首页 > 最新文献

IEEE Transactions on Network and Service Management最新文献

英文 中文
Secure and Semi-Decentralized Blockchain-Based Privacy-Preserving Networking Strategy for Dynamic Wireless Charging of EVs 基于安全半去中心化区块链的电动汽车动态无线充电隐私保护网络策略
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-26 DOI: 10.1109/TNSM.2025.3613876
Mahmoud Abouyoussef;Muhammad Ismail;Mostafa F. Shaaban
Dynamic wireless charging (DWC) facilitates energy transfer from the electric grid to moving electric vehicles (EVs) via charging pads (CPs) positioned along roadways. To maximize satisfied charging requests, given the limited supply capacity, dynamic charging coordination is required to determine suitable CPs for mobile EVs. Charging coordination necessitates EV owners to share their information (i.e., the identities and locations) with charging service providers (CSPs) to allocate the best CP for charging. However, charging coordination raises privacy concerns due to the exchange of private information. Moreover, a fast authentication mechanism is then required between EVs and CPs to initiate the charging process. In addition to the privacy limitation, existing DWC strategies lack the presence of multiple CSPs, which is a crucial aspect given the significant growth of the EV market. Consequently, centralization arises, with a single CSP overseeing the entire network. This paper proposes a semi-decentralized privacy-preserving networking strategy utilizing a specially designed consortium blockchain to support dynamic charging coordination, authentication, and billing while ensuring user anonymity and data unlinkability. Our proposed strategy leverages a novel semi-decentralized K-times group signature scheme and distributed random number generators to achieve privacy and decentralization. Simulation results showed that the proposed method reduces the EV authentication time to 0.1 ms while limiting storage requirements to just 4 MB per block at each EV. Additionally, the proposed strategy showed improved security and privacy features when compared with IBM’s privacy-preserving blockchain (Identity Mixer).
动态无线充电(DWC)通过安装在道路上的充电垫(CPs),将能量从电网转移到移动的电动汽车(ev)。为了最大限度地满足充电需求,在有限的供电能力下,需要进行动态充电协调,以确定适合移动电动汽车的充电点。充电协调需要电动汽车车主与充电服务提供商(csp)共享他们的信息(即身份和位置),以分配最佳充电CP。然而,由于私人信息的交换,收费协调引起了隐私问题。此外,电动汽车和CPs之间需要一种快速的身份验证机制来启动充电过程。除了隐私限制之外,现有的DWC策略缺乏多个csp的存在,这是考虑到电动汽车市场的显着增长的一个关键方面。因此,出现了集中化,单个CSP监督整个网络。本文提出了一种半分散的隐私保护网络策略,利用专门设计的联盟区块链来支持动态收费协调、身份验证和计费,同时确保用户匿名和数据不可链接性。我们提出的策略利用一种新颖的半分散的k倍群签名方案和分布式随机数生成器来实现隐私和分散。仿真结果表明,该方法将EV认证时间缩短至0.1 ms,并将每个EV的每个块的存储需求限制在4 MB。此外,与IBM的隐私保护b区块链(Identity Mixer)相比,所提出的策略显示出改进的安全性和隐私特性。
{"title":"Secure and Semi-Decentralized Blockchain-Based Privacy-Preserving Networking Strategy for Dynamic Wireless Charging of EVs","authors":"Mahmoud Abouyoussef;Muhammad Ismail;Mostafa F. Shaaban","doi":"10.1109/TNSM.2025.3613876","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3613876","url":null,"abstract":"Dynamic wireless charging (DWC) facilitates energy transfer from the electric grid to moving electric vehicles (EVs) via charging pads (CPs) positioned along roadways. To maximize satisfied charging requests, given the limited supply capacity, dynamic charging coordination is required to determine suitable CPs for mobile EVs. Charging coordination necessitates EV owners to share their information (i.e., the identities and locations) with charging service providers (CSPs) to allocate the best CP for charging. However, charging coordination raises privacy concerns due to the exchange of private information. Moreover, a fast authentication mechanism is then required between EVs and CPs to initiate the charging process. In addition to the privacy limitation, existing DWC strategies lack the presence of multiple CSPs, which is a crucial aspect given the significant growth of the EV market. Consequently, centralization arises, with a single CSP overseeing the entire network. This paper proposes a semi-decentralized privacy-preserving networking strategy utilizing a specially designed consortium blockchain to support dynamic charging coordination, authentication, and billing while ensuring user anonymity and data unlinkability. Our proposed strategy leverages a novel semi-decentralized K-times group signature scheme and distributed random number generators to achieve privacy and decentralization. Simulation results showed that the proposed method reduces the EV authentication time to 0.1 ms while limiting storage requirements to just 4 MB per block at each EV. Additionally, the proposed strategy showed improved security and privacy features when compared with IBM’s privacy-preserving blockchain (Identity Mixer).","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 6","pages":"6083-6096"},"PeriodicalIF":5.4,"publicationDate":"2025-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145665802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quality and Diversity Balanced Neighbor Selection Against Eclipse Attack in Blockchain System 区块链系统中质量和多样性平衡邻域选择对抗日食攻击
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-22 DOI: 10.1109/TNSM.2025.3612386
Liang Feng;Cunqing Hua;Lingya Liu;Jianan Hong
Blockchain technology has gained widespread adoption across diverse applications; however, its peer-to-peer network architecture remains susceptible to eclipse attacks via malicious neighbor infiltration. Existing defense mechanisms typically rely either on historical data to detect attacks post hoc or on diverse neighbor selection to prevent them. These approaches, however, exhibit critical limitations: detection-based strategies are inherently reactive, while diversity-based selection lacks rigorous quantitative models to characterize the differences between neighbors. To bridge this gap, this article proposes integrating data analysis techniques directly into the neighbor selection process. Specifically, the proposed method dynamically evaluates peers’ block propagation performance and quantifies inter-peer differences using Wasserstein distance metrics. This enables the application of determinantal point processes (DPPs) to select an optimal set of high-performing and diverse peers as neighbors. Empirical evaluation utilizing Bitcoin network data demonstrates that the proposed scheme simultaneously achieves adaptive neighbor selection and robust protection against eclipse attacks.
区块链技术已在各种应用中得到广泛采用;然而,它的点对点网络架构仍然容易受到恶意邻居渗透的eclipse攻击。现有的防御机制通常依赖于历史数据来检测攻击,或者依赖于不同的邻居选择来阻止攻击。然而,这些方法表现出严重的局限性:基于检测的策略本质上是被动的,而基于多样性的选择缺乏严格的定量模型来表征邻居之间的差异。为了弥补这一差距,本文建议将数据分析技术直接集成到邻居选择过程中。具体而言,该方法动态评估对等体的块传播性能,并使用Wasserstein距离度量量化对等体之间的差异。这使得确定性点过程(dpp)的应用程序能够选择一组高性能和多样化的对等体作为邻居。利用比特币网络数据的经验评估表明,该方案同时实现了自适应邻居选择和对日食攻击的鲁棒保护。
{"title":"Quality and Diversity Balanced Neighbor Selection Against Eclipse Attack in Blockchain System","authors":"Liang Feng;Cunqing Hua;Lingya Liu;Jianan Hong","doi":"10.1109/TNSM.2025.3612386","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3612386","url":null,"abstract":"Blockchain technology has gained widespread adoption across diverse applications; however, its peer-to-peer network architecture remains susceptible to eclipse attacks via malicious neighbor infiltration. Existing defense mechanisms typically rely either on historical data to detect attacks post hoc or on diverse neighbor selection to prevent them. These approaches, however, exhibit critical limitations: detection-based strategies are inherently reactive, while diversity-based selection lacks rigorous quantitative models to characterize the differences between neighbors. To bridge this gap, this article proposes integrating data analysis techniques directly into the neighbor selection process. Specifically, the proposed method dynamically evaluates peers’ block propagation performance and quantifies inter-peer differences using Wasserstein distance metrics. This enables the application of determinantal point processes (DPPs) to select an optimal set of high-performing and diverse peers as neighbors. Empirical evaluation utilizing Bitcoin network data demonstrates that the proposed scheme simultaneously achieves adaptive neighbor selection and robust protection against eclipse attacks.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 6","pages":"6037-6047"},"PeriodicalIF":5.4,"publicationDate":"2025-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145665726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LPCD: A Parallel Candidate Deployment Strategy in Stateful Serverless Computing With Low Latency lcd:低延迟无状态服务器计算中的并行候选部署策略
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-18 DOI: 10.1109/TNSM.2025.3611445
Zhijie Wang;Zhen Zhang;Tengjiao He;Hao Xie
Serverless computing has been widely regarded as an ideal computing paradigm, enabling edge servers to host serverless functions. Due to its high scalability and usage-based pricing model, it provides efficient services across various applications. However, in the deployment process of serverless applications, past works lack considerations for the parallel relationships between stateful functions, which increases end to end latency. To leverage the parallel dependencies between functions, we propose a strategy for dependent function parallelization deployment, named LPCD (Low latency Parallel Candidate Deployment strategy). By partitioning the problem into inter-layer function deployment and analyzing optimal substructures, a heuristic algorithm is introduced to determine candidate deployment strategies for each layer of the users, which aims at identifying the optimal edge server for each function instance during deployment to enhance user satisfaction. Through simulation experiments, we evaluate the performance of the strategy. The experiments results indicate that the average latency was reduced by at least 41% compared with the state-of-the-art strategies.
无服务器计算已被广泛认为是一种理想的计算范例,它使边缘服务器能够承载无服务器功能。由于其高可伸缩性和基于使用的定价模型,它可以跨各种应用程序提供高效的服务。然而,在无服务器应用程序的部署过程中,过去的工作缺乏对有状态函数之间并行关系的考虑,这增加了端到端延迟。为了利用函数之间的并行依赖关系,我们提出了一种依赖函数并行化部署策略,称为lcd(低延迟并行候选部署策略)。通过将问题划分为层间功能部署并分析最优子结构,引入启发式算法确定每层用户的候选部署策略,目的是在部署过程中为每个功能实例识别最优边缘服务器,以提高用户满意度。通过仿真实验,对该策略的性能进行了评价。实验结果表明,与目前最先进的策略相比,平均延迟降低了至少41%。
{"title":"LPCD: A Parallel Candidate Deployment Strategy in Stateful Serverless Computing With Low Latency","authors":"Zhijie Wang;Zhen Zhang;Tengjiao He;Hao Xie","doi":"10.1109/TNSM.2025.3611445","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3611445","url":null,"abstract":"Serverless computing has been widely regarded as an ideal computing paradigm, enabling edge servers to host serverless functions. Due to its high scalability and usage-based pricing model, it provides efficient services across various applications. However, in the deployment process of serverless applications, past works lack considerations for the parallel relationships between stateful functions, which increases end to end latency. To leverage the parallel dependencies between functions, we propose a strategy for dependent function parallelization deployment, named LPCD (Low latency Parallel Candidate Deployment strategy). By partitioning the problem into inter-layer function deployment and analyzing optimal substructures, a heuristic algorithm is introduced to determine candidate deployment strategies for each layer of the users, which aims at identifying the optimal edge server for each function instance during deployment to enhance user satisfaction. Through simulation experiments, we evaluate the performance of the strategy. The experiments results indicate that the average latency was reduced by at least 41% compared with the state-of-the-art strategies.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 6","pages":"5927-5944"},"PeriodicalIF":5.4,"publicationDate":"2025-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145665745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding the Blockchain Interoperability Graph Based on Cryptocurrency Price Correlation 基于加密货币价格相关性的区块链互操作性图理解
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-17 DOI: 10.1109/TNSM.2025.3611309
Ori Mazor;Ori Rottenstreich
Cryptocurrencies have gained high popularity in recent years, with over 9000 of them, including major ones such as Bitcoin and Ether. Each cryptocurrency is implemented on one blockchain or over several such networks. Recently, various technologies known as blockchain interoperability have been developed to connect these different blockchains and create an interconnected blockchain ecosystem. This paper aims to provide insights on the blockchain ecosystem and the connection between blockchains that we refer to as the interoperability graph. Our approach is based on the analysis of the correlation between cryptocurrencies implemented over the different blockchains. We examine over 4800 cryptocurrencies implemented on 76 blockchains and their daily prices over a year. This experimental study has potential implications for decentralized finance (DeFi), including portfolio investment strategies and risk management.
近年来,包括比特币和以太币等主要加密货币在内的9000多种加密货币得到了高度的普及。每种加密货币都在一个区块链或多个这样的网络上实现。最近,各种被称为区块链互操作性的技术已经被开发出来,以连接这些不同的区块链,并创建一个相互关联的区块链生态系统。本文旨在提供有关区块链生态系统和我们称之为互操作性图的区块链之间连接的见解。我们的方法是基于对不同区块链上实现的加密货币之间相关性的分析。我们研究了76个区块链上实施的4800多种加密货币及其一年来的每日价格。本实验研究对去中心化金融(DeFi)具有潜在的启示,包括组合投资策略和风险管理。
{"title":"Understanding the Blockchain Interoperability Graph Based on Cryptocurrency Price Correlation","authors":"Ori Mazor;Ori Rottenstreich","doi":"10.1109/TNSM.2025.3611309","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3611309","url":null,"abstract":"Cryptocurrencies have gained high popularity in recent years, with over 9000 of them, including major ones such as Bitcoin and Ether. Each cryptocurrency is implemented on one blockchain or over several such networks. Recently, various technologies known as blockchain interoperability have been developed to connect these different blockchains and create an interconnected blockchain ecosystem. This paper aims to provide insights on the blockchain ecosystem and the connection between blockchains that we refer to as the interoperability graph. Our approach is based on the analysis of the correlation between cryptocurrencies implemented over the different blockchains. We examine over 4800 cryptocurrencies implemented on 76 blockchains and their daily prices over a year. This experimental study has potential implications for decentralized finance (DeFi), including portfolio investment strategies and risk management.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 6","pages":"6245-6259"},"PeriodicalIF":5.4,"publicationDate":"2025-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145665783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Send Message to the Future? Blockchain-Based Time Machines for Decentralized Reveal of Locked Information 向未来发送信息?基于区块链的时间机器,用于分散显示锁定信息
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-12 DOI: 10.1109/TNSM.2025.3604833
Zhuolun Li;Srijoni Majumdar;Evangelos Pournaras
Conditional information reveal systems automate the release of information upon meeting specific predefined conditions, such as a designated time in the future. This paper presents a new practical timed-release cryptography system that “sends messages in the future” with highly accurate decryption times. The core of the proposed system is a novel secret sharing scheme with verifiable information reveal, and a data sharing system is devised on smart contracts. This paper also introduces a breakthrough in the understanding, design, and application of conditional information reveal systems that are highly secure and decentralized. A complete evaluation portfolio is provided to this pioneering paradigm, including analytical results, a validation of its robustness in the Tamarin Prover and a performance evaluation of a real-world, open-source system prototype deployed across the globe. Using real-world election data, we also demonstrate the applicability of this innovative system in e-voting, illustrating its capacity to secure and ensure fair elections.
条件信息披露系统在满足特定的预定义条件时自动发布信息,例如在未来指定的时间。本文提出了一种具有高精度解密时间的“未来发送消息”的新型实用化定时发布密码系统。该系统的核心是一种具有可验证信息披露的新型秘密共享方案,并设计了基于智能合约的数据共享系统。本文还介绍了在高度安全和分散的条件信息显示系统的理解、设计和应用方面的突破。为这个开创性的范例提供了一个完整的评估组合,包括分析结果,在Tamarin prove中对其稳健性的验证,以及在全球部署的真实世界的开源系统原型的性能评估。利用现实世界的选举数据,我们还展示了这一创新系统在电子投票中的适用性,说明了其确保公平选举的能力。
{"title":"Send Message to the Future? Blockchain-Based Time Machines for Decentralized Reveal of Locked Information","authors":"Zhuolun Li;Srijoni Majumdar;Evangelos Pournaras","doi":"10.1109/TNSM.2025.3604833","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3604833","url":null,"abstract":"Conditional information reveal systems automate the release of information upon meeting specific predefined conditions, such as a designated time in the future. This paper presents a new practical timed-release cryptography system that “sends messages in the future” with highly accurate decryption times. The core of the proposed system is a novel secret sharing scheme with verifiable information reveal, and a data sharing system is devised on smart contracts. This paper also introduces a breakthrough in the understanding, design, and application of conditional information reveal systems that are highly secure and decentralized. A complete evaluation portfolio is provided to this pioneering paradigm, including analytical results, a validation of its robustness in the Tamarin Prover and a performance evaluation of a real-world, open-source system prototype deployed across the globe. Using real-world election data, we also demonstrate the applicability of this innovative system in e-voting, illustrating its capacity to secure and ensure fair elections.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 6","pages":"6112-6127"},"PeriodicalIF":5.4,"publicationDate":"2025-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11162935","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145665755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Signaling Rate and Performance of RIS Reconfiguration and Handover Management in Next Generation Mobile Networks 下一代移动网络中RIS重构与切换管理的信令速率与性能
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-11 DOI: 10.1109/TNSM.2025.3608077
Mounir Bensalem;Admela Jukan
We consider the problem of signaling rate and performance for control and management of reconfigurable intelligent surfaces (RISs) in next-generation mobile networks. To this end, we first analytically determine the rates of RIS reconfigurations and handover using a stochastic geometry network model. We derive closed-form expressions of these rates, while taking into account static obstacles (both known and unknown), self-blockage, RIS location density, and variations in the angle and direction of user mobility. Based on the derived rates, we analyze the signaling rates of a sample novel signaling protocol, which we propose as an extension of the current handover signaling protocol. We evaluate the signaling overhead due to RIS reconfigurations and the related energy consumption. We also provide a capacity planning analysis of the related RIS control plane server for its dimensioning in the network management system. The results quantify the impact of known and unknown obstacles on the RIS reconfiguration rate and the handover rate as a function of device density and mobility. We evaluate the scalability of the model, the related signaling overhead, energy efficiency, and server capacity in the control plane. To the best of our knowledge, this is the first analytical model to derive the closed form expressions of RIS reconfiguration rates, along with handover rates, and relate its statistical properties to the signaling rate and performance in next-generation mobile networks.
我们考虑了下一代移动网络中可重构智能表面(RISs)控制和管理的信号速率和性能问题。为此,我们首先使用随机几何网络模型解析确定RIS重构和切换的速率。我们推导了这些速率的封闭表达式,同时考虑了静态障碍物(已知和未知)、自阻塞、RIS位置密度以及用户移动角度和方向的变化。在此基础上,我们分析了一种新型信令协议的信令速率,并提出了该协议作为当前切换信令协议的扩展。我们评估了由于RIS重新配置和相关的能量消耗而产生的信令开销。本文还对相关的RIS控制平面服务器进行了容量规划分析,以便在网管系统中对其进行维度划分。结果量化了已知和未知障碍对RIS重构率和切换率的影响,并将其作为设备密度和移动性的函数。我们评估了模型的可扩展性、相关的信令开销、能源效率和控制平面中的服务器容量。据我们所知,这是第一个导出RIS重构率和切换率的封闭形式表达式的分析模型,并将其统计特性与下一代移动网络中的信令率和性能联系起来。
{"title":"Signaling Rate and Performance of RIS Reconfiguration and Handover Management in Next Generation Mobile Networks","authors":"Mounir Bensalem;Admela Jukan","doi":"10.1109/TNSM.2025.3608077","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3608077","url":null,"abstract":"We consider the problem of signaling rate and performance for control and management of reconfigurable intelligent surfaces (RISs) in next-generation mobile networks. To this end, we first analytically determine the rates of RIS reconfigurations and handover using a stochastic geometry network model. We derive closed-form expressions of these rates, while taking into account static obstacles (both known and unknown), self-blockage, RIS location density, and variations in the angle and direction of user mobility. Based on the derived rates, we analyze the signaling rates of a sample novel signaling protocol, which we propose as an extension of the current handover signaling protocol. We evaluate the signaling overhead due to RIS reconfigurations and the related energy consumption. We also provide a capacity planning analysis of the related RIS control plane server for its dimensioning in the network management system. The results quantify the impact of known and unknown obstacles on the RIS reconfiguration rate and the handover rate as a function of device density and mobility. We evaluate the scalability of the model, the related signaling overhead, energy efficiency, and server capacity in the control plane. To the best of our knowledge, this is the first analytical model to derive the closed form expressions of RIS reconfiguration rates, along with handover rates, and relate its statistical properties to the signaling rate and performance in next-generation mobile networks.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 6","pages":"6159-6176"},"PeriodicalIF":5.4,"publicationDate":"2025-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11160619","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145665795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
There is More Control in Egalitarian Edge IoT Meshes 在平等边缘物联网网格中有更多的控制
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-11 DOI: 10.1109/TNSM.2025.3608796
Anna Karanika;Rui Yang;Xiaojuan Ma;Jiangran Wang;Shalni Sundram;Indranil Gupta
While mesh networking for edge settings (e.g., smart buildings, farms, battlefields, etc.) has received much attention, the layer of control over such meshes remains largely centralized and cloud-based. This paper focuses on applications with commonplace sense-trigger-actuate (STA) workloads—like the abstraction of routines popular now in smart homes, but applied to larger-scale edge IoT deployments. We present CoMesh, which tackles the challenge of building a decentralized mesh-based control plane for local, non-cloud, and hubless management of sense-trigger-actuate applications. CoMesh builds atop an abstraction called the coterie, which spreads STA load in a fine-grained way both across space and across time. A coterie uses a novel combination of techniques such as zero-message-exchange protocols (for fast proactive member selection), quorum-based agreement, and locality-sensitive hashing. We analyze and theoretically prove safety and liveness properties of CoMesh. Our evaluation with both a Raspberry Pi-4 deployment and larger-scale simulations, using real building maps and real routine workloads, shows that CoMesh is load-balanced, fast, fault-tolerant, and scalable.
虽然边缘设置的网状网络(例如,智能建筑,农场,战场等)受到了很多关注,但对这些网格的控制层仍然主要集中在云上。本文重点关注具有普通感知触发-驱动(STA)工作负载的应用,类似于现在智能家居中流行的例程抽象,但适用于更大规模的边缘物联网部署。我们提出了CoMesh,它解决了为本地、非云和无中心管理的感知触发驱动应用程序构建分散的基于网格的控制平面的挑战。CoMesh构建在一个称为coterie的抽象之上,该抽象以细粒度的方式跨空间和时间分布STA负载。小圈子使用一种新颖的技术组合,例如零消息交换协议(用于快速主动选择成员)、基于群体的协议和对位置敏感的散列。分析并从理论上证明了CoMesh的安全性和活动性。我们对Raspberry Pi-4部署和大规模模拟(使用真实的建筑地图和真实的日常工作负载)的评估表明,CoMesh具有负载均衡、快速、容错和可扩展性。
{"title":"There is More Control in Egalitarian Edge IoT Meshes","authors":"Anna Karanika;Rui Yang;Xiaojuan Ma;Jiangran Wang;Shalni Sundram;Indranil Gupta","doi":"10.1109/TNSM.2025.3608796","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3608796","url":null,"abstract":"While mesh networking for edge settings (e.g., smart buildings, farms, battlefields, etc.) has received much attention, the layer of control over such meshes remains largely centralized and cloud-based. This paper focuses on applications with commonplace sense-trigger-actuate (STA) workloads—like the abstraction of routines popular now in smart homes, but applied to larger-scale edge IoT deployments. We present CoMesh, which tackles the challenge of building a decentralized mesh-based control plane for local, non-cloud, and hubless management of sense-trigger-actuate applications. CoMesh builds atop an abstraction called the coterie, which spreads STA load in a fine-grained way both across space and across time. A coterie uses a novel combination of techniques such as zero-message-exchange protocols (for fast proactive member selection), quorum-based agreement, and locality-sensitive hashing. We analyze and theoretically prove safety and liveness properties of CoMesh. Our evaluation with both a Raspberry Pi-4 deployment and larger-scale simulations, using real building maps and real routine workloads, shows that CoMesh is load-balanced, fast, fault-tolerant, and scalable.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"896-909"},"PeriodicalIF":5.4,"publicationDate":"2025-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11159320","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145852462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoS-Aware and Routing-Flexible Network Slicing for Service-Oriented Networks 面向服务网络的qos感知和路由柔性网络切片
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-10 DOI: 10.1109/TNSM.2025.3608074
Wei-Kun Chen;Ya-Feng Liu;Yu-Hong Dai;Zhi-Quan Luo
In this paper, we consider the network slicing (NS) problem which aims to map multiple customized virtual network requests (also called services) to a common shared network infrastructure and manage network resources to meet diverse quality of service (QoS) requirements. We propose a mixed-integer nonlinear programming (MINLP) formulation for the considered NS problem that can flexibly route the traffic flow of the services on multiple paths and provide end-to-end delay and reliability guarantees for all services. To overcome the computational difficulty due to the intrinsic nonlinearity in the MINLP formulation, we transform the MINLP formulation into an equivalent mixed-integer linear programming (MILP) formulation and further show that their continuous relaxations are equivalent. In sharp contrast to the continuous relaxation of the MINLP formulation which is a nonconvex nonlinear programming problem, the continuous relaxation of the MILP formulation is a polynomial-time solvable linear programming problem, which significantly facilitates the algorithmic design. Based on the newly proposed MILP formulation, we develop a customized column generation (cCG) algorithm for solving the NS problem. The proposed cCG algorithm is a decomposition-based algorithm and is particularly suitable for solving large-scale NS problems. Numerical results demonstrate the efficacy of the proposed formulations and the proposed cCG algorithm.
在本文中,我们考虑了网络切片(NS)问题,其目的是将多个定制的虚拟网络请求(也称为服务)映射到一个共同的共享网络基础设施,并管理网络资源以满足不同的服务质量(QoS)需求。针对所考虑的NS问题,我们提出了一种混合整数非线性规划(MINLP)公式,该公式可以灵活地将业务的流量流路由到多条路径上,并为所有业务提供端到端的延迟和可靠性保证。为了克服MINLP公式固有的非线性所带来的计算困难,我们将MINLP公式转化为等效混合整数线性规划(MILP)公式,并进一步证明了它们的连续松弛是等价的。与MINLP公式的连续松弛是一个非凸非线性规划问题形成鲜明对比的是,MILP公式的连续松弛是一个多项式时间可解的线性规划问题,这极大地方便了算法设计。基于新提出的MILP公式,我们开发了一种定制的列生成(cCG)算法来解决NS问题。本文提出的cCG算法是一种基于分解的算法,特别适用于求解大规模NS问题。数值结果验证了所提公式和所提cCG算法的有效性。
{"title":"QoS-Aware and Routing-Flexible Network Slicing for Service-Oriented Networks","authors":"Wei-Kun Chen;Ya-Feng Liu;Yu-Hong Dai;Zhi-Quan Luo","doi":"10.1109/TNSM.2025.3608074","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3608074","url":null,"abstract":"In this paper, we consider the network slicing (NS) problem which aims to map multiple customized virtual network requests (also called services) to a common shared network infrastructure and manage network resources to meet diverse quality of service (QoS) requirements. We propose a mixed-integer nonlinear programming (MINLP) formulation for the considered NS problem that can flexibly route the traffic flow of the services on multiple paths and provide end-to-end delay and reliability guarantees for all services. To overcome the computational difficulty due to the intrinsic nonlinearity in the MINLP formulation, we transform the MINLP formulation into an equivalent mixed-integer linear programming (MILP) formulation and further show that their continuous relaxations are equivalent. In sharp contrast to the continuous relaxation of the MINLP formulation which is a nonconvex nonlinear programming problem, the continuous relaxation of the MILP formulation is a polynomial-time solvable linear programming problem, which significantly facilitates the algorithmic design. Based on the newly proposed MILP formulation, we develop a customized column generation (cCG) algorithm for solving the NS problem. The proposed cCG algorithm is a decomposition-based algorithm and is particularly suitable for solving large-scale NS problems. Numerical results demonstrate the efficacy of the proposed formulations and the proposed cCG algorithm.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 6","pages":"6021-6036"},"PeriodicalIF":5.4,"publicationDate":"2025-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145665790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Node-Reliability: Monte Carlo, Laplace, and Stochastic Approximations and a Greedy Link-Augmentation Strategy 节点可靠性:蒙特卡罗、拉普拉斯、随机逼近和贪婪链路增强策略
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-08 DOI: 10.1109/TNSM.2025.3607004
Xinhan Liu;Robert Kooij;Piet Van Mieghem
The node-reliability polynomial $nRel_{G}(p)$ measures the probability that a connected network remains connected given that each node functions independently with probability $p$ . Computing node-reliability polynomials $nRel_{G}(p)$ exactly is NP-hard. Here we propose efficient approximations. First, we develop an accurate Monte Carlo simulation, which is accelerated by incorporating a Laplace approximation that captures the polynomial’s main behavior. We also introduce three degree-based stochastic approximations (Laplace, arithmetic, and geometric), which leverage the degree distribution to estimate $nRel_{G}(p)$ with low complexity. Beyond approximations, our framework addresses the reliability-based Global Robustness Improvement Problem ( $k$ -GRIP) by selecting exactly $k$ links to add to a given graph so as to maximize its node reliability. A Greedy Lowest-Degree Pairing Link Addition (Greedy-LD) Algorithm, is proposed which offers a computationally efficient and practically effective heuristic, particularly suitable for large-scale networks.
节点可靠性多项式$nRel_{G}(p)$测量给定每个节点以概率$p$独立运行的连接网络保持连接的概率。计算节点可靠性多项式$nRel_{G}(p)$完全是NP-hard。这里我们提出有效的近似。首先,我们开发了一个精确的蒙特卡罗模拟,通过结合捕捉多项式主要行为的拉普拉斯近似来加速。我们还引入了三种基于度的随机近似(拉普拉斯、算术和几何),它们利用度分布以低复杂度估计$nRel_{G}(p)$。除了近似之外,我们的框架通过精确选择$k$链接添加到给定图中以最大化其节点可靠性来解决基于可靠性的全局鲁棒性改进问题($k$ -GRIP)。提出了一种贪心最低度配对链路相加算法(Greedy- ld),它提供了一种计算效率高、实用效果好的启发式算法,特别适用于大规模网络。
{"title":"Node-Reliability: Monte Carlo, Laplace, and Stochastic Approximations and a Greedy Link-Augmentation Strategy","authors":"Xinhan Liu;Robert Kooij;Piet Van Mieghem","doi":"10.1109/TNSM.2025.3607004","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3607004","url":null,"abstract":"The node-reliability polynomial <inline-formula> <tex-math>$nRel_{G}(p)$ </tex-math></inline-formula> measures the probability that a connected network remains connected given that each node functions independently with probability <inline-formula> <tex-math>$p$ </tex-math></inline-formula>. Computing node-reliability polynomials <inline-formula> <tex-math>$nRel_{G}(p)$ </tex-math></inline-formula> exactly is NP-hard. Here we propose efficient approximations. First, we develop an accurate Monte Carlo simulation, which is accelerated by incorporating a Laplace approximation that captures the polynomial’s main behavior. We also introduce three degree-based stochastic approximations (Laplace, arithmetic, and geometric), which leverage the degree distribution to estimate <inline-formula> <tex-math>$nRel_{G}(p)$ </tex-math></inline-formula> with low complexity. Beyond approximations, our framework addresses the reliability-based Global Robustness Improvement Problem (<inline-formula> <tex-math>$k$ </tex-math></inline-formula>-GRIP) by selecting exactly <inline-formula> <tex-math>$k$ </tex-math></inline-formula> links to add to a given graph so as to maximize its node reliability. A Greedy Lowest-Degree Pairing Link Addition (Greedy-LD) Algorithm, is proposed which offers a computationally efficient and practically effective heuristic, particularly suitable for large-scale networks.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"756-766"},"PeriodicalIF":5.4,"publicationDate":"2025-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145852507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding Linux Kernel-Based Packet Switching on WiFi Access Points 了解基于Linux内核的WiFi接入点分组交换
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-29 DOI: 10.1109/TNSM.2025.3603597
Shiqi Zhang;Mridul Gupta;Behnam Dezfouli
As the number of WiFi devices and their traffic demands continue to rise, the need for a scalable and high-performance wireless infrastructure becomes increasingly essential. Central to this infrastructure are WiFi Access Points (APs), which facilitate packet switching between Ethernet and WiFi interfaces. Despite APs’ reliance on the Linux kernel’s data plane for packet switching, the detailed operations and complexities of switching packets between Ethernet and WiFi interfaces have not been investigated in existing works. This paper makes the following contributions towards filling this research gap. Through macro and micro-analysis of empirical experiments, our study reveals insights in two distinct categories. Firstly, while the kernel’s statistics offer valuable insights into system operations, we identify and discuss potential pitfalls that can severely affect system analysis. For instance, we reveal how packet switching rate and the implementation of drivers influence the meaning and accuracy of statistics related to packet-switching tasks and processor utilization. Secondly, we analyze the impact of the packet switching path and core configuration on performance and power consumption. Specifically, we identify the differences in Ethernet-to-WiFi and WiFi-to-Ethernet data paths regarding processing components, multi-core utilization, and energy efficiency.
随着WiFi设备的数量及其流量需求的不断增加,对可扩展和高性能无线基础设施的需求变得越来越重要。该基础设施的核心是WiFi接入点(ap),它促进了以太网和WiFi接口之间的数据包交换。尽管ap依赖于Linux内核的数据平面进行数据包交换,但是在以太网和WiFi接口之间交换数据包的详细操作和复杂性尚未在现有的工作中进行研究。本文为填补这一研究空白做出了以下贡献。通过实证实验的宏观和微观分析,我们的研究揭示了两个不同类别的见解。首先,虽然内核的统计数据提供了对系统操作的有价值的见解,但我们确定并讨论了可能严重影响系统分析的潜在缺陷。例如,我们揭示了分组交换速率和驱动程序的实现如何影响与分组交换任务和处理器利用率相关的统计数据的意义和准确性。其次,分析了分组交换路径和核心配置对性能和功耗的影响。具体来说,我们确定了以太网到wifi和wifi到以太网数据路径在处理组件、多核利用率和能源效率方面的差异。
{"title":"Understanding Linux Kernel-Based Packet Switching on WiFi Access Points","authors":"Shiqi Zhang;Mridul Gupta;Behnam Dezfouli","doi":"10.1109/TNSM.2025.3603597","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3603597","url":null,"abstract":"As the number of WiFi devices and their traffic demands continue to rise, the need for a scalable and high-performance wireless infrastructure becomes increasingly essential. Central to this infrastructure are WiFi Access Points (APs), which facilitate packet switching between Ethernet and WiFi interfaces. Despite APs’ reliance on the Linux kernel’s data plane for packet switching, the detailed operations and complexities of switching packets between Ethernet and WiFi interfaces have not been investigated in existing works. This paper makes the following contributions towards filling this research gap. Through macro and micro-analysis of empirical experiments, our study reveals insights in two distinct categories. Firstly, while the kernel’s statistics offer valuable insights into system operations, we identify and discuss potential pitfalls that can severely affect system analysis. For instance, we reveal how packet switching rate and the implementation of drivers influence the meaning and accuracy of statistics related to packet-switching tasks and processor utilization. Secondly, we analyze the impact of the packet switching path and core configuration on performance and power consumption. Specifically, we identify the differences in Ethernet-to-WiFi and WiFi-to-Ethernet data paths regarding processing components, multi-core utilization, and energy efficiency.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 5","pages":"3792-3808"},"PeriodicalIF":5.4,"publicationDate":"2025-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145315532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Network and Service Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1