首页 > 最新文献

IEEE Networking Letters最新文献

英文 中文
DDoS Mitigation in IoT Using Machine Learning and Blockchain Integration 利用机器学习和区块链集成缓解物联网中的 DDoS
Pub Date : 2024-03-18 DOI: 10.1109/LNET.2024.3377355
Ammar Ibrahim El Sayed;Mahmoud Abdelaziz;Mohamed Hussein;Ashraf D. Elbayoumy
The Internet of Things (IoT) has brought about flexible data management and monitoring, but it is increasingly vulnerable to distributed denial-of-service (DDoS) attacks. To counter these threats and bolster IoT device trust and computational capacity, we propose an innovative solution by integrating machine learning (ML) techniques with blockchain as a supporting framework. Analyzing IoT traffic datasets, we reveal the presence of DDoS attacks, highlighting the need for robust defenses. After evaluating multiple ML models, we choose the most effective one and integrate it with blockchain for enhanced detection and mitigation of DDoS threats, reinforcing IoT network security. This approach enhances device resilience, presenting a promising contribution to the secure IoT landscape.
物联网(IoT)带来了灵活的数据管理和监控,但也越来越容易受到分布式拒绝服务(DDoS)攻击。为了应对这些威胁并增强物联网设备的信任和计算能力,我们提出了一种创新解决方案,将机器学习(ML)技术与区块链作为支持框架进行整合。通过分析物联网流量数据集,我们发现了 DDoS 攻击的存在,突出了对强大防御的需求。在对多个 ML 模型进行评估后,我们选择了最有效的模型,并将其与区块链相结合,以增强对 DDoS 威胁的检测和缓解,从而加强物联网网络的安全性。这种方法增强了设备的恢复能力,为物联网安全领域做出了巨大贡献。
{"title":"DDoS Mitigation in IoT Using Machine Learning and Blockchain Integration","authors":"Ammar Ibrahim El Sayed;Mahmoud Abdelaziz;Mohamed Hussein;Ashraf D. Elbayoumy","doi":"10.1109/LNET.2024.3377355","DOIUrl":"https://doi.org/10.1109/LNET.2024.3377355","url":null,"abstract":"The Internet of Things (IoT) has brought about flexible data management and monitoring, but it is increasingly vulnerable to distributed denial-of-service (DDoS) attacks. To counter these threats and bolster IoT device trust and computational capacity, we propose an innovative solution by integrating machine learning (ML) techniques with blockchain as a supporting framework. Analyzing IoT traffic datasets, we reveal the presence of DDoS attacks, highlighting the need for robust defenses. After evaluating multiple ML models, we choose the most effective one and integrate it with blockchain for enhanced detection and mitigation of DDoS threats, reinforcing IoT network security. This approach enhances device resilience, presenting a promising contribution to the secure IoT landscape.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 2","pages":"152-155"},"PeriodicalIF":0.0,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141286739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Enabled Variational Information Bottleneck for IoT Networks 物联网网络的区块链变异信息瓶颈
Pub Date : 2024-03-18 DOI: 10.1109/LNET.2024.3376435
Qiong Wu;Le Kuai;Pingyi Fan;Qiang Fan;Junhui Zhao;Jiangzhou Wang
In Internet of Things (IoT) networks, the amount of data sensed by user devices may be huge, resulting in the serious network congestion. To solve this problem, intelligent data compression is critical. The variational information bottleneck (VIB) approach, combined with machine learning, can be employed to train the encoder and decoder, so that the required transmission data size can be reduced significantly. However, VIB suffers from the computing burden and network insecurity. In this letter, we propose a blockchain-enabled VIB (BVIB) approach to relieve the computing burden while guaranteeing network security. Extensive simulations conducted by Python and C++ demonstrate that BVIB outperforms VIB by 36%, 22% and 57% in terms of time and CPU cycles cost, mutual information, and accuracy under attack, respectively.
在物联网(IoT)网络中,用户设备感知的数据量可能非常巨大,从而导致严重的网络拥塞。要解决这一问题,智能数据压缩至关重要。变异信息瓶颈(VIB)方法与机器学习相结合,可用于训练编码器和解码器,从而大幅减少所需的传输数据大小。然而,VIB 存在计算负担和网络不安全问题。在本文中,我们提出了一种支持区块链的 VIB(BVIB)方法,以减轻计算负担,同时保证网络安全。使用 Python 和 C++ 进行的大量仿真表明,BVIB 在时间和 CPU 周期成本、互信息和攻击下的准确性方面分别比 VIB 高出 36%、22% 和 57%。
{"title":"Blockchain-Enabled Variational Information Bottleneck for IoT Networks","authors":"Qiong Wu;Le Kuai;Pingyi Fan;Qiang Fan;Junhui Zhao;Jiangzhou Wang","doi":"10.1109/LNET.2024.3376435","DOIUrl":"10.1109/LNET.2024.3376435","url":null,"abstract":"In Internet of Things (IoT) networks, the amount of data sensed by user devices may be huge, resulting in the serious network congestion. To solve this problem, intelligent data compression is critical. The variational information bottleneck (VIB) approach, combined with machine learning, can be employed to train the encoder and decoder, so that the required transmission data size can be reduced significantly. However, VIB suffers from the computing burden and network insecurity. In this letter, we propose a blockchain-enabled VIB (BVIB) approach to relieve the computing burden while guaranteeing network security. Extensive simulations conducted by Python and C++ demonstrate that BVIB outperforms VIB by 36%, 22% and 57% in terms of time and CPU cycles cost, mutual information, and accuracy under attack, respectively.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 2","pages":"92-96"},"PeriodicalIF":0.0,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140255059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unlocking Reconfigurability for Deep Reinforcement Learning in SFC Provisioning 在 SFC 配置中释放深度强化学习的可重构性
Pub Date : 2024-03-13 DOI: 10.1109/LNET.2024.3400764
Murat Arda Onsu;Poonam Lohan;Burak Kantarci;Emil Janulewicz;Sergio Slobodrian
Network function virtualization (NFV) is a key foundational technology for 5G and beyond networks, wherein to offer network services, execution of Virtual Network Functions (VNFs) in a defined sequence is crucial for high-quality Service Function Chaining (SFC) provisioning. To provide fast, reliable, and automatic VNFs placement, Machine Learning (ML) algorithms such as Deep Reinforcement Learning (DRL) are widely being investigated. However, due to the requirement of fixed-size inputs in DRL models, these algorithms are highly dependent on network configuration such as the number of data centers (DCs) where VNFs can be placed and the logical connections among DCs. In this letter, a novel approach using the DRL technique is proposed for SFC provisioning which unlocks the reconfigurability of the networks, i.e., the same proposed model can be applied in different network configurations without additional training. Moreover, an advanced Deep Neural Network (DNN) architecture is constructed for DRL with an attention layer that improves the performance of SFC provisioning while considering the efficient resource utilization and the End-to-End (E2E) delay of SFC requests by looking up their priority points. Numerical results demonstrate that the proposed model surpasses the baseline heuristic method with an increase in the overall SFC acceptance ratio by 20.3% and a reduction in resource consumption and E2E delay by 50% and 42.65%, respectively.
网络功能虚拟化(NFV)是 5G 及其后网络的一项关键基础技术,其中,要提供网络服务,按照规定的顺序执行虚拟网络功能(VNF)对于高质量的服务功能链(SFC)配置至关重要。为了提供快速、可靠和自动的 VNF 置放,深度强化学习(DRL)等机器学习(ML)算法正在被广泛研究。然而,由于 DRL 模型需要固定大小的输入,这些算法高度依赖于网络配置,如可放置 VNF 的数据中心(DC)数量和 DC 之间的逻辑连接。在这封信中,我们提出了一种使用 DRL 技术进行 SFC 配置的新方法,该方法释放了网络的可重构性,也就是说,同一拟议模型可应用于不同的网络配置,而无需额外的训练。此外,还为 DRL 构建了一种先进的深度神经网络(DNN)架构,该架构带有一个关注层,通过查找 SFC 请求的优先级点,提高了 SFC 供应的性能,同时还考虑到了资源的有效利用和 SFC 请求的端到端(E2E)延迟。数值结果表明,所提出的模型超越了基线启发式方法,SFC 的总体接受率提高了 20.3%,资源消耗和端到端延迟分别减少了 50% 和 42.65%。
{"title":"Unlocking Reconfigurability for Deep Reinforcement Learning in SFC Provisioning","authors":"Murat Arda Onsu;Poonam Lohan;Burak Kantarci;Emil Janulewicz;Sergio Slobodrian","doi":"10.1109/LNET.2024.3400764","DOIUrl":"https://doi.org/10.1109/LNET.2024.3400764","url":null,"abstract":"Network function virtualization (NFV) is a key foundational technology for 5G and beyond networks, wherein to offer network services, execution of Virtual Network Functions (VNFs) in a defined sequence is crucial for high-quality Service Function Chaining (SFC) provisioning. To provide fast, reliable, and automatic VNFs placement, Machine Learning (ML) algorithms such as Deep Reinforcement Learning (DRL) are widely being investigated. However, due to the requirement of fixed-size inputs in DRL models, these algorithms are highly dependent on network configuration such as the number of data centers (DCs) where VNFs can be placed and the logical connections among DCs. In this letter, a novel approach using the DRL technique is proposed for SFC provisioning which unlocks the reconfigurability of the networks, i.e., the same proposed model can be applied in different network configurations without additional training. Moreover, an advanced Deep Neural Network (DNN) architecture is constructed for DRL with an attention layer that improves the performance of SFC provisioning while considering the efficient resource utilization and the End-to-End (E2E) delay of SFC requests by looking up their priority points. Numerical results demonstrate that the proposed model surpasses the baseline heuristic method with an increase in the overall SFC acceptance ratio by 20.3% and a reduction in resource consumption and E2E delay by 50% and 42.65%, respectively.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 3","pages":"193-197"},"PeriodicalIF":0.0,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142517983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE COMMUNICATIONS SOCIETY IEEE 通信学会
Pub Date : 2024-03-05 DOI: 10.1109/LNET.2024.3365241
{"title":"IEEE COMMUNICATIONS SOCIETY","authors":"","doi":"10.1109/LNET.2024.3365241","DOIUrl":"https://doi.org/10.1109/LNET.2024.3365241","url":null,"abstract":"","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 1","pages":"C2-C2"},"PeriodicalIF":0.0,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10460368","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140042932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Communications Society 电气和电子工程师学会通信协会
Pub Date : 2024-03-05 DOI: 10.1109/LNET.2024.3365245
{"title":"IEEE Communications Society","authors":"","doi":"10.1109/LNET.2024.3365245","DOIUrl":"https://doi.org/10.1109/LNET.2024.3365245","url":null,"abstract":"","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 1","pages":"C3-C3"},"PeriodicalIF":0.0,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10460369","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140042859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Networking Letters Author Guidelines IEEE Networking Letters 作者指南
Pub Date : 2024-03-05 DOI: 10.1109/LNET.2024.3365243
{"title":"IEEE Networking Letters Author Guidelines","authors":"","doi":"10.1109/LNET.2024.3365243","DOIUrl":"https://doi.org/10.1109/LNET.2024.3365243","url":null,"abstract":"","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 1","pages":"75-76"},"PeriodicalIF":0.0,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10460361","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140042913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Admission Shaping With Network Calculus 利用网络微积分进行接纳整形
Pub Date : 2024-03-01 DOI: 10.1109/LNET.2024.3372407
Anne Bouillard
Several techniques can be used for computing deterministic performance bounds in FIFO networks. The most popular one, as far as Network Calculus is concerned, is Total Flow Analysis (TFA). Its advantages are its algorithmic efficiency, acceptable accuracy and adapted to general topologies. However, handling cyclic dependencies is mostly solved for token-bucket arrival curves. Moreover, in many situations, flows are shaped at their admission in a network, and the network analysis does not fully take advantage of it. In this letter, we generalize the approach to piece-wise linear concave arrival curves and to shaping several flows together at their admission into the network. We show through numerical evaluation that the performance bounds are drastically improved.
有几种技术可用于计算先进先出网络中的确定性能界限。就网络计算而言,最常用的是总流量分析法(TFA)。它的优点是算法效率高,精度可接受,并适用于一般拓扑结构。不过,处理循环依赖关系主要是针对令牌桶到达曲线。此外,在很多情况下,流量在进入网络时就已经形成,而网络分析并不能充分利用这一点。在这封信中,我们将这一方法推广到片断线性凹到达曲线,并在多个流量进入网络时对其进行整形。我们通过数值评估表明,性能界限得到了极大改善。
{"title":"Admission Shaping With Network Calculus","authors":"Anne Bouillard","doi":"10.1109/LNET.2024.3372407","DOIUrl":"https://doi.org/10.1109/LNET.2024.3372407","url":null,"abstract":"Several techniques can be used for computing deterministic performance bounds in FIFO networks. The most popular one, as far as Network Calculus is concerned, is Total Flow Analysis (TFA). Its advantages are its algorithmic efficiency, acceptable accuracy and adapted to general topologies. However, handling cyclic dependencies is mostly solved for token-bucket arrival curves. Moreover, in many situations, flows are shaped at their admission in a network, and the network analysis does not fully take advantage of it. In this letter, we generalize the approach to piece-wise linear concave arrival curves and to shaping several flows together at their admission into the network. We show through numerical evaluation that the performance bounds are drastically improved.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 2","pages":"115-118"},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141286615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Near-Perfect Coverage Manifold Estimation in Cellular Networks via Conditional GAN 通过条件 GAN 在蜂窝网络中实现近乎完美的覆盖态势估计
Pub Date : 2024-02-13 DOI: 10.1109/LNET.2024.3365717
Washim Uddin Mondal;Veni Goyal;Satish V. Ukkusuri;Goutam Das;Di Wang;Mohamed-Slim Alouini;Vaneet Aggarwal
This letter presents a conditional generative adversarial network (cGAN) that translates base station location (BSL) information of any Region-of-Interest (RoI) to location-dependent coverage probability values within a subset of that region, called the region-of-evaluation (RoE). We train our network utilizing the BSL data of India, the USA, Germany, and Brazil. In comparison to the state-of-the-art convolutional neural networks (CNNs), our model improves the prediction error ( $L_{1}$ difference between the coverage manifold generated by the network under consideration and that generated via simulation) by two orders of magnitude. Moreover, the cGAN-generated coverage manifolds appear to be almost visually indistinguishable from the ground truth.
本文介绍了一种条件生成对抗网络(cGAN),它能将任何感兴趣区域(RoI)的基站位置(BSL)信息转化为该区域(称为评估区域(RoE))内与位置相关的覆盖概率值。我们利用印度、美国、德国和巴西的 BSL 数据来训练我们的网络。与最先进的卷积神经网络(CNN)相比,我们的模型将预测误差(网络生成的覆盖流形与模拟生成的覆盖流形之间的 $L_1$ 差值)提高了两个数量级。此外,cGAN 生成的覆盖流形在视觉上与地面实况几乎没有区别。
{"title":"Near-Perfect Coverage Manifold Estimation in Cellular Networks via Conditional GAN","authors":"Washim Uddin Mondal;Veni Goyal;Satish V. Ukkusuri;Goutam Das;Di Wang;Mohamed-Slim Alouini;Vaneet Aggarwal","doi":"10.1109/LNET.2024.3365717","DOIUrl":"10.1109/LNET.2024.3365717","url":null,"abstract":"This letter presents a conditional generative adversarial network (cGAN) that translates base station location (BSL) information of any Region-of-Interest (RoI) to location-dependent coverage probability values within a subset of that region, called the region-of-evaluation (RoE). We train our network utilizing the BSL data of India, the USA, Germany, and Brazil. In comparison to the state-of-the-art convolutional neural networks (CNNs), our model improves the prediction error (\u0000<inline-formula> <tex-math>$L_{1}$ </tex-math></inline-formula>\u0000 difference between the coverage manifold generated by the network under consideration and that generated via simulation) by two orders of magnitude. Moreover, the cGAN-generated coverage manifolds appear to be almost visually indistinguishable from the ground truth.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 2","pages":"97-100"},"PeriodicalIF":0.0,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139786554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Greedy Shapley Client Selection for Communication-Efficient Federated Learning 为提高通信效率的联合学习选择贪婪的沙普利客户端
Pub Date : 2024-02-08 DOI: 10.1109/LNET.2024.3363620
Pranava Singhal;Shashi Raj Pandey;Petar Popovski
The standard client selection algorithms for Federated Learning (FL) are often unbiased and involve uniform random sampling of clients. This has been proven sub-optimal for fast convergence under practical settings characterized by significant heterogeneity in data distribution, computing, and communication resources across clients. For applications having timing constraints due to limited communication opportunities with the parameter server (PS), the client selection strategy is critical to complete model training within the fixed budget of communication rounds. To address this, we develop a biased client selection strategy, GreedyFed, that identifies and greedily selects the most contributing clients in each communication round. This method builds on a fast approximation algorithm for the Shapley Value at the PS, making the computation tractable for real-world applications with many clients. Compared to various client selection strategies on several real-world datasets, GreedyFed demonstrates fast and stable convergence with high accuracy under timing constraints and when imposing a higher degree of heterogeneity in data distribution, systems constraints, and privacy requirements.
联邦学习(FL)的标准客户机选择算法通常是无偏的,涉及客户机的均匀随机抽样。这已被证明是在客户端数据分布、计算和通信资源存在显著异质性的实际环境下实现快速收敛的次优方法。对于因与参数服务器(PS)的通信机会有限而受到时间限制的应用,客户端选择策略对于在固定的通信回合预算内完成模型训练至关重要。为了解决这个问题,我们开发了一种有偏差的客户端选择策略--GreedyFed,它能在每轮通信中识别并贪婪地选择贡献最大的客户端。这种方法建立在 PS Shapley 值的快速近似算法基础上,使得计算对于有许多客户端的实际应用变得简单易行。在多个真实世界数据集上,与各种客户端选择策略相比,GreedyFed 在时间限制条件下,以及在数据分布、系统限制和隐私要求方面施加更高的异质性时,都表现出了快速、稳定的收敛性和高准确性。
{"title":"Greedy Shapley Client Selection for Communication-Efficient Federated Learning","authors":"Pranava Singhal;Shashi Raj Pandey;Petar Popovski","doi":"10.1109/LNET.2024.3363620","DOIUrl":"https://doi.org/10.1109/LNET.2024.3363620","url":null,"abstract":"The standard client selection algorithms for Federated Learning (FL) are often unbiased and involve uniform random sampling of clients. This has been proven sub-optimal for fast convergence under practical settings characterized by significant heterogeneity in data distribution, computing, and communication resources across clients. For applications having timing constraints due to limited communication opportunities with the parameter server (PS), the client selection strategy is critical to complete model training within the fixed budget of communication rounds. To address this, we develop a biased client selection strategy, GreedyFed, that identifies and greedily selects the most contributing clients in each communication round. This method builds on a fast approximation algorithm for the Shapley Value at the PS, making the computation tractable for real-world applications with many clients. Compared to various client selection strategies on several real-world datasets, GreedyFed demonstrates fast and stable convergence with high accuracy under timing constraints and when imposing a higher degree of heterogeneity in data distribution, systems constraints, and privacy requirements.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 2","pages":"134-138"},"PeriodicalIF":0.0,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141286637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interval Hyperbolic Localization Based on Iterative Contraction for Cellular Networks 基于迭代收缩的蜂窝网络区间双曲定位
Pub Date : 2024-02-05 DOI: 10.1109/LNET.2024.3362708
Biao Zhou;Xuan Su;Min Pang;Le Yang
Time difference of arrival (TDOA) positioning results obtained using commonly adopted algebraic methods lack uncertainty information. In this letter, we propose to incorporate interval computation into TDOA-based hyperbolic localization and employ an iterative contraction strategy to generate interval positioning results that guarantee to enclose the true solution. With the newly developed algorithm, interval TDOA measurements are considered as interval hyperbolas and partitioned into non-overlapping sets of rectangles using the dichotomy method. The intersection of these rectangles is determined and applied to update the target location interval through an iterative contraction process to shrink the location interval until convergence. Simulations are conducted to evaluate the accuracy, uncertainty and validity of the proposed interval hyperbolic localization algorithm. It is shown that the new algorithm can attain the Cramér-Rao lower bound under high level Gaussian noise and produce, with a probability close to one, positioning intervals enclosing the true target location.
使用通常采用的代数方法获得的到达时间差(TDOA)定位结果缺乏不确定性信息。在这封信中,我们建议将区间计算纳入基于 TDOA 的双曲线定位中,并采用迭代收缩策略生成区间定位结果,以保证包含真实解。在新开发的算法中,区间 TDOA 测量被视为区间双曲线,并使用二分法将其划分为不重叠的矩形集。确定这些矩形的交集后,通过迭代收缩过程更新目标位置区间,缩小位置区间直至收敛。通过仿真来评估所提出的区间双曲定位算法的准确性、不确定性和有效性。结果表明,新算法可以在高水平高斯噪声下达到 Cramér-Rao 下限,并以接近 1 的概率产生包围真实目标位置的定位区间。
{"title":"Interval Hyperbolic Localization Based on Iterative Contraction for Cellular Networks","authors":"Biao Zhou;Xuan Su;Min Pang;Le Yang","doi":"10.1109/LNET.2024.3362708","DOIUrl":"https://doi.org/10.1109/LNET.2024.3362708","url":null,"abstract":"Time difference of arrival (TDOA) positioning results obtained using commonly adopted algebraic methods lack uncertainty information. In this letter, we propose to incorporate interval computation into TDOA-based hyperbolic localization and employ an iterative contraction strategy to generate interval positioning results that guarantee to enclose the true solution. With the newly developed algorithm, interval TDOA measurements are considered as interval hyperbolas and partitioned into non-overlapping sets of rectangles using the dichotomy method. The intersection of these rectangles is determined and applied to update the target location interval through an iterative contraction process to shrink the location interval until convergence. Simulations are conducted to evaluate the accuracy, uncertainty and validity of the proposed interval hyperbolic localization algorithm. It is shown that the new algorithm can attain the Cramér-Rao lower bound under high level Gaussian noise and produce, with a probability close to one, positioning intervals enclosing the true target location.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 2","pages":"87-91"},"PeriodicalIF":0.0,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141286744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Networking Letters
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1