首页 > 最新文献

IEEE Open Journal of the Communications Society最新文献

英文 中文
Federated Learning for IoT: Applications, Trends, Taxonomy, Challenges, Current Solutions, and Future Directions 物联网联合学习:应用、趋势、分类、挑战、当前解决方案和未来方向
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-11-25 DOI: 10.1109/OJCOMS.2024.3506214
Mumin Adam;Uthman Baroudi
The rapid advancement of Internet of Things (IoT) technology has transformed the digital landscape, enabling unprecedented connectivity between devices, people, and services. Traditionally, IoT-generated data was processed through centralized, cloud-based machine learning (ML) systems, raising significant privacy, security, and network bandwidth concerns. Federated Learning (FL) presents a viable alternative by transmitting only model parameters while preserving local data privacy. Despite the growing body of research, there remains a gap in comprehensive studies on FL-enabled IoT systems. This review provides an in-depth examination of the integration of FL with IoT, highlighting how FL enhances the efficiency, robustness, and adaptability of IoT systems. The paper introduces the foundational principles of FL, followed by an exploration of its key benefits in decentralized IoT applications. It presents a comparative analysis of FL-IoT architectures using quantitative metrics and proposes a taxonomy that clarifies the complexities and variations in FL-enabled IoT systems. The challenges of deploying FL in IoT environments are discussed, along with current trends and solutions aimed at overcoming these hurdles. Furthermore, the review explores the integration of FL with emerging technologies, including foundational models (FMs), green and sustainable 6th-generation (6G) IoT networks, and deep reinforcement learning (DRL), emphasizing their role in enhancing FL’s efficiency and resilience. It also covers FL frameworks and benchmarks, providing a valuable resource for researchers and practitioners in the field The article concludes by identifying promising research directions that are expected to drive future advancements in this dynamic and expanding field.
物联网(IoT)技术的飞速发展改变了数字世界,使设备、人员和服务之间实现了前所未有的连接。传统上,物联网产生的数据是通过集中式、基于云的机器学习(ML)系统处理的,这引起了隐私、安全和网络带宽方面的重大问题。联邦学习(FL)在保护本地数据隐私的同时,只传输模型参数,是一种可行的替代方法。尽管研究成果不断增多,但对支持联合学习的物联网系统的全面研究仍是空白。本综述深入探讨了 FL 与物联网的整合,重点介绍了 FL 如何提高物联网系统的效率、鲁棒性和适应性。论文介绍了 FL 的基本原理,随后探讨了 FL 在分散式物联网应用中的主要优势。论文使用量化指标对 FL 物联网架构进行了比较分析,并提出了一种分类方法,以阐明启用 FL 的物联网系统的复杂性和差异性。文章讨论了在物联网环境中部署 FL 所面临的挑战,以及当前旨在克服这些障碍的趋势和解决方案。此外,综述还探讨了 FL 与新兴技术的整合,包括基础模型(FM)、绿色和可持续的第六代(6G)物联网网络以及深度强化学习(DRL),强调了它们在提高 FL 的效率和弹性方面的作用。文章最后指出了有望推动这一充满活力、不断扩展的领域未来发展的研究方向。
{"title":"Federated Learning for IoT: Applications, Trends, Taxonomy, Challenges, Current Solutions, and Future Directions","authors":"Mumin Adam;Uthman Baroudi","doi":"10.1109/OJCOMS.2024.3506214","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3506214","url":null,"abstract":"The rapid advancement of Internet of Things (IoT) technology has transformed the digital landscape, enabling unprecedented connectivity between devices, people, and services. Traditionally, IoT-generated data was processed through centralized, cloud-based machine learning (ML) systems, raising significant privacy, security, and network bandwidth concerns. Federated Learning (FL) presents a viable alternative by transmitting only model parameters while preserving local data privacy. Despite the growing body of research, there remains a gap in comprehensive studies on FL-enabled IoT systems. This review provides an in-depth examination of the integration of FL with IoT, highlighting how FL enhances the efficiency, robustness, and adaptability of IoT systems. The paper introduces the foundational principles of FL, followed by an exploration of its key benefits in decentralized IoT applications. It presents a comparative analysis of FL-IoT architectures using quantitative metrics and proposes a taxonomy that clarifies the complexities and variations in FL-enabled IoT systems. The challenges of deploying FL in IoT environments are discussed, along with current trends and solutions aimed at overcoming these hurdles. Furthermore, the review explores the integration of FL with emerging technologies, including foundational models (FMs), green and sustainable 6th-generation (6G) IoT networks, and deep reinforcement learning (DRL), emphasizing their role in enhancing FL’s efficiency and resilience. It also covers FL frameworks and benchmarks, providing a valuable resource for researchers and practitioners in the field The article concludes by identifying promising research directions that are expected to drive future advancements in this dynamic and expanding field.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"5 ","pages":"7842-7877"},"PeriodicalIF":6.3,"publicationDate":"2024-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10767353","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142858735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tensor Signal Modeling and Channel Estimation for Reconfigurable Intelligent Surface-Assisted Full-Duplex MIMO 可重构智能表面辅助全双工MIMO的张量信号建模与信道估计
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-11-25 DOI: 10.1109/OJCOMS.2024.3506481
Alexander James Fernandes;Ioannis N. Psaromiligkos
Channel estimation is one of the main challenges for reconfigurable intelligent surface (RIS) assisted communication systems with passive reflective elements due to the high number of parameters to estimate. In this paper, we consider channel estimation for a MIMO FD RIS-assisted wireless communication system and use tensor (multidimensional array) signal modelling techniques to estimate all channel state information (CSI) involving the self-interference, direct-path, and the RIS assisted channel links. We model the received signal as a tensor composed of two CANDECOMP/PARAFAC (CP) decomposition terms for the non-RIS and the RIS assisted links. Based on this model we extend the alternating least squares algorithm to jointly estimate all channels, then derive the corresponding Cramér-Rao Bounds (CRB). Numerical results show that compared to recent previous works which estimate the non-RIS and RIS links during separate training stages, our method provides a more accurate estimate by efficiently using all pilots transmitted throughout the full training duration without turning the RIS off when comparing the same number of total pilots transmitted. For a sufficient number of transmitted pilots, the proposed method’s accuracy comes close to the CRB for the RIS channels and attains the CRB for the direct-path and self-interference channels.
信道估计是具有无源反射元件的可重构智能表面(RIS)辅助通信系统的主要挑战之一,因为需要估计的参数数量很多。在本文中,我们考虑了MIMO FD RIS辅助无线通信系统的信道估计,并使用张量(多维阵列)信号建模技术来估计涉及自干扰、直接路径和RIS辅助信道链路的所有信道状态信息(CSI)。我们将接收到的信号建模为由非RIS和RIS辅助链路的两个CANDECOMP/PARAFAC (CP)分解项组成的张量。在此模型的基础上,我们将交替最小二乘算法扩展到联合估计所有信道,并推导出相应的cram r- rao边界(CRB)。数值结果表明,与最近在单独训练阶段估计非RIS和RIS链接的工作相比,我们的方法通过有效地利用整个训练期间传输的所有飞行员而不关闭RIS来提供更准确的估计,当比较传输的飞行员总数相同时。对于足够数量的发射导频,该方法的精度接近RIS信道的CRB,并达到直接路径信道和自干扰信道的CRB。
{"title":"Tensor Signal Modeling and Channel Estimation for Reconfigurable Intelligent Surface-Assisted Full-Duplex MIMO","authors":"Alexander James Fernandes;Ioannis N. Psaromiligkos","doi":"10.1109/OJCOMS.2024.3506481","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3506481","url":null,"abstract":"Channel estimation is one of the main challenges for reconfigurable intelligent surface (RIS) assisted communication systems with passive reflective elements due to the high number of parameters to estimate. In this paper, we consider channel estimation for a MIMO FD RIS-assisted wireless communication system and use tensor (multidimensional array) signal modelling techniques to estimate all channel state information (CSI) involving the self-interference, direct-path, and the RIS assisted channel links. We model the received signal as a tensor composed of two CANDECOMP/PARAFAC (CP) decomposition terms for the non-RIS and the RIS assisted links. Based on this model we extend the alternating least squares algorithm to jointly estimate all channels, then derive the corresponding Cramér-Rao Bounds (CRB). Numerical results show that compared to recent previous works which estimate the non-RIS and RIS links during separate training stages, our method provides a more accurate estimate by efficiently using all pilots transmitted throughout the full training duration without turning the RIS off when comparing the same number of total pilots transmitted. For a sufficient number of transmitted pilots, the proposed method’s accuracy comes close to the CRB for the RIS channels and attains the CRB for the direct-path and self-interference channels.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"5 ","pages":"7668-7684"},"PeriodicalIF":6.3,"publicationDate":"2024-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10767385","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural Network-Based Bandit: A Medium Access Control for the IIoT Alarm Scenario 基于神经网络的强盗:用于工业物联网报警场景的介质访问控制
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-11-25 DOI: 10.1109/OJCOMS.2024.3506033
Prasoon Raghuwanshi;Onel Luis Alcaraz López;Neelesh B. Mehta;Hirley Alves;Matti Latva-Aho
Efficient Random Access (RA) is critical for enabling reliable communication in Industrial Internet of Things (IIoT) networks. Herein, we propose a deep reinforcement learning-based distributed RA scheme, entitled Neural Network-Based Bandit (NNBB), for the IIoT alarm scenario. In such a scenario, devices may detect a common critical event, and the goal is to ensure the alarm information is delivered successfully from at least one device. The proposed NNBB scheme is implemented at each device, where it trains itself online and establishes implicit inter-device coordination to achieve the common goal. We devise a procedure for acquiring a valuable context for NNBB, which then uses a deep neural network to process this context and let devices determine their action. Each possible transmission pattern, i.e., transmit channel(s) allocation, constitutes a feasible action. Our simulation results show that as the number of devices in the network increases, so does the performance gain of the NNBB compared to the Multi-Armed Bandit (MAB) RA benchmark. For instance, NNBB experiences a 7% success rate drop when there are four channels and the number of devices increases from 10 to 60, while MAB faces a 25% drop.
高效随机接入(RA)对于实现工业物联网(IIoT)网络的可靠通信至关重要。在此,我们提出了一种基于深度强化学习的分布式RA方案,称为基于神经网络的强盗(NNBB),用于工业物联网报警场景。在这种情况下,设备可能会检测到常见的关键事件,目标是确保至少从一台设备成功发送告警信息。提出的NNBB方案在每个设备上实现,它在线训练自己并建立隐式设备间协调以实现共同目标。我们设计了一个程序来获取NNBB的有价值的上下文,然后使用一个深度神经网络来处理这个上下文,让设备决定它们的行动。每个可能的传输模式,即传输信道分配,构成一个可行的动作。我们的仿真结果表明,随着网络中设备数量的增加,NNBB与Multi-Armed Bandit (MAB) RA基准相比的性能增益也会增加。例如,当有四个通道,设备数量从10个增加到60个时,NNBB的成功率下降了7%,而MAB的成功率下降了25%。
{"title":"Neural Network-Based Bandit: A Medium Access Control for the IIoT Alarm Scenario","authors":"Prasoon Raghuwanshi;Onel Luis Alcaraz López;Neelesh B. Mehta;Hirley Alves;Matti Latva-Aho","doi":"10.1109/OJCOMS.2024.3506033","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3506033","url":null,"abstract":"Efficient Random Access (RA) is critical for enabling reliable communication in Industrial Internet of Things (IIoT) networks. Herein, we propose a deep reinforcement learning-based distributed RA scheme, entitled Neural Network-Based Bandit (NNBB), for the IIoT alarm scenario. In such a scenario, devices may detect a common critical event, and the goal is to ensure the alarm information is delivered successfully from at least one device. The proposed NNBB scheme is implemented at each device, where it trains itself online and establishes implicit inter-device coordination to achieve the common goal. We devise a procedure for acquiring a valuable context for NNBB, which then uses a deep neural network to process this context and let devices determine their action. Each possible transmission pattern, i.e., transmit channel(s) allocation, constitutes a feasible action. Our simulation results show that as the number of devices in the network increases, so does the performance gain of the NNBB compared to the Multi-Armed Bandit (MAB) RA benchmark. For instance, NNBB experiences a 7% success rate drop when there are four channels and the number of devices increases from 10 to 60, while MAB faces a 25% drop.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"5 ","pages":"7511-7524"},"PeriodicalIF":6.3,"publicationDate":"2024-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10767384","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142777748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User-Centric Multi-Dimensional Modulation for Receiver Operational Cost Minimization in Non-Orthogonal Domains 以用户为中心的多维调制,实现非全交域中接收器运行成本最小化
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-11-25 DOI: 10.1109/OJCOMS.2024.3506219
Thakshanth Uthayakumar;Xianbin Wang
The perpetual efforts in supporting ever-growing QoS requirements have brought new challenges in 5G advanced and 6G networks such as increased spatial channel correlation, large delaydoppler spread, higher carrier frequency offset, and more complex multi-path signals. As a result, the orthogonality among spatial, time-frequency, and delay-doppler domain radio resources is often destroyed leading to non-orthogonal radio resources a common paradigm for modulation in next-generation networks. Such non-orthogonality degrees have become both transmitter-receiver pair specific and domain specific due to diverse channel conditions perceived by the UE involved. Furthermore, the operational cost of restoring orthogonality and demodulation varies across domains due to different synchronization and interference cancelation capabilities of receiver in different domains. To tackle these issues, we propose user-centric multi-dimensional modulation (UC-MDM) aiming to minimize receiver costs while supporting necessary data rates. Our situation-aware, cost-conscious UC-MDM optimizes resource separation across spatial, time-frequency, and delay-doppler domains, utilizing optimal resource combinations through multidimensional modulation in either spatial-time-frequency or spatial-delay-doppler domains. Simulation results under simultaneously varied domain specific non-orthogonality degrees validate that UC-MDM achieves required data rate with less operational cost from user-device compared to MIMO-OFDM and MIMO-OTFS systems.
为了满足日益增长的QoS需求,5G高级网络和6G网络面临着空间信道相关性增强、时延多普勒扩频、载波频偏增大、多径信号更加复杂等新挑战。因此,空间、时频和延迟多普勒域无线电资源之间的正交性经常被破坏,导致非正交无线电资源成为下一代网络中调制的常见范例。由于所涉及的UE感知到不同的信道条件,这种非正交度已经成为发射器-接收器对特定和域特定。此外,由于接收机在不同域的同步和干扰消除能力不同,恢复正交性和解调的运行成本也不同。为了解决这些问题,我们提出了以用户为中心的多维调制(UC-MDM),旨在最大限度地降低接收器成本,同时支持必要的数据速率。我们的情况感知、成本意识强的UC-MDM优化了跨空间、时频和延迟多普勒域的资源分离,通过在时空频或空间延迟多普勒域的多维调制利用最佳资源组合。同时在不同域特定非正交度下的仿真结果验证了UC-MDM与MIMO-OFDM和MIMO-OTFS系统相比,以更低的用户设备操作成本实现了所需的数据速率。
{"title":"User-Centric Multi-Dimensional Modulation for Receiver Operational Cost Minimization in Non-Orthogonal Domains","authors":"Thakshanth Uthayakumar;Xianbin Wang","doi":"10.1109/OJCOMS.2024.3506219","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3506219","url":null,"abstract":"The perpetual efforts in supporting ever-growing QoS requirements have brought new challenges in 5G advanced and 6G networks such as increased spatial channel correlation, large delaydoppler spread, higher carrier frequency offset, and more complex multi-path signals. As a result, the orthogonality among spatial, time-frequency, and delay-doppler domain radio resources is often destroyed leading to non-orthogonal radio resources a common paradigm for modulation in next-generation networks. Such non-orthogonality degrees have become both transmitter-receiver pair specific and domain specific due to diverse channel conditions perceived by the UE involved. Furthermore, the operational cost of restoring orthogonality and demodulation varies across domains due to different synchronization and interference cancelation capabilities of receiver in different domains. To tackle these issues, we propose user-centric multi-dimensional modulation (UC-MDM) aiming to minimize receiver costs while supporting necessary data rates. Our situation-aware, cost-conscious UC-MDM optimizes resource separation across spatial, time-frequency, and delay-doppler domains, utilizing optimal resource combinations through multidimensional modulation in either spatial-time-frequency or spatial-delay-doppler domains. Simulation results under simultaneously varied domain specific non-orthogonality degrees validate that UC-MDM achieves required data rate with less operational cost from user-device compared to MIMO-OFDM and MIMO-OTFS systems.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"5 ","pages":"7628-7640"},"PeriodicalIF":6.3,"publicationDate":"2024-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10767382","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimizing Delay in UAV-Aided Federated Learning for IoT Applications With Straggling Devices 具有分散设备的物联网应用的无人机辅助联邦学习延迟最小化
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-11-22 DOI: 10.1109/OJCOMS.2024.3504852
Mudassar Liaq;Waleed Ejaz
The Internet of Things (IoT) applications generate large volumes of data, which needs to be processed securely, reliably, and promptly for effective decision-making. However, the limited processing capability of IoT devices is a significant bottleneck in processing these datasets. In scenarios like forest fire surveillance, flash flood alert systems, or wildlife activity tracking, where IoT devices are deployed in remote locations and only need coverage for a few weeks a year, thus deploying permanent base stations is not a feasible solution. One potential solution to overcome this challenge is to use Federated learning (FL) with unmanned aerial vehicle (UAV) as mobile edge computing (MEC) servers. FL enables collaborative model training across decentralized IoT devices by keeping data local, eliminating the need for centralized data collection. This approach is especially effective when IoT devices generate large volumes of data, making FL an ideal solution for data-sensitive, resource-constrained environments. In this paper, we propose a UAV-aided FL framework that utilizes the computation capacity of UAV-MEC to process some portion of the datasets from the straggling devices (devices which are unable to process their dataset in reasonable time and are lagging, increasing delay in the whole system). We also incorporate an IoT device importance and selection scheme to further improve system performance. We formulate an optimization problem to minimize system delay, considering UAV-MEC’s computation power, computation and communication power of IoT devices, and quality of service constraints. To solve the problem, we transform the proposed problem by introducing auxiliary variables and epigraph form. We then use the concurrent deterministic simplex with root relaxation algorithm. We also propose a deep reinforcement learning (DRL)-based solution to improve runtime complexity. Simulation results show the effectiveness of the proposed framework compared to existing approaches.
物联网(IoT)应用会产生大量数据,需要对这些数据进行安全、可靠和及时的处理,以便做出有效决策。然而,物联网设备有限的处理能力是处理这些数据集的一大瓶颈。在森林火灾监控、山洪暴发警报系统或野生动物活动跟踪等场景中,物联网设备部署在偏远地区,每年只需要覆盖几个星期,因此部署永久性基站并不是一个可行的解决方案。克服这一挑战的一个潜在解决方案是将无人飞行器(UAV)作为移动边缘计算(MEC)服务器,使用联合学习(FL)。通过保持本地数据,FL 能够在分散的物联网设备之间进行协作模型训练,从而消除了集中数据收集的需要。当物联网设备产生大量数据时,这种方法尤其有效,使 FL 成为数据敏感、资源受限环境的理想解决方案。在本文中,我们提出了一种无人机辅助 FL 框架,它利用无人机-MEC 的计算能力来处理来自滞后设备(无法在合理时间内处理其数据集且滞后的设备,增加了整个系统的延迟)的部分数据集。我们还采用了物联网设备重要性和选择方案,以进一步提高系统性能。考虑到 UAV-MEC 的计算能力、物联网设备的计算能力和通信能力以及服务质量限制,我们提出了一个优化问题,以最小化系统延迟。为了解决这个问题,我们通过引入辅助变量和外显形式对提出的问题进行了转换。然后,我们使用带根松弛的并发确定性单纯形算法。我们还提出了一种基于深度强化学习(DRL)的解决方案,以改善运行时的复杂性。仿真结果表明,与现有方法相比,我们提出的框架非常有效。
{"title":"Minimizing Delay in UAV-Aided Federated Learning for IoT Applications With Straggling Devices","authors":"Mudassar Liaq;Waleed Ejaz","doi":"10.1109/OJCOMS.2024.3504852","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3504852","url":null,"abstract":"The Internet of Things (IoT) applications generate large volumes of data, which needs to be processed securely, reliably, and promptly for effective decision-making. However, the limited processing capability of IoT devices is a significant bottleneck in processing these datasets. In scenarios like forest fire surveillance, flash flood alert systems, or wildlife activity tracking, where IoT devices are deployed in remote locations and only need coverage for a few weeks a year, thus deploying permanent base stations is not a feasible solution. One potential solution to overcome this challenge is to use Federated learning (FL) with unmanned aerial vehicle (UAV) as mobile edge computing (MEC) servers. FL enables collaborative model training across decentralized IoT devices by keeping data local, eliminating the need for centralized data collection. This approach is especially effective when IoT devices generate large volumes of data, making FL an ideal solution for data-sensitive, resource-constrained environments. In this paper, we propose a UAV-aided FL framework that utilizes the computation capacity of UAV-MEC to process some portion of the datasets from the straggling devices (devices which are unable to process their dataset in reasonable time and are lagging, increasing delay in the whole system). We also incorporate an IoT device importance and selection scheme to further improve system performance. We formulate an optimization problem to minimize system delay, considering UAV-MEC’s computation power, computation and communication power of IoT devices, and quality of service constraints. To solve the problem, we transform the proposed problem by introducing auxiliary variables and epigraph form. We then use the concurrent deterministic simplex with root relaxation algorithm. We also propose a deep reinforcement learning (DRL)-based solution to improve runtime complexity. Simulation results show the effectiveness of the proposed framework compared to existing approaches.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"5 ","pages":"7653-7667"},"PeriodicalIF":6.3,"publicationDate":"2024-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10764791","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unlocking Sub-THz by Robotic Aerial Base Stations: Joint Deployment and Wireless Backhaul Routing 通过机器人空中基站解锁次 THz:联合部署和无线回程路由选择
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-11-22 DOI: 10.1109/OJCOMS.2024.3505435
Wen Shang;Yuan Liao;Vasilis Friderikos;Halim Yanikomeroglu
Despite the numerous advantages of aerial base stations (ABSs), including their relatively ease of deployment and inherent flexibility for relocation to adapt to highly dynamic networks, their service endurance is constrained by the limited capacity of their onboard batteries. To address this limiting factor, we explore the use of robotic aerial base stations (RABSs) that are equipped with grasping end-effectors able to anchor onto tall urban landforms such as lampposts. Energy-neutral anchoring conserves energy consumption by eliminating the need for hovering or flying during service time, thereby massively improving communication service endurance. In this paper, a joint RABS deployment and wireless backhauling scheme with the aim of maximizing served traffic is proposed to support future dynamic and densified wireless networks experiencing unprecedented data traffic growth. To meet this significant increase in traffic demand, which requires substantial bandwidth for both access and backhaul, we employ sub-Terahertz (sub-THz) band communication due to its ultra-wide spectrum resources. Given the sub-THz band’s susceptibility to blockages and severe propagation losses due to absorption, we propose a multi-hop wireless scheme to extend network coverage. The optimization interplay between RABS grasping locations, route flow control, and sub-band allocation to ensure link capacity, is framed as a robust optimization problem aimed at maximizing served traffic with a cardinality-constrained uncertainty set. Since the grasping locations are determined from all candidate locations, the number of corresponding candidate routes can significantly increase with the network size in this multi-hop enabled network. In this work, we propose a column generation (CG) based algorithm to tackle the curse of dimensionality due to the exponentially increased number of candidate routes. To this end, a near-optimal decision making is proposed with significantly reduced computational complexity. A wide set of numerical investigations demonstrates the superiority of the proposed network scheme over baseline schemes. For instance, the aggregated served traffic demand improved by 125% compared to a network with fixed small cell deployment which could be considered as the nominal use case and a common deployment option for increasing network capacity.
尽管空中基站(ABS)具有众多优势,包括相对易于部署和固有的重新定位灵活性,以适应高度动态的网络,但其服务续航时间却受到机载电池容量有限的限制。为了解决这一限制因素,我们探索了机器人空中基站(RABS)的使用方法,这种基站配备了抓取式末端执行器,能够锚定在灯柱等高大的城市地形上。不消耗能量的锚定方式无需在服务时间内悬停或飞行,从而节省了能源消耗,大大提高了通信服务的续航时间。本文提出了一种联合 RABS 部署和无线回程方案,旨在最大限度地提高服务流量,以支持未来数据流量空前增长的动态高密度无线网络。为了满足流量需求的大幅增长,接入和回程都需要大量带宽,我们采用了具有超宽频谱资源的亚太赫兹(sub-THz)频段通信。考虑到 sub-THz 频段易受阻塞和吸收造成的严重传播损耗,我们提出了一种多跳无线方案来扩大网络覆盖范围。RABS 抓取位置、路由流量控制和确保链路容量的子频段分配之间的优化相互作用被归结为一个稳健的优化问题,其目的是最大化服务流量,并具有一个有卡达约束的不确定性集。由于抓取位置是从所有候选位置中确定的,因此在这种启用多跳的网络中,相应候选路由的数量会随着网络规模的增加而显著增加。在这项工作中,我们提出了一种基于列生成(CG)的算法,以解决因候选路径数量呈指数增长而产生的维度诅咒问题。为此,我们提出了一种近乎最优的决策制定方法,并显著降低了计算复杂度。一系列广泛的数值研究表明,所提出的网络方案优于基准方案。例如,与采用固定小基站部署的网络相比,聚合服务流量需求提高了 125%。
{"title":"Unlocking Sub-THz by Robotic Aerial Base Stations: Joint Deployment and Wireless Backhaul Routing","authors":"Wen Shang;Yuan Liao;Vasilis Friderikos;Halim Yanikomeroglu","doi":"10.1109/OJCOMS.2024.3505435","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3505435","url":null,"abstract":"Despite the numerous advantages of aerial base stations (ABSs), including their relatively ease of deployment and inherent flexibility for relocation to adapt to highly dynamic networks, their service endurance is constrained by the limited capacity of their onboard batteries. To address this limiting factor, we explore the use of robotic aerial base stations (RABSs) that are equipped with grasping end-effectors able to anchor onto tall urban landforms such as lampposts. Energy-neutral anchoring conserves energy consumption by eliminating the need for hovering or flying during service time, thereby massively improving communication service endurance. In this paper, a joint RABS deployment and wireless backhauling scheme with the aim of maximizing served traffic is proposed to support future dynamic and densified wireless networks experiencing unprecedented data traffic growth. To meet this significant increase in traffic demand, which requires substantial bandwidth for both access and backhaul, we employ sub-Terahertz (sub-THz) band communication due to its ultra-wide spectrum resources. Given the sub-THz band’s susceptibility to blockages and severe propagation losses due to absorption, we propose a multi-hop wireless scheme to extend network coverage. The optimization interplay between RABS grasping locations, route flow control, and sub-band allocation to ensure link capacity, is framed as a robust optimization problem aimed at maximizing served traffic with a cardinality-constrained uncertainty set. Since the grasping locations are determined from all candidate locations, the number of corresponding candidate routes can significantly increase with the network size in this multi-hop enabled network. In this work, we propose a column generation (CG) based algorithm to tackle the curse of dimensionality due to the exponentially increased number of candidate routes. To this end, a near-optimal decision making is proposed with significantly reduced computational complexity. A wide set of numerical investigations demonstrates the superiority of the proposed network scheme over baseline schemes. For instance, the aggregated served traffic demand improved by 125% compared to a network with fixed small cell deployment which could be considered as the nominal use case and a common deployment option for increasing network capacity.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"5 ","pages":"7582-7597"},"PeriodicalIF":6.3,"publicationDate":"2024-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10766414","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Eisdspa: An Efficient and Secure Blockchain-Based Donation Scheme With Privacy Protection and Auditability Eisdspa:一个高效、安全的基于区块链的捐赠方案,具有隐私保护和可审计性
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-11-21 DOI: 10.1109/OJCOMS.2024.3504403
Yong Zhou;Hong Lei;Zijian Bao
Charity donations are a critical mechanism for social resource distribution. However, traditional donation systems, typically centralized, are prone to issues such as data redundancy, vulnerability to single-point failures, and a deficiency in transparency and traceability. Although blockchain-based donation programs have emerged to address trust issues inherent in centralized models, they often neglect critical security concerns like privacy protection and identity authentication. This paper introduces Eisdspa, a blockchain-based donation system designed to offer identity authentication, auditability, and privacy protection. Specifically, we introduce an identity credential system that facilitates anonymous donations, shielding the identities of both donors and donees through the use of BBS+ signatures and zero-knowledge proofs of knowledge (ZKPoKs). Additionally, we ensure the integrity of goods donations by offering robust auditability and protecting user privacy with Pedersen commitments and ZKPoKs. We formally define the privacy aspects of Eisdspa and conduct a security analysis of the system under the random oracle model. A prototype implementation of the scheme, along with a comparative analysis with existing solutions, highlights the benefits of Eisdspa. Moreover, we assess the computational efficiency of Eisdspa, with experimental results indicating its high performance in computational overhead.
慈善捐赠是社会资源配置的重要机制。然而,传统的捐赠系统通常是集中式的,容易出现数据冗余、容易出现单点故障、缺乏透明度和可追溯性等问题。尽管基于区块链的捐赠计划已经出现,以解决中心化模型固有的信任问题,但它们往往忽视了隐私保护和身份认证等关键安全问题。本文介绍了Eisdspa,这是一个基于区块链的捐赠系统,旨在提供身份认证,可审计性和隐私保护。具体来说,我们引入了一个身份认证系统,通过使用BBS+签名和零知识知识证明(ZKPoKs)来保护捐赠者和受赠者的身份,从而促进匿名捐赠。此外,我们通过提供强大的可审计性,并通过Pedersen承诺和ZKPoKs保护用户隐私,确保捐赠物品的完整性。我们正式定义了Eisdspa的隐私方面,并在随机oracle模型下对系统进行了安全性分析。该方案的原型实现,以及与现有解决方案的比较分析,突出了Eisdspa的优势。此外,我们还评估了Eisdspa的计算效率,实验结果表明其在计算开销方面具有很高的性能。
{"title":"Eisdspa: An Efficient and Secure Blockchain-Based Donation Scheme With Privacy Protection and Auditability","authors":"Yong Zhou;Hong Lei;Zijian Bao","doi":"10.1109/OJCOMS.2024.3504403","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3504403","url":null,"abstract":"Charity donations are a critical mechanism for social resource distribution. However, traditional donation systems, typically centralized, are prone to issues such as data redundancy, vulnerability to single-point failures, and a deficiency in transparency and traceability. Although blockchain-based donation programs have emerged to address trust issues inherent in centralized models, they often neglect critical security concerns like privacy protection and identity authentication. This paper introduces Eisdspa, a blockchain-based donation system designed to offer identity authentication, auditability, and privacy protection. Specifically, we introduce an identity credential system that facilitates anonymous donations, shielding the identities of both donors and donees through the use of BBS+ signatures and zero-knowledge proofs of knowledge (ZKPoKs). Additionally, we ensure the integrity of goods donations by offering robust auditability and protecting user privacy with Pedersen commitments and ZKPoKs. We formally define the privacy aspects of Eisdspa and conduct a security analysis of the system under the random oracle model. A prototype implementation of the scheme, along with a comparative analysis with existing solutions, highlights the benefits of Eisdspa. Moreover, we assess the computational efficiency of Eisdspa, with experimental results indicating its high performance in computational overhead.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"5 ","pages":"7498-7510"},"PeriodicalIF":6.3,"publicationDate":"2024-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10759694","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142777749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interference Analysis and Modeling of Positioning Reference Signals in 5G NTN 5G NTN 中定位参考信号的干扰分析与建模
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-11-20 DOI: 10.1109/OJCOMS.2024.3503692
Alejandro Gonzalez-Garrido;Jorge Querol;Henk Wymeersch;Symeon Chatzinotas
The integration of Positioning, Navigation, and Timing (PNT) services within the 5G non-terrestrial networks (NTN) infrastructure is necessary to eliminate the need for a GNSS receiver in the user terminal. Using the positioning reference signal (PRS) in an NTN scenario presents significant challenges, such as interference analysis from the transmission of multiple PRS signals. This study provides a stochastic model for the interference generated by PRS transmissions in a 5G NTN scenario. This model has been derived empirically from a Monte Carlo simulator designed specifically for this purpose, showing that the distribution that best fits the interference is a Generalized Extreme Value (GEV) distribution. The parameters of this distribution are also modeled based on the PRS configuration. Therefore, a designer can use this model to evaluate the probability of encountering certain levels of interference.
在5G非地面网络(NTN)基础设施中集成定位、导航和授时(PNT)业务是必要的,以消除对用户终端中GNSS接收器的需求。在NTN场景中使用定位参考信号(PRS)存在重大挑战,例如来自多个PRS信号传输的干扰分析。本研究为5G NTN场景下PRS传输产生的干扰提供了一个随机模型。该模型是由专门为此目的设计的蒙特卡罗模拟器经验导出的,表明最适合干扰的分布是广义极值(GEV)分布。该分布的参数也基于PRS配置建模。因此,设计者可以使用这个模型来评估遇到一定程度的干扰的概率。
{"title":"Interference Analysis and Modeling of Positioning Reference Signals in 5G NTN","authors":"Alejandro Gonzalez-Garrido;Jorge Querol;Henk Wymeersch;Symeon Chatzinotas","doi":"10.1109/OJCOMS.2024.3503692","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3503692","url":null,"abstract":"The integration of Positioning, Navigation, and Timing (PNT) services within the 5G non-terrestrial networks (NTN) infrastructure is necessary to eliminate the need for a GNSS receiver in the user terminal. Using the positioning reference signal (PRS) in an NTN scenario presents significant challenges, such as interference analysis from the transmission of multiple PRS signals. This study provides a stochastic model for the interference generated by PRS transmissions in a 5G NTN scenario. This model has been derived empirically from a Monte Carlo simulator designed specifically for this purpose, showing that the distribution that best fits the interference is a Generalized Extreme Value (GEV) distribution. The parameters of this distribution are also modeled based on the PRS configuration. Therefore, a designer can use this model to evaluate the probability of encountering certain levels of interference.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"5 ","pages":"7567-7581"},"PeriodicalIF":6.3,"publicationDate":"2024-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10759698","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Unmanned Aerial Vehicles Networks Using Pairing Free Aggregate Signcryption Scheme 利用无配对聚合签名加密方案确保无人机网络安全
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-11-20 DOI: 10.1109/OJCOMS.2024.3504353
Eman Abouelkheir
Unmanned aerial vehicles (UAVs) have gained significant attention in robotics research during the past decade, despite their presence dating back to 1915. Unmanned Aerial Vehicles (UAVs) are capable of efficiently and successfully carrying out a range of tasks. As a result, the use of many UAVs to fulfill a specific mission has grown into a popular area of research. Researchers have conducted investigations on the use of numerous UAVs in various fields such as remote sensing, disaster relief, force protection, military warfare, and surveillance. Efficiency and robustness are crucial factors for carrying out key operations. Multiple groups of UAVs, through appropriate interaction and concerted procedures, can achieve these objectives. The unpredictable features of UAVs and their reliance on unprotected and widely available wireless networks create challenges in establishing secure communication between a private edge cloud and a UAV. Consequently, secret UAV networks that utilize edge computing necessitate supplementary precautions to safeguard their networks. This research paper talks about a simple, lightweight, certificate-free, heterogeneous online/offline aggregate signing scheme called CL-PFASC. It comes from the discrete logarithm problem. The concert scheme enables UAVs to communicate with a GS without the need for a bilinear coupling operation. We classify the UAVs as identity-based cryptography (IBC) and the ground station GS as public-key infrastructure (PKI). We verify the security features of the suggested scheme using a formal security evaluation method, the random oracle model, under confidentiality and unforgeability. We also evaluate its communication and computation costs and compare them to those of similar existing schemes. The performance and security study indicate that the suggested approach improves both efficiency and security.
尽管无人驾驶飞行器(uav)的出现可以追溯到1915年,但在过去的十年中,它在机器人研究中获得了极大的关注。无人驾驶飞行器(uav)能够有效和成功地执行一系列任务。因此,使用许多无人机来完成特定任务已经成为一个热门的研究领域。研究人员已经对许多无人机在遥感、救灾、部队保护、军事战争和监视等各个领域的使用进行了调查。效率和健壮性是执行关键操作的关键因素。多组无人机,通过适当的相互作用和协调的程序,可以实现这些目标。无人机的不可预测特性及其对无保护和广泛可用的无线网络的依赖,为在私有边缘云和无人机之间建立安全通信带来了挑战。因此,利用边缘计算的秘密无人机网络需要补充预防措施来保护其网络。本文讨论了一种简单、轻量级、无需证书、异构的在线/离线聚合签名方案CL-PFASC。它来自于离散对数问题。协调方案使无人机能够在不需要双线性耦合操作的情况下与GS通信。我们将无人机分类为基于身份的加密(IBC),将地面站GS分类为公钥基础设施(PKI)。在保密性和不可伪造性条件下,我们使用一种正式的安全评估方法——随机oracle模型来验证所建议方案的安全特性。我们还评估了它的通信和计算成本,并将它们与现有的类似方案进行了比较。性能和安全性研究表明,该方法提高了效率和安全性。
{"title":"Securing Unmanned Aerial Vehicles Networks Using Pairing Free Aggregate Signcryption Scheme","authors":"Eman Abouelkheir","doi":"10.1109/OJCOMS.2024.3504353","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3504353","url":null,"abstract":"Unmanned aerial vehicles (UAVs) have gained significant attention in robotics research during the past decade, despite their presence dating back to 1915. Unmanned Aerial Vehicles (UAVs) are capable of efficiently and successfully carrying out a range of tasks. As a result, the use of many UAVs to fulfill a specific mission has grown into a popular area of research. Researchers have conducted investigations on the use of numerous UAVs in various fields such as remote sensing, disaster relief, force protection, military warfare, and surveillance. Efficiency and robustness are crucial factors for carrying out key operations. Multiple groups of UAVs, through appropriate interaction and concerted procedures, can achieve these objectives. The unpredictable features of UAVs and their reliance on unprotected and widely available wireless networks create challenges in establishing secure communication between a private edge cloud and a UAV. Consequently, secret UAV networks that utilize edge computing necessitate supplementary precautions to safeguard their networks. This research paper talks about a simple, lightweight, certificate-free, heterogeneous online/offline aggregate signing scheme called CL-PFASC. It comes from the discrete logarithm problem. The concert scheme enables UAVs to communicate with a GS without the need for a bilinear coupling operation. We classify the UAVs as identity-based cryptography (IBC) and the ground station GS as public-key infrastructure (PKI). We verify the security features of the suggested scheme using a formal security evaluation method, the random oracle model, under confidentiality and unforgeability. We also evaluate its communication and computation costs and compare them to those of similar existing schemes. The performance and security study indicate that the suggested approach improves both efficiency and security.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"5 ","pages":"7552-7566"},"PeriodicalIF":6.3,"publicationDate":"2024-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10759680","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
In-Sender Reordering Compensation for RACK in Container Overlay Networks 容器覆盖网络中机架的发送方内重排序补偿
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-11-19 DOI: 10.1109/OJCOMS.2024.3501322
Sunjae Kim;Wonjun Lee
Container orchestrators like Kubernetes utilize packet encapsulation to construct container overlay networks, allowing for transparent communications among containers. While providing flexible connectivity with a minimal requirement for host machines, the inadvertent interplay with encapsulationinduced extra in-host hops and TCP’s default loss detection algorithm, Recent Acknowledgment (RACK), causes irregular in-sender reordering and spurious retransmissions (SRs). For a deeper understanding of the problem, we examine the behavior of RACK loss detection algorithm in the context of the packet datapath of the container overlay networks, which is not presumed by the RACK standard. Then we quantify the SRs of TCP using RACK in the production-level container overlay networks. Based on the in-depth analysis of the root causes of the SRs in container overlay networking, we derive a SR model induced by in-sender reordering and present a compensation mechanism for in-sender reordering. Our prototype implementation, centered around eBPF running in the Linux kernel, validates that the proposed compensation mechanism reduces SRs by up to 98.6% while maintaining the latency and throughput overhead below 2.3%.
像Kubernetes这样的容器编排器利用数据包封装来构建容器覆盖网络,从而允许容器之间的透明通信。在以最小的主机需求提供灵活连接的同时,封装引起的额外主机内跳和TCP的默认丢失检测算法最近确认(RACK)的无意相互作用会导致不规则的发送者内重新排序和虚假重传(SRs)。为了更深入地理解这个问题,我们在容器覆盖网络的数据包数据路径上下文中检查了RACK丢失检测算法的行为,这不是RACK标准所假定的。然后,我们在生产级容器覆盖网络中使用RACK量化TCP的sr。在深入分析容器覆盖网络中产生SR的原因的基础上,推导了由发送者重排序引起的SR模型,并提出了发送者重排序的补偿机制。我们的原型实现以运行在Linux内核中的eBPF为中心,验证了提议的补偿机制将sr降低了98.6%,同时将延迟和吞吐量开销保持在2.3%以下。
{"title":"In-Sender Reordering Compensation for RACK in Container Overlay Networks","authors":"Sunjae Kim;Wonjun Lee","doi":"10.1109/OJCOMS.2024.3501322","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3501322","url":null,"abstract":"Container orchestrators like Kubernetes utilize packet encapsulation to construct container overlay networks, allowing for transparent communications among containers. While providing flexible connectivity with a minimal requirement for host machines, the inadvertent interplay with encapsulationinduced extra in-host hops and TCP’s default loss detection algorithm, Recent Acknowledgment (RACK), causes irregular in-sender reordering and spurious retransmissions (SRs). For a deeper understanding of the problem, we examine the behavior of RACK loss detection algorithm in the context of the packet datapath of the container overlay networks, which is not presumed by the RACK standard. Then we quantify the SRs of TCP using RACK in the production-level container overlay networks. Based on the in-depth analysis of the root causes of the SRs in container overlay networking, we derive a SR model induced by in-sender reordering and present a compensation mechanism for in-sender reordering. Our prototype implementation, centered around eBPF running in the Linux kernel, validates that the proposed compensation mechanism reduces SRs by up to 98.6% while maintaining the latency and throughput overhead below 2.3%.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"5 ","pages":"7467-7482"},"PeriodicalIF":6.3,"publicationDate":"2024-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10758302","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142777746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Open Journal of the Communications Society
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1