首页 > 最新文献

IEEE Networking Letters最新文献

英文 中文
IEEE Networking Letters Publication Information IEEE Networking Letters 出版信息
Pub Date : 2025-03-18 DOI: 10.1109/LNET.2025.3544420
{"title":"IEEE Networking Letters Publication Information","authors":"","doi":"10.1109/LNET.2025.3544420","DOIUrl":"https://doi.org/10.1109/LNET.2025.3544420","url":null,"abstract":"","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 1","pages":"C2-C2"},"PeriodicalIF":0.0,"publicationDate":"2025-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10931835","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensive Advanced Persistent Threats Dataset 综合高级持续威胁数据集
Pub Date : 2025-03-17 DOI: 10.1109/LNET.2025.3551989
Abdussamad Syed;Boubakr Nour;Makan Pourzandi;Chadi Assi;Mourad Debbabi
Due to the complex nature of Advanced Persistent Threats (APTs) and their rapid evolvement, comprehensive datasets are needed to understand them. However, acquiring such datasets remains a challenge due to the lack of precise reports describing the attacks, realistic emulation, the extensive attack diversity, and concerns regarding data privacy. In this letter, we built a testbed for APTs and implemented 23 campaigns for 12 APTs using MITRE Caldera. For each campaign, we share the adversary profile, the abilities, the low-level telemetries, and the MITRE techniques. By making this comprehensive dataset openly accessible, our work supports academia and industry to strengthen cybersecurity research and develop robust defenses against the constantly evolving APTs.
由于高级持续威胁(apt)的复杂性及其快速演变,需要全面的数据集来了解它们。然而,由于缺乏描述攻击的精确报告、真实的仿真、广泛的攻击多样性以及对数据隐私的担忧,获取此类数据集仍然是一个挑战。在这封信中,我们建立了一个apt测试平台,并使用MITRE Caldera对12个apt实施了23个活动。对于每个战役,我们都会分享对手的资料、能力、低级遥测和MITRE技术。通过使这个全面的数据集公开访问,我们的工作支持学术界和工业界加强网络安全研究,并开发针对不断发展的apt的强大防御。
{"title":"Comprehensive Advanced Persistent Threats Dataset","authors":"Abdussamad Syed;Boubakr Nour;Makan Pourzandi;Chadi Assi;Mourad Debbabi","doi":"10.1109/LNET.2025.3551989","DOIUrl":"https://doi.org/10.1109/LNET.2025.3551989","url":null,"abstract":"Due to the complex nature of Advanced Persistent Threats (APTs) and their rapid evolvement, comprehensive datasets are needed to understand them. However, acquiring such datasets remains a challenge due to the lack of precise reports describing the attacks, realistic emulation, the extensive attack diversity, and concerns regarding data privacy. In this letter, we built a testbed for APTs and implemented 23 campaigns for 12 APTs using MITRE Caldera. For each campaign, we share the adversary profile, the abilities, the low-level telemetries, and the MITRE techniques. By making this comprehensive dataset openly accessible, our work supports academia and industry to strengthen cybersecurity research and develop robust defenses against the constantly evolving APTs.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 2","pages":"150-154"},"PeriodicalIF":0.0,"publicationDate":"2025-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Reinforcement Learning for AoI-Aware UAV-Assisted Networks With RF Energy Harvesting 基于射频能量收集的aoi感知无人机辅助网络的深度强化学习
Pub Date : 2025-03-13 DOI: 10.1109/LNET.2025.3550931
Gaurav Kumar Pandey;Devendra Singh Gurjar;Suneel Yadav;Xingwang Li
This letter considers UAV-assisted data collection from energy-constrained Internet of Things (IoT) devices. Herein, a UAV utilizes radio frequency-based wireless power transfer technique to charge multiple IoT devices or schedules one IoT device to transmit its sensed data. Using the harvested energy, the IoT devices share the collected data with the UAV as per their schedule. For this setup, we aim to minimize IoT devices’ average Age of Information (AoI) by optimally controlling the UAV’s trajectory and scheduling of IoT devices while adhering to the energy consumption limitations of UAV and IoT devices. Considering the dynamic scenario for the considered network, the optimization problem is modeled as a Markov Decision Process and solved through dueling double deep Q-networks (D3QN) algorithm. The simulation results show that the proposed framework outperforms the baseline methods in reducing the average AoI of the IoT devices.
这封信考虑了无人机从能源受限的物联网(IoT)设备中辅助收集数据。在此,无人机利用基于射频的无线电力传输技术为多个物联网设备充电或调度一个物联网设备传输其感测数据。利用收集到的能量,物联网设备按照其时间表与无人机共享收集到的数据。在此设置中,我们的目标是在遵守无人机和物联网设备能耗限制的同时,通过优化控制无人机的轨迹和物联网设备的调度,最小化物联网设备的平均信息年龄(AoI)。考虑到所考虑网络的动态场景,将优化问题建模为马尔可夫决策过程,并通过双深度q网络(D3QN)算法求解。仿真结果表明,该框架在降低物联网设备的平均AoI方面优于基线方法。
{"title":"Deep Reinforcement Learning for AoI-Aware UAV-Assisted Networks With RF Energy Harvesting","authors":"Gaurav Kumar Pandey;Devendra Singh Gurjar;Suneel Yadav;Xingwang Li","doi":"10.1109/LNET.2025.3550931","DOIUrl":"https://doi.org/10.1109/LNET.2025.3550931","url":null,"abstract":"This letter considers UAV-assisted data collection from energy-constrained Internet of Things (IoT) devices. Herein, a UAV utilizes radio frequency-based wireless power transfer technique to charge multiple IoT devices or schedules one IoT device to transmit its sensed data. Using the harvested energy, the IoT devices share the collected data with the UAV as per their schedule. For this setup, we aim to minimize IoT devices’ average Age of Information (AoI) by optimally controlling the UAV’s trajectory and scheduling of IoT devices while adhering to the energy consumption limitations of UAV and IoT devices. Considering the dynamic scenario for the considered network, the optimization problem is modeled as a Markov Decision Process and solved through dueling double deep Q-networks (D3QN) algorithm. The simulation results show that the proposed framework outperforms the baseline methods in reducing the average AoI of the IoT devices.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 2","pages":"88-92"},"PeriodicalIF":0.0,"publicationDate":"2025-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Trust Architecture for Secure IoT Communication in 6G 面向6G安全物联网通信的自适应信任架构
Pub Date : 2025-03-05 DOI: 10.1109/LNET.2025.3566909
Ijaz Ahmad;Shakthi Gimhana;Ijaz Ahmad;Erkki Harjula
This letter presents an adaptive trust architecture that enables secure, low-latency communication in 6G-enabled Internet of Things (IoT) networks, centering around a novel Adaptive Zero Trust Manager (AZTM) deployed at the network edge. Integrating zero trust principles with a lightweight, consensus-free blockchain, AZTM provides real-time authentication and behavior-based trust evaluation while maintaining energy efficiency. It supports secure device communication through dynamic key exchange, eliminating reliance on pre-shared secrets or centralized trust authorities. The system is validated through implementation on resource-constrained IoT devices, demonstrating low-latency performance, resilience to common attacks, and suitability for mission-critical 6G applications such as healthcare, industrial automation, and intelligent transport.
这封信提出了一种自适应信任架构,可以在支持6g的物联网(IoT)网络中实现安全、低延迟的通信,围绕部署在网络边缘的新型自适应零信任管理器(AZTM)。AZTM将零信任原则与轻量级、无共识的区块链集成在一起,在保持能源效率的同时提供实时身份验证和基于行为的信任评估。它通过动态密钥交换支持安全的设备通信,消除了对预共享秘密或集中信任机构的依赖。该系统通过在资源受限的物联网设备上实施来验证,展示了低延迟性能、抗常见攻击的弹性以及对关键任务6G应用(如医疗保健、工业自动化和智能交通)的适用性。
{"title":"Adaptive Trust Architecture for Secure IoT Communication in 6G","authors":"Ijaz Ahmad;Shakthi Gimhana;Ijaz Ahmad;Erkki Harjula","doi":"10.1109/LNET.2025.3566909","DOIUrl":"https://doi.org/10.1109/LNET.2025.3566909","url":null,"abstract":"This letter presents an adaptive trust architecture that enables secure, low-latency communication in 6G-enabled Internet of Things (IoT) networks, centering around a novel Adaptive Zero Trust Manager (AZTM) deployed at the network edge. Integrating zero trust principles with a lightweight, consensus-free blockchain, AZTM provides real-time authentication and behavior-based trust evaluation while maintaining energy efficiency. It supports secure device communication through dynamic key exchange, eliminating reliance on pre-shared secrets or centralized trust authorities. The system is validated through implementation on resource-constrained IoT devices, demonstrating low-latency performance, resilience to common attacks, and suitability for mission-critical 6G applications such as healthcare, industrial automation, and intelligent transport.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 2","pages":"113-116"},"PeriodicalIF":0.0,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10985891","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Communication in Gaussian Multiple Access Wiretap Channels: A Deep Learning and Friendly Jamming Approach 高斯多址窃听信道中的安全通信:一种深度学习和友好干扰方法
Pub Date : 2025-03-01 DOI: 10.1109/LNET.2025.3566243
Sankalp;Lata;Gaurang Sondur;Mahendra K. Shukla;Om Jee Pandey;Maxime Guillaud
The use of deep learning (DL) in communication systems shows great promise, particularly through DL-based physical-layer techniques with autoencoders (AEs) for end-to-end learning. This letter presents an AE-based DL framework to enhance physical-layer security in scenarios where multiple transmitters communicate with the receiver under eavesdropping threats, specifically within a Gaussian multiple-access wiretap channel. A key feature is a friendly jammer that emits a high-power Gaussian signal to disrupt eavesdroppers. The proposed framework is particularly relevant for security-critical applications such as wireless health monitoring systems, where safeguarding sensitive data is paramount. We assess secrecy performance by analyzing the symbol error rate among users in the presence of both an eavesdropper and a jammer. Simulation results show that our DL-based Gaussian jamming strategy significantly improves secrecy performance, effectively safeguarding communications from eavesdropping. This letter highlights the potential of DL techniques to enhance communication security in complex multi-user environments.
在通信系统中使用深度学习(DL)显示出巨大的前景,特别是通过基于深度学习的物理层技术和端到端自动编码器(ae)进行学习。这封信提出了一个基于ae的DL框架,以增强在窃听威胁下多个发射器与接收器通信的场景中的物理层安全性,特别是在高斯多址窃听信道中。一个关键的特点是一个友好的干扰器,它发出一个高功率高斯信号来干扰窃听者。提议的框架特别适用于安全关键型应用,如无线健康监测系统,在这些应用中,保护敏感数据至关重要。我们通过分析在窃听者和干扰者存在的情况下用户之间的符号错误率来评估保密性能。仿真结果表明,基于dl的高斯干扰策略显著提高了保密性能,有效地保护了通信不被窃听。这封信强调了DL技术在复杂的多用户环境中增强通信安全的潜力。
{"title":"Secure Communication in Gaussian Multiple Access Wiretap Channels: A Deep Learning and Friendly Jamming Approach","authors":"Sankalp;Lata;Gaurang Sondur;Mahendra K. Shukla;Om Jee Pandey;Maxime Guillaud","doi":"10.1109/LNET.2025.3566243","DOIUrl":"https://doi.org/10.1109/LNET.2025.3566243","url":null,"abstract":"The use of deep learning (DL) in communication systems shows great promise, particularly through DL-based physical-layer techniques with autoencoders (AEs) for end-to-end learning. This letter presents an AE-based DL framework to enhance physical-layer security in scenarios where multiple transmitters communicate with the receiver under eavesdropping threats, specifically within a Gaussian multiple-access wiretap channel. A key feature is a friendly jammer that emits a high-power Gaussian signal to disrupt eavesdroppers. The proposed framework is particularly relevant for security-critical applications such as wireless health monitoring systems, where safeguarding sensitive data is paramount. We assess secrecy performance by analyzing the symbol error rate among users in the presence of both an eavesdropper and a jammer. Simulation results show that our DL-based Gaussian jamming strategy significantly improves secrecy performance, effectively safeguarding communications from eavesdropping. This letter highlights the potential of DL techniques to enhance communication security in complex multi-user environments.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 2","pages":"78-82"},"PeriodicalIF":0.0,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Resource Optimization for ML-Based UAV Condition Monitoring With Vibration Analysis 基于机器学习的无人机状态监测网络资源优化与振动分析
Pub Date : 2025-02-24 DOI: 10.1109/LNET.2025.3545286
Alexandre Gemayel;Dimitrios Michael Manias;Abdallah Shami
As smart cities begin to materialize, the role of Unmanned Aerial Vehicles (UAVs) and their reliability becomes increasingly important. One aspect of reliability relates to Condition Monitoring (CM), where Machine Learning (ML) models are leveraged to identify abnormal and adverse conditions. Given the resource-constrained nature of next-generation edge networks, the utilization of precious network resources must be minimized. This letter explores the optimization of network resources for ML-based UAV CM frameworks. The developed framework uses experimental data and varies the feature extraction aggregation interval to optimize ML model selection. Additionally, by leveraging dimensionality reduction techniques, there is a 99.9% reduction in network resource consumption.
随着智慧城市的开始实现,无人机(uav)的作用及其可靠性变得越来越重要。可靠性的一个方面与状态监测(CM)有关,其中利用机器学习(ML)模型来识别异常和不利条件。考虑到下一代边缘网络的资源约束特性,必须最大限度地减少宝贵网络资源的利用。本文探讨了基于ml的无人机CM框架的网络资源优化。开发的框架使用实验数据,并改变特征提取聚合间隔来优化机器学习模型选择。此外,通过利用降维技术,网络资源消耗减少了99.9%。
{"title":"Network Resource Optimization for ML-Based UAV Condition Monitoring With Vibration Analysis","authors":"Alexandre Gemayel;Dimitrios Michael Manias;Abdallah Shami","doi":"10.1109/LNET.2025.3545286","DOIUrl":"https://doi.org/10.1109/LNET.2025.3545286","url":null,"abstract":"As smart cities begin to materialize, the role of Unmanned Aerial Vehicles (UAVs) and their reliability becomes increasingly important. One aspect of reliability relates to Condition Monitoring (CM), where Machine Learning (ML) models are leveraged to identify abnormal and adverse conditions. Given the resource-constrained nature of next-generation edge networks, the utilization of precious network resources must be minimized. This letter explores the optimization of network resources for ML-based UAV CM frameworks. The developed framework uses experimental data and varies the feature extraction aggregation interval to optimize ML model selection. Additionally, by leveraging dimensionality reduction techniques, there is a 99.9% reduction in network resource consumption.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 2","pages":"108-112"},"PeriodicalIF":0.0,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2024 Index IEEE Networking Letters Vol. 6 IEEE网络通讯第6卷
Pub Date : 2025-02-24 DOI: 10.1109/LNET.2025.3544938
{"title":"2024 Index IEEE Networking Letters Vol. 6","authors":"","doi":"10.1109/LNET.2025.3544938","DOIUrl":"https://doi.org/10.1109/LNET.2025.3544938","url":null,"abstract":"","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 4","pages":"278-289"},"PeriodicalIF":0.0,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10900739","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143480854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GNNPPOR: A Proximal Policy Optimization Multi-Factor Joint Routing Approach Based on Graph Neural Networks in FANETs GNNPPOR:基于图神经网络的近端策略优化多因素联合路由方法
Pub Date : 2025-02-17 DOI: 10.1109/LNET.2025.3542762
Jian Song;Jing Li;Qingwang Wang;Yebo Gu;Tao Shen
Given the significant challenges of low resource utilization, load imbalance, and difficulties in meeting quality of service requirements in Flying Ad Hoc Networks (FANETs) routing protocols, this letter proposes a Graph Neural Network (GNN)-based approach for proximal policy optimization routing (GNNPPOR). The approach aims to integrate traffic engineering into FANETs to effectively distribute network load and meet quality of service requirements. In GNNPPOR, we design a GNN model that first aggregates multi-dimensional network state information efficiently through a message-passing mechanism. Subsequently, the network state is updated in real-time using a gated recurrent unit to adapt to dynamic changes in the FANETs network state. Finally, a multi-factor joint decision-making approach is proposed to identify suitable routes for each traffic based on the current network state. Simulation results demonstrate that GNNPPOR outperforms existing methods in several key metrics. Specifically, packet delivery rate increased by 25.3%, while energy consumption and network jitter decreased by 12.8% and 24.9%, respectively.
针对飞行自组织网络(FANETs)路由协议中存在的资源利用率低、负载不平衡以及难以满足服务质量要求等问题,提出了一种基于图神经网络(GNN)的近端策略优化路由(GNNPPOR)方法。该方法旨在将流量工程集成到fanet中,以有效地分配网络负载并满足服务质量要求。在GNNPPOR中,我们设计了一个GNN模型,该模型首先通过消息传递机制高效地聚合了多维网络状态信息。随后,利用门控循环单元实时更新网络状态,以适应fanet网络状态的动态变化。最后,提出了一种基于当前网络状态的多因素联合决策方法,为每个流量识别合适的路由。仿真结果表明,GNNPPOR在几个关键指标上优于现有方法。其中,包投递率提高了25.3%,能耗和网络抖动分别降低了12.8%和24.9%。
{"title":"GNNPPOR: A Proximal Policy Optimization Multi-Factor Joint Routing Approach Based on Graph Neural Networks in FANETs","authors":"Jian Song;Jing Li;Qingwang Wang;Yebo Gu;Tao Shen","doi":"10.1109/LNET.2025.3542762","DOIUrl":"https://doi.org/10.1109/LNET.2025.3542762","url":null,"abstract":"Given the significant challenges of low resource utilization, load imbalance, and difficulties in meeting quality of service requirements in Flying Ad Hoc Networks (FANETs) routing protocols, this letter proposes a Graph Neural Network (GNN)-based approach for proximal policy optimization routing (GNNPPOR). The approach aims to integrate traffic engineering into FANETs to effectively distribute network load and meet quality of service requirements. In GNNPPOR, we design a GNN model that first aggregates multi-dimensional network state information efficiently through a message-passing mechanism. Subsequently, the network state is updated in real-time using a gated recurrent unit to adapt to dynamic changes in the FANETs network state. Finally, a multi-factor joint decision-making approach is proposed to identify suitable routes for each traffic based on the current network state. Simulation results demonstrate that GNNPPOR outperforms existing methods in several key metrics. Specifically, packet delivery rate increased by 25.3%, while energy consumption and network jitter decreased by 12.8% and 24.9%, respectively.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 2","pages":"130-134"},"PeriodicalIF":0.0,"publicationDate":"2025-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative AI-Enhanced Task Offloading Strategy for the IoV: An RSU-RSU Load-Balancing Perspective 基于生成ai的车联网任务卸载策略:RSU-RSU负载均衡视角
Pub Date : 2025-02-14 DOI: 10.1109/LNET.2025.3542094
Chao He;Wenhui Jiang;Xing Wang;Wanting Wang;Xin Xie
Due to the Context-aware responses, network behaviors simulation, and edge intelligence formulation, Generative Artificial Intelligence (GAI) has evolved rapidly. Firstly, this letter proposes a Convolutional Neural Network model based on GAI (CNN-GAI) to capture vehicle dynamic characteristics and complete Roadside Unit (RSU) deployment and task offloading decisions. Then, Attention Mechanism Reinforcement Learning (ARL) is used to achieve RSU-RSU Load-balancing. Finally, the load-balancing and utilization ratio of RSU are obtained by combining the model with the actual scenario.
由于上下文感知响应、网络行为模拟和边缘智能制定,生成式人工智能(GAI)得到了迅速发展。首先,本文提出了一种基于GAI的卷积神经网络模型(CNN-GAI)来捕获车辆动态特性并完成路边单元(RSU)的部署和任务卸载决策。然后利用注意机制强化学习(Attention Mechanism Reinforcement Learning, ARL)实现RSU-RSU负载均衡。最后,将模型与实际场景相结合,得到RSU的负载均衡和利用率。
{"title":"Generative AI-Enhanced Task Offloading Strategy for the IoV: An RSU-RSU Load-Balancing Perspective","authors":"Chao He;Wenhui Jiang;Xing Wang;Wanting Wang;Xin Xie","doi":"10.1109/LNET.2025.3542094","DOIUrl":"https://doi.org/10.1109/LNET.2025.3542094","url":null,"abstract":"Due to the Context-aware responses, network behaviors simulation, and edge intelligence formulation, Generative Artificial Intelligence (GAI) has evolved rapidly. Firstly, this letter proposes a Convolutional Neural Network model based on GAI (CNN-GAI) to capture vehicle dynamic characteristics and complete Roadside Unit (RSU) deployment and task offloading decisions. Then, Attention Mechanism Reinforcement Learning (ARL) is used to achieve RSU-RSU Load-balancing. Finally, the load-balancing and utilization ratio of RSU are obtained by combining the model with the actual scenario.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 3","pages":"161-165"},"PeriodicalIF":0.0,"publicationDate":"2025-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145351898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximation Polynomial-Time Algorithms for Consistency-Aware Multi-Server Network Design in Delay-Sensitive Applications 延迟敏感应用中一致性感知多服务器网络设计的近似多项式时间算法
Pub Date : 2025-02-12 DOI: 10.1109/LNET.2025.3541351
Masaki Oda;Akio Kawabata;Eiji Oki
This letter proposes two polynomial-time approximation algorithms for allocating servers to design a consistency-aware multi-server network for delay-sensitive applications. Each algorithm selects servers and determines the main-secondary server pairs to minimize the total delay. Previous work has not provided any polynomial-time algorithm. The proposed algorithms are theoretically guaranteed to output an approximate value within three times the optimal value. Numerical results show that the more computationally efficient of the two algorithms is 46.4 to $5.26 times 10^{4}$ times faster than an integer linear programming technique, while the maximum delay is, on average, merely 1.0196 times the optimal value.
这封信提出了两个多项式时间近似算法分配服务器设计一个一致性感知多服务器网络延迟敏感的应用程序。每个算法选择服务器并确定主从服务器对,以最小化总延迟。以前的工作没有提供任何多项式时间算法。所提出的算法从理论上保证在最优值的三倍内输出近似值。数值结果表明,两种算法的计算效率比整数线性规划技术快46.4 ~ 5.26倍,而最大延迟平均仅为最优值的1.0196倍。
{"title":"Approximation Polynomial-Time Algorithms for Consistency-Aware Multi-Server Network Design in Delay-Sensitive Applications","authors":"Masaki Oda;Akio Kawabata;Eiji Oki","doi":"10.1109/LNET.2025.3541351","DOIUrl":"https://doi.org/10.1109/LNET.2025.3541351","url":null,"abstract":"This letter proposes two polynomial-time approximation algorithms for allocating servers to design a consistency-aware multi-server network for delay-sensitive applications. Each algorithm selects servers and determines the main-secondary server pairs to minimize the total delay. Previous work has not provided any polynomial-time algorithm. The proposed algorithms are theoretically guaranteed to output an approximate value within three times the optimal value. Numerical results show that the more computationally efficient of the two algorithms is 46.4 to <inline-formula> <tex-math>$5.26 times 10^{4}$ </tex-math></inline-formula> times faster than an integer linear programming technique, while the maximum delay is, on average, merely 1.0196 times the optimal value.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 2","pages":"135-139"},"PeriodicalIF":0.0,"publicationDate":"2025-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10883039","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Networking Letters
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1