首页 > 最新文献

IEEE Transactions on Network and Service Management最新文献

英文 中文
A GNN-Based Autopilot Recommendation Strategy to Mitigate Payment Channel Imbalance Problem in Bitcoin Lightning Network 基于gnn的自动驾驶推荐策略缓解比特币闪电网络支付通道不平衡问题
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-18 DOI: 10.1109/TNSM.2025.3599393
Mohammad Saleh Mahdizadeh;Behnam Bahrak;Mohammad Sayad Haghighi
The Bitcoin Lightning Network, as a second-layer solution for enhancing the scalability of Bitcoin transactions, facilitates transactions through payment channels between nodes. However, the rapid growth of the network and rising transaction volumes have exacerbated the challenge of managing payment channel imbalances. Payment channel imbalance, characterized by the concentration of liquidity in one direction, leads to a decrease in payment success rates, a reduction in the effective lifespan of payment channels, and a decline in the network’s overall efficiency and throughput. This study introduces a graph neural network-based recommendation strategy designed to enhance the Lightning Network’s autopilot system. The proposed approach proactively mitigates channel imbalances by optimizing channel recommendations, enabling dynamic and scalable liquidity management for network users. Simulations conducted using the CLoTH tool demonstrate a 45% increase in payment success rates, a 46% reduction in imbalanced channels, and a 14% increase in the lifespan of payment channels across the network compared to the existing autopilot recommendation strategies, and when compared with the commonly adopted circular rebalancing method, the proposed strategy achieves a 27% improvement in payment success rates. Additionally, we offer a comparative topological analysis between two snapshots of the LN, taken in November 2021 and August 2023, to facilitate unsupervised learning tasks. The results highlight an increase in network centralization alongside a decrease in the network size, emphasizing the growing need for decentralization strategies in the LN, such as the one proposed in this study.
比特币闪电网络作为增强比特币交易可扩展性的第二层解决方案,通过节点之间的支付通道促进交易。然而,网络的快速增长和交易量的上升加剧了管理支付渠道失衡的挑战。支付通道不平衡以流动性向一个方向集中为特征,导致支付成功率下降,支付通道有效寿命缩短,网络整体效率和吞吐量下降。本研究介绍了一种基于图神经网络的推荐策略,旨在增强闪电网络的自动驾驶系统。所提出的方法通过优化渠道建议,主动减轻渠道不平衡,为网络用户提供动态和可扩展的流动性管理。使用CLoTH工具进行的模拟表明,与现有的自动驾驶推荐策略相比,支付成功率提高了45%,不平衡渠道减少了46%,整个网络的支付渠道寿命延长了14%,与通常采用的循环再平衡方法相比,所提出的策略在支付成功率方面提高了27%。此外,我们提供了2021年11月和2023年8月拍摄的两个LN快照之间的比较拓扑分析,以促进无监督学习任务。结果突出了网络集中化的增加以及网络规模的减少,强调了LN中对去中心化策略的需求日益增长,例如本研究中提出的策略。
{"title":"A GNN-Based Autopilot Recommendation Strategy to Mitigate Payment Channel Imbalance Problem in Bitcoin Lightning Network","authors":"Mohammad Saleh Mahdizadeh;Behnam Bahrak;Mohammad Sayad Haghighi","doi":"10.1109/TNSM.2025.3599393","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3599393","url":null,"abstract":"The Bitcoin Lightning Network, as a second-layer solution for enhancing the scalability of Bitcoin transactions, facilitates transactions through payment channels between nodes. However, the rapid growth of the network and rising transaction volumes have exacerbated the challenge of managing payment channel imbalances. Payment channel imbalance, characterized by the concentration of liquidity in one direction, leads to a decrease in payment success rates, a reduction in the effective lifespan of payment channels, and a decline in the network’s overall efficiency and throughput. This study introduces a graph neural network-based recommendation strategy designed to enhance the Lightning Network’s autopilot system. The proposed approach proactively mitigates channel imbalances by optimizing channel recommendations, enabling dynamic and scalable liquidity management for network users. Simulations conducted using the CLoTH tool demonstrate a 45% increase in payment success rates, a 46% reduction in imbalanced channels, and a 14% increase in the lifespan of payment channels across the network compared to the existing autopilot recommendation strategies, and when compared with the commonly adopted circular rebalancing method, the proposed strategy achieves a 27% improvement in payment success rates. Additionally, we offer a comparative topological analysis between two snapshots of the LN, taken in November 2021 and August 2023, to facilitate unsupervised learning tasks. The results highlight an increase in network centralization alongside a decrease in the network size, emphasizing the growing need for decentralization strategies in the LN, such as the one proposed in this study.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"1863-1873"},"PeriodicalIF":5.4,"publicationDate":"2025-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145982125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reducing Mobility-Related Signaling With Network Sum Throughput Maximization in 5G 在5G网络和吞吐量最大化中减少移动相关的信令
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-15 DOI: 10.1109/TNSM.2025.3599203
Anna Prado;Fidan Mehmeti;Wolfgang Kellerer
Signal quality fluctuates significantly due to blockages of Line of Sight, shadowing, and user mobility. This renders mobility management in 5G quite challenging. To improve it, 3GPP introduced Conditional Handover (CHO), which reduces handover failures by preparing target Base Stations (BSs) in advance. CHO adapts to the varying channel conditions and constantly prepares/releases cells, which leads to an increased exchange of control messages between the user and BSs. Connecting to the BS with the strongest signal is not always beneficial because the available resources and other users’ channels should be considered for a successful network operation. Hence, the need to carefully decide when to hand over, and when that happens, to select the best target BS. In this paper, we first formulate an optimization problem that minimizes network signaling by reducing the number of unprepared handovers and wasted cell preparations while providing a minimum rate to everyone. As the problem is NP-hard, we relax it and obtain a lower bound. Then, we propose a Cost-Efficient CHO (CECHO) algorithm with performance guarantees. Using 5G datasets, we compare CECHO with two baselines and show that it outperforms them by at least 45% while being near-optimal. However, reducing the signaling decreases the total throughput, which is an important metric for the network operator. Thus, we expand our initial problem into a Multi-Objective (MO) optimization, where we additionally maximize the network sum throughput. Results show that CECHO-MO increases the sum throughput more than $3times $ with only a 4% increase in signaling.
由于视线、阴影和用户移动性的阻塞,信号质量波动很大。这使得5G的移动性管理非常具有挑战性。为了改进这一点,3GPP引入了条件切换(CHO),通过提前准备目标基站(BSs)来减少切换失败。CHO适应不同的信道条件并不断准备/释放cell,这导致用户和BSs之间控制消息的交换增加。连接到具有最强信号的BS并不总是有益的,因为为了成功的网络操作,应该考虑可用资源和其他用户的信道。因此,需要仔细决定何时移交,以及当这种情况发生时,选择最佳目标BS。在本文中,我们首先制定了一个优化问题,通过减少未准备的移交数量和浪费的细胞准备,同时为每个人提供最小的速率,从而最大限度地减少网络信令。由于问题是np困难的,我们将其松弛并得到一个下界。然后,我们提出了一种具有性能保证的Cost-Efficient CHO (CECHO)算法。使用5G数据集,我们将CECHO与两条基线进行比较,结果表明,CECHO在接近最佳的情况下,其性能至少优于它们45%。然而,减少信令会降低总吞吐量,这是网络运营商的一个重要指标。因此,我们将初始问题扩展为多目标(MO)优化,其中我们额外最大化网络和吞吐量。结果表明,ceho - mo使总吞吐量增加了3倍以上,而信令量仅增加了4%。
{"title":"Reducing Mobility-Related Signaling With Network Sum Throughput Maximization in 5G","authors":"Anna Prado;Fidan Mehmeti;Wolfgang Kellerer","doi":"10.1109/TNSM.2025.3599203","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3599203","url":null,"abstract":"Signal quality fluctuates significantly due to blockages of Line of Sight, shadowing, and user mobility. This renders mobility management in 5G quite challenging. To improve it, 3GPP introduced Conditional Handover (CHO), which reduces handover failures by preparing target Base Stations (BSs) in advance. CHO adapts to the varying channel conditions and constantly prepares/releases cells, which leads to an increased exchange of control messages between the user and BSs. Connecting to the BS with the strongest signal is not always beneficial because the available resources and other users’ channels should be considered for a successful network operation. Hence, the need to carefully decide when to hand over, and when that happens, to select the best target BS. In this paper, we first formulate an optimization problem that minimizes network signaling by reducing the number of unprepared handovers and wasted cell preparations while providing a minimum rate to everyone. As the problem is NP-hard, we relax it and obtain a lower bound. Then, we propose a Cost-Efficient CHO (CECHO) algorithm with performance guarantees. Using 5G datasets, we compare CECHO with two baselines and show that it outperforms them by at least 45% while being near-optimal. However, reducing the signaling decreases the total throughput, which is an important metric for the network operator. Thus, we expand our initial problem into a Multi-Objective (MO) optimization, where we additionally maximize the network sum throughput. Results show that CECHO-MO increases the sum throughput more than <inline-formula> <tex-math>$3times $ </tex-math></inline-formula> with only a 4% increase in signaling.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 6","pages":"6048-6065"},"PeriodicalIF":5.4,"publicationDate":"2025-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11126168","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145665775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensify: A Learning-Based Budget-Aware Task Assignment in Mobile Crowdsensing 敏感性:基于学习的预算感知任务分配在移动众传感
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-12 DOI: 10.1109/TNSM.2025.3597953
Shabnam Seradji;Ahmad Khonsari;Vahid Shah-Mansouri;Mahdi Dolati;Masoumeh Moradian
Accurate and comprehensive data acquisition is critical for modern data-driven environmental applications. Mobile Crowdsensing (MCS) offers an effective approach by leveraging user participation to collect environmental data through task assignment. To minimize costs, MCS platforms often partition the environment into subareas and utilize inference algorithms to extrapolate data for entire subareas based on partial sensing in a limited subset. However, determining the optimal set of users for sensing tasks remains challenging due to constraints such as user availability and the complexity of data inference models. This paper introduces Sensify, a task assignment strategy that optimizes data acquisition by accounting for data correlations and budget constraints. Sensify efficiently selects subareas and recruits cost-effective users for sensing tasks, incorporating user-specific contexts such as location and device power availability during task assignment. To adaptively manage the platform budget, the strategy considers a dynamic set of users with varying costs over time. A deep recurrent reinforcement learning-based network is employed to select optimal subareas for sensing, while user recruitment is dynamically optimized using a reinforcement learning approach. Specifically, a modified Contextual Combinatorial Multi-Armed Bandit (CC-MAB) framework is utilized to handle the volatility and variability in user costs. Experiments conducted on two real-world datasets demonstrate that Sensify can improve data acquisition by up to 7% compared to existing approaches.
准确和全面的数据采集对于现代数据驱动的环境应用至关重要。移动群体感知(MCS)提供了一种有效的方法,利用用户参与,通过任务分配来收集环境数据。为了最大限度地降低成本,MCS平台通常将环境划分为子区域,并利用推理算法根据有限子集中的部分感知来推断整个子区域的数据。然而,由于用户可用性和数据推理模型的复杂性等限制,确定传感任务的最佳用户集仍然具有挑战性。本文介绍了Sensify,一种通过考虑数据相关性和预算约束来优化数据采集的任务分配策略。Sensify有效地选择子区域并招募具有成本效益的用户进行传感任务,在任务分配期间结合用户特定的上下文,如位置和设备电源可用性。为了自适应地管理平台预算,该策略考虑了一组随时间变化成本的动态用户。采用基于深度循环强化学习的网络选择最优子区域进行感知,同时采用强化学习方法动态优化用户招募。具体来说,采用了一种改进的上下文组合多臂强盗(CC-MAB)框架来处理用户成本的波动性和可变性。在两个真实数据集上进行的实验表明,与现有方法相比,Sensify可以将数据采集效率提高7%。
{"title":"Sensify: A Learning-Based Budget-Aware Task Assignment in Mobile Crowdsensing","authors":"Shabnam Seradji;Ahmad Khonsari;Vahid Shah-Mansouri;Mahdi Dolati;Masoumeh Moradian","doi":"10.1109/TNSM.2025.3597953","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3597953","url":null,"abstract":"Accurate and comprehensive data acquisition is critical for modern data-driven environmental applications. Mobile Crowdsensing (MCS) offers an effective approach by leveraging user participation to collect environmental data through task assignment. To minimize costs, MCS platforms often partition the environment into subareas and utilize inference algorithms to extrapolate data for entire subareas based on partial sensing in a limited subset. However, determining the optimal set of users for sensing tasks remains challenging due to constraints such as user availability and the complexity of data inference models. This paper introduces Sensify, a task assignment strategy that optimizes data acquisition by accounting for data correlations and budget constraints. Sensify efficiently selects subareas and recruits cost-effective users for sensing tasks, incorporating user-specific contexts such as location and device power availability during task assignment. To adaptively manage the platform budget, the strategy considers a dynamic set of users with varying costs over time. A deep recurrent reinforcement learning-based network is employed to select optimal subareas for sensing, while user recruitment is dynamically optimized using a reinforcement learning approach. Specifically, a modified Contextual Combinatorial Multi-Armed Bandit (CC-MAB) framework is utilized to handle the volatility and variability in user costs. Experiments conducted on two real-world datasets demonstrate that Sensify can improve data acquisition by up to 7% compared to existing approaches.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 6","pages":"6128-6142"},"PeriodicalIF":5.4,"publicationDate":"2025-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145665754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stable Task Allocation in Mobile Crowdsensing: An Interruption-Driven Approach 移动群体感知中的稳定任务分配:中断驱动方法
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-12 DOI: 10.1109/TNSM.2025.3598025
Kaimin Wei;Guozi Qi;Lin Cui;Jinpeng Chen;Xiaohui Chen;Ke Xu
In mobile crowdsensing, task interruptions can cause failures and reduce system stability. Despite the significance of this issue, few studies have addressed task allocation under interruptions. To bridge this gap, we propose IT-STA, an interruption-based stable task allocation algorithm that reallocates interrupted tasks to improve completion rates and maintain system stability. First, an efficient detection mechanism is designed to promptly identify interrupted tasks, ensuring timely intervention. Second, a distributed reallocation strategy is developed to assign interrupted tasks to suitable participants, leveraging a novel individual migration strategy that enables parallel coordination among nodes, ensuring efficient global matching and avoiding suboptimal solutions. Experimental results demonstrate IT-STA’s superiority over baselines in task allocation stability and performance.
在移动众测中,任务中断可能导致故障并降低系统稳定性。尽管这一问题具有重要意义,但很少有研究涉及中断下的任务分配。为了弥补这一差距,我们提出了IT-STA,一种基于中断的稳定任务分配算法,可以重新分配中断的任务以提高完成率并保持系统稳定性。首先,设计有效的检测机制,及时识别中断的任务,确保及时干预。其次,开发了一种分布式再分配策略,将中断的任务分配给合适的参与者,利用一种新颖的个体迁移策略,实现节点之间的并行协调,确保有效的全局匹配并避免次优解。实验结果表明,IT-STA算法在任务分配稳定性和性能上优于基线算法。
{"title":"Stable Task Allocation in Mobile Crowdsensing: An Interruption-Driven Approach","authors":"Kaimin Wei;Guozi Qi;Lin Cui;Jinpeng Chen;Xiaohui Chen;Ke Xu","doi":"10.1109/TNSM.2025.3598025","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3598025","url":null,"abstract":"In mobile crowdsensing, task interruptions can cause failures and reduce system stability. Despite the significance of this issue, few studies have addressed task allocation under interruptions. To bridge this gap, we propose IT-STA, an interruption-based stable task allocation algorithm that reallocates interrupted tasks to improve completion rates and maintain system stability. First, an efficient detection mechanism is designed to promptly identify interrupted tasks, ensuring timely intervention. Second, a distributed reallocation strategy is developed to assign interrupted tasks to suitable participants, leveraging a novel individual migration strategy that enables parallel coordination among nodes, ensuring efficient global matching and avoiding suboptimal solutions. Experimental results demonstrate IT-STA’s superiority over baselines in task allocation stability and performance.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 6","pages":"6190-6199"},"PeriodicalIF":5.4,"publicationDate":"2025-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145665763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
StorSec: A Comprehensive Design for Securing the Distributed IoT Storage Systems StorSec:保护分布式物联网存储系统的综合设计
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-11 DOI: 10.1109/TNSM.2025.3597550
Shiwen Zhang;Wen Zhang;Wei Liang;Wenqiang Jin;Keqin Li
Internet of Things (IoT) networks have penetrated our daily life and industries. However, IoT devices are typically small-sized with constrained storage. Distributed storage systems are emerging as promising solutions to tackle such challenges. InterPlanetary File System (IPFS) is a desired framework enabling IoT devices to upload its data to a distributed cloud while returning a hash-ID for downloading and file-sharing purposes. Nevertheless, IPFS lacks of robust security design and is vulnerable to security threats such as data tampering, and data leakage. In particular, whenever device A’s file hash-ID is shared to an arbitrary device B, device A will fully lose the control over file. In other words, device B could further share it to anyone without device A’s agreements. To conquer the challenge, we propose a comprehensive design for securing the distributed IoT storage systems, named StorSec. Specifically, we design a new heterogeneous framework using an improved attribute encryption algorithm to eliminate the single-point performance bottleneck problem, which not only realizes fine-grained access control and ensures the security of data during transmission, but also improves the performance of key generation. Secondly, we design an anomaly detection algorithm, which is based on hashchain technology and combines the user privacy metadata stored on the blockchain to complete the verification process, effectively protecting the file hash identifier, ensuring access control to the file, and thus providing protection for the security and integrity of data storage. Furthermore, we design an auditing algorithm that helps the system in tracking malicious entities. Ultimately, the security and efficiency of the proposed scheme are evaluated by both security analysis and experimental results.
物联网(IoT)网络已经渗透到我们的日常生活和工业中。然而,物联网设备通常体积小,存储空间有限。分布式存储系统正在成为解决这些挑战的有希望的解决方案。星际文件系统(IPFS)是一个理想的框架,使物联网设备能够将其数据上传到分布式云,同时返回用于下载和文件共享目的的哈希id。然而,IPFS缺乏强大的安全设计,容易受到数据篡改、数据泄露等安全威胁。特别是,每当设备A的文件哈希id共享给任意设备B时,设备A将完全失去对文件的控制。换句话说,设备B可以在没有设备A同意的情况下进一步分享给任何人。为了克服这一挑战,我们提出了一种全面的设计来保护分布式物联网存储系统,称为StorSec。具体来说,我们设计了一种新的异构框架,采用改进的属性加密算法来消除单点性能瓶颈问题,既实现了细粒度的访问控制,保证了数据在传输过程中的安全性,又提高了密钥生成的性能。其次,我们设计了一种异常检测算法,该算法基于哈希链技术,结合存储在区块链上的用户隐私元数据完成验证过程,有效地保护了文件哈希标识符,保证了对文件的访问控制,从而为数据存储的安全性和完整性提供了保护。此外,我们设计了一个审计算法,帮助系统跟踪恶意实体。最后,通过安全性分析和实验结果对该方案的安全性和有效性进行了评价。
{"title":"StorSec: A Comprehensive Design for Securing the Distributed IoT Storage Systems","authors":"Shiwen Zhang;Wen Zhang;Wei Liang;Wenqiang Jin;Keqin Li","doi":"10.1109/TNSM.2025.3597550","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3597550","url":null,"abstract":"Internet of Things (IoT) networks have penetrated our daily life and industries. However, IoT devices are typically small-sized with constrained storage. Distributed storage systems are emerging as promising solutions to tackle such challenges. InterPlanetary File System (IPFS) is a desired framework enabling IoT devices to upload its data to a distributed cloud while returning a hash-ID for downloading and file-sharing purposes. Nevertheless, IPFS lacks of robust security design and is vulnerable to security threats such as data tampering, and data leakage. In particular, whenever device A’s file hash-ID is shared to an arbitrary device B, device A will fully lose the control over file. In other words, device B could further share it to anyone without device A’s agreements. To conquer the challenge, we propose a comprehensive design for securing the distributed IoT storage systems, named StorSec. Specifically, we design a new heterogeneous framework using an improved attribute encryption algorithm to eliminate the single-point performance bottleneck problem, which not only realizes fine-grained access control and ensures the security of data during transmission, but also improves the performance of key generation. Secondly, we design an anomaly detection algorithm, which is based on hashchain technology and combines the user privacy metadata stored on the blockchain to complete the verification process, effectively protecting the file hash identifier, ensuring access control to the file, and thus providing protection for the security and integrity of data storage. Furthermore, we design an auditing algorithm that helps the system in tracking malicious entities. Ultimately, the security and efficiency of the proposed scheme are evaluated by both security analysis and experimental results.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 6","pages":"6215-6228"},"PeriodicalIF":5.4,"publicationDate":"2025-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145665747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-Preserving Authentication With Service Analytics for Forensic-Aware Cyber-Physical Systems 隐私保护认证与服务分析为法医意识的网络物理系统
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-11 DOI: 10.1109/TNSM.2025.3597417
B. D. Deebak;Seong Oun Hwang
Forensic Aware Cyber-Physical System (FA-CPS) is an evolving core of digital forensic systems that discovers the integrity of biometric service platforms. Most forensic agencies use emerging technologies such as IoT, Cloud, etc., to integrate a few core elements (networking, communication, and distributed computing) to achieve sustainable memory forensics. This systematic process brings additional capabilities to the physical systems that capture device memories to discover the evidence of malicious tools. Therefore, this paper deals with the Internet of Things (IoT) to form an effective and economical interaction with evolving technologies, including B5G/6G, edge, and cloud computing, to uncover the context of security implications. Most precisely, to sense, collect, share, and analyze numerical data from information systems, the application domain, like healthcare, utilizes computing methods and communications technologies to collect and analyze physiological data from patients in a haphazard way. Since an insecure network has security issues such as information leakage, secret key loss, and fraudulent authentication in Telehealth and remote monitoring, this work applies elliptic curve cryptography (ECC) and a physical unclonable function (PUF) to construct an AI-driven privacy-preserving key authentication framework (AID-PPKAF). In the proposed AID-PPKAF, the PUF generates key information, and ECC encrypts the parameters generated by the system to establish session key agreement and proper mutual authentication. The security analyses (both formal and informal) prove that AID-PPKAF has greater security efficiency than other state-of-the-art approaches. Lastly, a performance analysis using NS3 and a pragmatic study using SVM demonstrate the significance of identity protection in designing a more reliable authentication model.
法医感知网络物理系统(FA-CPS)是一个不断发展的数字法医系统核心,可以发现生物识别服务平台的完整性。大多数取证机构使用物联网、云等新兴技术,整合几个核心要素(网络、通信和分布式计算),实现可持续的内存取证。这个系统过程为物理系统带来了额外的功能,可以捕获设备内存以发现恶意工具的证据。因此,本文涉及物联网(IoT),以与包括B5G/6G、边缘和云计算在内的不断发展的技术形成有效和经济的交互,以揭示安全影响的背景。更准确地说,为了感知、收集、共享和分析来自信息系统的数字数据,医疗保健等应用领域利用计算方法和通信技术以随机的方式收集和分析患者的生理数据。针对不安全的网络在远程医疗和远程监控中存在信息泄露、密钥丢失和欺诈认证等安全问题,本文采用椭圆曲线加密(ECC)和物理不可克隆函数(PUF)构建了一个人工智能驱动的隐私保护密钥认证框架(AID-PPKAF)。在本文提出的AID-PPKAF中,由PUF生成密钥信息,ECC对系统生成的参数进行加密,以建立会话密钥协议和适当的相互认证。安全性分析(正式的和非正式的)证明AID-PPKAF比其他最先进的方法具有更高的安全性效率。最后,基于NS3的性能分析和基于支持向量机的语用研究表明,身份保护对于设计更可靠的认证模型具有重要意义。
{"title":"Privacy-Preserving Authentication With Service Analytics for Forensic-Aware Cyber-Physical Systems","authors":"B. D. Deebak;Seong Oun Hwang","doi":"10.1109/TNSM.2025.3597417","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3597417","url":null,"abstract":"Forensic Aware Cyber-Physical System (FA-CPS) is an evolving core of digital forensic systems that discovers the integrity of biometric service platforms. Most forensic agencies use emerging technologies such as IoT, Cloud, etc., to integrate a few core elements (networking, communication, and distributed computing) to achieve sustainable memory forensics. This systematic process brings additional capabilities to the physical systems that capture device memories to discover the evidence of malicious tools. Therefore, this paper deals with the Internet of Things (IoT) to form an effective and economical interaction with evolving technologies, including B5G/6G, edge, and cloud computing, to uncover the context of security implications. Most precisely, to sense, collect, share, and analyze numerical data from information systems, the application domain, like healthcare, utilizes computing methods and communications technologies to collect and analyze physiological data from patients in a haphazard way. Since an insecure network has security issues such as information leakage, secret key loss, and fraudulent authentication in Telehealth and remote monitoring, this work applies elliptic curve cryptography (ECC) and a physical unclonable function (PUF) to construct an AI-driven privacy-preserving key authentication framework (AID-PPKAF). In the proposed AID-PPKAF, the PUF generates key information, and ECC encrypts the parameters generated by the system to establish session key agreement and proper mutual authentication. The security analyses (both formal and informal) prove that AID-PPKAF has greater security efficiency than other state-of-the-art approaches. Lastly, a performance analysis using NS3 and a pragmatic study using SVM demonstrate the significance of identity protection in designing a more reliable authentication model.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 6","pages":"6001-6020"},"PeriodicalIF":5.4,"publicationDate":"2025-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145665746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STAP: Leveraging State-Transition Adversarial Perturbations for Asymmetric Website Fingerprinting Defenses STAP:利用不对称网站指纹防御的状态转换对抗扰动
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-08 DOI: 10.1109/TNSM.2025.3597075
Jia-Nan Huang;Weiwei Liu;Guangjie Liu;Bo Gao;Fengyuan Nie;Marco Mellia
Web services, as the most ubiquitous form of online services, have consistently attracted research attention due to privacy concerns. Although VPNs and anonymous communication methods can partially protect users’ online privacy, advancements in website fingerprinting (WF) attacks still exploit the spatio-temporal characteristics of Web resource transmission to identify Web services. The challenge lies in defending against WF attacks efficiently, with limited bandwidth costs. Server-side WF defenses, deployed on Web servers, can achieve end-to-end obfuscation across both clients and servers. However, existing defenses often consume significant bandwidth and require additional removal operations on the client side. Given the growing use of QUIC with HTTP/3 and the need for robust privacy protections, this paper introduces an asymmetric server-side WF defense scheme using State-Transition Adversarial Perturbations (STAP). STAP introduces the concept of latent resource-state transitions, which represent hidden patterns in resource transmission. Utilizing perturbation models containing these transitions, STAP subtly alters traffic through packet padding and insertion, with inherent transport layer encryption enhancing the concealment. STAP can operate independently, removing the necessity for user involvement. Experimental results demonstrate that STAP outperforms other schemes, achieving reductions in True Positive Rate (TPR) by up to 22% and reductions in bandwidth overhead by up to 30%.
Web服务作为最普遍的在线服务形式,由于隐私问题一直吸引着研究的关注。尽管vpn和匿名通信方式可以部分保护用户的在线隐私,但不断发展的网站指纹攻击仍然利用Web资源传输的时空特征来识别Web服务。挑战在于如何在带宽成本有限的情况下有效防御WF攻击。部署在Web服务器上的服务器端WF防御可以跨客户机和服务器实现端到端的混淆。然而,现有的防御通常会消耗大量带宽,并且需要在客户端进行额外的删除操作。鉴于HTTP/3中越来越多地使用QUIC以及对健壮的隐私保护的需求,本文介绍了一种使用状态转换对抗性扰动(STAP)的非对称服务器端WF防御方案。STAP引入了潜在资源状态转换的概念,它代表了资源传输中的隐藏模式。利用包含这些转换的扰动模型,STAP通过数据包填充和插入巧妙地改变流量,固有的传输层加密增强了隐蔽性。STAP可以独立操作,无需用户参与。实验结果表明,STAP优于其他方案,其真阳性率(TPR)降低高达22%,带宽开销降低高达30%。
{"title":"STAP: Leveraging State-Transition Adversarial Perturbations for Asymmetric Website Fingerprinting Defenses","authors":"Jia-Nan Huang;Weiwei Liu;Guangjie Liu;Bo Gao;Fengyuan Nie;Marco Mellia","doi":"10.1109/TNSM.2025.3597075","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3597075","url":null,"abstract":"Web services, as the most ubiquitous form of online services, have consistently attracted research attention due to privacy concerns. Although VPNs and anonymous communication methods can partially protect users’ online privacy, advancements in website fingerprinting (WF) attacks still exploit the spatio-temporal characteristics of Web resource transmission to identify Web services. The challenge lies in defending against WF attacks efficiently, with limited bandwidth costs. Server-side WF defenses, deployed on Web servers, can achieve end-to-end obfuscation across both clients and servers. However, existing defenses often consume significant bandwidth and require additional removal operations on the client side. Given the growing use of QUIC with HTTP/3 and the need for robust privacy protections, this paper introduces an asymmetric server-side WF defense scheme using State-Transition Adversarial Perturbations (STAP). STAP introduces the concept of latent resource-state transitions, which represent hidden patterns in resource transmission. Utilizing perturbation models containing these transitions, STAP subtly alters traffic through packet padding and insertion, with inherent transport layer encryption enhancing the concealment. STAP can operate independently, removing the necessity for user involvement. Experimental results demonstrate that STAP outperforms other schemes, achieving reductions in True Positive Rate (TPR) by up to 22% and reductions in bandwidth overhead by up to 30%.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 6","pages":"6200-6214"},"PeriodicalIF":5.4,"publicationDate":"2025-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145665800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized CQF Scheduling in TSN: A Formal Architecture-Based Neuro-Tabu Optimized Scheduling Algorithm TSN中优化CQF调度:一种基于形式化体系结构的神经禁忌优化调度算法
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-05 DOI: 10.1109/TNSM.2025.3595414
Wei Lin;Chunyan Ma;Jinong Li;Zhe Zhang;Hongping Gan
Efficient real-time communication in Time-Sensitive Networking (TSN) relies on precise flow scheduling to meet stringent latency and reliability requirements. However, under the Cyclic Queuing and Forwarding (CQF) model, existing scheduling algorithms face challenges in resource allocation efficiency and the scheduling of unstable flows, leading to inconsistent performance across complex network environments. To address these challenges, firstly, this article proposes a Formal Scheduling Architecture for CQF (CQF-FSA), which rigorously defines key scheduling elements and constraints, providing a basic, consistent, and reusable architecture for scheduling algorithms across diverse network environments; Secondly, based on CQF-FSA, we propose an optimized scheduling algorithm, NTOS (Neuro-Tabu Optimized Scheduler), which combines the global exploration capabilities of NEAT (NeuroEvolution of Augmenting Topologies) with the local optimization efficiency of Tabu search. NTOS effectively overcomes the limitations of existing methods by optimizing resource utilization and reducing scheduling conflicts; Finally experimental results demonstrate that NTOS improves the scheduling success rate by an average of 34.5% over the NV algorithm and 3.23% over the state-of-the-art MSS algorithm across various network topologies. This article provides a highly optimized solution for CQF scheduling in TSN, significantly enhancing scheduling efficiency and scalability.
在时间敏感网络(TSN)中,高效的实时通信依赖于精确的流调度,以满足严格的延迟和可靠性要求。然而,在循环排队转发(CQF)模型下,现有调度算法在资源分配效率和不稳定流调度方面面临挑战,导致复杂网络环境下的性能不一致。为了解决这些挑战,本文首先提出了CQF的正式调度架构(CQF- fsa),该架构严格定义了关键调度元素和约束,为不同网络环境下的调度算法提供了一个基本的、一致的、可重用的架构;其次,在CQF-FSA的基础上,提出了一种优化调度算法NTOS (neural -Tabu optimized Scheduler),该算法将神经进化的全局探索能力与禁忌搜索的局部优化效率相结合。NTOS通过优化资源利用率和减少调度冲突,有效克服了现有方法的局限性;实验结果表明,在各种网络拓扑中,NTOS比NV算法平均提高了34.5%的调度成功率,比最先进的MSS算法平均提高了3.23%。本文为TSN中的CQF调度提供了一种高度优化的解决方案,显著提高了调度效率和可扩展性。
{"title":"Optimized CQF Scheduling in TSN: A Formal Architecture-Based Neuro-Tabu Optimized Scheduling Algorithm","authors":"Wei Lin;Chunyan Ma;Jinong Li;Zhe Zhang;Hongping Gan","doi":"10.1109/TNSM.2025.3595414","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3595414","url":null,"abstract":"Efficient real-time communication in Time-Sensitive Networking (TSN) relies on precise flow scheduling to meet stringent latency and reliability requirements. However, under the Cyclic Queuing and Forwarding (CQF) model, existing scheduling algorithms face challenges in resource allocation efficiency and the scheduling of unstable flows, leading to inconsistent performance across complex network environments. To address these challenges, firstly, this article proposes a Formal Scheduling Architecture for CQF (CQF-FSA), which rigorously defines key scheduling elements and constraints, providing a basic, consistent, and reusable architecture for scheduling algorithms across diverse network environments; Secondly, based on CQF-FSA, we propose an optimized scheduling algorithm, NTOS (Neuro-Tabu Optimized Scheduler), which combines the global exploration capabilities of NEAT (NeuroEvolution of Augmenting Topologies) with the local optimization efficiency of Tabu search. NTOS effectively overcomes the limitations of existing methods by optimizing resource utilization and reducing scheduling conflicts; Finally experimental results demonstrate that NTOS improves the scheduling success rate by an average of 34.5% over the NV algorithm and 3.23% over the state-of-the-art MSS algorithm across various network topologies. This article provides a highly optimized solution for CQF scheduling in TSN, significantly enhancing scheduling efficiency and scalability.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 6","pages":"5987-6000"},"PeriodicalIF":5.4,"publicationDate":"2025-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145665748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and Maximizing Network Reliability in Large Scale Infrastructure Networks: A Heat Conduction Model Perspective 在大型基础设施网络中建模和最大化网络可靠性:热传导模型的观点
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-05 DOI: 10.1109/TNSM.2025.3596212
Beibei Li;Wei Hu;Yiwei Li;Lemei Da
Large infrastructure networks play a crucial role in modern society, supporting various aspects of our daily lives. Reliability of such networks is a pivotal research conundrum, which has attracted intensive research interests in recent years. However, most of them focus on protecting critical nodes or optimizing the network topology through linear models to measure reliability, while nonlinear models for improving network reliability are rarely investigated. The major challenges are the significant computational complexity and damage to the original network structure caused by nonlinear methods. Inspired by the similarity in dynamics between heat conduction systems and infrastructure networks, we propose a nonlinear model that maps an infrastructure network to a nonlinear heat conduction system for the purpose of measuring and enhancing network reliability. We introduce a new evaluating indicator of network reliability based on community irrelevance. Additionally, we propose a new Edge Addition (EA) method called Modularity Addition (MA) that maximizes network reliability by adding multiple edges during each iteration and substantially reduces computational overhead. Experimental results have demonstrated that our MA method outperforms existing algorithms. Specifically, in comparison to the widely used EA and Posteriorly Adding (PA) algorithms, the proposed MA method improves network reliability by up to 13.2%. It reduces the number of edges added to the network by 72%. Moreover, the MA method offers a 6.8-fold reduction in time complexity compared to existing methods, highlighting its efficiency and scalability. Our approach is validated on both synthetic and real-world networks, showcasing its significant value on enhancing the robustness of complex infrastructure systems.
大型基础设施网络在现代社会中发挥着至关重要的作用,支持着我们日常生活的各个方面。这种网络的可靠性是一个关键的研究难题,近年来引起了广泛的研究兴趣。然而,它们大多侧重于通过线性模型来衡量可靠性,保护关键节点或优化网络拓扑,而对提高网络可靠性的非线性模型的研究很少。主要的挑战是非线性方法的计算复杂度和对原有网络结构的破坏。受热传导系统和基础设施网络之间动力学相似性的启发,我们提出了一个非线性模型,将基础设施网络映射到非线性热传导系统,以测量和提高网络可靠性。提出了一种新的基于社区无关性的网络可靠性评价指标。此外,我们提出了一种新的边缘添加(EA)方法,称为模块化添加(MA),该方法通过在每次迭代中添加多个边缘来最大化网络可靠性,并大大降低了计算开销。实验结果表明,该方法优于现有算法。具体而言,与广泛使用的EA和后加(PA)算法相比,本文提出的MA方法可将网络可靠性提高13.2%。它将添加到网络中的边数减少了72%。此外,与现有方法相比,该方法的时间复杂度降低了6.8倍,突出了其效率和可扩展性。我们的方法在合成和现实世界的网络上都得到了验证,展示了其在增强复杂基础设施系统的鲁棒性方面的重要价值。
{"title":"Modeling and Maximizing Network Reliability in Large Scale Infrastructure Networks: A Heat Conduction Model Perspective","authors":"Beibei Li;Wei Hu;Yiwei Li;Lemei Da","doi":"10.1109/TNSM.2025.3596212","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3596212","url":null,"abstract":"Large infrastructure networks play a crucial role in modern society, supporting various aspects of our daily lives. Reliability of such networks is a pivotal research conundrum, which has attracted intensive research interests in recent years. However, most of them focus on protecting critical nodes or optimizing the network topology through linear models to measure reliability, while nonlinear models for improving network reliability are rarely investigated. The major challenges are the significant computational complexity and damage to the original network structure caused by nonlinear methods. Inspired by the similarity in dynamics between heat conduction systems and infrastructure networks, we propose a nonlinear model that maps an infrastructure network to a nonlinear heat conduction system for the purpose of measuring and enhancing network reliability. We introduce a new evaluating indicator of network reliability based on community irrelevance. Additionally, we propose a new Edge Addition (EA) method called Modularity Addition (MA) that maximizes network reliability by adding multiple edges during each iteration and substantially reduces computational overhead. Experimental results have demonstrated that our MA method outperforms existing algorithms. Specifically, in comparison to the widely used EA and Posteriorly Adding (PA) algorithms, the proposed MA method improves network reliability by up to 13.2%. It reduces the number of edges added to the network by 72%. Moreover, the MA method offers a 6.8-fold reduction in time complexity compared to existing methods, highlighting its efficiency and scalability. Our approach is validated on both synthetic and real-world networks, showcasing its significant value on enhancing the robustness of complex infrastructure systems.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 6","pages":"5945-5958"},"PeriodicalIF":5.4,"publicationDate":"2025-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145665784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Downlink Multiuser Resource-Allocation Scheme for Providing Layer-Encoded Multimedia Streams Using Massive MIMO Transmissions 利用大规模MIMO传输提供层编码多媒体流的新型下行多用户资源分配方案
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-04 DOI: 10.1109/TNSM.2025.3595142
Wen-Hsing Kuo;Ming-Chin Hsu;Hsiao-Chun Wu
Mobile video streaming is an intriguing application for next-generation networks. Wearing the goggles that render two-eye videos, users can enjoy the interactive multimedia experience. Providing high-quality video streams to multiple mobile devices in specific areas will become popular in future cinemas, theme parks, and museums. To ensure quality wireless coverage for a good streaming experience, the next-generation wireless technology (e.g., 5G/6G) employing massive MIMO schemes is a promising solution. Massive MIMO transmissions can improve bandwidth utilization while maintaining acceptable system complexity through numerous transceiving antennae. To incorporate massive MIMO transmissions with mobile video streaming, an innovative cross-layer scheme is needed to flexibly and efficiently manage the antenna array for serving multiple user devices. This allocation mechanism must have low computational complexity and operate stably to prevent demand fluctuations from affecting the quality of service experienced by other users. In this work, we introduce a new problem of provisioning layer-encoded streams to mobile devices (e.g., VR goggles) by allocating antennae in the base stations’ massive MIMO arrays. Given each user’s bitrate demand, the available antennae of each femtocell, and the channel characteristics, the system allocates transmitting antennae to maximize the total system utility. Our theoretical analysis shows that this allocation problem is NP-hard but our proposed scheme provides bounded performance with polynomial-time complexity. We also discuss and justify the stability of our proposed new allocation mechanism. Simulations demonstrate that our scheme outperforms simple heuristic methods. To the best of our knowledge, this is the first attempt to tackle antenna allocation for mobile user devices in immersive video streaming using massive MIMO schemes.
移动视频流是下一代网络的一个有趣的应用。戴上可以呈现两只眼睛视频的护目镜,用户可以享受交互式多媒体体验。向特定区域的多个移动设备提供高质量视频流将在未来的电影院、主题公园和博物馆中流行。为了确保高质量的无线覆盖以获得良好的流媒体体验,采用大规模MIMO方案的下一代无线技术(例如5G/6G)是一个很有前途的解决方案。大规模MIMO传输可以提高带宽利用率,同时通过多个收发天线保持可接受的系统复杂性。为了将大规模MIMO传输与移动视频流相结合,需要一种创新的跨层方案来灵活有效地管理天线阵列,以服务于多用户设备。这种分配机制必须具有较低的计算复杂度和稳定的运行,以防止需求波动影响其他用户体验到的服务质量。在这项工作中,我们引入了一个新问题,即通过在基站的大规模MIMO阵列中分配天线,向移动设备(例如VR护目镜)提供层编码流。考虑每个用户的比特率需求、每个基站的可用天线和信道特性,系统分配发射天线以最大化系统的总效用。我们的理论分析表明,该分配问题是np困难的,但我们提出的方案提供了具有多项式时间复杂度的有界性能。我们还讨论并论证了我们提议的新分配机制的稳定性。仿真结果表明,该方案优于简单的启发式方法。据我们所知,这是第一次尝试使用大规模MIMO方案解决沉浸式视频流中移动用户设备的天线分配问题。
{"title":"Novel Downlink Multiuser Resource-Allocation Scheme for Providing Layer-Encoded Multimedia Streams Using Massive MIMO Transmissions","authors":"Wen-Hsing Kuo;Ming-Chin Hsu;Hsiao-Chun Wu","doi":"10.1109/TNSM.2025.3595142","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3595142","url":null,"abstract":"Mobile video streaming is an intriguing application for next-generation networks. Wearing the goggles that render two-eye videos, users can enjoy the interactive multimedia experience. Providing high-quality video streams to multiple mobile devices in specific areas will become popular in future cinemas, theme parks, and museums. To ensure quality wireless coverage for a good streaming experience, the next-generation wireless technology (e.g., 5G/6G) employing massive MIMO schemes is a promising solution. Massive MIMO transmissions can improve bandwidth utilization while maintaining acceptable system complexity through numerous transceiving antennae. To incorporate massive MIMO transmissions with mobile video streaming, an innovative cross-layer scheme is needed to flexibly and efficiently manage the antenna array for serving multiple user devices. This allocation mechanism must have low computational complexity and operate stably to prevent demand fluctuations from affecting the quality of service experienced by other users. In this work, we introduce a new problem of provisioning layer-encoded streams to mobile devices (e.g., VR goggles) by allocating antennae in the base stations’ massive MIMO arrays. Given each user’s bitrate demand, the available antennae of each femtocell, and the channel characteristics, the system allocates transmitting antennae to maximize the total system utility. Our theoretical analysis shows that this allocation problem is NP-hard but our proposed scheme provides bounded performance with polynomial-time complexity. We also discuss and justify the stability of our proposed new allocation mechanism. Simulations demonstrate that our scheme outperforms simple heuristic methods. To the best of our knowledge, this is the first attempt to tackle antenna allocation for mobile user devices in immersive video streaming using massive MIMO schemes.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 6","pages":"5959-5971"},"PeriodicalIF":5.4,"publicationDate":"2025-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145665727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Network and Service Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1