首页 > 最新文献

IEEE/ACM Transactions on Networking最新文献

英文 中文
Scout Sketch+: Finding Both Promising and Damping Items Simultaneously in Data Streams 侦察兵草图+:在数据流中同时发现有希望和抑制的项目
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-04 DOI: 10.1109/TNET.2024.3469196
Guoju Gao;Tianyu Ma;He Huang;Yu-E Sun;Haibo Wang;Yang Du;Shigang Chen
Data stream processing holds great potential value in lots of practical application scenarios. This paper studies two new but important patterns for items in data streams, called promising and damping items. The promising items mean that the frequencies of an item in multiple continuous time windows show an upward trend overall, while a slight decrease in some of these windows is allowed. In contrast to promising items exhibiting an increasing trend, the definition of damping items indicates a decreasing trend. Many applications can benefit from the property of promising or damping items, e.g., monitoring latent attacks in computer networks, pre-adjusting bandwidth allocation in communication channels, detecting potential hot events/news, or finding topics that gradually lose momentum in social networks. We first introduce how to accurately find promising items in data streams in real-time under limited memory space. To this end, we propose a novel structure named Scout Sketch, which consists of Filter and Finder. Filter is devised based on the Bloom filter to eliminate the ungratified items with less memory overload; Finder records some necessary information about the potential items and detects the promising items at the end of each time window, where we propose some tailor-made detection operations. We then enhance Scout Sketch (called Scout Sketch+) to adaptively detect both types of promising and damping items simultaneously. Finally, we conducted extensive experiments on four real-world datasets, which show that the F1 Score and throughput of Scout Sketch(+) are about 2.02 and 5.61 times that of the compared solutions. All source codes are available at Github (https://github.com/Aoohhh/ScoutSketch).
数据流处理在许多实际应用场景中具有巨大的潜在价值。本文研究了数据流中两种新的但重要的项模式,即有希望项和阻尼项。有希望的项目意味着一个项目的频率在多个连续时间窗口中总体上呈上升趋势,而在某些窗口中略有下降是允许的。与有希望项目的定义呈增加趋势相反,阻尼项目的定义呈减少趋势。许多应用程序可以受益于有前途或阻尼项目的属性,例如监控计算机网络中的潜在攻击,预先调整通信通道中的带宽分配,检测潜在的热点事件/新闻,或发现社交网络中逐渐失去动力的话题。我们首先介绍了如何在有限的内存空间下实时准确地找到数据流中有希望的项。为此,我们提出了一种新的结构——Scout Sketch,它由Filter和Finder组成。过滤器是在布隆过滤器的基础上设计的,以消除不满意的项目,内存过载较小;Finder记录潜在项目的一些必要信息,并在每个时间窗口结束时检测有希望的项目,我们提出一些量身定制的检测操作。然后,我们增强Scout Sketch(称为Scout Sketch+),以自适应地同时检测两种类型的有希望和阻尼项目。最后,我们在四个真实数据集上进行了广泛的实验,结果表明Scout Sketch(+)的F1 Score和吞吐量分别是比较方案的2.02倍和5.61倍。所有源代码可在Github (https://github.com/Aoohhh/ScoutSketch)。
{"title":"Scout Sketch+: Finding Both Promising and Damping Items Simultaneously in Data Streams","authors":"Guoju Gao;Tianyu Ma;He Huang;Yu-E Sun;Haibo Wang;Yang Du;Shigang Chen","doi":"10.1109/TNET.2024.3469196","DOIUrl":"https://doi.org/10.1109/TNET.2024.3469196","url":null,"abstract":"Data stream processing holds great potential value in lots of practical application scenarios. This paper studies two new but important patterns for items in data streams, called promising and damping items. The promising items mean that the frequencies of an item in multiple continuous time windows show an upward trend overall, while a slight decrease in some of these windows is allowed. In contrast to promising items exhibiting an increasing trend, the definition of damping items indicates a decreasing trend. Many applications can benefit from the property of promising or damping items, e.g., monitoring latent attacks in computer networks, pre-adjusting bandwidth allocation in communication channels, detecting potential hot events/news, or finding topics that gradually lose momentum in social networks. We first introduce how to accurately find promising items in data streams in real-time under limited memory space. To this end, we propose a novel structure named Scout Sketch, which consists of Filter and Finder. Filter is devised based on the Bloom filter to eliminate the ungratified items with less memory overload; Finder records some necessary information about the potential items and detects the promising items at the end of each time window, where we propose some tailor-made detection operations. We then enhance Scout Sketch (called Scout Sketch+) to adaptively detect both types of promising and damping items simultaneously. Finally, we conducted extensive experiments on four real-world datasets, which show that the F1 Score and throughput of Scout Sketch(+) are about 2.02 and 5.61 times that of the compared solutions. All source codes are available at Github (\u0000<uri>https://github.com/Aoohhh/ScoutSketch</uri>\u0000).","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5491-5506"},"PeriodicalIF":3.0,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142858960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LFVeri: Network Configuration Verification for Virtual Private Cloud Networks LFVeri:虚拟私有云网络配置验证
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-03 DOI: 10.1109/TNET.2024.3469386
Kun Wang;Chengcheng Zhao;Jinpei Chu;Yiping Shi;Jianyuan Lu;Biao Lyu;Shunmin Zhu;Peng Cheng;Jiming Chen
The Virtual Private Cloud (VPC) service enables users to configure shared resources within public clouds on demand, providing isolation between users. However, configuring the VPC network is a complex and error-prone task, and misconfiguration has been the leading cause of cloud network security issues. The large number of complex network components and configurations makes it difficult to perform scalable, efficient, and accurate fault verification of the network behavior. To address this issue, we design a comprehensive and automated fault diagnosis and localization tool, called LFVeri, which is built upon an innovative modular network model that accurately captures the logic functions of real components within VPC networks, and propose eleven functions to verify network reachability and security requirements. We conduct performance testing of LFVeri on various datasets and compared it with other verification tools. The experiments show that LFVeri outperforms in modeling and analyzing real VPC scenarios while also possessing the fastest verification speed. It can model and analyze large VPC networks with tens of thousands of components and millions of configuration rules in less than half an hour.
VPC (Virtual Private Cloud)业务提供了在公有云中按需配置共享资源的功能,实现了用户间的资源隔离。然而,VPC网络的配置是一项复杂且容易出错的任务,错误的配置已经成为云网络安全问题的主要原因。大量复杂的网络组件和配置使得对网络行为进行可扩展、高效、准确的故障验证变得困难。为了解决这一问题,我们设计了一种全面、自动化的故障诊断和定位工具LFVeri,该工具基于创新的模块化网络模型,能够准确捕获VPC网络中真实组件的逻辑功能,并提出了11种功能来验证网络可达性和安全需求。我们在不同的数据集上对LFVeri进行了性能测试,并与其他验证工具进行了比较。实验表明,LFVeri在建模和分析真实VPC场景方面表现优异,同时具有最快的验证速度。它可以在不到半小时的时间内对具有数万个组件和数百万条配置规则的大型VPC网络进行建模和分析。
{"title":"LFVeri: Network Configuration Verification for Virtual Private Cloud Networks","authors":"Kun Wang;Chengcheng Zhao;Jinpei Chu;Yiping Shi;Jianyuan Lu;Biao Lyu;Shunmin Zhu;Peng Cheng;Jiming Chen","doi":"10.1109/TNET.2024.3469386","DOIUrl":"https://doi.org/10.1109/TNET.2024.3469386","url":null,"abstract":"The Virtual Private Cloud (VPC) service enables users to configure shared resources within public clouds on demand, providing isolation between users. However, configuring the VPC network is a complex and error-prone task, and misconfiguration has been the leading cause of cloud network security issues. The large number of complex network components and configurations makes it difficult to perform scalable, efficient, and accurate fault verification of the network behavior. To address this issue, we design a comprehensive and automated fault diagnosis and localization tool, called \u0000<monospace>LFVeri</monospace>\u0000, which is built upon an innovative modular network model that accurately captures the logic functions of real components within VPC networks, and propose eleven functions to verify network reachability and security requirements. We conduct performance testing of \u0000<monospace>LFVeri</monospace>\u0000 on various datasets and compared it with other verification tools. The experiments show that \u0000<monospace>LFVeri</monospace>\u0000 outperforms in modeling and analyzing real VPC scenarios while also possessing the fastest verification speed. It can model and analyze large VPC networks with tens of thousands of components and millions of configuration rules in less than half an hour.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5475-5490"},"PeriodicalIF":3.0,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142858962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social-Aware Clustered Federated Learning With Customized Privacy Preservation 具有定制隐私保护功能的社交感知聚类联合学习
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-02 DOI: 10.1109/TNET.2024.3379439
Yuntao Wang;Zhou Su;Yanghe Pan;Tom H. Luan;Ruidong Li;Shui Yu
A key feature of federated learning (FL) is to preserve the data privacy of end users. However, there still exist potential privacy leakage in exchanging gradients under FL. As a result, recent research often explores the differential privacy (DP) approaches to add noises to the computing results to address privacy concerns with low overheads, which however degrade the model performance. In this paper, we strike the balance of data privacy and efficiency by utilizing the pervasive social connections between users. Specifically, we propose SCFL, a novel Social-aware Clustered Federated Learning scheme, where mutually trusted individuals can freely form a social cluster and aggregate their raw model updates (e.g., gradients) inside each cluster before uploading to the cloud for global aggregation. By mixing model updates in a social group, adversaries can only eavesdrop the social-layer combined results, but not the privacy of individuals. As such, SCFL considerably enhances model utility without sacrificing privacy in a low-cost and highly feasible manner. We unfold the design of SCFL in three steps. i) Stable social cluster formation. Considering users’ heterogeneous training samples and data distributions, we formulate the optimal social cluster formation problem as a federation game and devise a fair revenue allocation mechanism to resist free-riders. ii) Differentiated trust-privacy mapping. For the clusters with low mutual trust, we design a customizable privacy preservation mechanism to adaptively sanitize participants’ model updates depending on social trust degrees. iii) Distributed convergence. A distributed two-sided matching algorithm is devised to attain an optimized disjoint partition with Nash-stable convergence. Experiments on Facebook network and MNIST/CIFAR-10 datasets validate that our SCFL can effectively enhance learning utility, improve user payoff, and enforce customizable privacy protection.
联合学习(FL)的一个主要特点是保护终端用户的数据隐私。然而,FL 下的梯度交换仍存在潜在的隐私泄露问题。因此,最近的研究通常会探索差分隐私(DP)方法,即在计算结果中添加噪音,从而以较低的开销解决隐私问题,但这会降低模型的性能。在本文中,我们利用用户之间无处不在的社交关系,在数据隐私和效率之间取得了平衡。具体来说,我们提出了一种新颖的 "社交感知集群联合学习"(Social-aware Clustered Federated Learning)方案,即相互信任的个人可以自由组成一个社交集群,并在上传到云端进行全局聚合之前,在每个集群内聚合他们的原始模型更新(如梯度)。通过在社交群组中混合模型更新,对手只能窃听社交层的合并结果,而无法窃听个人隐私。因此,SCFL 以低成本和高度可行的方式在不牺牲隐私的情况下大大提高了模型的实用性。我们分三步展开 SCFL 的设计。考虑到用户的异构训练样本和数据分布,我们将最优社交集群形成问题表述为一个联盟博弈,并设计了一种公平的收益分配机制来抵制搭便车者。对于互信度较低的集群,我们设计了一种可定制的隐私保护机制,根据社会信任度自适应地屏蔽参与者的模型更新。我们设计了一种分布式双面匹配算法,以实现具有纳什稳定收敛性的优化分区。在 Facebook 网络和 MNIST/CIFAR-10 数据集上的实验验证了我们的 SCFL 能够有效提高学习效用、改善用户回报并实施可定制的隐私保护。
{"title":"Social-Aware Clustered Federated Learning With Customized Privacy Preservation","authors":"Yuntao Wang;Zhou Su;Yanghe Pan;Tom H. Luan;Ruidong Li;Shui Yu","doi":"10.1109/TNET.2024.3379439","DOIUrl":"https://doi.org/10.1109/TNET.2024.3379439","url":null,"abstract":"A key feature of federated learning (FL) is to preserve the data privacy of end users. However, there still exist potential privacy leakage in exchanging gradients under FL. As a result, recent research often explores the differential privacy (DP) approaches to add noises to the computing results to address privacy concerns with low overheads, which however degrade the model performance. In this paper, we strike the balance of data privacy and efficiency by utilizing the pervasive social connections between users. Specifically, we propose SCFL, a novel Social-aware Clustered Federated Learning scheme, where mutually trusted individuals can freely form a social cluster and aggregate their raw model updates (e.g., gradients) inside each cluster before uploading to the cloud for global aggregation. By mixing model updates in a social group, adversaries can only eavesdrop the social-layer combined results, but not the privacy of individuals. As such, SCFL considerably enhances model utility without sacrificing privacy in a low-cost and highly feasible manner. We unfold the design of SCFL in three steps. i) Stable social cluster formation. Considering users’ heterogeneous training samples and data distributions, we formulate the optimal social cluster formation problem as a federation game and devise a fair revenue allocation mechanism to resist free-riders. ii) Differentiated trust-privacy mapping. For the clusters with low mutual trust, we design a customizable privacy preservation mechanism to adaptively sanitize participants’ model updates depending on social trust degrees. iii) Distributed convergence. A distributed two-sided matching algorithm is devised to attain an optimized disjoint partition with Nash-stable convergence. Experiments on Facebook network and MNIST/CIFAR-10 datasets validate that our SCFL can effectively enhance learning utility, improve user payoff, and enforce customizable privacy protection.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 5","pages":"3654-3668"},"PeriodicalIF":3.0,"publicationDate":"2024-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142447182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining Capacity and Length: Finding Connectivity Bottleneck in a Layered Network 结合容量和长度:寻找分层网络中的连接瓶颈
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-01 DOI: 10.1109/TNET.2024.3466522
Peng Zhang
Computer networks are often multi-layered. For simplicity, let us focus on two-layered networks with logical layer and physical layer. Such a network can be modeled as a labeled graph $G = (V, E)$ with a label set $L = {ell _{1}, ell _{2}, {dots }, ell _{q} }$ , in which each edge (denotes logical connection) $e in E$ has a label (denotes physical link) $ell (e)$ from L. The key issue is that different edges may have the same label. In the weighted minimum Label s-t Cut problem, we are given a labeled graph $G=(V,E)$ with label set L, where each label $ell $ has a nonnegative weight $w_{ell } $ , a source $s in V$ and a sink $t in V$ . The problem asks to find a minimum weight label subset $L'$ (called a label s-t cut) such that the removal of all edges with labels in $L'$ disconnects s and t. Label s-t cut depicts the connectivity bottleneck of a layered network. It is a natural generalization of the edge connectivity of a graph. In this paper, we provide an approximation algorithm for the weighted Label s-t Cut problem with ratio $O(n^{2/3})$ , where n is the number of vertices. This is the first approximation algorithm for the problem whose ratio is given in terms of n. The key point of the algorithm is a mechanism to interpret label weight on an edge as both its length (as in the Shortest s-t Path problem) and capacity (as in the Min s-t Cut problem). Experiments on random graphs show that the algorithm has also good practical performance.
计算机网络通常是多层的。为简单起见,让我们重点讨论具有逻辑层和物理层的两层网络。这样的网络可以建模为一个标签图 $G = (V, E)$ ,标签集为 $L = {ell _{1}, ell _{2}, {dots }, ell _{q}关键问题是不同的边可能有相同的标签。在加权最小标签 s-t 剪切问题中,我们给定了一个带标签集 L 的标签图 $G=(V,E)$,其中每个标签 $ell $ 都有一个非负权重 $w_{ell}$,一个源 $s (在 V$ 中)和一个汇 $t (在 V$ 中)。这个问题要求找到一个权重最小的标签子集 $L'$(称为标签 s-t 切分),使得删除所有标签在 $L'$ 中的边可以断开 s 和 t 的连接。标签 s-t 切分描述了分层网络的连接瓶颈。它是对图的边连接性的自然概括。本文为加权标签 s-t 剪切问题提供了一种近似算法,其比率为 $O(n^{2/3})$ ,其中 n 是顶点数。这是第一个以 n 为比率的近似算法。该算法的关键点在于一种机制,可以将边上的标签权重解释为长度(如最短 s-t 路径问题)和容量(如最小 s-t 剪切问题)。随机图上的实验表明,该算法也具有良好的实用性能。
{"title":"Combining Capacity and Length: Finding Connectivity Bottleneck in a Layered Network","authors":"Peng Zhang","doi":"10.1109/TNET.2024.3466522","DOIUrl":"https://doi.org/10.1109/TNET.2024.3466522","url":null,"abstract":"Computer networks are often multi-layered. For simplicity, let us focus on two-layered networks with logical layer and physical layer. Such a network can be modeled as a labeled graph \u0000<inline-formula> <tex-math>$G = (V, E)$ </tex-math></inline-formula>\u0000 with a label set \u0000<inline-formula> <tex-math>$L = {ell _{1}, ell _{2}, {dots }, ell _{q} }$ </tex-math></inline-formula>\u0000, in which each edge (denotes logical connection) \u0000<inline-formula> <tex-math>$e in E$ </tex-math></inline-formula>\u0000 has a label (denotes physical link) \u0000<inline-formula> <tex-math>$ell (e)$ </tex-math></inline-formula>\u0000 from L. The key issue is that different edges may have the same label. In the weighted minimum Label s-t Cut problem, we are given a labeled graph \u0000<inline-formula> <tex-math>$G=(V,E)$ </tex-math></inline-formula>\u0000 with label set L, where each label \u0000<inline-formula> <tex-math>$ell $ </tex-math></inline-formula>\u0000 has a nonnegative weight \u0000<inline-formula> <tex-math>$w_{ell } $ </tex-math></inline-formula>\u0000, a source \u0000<inline-formula> <tex-math>$s in V$ </tex-math></inline-formula>\u0000 and a sink \u0000<inline-formula> <tex-math>$t in V$ </tex-math></inline-formula>\u0000. The problem asks to find a minimum weight label subset \u0000<inline-formula> <tex-math>$L'$ </tex-math></inline-formula>\u0000 (called a label s-t cut) such that the removal of all edges with labels in \u0000<inline-formula> <tex-math>$L'$ </tex-math></inline-formula>\u0000 disconnects s and t. Label s-t cut depicts the connectivity bottleneck of a layered network. It is a natural generalization of the edge connectivity of a graph. In this paper, we provide an approximation algorithm for the weighted Label s-t Cut problem with ratio \u0000<inline-formula> <tex-math>$O(n^{2/3})$ </tex-math></inline-formula>\u0000, where n is the number of vertices. This is the first approximation algorithm for the problem whose ratio is given in terms of n. The key point of the algorithm is a mechanism to interpret label weight on an edge as both its length (as in the Shortest s-t Path problem) and capacity (as in the Min s-t Cut problem). Experiments on random graphs show that the algorithm has also good practical performance.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5430-5439"},"PeriodicalIF":3.0,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142859216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
De-RPOTA: Decentralized Learning With Resource Adaptation and Privacy Preservation Through Over-the-Air Computation De-RPOTA:通过无线计算实现资源适应和隐私保护的分散学习
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-01 DOI: 10.1109/TNET.2024.3438462
Jing Qiao;Shikun Shen;Shuzhen Chen;Xiao Zhang;Tian Lan;Xiuzhen Cheng;Dongxiao Yu
In this paper, we propose De-RPOTA, a novel algorithm designed for decentralized learning, equipped with mechanisms for resource adaptation and privacy protection through over-the-air computation. We theoretically analyze the combined effects of limited resources and lossy communication on decentralized learning, showing it converges towards a contraction region defined by a scaled errors version. Remarkably, De-RPOTA achieves a convergence rate of $mathcal {O}left ({{frac {1}{sqrt {nT}}}}right)$ in scenarios devoid of errors, matching the state-of-the-arts. Additionally, we tackle a power control challenge, breaking it down into transmitter and receiver sub-problems to hasten the De-RPOTA algorithm’s convergence. We also offer a quantifiable privacy assurance for our over-the-air computation methodology. Intriguingly, our findings suggest that network noise can actually strengthen the privacy of aggregated information, with over-the-air computation providing extra security for individual updates. Comprehensive experimental validation confirms De-RPOTA’s efficacy in communication resources limited environments. Specifically, the results on the CIFAR-10 dataset reveal nearly 30% reduction in communication costs compared to the state-of-the-arts, all while maintaining similar levels of learning accuracy, even under resource restrictions.
在本文中,我们提出了一种为分散学习而设计的新算法De-RPOTA,该算法通过无线计算配备了资源适应和隐私保护机制。我们从理论上分析了有限资源和有损通信对分散学习的综合影响,表明它收敛于一个由比例误差版本定义的收缩区域。值得注意的是,在没有错误的情况下,De-RPOTA的收敛速率为$mathcal {O}left ({{frac {1}{sqrt {nT}}}}right)$,与最先进的技术相匹配。此外,我们还解决了功率控制问题,将其分解为发送和接收子问题,以加速De-RPOTA算法的收敛。我们还为我们的无线计算方法提供了可量化的隐私保证。有趣的是,我们的研究结果表明,网络噪声实际上可以增强聚合信息的隐私性,无线计算为个人更新提供了额外的安全性。综合实验验证证实了De-RPOTA在通信资源有限环境下的有效性。具体来说,CIFAR-10数据集的结果揭示了近30个% reduction in communication costs compared to the state-of-the-arts, all while maintaining similar levels of learning accuracy, even under resource restrictions.
{"title":"De-RPOTA: Decentralized Learning With Resource Adaptation and Privacy Preservation Through Over-the-Air Computation","authors":"Jing Qiao;Shikun Shen;Shuzhen Chen;Xiao Zhang;Tian Lan;Xiuzhen Cheng;Dongxiao Yu","doi":"10.1109/TNET.2024.3438462","DOIUrl":"https://doi.org/10.1109/TNET.2024.3438462","url":null,"abstract":"In this paper, we propose De-RPOTA, a novel algorithm designed for decentralized learning, equipped with mechanisms for resource adaptation and privacy protection through over-the-air computation. We theoretically analyze the combined effects of limited resources and lossy communication on decentralized learning, showing it converges towards a contraction region defined by a scaled errors version. Remarkably, De-RPOTA achieves a convergence rate of \u0000<inline-formula> <tex-math>$mathcal {O}left ({{frac {1}{sqrt {nT}}}}right)$ </tex-math></inline-formula>\u0000 in scenarios devoid of errors, matching the state-of-the-arts. Additionally, we tackle a power control challenge, breaking it down into transmitter and receiver sub-problems to hasten the De-RPOTA algorithm’s convergence. We also offer a quantifiable privacy assurance for our over-the-air computation methodology. Intriguingly, our findings suggest that network noise can actually strengthen the privacy of aggregated information, with over-the-air computation providing extra security for individual updates. Comprehensive experimental validation confirms De-RPOTA’s efficacy in communication resources limited environments. Specifically, the results on the CIFAR-10 dataset reveal nearly 30% reduction in communication costs compared to the state-of-the-arts, all while maintaining similar levels of learning accuracy, even under resource restrictions.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"4931-4943"},"PeriodicalIF":3.0,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142858921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QUIRL: Flexible QUIC Loss Recovery for Low Latency Applications 为低延迟应用提供灵活的QUIC损耗恢复
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-01 DOI: 10.1109/TNET.2024.3453759
François Michel;Olivier Bonaventure
A growing number of Internet applications require low latency. Unfortunately, most of these applications cannot use the rich features of the QUIC protocol since it only uses retransmissions to cope with packet losses. We propose, implement and evaluate QUIRL, a revisit of the QUIC loss recovery mechanism. QUIRL relies on Forward Erasure Correction (FEC) only if it is needed by the application’s latency requirements and uses classical retransmissions otherwise. We implement QUIRL and evaluate its performance for real-time video and HTTP/3. Compared to previous works adding FEC to QUIC, QUIRL is the first to be evaluated with and obtain significant performance improvements for popular applications over real lossy networks. Our evaluation shows that for video QUIRL improves the video quality while meeting strict delay requirements. For HTTP/3 transfers, QUIRL efficiently reduces the tail latency when packet losses occur without causing harm when there are no losses. We confirm these results using emulation over a wide ranges of bandwidth, delays and loss scenarios. We release our QUIRL implementation to encourage other researchers and industry to explore in more details the use of FEC in QUIC.
越来越多的互联网应用需要低延迟。遗憾的是,这些应用大多无法使用 QUIC 协议的丰富功能,因为该协议仅使用重传来应对数据包丢失。我们提出、实施并评估了 QUIRL,它是对 QUIC 丢失恢复机制的重新审视。QUIRL 仅在应用的延迟要求需要时才依赖前向擦除校正(FEC),否则使用传统的重传。我们实现了 QUIRL,并评估了其在实时视频和 HTTP/3 中的性能。与之前在 QUIC 中添加 FEC 的工作相比,QUIRL 是第一个在真实有损网络上对流行应用进行评估并获得显著性能改进的产品。我们的评估结果表明,在视频方面,QUIRL 在满足严格的延迟要求的同时提高了视频质量。对于 HTTP/3 传输,QUIRL 在发生数据包丢失时有效地减少了尾部延迟,而在没有丢失时不会造成损害。我们在各种带宽、延迟和丢失情况下进行了仿真,证实了这些结果。我们发布 QUIRL 实现,是为了鼓励其他研究人员和业界更详细地探索在 QUIC 中使用 FEC。
{"title":"QUIRL: Flexible QUIC Loss Recovery for Low Latency Applications","authors":"François Michel;Olivier Bonaventure","doi":"10.1109/TNET.2024.3453759","DOIUrl":"https://doi.org/10.1109/TNET.2024.3453759","url":null,"abstract":"A growing number of Internet applications require low latency. Unfortunately, most of these applications cannot use the rich features of the QUIC protocol since it only uses retransmissions to cope with packet losses. We propose, implement and evaluate QUIRL, a revisit of the QUIC loss recovery mechanism. QUIRL relies on Forward Erasure Correction (FEC) only if it is needed by the application’s latency requirements and uses classical retransmissions otherwise. We implement QUIRL and evaluate its performance for real-time video and HTTP/3. Compared to previous works adding FEC to QUIC, QUIRL is the first to be evaluated with and obtain significant performance improvements for popular applications over real lossy networks. Our evaluation shows that for video QUIRL improves the video quality while meeting strict delay requirements. For HTTP/3 transfers, QUIRL efficiently reduces the tail latency when packet losses occur without causing harm when there are no losses. We confirm these results using emulation over a wide ranges of bandwidth, delays and loss scenarios. We release our QUIRL implementation to encourage other researchers and industry to explore in more details the use of FEC in QUIC.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5204-5215"},"PeriodicalIF":3.0,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142859202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling Byzantine Fault Tolerance in Access Authentication for Mega-Constellations 在巨型星座访问认证中启用拜占庭容错
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-27 DOI: 10.1109/TNET.2024.3463609
Zhiyuan Wang;Xin Lai;Shan Zhang;Qingkai Meng;Hongbin Luo
Low-Earth-Orbit (LEO) satellite constellations are becoming the necessary infrastructure in the future. However, the secure operation of LEO constellations is faced with severe risks. Specifically, LEO satellites are constantly orbiting and their channel interfaces are open. The adversary in hostile regions can leverage the global footprint to inject malicious traffic via access satellites. That is, LEO satellites are susceptible to physical and cyber attacks. Therefore, access authentication regarding terrestrial users (TUs) is crucial to ensure the secure operation of LEO constellations. The traditional on-orbit authentication frameworks usually presume that satellites are reliable and mutually trusted, thus one could rely on access satellites to perform authentication. In practice, however, physical and cyber attacks could bring down the satellites (causing fail-stop fault) or even hijack the satellites (causing Byzantine fault). This fact requires that the access authentication framework installed on LEO constellations should be fault-tolerant. In this paper, we aim to achieve Byzantine fault tolerance in access authentication for LEO satellite networks by properly integrating PBFT consensus protocol with traditional on-orbit authentication. Based on the topology characteristics of LEO constellations, we analytically derive the consensus probability, authentication accuracy, and communication overhead under PBFT-based authentication. To reduce the communication overhead, we propose to partition the constellation into multiple consensus groups, and devise a hierarchical PBFT (HPBFT) protocol. Simulation results based on Starlink Shell-I constellation indicate that HPBFT-based authentication could reduce the communication overhead (by an order of magnitude) and maintain almost the same authentication accuracy compared to PBFT-based authentication.
近地轨道(LEO)卫星星座正在成为未来必不可少的基础设施。然而,低轨道星座的安全运行面临着严峻的风险。具体来说,低轨道卫星一直在轨道上运行,它们的信道接口是开放的。敌对地区的对手可以利用全球足迹通过接入卫星注入恶意流量。也就是说,低轨道卫星容易受到物理和网络攻击。因此,针对地面用户的接入认证对于保证LEO星座的安全运行至关重要。传统的在轨认证框架通常假定卫星是可靠的、相互信任的,因此可以依靠接入卫星来进行认证。然而,在实践中,物理和网络攻击可能会使卫星瘫痪(导致故障停止),甚至劫持卫星(导致拜占庭故障)。这一事实要求安装在LEO星座上的访问身份验证框架应该是容错的。本文旨在通过将PBFT共识协议与传统在轨认证相结合,实现低轨道卫星网络接入认证中的拜占庭容错。根据LEO星座的拓扑特性,分析推导了基于pbft的认证的一致性概率、认证精度和通信开销。为了减少通信开销,我们提出将星座划分为多个共识组,并设计了分层PBFT (HPBFT)协议。基于Starlink Shell-I星座的仿真结果表明,与基于hpft的认证相比,基于hpft的认证可以减少一个数量级的通信开销,并保持几乎相同的认证精度。
{"title":"Enabling Byzantine Fault Tolerance in Access Authentication for Mega-Constellations","authors":"Zhiyuan Wang;Xin Lai;Shan Zhang;Qingkai Meng;Hongbin Luo","doi":"10.1109/TNET.2024.3463609","DOIUrl":"https://doi.org/10.1109/TNET.2024.3463609","url":null,"abstract":"Low-Earth-Orbit (LEO) satellite constellations are becoming the necessary infrastructure in the future. However, the secure operation of LEO constellations is faced with severe risks. Specifically, LEO satellites are constantly orbiting and their channel interfaces are open. The adversary in hostile regions can leverage the global footprint to inject malicious traffic via access satellites. That is, LEO satellites are susceptible to physical and cyber attacks. Therefore, access authentication regarding terrestrial users (TUs) is crucial to ensure the secure operation of LEO constellations. The traditional on-orbit authentication frameworks usually presume that satellites are reliable and mutually trusted, thus one could rely on access satellites to perform authentication. In practice, however, physical and cyber attacks could bring down the satellites (causing fail-stop fault) or even hijack the satellites (causing Byzantine fault). This fact requires that the access authentication framework installed on LEO constellations should be fault-tolerant. In this paper, we aim to achieve Byzantine fault tolerance in access authentication for LEO satellite networks by properly integrating PBFT consensus protocol with traditional on-orbit authentication. Based on the topology characteristics of LEO constellations, we analytically derive the consensus probability, authentication accuracy, and communication overhead under PBFT-based authentication. To reduce the communication overhead, we propose to partition the constellation into multiple consensus groups, and devise a hierarchical PBFT (HPBFT) protocol. Simulation results based on Starlink Shell-I constellation indicate that HPBFT-based authentication could reduce the communication overhead (by an order of magnitude) and maintain almost the same authentication accuracy compared to PBFT-based authentication.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5341-5355"},"PeriodicalIF":3.0,"publicationDate":"2024-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142859326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Symbiotic Blockchain Consensus: Cognitive Backscatter Communications-Enabled Wireless Blockchain Consensus 共生区块链共识:认知反向散射通信支持的无线区块链共识
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-27 DOI: 10.1109/TNET.2024.3462539
Haoxiang Luo;Qianqian Zhang;Gang Sun;Hongfang Yu;Dusit Niyato
The wireless blockchain network (WBN) concept, born from the blockchain deployed in wireless networks, has appealed to many network scenarios. Blockchain consensus mechanisms (CMs) are key to enabling nodes in a wireless network to achieve consistency without any trusted entity. However, consensus reliability will be seriously affected by the instability of communication links in wireless networks. Meanwhile, it is difficult for nodes in wireless scenarios to obtain a timely energy supply. Energy-intensive blockchain functions can quickly drain the power of nodes, thus degrading consensus performance. Fortunately, a symbiotic radio (SR) system enabled by cognitive backscatter communications can solve the above problems. In SR, the secondary transmitter (STx) transmits messages over the radio frequency (RF) signal emitted from a primary transmitter (PTx) with extremely low energy consumption, and the STx can provide multipath gain to the PTx in return. Such an approach is useful for almost all vote-based CMs, such as the Practical Byzantine Fault-tolerant (PBFT)-like and the RAFT-like CMs. This paper proposes symbiotic blockchain consensus (SBC) by transforming 6 PBFT-like and 4 RAFT-like state-of-the-art (SOTA) CMs to demonstrate universality. These new CMs will benefit from mutualistic transmission relationships in SR, making full use of the limited spectrum resources in WBN. Simulation results show that SBC can increase the consensus success rate of PBFT-like and RAFT- like by 54.1% and 5.8%, respectively, and reduce energy consumption by 9.2% and 23.7%, respectively.
无线区块链网络(WBN)的概念是由无线网络中部署的区块链产生的,它已经吸引了许多网络场景。区块链共识机制(CMs)是使无线网络中的节点在没有任何可信实体的情况下实现一致性的关键。然而,无线网络中通信链路的不稳定性会严重影响共识可靠性。同时,无线场景下的节点难以获得及时的能量供应。耗能的区块链函数会迅速耗尽节点的算力,从而降低共识性能。幸运的是,通过认知反向散射通信实现的共生无线电(SR)系统可以解决上述问题。在SR中,辅助发射机(STx)以极低的能耗通过主发射机(PTx)发出的射频(RF)信号传输消息,STx可以为PTx提供多径增益作为回报。这种方法对几乎所有基于投票的CMs都很有用,比如类似实际拜占庭容错(PBFT)的CMs和类似raft的CMs。本文提出了共生区块链共识(SBC),通过转化6个PBFT-like和4个RAFT-like最先进的(SOTA) CMs来证明普遍性。这些新的CMs将受益于SR中的互惠传输关系,充分利用WBN有限的频谱资源。仿真结果表明,SBC可使PBFT-like和RAFT- like的共识成功率分别提高54.1%和5.8%,能耗分别降低9.2%和23.7%。
{"title":"Symbiotic Blockchain Consensus: Cognitive Backscatter Communications-Enabled Wireless Blockchain Consensus","authors":"Haoxiang Luo;Qianqian Zhang;Gang Sun;Hongfang Yu;Dusit Niyato","doi":"10.1109/TNET.2024.3462539","DOIUrl":"https://doi.org/10.1109/TNET.2024.3462539","url":null,"abstract":"The wireless blockchain network (WBN) concept, born from the blockchain deployed in wireless networks, has appealed to many network scenarios. Blockchain consensus mechanisms (CMs) are key to enabling nodes in a wireless network to achieve consistency without any trusted entity. However, consensus reliability will be seriously affected by the instability of communication links in wireless networks. Meanwhile, it is difficult for nodes in wireless scenarios to obtain a timely energy supply. Energy-intensive blockchain functions can quickly drain the power of nodes, thus degrading consensus performance. Fortunately, a symbiotic radio (SR) system enabled by cognitive backscatter communications can solve the above problems. In SR, the secondary transmitter (STx) transmits messages over the radio frequency (RF) signal emitted from a primary transmitter (PTx) with extremely low energy consumption, and the STx can provide multipath gain to the PTx in return. Such an approach is useful for almost all vote-based CMs, such as the Practical Byzantine Fault-tolerant (PBFT)-like and the RAFT-like CMs. This paper proposes symbiotic blockchain consensus (SBC) by transforming 6 PBFT-like and 4 RAFT-like state-of-the-art (SOTA) CMs to demonstrate universality. These new CMs will benefit from mutualistic transmission relationships in SR, making full use of the limited spectrum resources in WBN. Simulation results show that SBC can increase the consensus success rate of PBFT-like and RAFT- like by 54.1% and 5.8%, respectively, and reduce energy consumption by 9.2% and 23.7%, respectively.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5372-5387"},"PeriodicalIF":3.0,"publicationDate":"2024-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142859328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transmission Scheduling for Remote State Estimation in CPSs With Two-Hop Networks Subject to DoS Attacks DoS攻击下两跳cps远程状态估计的传输调度
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-27 DOI: 10.1109/TNET.2024.3463186
Wei Xing;Xudong Zhao
In this paper, a dynamic zero-sum game is formulated to describe the power decision-making process of the sensor/relay and the DoS attacker in cyber-physical systems. The sensor and the relay cooperate with each other to transmit the state estimation to the remote estimator, when the attacker, on the contrary, aims to disturb the wireless communication channels strategically for deterioration of the system performance but can do this taking into account its limited energy. Different from conventional battery-powered nodes, the sensor and the relay can harvest energy from the external environment and store it in their batteries for data transmission. We model the external environment state as a Markov chain to overcome the randomness of the harvested energy. In addition, to tackle the computation complexity of the Nash equilibrium (NE), we restrict our attention to a special case, i.e., the DoS attacker can only launch interference on one of the two communication channels over an infinite time horizon, and provide the corresponding NE strategy of the game using the Markov decision process and the multi-agent reinforcement learning algorithm. Finally, simulation examples are given to illustrate the theoretical findings of the paper.
本文提出了一种动态零和博弈,以描述网络物理系统中传感器/中继器和 DoS 攻击者的权力决策过程。传感器和中继器相互合作,向远程估计器传输状态估计,而攻击者则旨在战略性地干扰无线通信信道,从而导致系统性能下降,但在这样做时要考虑到其有限的能量。与传统的电池供电节点不同,传感器和中继器可以从外部环境中获取能量,并将其储存在电池中用于数据传输。我们将外部环境状态建模为马尔可夫链,以克服能量采集的随机性。此外,为了解决纳什均衡(NE)的计算复杂性问题,我们将注意力限制在一种特殊情况上,即 DoS 攻击者只能在无限时间范围内对两个通信信道中的一个信道发起干扰,并利用马尔可夫决策过程和多代理强化学习算法提供了相应的博弈 NE 策略。最后,本文给出了仿真实例,以说明本文的理论发现。
{"title":"Transmission Scheduling for Remote State Estimation in CPSs With Two-Hop Networks Subject to DoS Attacks","authors":"Wei Xing;Xudong Zhao","doi":"10.1109/TNET.2024.3463186","DOIUrl":"https://doi.org/10.1109/TNET.2024.3463186","url":null,"abstract":"In this paper, a dynamic zero-sum game is formulated to describe the power decision-making process of the sensor/relay and the DoS attacker in cyber-physical systems. The sensor and the relay cooperate with each other to transmit the state estimation to the remote estimator, when the attacker, on the contrary, aims to disturb the wireless communication channels strategically for deterioration of the system performance but can do this taking into account its limited energy. Different from conventional battery-powered nodes, the sensor and the relay can harvest energy from the external environment and store it in their batteries for data transmission. We model the external environment state as a Markov chain to overcome the randomness of the harvested energy. In addition, to tackle the computation complexity of the Nash equilibrium (NE), we restrict our attention to a special case, i.e., the DoS attacker can only launch interference on one of the two communication channels over an infinite time horizon, and provide the corresponding NE strategy of the game using the Markov decision process and the multi-agent reinforcement learning algorithm. Finally, simulation examples are given to illustrate the theoretical findings of the paper.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5388-5398"},"PeriodicalIF":3.0,"publicationDate":"2024-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142859240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic-Aware Jointed Coding and Routing Design in Large-Scale Satellite Networks: A Deep Learning Approach 大规模卫星网络中语义感知联合编码与路由设计:一种深度学习方法
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-26 DOI: 10.1109/TNET.2024.3464540
Ronghao Gao;Yunlai Xu;Han Li;Qinyu Zhang;Zhihua Yang
In large-scale satellite networks, data delivery confronts obvious challenges such as high loss rate and long propagation delay leading to low Packet Delivery Ratio (PDR) and huge delivery latency over intermittent Inter-Satellite Links (ISLs), making the current routing algorithms exploiting typical Automatic Repeat reQuest (ARQ) mechanisms extremely inefficient and even incapable. To address this issue, in this paper, we propose a semantic-aware coding and routing joint mechanism called Semantic Adaptive Coding and Routing (SACR) by considering both the semantic correlations in the context-dependent data and the link status knowledge. In particular, the proposed SACR achieves excellent error-tolerant and routing-agile capabilities by an elaborately interactive design consisting of a customized routing-aware Semantic Adaptive Coding Hybrid ARQ (SAC-HARQ) mechanism and a Semantic Coding-based Routing Mechanism (SCRM). The simulation results indicate that the proposed SACR mechanism performs better in reducing the average delivery latency and improving the effective throughput compared with typical routing mechanisms such as Open Shortest Path First (OSPF) routing, Deep Q-Networks based Intelligent Routing (DQN-IR), and Real-Time Hop-by-hop routing (RTHop), integrating with typical semantic coding methods, i.e., Deep Learning-based Joint Channel-Source Coding (DL-JSCC), Deep learning-based Semantic Communication system (DeepSC), and Semantic Coding HARQ (SCHARQ), respectively.
在大规模卫星网络中,数据传输面临着高丢失率和长传播延迟等明显的挑战,导致间歇性卫星间链路(isl)上的分组交付比(PDR)低,传输延迟大,使得目前利用典型的自动重复请求(ARQ)机制的路由算法效率极低,甚至无法实现。为了解决这一问题,本文提出了一种语义感知的编码和路由联合机制,即语义自适应编码和路由(SACR),该机制同时考虑了上下文相关数据中的语义相关性和链路状态知识。特别地,所提出的SACR通过由自定义路由感知语义自适应编码混合ARQ (SAC-HARQ)机制和基于语义编码的路由机制(SCRM)组成的精心交互设计,实现了出色的容错和路由敏捷能力。仿真结果表明,与开放最短路径优先(OSPF)路由、基于Deep Q-Networks的智能路由(DQN-IR)和实时逐跳路由(RTHop)等典型路由机制相比,该机制结合了典型的语义编码方法,即基于深度学习的联合信道源编码(DL-JSCC),在降低平均投递延迟和提高有效吞吐量方面表现更好。基于深度学习的语义通信系统(DeepSC)和语义编码HARQ (SCHARQ)。
{"title":"Semantic-Aware Jointed Coding and Routing Design in Large-Scale Satellite Networks: A Deep Learning Approach","authors":"Ronghao Gao;Yunlai Xu;Han Li;Qinyu Zhang;Zhihua Yang","doi":"10.1109/TNET.2024.3464540","DOIUrl":"https://doi.org/10.1109/TNET.2024.3464540","url":null,"abstract":"In large-scale satellite networks, data delivery confronts obvious challenges such as high loss rate and long propagation delay leading to low Packet Delivery Ratio (PDR) and huge delivery latency over intermittent Inter-Satellite Links (ISLs), making the current routing algorithms exploiting typical Automatic Repeat reQuest (ARQ) mechanisms extremely inefficient and even incapable. To address this issue, in this paper, we propose a semantic-aware coding and routing joint mechanism called Semantic Adaptive Coding and Routing (SACR) by considering both the semantic correlations in the context-dependent data and the link status knowledge. In particular, the proposed SACR achieves excellent error-tolerant and routing-agile capabilities by an elaborately interactive design consisting of a customized routing-aware Semantic Adaptive Coding Hybrid ARQ (SAC-HARQ) mechanism and a Semantic Coding-based Routing Mechanism (SCRM). The simulation results indicate that the proposed SACR mechanism performs better in reducing the average delivery latency and improving the effective throughput compared with typical routing mechanisms such as Open Shortest Path First (OSPF) routing, Deep Q-Networks based Intelligent Routing (DQN-IR), and Real-Time Hop-by-hop routing (RTHop), integrating with typical semantic coding methods, i.e., Deep Learning-based Joint Channel-Source Coding (DL-JSCC), Deep learning-based Semantic Communication system (DeepSC), and Semantic Coding HARQ (SCHARQ), respectively.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5415-5429"},"PeriodicalIF":3.0,"publicationDate":"2024-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142859213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE/ACM Transactions on Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1