首页 > 最新文献

IEEE Networking Letters最新文献

英文 中文
Efficient Regret-Optimal Online Caching 高效后悔最优在线缓存
Pub Date : 2025-01-14 DOI: 10.1109/LNET.2025.3529461
Amrit Rao;Joel Anto Paul;Sharayu Moharir;Nikhil Karamchandani
We focus on the online caching problem with a catalog of N equal-sized files and a cache that can store up to K files at a time. We consider a time-slotted system with the cache receiving one request per slot. We consider two types of request arrival processes: stochastic arrivals, where requests are generated by an i.i.d. process with an unknown distribution, and adversarial arrivals where we make no structural assumptions on the arrival process. We use regret as the performance metric to evaluate caching policies. It is known that Follow the Perturbed Leader (FTPL) has order-optimal regret performance for both stochastic and adversarial arrivals. A key limitation of FTPL is its ${mathcal {O}}{(N)}$ computational complexity, which can be prohibitively large for applications with huge catalogs. To address this, we propose a novel variant of FTPL and show that it has the same regret performance at a significantly lower computational complexity of ${mathcal {O}}{(K)}$ . We supplement our analytical results with simulations using synthetic and trace-based arrivals.
我们专注于在线缓存问题,其中包含N个大小相等的文件的目录和一次最多可以存储K个文件的缓存。我们考虑一个时隙系统,缓存在每个时隙接收一个请求。我们考虑两种类型的请求到达过程:随机到达,其中请求由具有未知分布的i.i.d过程生成,以及对抗性到达,其中我们对到达过程不做结构性假设。我们使用遗憾作为评估缓存策略的性能指标。已知随扰先行者(FTPL)对随机和对抗到达都具有有序最优后悔性能。FTPL的一个关键限制是它的${mathcal {O}}{(N)}$计算复杂性,对于具有巨大目录的应用程序来说,它可能太大了。为了解决这个问题,我们提出了一种新的FTPL变体,并表明它具有相同的遗憾性能,但计算复杂度显著降低${mathcal {O}}{(K)}$。我们用合成的和基于痕迹的到达来补充我们的分析结果。
{"title":"Efficient Regret-Optimal Online Caching","authors":"Amrit Rao;Joel Anto Paul;Sharayu Moharir;Nikhil Karamchandani","doi":"10.1109/LNET.2025.3529461","DOIUrl":"https://doi.org/10.1109/LNET.2025.3529461","url":null,"abstract":"We focus on the online caching problem with a catalog of N equal-sized files and a cache that can store up to K files at a time. We consider a time-slotted system with the cache receiving one request per slot. We consider two types of request arrival processes: stochastic arrivals, where requests are generated by an i.i.d. process with an unknown distribution, and adversarial arrivals where we make no structural assumptions on the arrival process. We use regret as the performance metric to evaluate caching policies. It is known that Follow the Perturbed Leader (FTPL) has order-optimal regret performance for both stochastic and adversarial arrivals. A key limitation of FTPL is its <inline-formula> <tex-math>${mathcal {O}}{(N)}$ </tex-math></inline-formula> computational complexity, which can be prohibitively large for applications with huge catalogs. To address this, we propose a novel variant of FTPL and show that it has the same regret performance at a significantly lower computational complexity of <inline-formula> <tex-math>${mathcal {O}}{(K)}$ </tex-math></inline-formula>. We supplement our analytical results with simulations using synthetic and trace-based arrivals.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 2","pages":"145-149"},"PeriodicalIF":0.0,"publicationDate":"2025-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When to Reach for the Skies? A DRL-Based Routing Framework for Non-Terrestrial Networks 何时到达天空?一种基于drl的非地面网络路由框架
Pub Date : 2025-01-14 DOI: 10.1109/LNET.2025.3529514
Akanksha Sharma;Sharda Tripathi;Sandeep Joshi
Non-terrestrial networks are envisioned to be an integral component of the beyond-fifth-generation wireless communication networks, catering to both conventional and emerging communication applications. In particular, a plethora of use cases are emerging for ultra-reliable low-latency communication, which require dynamic and quality of service compliant frameworks. In this letter, we formulate a binary integer non-linear programming problem to route time-critical traffic through non-terrestrial nodes. As the problem is NP-hard, we propose the solution using a deep reinforcement learning framework, taking into account the interactions between the terrestrial and various non-terrestrial nodes with an end-to-end latency target while maximizing the coverage probability. We perform simulations for multiple latency deadlines and outage thresholds and the results corroborate the efficiency of the proposed framework. Furthermore, we benchmark the proposed framework and show an improvement of 96.31% in coverage while incurring only 3.2% latency violations compared to the state-of-the-art.
非地面网络被设想为第五代以上无线通信网络的一个组成部分,满足传统和新兴通信应用的需求。特别是,超可靠的低延迟通信的大量用例正在出现,这需要动态和服务质量兼容的框架。在这封信中,我们制定了一个二进制整数非线性规划问题,通过非地面节点路由时间关键型流量。由于问题是np困难的,我们提出了使用深度强化学习框架的解决方案,在最大化覆盖概率的同时,考虑到具有端到端延迟目标的地面和各种非地面节点之间的相互作用。我们对多个延迟截止日期和中断阈值进行了模拟,结果证实了所提出框架的有效性。此外,我们对提议的框架进行了基准测试,结果显示,与最先进的框架相比,覆盖率提高了96.31%,而延迟违规仅为3.2%。
{"title":"When to Reach for the Skies? A DRL-Based Routing Framework for Non-Terrestrial Networks","authors":"Akanksha Sharma;Sharda Tripathi;Sandeep Joshi","doi":"10.1109/LNET.2025.3529514","DOIUrl":"https://doi.org/10.1109/LNET.2025.3529514","url":null,"abstract":"Non-terrestrial networks are envisioned to be an integral component of the beyond-fifth-generation wireless communication networks, catering to both conventional and emerging communication applications. In particular, a plethora of use cases are emerging for ultra-reliable low-latency communication, which require dynamic and quality of service compliant frameworks. In this letter, we formulate a binary integer non-linear programming problem to route time-critical traffic through non-terrestrial nodes. As the problem is NP-hard, we propose the solution using a deep reinforcement learning framework, taking into account the interactions between the terrestrial and various non-terrestrial nodes with an end-to-end latency target while maximizing the coverage probability. We perform simulations for multiple latency deadlines and outage thresholds and the results corroborate the efficiency of the proposed framework. Furthermore, we benchmark the proposed framework and show an improvement of 96.31% in coverage while incurring only 3.2% latency violations compared to the state-of-the-art.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 1","pages":"16-20"},"PeriodicalIF":0.0,"publicationDate":"2025-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10841394","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural-Driven Control of RIS in 6G Networks: A GoSimRIS and xApp-Based Framework 6G网络中RIS的神经驱动控制:一个基于GoSimRIS和xapp的框架
Pub Date : 2025-01-09 DOI: 10.1109/LNET.2025.3527683
Salim El Ghalbzouri;Karim Boutiba;Adlen Ksentini;Mustapha Benjillali
In this letter, we propose an O-RAN-based framework for reconfigurable Intelligent Surfaces (RIS) control in 6G. The key objective is to enable the development of RIS control algorithms as xApps running at the real-time intelligent controller (RIC) of Open RAN (O-RAN). To validate the proposed framework, we developed a Golang-based RIS simulator, GoSimRIS, intended to mimic and examine RIS behavior in various environmental scenarios. The simulator is linked with the RIC via a specialized Service Model (SM) devised in this letter, namely E2SM RIS, which allows the design of xApps that dynamically optimize RIS coefficients by computing the ideal phase shifts and applying them in real-time to maximize network performance using channel information that is retrieved from the GoSimRIS environment. Finally, we introduce an ML-based RIS control mechanism that runs as an xApp using only the positions of the transmitter (Tx) and receiver (Rx) and the presence of Line-of-Sight (LOS) conditions, which corresponds to a realistic indoor scenario in 6G such industry 4.0
在这封信中,我们提出了一个基于o - ran的框架,用于6G中可重构智能表面(RIS)控制。关键目标是使RIS控制算法的开发成为在Open RAN (O-RAN)的实时智能控制器(RIC)上运行的xApps。为了验证提出的框架,我们开发了一个基于golang的RIS模拟器GoSimRIS,旨在模拟和检查RIS在各种环境场景中的行为。模拟器通过本信函中设计的专用服务模型(SM)(即E2SM RIS)与RIC相连,该模型允许设计xApps,通过计算理想相移来动态优化RIS系数,并使用从GoSimRIS环境中检索的通道信息实时应用它们以最大化网络性能。最后,我们介绍了一种基于ml的RIS控制机制,该机制作为xApp运行,仅使用发射器(Tx)和接收器(Rx)的位置以及视线(LOS)条件的存在,这对应于6G等工业4.0中的现实室内场景
{"title":"Neural-Driven Control of RIS in 6G Networks: A GoSimRIS and xApp-Based Framework","authors":"Salim El Ghalbzouri;Karim Boutiba;Adlen Ksentini;Mustapha Benjillali","doi":"10.1109/LNET.2025.3527683","DOIUrl":"https://doi.org/10.1109/LNET.2025.3527683","url":null,"abstract":"In this letter, we propose an O-RAN-based framework for reconfigurable Intelligent Surfaces (RIS) control in 6G. The key objective is to enable the development of RIS control algorithms as xApps running at the real-time intelligent controller (RIC) of Open RAN (O-RAN). To validate the proposed framework, we developed a Golang-based RIS simulator, GoSimRIS, intended to mimic and examine RIS behavior in various environmental scenarios. The simulator is linked with the RIC via a specialized Service Model (SM) devised in this letter, namely E2SM RIS, which allows the design of xApps that dynamically optimize RIS coefficients by computing the ideal phase shifts and applying them in real-time to maximize network performance using channel information that is retrieved from the GoSimRIS environment. Finally, we introduce an ML-based RIS control mechanism that runs as an xApp using only the positions of the transmitter (Tx) and receiver (Rx) and the presence of Line-of-Sight (LOS) conditions, which corresponds to a realistic indoor scenario in 6G such industry 4.0","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2025-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical Federated ADMM 分层联邦ADMM
Pub Date : 2025-01-08 DOI: 10.1109/LNET.2025.3527161
Seyed Mohammad Azimi-Abarghouyi;Nicola Bastianello;Karl H. Johansson;Viktoria Fodor
In this letter, we depart from the widely-used gradient descent-based hierarchical federated learning (FL) algorithms to develop a novel hierarchical FL framework based on the alternating direction method of multipliers (ADMM), leveraging a network architecture consisting of a single cloud server and multiple edge servers, where each edge server is dedicated to a specific client set. Within this framework, we propose two novel FL algorithms, which both use ADMM in the top layer: one that employs ADMM in the lower layer and another that uses the conventional gradient descent-based approach. The proposed framework enhances privacy, and experiments demonstrate the superiority of the proposed algorithms compared to the conventional algorithms in terms of learning convergence and accuracy. Additionally, gradient descent on the lower layer performs well even if the number of local steps is very limited, while ADMM on both layers lead to better performance otherwise.
在这封信中,我们脱离了广泛使用的基于梯度下降的分层联邦学习(FL)算法,开发了一种基于乘数交替方向方法(ADMM)的新型分层联邦学习框架,利用由单个云服务器和多个边缘服务器组成的网络架构,其中每个边缘服务器专用于特定的客户端集。在这个框架内,我们提出了两种新的FL算法,它们都在顶层使用ADMM:一种在下层使用ADMM,另一种使用传统的基于梯度下降的方法。该框架增强了隐私性,实验证明了该算法在学习收敛性和准确性方面优于传统算法。此外,即使局部步数非常有限,底层的梯度下降也能表现良好,而两层的ADMM在其他情况下也能带来更好的性能。
{"title":"Hierarchical Federated ADMM","authors":"Seyed Mohammad Azimi-Abarghouyi;Nicola Bastianello;Karl H. Johansson;Viktoria Fodor","doi":"10.1109/LNET.2025.3527161","DOIUrl":"https://doi.org/10.1109/LNET.2025.3527161","url":null,"abstract":"In this letter, we depart from the widely-used gradient descent-based hierarchical federated learning (FL) algorithms to develop a novel hierarchical FL framework based on the alternating direction method of multipliers (ADMM), leveraging a network architecture consisting of a single cloud server and multiple edge servers, where each edge server is dedicated to a specific client set. Within this framework, we propose two novel FL algorithms, which both use ADMM in the top layer: one that employs ADMM in the lower layer and another that uses the conventional gradient descent-based approach. The proposed framework enhances privacy, and experiments demonstrate the superiority of the proposed algorithms compared to the conventional algorithms in terms of learning convergence and accuracy. Additionally, gradient descent on the lower layer performs well even if the number of local steps is very limited, while ADMM on both layers lead to better performance otherwise.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 1","pages":"11-15"},"PeriodicalIF":0.0,"publicationDate":"2025-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10833716","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SGMFuzz: State Guided Mutation Protocol Fuzzing 状态引导突变协议模糊
Pub Date : 2025-01-07 DOI: 10.1109/LNET.2025.3526776
Zhenyu Wen;Jianfeng Yu;Zening Huang;Yiming Wu;Zhen Hong;Rajiv Ranjan
Protocol implementations are fundamental components in network communication systems, and their security is crucial to the overall system. Fuzzing is one of the most popular techniques for detecting vulnerabilities and has been widely applied to the security evaluation of protocol implementations. However, due to the lack of machine-understandable prior knowledge and effective state-guided strategies, existing protocol fuzzing tools tailored for stateful network protocol implementations often suffer from shallow state coverage and generate numerous invalid test cases, thereby impacting the effectiveness of the testing process. In this letter, we introduce SGMFuzz, a grey-box fuzzing tool that combines a state-guided mutation mechanism to detect security vulnerabilities in protocol implementations. SGMFuzz uses the feedback collected during fuzzing to construct a finite-state machine, which aids in a deeper exploration of the program. Additionally, we design a message-aware module to enhance the tool’s ability to generate valid test cases. Our evaluation demonstrates that, compared to the most advanced and widely used network protocol fuzzing tools, SGMFuzz increases the number of discovered execution paths by over 15% on average and improves state transition coverage by over 10%, providing a more comprehensive security assessment of protocol implementations.
协议实现是网络通信系统的基本组成部分,其安全性对整个系统至关重要。模糊测试是最流行的漏洞检测技术之一,已被广泛应用于协议实现的安全评估。然而,由于缺乏机器可理解的先验知识和有效的状态引导策略,现有的为有状态网络协议实现而定制的协议模糊测试工具往往存在状态覆盖较浅的问题,并且会产生大量无效的测试用例,从而影响测试过程的有效性。在这封信中,我们介绍了SGMFuzz,这是一个灰盒模糊测试工具,它结合了状态引导的突变机制来检测协议实现中的安全漏洞。SGMFuzz使用在模糊测试期间收集的反馈来构建有限状态机,这有助于对程序进行更深入的探索。另外,我们设计了一个消息感知模块来增强工具生成有效测试用例的能力。我们的评估表明,与最先进和最广泛使用的网络协议模糊测试工具相比,SGMFuzz平均将发现的执行路径数量增加了15%以上,将状态转换覆盖率提高了10%以上,为协议实现提供了更全面的安全评估。
{"title":"SGMFuzz: State Guided Mutation Protocol Fuzzing","authors":"Zhenyu Wen;Jianfeng Yu;Zening Huang;Yiming Wu;Zhen Hong;Rajiv Ranjan","doi":"10.1109/LNET.2025.3526776","DOIUrl":"https://doi.org/10.1109/LNET.2025.3526776","url":null,"abstract":"Protocol implementations are fundamental components in network communication systems, and their security is crucial to the overall system. Fuzzing is one of the most popular techniques for detecting vulnerabilities and has been widely applied to the security evaluation of protocol implementations. However, due to the lack of machine-understandable prior knowledge and effective state-guided strategies, existing protocol fuzzing tools tailored for stateful network protocol implementations often suffer from shallow state coverage and generate numerous invalid test cases, thereby impacting the effectiveness of the testing process. In this letter, we introduce SGMFuzz, a grey-box fuzzing tool that combines a state-guided mutation mechanism to detect security vulnerabilities in protocol implementations. SGMFuzz uses the feedback collected during fuzzing to construct a finite-state machine, which aids in a deeper exploration of the program. Additionally, we design a message-aware module to enhance the tool’s ability to generate valid test cases. Our evaluation demonstrates that, compared to the most advanced and widely used network protocol fuzzing tools, SGMFuzz increases the number of discovered execution paths by over 15% on average and improves state transition coverage by over 10%, providing a more comprehensive security assessment of protocol implementations.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 1","pages":"71-75"},"PeriodicalIF":0.0,"publicationDate":"2025-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bluetooth Low Energy-Based Novel Power Efficient Buffalo Calving Detection Solution 基于蓝牙低功耗的新型高能效水牛产犊检测解决方案
Pub Date : 2025-01-07 DOI: 10.1109/LNET.2025.3526658
Radhika Raina;Kamal Jeet Singh;Suman Kumar;Sarthak Jain
This letter focuses on tackling the challenge of accurately determining the timing of buffalo calving while prioritizing power efficiency. To achieve this, a novel, compact, lightweight and power efficient device is designed for buffalo comfort and can be conveniently attached to the tail. The device wirelessly transmits data to a gateway using Bluetooth Low Energy (BLE). This functionality becomes particularly crucial when the tail movement increases in the last 12 hrs before calving and is regarded as a key behavioral indicator for predicting the onset of labor. Moreover, when an accelerometer is tied to the buffalo’s tail, the Z axis, which represents the vertical axis perpendicular to ground is anticipated to show the most notable deflections during this period as discussed in the literature. Thus, to conserve power, data is only transmitted when significant tail movement is detected, typically 12 hrs before calving, i.e., when Mean Z >-3 m/ $s^{2}$ . This approach reduces the device’s power consumption, extending its battery life to more than 6.08 years (approx.) using 620 mAh / 3V battery.
这封信的重点是解决在优先考虑能源效率的同时准确确定水牛产犊时间的挑战。为了实现这一目标,一种新颖、紧凑、轻便、节能的装置被设计出来,可以方便地附着在水牛的尾巴上。设备通过蓝牙低功耗(BLE)无线传输数据到网关。在产犊前的最后12小时,当尾巴运动增加时,这种功能变得尤为重要,被认为是预测分娩开始的关键行为指标。此外,当加速度计被绑在水牛的尾巴上时,Z轴(代表垂直于地面的垂直轴)预计会在这段时间内显示出最显著的偏转,如文献中所讨论的那样。因此,为了节省电力,数据仅在检测到明显的尾巴运动时传输,通常是在产犊前12小时,即当Mean Z >-3 m/ $s^{2}$时。这种方法降低了设备的功耗,使用620mah / 3V电池将其电池寿命延长至超过6.08年(大约)。
{"title":"Bluetooth Low Energy-Based Novel Power Efficient Buffalo Calving Detection Solution","authors":"Radhika Raina;Kamal Jeet Singh;Suman Kumar;Sarthak Jain","doi":"10.1109/LNET.2025.3526658","DOIUrl":"https://doi.org/10.1109/LNET.2025.3526658","url":null,"abstract":"This letter focuses on tackling the challenge of accurately determining the timing of buffalo calving while prioritizing power efficiency. To achieve this, a novel, compact, lightweight and power efficient device is designed for buffalo comfort and can be conveniently attached to the tail. The device wirelessly transmits data to a gateway using Bluetooth Low Energy (BLE). This functionality becomes particularly crucial when the tail movement increases in the last 12 hrs before calving and is regarded as a key behavioral indicator for predicting the onset of labor. Moreover, when an accelerometer is tied to the buffalo’s tail, the Z axis, which represents the vertical axis perpendicular to ground is anticipated to show the most notable deflections during this period as discussed in the literature. Thus, to conserve power, data is only transmitted when significant tail movement is detected, typically 12 hrs before calving, i.e., when Mean Z >-3 m/<inline-formula> <tex-math>$s^{2}$ </tex-math></inline-formula>. This approach reduces the device’s power consumption, extending its battery life to more than 6.08 years (approx.) using 620 mAh / 3V battery.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 1","pages":"6-10"},"PeriodicalIF":0.0,"publicationDate":"2025-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Individual Packet Features are a Risk to Model Generalization in ML-Based Intrusion Detection 在基于机器学习的入侵检测中,单个数据包特征对模型泛化存在风险
Pub Date : 2025-01-03 DOI: 10.1109/LNET.2025.3525901
Kahraman Kostas;Mike Just;Michael A. Lones
Machine learning is increasingly employed for intrusion detection in IoT networks. This letter provides the first empirical evidence of the risks associated with modeling network traffic using individual packet features (IPF). Through a comprehensive literature review and novel experimental case studies, we identify critical limitations of IPF, such as information leakage and low data complexity. We offer the first in-depth critique of IPF-based detection systems, highlighting their risks for real-world deployment. Our results demonstrate that IPF-based models can achieve deceptively high detection rates (up to 100% in some cases), but these rates fail to generalize to new datasets, with performance dropping by more than 90% in cross-session tests. These findings underscore the importance of considering packet interactions and contextual information, rather than relying solely on IPF, for developing robust and reliable intrusion detection systems in IoT environments.
机器学习越来越多地用于物联网网络的入侵检测。这封信提供了与使用单个数据包特征(IPF)建模网络流量相关的风险的第一个经验证据。通过全面的文献综述和新颖的实验案例研究,我们确定了IPF的关键局限性,如信息泄露和低数据复杂性。我们首次对基于ipf的检测系统进行了深入的批评,强调了它们在实际部署中的风险。我们的研究结果表明,基于ipf的模型可以实现看似很高的检测率(在某些情况下高达100%),但这些率无法推广到新数据集,在跨会话测试中性能下降超过90%。这些发现强调了在物联网环境中开发健壮可靠的入侵检测系统时,考虑数据包交互和上下文信息的重要性,而不是仅仅依赖于IPF。
{"title":"Individual Packet Features are a Risk to Model Generalization in ML-Based Intrusion Detection","authors":"Kahraman Kostas;Mike Just;Michael A. Lones","doi":"10.1109/LNET.2025.3525901","DOIUrl":"https://doi.org/10.1109/LNET.2025.3525901","url":null,"abstract":"Machine learning is increasingly employed for intrusion detection in IoT networks. This letter provides the first empirical evidence of the risks associated with modeling network traffic using individual packet features (IPF). Through a comprehensive literature review and novel experimental case studies, we identify critical limitations of IPF, such as information leakage and low data complexity. We offer the first in-depth critique of IPF-based detection systems, highlighting their risks for real-world deployment. Our results demonstrate that IPF-based models can achieve deceptively high detection rates (up to 100% in some cases), but these rates fail to generalize to new datasets, with performance dropping by more than 90% in cross-session tests. These findings underscore the importance of considering packet interactions and contextual information, rather than relying solely on IPF, for developing robust and reliable intrusion detection systems in IoT environments.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 1","pages":"66-70"},"PeriodicalIF":0.0,"publicationDate":"2025-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum-Safe Blockchain in Hyperledger Fabric 超级账本结构中的量子安全区块链
Pub Date : 2024-12-26 DOI: 10.1109/LNET.2024.3522966
Shahroz Abbas;Ajmery Sultana;Georges Kaddoum
With the advances of quantum computing the security of existing cryptographic frameworks is increasingly at risk. Accordingly, in the present study, we investigate the integration of post-quantum cryptographic algorithms into Hyperledger Fabric, a blockchain framework, to safeguard it against emerging quantum threats. To this end, a modified Cryptogen tool was developed to generate X.509 certificates with both classical and post-quantum cryptographic keys. Furthermore, using tools like Hyperledger Caliper and Prometheus for empirical analysis, we demonstrate that this hybrid approach effectively strengthens security without affecting system performance. These results not only improve the security of Hyperledger Fabric, but also offer a practical guide for adding post-quantum cryptography to blockchain technologies.
随着量子计算的发展,现有密码框架的安全性面临越来越大的风险。因此,在本研究中,我们研究了将后量子加密算法集成到Hyperledger Fabric(一个区块链框架)中,以保护其免受新出现的量子威胁。为此,开发了一个经过修改的Cryptogen工具,用于生成具有经典和后量子加密密钥的X.509证书。此外,使用Hyperledger Caliper和Prometheus等工具进行实证分析,我们证明了这种混合方法在不影响系统性能的情况下有效地增强了安全性。这些结果不仅提高了超级账本结构的安全性,而且为在区块链技术中添加后量子加密提供了实用指南。
{"title":"Quantum-Safe Blockchain in Hyperledger Fabric","authors":"Shahroz Abbas;Ajmery Sultana;Georges Kaddoum","doi":"10.1109/LNET.2024.3522966","DOIUrl":"https://doi.org/10.1109/LNET.2024.3522966","url":null,"abstract":"With the advances of quantum computing the security of existing cryptographic frameworks is increasingly at risk. Accordingly, in the present study, we investigate the integration of post-quantum cryptographic algorithms into Hyperledger Fabric, a blockchain framework, to safeguard it against emerging quantum threats. To this end, a modified Cryptogen tool was developed to generate X.509 certificates with both classical and post-quantum cryptographic keys. Furthermore, using tools like Hyperledger Caliper and Prometheus for empirical analysis, we demonstrate that this hybrid approach effectively strengthens security without affecting system performance. These results not only improve the security of Hyperledger Fabric, but also offer a practical guide for adding post-quantum cryptography to blockchain technologies.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 1","pages":"61-65"},"PeriodicalIF":0.0,"publicationDate":"2024-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HeRo: Heuristic-Based Routing in Payment Channel Networks 英雄:支付通道网络中基于启发式的路由
Pub Date : 2024-12-19 DOI: 10.1109/LNET.2024.3520350
Shruti Mishra;Virat Aggarwal;Sujata Pal;Vidushi Agarwal
Payment channels support off-chain transactions by enhancing transaction speed and reducing fees in the main blockchain. However, the costs and complexity of the network increase as we increase the size of the network. To address these challenges, we propose Heuristic-Based Routing with Scheduling (HeRo) combining heuristic-based routing and scheduling techniques in Payment Channel Networks (PCNs). HeRo achieves a cost reduction of 32.71% and 73.08% compared with multi-charge PCN (MPCN-RP) and Dijkstra algorithms, respectively.
支付渠道通过提高交易速度和降低主bbb的费用来支持链下交易。然而,随着网络规模的增加,网络的成本和复杂性也随之增加。为了解决这些挑战,我们提出了基于启发式路由与调度(HeRo)的支付通道网络(pcn)中基于启发式路由和调度技术的结合。与多电荷PCN (MPCN-RP)和Dijkstra算法相比,HeRo算法的成本分别降低了32.71%和73.08%。
{"title":"HeRo: Heuristic-Based Routing in Payment Channel Networks","authors":"Shruti Mishra;Virat Aggarwal;Sujata Pal;Vidushi Agarwal","doi":"10.1109/LNET.2024.3520350","DOIUrl":"https://doi.org/10.1109/LNET.2024.3520350","url":null,"abstract":"Payment channels support off-chain transactions by enhancing transaction speed and reducing fees in the main blockchain. However, the costs and complexity of the network increase as we increase the size of the network. To address these challenges, we propose Heuristic-Based Routing with Scheduling (HeRo) combining heuristic-based routing and scheduling techniques in Payment Channel Networks (PCNs). HeRo achieves a cost reduction of 32.71% and 73.08% compared with multi-charge PCN (MPCN-RP) and Dijkstra algorithms, respectively.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 1","pages":"56-60"},"PeriodicalIF":0.0,"publicationDate":"2024-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SAcache: A Strongly Adaptive Online Caching Scheme for Non-Stationary Environments SAcache:一种非平稳环境下的强自适应在线缓存方案
Pub Date : 2024-12-11 DOI: 10.1109/LNET.2024.3516321
Zhenghao Sha;Kechao Cai;Jinbei Zhang
Online caching at the network edge is becoming increasingly important for alleviating the transmission pressure on backbone networks. Previous studies on online caching policies mainly use the static regret as the performance metric, which relies on a fixed benchmark and lacks the capacity to ensure optimal performance in non-stationary environments. In this letter, we introduce the strongly adaptive regret into online caching and propose a Strongly Adaptive online caching scheme (SAcache). Our SAcache scheme focuses on the performance over time intervals with a length between $tau _{min }$ and $tau _{max }$ , where $tau _{min }$ and $tau _{max }$ are the lower and upper bound on how long the environment changes, respectively. SAcache consists of multiple interval caches operating in a lazy restart mode to make candidate caching decisions, and an aggregated cache that weights the these candidate decisions to determine the final caching decision. We prove that the regret upper bound is sub-linear with respect to the time interval’s length $tau $ , i.e., $O(sqrt {tau log (tau _{max }/tau _{min })})$ . Our experiment results demonstrate that SAcache achieves the highest cache hit ratio and the lowest regret compared to other caching policies in non-stationary environments.
网络边缘的在线缓存对于缓解骨干网的传输压力变得越来越重要。以往对在线缓存策略的研究主要采用静态后悔作为性能指标,依赖于固定的基准,缺乏在非平稳环境下保证最优性能的能力。在本文中,我们将强自适应后悔引入到在线缓存中,并提出了一个强自适应在线缓存方案(SAcache)。我们的SAcache方案关注的是在$tau _{min }$和$tau _{max }$之间的时间间隔内的性能,其中$tau _{min }$和$tau _{max }$分别是环境变化时间的下限和上限。SAcache由多个间隔缓存组成,这些缓存以延迟重启模式运行,以做出候选缓存决策,还有一个聚合缓存,对这些候选决策进行加权,以确定最终的缓存决策。我们证明了遗憾上界对于时间间隔的长度$tau $是次线性的,即$O(sqrt {tau log (tau _{max }/tau _{min })})$。实验结果表明,与其他非平稳环境下的缓存策略相比,SAcache具有最高的缓存命中率和最低的缓存后悔率。
{"title":"SAcache: A Strongly Adaptive Online Caching Scheme for Non-Stationary Environments","authors":"Zhenghao Sha;Kechao Cai;Jinbei Zhang","doi":"10.1109/LNET.2024.3516321","DOIUrl":"https://doi.org/10.1109/LNET.2024.3516321","url":null,"abstract":"Online caching at the network edge is becoming increasingly important for alleviating the transmission pressure on backbone networks. Previous studies on online caching policies mainly use the static regret as the performance metric, which relies on a fixed benchmark and lacks the capacity to ensure optimal performance in non-stationary environments. In this letter, we introduce the strongly adaptive regret into online caching and propose a Strongly Adaptive online caching scheme (SAcache). Our SAcache scheme focuses on the performance over time intervals with a length between <inline-formula> <tex-math>$tau _{min }$ </tex-math></inline-formula> and <inline-formula> <tex-math>$tau _{max }$ </tex-math></inline-formula>, where <inline-formula> <tex-math>$tau _{min }$ </tex-math></inline-formula> and <inline-formula> <tex-math>$tau _{max }$ </tex-math></inline-formula> are the lower and upper bound on how long the environment changes, respectively. SAcache consists of multiple interval caches operating in a lazy restart mode to make candidate caching decisions, and an aggregated cache that weights the these candidate decisions to determine the final caching decision. We prove that the regret upper bound is sub-linear with respect to the time interval’s length <inline-formula> <tex-math>$tau $ </tex-math></inline-formula>, i.e., <inline-formula> <tex-math>$O(sqrt {tau log (tau _{max }/tau _{min })})$ </tex-math></inline-formula>. Our experiment results demonstrate that SAcache achieves the highest cache hit ratio and the lowest regret compared to other caching policies in non-stationary environments.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 1","pages":"46-50"},"PeriodicalIF":0.0,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Networking Letters
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1