首页 > 最新文献

IEEE Networking Letters最新文献

英文 中文
FBCNet: Fusion Basis Complex-Valued Neural Network for CSI Compression in Massive MIMO Networks 大规模MIMO网络中CSI压缩的融合基复值神经网络
Pub Date : 2024-12-09 DOI: 10.1109/LNET.2024.3512658
C Kiruthika;E. S. Gopi
Deep learning-based CSI compression has shown its efficacy for massive multiple-input multiple-output networks, and on the other hand, federated learning (FL) excels the conventional centralized learning by avoiding privacy leakage issues and training communication overhead. The realization of an FL-based CSI feedback network consumes more computational resources and time, and the continuous reporting of local models to the base station results in overhead. To overcome these issues, in this letter, we propose a FBCNet. The proposed FBCNet combines the advantages of the novel fusion basis (FB) technique and the fully connected complex-valued neural network (CNet) based on gradient (G) and non-gradient (NG) approaches. The experimental results show the advantages of both CNet and FB individually over the existing techniques. FBCNet, the combination of both FB and CNet, outperforms the existing federated averaging-based CNet (FedCNet) with improvement in reconstruction performance, less complexity, reduced training time, and low transmission overhead. For the distributed array-line of sight topology at the compression ratio (CR) of 20:1, it is noted that the NMSE and the cosine similarity of FedCNet-G are −8.2837 dB, 0.9262; FedCNet-NG are −3.5291 dB, 0.8452; proposed FB are −26.8621, 0.9653. Also the NMSE and the cosine similarity of the proposed FBCNet-G are −19.7521, 0.9307; FBCNet-NG are −24.0442, 0.9539 at a high CR of 64:1.
基于深度学习的CSI压缩在大规模多输入多输出网络中已经显示出其有效性,另一方面,联邦学习(FL)通过避免隐私泄露问题和训练通信开销而优于传统的集中式学习。基于fl的CSI反馈网络的实现消耗了更多的计算资源和时间,并且不断向基站报告局部模型导致了开销。为了克服这些问题,在这封信中,我们提议建立FBCNet。提出的FBCNet结合了新型融合基(FB)技术和基于梯度(G)和非梯度(NG)方法的全连接复值神经网络(CNet)的优点。实验结果表明,CNet和FB各自优于现有技术。FBCNet是FB和CNet的结合,优于现有的基于联邦平均的CNet (FedCNet),具有重建性能的提高、更低的复杂性、更少的训练时间和更低的传输开销。对于压缩比(CR)为20:1的分布式阵列瞄准线拓扑,FedCNet-G的NMSE和余弦相似度分别为- 8.2837 dB和0.9262;FedCNet-NG分别为−3.5291 dB, 0.8452;建议FB分别为−26.8621,0.9653。FBCNet-G的NMSE和余弦相似度分别为- 19.7521、0.9307;FBCNet-NG分别为- 24.0442、0.9539,CR为64:1。
{"title":"FBCNet: Fusion Basis Complex-Valued Neural Network for CSI Compression in Massive MIMO Networks","authors":"C Kiruthika;E. S. Gopi","doi":"10.1109/LNET.2024.3512658","DOIUrl":"https://doi.org/10.1109/LNET.2024.3512658","url":null,"abstract":"Deep learning-based CSI compression has shown its efficacy for massive multiple-input multiple-output networks, and on the other hand, federated learning (FL) excels the conventional centralized learning by avoiding privacy leakage issues and training communication overhead. The realization of an FL-based CSI feedback network consumes more computational resources and time, and the continuous reporting of local models to the base station results in overhead. To overcome these issues, in this letter, we propose a FBCNet. The proposed FBCNet combines the advantages of the novel fusion basis (FB) technique and the fully connected complex-valued neural network (CNet) based on gradient (G) and non-gradient (NG) approaches. The experimental results show the advantages of both CNet and FB individually over the existing techniques. FBCNet, the combination of both FB and CNet, outperforms the existing federated averaging-based CNet (FedCNet) with improvement in reconstruction performance, less complexity, reduced training time, and low transmission overhead. For the distributed array-line of sight topology at the compression ratio (CR) of 20:1, it is noted that the NMSE and the cosine similarity of FedCNet-G are −8.2837 dB, 0.9262; FedCNet-NG are −3.5291 dB, 0.8452; proposed FB are −26.8621, 0.9653. Also the NMSE and the cosine similarity of the proposed FBCNet-G are −19.7521, 0.9307; FBCNet-NG are −24.0442, 0.9539 at a high CR of 64:1.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 4","pages":"262-266"},"PeriodicalIF":0.0,"publicationDate":"2024-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143388486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zero Trust Security Architecture for 6G Open Radio Access Networks (ORAN) 面向6G开放无线接入网络(ORAN)的零信任安全架构
Pub Date : 2024-12-09 DOI: 10.1109/LNET.2024.3514357
Hajar Moudoud;Zakaria Abou El Houda;Bouziane Brik
The evolution of Open Radio Access Networks (O-RAN) is crucial for the deployment and operation of 6G networks, providing flexibility and interoperability through its disaggregated and open architecture. However, this openness introduces new security issues. To address these challenges, we propose a novel Zero-Trust architecture tailored for ORAN (ZTORAN). ZTORAN includes two main modules: (1) A blockchain-based decentralized trust management system for secure verification, authentication, and dynamic access control of xApps; and (2) A threat detection module that uses Federated Multi-Agent Reinforcement Learning (FMARL) to monitor network activities continuously and detects anomalies within the ORAN ecosystem. Through comprehensive simulations and evaluations, we demonstrate the effectiveness of ZTORAN in providing a resilient and secure framework for next-generation wireless networks.
开放无线接入网络(O-RAN)的发展对6G网络的部署和运营至关重要,通过其分解和开放的架构提供灵活性和互操作性。然而,这种开放性带来了新的安全问题。为了应对这些挑战,我们提出了一种针对ORAN (ZTORAN)量身定制的新型零信任架构。ZTORAN包括两个主要模块:(1)基于区块链的分散信任管理系统,用于xApps的安全验证、认证和动态访问控制;(2)使用联邦多智能体强化学习(FMARL)持续监控网络活动并检测ORAN生态系统内异常的威胁检测模块。通过全面的模拟和评估,我们证明了ZTORAN在为下一代无线网络提供弹性和安全框架方面的有效性。
{"title":"Zero Trust Security Architecture for 6G Open Radio Access Networks (ORAN)","authors":"Hajar Moudoud;Zakaria Abou El Houda;Bouziane Brik","doi":"10.1109/LNET.2024.3514357","DOIUrl":"https://doi.org/10.1109/LNET.2024.3514357","url":null,"abstract":"The evolution of Open Radio Access Networks (O-RAN) is crucial for the deployment and operation of 6G networks, providing flexibility and interoperability through its disaggregated and open architecture. However, this openness introduces new security issues. To address these challenges, we propose a novel Zero-Trust architecture tailored for ORAN (ZTORAN). ZTORAN includes two main modules: (1) A blockchain-based decentralized trust management system for secure verification, authentication, and dynamic access control of xApps; and (2) A threat detection module that uses Federated Multi-Agent Reinforcement Learning (FMARL) to monitor network activities continuously and detects anomalies within the ORAN ecosystem. Through comprehensive simulations and evaluations, we demonstrate the effectiveness of ZTORAN in providing a resilient and secure framework for next-generation wireless networks.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 4","pages":"272-275"},"PeriodicalIF":0.0,"publicationDate":"2024-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143388570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-Centric D2D in 6G Networks 6G网络中以ai为中心的D2D
Pub Date : 2024-12-09 DOI: 10.1109/LNET.2024.3512659
Jianwen Xu;Kaoru Ota;Mianxiong Dong
As a fundamental component of 6G, Device-to-Device (D2D) communication facilitates direct connections between devices without base stations. In order to support advanced AI applications in ubiquitous scenarios, in this letter, we propose an AI-centric D2D communication infrastructure upon mobile devices, addressing current challenges in bandwidth and transmission speed. This approach aims to leverage 6G’s potential to create more efficient, reliable, and intelligent wireless communication systems, bridging the gap between AI and next-generation D2D communication. The results from real-world case study and simulation show that our design can save time and improve efficiency in D2D transmission and on-device AI processing.
作为6G的基本组成部分,设备到设备(Device-to-Device, D2D)通信可以在没有基站的情况下实现设备之间的直接连接。为了在无处不在的场景中支持先进的人工智能应用,在这封信中,我们提出了一种基于移动设备的以人工智能为中心的D2D通信基础设施,以解决当前带宽和传输速度方面的挑战。这种方法旨在利用6G的潜力,创造更高效、更可靠、更智能的无线通信系统,弥合人工智能与下一代D2D通信之间的差距。实际案例研究和仿真结果表明,我们的设计可以节省时间,提高D2D传输和设备上AI处理的效率。
{"title":"AI-Centric D2D in 6G Networks","authors":"Jianwen Xu;Kaoru Ota;Mianxiong Dong","doi":"10.1109/LNET.2024.3512659","DOIUrl":"https://doi.org/10.1109/LNET.2024.3512659","url":null,"abstract":"As a fundamental component of 6G, Device-to-Device (D2D) communication facilitates direct connections between devices without base stations. In order to support advanced AI applications in ubiquitous scenarios, in this letter, we propose an AI-centric D2D communication infrastructure upon mobile devices, addressing current challenges in bandwidth and transmission speed. This approach aims to leverage 6G’s potential to create more efficient, reliable, and intelligent wireless communication systems, bridging the gap between AI and next-generation D2D communication. The results from real-world case study and simulation show that our design can save time and improve efficiency in D2D transmission and on-device AI processing.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 4","pages":"257-261"},"PeriodicalIF":0.0,"publicationDate":"2024-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143388600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Serve Yourself! Federated Power Control for AI-Native 5G and Beyond 为你自己!AI-Native 5G及以后的联合功率控制
Pub Date : 2024-12-02 DOI: 10.1109/LNET.2024.3509792
Saad Abouzahir;Essaid Sabir;Halima Elbiaze;Mohamed Sadik
The adoption of the Industrial Internet of Things (IIoT) in industries necessitates advancements in energy efficiency and latency reduction, especially for resource-constrained devices. Services require specific Quality of Service (QoS) levels to function properly, and meeting a threshold QoS can be sufficient for smooth connectivity, reducing the need to maximize perceived QoS due to energy concerns. This is modeled as a satisfactory game, aiming to find minimal power allocation to meet target demands. Due to environmental uncertainties, achieving a Robust Satisfactory Equilibrium (RSE) can be challenging, leading to less satisfaction. We propose a fully distributed, environment-aware power control scheme to enhance satisfaction in dynamic environments. The proposed Robust Banach-Picard (RBP) learning scheme combines deep learning and federated learning to overcome channel and interference impacts and accelerate convergence. Extensive simulations evaluate the scheme under varying channel states and QoS demands, with discussions on convergence speed, energy efficiency, scalability, complexity, and violation rate.
在工业中采用工业物联网(IIoT)需要提高能源效率和减少延迟,特别是对于资源受限的设备。服务需要特定的服务质量(QoS)级别才能正常工作,满足阈值QoS就足以实现平滑连接,从而减少了由于能源问题而最大化感知QoS的需求。这是一个令人满意的博弈模型,其目标是找到满足目标需求的最小功率分配。由于环境的不确定性,实现鲁棒满意均衡(RSE)可能具有挑战性,导致满意度降低。我们提出了一种全分布式、环境感知的电力控制方案,以提高动态环境下的满意度。鲁棒Banach-Picard (RBP)学习方案结合了深度学习和联邦学习,克服了信道和干扰的影响,加快了收敛速度。广泛的仿真评估了不同信道状态和QoS需求下的方案,并讨论了收敛速度、能源效率、可扩展性、复杂性和违反率。
{"title":"Serve Yourself! Federated Power Control for AI-Native 5G and Beyond","authors":"Saad Abouzahir;Essaid Sabir;Halima Elbiaze;Mohamed Sadik","doi":"10.1109/LNET.2024.3509792","DOIUrl":"https://doi.org/10.1109/LNET.2024.3509792","url":null,"abstract":"The adoption of the Industrial Internet of Things (IIoT) in industries necessitates advancements in energy efficiency and latency reduction, especially for resource-constrained devices. Services require specific Quality of Service (QoS) levels to function properly, and meeting a threshold QoS can be sufficient for smooth connectivity, reducing the need to maximize perceived QoS due to energy concerns. This is modeled as a satisfactory game, aiming to find minimal power allocation to meet target demands. Due to environmental uncertainties, achieving a Robust Satisfactory Equilibrium (RSE) can be challenging, leading to less satisfaction. We propose a fully distributed, environment-aware power control scheme to enhance satisfaction in dynamic environments. The proposed Robust Banach-Picard (RBP) learning scheme combines deep learning and federated learning to overcome channel and interference impacts and accelerate convergence. Extensive simulations evaluate the scheme under varying channel states and QoS demands, with discussions on convergence speed, energy efficiency, scalability, complexity, and violation rate.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 4","pages":"252-256"},"PeriodicalIF":0.0,"publicationDate":"2024-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143388599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Latency Bounds for TSN Scheduling in the Presence of Clock Synchronization 有时钟同步时TSN调度的时延限制
Pub Date : 2024-11-27 DOI: 10.1109/LNET.2024.3507792
Aviroop Ghosh;Saleh Yousefi;Thomas Kunz
The IEEE 802.1Qbv (80.21Qbv) standard is designed for traffic requiring deterministic and bounded latencies through strict periodic time synchronization, as specified by IEEE 802.1AS standard. However, internal clock drift in devices causes timing misalignment, introducing further challenges to 802.1Qbv scheduling. Existing solutions, using either complex optimization approaches or non-trivial scheduling heuristics, address this by scheduling frame transmissions only once they are guaranteed to have been fully received, even in the presence of clock drifts. However, this approach introduces additional delays that can impact deadline requirements. This letter analytically derives tight end-to-end latency bounds, allowing us to determine if stream deadlines for a given network will be violated without the need to solve for any scheduling algorithms. It also proposes an approach that results in tighter bounds based on information collected from the synchronization process. The analytical results are compared with simulation results, confirming their validity.
IEEE 802.1Qbv (80.21Qbv)标准是针对IEEE 802.1AS标准中要求通过严格的周期性时间同步实现确定性和有界延迟的业务而设计的。然而,设备内部的时钟漂移会导致时序失调,给802.1Qbv调度带来进一步的挑战。现有的解决方案,要么使用复杂的优化方法,要么使用重要的调度启发式方法,通过只在保证完全接收帧传输时调度帧传输来解决这个问题,即使存在时钟漂移。然而,这种方法引入了可能影响截止日期要求的额外延迟。这封信解析地推导出严格的端到端延迟界限,允许我们确定给定网络的流截止日期是否会被违反,而不需要解决任何调度算法。它还提出了一种基于从同步过程中收集的信息产生更严格边界的方法。将分析结果与仿真结果进行了比较,验证了分析结果的有效性。
{"title":"Latency Bounds for TSN Scheduling in the Presence of Clock Synchronization","authors":"Aviroop Ghosh;Saleh Yousefi;Thomas Kunz","doi":"10.1109/LNET.2024.3507792","DOIUrl":"https://doi.org/10.1109/LNET.2024.3507792","url":null,"abstract":"The IEEE 802.1Qbv (80.21Qbv) standard is designed for traffic requiring deterministic and bounded latencies through strict periodic time synchronization, as specified by IEEE 802.1AS standard. However, internal clock drift in devices causes timing misalignment, introducing further challenges to 802.1Qbv scheduling. Existing solutions, using either complex optimization approaches or non-trivial scheduling heuristics, address this by scheduling frame transmissions only once they are guaranteed to have been fully received, even in the presence of clock drifts. However, this approach introduces additional delays that can impact deadline requirements. This letter analytically derives tight end-to-end latency bounds, allowing us to determine if stream deadlines for a given network will be violated without the need to solve for any scheduling algorithms. It also proposes an approach that results in tighter bounds based on information collected from the synchronization process. The analytical results are compared with simulation results, confirming their validity.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 1","pages":"41-45"},"PeriodicalIF":0.0,"publicationDate":"2024-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10770262","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless MAC Protocol Synthesis and Optimization With Multi-Agent Distributed Reinforcement Learning 基于多智能体分布式强化学习的无线MAC协议综合与优化
Pub Date : 2024-11-20 DOI: 10.1109/LNET.2024.3503289
Navid Keshtiarast;Oliver Renaldi;Marina Petrova
In this letter, we propose a novel Multi-Agent Deep Reinforcement Learning (MADRL) framework for MAC protocol design. Unlike centralized approaches, which rely on a single entity for decision-making, MADRL empowers individual network nodes to autonomously learn and optimize their MAC from local observations. Our framework is the first of a kind that enables distributed multi-agent learning within the ns-3 environment, and facilitates the design and synthesis of adaptive MAC protocols tailored to specific environmental conditions. We demonstrate the effectiveness of the MADRL framework through extensive simulations, showcasing superior performance compared to legacy protocols across diverse scenarios.
在这封信中,我们为 MAC 协议设计提出了一种新颖的多代理深度强化学习(MADRL)框架。与依赖单一实体进行决策的集中式方法不同,MADRL 使单个网络节点能够根据本地观测结果自主学习和优化其 MAC。我们的框架是首个能在 ns-3 环境中实现分布式多代理学习的框架,有助于设计和合成适应特定环境条件的自适应 MAC 协议。我们通过大量仿真证明了 MADRL 框架的有效性,并在各种场景中展示了与传统协议相比更优越的性能。
{"title":"Wireless MAC Protocol Synthesis and Optimization With Multi-Agent Distributed Reinforcement Learning","authors":"Navid Keshtiarast;Oliver Renaldi;Marina Petrova","doi":"10.1109/LNET.2024.3503289","DOIUrl":"https://doi.org/10.1109/LNET.2024.3503289","url":null,"abstract":"In this letter, we propose a novel Multi-Agent Deep Reinforcement Learning (MADRL) framework for MAC protocol design. Unlike centralized approaches, which rely on a single entity for decision-making, MADRL empowers individual network nodes to autonomously learn and optimize their MAC from local observations. Our framework is the first of a kind that enables distributed multi-agent learning within the ns-3 environment, and facilitates the design and synthesis of adaptive MAC protocols tailored to specific environmental conditions. We demonstrate the effectiveness of the MADRL framework through extensive simulations, showcasing superior performance compared to legacy protocols across diverse scenarios.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 4","pages":"242-246"},"PeriodicalIF":0.0,"publicationDate":"2024-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143388624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maestro: LLM-Driven Collaborative Automation of Intent-Based 6G Networks 大师:llm驱动的基于意图的6G网络协同自动化
Pub Date : 2024-11-20 DOI: 10.1109/LNET.2024.3503292
Ilias Chatzistefanidis;Andrea Leone;Navid Nikaein
This letter presents Maestro, a collaborative framework leveraging Large Language Models (LLMs) for automation of shared networks. Maestro enables conflict resolution and collaboration among stakeholders in a shared intent-based 6G network by abstracting diverse network infrastructures into declarative intents across business, service, and network planes. LLM-based agents negotiate resources, mediated by Maestro to achieve consensus that aligns multi-party business and network goals. Evaluation on a 5G Open RAN testbed reveals that integrating LLMs with optimization tools and contextual units builds autonomous agents with comparable accuracy to the state-of-the-art algorithms while being flexible to spatio-temporal business and network variability.
这封信介绍了 Maestro,一个利用大型语言模型(LLM)实现共享网络自动化的协作框架。Maestro 通过将不同的网络基础设施抽象为跨业务、服务和网络平面的声明性意图,在基于共享意图的 6G 网络中实现了利益相关者之间的冲突解决与协作。基于 LLM 的代理在 Maestro 的调解下进行资源谈判,以达成共识,协调多方业务和网络目标。在 5G 开放式 RAN 测试平台上进行的评估表明,将 LLM 与优化工具和上下文单元集成在一起,可以建立自主代理,其准确性可与最先进的算法相媲美,同时还能灵活应对时空业务和网络的变化。
{"title":"Maestro: LLM-Driven Collaborative Automation of Intent-Based 6G Networks","authors":"Ilias Chatzistefanidis;Andrea Leone;Navid Nikaein","doi":"10.1109/LNET.2024.3503292","DOIUrl":"https://doi.org/10.1109/LNET.2024.3503292","url":null,"abstract":"This letter presents M<sc>aestro</small>, a collaborative framework leveraging Large Language Models (LLMs) for automation of shared networks. M<sc>aestro</small> enables conflict resolution and collaboration among stakeholders in a shared intent-based 6G network by abstracting diverse network infrastructures into declarative intents across business, service, and network planes. LLM-based agents negotiate resources, mediated by M<sc>aestro</small> to achieve consensus that aligns multi-party business and network goals. Evaluation on a 5G Open RAN testbed reveals that integrating LLMs with optimization tools and contextual units builds autonomous agents with comparable accuracy to the state-of-the-art algorithms while being flexible to spatio-temporal business and network variability.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 4","pages":"227-231"},"PeriodicalIF":0.0,"publicationDate":"2024-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10758700","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143388623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Jamming Attack Mitigation in Wireless Federated Learning Networks Using Bayesian Games 利用贝叶斯博弈缓解无线联邦学习网络的干扰攻击
Pub Date : 2024-11-14 DOI: 10.1109/LNET.2024.3499360
Sofia Barkatsa;Maria Diamanti;Panagiotis Charatsaris;Eirini Eleni Tsiropoulou;Symeon Papavassiliou
Federated Learning (FL), an emerging distributed Artificial Intelligence (AI) technique, is susceptible to jamming attacks during the wireless transmission of trained models. In this letter, we introduce a jamming attack mitigation mechanism for the uplink of wireless FL networks using the power-domain Non-Orthogonal Multiple Access (NOMA) technique. The problem of transmission power allocation for all clients (legitimate and malicious) is formulated and solved distributively as a Bayesian game with incomplete information. The clients aim to successfully transmit their model parameters, minimizing transmission time and consumed power, while having probabilistic knowledge about the malicious behavior of the other clients in the game.
联邦学习(FL)是一种新兴的分布式人工智能(AI)技术,在训练模型的无线传输过程中容易受到干扰攻击。本文介绍了一种基于功率域非正交多址(NOMA)技术的无线FL网络上行干扰攻击缓解机制。将所有客户端(合法客户端和恶意客户端)的传输功率分配问题作为不完全信息的贝叶斯博弈进行了分布式表述和解决。客户端的目标是成功地传输他们的模型参数,最小化传输时间和消耗的功率,同时对游戏中其他客户端的恶意行为具有概率知识。
{"title":"Jamming Attack Mitigation in Wireless Federated Learning Networks Using Bayesian Games","authors":"Sofia Barkatsa;Maria Diamanti;Panagiotis Charatsaris;Eirini Eleni Tsiropoulou;Symeon Papavassiliou","doi":"10.1109/LNET.2024.3499360","DOIUrl":"https://doi.org/10.1109/LNET.2024.3499360","url":null,"abstract":"Federated Learning (FL), an emerging distributed Artificial Intelligence (AI) technique, is susceptible to jamming attacks during the wireless transmission of trained models. In this letter, we introduce a jamming attack mitigation mechanism for the uplink of wireless FL networks using the power-domain Non-Orthogonal Multiple Access (NOMA) technique. The problem of transmission power allocation for all clients (legitimate and malicious) is formulated and solved distributively as a Bayesian game with incomplete information. The clients aim to successfully transmit their model parameters, minimizing transmission time and consumed power, while having probabilistic knowledge about the malicious behavior of the other clients in the game.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 4","pages":"247-251"},"PeriodicalIF":0.0,"publicationDate":"2024-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143388567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Queue Modeling for Geospatial Service on Edge-Cloud Architecture 边缘云架构下地理空间服务的队列建模
Pub Date : 2024-11-12 DOI: 10.1109/LNET.2024.3496842
Fabio Franchi;Fabio Graziosi;Francesco Smarra;Eleonora Di Fina
The exponential growth and complexity of geospatial data necessitate innovative management strategies to address the increasing computational demands of Geographical Information System (GIS) services. GIS is connected to the social context, and its use as a decision-support tool is gaining broader acceptance with the need to ensure high Quality of Service (QoS). While cloud computing offers new capabilities for GIS, the physical distance between cloud infrastructure and end-users often leads to high network latency, compromising QoS. Multi-Access Edge Computing (MEC) emerges as a promising solution to limit latency and enhance system performance, particularly for real-time and multi-device applications. However, integrating GIS services into edge-cloud architectures presents significant challenges in terms of task scheduling and service placement. This letter proposes a queueing theory-based model designed to optimize the performance of GIS workloads within edge-cloud architectures. The model, based on a closed Jackson network, is designed to assist in the efficient design and deployment of edge systems that meet QoS and Service Level Agreement (SLA) requirements. The proposed framework is validated through a real-world case study, with performance metrics such as throughput and response time evaluated to ensure optimal system sizing and performance. The results underscore the potential of this approach for designing scalable and efficient edge-cloud architectures tailored to geospatial services.
地理空间数据的指数增长和复杂性需要创新的管理策略来解决地理信息系统(GIS)服务日益增长的计算需求。地理信息系统与社会环境相联系,它作为决策支持工具的使用正在获得更广泛的接受,因为需要确保高质量的服务(QoS)。虽然云计算为GIS提供了新的功能,但云基础设施和最终用户之间的物理距离通常会导致高网络延迟,从而影响QoS。多访问边缘计算(MEC)作为一种有前途的解决方案出现,以限制延迟和提高系统性能,特别是对于实时和多设备应用。然而,将GIS服务集成到边缘云架构中在任务调度和服务放置方面提出了重大挑战。这封信提出了一个基于排队理论的模型,旨在优化边缘云架构中GIS工作负载的性能。该模型基于封闭的Jackson网络,旨在帮助有效地设计和部署边缘系统,以满足QoS和服务水平协议(SLA)要求。建议的框架通过实际案例研究进行了验证,并评估了吞吐量和响应时间等性能指标,以确保最佳的系统规模和性能。研究结果强调了这种方法在设计适合地理空间服务的可扩展和高效边缘云架构方面的潜力。
{"title":"Queue Modeling for Geospatial Service on Edge-Cloud Architecture","authors":"Fabio Franchi;Fabio Graziosi;Francesco Smarra;Eleonora Di Fina","doi":"10.1109/LNET.2024.3496842","DOIUrl":"https://doi.org/10.1109/LNET.2024.3496842","url":null,"abstract":"The exponential growth and complexity of geospatial data necessitate innovative management strategies to address the increasing computational demands of Geographical Information System (GIS) services. GIS is connected to the social context, and its use as a decision-support tool is gaining broader acceptance with the need to ensure high Quality of Service (QoS). While cloud computing offers new capabilities for GIS, the physical distance between cloud infrastructure and end-users often leads to high network latency, compromising QoS. Multi-Access Edge Computing (MEC) emerges as a promising solution to limit latency and enhance system performance, particularly for real-time and multi-device applications. However, integrating GIS services into edge-cloud architectures presents significant challenges in terms of task scheduling and service placement. This letter proposes a queueing theory-based model designed to optimize the performance of GIS workloads within edge-cloud architectures. The model, based on a closed Jackson network, is designed to assist in the efficient design and deployment of edge systems that meet QoS and Service Level Agreement (SLA) requirements. The proposed framework is validated through a real-world case study, with performance metrics such as throughput and response time evaluated to ensure optimal system sizing and performance. The results underscore the potential of this approach for designing scalable and efficient edge-cloud architectures tailored to geospatial services.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 1","pages":"36-40"},"PeriodicalIF":0.0,"publicationDate":"2024-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Relay Type Link Fabrication Attack in SDN: A Review SDN 中的中继型链路制造攻击:综述
Pub Date : 2024-11-07 DOI: 10.1109/LNET.2024.3493942
Getahun Metaferia;Frezewd Lemma
Software-defined Networking (SDN) is an innovative network architecture tailored to address the modern demands of network virtualization and cloud computing, which require features such as programmability, flexibility, agility, and openness to foster innovation. However, this architecture also brings forth new security challenges, particularly due to the separation of the data plane from the control plane. Our investigation centers on a specific vulnerability termed link fabrication, which can lead to topology poisoning. A compromised network topology can cause substantial disruptions across the entire network infrastructure. Through a systematic survey, we identified that significant research efforts have been directed towards mitigating link fabrication attacks. We classified the existing studies into six categories of vulnerabilities: Host-based, port amnesia, invisible assailant attack, topology freezing, switch-based link fabrication, and link latency. Furthermore, our survey highlights several open challenges in areas such as Programmable dataplane, dedicated attack trees and threat models, active defense and mitigation strategies, as well as controller awareness and machine learning. To address the vulnerabilities identified, we propose the implementation of a distance-bounding protocol concept at the control plane as a potential solution.
软件定义网络(SDN)是为满足网络虚拟化和云计算的现代需求而量身定制的一种创新网络架构,它需要可编程性、灵活性、敏捷性和开放性等特性来促进创新。但是,这种架构也带来了新的安全挑战,特别是由于数据平面和控制平面的分离。我们的调查集中在一个特定的漏洞称为链路制造,这可能导致拓扑中毒。受损的网络拓扑可能导致整个网络基础设施的严重中断。通过系统的调查,我们确定了重大的研究工作已经针对减轻链接伪造攻击。我们将现有的研究分为六类漏洞:基于主机的,端口遗忘,隐形攻击者攻击,拓扑冻结,基于交换机的链路制造和链路延迟。此外,我们的调查还强调了可编程数据平面、专用攻击树和威胁模型、主动防御和缓解策略以及控制器感知和机器学习等领域的几个开放挑战。为了解决已识别的漏洞,我们提出在控制平面上实现距离边界协议概念作为潜在的解决方案。
{"title":"Relay Type Link Fabrication Attack in SDN: A Review","authors":"Getahun Metaferia;Frezewd Lemma","doi":"10.1109/LNET.2024.3493942","DOIUrl":"https://doi.org/10.1109/LNET.2024.3493942","url":null,"abstract":"Software-defined Networking (SDN) is an innovative network architecture tailored to address the modern demands of network virtualization and cloud computing, which require features such as programmability, flexibility, agility, and openness to foster innovation. However, this architecture also brings forth new security challenges, particularly due to the separation of the data plane from the control plane. Our investigation centers on a specific vulnerability termed link fabrication, which can lead to topology poisoning. A compromised network topology can cause substantial disruptions across the entire network infrastructure. Through a systematic survey, we identified that significant research efforts have been directed towards mitigating link fabrication attacks. We classified the existing studies into six categories of vulnerabilities: Host-based, port amnesia, invisible assailant attack, topology freezing, switch-based link fabrication, and link latency. Furthermore, our survey highlights several open challenges in areas such as Programmable dataplane, dedicated attack trees and threat models, active defense and mitigation strategies, as well as controller awareness and machine learning. To address the vulnerabilities identified, we propose the implementation of a distance-bounding protocol concept at the control plane as a potential solution.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 1","pages":"51-55"},"PeriodicalIF":0.0,"publicationDate":"2024-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Networking Letters
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1