首页 > 最新文献

IEEE Transactions on Network and Service Management最新文献

英文 中文
Guest Editors’ Introduction: Special Issue on Robust and Resilient Future Communication Networks 特邀编辑导言:未来通信网络的稳健性和弹性特刊
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-11 DOI: 10.1109/TNSM.2024.3469308
Massimo Tornatore;Teresa Gomes;Carmen Mas-Machuca;Eiji Oki;Chadi Assi;Dominic Schupke
{"title":"Guest Editors’ Introduction: Special Issue on Robust and Resilient Future Communication Networks","authors":"Massimo Tornatore;Teresa Gomes;Carmen Mas-Machuca;Eiji Oki;Chadi Assi;Dominic Schupke","doi":"10.1109/TNSM.2024.3469308","DOIUrl":"https://doi.org/10.1109/TNSM.2024.3469308","url":null,"abstract":"","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"4929-4935"},"PeriodicalIF":4.7,"publicationDate":"2024-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10715485","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142408765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Adaptive Device-Free Passive Indoor Fingerprinting Localization Under Dynamic Environment 动态环境下一种新的自适应无源室内指纹定位方法
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-27 DOI: 10.1109/TNSM.2024.3469374
Xinping Rao;Le Qin;Yugen Yi;Jin Liu;Gang Lei;Yuanlong Cao
In recent years, indoor localization has attracted a lot of interest and has become one of the key topics of Internet of Things (IoT) research, presenting a wide range of application scenarios. With the advantages of ubiquitous universal Wi-Fi platforms and the “unconscious collaborative sensing” in the monitored target, Channel State Information (CSI)-based device-free passive indoor fingerprinting localization has become a popular research topic. However, most existing studies have encountered the difficult issues of high deployment labor costs and degradation of localization accuracy due to fingerprint variations in real-world dynamic environments. In this paper, we propose BSWCLoc, a device-free passive fingerprint localization scheme based on the beyond-sharing-weights approach. BSWCLoc uses the calibrated CSI phases, which are more sensitive to the target location, as localization features and performs feature processing from a two-dimensional perspective to ultimately obtain rich fingerprint information. This allows BSWLoc to achieve satisfactory accuracy with only one communication link, significantly reducing deployment consumption. In addition, a beyond-sharing-weights (BSW) method for domain adaptation is developed in BSWCLoc to address the problem of changing CSI in dynamic environments, which results in reduced localization performance. The BSW method proposes a dual-flow structure, where one flow runs in the source domain and the other in the target domain, with correlated but not shared weights in the adaptation layer. BSWCLoc greatly exceeds the state-of-the-art in terms of positioning accuracy and robustness, according to an extensive study in the dynamic indoor environment over 6 days.
近年来,室内定位备受关注,已成为物联网(IoT)研究的重点课题之一,呈现出广泛的应用场景。利用无处不在的通用Wi-Fi平台和被监测目标的“无意识协同感知”的优势,基于信道状态信息(CSI)的无设备室内被动指纹定位已成为一个热门的研究课题。然而,现有的大多数研究都遇到了实际动态环境中指纹变化导致部署人工成本高和定位精度下降的难题。本文提出了一种基于超共享权方法的无设备被动指纹定位方案BSWCLoc。BSWCLoc将校准后的对目标位置更敏感的CSI相位作为定位特征,从二维角度进行特征处理,最终获得丰富的指纹信息。这使得BSWLoc仅用一条通信链路就能达到令人满意的精度,大大降低了部署消耗。此外,针对动态环境下CSI变化导致定位性能下降的问题,在BSWCLoc中提出了一种超越共享权(BSW)的域自适应方法。BSW方法提出了一种双流结构,其中一个流在源域运行,另一个流在目标域运行,在适应层中具有相关但不共享的权值。根据在动态室内环境中进行的为期6天的广泛研究,BSWCLoc在定位精度和稳健性方面大大超过了最先进的技术。
{"title":"A Novel Adaptive Device-Free Passive Indoor Fingerprinting Localization Under Dynamic Environment","authors":"Xinping Rao;Le Qin;Yugen Yi;Jin Liu;Gang Lei;Yuanlong Cao","doi":"10.1109/TNSM.2024.3469374","DOIUrl":"https://doi.org/10.1109/TNSM.2024.3469374","url":null,"abstract":"In recent years, indoor localization has attracted a lot of interest and has become one of the key topics of Internet of Things (IoT) research, presenting a wide range of application scenarios. With the advantages of ubiquitous universal Wi-Fi platforms and the “unconscious collaborative sensing” in the monitored target, Channel State Information (CSI)-based device-free passive indoor fingerprinting localization has become a popular research topic. However, most existing studies have encountered the difficult issues of high deployment labor costs and degradation of localization accuracy due to fingerprint variations in real-world dynamic environments. In this paper, we propose BSWCLoc, a device-free passive fingerprint localization scheme based on the beyond-sharing-weights approach. BSWCLoc uses the calibrated CSI phases, which are more sensitive to the target location, as localization features and performs feature processing from a two-dimensional perspective to ultimately obtain rich fingerprint information. This allows BSWLoc to achieve satisfactory accuracy with only one communication link, significantly reducing deployment consumption. In addition, a beyond-sharing-weights (BSW) method for domain adaptation is developed in BSWCLoc to address the problem of changing CSI in dynamic environments, which results in reduced localization performance. The BSW method proposes a dual-flow structure, where one flow runs in the source domain and the other in the target domain, with correlated but not shared weights in the adaptation layer. BSWCLoc greatly exceeds the state-of-the-art in terms of positioning accuracy and robustness, according to an extensive study in the dynamic indoor environment over 6 days.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"6140-6152"},"PeriodicalIF":4.7,"publicationDate":"2024-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142880295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HSS: A Memory-Efficient, Accurate, and Fast Network Measurement Framework in Sliding Windows HSS:一种高效、准确、快速的滑动窗口网络测量框架
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-20 DOI: 10.1109/TNSM.2024.3460751
Zijun Hang;Yongjie Wang;Yuliang Lu
Network measurement is indispensable to network management. This paper focuses on three fundamental network measurement tasks: membership query, frequency query, and heavy hitter query. Existing solutions, such as sketches, sliding window algorithms, and the Sliding Sketch framework, struggle to simultaneously achieve memory efficiency, accuracy, real-time operation, and generic application. Accordingly, this paper proposes the Half Sliding Sketch (HSS), an improvement over the state-of-the-art Sliding Sketch framework. The HSS framework is applied to five contemporary sketches for the three aforementioned query tasks. Theoretical analysis reveals that our framework is faster, more memory-efficient and more accurate than the state-of-the-art Sliding Sketch while still being generic. Extensive experimental results reveal that HSS significantly enhances the accuracy for the three query tasks, achieving improvements of $2times $ to $28.7times $ , $1.5times $ to $9times $ , and $2.4times $ to $3.6times $ , respectively. Moreover, in terms of speed, HSS is $1.2times $ to $1.5times $ faster than the Sliding Sketch.
网络测量是网络管理不可或缺的一部分。本文重点研究了三种基本的网络测量任务:隶属度查询、频率查询和重量级查询。现有的解决方案,如草图、滑动窗口算法和滑动草图框架,努力同时实现内存效率、准确性、实时操作和通用应用。因此,本文提出了半滑动草图(HSS),这是对最先进的滑动草图框架的改进。HSS框架应用于上述三个查询任务的五个当代草图。理论分析表明,我们的框架比最先进的滑动草图更快,内存效率更高,更准确,同时仍然是通用的。大量的实验结果表明,HSS显著提高了这三个查询任务的准确率,分别提高了$2times $至$28.7times $, $1.5times $至$9times $, $2.4times $至$3.6times $。此外,在速度方面,HSS比滑动草图快1.2倍到1.5倍。
{"title":"HSS: A Memory-Efficient, Accurate, and Fast Network Measurement Framework in Sliding Windows","authors":"Zijun Hang;Yongjie Wang;Yuliang Lu","doi":"10.1109/TNSM.2024.3460751","DOIUrl":"https://doi.org/10.1109/TNSM.2024.3460751","url":null,"abstract":"Network measurement is indispensable to network management. This paper focuses on three fundamental network measurement tasks: membership query, frequency query, and heavy hitter query. Existing solutions, such as sketches, sliding window algorithms, and the Sliding Sketch framework, struggle to simultaneously achieve memory efficiency, accuracy, real-time operation, and generic application. Accordingly, this paper proposes the Half Sliding Sketch (HSS), an improvement over the state-of-the-art Sliding Sketch framework. The HSS framework is applied to five contemporary sketches for the three aforementioned query tasks. Theoretical analysis reveals that our framework is faster, more memory-efficient and more accurate than the state-of-the-art Sliding Sketch while still being generic. Extensive experimental results reveal that HSS significantly enhances the accuracy for the three query tasks, achieving improvements of \u0000<inline-formula> <tex-math>$2times $ </tex-math></inline-formula>\u0000 to \u0000<inline-formula> <tex-math>$28.7times $ </tex-math></inline-formula>\u0000, \u0000<inline-formula> <tex-math>$1.5times $ </tex-math></inline-formula>\u0000 to \u0000<inline-formula> <tex-math>$9times $ </tex-math></inline-formula>\u0000, and \u0000<inline-formula> <tex-math>$2.4times $ </tex-math></inline-formula>\u0000 to \u0000<inline-formula> <tex-math>$3.6times $ </tex-math></inline-formula>\u0000, respectively. Moreover, in terms of speed, HSS is \u0000<inline-formula> <tex-math>$1.2times $ </tex-math></inline-formula>\u0000 to \u0000<inline-formula> <tex-math>$1.5times $ </tex-math></inline-formula>\u0000 faster than the Sliding Sketch.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"5958-5976"},"PeriodicalIF":4.7,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142880341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LRB: Locally Repairable Blockchain for IoT Integration LRB:用于物联网集成的本地可修复区块链
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-17 DOI: 10.1109/TNSM.2024.3462813
Zihan Jiang;Qi Chen;Zhihong Deng;He Zhang
Recently, blockchain has become a crucial technology for addressing security concerns in the Internet of Things (IoT). However, the substantial storage requirements of blockchain present a major obstacle to integrating IoT with blockchain. This paper introduces a novel coded blockchain architecture called locally repairable blockchain (LRB) to reduce the storage costs for IoT devices. Our architecture employs a node selection allocation algorithm to determine encoding parameters and local repair groups based on the blockchain’s current state, enhancing system availability. We also present a new coding process, GELRC, which combines group coding exchange methods with locally repairable codes, significantly reducing encoding complexity. GELRC facilitates low-cost local repair and improves fault tolerance. Furthermore, we introduce a specialized Vandermonde matrix for designing the local codes of LRB, enhancing the scalability of existing coded blockchains. Experimental results demonstrate that our architecture outperforms previous coded blockchain solutions with greater fault tolerance, improved single-point repair capabilities, lower coding complexity, and particularly, eliminates the need for re-encoding when new nodes are added.
最近,区块链已经成为解决物联网(IoT)安全问题的关键技术。然而,区块链的大量存储需求是物联网与区块链集成的主要障碍。为了降低物联网设备的存储成本,本文介绍了一种称为本地可修复区块链(local repair区块链,LRB)的新型编码区块链架构。我们的架构采用节点选择分配算法,根据区块链的当前状态确定编码参数和本地修复组,提高了系统的可用性。我们还提出了一种新的编码过程GELRC,它将分组编码交换方法与局部可修复编码相结合,显著降低了编码复杂度。GELRC促进了低成本的本地维修,并提高了容错性。此外,我们引入了一个专门的Vandermonde矩阵来设计LRB的局部代码,增强了现有编码区块链的可扩展性。实验结果表明,我们的架构优于以前编码的区块链解决方案,具有更大的容错性,改进的单点修复能力,更低的编码复杂性,特别是在添加新节点时无需重新编码。
{"title":"LRB: Locally Repairable Blockchain for IoT Integration","authors":"Zihan Jiang;Qi Chen;Zhihong Deng;He Zhang","doi":"10.1109/TNSM.2024.3462813","DOIUrl":"10.1109/TNSM.2024.3462813","url":null,"abstract":"Recently, blockchain has become a crucial technology for addressing security concerns in the Internet of Things (IoT). However, the substantial storage requirements of blockchain present a major obstacle to integrating IoT with blockchain. This paper introduces a novel coded blockchain architecture called locally repairable blockchain (LRB) to reduce the storage costs for IoT devices. Our architecture employs a node selection allocation algorithm to determine encoding parameters and local repair groups based on the blockchain’s current state, enhancing system availability. We also present a new coding process, GELRC, which combines group coding exchange methods with locally repairable codes, significantly reducing encoding complexity. GELRC facilitates low-cost local repair and improves fault tolerance. Furthermore, we introduce a specialized Vandermonde matrix for designing the local codes of LRB, enhancing the scalability of existing coded blockchains. Experimental results demonstrate that our architecture outperforms previous coded blockchain solutions with greater fault tolerance, improved single-point repair capabilities, lower coding complexity, and particularly, eliminates the need for re-encoding when new nodes are added.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"6233-6247"},"PeriodicalIF":4.7,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142264521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Popularity-Conscious Service Caching and Offloading in Digital Twin and NOMA-Aided Connected Autonomous Vehicular Systems 数字孪生和 NOMA 辅助互联自主车载系统中具有流行意识的服务缓存和卸载
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-17 DOI: 10.1109/TNSM.2024.3462481
Biswadip Bandyopadhyay;Pratyay Kuila;Mahesh Chandra Govil
The proliferation of 5G/B5G communication has led to increased integration between digital twin (DT) technology and connected autonomous vehicular systems (CAVS). The complex and resource-intensive vehicular applications pose significant connectivity and performance challenges for CAVS. To improve connectivity, optimize spectrum allocation, and mitigate network congestion, non-orthogonal multiple access (NOMA) is implemented. Furthermore, offloading and service caching are employed by storing and offloading relevant services at the edge of vehicular networks. However, due to the limited caching storage of vehicular edge servers, the decision to cache popular and emergent services to minimize delay and energy consumption becomes challenging. The decisions regarding computation offloading and service caching are also strongly coupled. In this work, a popularity-conscious service caching and offloading problem (PSCAOP) in a DT and NOMA-aided CAVS (DTCAVS) is studied. PSCAOP is mathematically constructed and observed to be NP-complete. Then a quantum-inspired particle swarm optimization (QPSO) algorithm is proposed for DTCAVS (DTCAVS-QPSO), aiming to minimize delay and energy consumption. DTCAVS-QPSO prioritizes the popular and emergent service caching. The quantum particle (QP) is encoded to provide a comprehensive solution to the PSCAOP. A one-time mapping algorithm is used to decode the QPs. The fitness function is formulated considering delay, energy consumption, and type of service. All the phases of DTCAVS-QPSO are observed to be bounded in polynomial time. The significance of the proposed DTCAVS-QPSO is demonstrated through extensive simulations and hypothesis-based statistical analysis. Experimental outcomes underscore the superiority of the DTCAVS-QPSO over other standard works, indicating an average delay and an energy consumption reduction between 6% and 49%.
5G/B5G通信的扩散导致数字孪生(DT)技术和连接的自动驾驶汽车系统(CAVS)之间的集成增加。复杂且资源密集型的车载应用对自动驾驶汽车的连接性和性能提出了重大挑战。为了提高网络连通性、优化频谱分配和缓解网络拥塞,采用了非正交多址(NOMA)技术。此外,通过在车辆网络边缘存储和卸载相关服务,采用了卸载和服务缓存。然而,由于车载边缘服务器的缓存存储有限,缓存流行和紧急服务以最小化延迟和能耗的决策变得具有挑战性。关于计算卸载和服务缓存的决策也是强耦合的。在这项工作中,研究了DT和noma辅助的CAVS (DTCAVS)中的流行感知服务缓存和卸载问题(PSCAOP)。pscop的数学构造和观察是np完全的。然后提出了一种量子启发粒子群优化算法(DTCAVS-QPSO),以最小化延迟和能量消耗。dtcav - qpso优先考虑流行的和紧急的服务缓存。对量子粒子(QP)进行编码,为pscop提供了一个全面的解决方案。使用一次性映射算法对qp进行解码。考虑时延、能耗和服务类型,建立了适应度函数。在多项式时间内观察到DTCAVS-QPSO的所有相位都是有界的。通过广泛的模拟和基于假设的统计分析,证明了所提出的DTCAVS-QPSO的意义。实验结果强调了DTCAVS-QPSO优于其他标准工作,表明平均延迟和能耗降低在6%到49%之间。
{"title":"Popularity-Conscious Service Caching and Offloading in Digital Twin and NOMA-Aided Connected Autonomous Vehicular Systems","authors":"Biswadip Bandyopadhyay;Pratyay Kuila;Mahesh Chandra Govil","doi":"10.1109/TNSM.2024.3462481","DOIUrl":"10.1109/TNSM.2024.3462481","url":null,"abstract":"The proliferation of 5G/B5G communication has led to increased integration between digital twin (DT) technology and connected autonomous vehicular systems (CAVS). The complex and resource-intensive vehicular applications pose significant connectivity and performance challenges for CAVS. To improve connectivity, optimize spectrum allocation, and mitigate network congestion, non-orthogonal multiple access (NOMA) is implemented. Furthermore, offloading and service caching are employed by storing and offloading relevant services at the edge of vehicular networks. However, due to the limited caching storage of vehicular edge servers, the decision to cache popular and emergent services to minimize delay and energy consumption becomes challenging. The decisions regarding computation offloading and service caching are also strongly coupled. In this work, a popularity-conscious service caching and offloading problem (PSCAOP) in a DT and NOMA-aided CAVS (DTCAVS) is studied. PSCAOP is mathematically constructed and observed to be NP-complete. Then a quantum-inspired particle swarm optimization (QPSO) algorithm is proposed for DTCAVS (DTCAVS-QPSO), aiming to minimize delay and energy consumption. DTCAVS-QPSO prioritizes the popular and emergent service caching. The quantum particle (QP) is encoded to provide a comprehensive solution to the PSCAOP. A one-time mapping algorithm is used to decode the QPs. The fitness function is formulated considering delay, energy consumption, and type of service. All the phases of DTCAVS-QPSO are observed to be bounded in polynomial time. The significance of the proposed DTCAVS-QPSO is demonstrated through extensive simulations and hypothesis-based statistical analysis. Experimental outcomes underscore the superiority of the DTCAVS-QPSO over other standard works, indicating an average delay and an energy consumption reduction between 6% and 49%.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"6451-6464"},"PeriodicalIF":4.7,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142264519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Feature Selection for Predicting Application Performance Degradation in Edge Cloud Environments 预测边缘云环境中应用程序性能退化的自适应特征选择
IF 5.3 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-17 DOI: 10.1109/tnsm.2024.3462831
Behshid Shayesteh, Chunyan Fu, Amin Ebrahimzadeh, Roch Glitho
{"title":"Adaptive Feature Selection for Predicting Application Performance Degradation in Edge Cloud Environments","authors":"Behshid Shayesteh, Chunyan Fu, Amin Ebrahimzadeh, Roch Glitho","doi":"10.1109/tnsm.2024.3462831","DOIUrl":"https://doi.org/10.1109/tnsm.2024.3462831","url":null,"abstract":"","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"20 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142264766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SECURE: Secure and Efficient Protocol Using Randomness and Edge-Computing for Drone-Assisted Internet of Vehicles SECURE:利用随机性和边缘计算实现无人机辅助车联网的安全高效 ProtoCol
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-17 DOI: 10.1109/TNSM.2024.3462746
Himani Sikarwar;Harsha Vasudev;Debasis Das;Mauro Conti;Koustav Kumar Mondal
The Internet of Vehicles (IoV) faces significant challenges related to secure authentication, efficient communication, and privacy preservation due to the high mobility of vehicles, the need for real-time data processing, varying quality of communication links, and the diverse range of devices and protocols requiring interoperability. These challenges are further complicated by the large-scale, dynamic, and heterogeneous nature of IoV systems. Traditional approaches using Road Side Connecting Nodes (RSCNs) face challenges like limited range, high costs, and single points of failure. Drone-assisted IoV (DIoV) networks address these issues by using Unmanned Aerial Vehicles (UAVs) as mobile edge nodes, enhancing connectivity, extending coverage, and improving adaptability and resilience. To address these challenges, we propose SECURE, a drone-assisted, Physically Unclonable Function (PUF)-based authentication and privacy-preserving protocol integrated with edge computing. This architecture replaces RSCNs with edge nodes and incorporates UAVs as mobile edge nodes, providing extended coverage, reduced latency, and enhanced adaptability. The PUFs in SECURE generate unique hardware-based cryptographic keys, adding an additional layer of security, while edge computing offloads computational tasks, improves network efficiency, and further reduces latency. The formal security analysis, conducted using the Random Oracle Model (ROM), proves the robustness of the session key against active and passive adversaries. Furthermore, informal security analysis demonstrates that SECURE effectively resists various security attacks, while achieving confidentiality, integrity, and authenticity in DIoV. In SECURE, we have considered two types of devices for experiments: NVIDIA Jetson Xavier NX and Raspberry Pi 4. The performance analysis, considering the results from Jetson Xavier NX, demonstrates that SECURE achieves maximum upto approximately 82.1% less communication cost and 78% faster computation time compared to the state-of-the-art schemes.
由于车辆的高移动性、对实时数据处理的需求、不同质量的通信链路以及需要互操作性的各种设备和协议,车联网(IoV)面临着与安全认证、高效通信和隐私保护相关的重大挑战。由于车联网系统的大规模、动态和异构特性,这些挑战变得更加复杂。使用路旁连接节点(rscn)的传统方法面临着范围有限、成本高和单点故障等挑战。无人机辅助物联网(DIoV)网络通过使用无人机(uav)作为移动边缘节点,增强连接性,扩大覆盖范围,提高适应性和弹性,解决了这些问题。为了应对这些挑战,我们提出了SECURE,这是一种无人机辅助的、基于物理不可克隆功能(PUF)的身份验证和隐私保护协议,与边缘计算集成在一起。该架构用边缘节点取代rscn,并将无人机作为移动边缘节点,提供更大的覆盖范围、更低的延迟和更强的适应性。SECURE中的puf生成唯一的基于硬件的加密密钥,增加了额外的安全层,而边缘计算则减轻了计算任务,提高了网络效率,并进一步降低了延迟。使用随机Oracle模型(ROM)进行的正式安全分析证明了会话密钥对主动和被动攻击者的鲁棒性。此外,非正式的安全分析表明,SECURE在实现DIoV的机密性、完整性和真实性的同时,有效地抵抗了各种安全攻击。在SECURE中,我们考虑了两种类型的设备进行实验:NVIDIA Jetson Xavier NX和Raspberry Pi 4。考虑到Jetson Xavier NX的结果,性能分析表明,与最先进的方案相比,SECURE实现了最高可达约82.1%的通信成本和78%的计算时间。
{"title":"SECURE: Secure and Efficient Protocol Using Randomness and Edge-Computing for Drone-Assisted Internet of Vehicles","authors":"Himani Sikarwar;Harsha Vasudev;Debasis Das;Mauro Conti;Koustav Kumar Mondal","doi":"10.1109/TNSM.2024.3462746","DOIUrl":"10.1109/TNSM.2024.3462746","url":null,"abstract":"The Internet of Vehicles (IoV) faces significant challenges related to secure authentication, efficient communication, and privacy preservation due to the high mobility of vehicles, the need for real-time data processing, varying quality of communication links, and the diverse range of devices and protocols requiring interoperability. These challenges are further complicated by the large-scale, dynamic, and heterogeneous nature of IoV systems. Traditional approaches using Road Side Connecting Nodes (RSCNs) face challenges like limited range, high costs, and single points of failure. Drone-assisted IoV (DIoV) networks address these issues by using Unmanned Aerial Vehicles (UAVs) as mobile edge nodes, enhancing connectivity, extending coverage, and improving adaptability and resilience. To address these challenges, we propose SECURE, a drone-assisted, Physically Unclonable Function (PUF)-based authentication and privacy-preserving protocol integrated with edge computing. This architecture replaces RSCNs with edge nodes and incorporates UAVs as mobile edge nodes, providing extended coverage, reduced latency, and enhanced adaptability. The PUFs in SECURE generate unique hardware-based cryptographic keys, adding an additional layer of security, while edge computing offloads computational tasks, improves network efficiency, and further reduces latency. The formal security analysis, conducted using the Random Oracle Model (ROM), proves the robustness of the session key against active and passive adversaries. Furthermore, informal security analysis demonstrates that SECURE effectively resists various security attacks, while achieving confidentiality, integrity, and authenticity in DIoV. In SECURE, we have considered two types of devices for experiments: NVIDIA Jetson Xavier NX and Raspberry Pi 4. The performance analysis, considering the results from Jetson Xavier NX, demonstrates that SECURE achieves maximum upto approximately 82.1% less communication cost and 78% faster computation time compared to the state-of-the-art schemes.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"6974-6988"},"PeriodicalIF":4.7,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142264557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge Computing Management With Collaborative Lazy Pulling for Accelerated Container Startup 利用协作式懒拉功能进行边缘计算管理,加快容器启动速度
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-17 DOI: 10.1109/TNSM.2024.3462408
Chiao-Cheng Chen;Yao Chiang;Yu-Chieh Lee;Hung-Yu Wei
With the growing demand for latency-sensitive applications in 5G networks, edge computing has emerged as a promising solution. It enables instant response and dynamic resource allocation based on real-time network information by moving resources from the cloud to the network edge. Containers, known for their lightweight nature and ease of deployment, have been recognized as a valuable virtualization technology for service deployment. However, the prolonged startup time of containers can lead to long response time, particularly in edge computing scenarios characterized by long propagation time, frequent deployment, and migration. In this paper, we comprehensively consider image caching, container assignment, and registry selection problem in an edge system. To our best effort, there is no existing work that has taken all the above aspects into account. To address the problem, we propose a novel image caching strategy that employs partial caching, allowing local registries to cache either the least functional or complete version of application images. In addition, a container assignment and registry selection problem is solved by using an edge-based collaborative lazy pulling algorithm. To evaluate the performance of our proposed algorithms, we conduct experiments with real-world app usage data and popular images in a testbed environment. The experimental results demonstrate that our algorithms outperform traditional greedy algorithms in terms of average user response time and cache hit rate.
随着5G网络中对延迟敏感应用的需求不断增长,边缘计算已成为一种有前途的解决方案。它通过将资源从云端移动到网络边缘,实现基于实时网络信息的即时响应和动态资源分配。容器以其轻量级特性和易于部署而闻名,已被认为是服务部署的一种有价值的虚拟化技术。然而,容器启动时间过长可能导致响应时间过长,特别是在以传播时间长、部署频繁和迁移为特征的边缘计算场景中。本文综合考虑了边缘系统中的图像缓存、容器分配和注册表选择问题。尽我们最大的努力,目前还没有一项工作考虑到上述所有方面。为了解决这个问题,我们提出了一种新的图像缓存策略,该策略采用部分缓存,允许本地注册中心缓存功能最少的或完整版本的应用程序图像。此外,采用基于边缘的协同延迟拉取算法解决了容器分配和注册表选择问题。为了评估我们提出的算法的性能,我们在测试平台环境中使用真实应用程序使用数据和流行图像进行了实验。实验结果表明,我们的算法在平均用户响应时间和缓存命中率方面优于传统的贪婪算法。
{"title":"Edge Computing Management With Collaborative Lazy Pulling for Accelerated Container Startup","authors":"Chiao-Cheng Chen;Yao Chiang;Yu-Chieh Lee;Hung-Yu Wei","doi":"10.1109/TNSM.2024.3462408","DOIUrl":"10.1109/TNSM.2024.3462408","url":null,"abstract":"With the growing demand for latency-sensitive applications in 5G networks, edge computing has emerged as a promising solution. It enables instant response and dynamic resource allocation based on real-time network information by moving resources from the cloud to the network edge. Containers, known for their lightweight nature and ease of deployment, have been recognized as a valuable virtualization technology for service deployment. However, the prolonged startup time of containers can lead to long response time, particularly in edge computing scenarios characterized by long propagation time, frequent deployment, and migration. In this paper, we comprehensively consider image caching, container assignment, and registry selection problem in an edge system. To our best effort, there is no existing work that has taken all the above aspects into account. To address the problem, we propose a novel image caching strategy that employs partial caching, allowing local registries to cache either the least functional or complete version of application images. In addition, a container assignment and registry selection problem is solved by using an edge-based collaborative lazy pulling algorithm. To evaluate the performance of our proposed algorithms, we conduct experiments with real-world app usage data and popular images in a testbed environment. The experimental results demonstrate that our algorithms outperform traditional greedy algorithms in terms of average user response time and cache hit rate.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"6437-6450"},"PeriodicalIF":4.7,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142264517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fine-Grained Packet Loss Tolerance Transmission Algorithm for Communication Optimization in Distributed Deep Learning 基于分布式深度学习的细粒度容错传输算法
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.1109/TNSM.2024.3461875
Yifei Lu;Jingqi Li;Shuren Li;Chanying Huang
Communication overhead is a significant challenge in distributed deep learning (DDL) training, often hindering efficiency. While existing solutions like gradient compression, compute/communication overlap, and layer-wise flow scheduling have been proposed, they are often coarse-grained and insufficient, especially under network congestion. These congestion-unaware methods can lead to long flow completion times, known as the tail latency, resulting in extended training time. In this paper, we argue that packet loss tolerance methods can mitigate the tail latency issue without sacrificing training accuracy, with the tolerance bound varying across different DDL model layers. We introduce PLOT, a fine-grained packet loss tolerance algorithm, which optimizes communication overhead by leveraging the layer-specific loss tolerance of the DNN model. PLOT employs a UDP-based transmission mechanism for gradient transfer, addressing the tail latency issue and maintaining training accuracy through packet loss tolerance. Our evaluations on both small-scale testbeds and large-scale simulations show that PLOT outperforms other congestion algorithms, effectively reducing tail latency and DDL training time.
在分布式深度学习(DDL)训练中,通信开销是一个重要的挑战,经常会影响训练效率。虽然现有的解决方案,如梯度压缩、计算/通信重叠和分层流调度已经被提出,但它们往往是粗粒度的,而且不足,特别是在网络拥塞的情况下。这些不了解拥塞的方法可能导致较长的流完成时间,即所谓的尾部延迟,从而延长训练时间。在本文中,我们认为丢包容忍方法可以在不牺牲训练精度的情况下减轻尾部延迟问题,并且容忍界限在不同的DDL模型层之间是不同的。我们介绍了PLOT,一种细粒度的包丢失容忍算法,它通过利用DNN模型的特定层的丢失容忍来优化通信开销。PLOT采用基于udp的传输机制进行梯度传输,解决了尾部延迟问题,并通过丢包容忍度保持训练精度。我们在小规模测试平台和大规模模拟上的评估表明,PLOT优于其他拥塞算法,有效地减少了尾部延迟和DDL训练时间。
{"title":"A Fine-Grained Packet Loss Tolerance Transmission Algorithm for Communication Optimization in Distributed Deep Learning","authors":"Yifei Lu;Jingqi Li;Shuren Li;Chanying Huang","doi":"10.1109/TNSM.2024.3461875","DOIUrl":"https://doi.org/10.1109/TNSM.2024.3461875","url":null,"abstract":"Communication overhead is a significant challenge in distributed deep learning (DDL) training, often hindering efficiency. While existing solutions like gradient compression, compute/communication overlap, and layer-wise flow scheduling have been proposed, they are often coarse-grained and insufficient, especially under network congestion. These congestion-unaware methods can lead to long flow completion times, known as the tail latency, resulting in extended training time. In this paper, we argue that packet loss tolerance methods can mitigate the tail latency issue without sacrificing training accuracy, with the tolerance bound varying across different DDL model layers. We introduce PLOT, a fine-grained packet loss tolerance algorithm, which optimizes communication overhead by leveraging the layer-specific loss tolerance of the DNN model. PLOT employs a UDP-based transmission mechanism for gradient transfer, addressing the tail latency issue and maintaining training accuracy through packet loss tolerance. Our evaluations on both small-scale testbeds and large-scale simulations show that PLOT outperforms other congestion algorithms, effectively reducing tail latency and DDL training time.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"6112-6125"},"PeriodicalIF":4.7,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142880296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Importance Analysis of Micro-Flow Independent Features for Detecting Distributed Network Attacks 用于检测分布式网络攻击的微流独立特征的重要性分析
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-13 DOI: 10.1109/TNSM.2024.3460082
Samuel Kopmann;Martina Zitterbart
Network infrastructures are critical and, therefore, subject to harmful attacks against their operation and the availability of their provided services. Detecting such attacks, especially in high-performance networks, is challenging considering the detection rate, reaction time, and scalability. Attack detection becomes even more demanding concerning networks of the future facing increasing data rates and flow counts. We thoroughly evaluate eMinD, an approach that scales well to high data rates and large amounts of data flows. eMinD investigates aggregated traffic data, i.e., it is not based on micro-flows and their inherent scalability problems. We evaluate eMinD with real-world traffic data, compare it to related work, and show that eMinD outperforms micro-flow-based approaches regarding the reaction time, scalability, and the detection performance. We reduce required state space by 99.97%. The average reaction time is reduced by 90%, while the detection performance is even increased, although highly aggregating arriving traffic. We further show the importance of micro-flow-overarching traffic features, e.g., IP address and port distributions, for detecting distributed network attacks, i.e., DDoS attacks and port scans.
网络基础设施至关重要,因此会受到针对其操作和所提供服务可用性的有害攻击。考虑到检测率、反应时间和可伸缩性,检测此类攻击,特别是在高性能网络中,是一项具有挑战性的工作。未来的网络将面临越来越高的数据速率和流量,对攻击检测的要求也越来越高。我们彻底评估了eMinD,这是一种可以很好地扩展到高数据速率和大量数据流的方法。eMinD调查聚合的交通数据,也就是说,它不是基于微流及其固有的可扩展性问题。我们用真实世界的交通数据评估了eMinD,并将其与相关工作进行了比较,结果表明,eMinD在反应时间、可扩展性和检测性能方面优于基于微流的方法。我们将所需的状态空间减少了99.97%。平均反应时间减少了90%,而检测性能甚至有所提高,尽管高度聚合到达的流量。我们进一步展示了微流总体流量特征的重要性,例如,IP地址和端口分布,用于检测分布式网络攻击,即DDoS攻击和端口扫描。
{"title":"Importance Analysis of Micro-Flow Independent Features for Detecting Distributed Network Attacks","authors":"Samuel Kopmann;Martina Zitterbart","doi":"10.1109/TNSM.2024.3460082","DOIUrl":"10.1109/TNSM.2024.3460082","url":null,"abstract":"Network infrastructures are critical and, therefore, subject to harmful attacks against their operation and the availability of their provided services. Detecting such attacks, especially in high-performance networks, is challenging considering the detection rate, reaction time, and scalability. Attack detection becomes even more demanding concerning networks of the future facing increasing data rates and flow counts. We thoroughly evaluate eMinD, an approach that scales well to high data rates and large amounts of data flows. eMinD investigates aggregated traffic data, i.e., it is not based on micro-flows and their inherent scalability problems. We evaluate eMinD with real-world traffic data, compare it to related work, and show that eMinD outperforms micro-flow-based approaches regarding the reaction time, scalability, and the detection performance. We reduce required state space by 99.97%. The average reaction time is reduced by 90%, while the detection performance is even increased, although highly aggregating arriving traffic. We further show the importance of micro-flow-overarching traffic features, e.g., IP address and port distributions, for detecting distributed network attacks, i.e., DDoS attacks and port scans.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"5947-5957"},"PeriodicalIF":4.7,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142264522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Network and Service Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1