Mobile edge computing (MEC) is emerging as a critical technology for supporting latency-sensitive and computation-intensive services-however, random wireless channel fading limits offloading rates, posing a significant challenge to MEC performance. In MEC systems, effective energy management and high-speed communication links between user devices and MEC servers are essential for supporting services that require low latency and high computation power. Reconfigurable intelligent surfaces (RIS) have been proposed as a promising solution to enhance the quality of communication links between users and MEC servers by dynamically reconfiguring the wireless propagation environment to overcome these challenges. We formulate a trade-off optimization problem to balance SE and EE in RIS-aided MEC systems, which is crucial due to limited system resources and the need for dynamic adaptation to varying network requirements-aimed at joint optimization of transmission power, phase-shift matrix, and MEC offloading and computation delays. Given the problem’s intractability, we develop an alternating optimization-based iterative algorithm incorporating quadratic transformation and successive convex approximation techniques to obtain sub-optimal solutions. Firstly, we address the minimum delay power allocation and task offloading by using quadratic transformations for fractional problems and closed-form solutions. Afterward, we optimize the phase shifts through semidefinite programming and a penalty-based approach. Simulation results validate the effectiveness of the proposed framework, demonstrating significant improvements in SE and EE compared to conventional systems without RIS or with static RIS configurations.
{"title":"Spectral Efficiency and Energy Efficiency Tradeoff in Multiuser RIS-Aided Mobile Edge Computing Networks","authors":"Nazanin Kalantarinejad;Dariush Abbasi-Moghadam;Halim Yanikomeroglu","doi":"10.1109/OJCOMS.2024.3497756","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3497756","url":null,"abstract":"Mobile edge computing (MEC) is emerging as a critical technology for supporting latency-sensitive and computation-intensive services-however, random wireless channel fading limits offloading rates, posing a significant challenge to MEC performance. In MEC systems, effective energy management and high-speed communication links between user devices and MEC servers are essential for supporting services that require low latency and high computation power. Reconfigurable intelligent surfaces (RIS) have been proposed as a promising solution to enhance the quality of communication links between users and MEC servers by dynamically reconfiguring the wireless propagation environment to overcome these challenges. We formulate a trade-off optimization problem to balance SE and EE in RIS-aided MEC systems, which is crucial due to limited system resources and the need for dynamic adaptation to varying network requirements-aimed at joint optimization of transmission power, phase-shift matrix, and MEC offloading and computation delays. Given the problem’s intractability, we develop an alternating optimization-based iterative algorithm incorporating quadratic transformation and successive convex approximation techniques to obtain sub-optimal solutions. Firstly, we address the minimum delay power allocation and task offloading by using quadratic transformations for fractional problems and closed-form solutions. Afterward, we optimize the phase shifts through semidefinite programming and a penalty-based approach. Simulation results validate the effectiveness of the proposed framework, demonstrating significant improvements in SE and EE compared to conventional systems without RIS or with static RIS configurations.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"5 ","pages":"7368-7379"},"PeriodicalIF":6.3,"publicationDate":"2024-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10752574","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142777757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Unmanned aerial vehicles (UAVs) are getting significant attention from both researchers and the industry due to their wide range of applications. Remote sensing is one such application, in which UAVs are deployed to sense remote areas and transmit the data to a ground station for processing. However, due to the mobility and limited transmission range of UAVs, data transfer requires multiple hops. Nevertheless, the higher the number of hops, the larger the network latency. Thus, there is a need to reduce the number of hops and improve the connectivity. This can be achieved by creating small-world networks (SWNs) that perform better than traditional networks in terms of network evaluation metrics. The SWNs are created by adding shortcuts to the traditional network. In the literature, many theoretical works have been proposed for the creation of SWNs. However, these works add shortcuts randomly into the existing conventional network and fail to account for the costs incurred with the added shortcuts. As a result, these works are ineffective in improving the overall performance of the network. Thus, this work presents a novel reinforcement learning technique that uses a Q-learning algorithm to optimize throughput in delay-critical and energy-aware small-world UAV-assisted wireless networks (SW-UAV-WNs). The proposed algorithm populates the Q-matrix with all possible shortcuts and updates the Q-values based on the reward/penalty. It then adds shortcuts based on descending Q-values until the SW-UAV-WN is established. Through numerical results, we demonstrate that the proposed framework surpasses the conventional SWC approach, canonical particle swarm data delivery method, Low Energy Adaptive Clustering Hierarchy (LEACH), modified LEACH, and conventional shortest path routing method in terms of network latency, lifetime, packet delivery ratio, and throughput. Furthermore, we discuss the effect of different UAV velocities and different heights of the layers in which the UAVs hover on the performance of the proposed approach.
{"title":"Throughput Maximization in Delay-Critical and Energy-Aware SW-UAV-WNs Using Q-Learning","authors":"Sreenivasa Reddy Yeduri;Neha Sharma;Om Jee Pandey;Linga Reddy Cenkeramaddi","doi":"10.1109/OJCOMS.2024.3496740","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3496740","url":null,"abstract":"Unmanned aerial vehicles (UAVs) are getting significant attention from both researchers and the industry due to their wide range of applications. Remote sensing is one such application, in which UAVs are deployed to sense remote areas and transmit the data to a ground station for processing. However, due to the mobility and limited transmission range of UAVs, data transfer requires multiple hops. Nevertheless, the higher the number of hops, the larger the network latency. Thus, there is a need to reduce the number of hops and improve the connectivity. This can be achieved by creating small-world networks (SWNs) that perform better than traditional networks in terms of network evaluation metrics. The SWNs are created by adding shortcuts to the traditional network. In the literature, many theoretical works have been proposed for the creation of SWNs. However, these works add shortcuts randomly into the existing conventional network and fail to account for the costs incurred with the added shortcuts. As a result, these works are ineffective in improving the overall performance of the network. Thus, this work presents a novel reinforcement learning technique that uses a Q-learning algorithm to optimize throughput in delay-critical and energy-aware small-world UAV-assisted wireless networks (SW-UAV-WNs). The proposed algorithm populates the Q-matrix with all possible shortcuts and updates the Q-values based on the reward/penalty. It then adds shortcuts based on descending Q-values until the SW-UAV-WN is established. Through numerical results, we demonstrate that the proposed framework surpasses the conventional SWC approach, canonical particle swarm data delivery method, Low Energy Adaptive Clustering Hierarchy (LEACH), modified LEACH, and conventional shortest path routing method in terms of network latency, lifetime, packet delivery ratio, and throughput. Furthermore, we discuss the effect of different UAV velocities and different heights of the layers in which the UAVs hover on the performance of the proposed approach.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"5 ","pages":"7228-7243"},"PeriodicalIF":6.3,"publicationDate":"2024-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10750848","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142713960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-11-07DOI: 10.1109/OJCOMS.2024.3494548
Garima Thakur;Deepika Gautam;Pankaj Kumar;Ashok Kumar Das;Vivekananda Bhat K.;Joel J. P. C. Rodrigues
The preface of the permeated metaverse together with Web 3.0, has confluenced virtual and physical reality and can revolutionize social networks, healthcare, gaming and the educational system. Unfortunately, this assimilation has divulged ways for physical and virtual-reality-synthesized security threats like avatar impersonation and sybil attacks. Furthermore, the divergence in metaverse platforms and the involvement of central intermediaries prompted the demand for interoperability, security provisions and decentralization. Therefore, this paper projects a blockchain-integrated authentication protocol for a seamless interface in a cross-platform metaverse network with Web 3.0. The proposed mechanisms are structured for user and avatar authentication within cross-platforms while furnishing conditional traceability, an avatar-update phase and a revocation phase. The blockchain network hinges on characteristics of a consortium blockchain and the voting-based Practical Byzantine Fault Tolerance (PBFT) consensus algorithm. The security of the proposed network is displayed by harnessing the Real-or-Random (RoR) oracle model and informal analysis. The operational effectiveness of the suggested system is gauged through an assessment of relevant existing work based on metrics such as communication, bandwidth, and computational costs. The study’s results indicate that the proposed system exhibits better computation and communication overhead compared to other systems, making it well-suited for metaverse applications in Web 3.0.
渗透式元宇宙和 Web 3.0 的出现,将虚拟和物理现实融为一体,并将彻底改变社交网络、医疗保健、游戏和教育系统。不幸的是,这种同化为虚拟现实和物理现实的安全威胁提供了途径,如虚拟化身假冒和假人攻击。此外,元宇宙平台的分化和中央中介机构的介入,促使人们对互操作性、安全规定和去中心化提出了要求。因此,本文提出了一种区块链集成身份验证协议,以实现跨平台元宇宙网络与 Web 3.0 的无缝对接。所提议的机制是在跨平台内对用户和头像进行认证,同时提供条件可追溯性、头像更新阶段和撤销阶段。区块链网络基于联盟区块链的特点和基于投票的实用拜占庭容错(PBFT)共识算法。通过利用真实或随机(RoR)甲骨文模型和非正式分析,展示了所建议网络的安全性。通过对基于通信、带宽和计算成本等指标的现有相关工作进行评估,衡量了所建议系统的运行效果。研究结果表明,与其他系统相比,建议的系统具有更好的计算和通信开销,非常适合 Web 3.0 中的元数据应用。
{"title":"Blockchain-Assisted Cross-Platform Authentication Protocol With Conditional Traceability for Metaverse Environment in Web 3.0","authors":"Garima Thakur;Deepika Gautam;Pankaj Kumar;Ashok Kumar Das;Vivekananda Bhat K.;Joel J. P. C. Rodrigues","doi":"10.1109/OJCOMS.2024.3494548","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3494548","url":null,"abstract":"The preface of the permeated metaverse together with Web 3.0, has confluenced virtual and physical reality and can revolutionize social networks, healthcare, gaming and the educational system. Unfortunately, this assimilation has divulged ways for physical and virtual-reality-synthesized security threats like avatar impersonation and sybil attacks. Furthermore, the divergence in metaverse platforms and the involvement of central intermediaries prompted the demand for interoperability, security provisions and decentralization. Therefore, this paper projects a blockchain-integrated authentication protocol for a seamless interface in a cross-platform metaverse network with Web 3.0. The proposed mechanisms are structured for user and avatar authentication within cross-platforms while furnishing conditional traceability, an avatar-update phase and a revocation phase. The blockchain network hinges on characteristics of a consortium blockchain and the voting-based Practical Byzantine Fault Tolerance (PBFT) consensus algorithm. The security of the proposed network is displayed by harnessing the Real-or-Random (RoR) oracle model and informal analysis. The operational effectiveness of the suggested system is gauged through an assessment of relevant existing work based on metrics such as communication, bandwidth, and computational costs. The study’s results indicate that the proposed system exhibits better computation and communication overhead compared to other systems, making it well-suited for metaverse applications in Web 3.0.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"5 ","pages":"7244-7261"},"PeriodicalIF":6.3,"publicationDate":"2024-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10747237","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142713957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-11-07DOI: 10.1109/OJCOMS.2024.3494059
Bertrand Le Gal
Low-density parity-check (LDPC) codes are error correction codes (ECC) with near Shannon correction performances limit boosting the reliability of digital communication systems using them. Their efficiency goes hand in hand with their high computational complexity resulting in a computational bottleneck in physical layer processing. Solutions based on multicore and many-core architectures have been proposed to support the development of software-defined radio and virtualized radio access networks (vRANs). Many studies focused on the efficient parallelization of LDPC decoding algorithms. In this study, we propose an efficient SIMD parallelization strategy for DVB-S2(x) LDPC codes. It achieves throughputs from 7 Gbps to 12 Gbps on an INTEL Xeon Gold target when 10 layered decoding iterations are executed. Simultaneously, the latencies are lower than $400~mu $