首页 > 最新文献

IEEE Transactions on Network and Service Management最新文献

英文 中文
MK-WISE: Secure and Efficient Multi-Keyword Wildcard ABSE With Keyword-Level Revocation for Device–Edge–Cloud EHRs Data Sharing MK-WISE:安全高效的多关键字通配符ABSE,具有关键字级撤销功能,用于设备边缘云电子健康档案数据共享
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-26 DOI: 10.1109/TNSM.2026.3657982
Somchart Fugkeaw;Kittipat Tangtanawirut;Pakapon Rattanasrisuk;Archawit Changtor
The rapid proliferation of Internet of Things (IoT) in healthcare has transformed the management of Electronic Health Records (EHRs), but also introduced critical challenges in secure retrieval, dynamic revocation, and verifiable integrity over encrypted data. Existing Searchable Encryption (SE) and Attribute-Based Searchable Encryption (ABSE) models remain limited: 1) most support only exact or prefix keyword matching and cannot handle flexible wildcard or substring queries common in medical search; 2) revocation is coarse-grained, often requiring costly key redistribution or ciphertext re-encryption; and 3) integrity verification either incurs heavy blockchain overhead or exposes access structures, undermining privacy. To address these gaps, we propose MK-WISE, a secure and efficient multi-keyword wildcard ABSE framework for IoT–EHR systems. MK-WISE integrates an Index–Wildcard Tree (IWT) with Substring Bloom Filters (SBF) to enable expressive wildcard and substring queries, employs a puncturable PRF–based revocation workflow with edge-local enforcement, hierarchical key updates, and optional blockchain anchoring, and incorporates homomorphic MACs for lightweight correctness and completeness verification. Security analysis proves that MK-WISE achieves confidentiality, keyword privacy, unlinkability, and revocability under standard assumptions. Experimental results demonstrate that MK-WISE significantly outperforms state-of-the-art schemes in trapdoor generation, search scalability, and revocation cost, achieving millisecond-level revocation without user disruption. These results highlight MK-WISE as a practical and comprehensive solution for privacy-preserving EHR retrieval in IoT-enabled healthcare.
物联网(IoT)在医疗保健领域的迅速普及改变了电子健康记录(EHRs)的管理,但也在加密数据的安全检索、动态撤销和可验证完整性方面带来了重大挑战。现有的可搜索加密(SE)和基于属性的可搜索加密(ABSE)模型仍然存在局限性:1)大多数模型只支持精确或前缀关键字匹配,不能处理医学搜索中常见的灵活通配符或子字符串查询;2)撤销是粗粒度的,通常需要昂贵的密钥重新分发或密文重新加密;3)完整性验证要么导致沉重的区块链开销,要么暴露访问结构,破坏隐私。为了解决这些差距,我们提出了MK-WISE,一个安全高效的多关键字通配符ABSE框架,用于IoT-EHR系统。mark - wise将索引通配符树(IWT)与子串布兰过滤器(SBF)集成在一起,以实现表达通配符和子串查询,采用可穿透的基于prf的撤销工作流,具有边缘本地强制、分层键更新和可选的区块链锚定,并结合同态mac进行轻量级正确性和完整性验证。安全性分析证明MK-WISE在标准假设下实现了保密性、关键字隐私性、不可链接性和可撤销性。实验结果表明,MK-WISE在陷阱门生成、搜索可扩展性和撤销成本方面明显优于最先进的方案,在不中断用户的情况下实现毫秒级的撤销。这些结果突出表明,MK-WISE是一种实用而全面的解决方案,适用于支持物联网的医疗保健中保护隐私的电子病历检索。
{"title":"MK-WISE: Secure and Efficient Multi-Keyword Wildcard ABSE With Keyword-Level Revocation for Device–Edge–Cloud EHRs Data Sharing","authors":"Somchart Fugkeaw;Kittipat Tangtanawirut;Pakapon Rattanasrisuk;Archawit Changtor","doi":"10.1109/TNSM.2026.3657982","DOIUrl":"https://doi.org/10.1109/TNSM.2026.3657982","url":null,"abstract":"The rapid proliferation of Internet of Things (IoT) in healthcare has transformed the management of Electronic Health Records (EHRs), but also introduced critical challenges in secure retrieval, dynamic revocation, and verifiable integrity over encrypted data. Existing Searchable Encryption (SE) and Attribute-Based Searchable Encryption (ABSE) models remain limited: 1) most support only exact or prefix keyword matching and cannot handle flexible wildcard or substring queries common in medical search; 2) revocation is coarse-grained, often requiring costly key redistribution or ciphertext re-encryption; and 3) integrity verification either incurs heavy blockchain overhead or exposes access structures, undermining privacy. To address these gaps, we propose MK-WISE, a secure and efficient multi-keyword wildcard ABSE framework for IoT–EHR systems. MK-WISE integrates an Index–Wildcard Tree (IWT) with Substring Bloom Filters (SBF) to enable expressive wildcard and substring queries, employs a puncturable PRF–based revocation workflow with edge-local enforcement, hierarchical key updates, and optional blockchain anchoring, and incorporates homomorphic MACs for lightweight correctness and completeness verification. Security analysis proves that MK-WISE achieves confidentiality, keyword privacy, unlinkability, and revocability under standard assumptions. Experimental results demonstrate that MK-WISE significantly outperforms state-of-the-art schemes in trapdoor generation, search scalability, and revocation cost, achieving millisecond-level revocation without user disruption. These results highlight MK-WISE as a practical and comprehensive solution for privacy-preserving EHR retrieval in IoT-enabled healthcare.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"2295-2311"},"PeriodicalIF":5.4,"publicationDate":"2026-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146175654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contract-Based Incentive Mechanism for Long-Term Participation in Federated Learning 基于契约的联邦学习长期参与激励机制
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-23 DOI: 10.1109/TNSM.2026.3657419
Xiujun Xu;Qi Wang;Qingshan Wang;Yinlong Xu
Federated learning (FL), as a newly-developing technique, brings the advantage of organizing multiple participants to learn together, while avoiding the leakage of their privacy information. Contract theory provides an effective incentive mechanism to encourage participants to participate in FL. Existing contract-based incentive mechanisms consider participants’ types but ignore the different contributions of participants within the same type during the training. This paper first introduces a metric, reputation, to evaluate the contribution of participants in each iteration, and then proposes a hybrid contract mechanism consisting of a short-term contract and a long-term contract. Only the participants with reputations higher than a pre-defined threshold can sign the long-term contract. We formulate the solution of the long-term contract mechanism as an optimization problem with constraints. We further simplify the constraints of the long-term contract optimization problem, and theoretically analyze the correctness of the simplification to greatly reduce its computational complexity. We prove that the model owner achieves more profit with the hybrid contract mechanism. Simulations with the MNIST dataset show that the long-term contract improves the model accuracy by at least 5% compared with the existing contracts. Furthermore, compared with the short-term contract, participants signing the long-term contract are granted more rewards.
联邦学习(FL)作为一种新兴的学习技术,具有组织多个参与者共同学习的优点,同时又避免了参与者隐私信息的泄露。契约理论为鼓励参与者参与培训提供了有效的激励机制,现有的基于契约的激励机制考虑了参与者的类型,而忽略了同一类型参与者在培训过程中的不同贡献。本文首先引入了声誉指标来评估参与者在每次迭代中的贡献,然后提出了一种由短期合同和长期合同组成的混合合同机制。只有声誉高于预先设定的门槛的参与者才能签署长期合同。我们将长期契约机制的求解表述为一个带约束的优化问题。我们进一步简化了长期契约优化问题的约束条件,并从理论上分析了简化的正确性,大大降低了其计算复杂度。我们证明了模型所有者在混合契约机制下获得了更多的利润。利用MNIST数据集进行的仿真表明,与现有合同相比,长期合同的模型精度至少提高了5%。此外,与短期合同相比,签订长期合同的参与者获得的奖励更多。
{"title":"Contract-Based Incentive Mechanism for Long-Term Participation in Federated Learning","authors":"Xiujun Xu;Qi Wang;Qingshan Wang;Yinlong Xu","doi":"10.1109/TNSM.2026.3657419","DOIUrl":"https://doi.org/10.1109/TNSM.2026.3657419","url":null,"abstract":"Federated learning (FL), as a newly-developing technique, brings the advantage of organizing multiple participants to learn together, while avoiding the leakage of their privacy information. Contract theory provides an effective incentive mechanism to encourage participants to participate in FL. Existing contract-based incentive mechanisms consider participants’ types but ignore the different contributions of participants within the same type during the training. This paper first introduces a metric, reputation, to evaluate the contribution of participants in each iteration, and then proposes a hybrid contract mechanism consisting of a short-term contract and a long-term contract. Only the participants with reputations higher than a pre-defined threshold can sign the long-term contract. We formulate the solution of the long-term contract mechanism as an optimization problem with constraints. We further simplify the constraints of the long-term contract optimization problem, and theoretically analyze the correctness of the simplification to greatly reduce its computational complexity. We prove that the model owner achieves more profit with the hybrid contract mechanism. Simulations with the MNIST dataset show that the long-term contract improves the model accuracy by at least 5% compared with the existing contracts. Furthermore, compared with the short-term contract, participants signing the long-term contract are granted more rewards.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"2367-2380"},"PeriodicalIF":5.4,"publicationDate":"2026-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146175774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LDST-UAVS: A Lightweight Data Secure Transmission Protocol for Unmanned Aerial Vehicle Swarms in Emergency Rescue Scenarios LDST-UAVS:用于紧急救援场景下无人机群的轻量级数据安全传输协议
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-23 DOI: 10.1109/TNSM.2026.3656973
Zhenyang Guo;Jin Cao;XiongPeng Ren;Yuchen Zhou;Lifu Cheng;Peijie Yin;Hui Li
Currently, Unmanned Aerial Vehicles (UAV) groups can quickly build a multi-hop transmission network, which have been widely utilized in emergency communication scenarios to perform search and rescue, environmental monitoring, personnel positioning, rapid networking, etc. In such emergency rescue situations, strict demands on real-time communication, security, and minimal resource consumption become paramount. Higher requirements for security, bandwidth, and real-time performance necessitate a secure and lightweight data transmission protocol. Additionally, due to the lack of personnel supervision in these scenarios, the probability of malicious nodes increases. Therefore, it is essential to quickly and proximally block malicious nodes’ data to prevent it from affecting subsequent network propagation, and to accurately identify the malicious nodes. To address these issues, in this paper, we propose a traceable, lightweight, and secure data transmission protocol for UAV multi-hop networks in emergency rescue scenarios. The proposed protocol can verify the integrity of data transmitted by a large number of nodes in real time, detect erroneous transmissions, and trace malicious users. Experimental results show that our protocol consistently outperforms the comparison schemes in terms of computational overhead. Moreover, in scenarios involving smaller groups (m = 5) and fewer hops (n = 4), it exhibits significantly lower communication bandwidth overhead than the reference methods. Security analysis using BAN logic and the formal verification tool Scyther indicates that the proposed scheme meets security requirements. Additionally, comparative analysis results demonstrate that the proposed scheme is highly effective and outperforms other related schemes under the unique constraints of emergency rescue scenarios, where rapid, secure decision-making and data transmission are critical.
目前,无人机群能够快速构建多跳传输网络,已广泛应用于应急通信场景,执行搜救、环境监测、人员定位、快速组网等任务。在这种紧急救援情况下,对实时通信、安全性和最小资源消耗的严格要求变得至关重要。对安全性、带宽和实时性的要求越来越高,需要一种安全、轻量级的数据传输协议。此外,在这些场景下,由于缺乏人员监督,恶意节点的概率增加。因此,快速、近端阻断恶意节点的数据,防止其影响后续的网络传播,准确识别恶意节点至关重要。为了解决这些问题,本文提出了一种用于无人机多跳网络应急救援场景的可追溯、轻量级和安全的数据传输协议。该协议可以实时验证大量节点传输数据的完整性,检测错误传输,跟踪恶意用户。实验结果表明,我们的协议在计算开销方面始终优于比较方案。此外,在涉及较小的组(m = 5)和更少的跳数(n = 4)的场景中,它的通信带宽开销明显低于参考方法。采用BAN逻辑和Scyther形式化验证工具进行安全性分析,结果表明该方案满足安全要求。此外,对比分析结果表明,在紧急救援场景的独特约束下,该方案非常有效,优于其他相关方案,其中快速、安全的决策和数据传输至关重要。
{"title":"LDST-UAVS: A Lightweight Data Secure Transmission Protocol for Unmanned Aerial Vehicle Swarms in Emergency Rescue Scenarios","authors":"Zhenyang Guo;Jin Cao;XiongPeng Ren;Yuchen Zhou;Lifu Cheng;Peijie Yin;Hui Li","doi":"10.1109/TNSM.2026.3656973","DOIUrl":"https://doi.org/10.1109/TNSM.2026.3656973","url":null,"abstract":"Currently, Unmanned Aerial Vehicles (UAV) groups can quickly build a multi-hop transmission network, which have been widely utilized in emergency communication scenarios to perform search and rescue, environmental monitoring, personnel positioning, rapid networking, etc. In such emergency rescue situations, strict demands on real-time communication, security, and minimal resource consumption become paramount. Higher requirements for security, bandwidth, and real-time performance necessitate a secure and lightweight data transmission protocol. Additionally, due to the lack of personnel supervision in these scenarios, the probability of malicious nodes increases. Therefore, it is essential to quickly and proximally block malicious nodes’ data to prevent it from affecting subsequent network propagation, and to accurately identify the malicious nodes. To address these issues, in this paper, we propose a traceable, lightweight, and secure data transmission protocol for UAV multi-hop networks in emergency rescue scenarios. The proposed protocol can verify the integrity of data transmitted by a large number of nodes in real time, detect erroneous transmissions, and trace malicious users. Experimental results show that our protocol consistently outperforms the comparison schemes in terms of computational overhead. Moreover, in scenarios involving smaller groups (m = 5) and fewer hops (n = 4), it exhibits significantly lower communication bandwidth overhead than the reference methods. Security analysis using BAN logic and the formal verification tool Scyther indicates that the proposed scheme meets security requirements. Additionally, comparative analysis results demonstrate that the proposed scheme is highly effective and outperforms other related schemes under the unique constraints of emergency rescue scenarios, where rapid, secure decision-making and data transmission are critical.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"2258-2279"},"PeriodicalIF":5.4,"publicationDate":"2026-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146175696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
vEdge: Flow-Based Network Slicing for Smart Cities in Edge Cloud Environments Edge:边缘云环境下智能城市基于流的网络切片
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-22 DOI: 10.1109/TNSM.2026.3656925
Fekri Saleh;Abraham O. Fapojuwo;Diwakar Krishnamurthy
Smart city applications require diverse fifth generation network services with stringent performance and isolation requirements, necessitating scalable and efficient network slicing mechanisms. This paper proposes a novel framework for flow-based network slicing in edge cloud environments, termed virtual edge (vEdge). The framework leverages virtual medium access control addresses to identify flows at the data link layer (Layer 2), achieving robust flow-based slice isolation and efficient resource management. The proposed solution integrates a vEdge software module within the software defined networking controller to create, manage, and isolate network slices for both Third Generation Partnership Project (3GPP) and non-3GPP devices. By isolating traffic at Layer 2, the framework simplifies address matching and eliminates the computational overhead associated with deep packet inspection at upper layers (e.g., Layer 3/4 or Layer 7). The proposed vEdge further provides customizable flow-based network slices, each managed by a dedicated controller, providing self-contained virtual networks tailored to diverse applications within the smart city sector. Experimental evaluations demonstrate the efficacy of vEdge in enhancing network performance, achieving a 30% reduction in latency compared to flow-based network slicing that uses non-Layer 2 parameters to identify flows.
智慧城市应用需要多样化的第五代网络业务,具有严格的性能和隔离要求,需要可扩展和高效的网络切片机制。本文提出了一种在边缘云环境下基于流的网络切片的新框架,称为虚拟边缘(vEdge)。该框架利用虚拟介质访问控制地址来识别数据链路层(第2层)的流,实现健壮的基于流的片隔离和高效的资源管理。该解决方案在软件定义网络控制器中集成了一个vEdge软件模块,用于创建、管理和隔离第三代合作伙伴项目(3GPP)和非3GPP设备的网络切片。通过在第2层隔离流量,该框架简化了地址匹配,并消除了与上层(例如,第3/4层或第7层)深度数据包检测相关的计算开销。拟议的vEdge进一步提供可定制的基于流的网络切片,每个切片由专用控制器管理,为智慧城市领域的各种应用提供量身定制的独立虚拟网络。实验评估证明了edge在提高网络性能方面的有效性,与使用非第2层参数识别流的基于流的网络切片相比,延迟减少了30%。
{"title":"vEdge: Flow-Based Network Slicing for Smart Cities in Edge Cloud Environments","authors":"Fekri Saleh;Abraham O. Fapojuwo;Diwakar Krishnamurthy","doi":"10.1109/TNSM.2026.3656925","DOIUrl":"https://doi.org/10.1109/TNSM.2026.3656925","url":null,"abstract":"Smart city applications require diverse fifth generation network services with stringent performance and isolation requirements, necessitating scalable and efficient network slicing mechanisms. This paper proposes a novel framework for flow-based network slicing in edge cloud environments, termed virtual edge (vEdge). The framework leverages virtual medium access control addresses to identify flows at the data link layer (Layer 2), achieving robust flow-based slice isolation and efficient resource management. The proposed solution integrates a vEdge software module within the software defined networking controller to create, manage, and isolate network slices for both Third Generation Partnership Project (3GPP) and non-3GPP devices. By isolating traffic at Layer 2, the framework simplifies address matching and eliminates the computational overhead associated with deep packet inspection at upper layers (e.g., Layer 3/4 or Layer 7). The proposed vEdge further provides customizable flow-based network slices, each managed by a dedicated controller, providing self-contained virtual networks tailored to diverse applications within the smart city sector. Experimental evaluations demonstrate the efficacy of vEdge in enhancing network performance, achieving a 30% reduction in latency compared to flow-based network slicing that uses non-Layer 2 parameters to identify flows.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"2104-2115"},"PeriodicalIF":5.4,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146082111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoE-Aware Transport Slicing Configuration: Improving Application Performance in Beyond-5G Networks qos感知传输切片配置:提升超5g网络应用性能
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-21 DOI: 10.1109/TNSM.2026.3656605
Marija Gajić;Marcin Bosk;Stanislav Lange;Thomas Zinner
5G and beyond provides connectivity for a variety of heterogeneous, often mission-critical services, placing stringent performance requirements on these systems. Providing satisfactory Quality of Experience (QoE) for diverse, coexisting applications prompts the network operators to enforce application-aware, efficient resource allocation schemes that can improve user-satisfaction, efficiency, and system utilization. For these purposes, QoS Flows and network slicing have been identified as key enablers. Those concepts move away from economy of scale, towards a fine-grained slice and flow handling with customized resource control for each application, application type, or slice. This work is particularly focused on transport slicing, where the shift towards fine-grained resource control has important implications for how network resources are scaled and optimally allocated. These aspects have been largely ignored in the existing literature. Furthermore, while capacity has been recognized as a key resource, selecting the appropriate queue size, granularity of the resource allocation scheme, and their relations with the number of clients are often neglected in the process of resource dimensioning. To address these shortcomings, we perform an in-depth evaluation of the effects that impact factors have on the overall QoE and system utilization using the OMNeT++ simulator. We show the optimization potential for QoE and resource utilization, and further formulate guidelines for efficient and QoE-aware resource allocation.
5G及更高版本为各种异构(通常是关键任务)服务提供连接,对这些系统提出了严格的性能要求。为多种共存的应用程序提供满意的体验质量(QoE),促使网络运营商实施应用感知的高效资源分配方案,从而提高用户满意度、效率和系统利用率。出于这些目的,QoS流和网络切片被认为是关键的推动因素。这些概念从规模经济转向细粒度的片和流处理,为每个应用程序、应用程序类型或片提供定制的资源控制。这项工作特别关注传输切片,其中向细粒度资源控制的转变对如何扩展和优化分配网络资源具有重要意义。在现有文献中,这些方面在很大程度上被忽略了。此外,虽然容量被认为是一种关键资源,但在资源维化过程中,选择合适的队列大小、资源分配方案的粒度以及它们与客户端数量的关系往往被忽略。为了解决这些缺点,我们使用omnet++模拟器对影响因素对总体QoE和系统利用率的影响进行了深入的评估。我们展示了QoE和资源利用的优化潜力,并进一步制定了有效的和QoE感知的资源分配准则。
{"title":"QoE-Aware Transport Slicing Configuration: Improving Application Performance in Beyond-5G Networks","authors":"Marija Gajić;Marcin Bosk;Stanislav Lange;Thomas Zinner","doi":"10.1109/TNSM.2026.3656605","DOIUrl":"https://doi.org/10.1109/TNSM.2026.3656605","url":null,"abstract":"5G and beyond provides connectivity for a variety of heterogeneous, often mission-critical services, placing stringent performance requirements on these systems. Providing satisfactory Quality of Experience (QoE) for diverse, coexisting applications prompts the network operators to enforce application-aware, efficient resource allocation schemes that can improve user-satisfaction, efficiency, and system utilization. For these purposes, QoS Flows and network slicing have been identified as key enablers. Those concepts move away from economy of scale, towards a fine-grained slice and flow handling with customized resource control for each application, application type, or slice. This work is particularly focused on transport slicing, where the shift towards fine-grained resource control has important implications for how network resources are scaled and optimally allocated. These aspects have been largely ignored in the existing literature. Furthermore, while capacity has been recognized as a key resource, selecting the appropriate queue size, granularity of the resource allocation scheme, and their relations with the number of clients are often neglected in the process of resource dimensioning. To address these shortcomings, we perform an in-depth evaluation of the effects that impact factors have on the overall QoE and system utilization using the OMNeT++ simulator. We show the optimization potential for QoE and resource utilization, and further formulate guidelines for efficient and QoE-aware resource allocation.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"2116-2134"},"PeriodicalIF":5.4,"publicationDate":"2026-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146082206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Optimal Matching Channel Selection Strategy Based on (K+1)-Layer 3-D CTMC for Suppressing Spectrum Fragmentation in 5G/B5G Cognitive Radio Ad Hoc Networks 基于(K+1)层三维CTMC抑制5G/B5G认知无线电自组网频谱碎片化的最优匹配信道选择策略
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-20 DOI: 10.1109/TNSM.2026.3656378
Qian Yang;Suoping Li;Jaafar Gaber;Sa Yang
Dynamic spectrum access (DSA) is one of the pivotal technologies that is widely recognized to be able to cope with the massive demand for limited spectrum resources by massive data in 5G/B5G networks. To address spectrum fragmentation and sharing in 5G/B5G cognitive radio ad hoc networks (CRAHNs), based on the DSA technique, this paper proposes an optimal matched channel selection strategy with finite buffer (OMCS-FB). In the OMCS-FB, a cognitive user (CU) with the transmission request selects the channel whose idle time optimally matches its transmission time rather than selecting the channel with the longest idle time; if the CU fails to access the channel, the CU enters the buffer and waits for the next transmission opportunity. A $(mathrm {K}+1)$ -layer continuous-time Markov chain (CTMC) with the number of primary users (PUs) and CUs in primary channels and the number of CUs in the buffer as 3-D metrics is established, which can effectively portray the activity behavior of users and the occupancy states of primary channels under the OMCS-FB. The CTMC rate steady-state equations are then solved using the successive over-relaxation (SOR) iterative algorithm to obtain the system steady-state probability distributions and performance metrics. The results show that the OMCS-FB effectively suppresses spectrum fragmentation of the MAC layer in the time dimension and enables efficient spectrum sharing among CUs and PUs, as verified by Monte Carlo simulation.
动态频谱接入(Dynamic spectrum access, DSA)是5G/B5G网络中应对海量数据对有限频谱资源的海量需求的关键技术之一,被广泛认可。为了解决5G/B5G认知无线电自组织网络(CRAHNs)中的频谱碎片化和共享问题,基于DSA技术,提出了一种有限缓冲最优匹配信道选择策略(OMCS-FB)。在OMCS-FB中,具有传输请求的认知用户(CU)选择空闲时间与其传输时间最匹配的信道,而不是选择空闲时间最长的信道;如果CU访问通道失败,则CU进入缓冲区并等待下一个传输机会。建立了一个$( mathm {K}+1)$ -层连续马尔可夫链(CTMC),以主通道中的主用户(pu)数、主通道中的主用户(cu)数和缓冲区中的主用户(cu)数为三维度量,可以有效地描述OMCS-FB下用户的活动行为和主通道的占用状态。然后采用逐次过松弛(SOR)迭代算法求解CTMC速率稳态方程,得到系统稳态概率分布和性能指标。结果表明,OMCS-FB在时间维度上有效抑制了MAC层的频谱碎片化,实现了cu和pu之间的高效频谱共享,蒙特卡罗仿真验证了这一点。
{"title":"An Optimal Matching Channel Selection Strategy Based on (K+1)-Layer 3-D CTMC for Suppressing Spectrum Fragmentation in 5G/B5G Cognitive Radio Ad Hoc Networks","authors":"Qian Yang;Suoping Li;Jaafar Gaber;Sa Yang","doi":"10.1109/TNSM.2026.3656378","DOIUrl":"https://doi.org/10.1109/TNSM.2026.3656378","url":null,"abstract":"Dynamic spectrum access (DSA) is one of the pivotal technologies that is widely recognized to be able to cope with the massive demand for limited spectrum resources by massive data in 5G/B5G networks. To address spectrum fragmentation and sharing in 5G/B5G cognitive radio ad hoc networks (CRAHNs), based on the DSA technique, this paper proposes an optimal matched channel selection strategy with finite buffer (OMCS-FB). In the OMCS-FB, a cognitive user (CU) with the transmission request selects the channel whose idle time optimally matches its transmission time rather than selecting the channel with the longest idle time; if the CU fails to access the channel, the CU enters the buffer and waits for the next transmission opportunity. A <inline-formula> <tex-math>$(mathrm {K}+1)$ </tex-math></inline-formula>-layer continuous-time Markov chain (CTMC) with the number of primary users (PUs) and CUs in primary channels and the number of CUs in the buffer as 3-D metrics is established, which can effectively portray the activity behavior of users and the occupancy states of primary channels under the OMCS-FB. The CTMC rate steady-state equations are then solved using the successive over-relaxation (SOR) iterative algorithm to obtain the system steady-state probability distributions and performance metrics. The results show that the OMCS-FB effectively suppresses spectrum fragmentation of the MAC layer in the time dimension and enables efficient spectrum sharing among CUs and PUs, as verified by Monte Carlo simulation.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"2223-2243"},"PeriodicalIF":5.4,"publicationDate":"2026-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146175668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Provably Secure Lightweight Three-Factor 5G-AKA Authentication Protocol Relying on an Extendable Output Function 一个可证明安全的轻量级三因素5G-AKA认证协议,依赖于可扩展的输出功能
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-20 DOI: 10.1109/TNSM.2026.3656167
Awaneesh Kumar Yadav;An Braeken;Madhusanka Liyanage
Compared to 4G, the designed authentication and key agreement protocol for 5G communication (5G-AKA) offers better security. State-of-the-art shows that various protocols indicate the flaws in the 5G-AKA and suggest solutions primarily for the desynchronization attack, traceability attack, and perfect forward secrecy. However, most authentication protocols fail to facilitate the device stolen attack and are expensive; they also do not consider the prominent security issues such as post-compromise security and non-repudiation. Considering the above demerits of these protocols and the necessity to offer additional security, a provably secure lightweight 5G-AKA multi-factor authentication protocol relying on an extendable output function is proposed. The security of the proposed work has been confirmed informally and formally (ROR logic, GNY logic, and Scyther tool) to ensure that the proposed work handles all types of attacks and offers additional security features, such as post-compromise features and non-repudiation. Furthermore, we compute the performance of the proposed work and compare it with its counterparts to show that our work is less costly and more suitable for lightweight devices than others in terms of computational, communication, storage, and energy consumption cost.
与4G相比,设计的5G通信认证和密钥协议(5G- aka)提供了更好的安全性。最新的研究表明,各种协议表明了5G-AKA的缺陷,并提出了主要针对去同步攻击、可追溯性攻击和完美前向保密的解决方案。然而,大多数认证协议都无法为设备窃取攻击提供便利,而且价格昂贵;它们也没有考虑诸如妥协后安全性和不可抵赖性等突出的安全性问题。考虑到这些协议的上述缺点和提供额外安全性的必要性,提出了一种可证明安全的轻量级5G-AKA多因素身份验证协议,该协议依赖于可扩展的输出功能。提议的工作的安全性已经得到了非正式和正式的确认(ROR逻辑、GNY逻辑和Scyther工具),以确保提议的工作可以处理所有类型的攻击,并提供额外的安全特性,例如妥协后特性和不可否认性。此外,我们计算了所提出的工作的性能,并将其与同行进行了比较,以表明我们的工作在计算,通信,存储和能耗成本方面比其他工作成本更低,更适合轻型设备。
{"title":"A Provably Secure Lightweight Three-Factor 5G-AKA Authentication Protocol Relying on an Extendable Output Function","authors":"Awaneesh Kumar Yadav;An Braeken;Madhusanka Liyanage","doi":"10.1109/TNSM.2026.3656167","DOIUrl":"https://doi.org/10.1109/TNSM.2026.3656167","url":null,"abstract":"Compared to 4G, the designed authentication and key agreement protocol for 5G communication (5G-AKA) offers better security. State-of-the-art shows that various protocols indicate the flaws in the 5G-AKA and suggest solutions primarily for the desynchronization attack, traceability attack, and perfect forward secrecy. However, most authentication protocols fail to facilitate the device stolen attack and are expensive; they also do not consider the prominent security issues such as post-compromise security and non-repudiation. Considering the above demerits of these protocols and the necessity to offer additional security, a provably secure lightweight 5G-AKA multi-factor authentication protocol relying on an extendable output function is proposed. The security of the proposed work has been confirmed informally and formally (ROR logic, GNY logic, and Scyther tool) to ensure that the proposed work handles all types of attacks and offers additional security features, such as post-compromise features and non-repudiation. Furthermore, we compute the performance of the proposed work and compare it with its counterparts to show that our work is less costly and more suitable for lightweight devices than others in terms of computational, communication, storage, and energy consumption cost.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"2396-2414"},"PeriodicalIF":5.4,"publicationDate":"2026-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146175795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Don’t Let SDN Obsolete: Interpreting Software-Defined Networks With Network Calculus 不要让SDN过时:用网络演算解释软件定义网络
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-19 DOI: 10.1109/TNSM.2026.3655704
Xiaofeng Liu;Naigong Zheng;Fuliang Li
Although Software-Defined Network (SDN) has gained popularity in real-world deployments for its flexible management paradigm, its centralized control principle leads to various known performance issues. In this paper, we propose SDN-Mirror, a novel generalized delay analytical model based on network calculus, to interpret how the performance is affected and to illustrate how to accelerate the performance as well. We first elaborate the impact of parameters on packet forwarding delay in SDN, including device capacity, flow features and cache size. Then, building upon the analysis, we establish SDN-Mirror, which acts like a mirror, capable of not only precisely representing the relation between packet forwarding delay and each parameter but also verifying the effectiveness of optimization policies. At last, we evaluate SDN-Mirror by quantifying how each parameter affects the forwarding delay under different table matching states. We also verify a performance improvement policy with the optimized SDN-Mirror and experiment results show that packet forwarding delays of kernel space matching flow, userspace matching flow and unmatched flow can be reduced by 39.8%, 20.7% and 13.2%, respectively.
尽管软件定义网络(SDN)因其灵活的管理范例在实际部署中获得了普及,但其集中控制原则导致了各种已知的性能问题。本文提出了一种基于网络演算的广义延迟分析模型SDN-Mirror来解释性能的影响以及如何提高性能。我们首先阐述了SDN中参数对数据包转发延迟的影响,包括设备容量、流特征和缓存大小。然后,在分析的基础上,我们建立了SDN-Mirror,它就像一个镜像,不仅能够精确地表示数据包转发延迟与各个参数之间的关系,而且能够验证优化策略的有效性。最后,通过量化各参数在不同表匹配状态下对转发延迟的影响来评价SDN-Mirror。实验结果表明,内核空间匹配流、用户空间匹配流和未匹配流的数据包转发延迟分别降低了39.8%、20.7%和13.2%。
{"title":"Don’t Let SDN Obsolete: Interpreting Software-Defined Networks With Network Calculus","authors":"Xiaofeng Liu;Naigong Zheng;Fuliang Li","doi":"10.1109/TNSM.2026.3655704","DOIUrl":"https://doi.org/10.1109/TNSM.2026.3655704","url":null,"abstract":"Although Software-Defined Network (SDN) has gained popularity in real-world deployments for its flexible management paradigm, its centralized control principle leads to various known performance issues. In this paper, we propose SDN-Mirror, a novel generalized delay analytical model based on network calculus, to interpret how the performance is affected and to illustrate how to accelerate the performance as well. We first elaborate the impact of parameters on packet forwarding delay in SDN, including device capacity, flow features and cache size. Then, building upon the analysis, we establish SDN-Mirror, which acts like a mirror, capable of not only precisely representing the relation between packet forwarding delay and each parameter but also verifying the effectiveness of optimization policies. At last, we evaluate SDN-Mirror by quantifying how each parameter affects the forwarding delay under different table matching states. We also verify a performance improvement policy with the optimized SDN-Mirror and experiment results show that packet forwarding delays of kernel space matching flow, userspace matching flow and unmatched flow can be reduced by 39.8%, 20.7% and 13.2%, respectively.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"2092-2103"},"PeriodicalIF":5.4,"publicationDate":"2026-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146082138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ENCC: Explicit Notification Congestion Control in RDMA RDMA中的显式通知拥塞控制
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-19 DOI: 10.1109/TNSM.2026.3656015
Xinshuo Wang;Lei Liu;Baihua Chen;Yifei Li
Congestion control (CC) is essential for achieving ultra-low latency, high bandwidth, and network stability in high-speed networks. However, modern high-performance RDMA networks, crucial for distributed applications, face significant performance degradation due to limitations of existing CC schemes. Most conventional approaches rely on congestion notification signals that must traverse the queuing data path before congestion signals can be sent back to the sender, causing delayed responses and severe performance collapse. This study proposes Explicit Notification Congestion Control (ENCC), a novel high-speed CC mechanism that achieves low latency, high throughput, and strong network stability. ENCC employs switches to directly notify the sender of precise link load information and avoid notification signal queuing. This allows precise sender-side rate control and queue regulation. ENCC also ensures fairness and easy deployment in hardware. We implement ENCC based on FPGA network interface cards and programmable switches. Evaluation results show that ENCC achieves substantial throughput improvements over representative baseline algorithms, with gains of up to $16.6times $ in representative scenarios, while incurring minimal additional latency.
拥塞控制(CC)是在高速网络中实现超低延迟、高带宽和网络稳定性的关键。然而,对于分布式应用至关重要的现代高性能RDMA网络,由于现有CC方案的限制,面临着显著的性能下降。大多数传统方法依赖于拥塞通知信号,这些信号必须遍历队列数据路径才能将拥塞信号发送回发送方,从而导致响应延迟和严重的性能崩溃。本研究提出显式通知拥塞控制(Explicit Notification拥塞控制,ENCC),这是一种新型的高速CC机制,可实现低延迟、高吞吐量和强网络稳定性。ENCC使用交换机直接通知发送方精确的链路负载信息,避免通知信号排队。这允许精确的发送端速率控制和队列调节。ENCC还保证了硬件的公平性和易于部署。我们基于FPGA网络接口卡和可编程交换机实现了ENCC。评估结果表明,与代表性基线算法相比,ENCC实现了实质性的吞吐量改进,在代表性场景中收益高达16.6倍,同时产生最小的额外延迟。
{"title":"ENCC: Explicit Notification Congestion Control in RDMA","authors":"Xinshuo Wang;Lei Liu;Baihua Chen;Yifei Li","doi":"10.1109/TNSM.2026.3656015","DOIUrl":"https://doi.org/10.1109/TNSM.2026.3656015","url":null,"abstract":"Congestion control (CC) is essential for achieving ultra-low latency, high bandwidth, and network stability in high-speed networks. However, modern high-performance RDMA networks, crucial for distributed applications, face significant performance degradation due to limitations of existing CC schemes. Most conventional approaches rely on congestion notification signals that must traverse the queuing data path before congestion signals can be sent back to the sender, causing delayed responses and severe performance collapse. This study proposes Explicit Notification Congestion Control (ENCC), a novel high-speed CC mechanism that achieves low latency, high throughput, and strong network stability. ENCC employs switches to directly notify the sender of precise link load information and avoid notification signal queuing. This allows precise sender-side rate control and queue regulation. ENCC also ensures fairness and easy deployment in hardware. We implement ENCC based on FPGA network interface cards and programmable switches. Evaluation results show that ENCC achieves substantial throughput improvements over representative baseline algorithms, with gains of up to <inline-formula> <tex-math>$16.6times $ </tex-math></inline-formula> in representative scenarios, while incurring minimal additional latency.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"2415-2427"},"PeriodicalIF":5.4,"publicationDate":"2026-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146175607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Age of Sensing Empowered Holographic ISAC Framework for nextG Wireless Networks: A VAE and DRL Approach 下一代无线网络的全息ISAC框架:一种VAE和DRL方法
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-15 DOI: 10.1109/TNSM.2026.3654889
Apurba Adhikary;Avi Deb Raha;Yu Qiao;Md. Shirajum Munir;Mrityunjoy Gain;Zhu Han;Choong Seon Hong
This paper proposes an AI framework that leverages integrated sensing and communication (ISAC), aided by the age of sensing (AoS) to ensure the timely location updates of the users for a holographic MIMO (HMIMO)-assisted base station (BS)-enabled wireless network. The AI-driven framework aims to achieve optimized power allocation for efficient beamforming by activating the minimal number of grids from the HMIMO BS for serving the users. An optimization problem is formulated to maximize the sensing utility function, aiming to maximize the communication signal-to-interference-plus-noise ratio (SINR ${_{c}}$ ) of the received signals and beam-pattern gains to improve the sensing SINR of reflected echo signals, which in turn maximizes the achievable rate of users. A novel AI-driven framework is presented to tackle the formulated NP-hard problem that divides it into two problems: a sensing problem and a power allocation problem. The sensing problem is solved by employing a variational autoencoder (VAE)-based mechanism that obtains the sensing information leveraging AoS, which is used for the location update. Subsequently, a deep deterministic policy gradient-based deep reinforcement learning scheme is devised to allocate the desired power by activating the required grids based on the sensing information achieved with the VAE-based mechanism. Simulation results demonstrate the superior performance of the proposed AI framework compared to advantage actor-critic and deep Q-network-based methods, achieving a cumulative average SINR ${_{c}}$ improvement of 8.5 dB and 10.27 dB, and a cumulative average achievable rate improvement of 21.59 bps/Hz and 4.22 bps/Hz, respectively. Therefore, our proposed AI-driven framework guarantees efficient power allocation for holographic beamforming through ISAC schemes leveraging AoS.
本文提出了一种人工智能框架,该框架利用集成传感和通信(ISAC),在传感时代(AoS)的帮助下,确保用户及时更新全息MIMO (HMIMO)辅助基站(BS)无线网络的位置。人工智能驱动的框架旨在通过激活HMIMO BS中最小数量的网格来为用户服务,从而实现高效波束形成的优化功率分配。提出了感知效用函数最大化的优化问题,旨在最大化接收信号的通信信噪比(SINR ${_{c}}$)和波束方向增益,从而提高反射回波信号的感知SINR,从而最大化用户的可达率。提出了一种新的人工智能驱动框架来解决公式化的np困难问题,该问题将其分为两个问题:感知问题和功率分配问题。采用一种基于变分自编码器(VAE)的机制来解决感知问题,该机制利用AoS获取感知信息,用于位置更新。随后,设计了一种基于深度确定性策略梯度的深度强化学习方案,通过激活所需的网格来分配所需的功率。仿真结果表明,与基于actor-critic和基于深度q -network的方法相比,所提出的AI框架具有卓越的性能,实现了8.5 dB和10.27 dB的累积平均SINR ${_{c}}$改进,以及21.59 bps/Hz和4.22 bps/Hz的累积平均可实现速率改进。因此,我们提出的人工智能驱动框架通过利用AoS的ISAC方案保证了全息波束形成的有效功率分配。
{"title":"Age of Sensing Empowered Holographic ISAC Framework for nextG Wireless Networks: A VAE and DRL Approach","authors":"Apurba Adhikary;Avi Deb Raha;Yu Qiao;Md. Shirajum Munir;Mrityunjoy Gain;Zhu Han;Choong Seon Hong","doi":"10.1109/TNSM.2026.3654889","DOIUrl":"https://doi.org/10.1109/TNSM.2026.3654889","url":null,"abstract":"This paper proposes an AI framework that leverages integrated sensing and communication (ISAC), aided by the age of sensing (AoS) to ensure the timely location updates of the users for a holographic MIMO (HMIMO)-assisted base station (BS)-enabled wireless network. The AI-driven framework aims to achieve optimized power allocation for efficient beamforming by activating the minimal number of grids from the HMIMO BS for serving the users. An optimization problem is formulated to maximize the sensing utility function, aiming to maximize the communication signal-to-interference-plus-noise ratio (SINR<inline-formula> <tex-math>${_{c}}$ </tex-math></inline-formula>) of the received signals and beam-pattern gains to improve the sensing SINR of reflected echo signals, which in turn maximizes the achievable rate of users. A novel AI-driven framework is presented to tackle the formulated NP-hard problem that divides it into two problems: a sensing problem and a power allocation problem. The sensing problem is solved by employing a variational autoencoder (VAE)-based mechanism that obtains the sensing information leveraging AoS, which is used for the location update. Subsequently, a deep deterministic policy gradient-based deep reinforcement learning scheme is devised to allocate the desired power by activating the required grids based on the sensing information achieved with the VAE-based mechanism. Simulation results demonstrate the superior performance of the proposed AI framework compared to advantage actor-critic and deep Q-network-based methods, achieving a cumulative average SINR<inline-formula> <tex-math>${_{c}}$ </tex-math></inline-formula> improvement of 8.5 dB and 10.27 dB, and a cumulative average achievable rate improvement of 21.59 bps/Hz and 4.22 bps/Hz, respectively. Therefore, our proposed AI-driven framework guarantees efficient power allocation for holographic beamforming through ISAC schemes leveraging AoS.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"2325-2349"},"PeriodicalIF":5.4,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146175783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Network and Service Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1