We analyze the accuracy of the proposed design against a standard Kalman Filter (KF) implementation of localization based on the Received Signal Strength Indicator (RSSI). The experimental results reveal significant potential for improved data estimation for RSSI-based localization in device monitoring.
{"title":"Federated Kalman Filter for Secure IoT-Based Device Monitoring Services","authors":"Marc Jayson Baucas;Petros Spachos","doi":"10.1109/LNET.2023.3264622","DOIUrl":"https://doi.org/10.1109/LNET.2023.3264622","url":null,"abstract":"Device monitoring services have increased in popularity with the evolution of recent technology and the continuously increased number of Internet of Things (IoT) devices. Among the popular services are the ones that use device location information. However, these services run into privacy issues due to the nature of data collection and transmission. In this letter, we introduce a platform incorporating Federated Kalman Filter (FKF) with a federated learning approach and private blockchain technology for privacy preservation. We analyze the accuracy of the proposed design against a standard Kalman Filter (KF) implementation of localization based on the Received Signal Strength Indicator (RSSI). The experimental results reveal significant potential for improved data estimation for RSSI-based localization in device monitoring.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 2","pages":"91-94"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49978593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-03DOI: 10.1109/LNET.2023.3263926
Farinaz Kooshki;Md Arifur Rahman;Md Munjure Mowla;Ana García Armada;Adam Flizikowski
Existing mobile communication systems are unable to support ultra high system capacity and high reliability for the edge users of future 6G systems, which are envisioned to guarantee the desired quality of experience. Recently, cell-less radio access networks (RAN) are exploited to boost the system capacity. Therefore, in this letter we propose a cell-less networking approach with an efficient radio resource optimization mechanism to improve the system capacity of the future 6G networks. The simulation results illustrate that the proposed cell-less NG-RAN design provides significant system capacity improvement over the legacy cellular solutions.
{"title":"Efficient Radio Resource Management for Future 6G Mobile Networks: A Cell-Less Approach","authors":"Farinaz Kooshki;Md Arifur Rahman;Md Munjure Mowla;Ana García Armada;Adam Flizikowski","doi":"10.1109/LNET.2023.3263926","DOIUrl":"https://doi.org/10.1109/LNET.2023.3263926","url":null,"abstract":"Existing mobile communication systems are unable to support ultra high system capacity and high reliability for the edge users of future 6G systems, which are envisioned to guarantee the desired quality of experience. Recently, cell-less radio access networks (RAN) are exploited to boost the system capacity. Therefore, in this letter we propose a cell-less networking approach with an efficient radio resource optimization mechanism to improve the system capacity of the future 6G networks. The simulation results illustrate that the proposed cell-less NG-RAN design provides significant system capacity improvement over the legacy cellular solutions.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 2","pages":"95-99"},"PeriodicalIF":0.0,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49978591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-31DOI: 10.1109/LNET.2023.3263556
Luis Gustavo Araujo Rodriguez;Daniel Macêdo Batista
Pub/sub messaging is a promising design pattern that relies on a centralized component called the broker, which routes messages to different devices. Due to its prominent role, the broker must be capable of providing high quality services under heavy workload. In this letter, we evaluate the resource consumption of state-of-the-art fuzzing frameworks, thereby understanding the degree to which brokers are tested before deployment. Our results attest that only one framework shows the most promise for memory-intensive testing, outperforming its counterparts by more than 20%. We conclude this letter by highlighting shortcomings that prevent existing frameworks from consuming considerable system resources.
{"title":"Resource-Intensive Fuzzing for MQTT Brokers: State of the Art, Performance Evaluation, and Open Issues","authors":"Luis Gustavo Araujo Rodriguez;Daniel Macêdo Batista","doi":"10.1109/LNET.2023.3263556","DOIUrl":"https://doi.org/10.1109/LNET.2023.3263556","url":null,"abstract":"Pub/sub messaging is a promising design pattern that relies on a centralized component called the broker, which routes messages to different devices. Due to its prominent role, the broker must be capable of providing high quality services under heavy workload. In this letter, we evaluate the resource consumption of state-of-the-art fuzzing frameworks, thereby understanding the degree to which brokers are tested before deployment. Our results attest that only one framework shows the most promise for memory-intensive testing, outperforming its counterparts by more than 20%. We conclude this letter by highlighting shortcomings that prevent existing frameworks from consuming considerable system resources.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 2","pages":"100-104"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49978594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
6G of radio mobile networks should become an essential enabler for any vertical sector to meet sustainable growth targets of both the United Nations (UN) 2030 Agenda and the European Green Deal. 6G might lead to the dematerialization of (most of) any physical appliances, moving their smart parts to the network edge as virtual software instances. Such software instances can leverage on novel carbon-neutral schemes for computing and communication. Owing this vision, this letter aims to analyze how energy- and carbon-awareness can be introduced into the complex architecture of 6G, and how the diverse stakeholders in the 6G value-chain can benefit from this awareness.
{"title":"6G Enablers for Zero-Carbon Network Slices and Vertical Edge Services","authors":"Raffaele Bolla;Roberto Bruschi;Chiara Lombardo;Beatrice Siccardi","doi":"10.1109/LNET.2023.3262861","DOIUrl":"https://doi.org/10.1109/LNET.2023.3262861","url":null,"abstract":"6G of radio mobile networks should become an essential enabler for any vertical sector to meet sustainable growth targets of both the United Nations (UN) 2030 Agenda and the European Green Deal. 6G might lead to the dematerialization of (most of) any physical appliances, moving their smart parts to the network edge as virtual software instances. Such software instances can leverage on novel carbon-neutral schemes for computing and communication. Owing this vision, this letter aims to analyze how energy- and carbon-awareness can be introduced into the complex architecture of 6G, and how the diverse stakeholders in the 6G value-chain can benefit from this awareness.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 3","pages":"173-176"},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/8253410/10261392/10086577.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49979553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Multi-access edge computing (MEC) represents an emerging solution to address the issues related to reliability, availability, context awareness and low latency in modern and future mobile networks. Despite the great interest and effort in developing MEC solutions, only a few works are available in the literature to model the existing trade-offs between available resources and the related performance of MEC nodes. This letter aims to fill this gap by proposing a measurement-based approach to indirectly derive an effective model for any type of MEC node, capable of capturing the existing trade-offs among different performance parameters. Basically, the idea is to characterize the input-output relationship between offered computational and communication load and achievable performance. A network emulator is used to generate the data to define the model. The results provide proof-of-concept of idea by analyzing the different trade-offs and achievable performance of a sample MEC node under CPU and networking limitations.
{"title":"A Framework to Define a Measurement-Based Model of MEC Nodes in the 5G System","authors":"Riccardo Fedrizzi;Cristina Emilia Costa;Fabrizio Granelli","doi":"10.1109/LNET.2023.3262760","DOIUrl":"10.1109/LNET.2023.3262760","url":null,"abstract":"Multi-access edge computing (MEC) represents an emerging solution to address the issues related to reliability, availability, context awareness and low latency in modern and future mobile networks. Despite the great interest and effort in developing MEC solutions, only a few works are available in the literature to model the existing trade-offs between available resources and the related performance of MEC nodes. This letter aims to fill this gap by proposing a measurement-based approach to indirectly derive an effective model for any type of MEC node, capable of capturing the existing trade-offs among different performance parameters. Basically, the idea is to characterize the input-output relationship between offered computational and communication load and achievable performance. A network emulator is used to generate the data to define the model. The results provide proof-of-concept of idea by analyzing the different trade-offs and achievable performance of a sample MEC node under CPU and networking limitations.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 4","pages":"194-198"},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82319016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-29DOI: 10.1109/LNET.2023.3262885
Jianwei Sun;Heng Zhang;Xin Wang;Ming Yang;Jian Zhang;Hongran Li;Chenglong Gong
In this letter, a novel application method of reconfigurable intelligent surfaces (RIS) is proposed, which installs a RIS on an unmanned aerial vehicle (UAV) rather than fixed to buildings. When the location information of the eavesdropper is unknown, the UAV’s rapid deployment and RIS’s ability to change the transmission channel are utilized to dynamically optimize the UAV’s flight trajectory and RIS’s phase shift. The trajectory of the UAV and phase shift of the RIS are optimized to avoid the risk of potential eavesdropping and improve the average downlink secrecy rate of the system. This letter utilizes Q-learning and Deep Q-network (DQN) algorithms to solve the problem. Experiments show that RIS can reduce the flight distance of the UAV on the premise of ensuring security. The scenarios where the two algorithms are applicable are analyzed, and the DQN algorithm is more suitable for the scenarios of large state and action spaces. Also, the experimental results imply that the RIS-assisted UAV improves the average downlink secrecy rate and system security.
{"title":"Leveraging UAV-RIS Reflects to Improve the Security Performance of Wireless Network Systems","authors":"Jianwei Sun;Heng Zhang;Xin Wang;Ming Yang;Jian Zhang;Hongran Li;Chenglong Gong","doi":"10.1109/LNET.2023.3262885","DOIUrl":"https://doi.org/10.1109/LNET.2023.3262885","url":null,"abstract":"In this letter, a novel application method of reconfigurable intelligent surfaces (RIS) is proposed, which installs a RIS on an unmanned aerial vehicle (UAV) rather than fixed to buildings. When the location information of the eavesdropper is unknown, the UAV’s rapid deployment and RIS’s ability to change the transmission channel are utilized to dynamically optimize the UAV’s flight trajectory and RIS’s phase shift. The trajectory of the UAV and phase shift of the RIS are optimized to avoid the risk of potential eavesdropping and improve the average downlink secrecy rate of the system. This letter utilizes Q-learning and Deep Q-network (DQN) algorithms to solve the problem. Experiments show that RIS can reduce the flight distance of the UAV on the premise of ensuring security. The scenarios where the two algorithms are applicable are analyzed, and the DQN algorithm is more suitable for the scenarios of large state and action spaces. Also, the experimental results imply that the RIS-assisted UAV improves the average downlink secrecy rate and system security.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 2","pages":"81-85"},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49978589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-28DOI: 10.1109/LNET.2023.3260567
Zhenyu Zhang;Qin Li;Lu Lu;Da Guo;Yong Zhang
Computing and network convergence (CNC) is a new network architecture based on computing evolution and network integration. Deep Neural Networks (DNNs) inference imposes a heavy computational burden on mobile devices. In this letter, an end-edge-network-cloud (EENC) collaborative inference architecture is proposed to reduce the DNN inference latency and maximize the computing potential of the CNC. A heuristic Centralized DNN Task Offloading algorithm (CDTO) is proposed for the fine-grained partition and scheduling problems of multiple DNN inference tasks. The CDTO algorithm can significantly reduce the makespan of DNN inference tasks and effectively improve the concurrent capacity of DNN tasks.
{"title":"Joint Optimization of the Partition and Scheduling of DNN Tasks in Computing and Network Convergence","authors":"Zhenyu Zhang;Qin Li;Lu Lu;Da Guo;Yong Zhang","doi":"10.1109/LNET.2023.3260567","DOIUrl":"https://doi.org/10.1109/LNET.2023.3260567","url":null,"abstract":"Computing and network convergence (CNC) is a new network architecture based on computing evolution and network integration. Deep Neural Networks (DNNs) inference imposes a heavy computational burden on mobile devices. In this letter, an end-edge-network-cloud (EENC) collaborative inference architecture is proposed to reduce the DNN inference latency and maximize the computing potential of the CNC. A heuristic Centralized DNN Task Offloading algorithm (CDTO) is proposed for the fine-grained partition and scheduling problems of multiple DNN inference tasks. The CDTO algorithm can significantly reduce the makespan of DNN inference tasks and effectively improve the concurrent capacity of DNN tasks.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 2","pages":"130-134"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49949965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-28DOI: 10.1109/LNET.2023.3262704
Wudan Han;Xianbin Wang;Jie Mei
This letter proposes a novel inclusive multi-dimensional resource allocation scheme for diverse 6G communications driven by the principle of Equity, Diversity, and Inclusion (EDI). In coping with challenges of ever-increasing device diversity and application Quality-of-Service (QoS) heterogeneity, the proposed scheme can inclusively support all users with equitable service provisioning satisfaction level and flexible multiple access. By jointly considering user-specific communication requirements and scenario-dependent resource utilization cost, we aim to maximize the average user utility while minimizing its distribution variance. Simulation demonstrates the proposed scheme can inclusively provide equitable user QoS satisfactions by higher average utility with smaller disparity and inequality.
{"title":"EDI-Driven Multi-Dimensional Resource Allocation for Inclusive 6G Communications","authors":"Wudan Han;Xianbin Wang;Jie Mei","doi":"10.1109/LNET.2023.3262704","DOIUrl":"https://doi.org/10.1109/LNET.2023.3262704","url":null,"abstract":"This letter proposes a novel inclusive multi-dimensional resource allocation scheme for diverse 6G communications driven by the principle of Equity, Diversity, and Inclusion (EDI). In coping with challenges of ever-increasing device diversity and application Quality-of-Service (QoS) heterogeneity, the proposed scheme can inclusively support all users with equitable service provisioning satisfaction level and flexible multiple access. By jointly considering user-specific communication requirements and scenario-dependent resource utilization cost, we aim to maximize the average user utility while minimizing its distribution variance. Simulation demonstrates the proposed scheme can inclusively provide equitable user QoS satisfactions by higher average utility with smaller disparity and inequality.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 2","pages":"110-114"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49978596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}