首页 > 最新文献

IEEE Networking Letters最新文献

英文 中文
Optimal Control for Platooning in Vehicle-to-Infrastructure Communications Networks 车辆到基础设施通信网络中的优化排序控制
Pub Date : 2023-09-13 DOI: 10.1109/LNET.2023.3314736
Yun Lai;Yu Duan;Lifeng Wang
Conventional vehicle-to-vehicle communication aided platooning system is distributed under various communication topologies and suffers from the severe interference, uncertain topologies, and heterogeneous communication delays, particularly in the urban areas with dense vehicles. Platooning design with the vehicle-to-infrastructure communication (V2I) enables the minimum number of communication links. Therefore, this letter proposes an optimal control scheme for minimizing the overall status errors under delay concern in the V2I based platooning system. By transforming the continuous-time plant into a discrete-time linear system, the considered system is confirmed to be controllable. Numerical results confirm that the proposed scheme is effective and achieves stability in the presence of different communication delay conditions.
传统的车对车通信辅助排队系统分布在各种通信拓扑结构下,存在严重的干扰、不确定的拓扑结构和异构通信延迟等问题,尤其是在车辆密集的城市地区。利用车与基础设施通信(V2I)进行的排队设计能使通信链路数量最少。因此,这封信提出了一种优化控制方案,以最小化基于 V2I 的排车系统在延迟问题下的整体状态误差。通过将连续时间工厂转化为离散时间线性系统,证实了所考虑的系统是可控的。数值结果证实,所提出的方案是有效的,并能在不同的通信延迟条件下实现稳定性。
{"title":"Optimal Control for Platooning in Vehicle-to-Infrastructure Communications Networks","authors":"Yun Lai;Yu Duan;Lifeng Wang","doi":"10.1109/LNET.2023.3314736","DOIUrl":"10.1109/LNET.2023.3314736","url":null,"abstract":"Conventional vehicle-to-vehicle communication aided platooning system is distributed under various communication topologies and suffers from the severe interference, uncertain topologies, and heterogeneous communication delays, particularly in the urban areas with dense vehicles. Platooning design with the vehicle-to-infrastructure communication (V2I) enables the minimum number of communication links. Therefore, this letter proposes an optimal control scheme for minimizing the overall status errors under delay concern in the V2I based platooning system. By transforming the continuous-time plant into a discrete-time linear system, the considered system is confirmed to be controllable. Numerical results confirm that the proposed scheme is effective and achieves stability in the presence of different communication delay conditions.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 4","pages":"289-293"},"PeriodicalIF":0.0,"publicationDate":"2023-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135402805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SLA Decomposition for Network Slicing: A Deep Neural Network Approach 网络切片的 SLA 分解:深度神经网络方法
Pub Date : 2023-08-30 DOI: 10.1109/LNET.2023.3310359
Cyril Shih-Huan Hsu;Danny De Vleeschauwer;Chrysa Papagianni
For a network slice that spans multiple technology and/or administrative domains, these domains must ensure that the slice’s End-to-End (E2E) Service Level Agreement (SLA) is met. Thus, the E2E SLA should be decomposed to partial SLAs, assigned to each of these domains. Assuming a two-level management architecture consisting of an E2E service orchestrator and local domain controllers, we consider that the former is only aware of historical data of the local controllers’ responses to previous slice requests, and captures this knowledge in a risk model per domain. In this letter, we propose the use of Neural Network (NN) based risk models, using such historical data, to decompose the E2E SLA. Specifically, we introduce models that incorporate monotonicity, applicable even in cases involving small datasets. An empirical study on a synthetic multi-domain dataset demonstrates the efficiency of our approach.
对于跨越多个技术和/或管理域的网络分片,这些域必须确保满足分片的端到端 (E2E) 服务级别协议 (SLA)。因此,E2E SLA 应分解为部分 SLA,分配给每个域。假设有一个由 E2E 服务协调器和本地域控制器组成的两级管理架构,我们认为前者只知道本地控制器对以前分片请求的响应的历史数据,并在每个域的风险模型中捕获这些知识。在这封信中,我们建议使用基于神经网络 (NN) 的风险模型,利用这些历史数据来分解 E2E SLA。具体来说,我们引入了包含单调性的模型,即使在涉及小数据集的情况下也适用。对合成多域数据集的实证研究证明了我们方法的效率。
{"title":"SLA Decomposition for Network Slicing: A Deep Neural Network Approach","authors":"Cyril Shih-Huan Hsu;Danny De Vleeschauwer;Chrysa Papagianni","doi":"10.1109/LNET.2023.3310359","DOIUrl":"10.1109/LNET.2023.3310359","url":null,"abstract":"For a network slice that spans multiple technology and/or administrative domains, these domains must ensure that the slice’s End-to-End (E2E) Service Level Agreement (SLA) is met. Thus, the E2E SLA should be decomposed to partial SLAs, assigned to each of these domains. Assuming a two-level management architecture consisting of an E2E service orchestrator and local domain controllers, we consider that the former is only aware of historical data of the local controllers’ responses to previous slice requests, and captures this knowledge in a risk model per domain. In this letter, we propose the use of Neural Network (NN) based risk models, using such historical data, to decompose the E2E SLA. Specifically, we introduce models that incorporate monotonicity, applicable even in cases involving small datasets. An empirical study on a synthetic multi-domain dataset demonstrates the efficiency of our approach.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 4","pages":"294-298"},"PeriodicalIF":0.0,"publicationDate":"2023-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73257990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Generic L-Out-of-M Counting Rule for Neyman-Pearson Test in Cognitive Radio Networks 认知无线电网络中奈曼-皮尔逊测试的最优通用 L-Out-of-M 计数规则
Pub Date : 2023-08-28 DOI: 10.1109/LNET.2023.3309537
Narasimha Rao Banavathu
This letter proposes a generic ${L}$ -out-of- ${M}$ counting rule-based sensing, wherein the cognitive radios (CRs) with non-identical receiver operating characteristic (ROC) curves and the fusion node cooperatively identify the primary user’s state. We formulate a generalized Neyman-Pearson problem to jointly optimize the individual CRs’ operational points on the ROC curves and the generic ${L}$ -out-of- ${M}$ counting rule for the CR system. Then, a fast-sensing problem is formulated to find the least number of CRs needed for practical sensing. We provide generalized solutions for any detector employed in the CR system. The proposed scheme shows superior detection performance compared to the traditional scheme.
本文提出了一种基于通用{L}$ -out-of-{M}$计数规则的传感方法,其中具有非相同接收器工作特性曲线(ROC)的认知无线电(CR)和融合节点可以合作识别主用户的状态。我们提出了一个广义的奈曼-皮尔逊(Neyman-Pearson)问题,以共同优化 ROC 曲线上各个 CR 的工作点和 CR 系统的通用 ${L}$ -out- ${M}$ 计数规则。然后,我们提出了一个快速传感问题,以找到实际传感所需的最少 CRs 数量。我们为 CR 系统中使用的任何探测器提供了通用解决方案。与传统方案相比,所提出的方案显示出更优越的检测性能。
{"title":"Optimal Generic L-Out-of-M Counting Rule for Neyman-Pearson Test in Cognitive Radio Networks","authors":"Narasimha Rao Banavathu","doi":"10.1109/LNET.2023.3309537","DOIUrl":"10.1109/LNET.2023.3309537","url":null,"abstract":"This letter proposes a generic \u0000<inline-formula> <tex-math>${L}$ </tex-math></inline-formula>\u0000-out-of-\u0000<inline-formula> <tex-math>${M}$ </tex-math></inline-formula>\u0000 counting rule-based sensing, wherein the cognitive radios (CRs) with non-identical receiver operating characteristic (ROC) curves and the fusion node cooperatively identify the primary user’s state. We formulate a generalized Neyman-Pearson problem to jointly optimize the individual CRs’ operational points on the ROC curves and the generic \u0000<inline-formula> <tex-math>${L}$ </tex-math></inline-formula>\u0000-out-of-\u0000<inline-formula> <tex-math>${M}$ </tex-math></inline-formula>\u0000 counting rule for the CR system. Then, a fast-sensing problem is formulated to find the least number of CRs needed for practical sensing. We provide generalized solutions for any detector employed in the CR system. The proposed scheme shows superior detection performance compared to the traditional scheme.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 4","pages":"189-193"},"PeriodicalIF":0.0,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88012477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Queues Fed by Lognormal Distributed Arrivals for IoT Network Traffic 物联网网络流量的对数正态分布到达队列分析
Pub Date : 2023-08-18 DOI: 10.1109/LNET.2023.3306419
Shachi Sharma;Prakash Datt Bhatt
Statistical analysis of IoT network traffic establishes the presence of lognormal distributed inter-arrivals. This letter presents analysis of LN/M/1 queueing model using approximate results of Laplace-Stieltjes transformation of lognormal distribution in terms of Lambert ${{mathcal { W}}}$ (.) function. The comparative performance evaluation of the LN/M/1 model with traditional M/M/1 model reveals that the quality of service metrics of LN/M/1 model mostly remain lower than M/M/1 implying that less number of buffers are required in IoT systems driven by such traffic. The asymptotic expressions for loss probability are derived using finite capacity LN/M/1/N model for different values of traffic intensity.
物联网网络流量的统计分析表明,存在对数正态分布的到达间隔。本文利用对数正态分布的拉普拉斯-斯蒂尔杰斯变换的近似结果,以兰伯特${{mathcal { W}}}$(.)函数对 LN/M/1 队列模型进行了分析。LN/M/1 模型与传统 M/M/1 模型的性能比较评估表明,LN/M/1 模型的服务质量指标大多低于 M/M/1,这意味着由此类流量驱动的物联网系统所需的缓冲区数量较少。利用有限容量 LN/M/1/N 模型推导出了不同流量强度值下损失概率的渐近表达式。
{"title":"Analysis of Queues Fed by Lognormal Distributed Arrivals for IoT Network Traffic","authors":"Shachi Sharma;Prakash Datt Bhatt","doi":"10.1109/LNET.2023.3306419","DOIUrl":"10.1109/LNET.2023.3306419","url":null,"abstract":"Statistical analysis of IoT network traffic establishes the presence of lognormal distributed inter-arrivals. This letter presents analysis of LN/M/1 queueing model using approximate results of Laplace-Stieltjes transformation of lognormal distribution in terms of Lambert \u0000<inline-formula> <tex-math>${{mathcal { W}}}$ </tex-math></inline-formula>\u0000(.) function. The comparative performance evaluation of the LN/M/1 model with traditional M/M/1 model reveals that the quality of service metrics of LN/M/1 model mostly remain lower than M/M/1 implying that less number of buffers are required in IoT systems driven by such traffic. The asymptotic expressions for loss probability are derived using finite capacity LN/M/1/N model for different values of traffic intensity.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 4","pages":"260-264"},"PeriodicalIF":0.0,"publicationDate":"2023-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73760229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Approach to Header Size and Forwarding Table Optimization in Segment Routing 分段路由中的报头大小和转发表优化混合方法
Pub Date : 2023-08-14 DOI: 10.1109/LNET.2023.3305247
Anushree Roy;Tania Sarkar;Pranav Kumar Singh;Ranjan Maity
Segment Routing is a source routing paradigm that simplifies packet forwarding and management across networks. Two major challenges of segment routing are the limitation of header stack size and the size of the Forwarding Table specific to each node. It has been observed that there is a trade-off between these two factors. In this letter, we have addressed this trade-off and presented a mechanism to minimize the stack size as well as the forwarding table. Instead of individual Segment IDs used in traditional segment routing, unique Path IDs are considered. This reduces the size of the header stack to one irrespective of the number of segments in the path. To reduce the size of the forwarding table, a forwarding technique based on matrix operations is used. Our approach also works on the reliability issues in forwarding and guarantees 100% successful packet forwarding.
网段路由是一种源路由范例,可简化网络中的数据包转发和管理。段路由的两大挑战是报头堆栈大小的限制和每个节点特定的转发表的大小。据观察,这两个因素之间存在权衡。在这封信中,我们解决了这一权衡问题,并提出了一种将堆栈大小和转发表最小化的机制。我们考虑使用唯一的路径 ID 代替传统段路由中使用的单个段 ID。这样,无论路径上有多少网段,报头堆栈的大小都会减小到一个。为了减少转发表的大小,我们采用了基于矩阵运算的转发技术。我们的方法还能解决转发中的可靠性问题,并保证数据包 100% 成功转发。
{"title":"A Hybrid Approach to Header Size and Forwarding Table Optimization in Segment Routing","authors":"Anushree Roy;Tania Sarkar;Pranav Kumar Singh;Ranjan Maity","doi":"10.1109/LNET.2023.3305247","DOIUrl":"10.1109/LNET.2023.3305247","url":null,"abstract":"Segment Routing is a source routing paradigm that simplifies packet forwarding and management across networks. Two major challenges of segment routing are the limitation of header stack size and the size of the Forwarding Table specific to each node. It has been observed that there is a trade-off between these two factors. In this letter, we have addressed this trade-off and presented a mechanism to minimize the stack size as well as the forwarding table. Instead of individual Segment IDs used in traditional segment routing, unique Path IDs are considered. This reduces the size of the header stack to one irrespective of the number of segments in the path. To reduce the size of the forwarding table, a forwarding technique based on matrix operations is used. Our approach also works on the reliability issues in forwarding and guarantees 100% successful packet forwarding.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 4","pages":"275-278"},"PeriodicalIF":0.0,"publicationDate":"2023-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87707371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-Native for 6G Core Network Configuration 面向 6G 核心网络配置的 AI 本机
Pub Date : 2023-08-07 DOI: 10.1109/LNET.2023.3302833
Abdullah Ridwan Hossain;Weiqi Liu;Nirwan Ansari;Abbas Kiani;Tony Saboorian
3GPP envisions exploiting AI-Native for the day-to-day operations of 6G core networks (CNs). As opposed to 5G CNs whose uses for artificial intelligence (AI) are limited and not yet standardized, 6G CNs seek a revolutionary redesign where AI will no longer simply be an overlaid service but rather the foundation upon which all network functions run, i.e., AI-Native. By leveraging knowledge of the CN control plane, we utilize an AI framework to optimize our three proposed CN configurations and minimize the CN execution time which is imperative for end-to-end routing in the user plane.
3GPP 设想在 6G 核心网 (CN) 的日常运营中利用 AI-Native。与人工智能(AI)用途有限且尚未标准化的 5G 核心网相比,6G 核心网寻求的是革命性的重新设计,人工智能将不再是简单的叠加服务,而是所有网络功能运行的基础,即 AI-Native。通过利用 CN 控制平面的知识,我们利用人工智能框架来优化我们提出的三种 CN 配置,并最大限度地减少 CN 的执行时间,这对于用户平面的端到端路由至关重要。
{"title":"AI-Native for 6G Core Network Configuration","authors":"Abdullah Ridwan Hossain;Weiqi Liu;Nirwan Ansari;Abbas Kiani;Tony Saboorian","doi":"10.1109/LNET.2023.3302833","DOIUrl":"10.1109/LNET.2023.3302833","url":null,"abstract":"3GPP envisions exploiting AI-Native for the day-to-day operations of 6G core networks (CNs). As opposed to 5G CNs whose uses for artificial intelligence (AI) are limited and not yet standardized, 6G CNs seek a revolutionary redesign where AI will no longer simply be an overlaid service but rather the foundation upon which all network functions run, i.e., AI-Native. By leveraging knowledge of the CN control plane, we utilize an AI framework to optimize our three proposed CN configurations and minimize the CN execution time which is imperative for end-to-end routing in the user plane.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 4","pages":"255-259"},"PeriodicalIF":0.0,"publicationDate":"2023-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87314904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficiently Measure the Topologies of Large-Scale Networks Under the Guidance of Neural Network Gradients 在神经网络梯度的指导下有效测量大规模网络的拓扑结构
Pub Date : 2023-08-02 DOI: 10.1109/LNET.2023.3301008
Gaolei Fei;Zeyu Li;Yunpeng Zhou;Xuemeng Zhai;Jian Ye;Guangmin Hu
In this letter, we propose a novel network topology measurement method called the neural network gradient-guided method (NGM), which can use traceroutes to efficiently collect topological information (IPs and links) by selecting appropriate destination IPs. In this method, the mapping between probing destination IPs and probing revenues is modelled into a multiclassification problem using a neural network model, and networks are iteratively probed under the guidance of the neural network gradients. Experimental results in real networks demonstrated that NGM can collect more IPs and links by comparing with the methods that randomly selects IPs and subnets for probing.
在这封信中,我们提出了一种名为神经网络梯度引导法(NGM)的新型网络拓扑测量方法,该方法可通过选择适当的目标 IP,利用跟踪路由有效地收集拓扑信息(IP 和链接)。在这种方法中,探测目标 IP 与探测收入之间的映射被模拟成一个使用神经网络模型的多分类问题,并在神经网络梯度的引导下对网络进行迭代探测。真实网络的实验结果表明,与随机选择 IP 和子网进行探测的方法相比,NGM 可以收集更多的 IP 和链接。
{"title":"Efficiently Measure the Topologies of Large-Scale Networks Under the Guidance of Neural Network Gradients","authors":"Gaolei Fei;Zeyu Li;Yunpeng Zhou;Xuemeng Zhai;Jian Ye;Guangmin Hu","doi":"10.1109/LNET.2023.3301008","DOIUrl":"10.1109/LNET.2023.3301008","url":null,"abstract":"In this letter, we propose a novel network topology measurement method called the neural network gradient-guided method (NGM), which can use traceroutes to efficiently collect topological information (IPs and links) by selecting appropriate destination IPs. In this method, the mapping between probing destination IPs and probing revenues is modelled into a multiclassification problem using a neural network model, and networks are iteratively probed under the guidance of the neural network gradients. Experimental results in real networks demonstrated that NGM can collect more IPs and links by comparing with the methods that randomly selects IPs and subnets for probing.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 4","pages":"250-254"},"PeriodicalIF":0.0,"publicationDate":"2023-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86022898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Machine Learning Approach for Intelligent Spectrum Management in Cognitive Radio Networks 认知无线电网络中智能频谱管理的新型机器学习方法
Pub Date : 2023-07-31 DOI: 10.1109/LNET.2023.3300274
K. Bagadi;T. Abrao;F. Benedetto
This letter proposes a novel hybrid spectrum management scheme combining transfer actor-critic learning (TACT) and Q-learning algorithms to improve the cognitive radio access network’s spectrum efficiency. The TACT algorithm improves its mean opinion score over time, while the Q-learning achieves faster convergence during spectral management. Thus, this letter seeks to alleviate resource constraints by better exploiting unused communication channels. Computer simulations are carried out compared to reinforcement learning and conventional TACT algorithms. The results evidence the efficiency of our approach for intelligent spectrum management in cognitive radio networks.
本文提出了一种新颖的混合频谱管理方案,结合了转移行为批评学习(TACT)和Q-learning算法,以提高认知无线电接入网络的频谱效率。随着时间的推移,TACT 算法会提高其平均意见得分,而 Q-learning 则会在频谱管理过程中实现更快的收敛。因此,这封信旨在通过更好地利用未使用的通信信道来缓解资源限制。我们进行了计算机模拟,将其与强化学习算法和传统的 TACT 算法进行了比较。结果证明了我们的方法在认知无线电网络中进行智能频谱管理的效率。
{"title":"A Novel Machine Learning Approach for Intelligent Spectrum Management in Cognitive Radio Networks","authors":"K. Bagadi;T. Abrao;F. Benedetto","doi":"10.1109/LNET.2023.3300274","DOIUrl":"10.1109/LNET.2023.3300274","url":null,"abstract":"This letter proposes a novel hybrid spectrum management scheme combining transfer actor-critic learning (TACT) and Q-learning algorithms to improve the cognitive radio access network’s spectrum efficiency. The TACT algorithm improves its mean opinion score over time, while the Q-learning achieves faster convergence during spectral management. Thus, this letter seeks to alleviate resource constraints by better exploiting unused communication channels. Computer simulations are carried out compared to reinforcement learning and conventional TACT algorithms. The results evidence the efficiency of our approach for intelligent spectrum management in cognitive radio networks.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 4","pages":"232-236"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90821394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Resource Allocation for Grant-Free Access: A Reinforcement Learning Approach 无授权访问的智能资源分配:一种强化学习方法
Pub Date : 2023-07-28 DOI: 10.1109/LNET.2023.3299182
Mariam Elsayem;Hatem Abou-Zeid;Ali Afana;Sidney Givigi
Future wireless networks will support applications demanding high data-rates, ultra-low latency, and high reliabilities. One technology for such ultra-reliable low latency communication (URLLC) is grant-free access for uplink resources, which enables user equipment (UE) to transmit data over pre-allocated resources, reducing signaling overhead and communication latency. This letter proposes a novel ensemble Deep Reinforcement Learning grant-allocator architecture combining offline and online learning providing robust performance with a wide range of dynamic network and UE scenarios. Results show enhancement of the overall latency of UEs for URLLC applications achieving less than 20 Transmission Time Interval latency for 95% of the transmissions.
未来的无线网络将支持要求高数据速率、超低延迟和高可靠性的应用。用于这种超可靠低延迟通信(URLLC)的一种技术是对上行链路资源的免授权接入,这使得用户设备(UE)能够在预先分配的资源上传输数据,从而减少信令开销和通信延迟。这封信提出了一种新的集成深度强化学习授权分配器架构,该架构结合了离线和在线学习,在各种动态网络和UE场景中提供了强大的性能。结果显示,对于URLLC应用,UE的总体延迟得到了增强,实现了95%的传输的小于20的传输时间间隔延迟。
{"title":"Intelligent Resource Allocation for Grant-Free Access: A Reinforcement Learning Approach","authors":"Mariam Elsayem;Hatem Abou-Zeid;Ali Afana;Sidney Givigi","doi":"10.1109/LNET.2023.3299182","DOIUrl":"https://doi.org/10.1109/LNET.2023.3299182","url":null,"abstract":"Future wireless networks will support applications demanding high data-rates, ultra-low latency, and high reliabilities. One technology for such ultra-reliable low latency communication (URLLC) is grant-free access for uplink resources, which enables user equipment (UE) to transmit data over pre-allocated resources, reducing signaling overhead and communication latency. This letter proposes a novel ensemble Deep Reinforcement Learning grant-allocator architecture combining offline and online learning providing robust performance with a wide range of dynamic network and UE scenarios. Results show enhancement of the overall latency of UEs for URLLC applications achieving less than 20 Transmission Time Interval latency for 95% of the transmissions.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 3","pages":"154-158"},"PeriodicalIF":0.0,"publicationDate":"2023-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49979549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systematic Cryptanalysis of PUF-Based Authentication Protocols for IoT, A Case Study 基于 PUF 的物联网身份验证协议的系统密码分析,案例研究
Pub Date : 2023-07-25 DOI: 10.1109/LNET.2023.3298775
Amir Masoud Aminian Modarres;Ghazaleh Sarbishaei
Almost all IoT applications require secure user authentication protocols. Due to the limitations of most IoT devices and the possibility of physical attacks, lightweight authentication protocols based on Physical Unclonable Functions (PUF) are widely used. To design an efficient scheme, it is helpful to learn weaknesses of existing protocols and provide guidelines for future protocol designers. In this letter, using a formal framework, we discuss the vulnerabilities of a recent PUF-based protocol proposed by Gope et al. We prove our claims concerning protocol vulnerabilities in this framework according to propositional logic. Moreover, we suggest countermeasures for improving the protocol’s security.
几乎所有物联网应用都需要安全的用户身份验证协议。由于大多数物联网设备的局限性和物理攻击的可能性,基于物理不可克隆函数(PUF)的轻量级身份验证协议得到了广泛应用。要设计出高效的方案,了解现有协议的弱点并为未来的协议设计者提供指导是很有帮助的。在这封信中,我们利用形式框架讨论了 Gope 等人最近提出的基于 PUF 协议的漏洞。此外,我们还提出了提高协议安全性的对策。
{"title":"Systematic Cryptanalysis of PUF-Based Authentication Protocols for IoT, A Case Study","authors":"Amir Masoud Aminian Modarres;Ghazaleh Sarbishaei","doi":"10.1109/LNET.2023.3298775","DOIUrl":"10.1109/LNET.2023.3298775","url":null,"abstract":"Almost all IoT applications require secure user authentication protocols. Due to the limitations of most IoT devices and the possibility of physical attacks, lightweight authentication protocols based on Physical Unclonable Functions (PUF) are widely used. To design an efficient scheme, it is helpful to learn weaknesses of existing protocols and provide guidelines for future protocol designers. In this letter, using a formal framework, we discuss the vulnerabilities of a recent PUF-based protocol proposed by Gope et al. We prove our claims concerning protocol vulnerabilities in this framework according to propositional logic. Moreover, we suggest countermeasures for improving the protocol’s security.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 4","pages":"304-308"},"PeriodicalIF":0.0,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87811584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Networking Letters
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1