首页 > 最新文献

Future Internet最新文献

英文 中文
A Microservices-Based Control Plane for Time-Sensitive Networking 基于微服务的时敏网络控制平面
IF 3.4 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.3390/fi16040120
A. Agustí-Torra, Marc Ferré-Mancebo, Gabriel David Orozco-Urrutia, David Rincón-Rivera, David Remondo
Time-Sensitive Networking (TSN) aims to provide deterministic communications over Ethernet. The main characteristics of TSN are bounded latency and very high reliability, thus complying with the strict requirements of industrial communications or automotive applications, to name a couple of examples. In order to achieve this goal, TSN defines several scheduling algorithms, among them the Time-Aware Shaper (TAS), which is based on time slots and Gate Control Lists (GCLs). The configuration of network elements to allocate time slots, paths, and GCLs is laborious, and has to be updated promptly and in a dynamic way, as new data flows arrive or disappear. The IEEE 802.1Qcc standard provides the basis to design a TSN control plane to face these challenges, following the Software-Defined Networking (SDN) paradigm. However, most of the current SDN/TSN control plane solutions are monolithic applications designed to run on dedicated servers, and do not provide the required flexibility to escalate when facing increasing service requests. This work presents μTSN-CP, an SDN/TSN microservices-based control plane, based on the 802.1Qcc standard. Our architecture leverages the advantages of microservices, enabling the control plane to scale up or down in response to varying workloads dynamically. We achieve enhanced flexibility and resilience by breaking down the control plane into smaller, independent microservices. The performance of μTSN-CP is evaluated in a real environment with TSN switches, and various integer linear problem solvers, running over different computing platforms.
时间敏感网络(TSN)旨在通过以太网提供确定性通信。TSN 的主要特点是有界限的延迟和极高的可靠性,因此符合工业通信或汽车应用的严格要求。为了实现这一目标,TSN 定义了多种调度算法,其中包括基于时隙和门控制列表 (GCL) 的时间感知整形器 (TAS)。分配时隙、路径和 GCL 的网元配置非常繁琐,而且必须在新数据流到达或消失时以动态方式及时更新。IEEE 802.1Qcc 标准为按照软件定义网络(SDN)模式设计 TSN 控制平面以应对这些挑战提供了基础。然而,目前大多数 SDN/TSN 控制平面解决方案都是设计在专用服务器上运行的单片应用程序,在面对不断增加的服务请求时,无法提供升级所需的灵活性。本研究提出了基于 802.1Qcc 标准的 SDN/TSN 微服务控制平面 μTSN-CP。我们的架构充分利用了微服务的优势,使控制平面能够根据不同的工作负载动态地扩大或缩小。我们将控制平面分解为更小的、独立的微服务,从而增强了灵活性和弹性。μTSN-CP的性能是在实际环境中通过运行在不同计算平台上的TSN交换机和各种整数线性问题求解器进行评估的。
{"title":"A Microservices-Based Control Plane for Time-Sensitive Networking","authors":"A. Agustí-Torra, Marc Ferré-Mancebo, Gabriel David Orozco-Urrutia, David Rincón-Rivera, David Remondo","doi":"10.3390/fi16040120","DOIUrl":"https://doi.org/10.3390/fi16040120","url":null,"abstract":"Time-Sensitive Networking (TSN) aims to provide deterministic communications over Ethernet. The main characteristics of TSN are bounded latency and very high reliability, thus complying with the strict requirements of industrial communications or automotive applications, to name a couple of examples. In order to achieve this goal, TSN defines several scheduling algorithms, among them the Time-Aware Shaper (TAS), which is based on time slots and Gate Control Lists (GCLs). The configuration of network elements to allocate time slots, paths, and GCLs is laborious, and has to be updated promptly and in a dynamic way, as new data flows arrive or disappear. The IEEE 802.1Qcc standard provides the basis to design a TSN control plane to face these challenges, following the Software-Defined Networking (SDN) paradigm. However, most of the current SDN/TSN control plane solutions are monolithic applications designed to run on dedicated servers, and do not provide the required flexibility to escalate when facing increasing service requests. This work presents μTSN-CP, an SDN/TSN microservices-based control plane, based on the 802.1Qcc standard. Our architecture leverages the advantages of microservices, enabling the control plane to scale up or down in response to varying workloads dynamically. We achieve enhanced flexibility and resilience by breaking down the control plane into smaller, independent microservices. The performance of μTSN-CP is evaluated in a real environment with TSN switches, and various integer linear problem solvers, running over different computing platforms.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140773450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Secure Community Opportunity Network Based on Trust Model 基于信任模型的安全社区机会网络研究
IF 3.4 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.3390/fi16040121
Bing Su, Jiwu Liang
With the innovation of wireless communication technology and the surge of data in mobile networks, traditional routing strategies need to be improved. Given the shortcomings of existing opportunistic routing strategies in transmission performance and security, this paper proposes a community opportunistic routing decision-making method based on the trust model. This algorithm calculates the node’s trust value through the node’s historical forwarding behavior and then calculates the node’s trust value based on the trust model. Thresholds and trust attenuation divide dynamic security communities. For message forwarding, nodes in the security community are prioritized as next-hop relay nodes, thus ensuring that message delivery is always in a safe and reliable environment. On this basis, better relay nodes are further selected for message forwarding based on the node centrality, remaining cache space, and remaining energy, effectively improving the message forwarding efficiency. Through node trust value and community cooperation, safe and efficient data transmission is achieved, thereby improving the transmission performance and security of the network. Through comparison of simulation and opportunistic network routing algorithms, compared with traditional methods, this strategy has the highest transmission success rate of 81% with slightly increased routing overhead, and this algorithm has the lowest average transmission delay.
随着无线通信技术的革新和移动网络数据量的激增,传统的路由策略亟待改进。鉴于现有机会主义路由策略在传输性能和安全性方面的不足,本文提出了一种基于信任模型的社区机会主义路由决策方法。该算法通过节点的历史转发行为计算节点的信任值,然后根据信任模型计算节点的信任值。阈值和信任衰减划分动态安全社区。在信息转发方面,安全社区中的节点优先作为下一跳中继节点,从而确保信息传递始终处于安全可靠的环境中。在此基础上,根据节点中心性、剩余缓存空间和剩余能量,进一步选择更好的中继节点进行信息转发,有效提高信息转发效率。通过节点信任值和社区合作,实现安全高效的数据传输,从而提高网络的传输性能和安全性。通过仿真和机会主义网络路由算法的对比,与传统方法相比,该策略在路由开销略有增加的情况下,传输成功率最高,达到 81%,且该算法的平均传输延迟最低。
{"title":"Research on Secure Community Opportunity Network Based on Trust Model","authors":"Bing Su, Jiwu Liang","doi":"10.3390/fi16040121","DOIUrl":"https://doi.org/10.3390/fi16040121","url":null,"abstract":"With the innovation of wireless communication technology and the surge of data in mobile networks, traditional routing strategies need to be improved. Given the shortcomings of existing opportunistic routing strategies in transmission performance and security, this paper proposes a community opportunistic routing decision-making method based on the trust model. This algorithm calculates the node’s trust value through the node’s historical forwarding behavior and then calculates the node’s trust value based on the trust model. Thresholds and trust attenuation divide dynamic security communities. For message forwarding, nodes in the security community are prioritized as next-hop relay nodes, thus ensuring that message delivery is always in a safe and reliable environment. On this basis, better relay nodes are further selected for message forwarding based on the node centrality, remaining cache space, and remaining energy, effectively improving the message forwarding efficiency. Through node trust value and community cooperation, safe and efficient data transmission is achieved, thereby improving the transmission performance and security of the network. Through comparison of simulation and opportunistic network routing algorithms, compared with traditional methods, this strategy has the highest transmission success rate of 81% with slightly increased routing overhead, and this algorithm has the lowest average transmission delay.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140765439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Factors Affecting Trust and Acceptance for Blockchain Adoption in Digital Payment Systems: A Systematic Review 影响数字支付系统采用区块链的信任和接受度的因素:系统性综述
IF 3.4 Q1 Computer Science Pub Date : 2024-03-21 DOI: 10.3390/fi16030106
Tenzin Norbu, Joo Yeon Park, Kok Wai Wong, Hui Cui
Blockchain technology has become significant for financial sectors, especially digital payment systems, offering enhanced security, transparency, and efficiency. However, there is limited research on the factors influencing user trust in and acceptance of blockchain adoption in digital payment systems. This systematic review provides insight into the key factors impacting consumers’ perceptions and behaviours towards embracing blockchain technology. A total of 1859 studies were collected, with 48 meeting the criteria for comprehensive analysis. The results showed that security, privacy, transparency, and regulation are the most significant factors influencing trust for blockchain adoption. The most influential factors identified in the Unified Theory of Acceptance and Use of Technology (UTAUT) model include performance expectancy, effort expectancy, social influence, and facilitating conditions. Incorporating a trust and acceptance model could be a viable approach to tackling obstacles and ensuring the successful integration of blockchain technology into digital payment systems. Understanding these factors is crucial for creating a favourable atmosphere for adopting blockchain technology in digital payments. User-perspective research on blockchain adoption in digital payment systems is still insufficient, and this aspect still requires further investigation. Blockchain adoption in digital payment systems has not been sufficiently conducted from the user’s perspective, and there is a scope for it to be carried out. This review aims to shed light on the factors of trust in and acceptance of blockchain adoption in digital payment systems so that the full potential of blockchain technology can be realised. Understanding these factors and their intricate connections is imperative in fostering a conducive environment for the widespread acceptance of blockchain technology in digital payments.
区块链技术对金融行业,尤其是数字支付系统具有重要意义,可提供更高的安全性、透明度和效率。然而,关于影响用户对数字支付系统采用区块链的信任和接受程度的因素的研究却很有限。本系统综述深入探讨了影响消费者接受区块链技术的观念和行为的关键因素。共收集了 1859 项研究,其中 48 项符合综合分析标准。结果显示,安全、隐私、透明度和监管是影响区块链应用信任度的最重要因素。技术接受和使用统一理论(UTAUT)模型中确定的最具影响力的因素包括性能预期、努力预期、社会影响和便利条件。纳入信任和接受模型可能是解决障碍并确保区块链技术成功融入数字支付系统的可行方法。了解这些因素对于营造在数字支付中采用区块链技术的良好氛围至关重要。有关数字支付系统采用区块链的用户视角研究仍然不足,这方面仍需进一步调查。从用户角度研究数字支付系统中的区块链应用还不够充分,还有很大的研究空间。本综述旨在阐明数字支付系统中区块链应用的信任和接受因素,从而充分发挥区块链技术的潜力。了解这些因素及其错综复杂的联系,对于为数字支付广泛接受区块链技术营造有利环境至关重要。
{"title":"Factors Affecting Trust and Acceptance for Blockchain Adoption in Digital Payment Systems: A Systematic Review","authors":"Tenzin Norbu, Joo Yeon Park, Kok Wai Wong, Hui Cui","doi":"10.3390/fi16030106","DOIUrl":"https://doi.org/10.3390/fi16030106","url":null,"abstract":"Blockchain technology has become significant for financial sectors, especially digital payment systems, offering enhanced security, transparency, and efficiency. However, there is limited research on the factors influencing user trust in and acceptance of blockchain adoption in digital payment systems. This systematic review provides insight into the key factors impacting consumers’ perceptions and behaviours towards embracing blockchain technology. A total of 1859 studies were collected, with 48 meeting the criteria for comprehensive analysis. The results showed that security, privacy, transparency, and regulation are the most significant factors influencing trust for blockchain adoption. The most influential factors identified in the Unified Theory of Acceptance and Use of Technology (UTAUT) model include performance expectancy, effort expectancy, social influence, and facilitating conditions. Incorporating a trust and acceptance model could be a viable approach to tackling obstacles and ensuring the successful integration of blockchain technology into digital payment systems. Understanding these factors is crucial for creating a favourable atmosphere for adopting blockchain technology in digital payments. User-perspective research on blockchain adoption in digital payment systems is still insufficient, and this aspect still requires further investigation. Blockchain adoption in digital payment systems has not been sufficiently conducted from the user’s perspective, and there is a scope for it to be carried out. This review aims to shed light on the factors of trust in and acceptance of blockchain adoption in digital payment systems so that the full potential of blockchain technology can be realised. Understanding these factors and their intricate connections is imperative in fostering a conducive environment for the widespread acceptance of blockchain technology in digital payments.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140221721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV Control Method Combining Reptile Meta-Reinforcement Learning and Generative Adversarial Imitation Learning 结合爬行元强化学习和生成式对抗模仿学习的无人机控制方法
IF 3.4 Q1 Computer Science Pub Date : 2024-03-20 DOI: 10.3390/fi16030105
Shui Jiang, Yanning Ge, Xu Yang, Wencheng Yang, Hui Cui
Reinforcement learning (RL) is pivotal in empowering Unmanned Aerial Vehicles (UAVs) to navigate and make decisions efficiently and intelligently within complex and dynamic surroundings. Despite its significance, RL is hampered by inherent limitations such as low sample efficiency, restricted generalization capabilities, and a heavy reliance on the intricacies of reward function design. These challenges often render single-method RL approaches inadequate, particularly in the context of UAV operations where high costs and safety risks in real-world applications cannot be overlooked. To address these issues, this paper introduces a novel RL framework that synergistically integrates meta-learning and imitation learning. By leveraging the Reptile algorithm from meta-learning and Generative Adversarial Imitation Learning (GAIL), coupled with state normalization techniques for processing state data, this framework significantly enhances the model’s adaptability. It achieves this by identifying and leveraging commonalities across various tasks, allowing for swift adaptation to new challenges without the need for complex reward function designs. To ascertain the efficacy of this integrated approach, we conducted simulation experiments within both two-dimensional environments. The empirical results clearly indicate that our GAIL-enhanced Reptile method surpasses conventional single-method RL algorithms in terms of training efficiency. This evidence underscores the potential of combining meta-learning and imitation learning to surmount the traditional barriers faced by reinforcement learning in UAV trajectory planning and decision-making processes.
强化学习(RL)在帮助无人驾驶飞行器(UAV)在复杂多变的环境中高效、智能地导航和决策方面发挥着关键作用。尽管 RL 非常重要,但其固有的局限性却阻碍了 RL 的发展,例如样本效率低、泛化能力受限以及严重依赖复杂的奖励函数设计。这些挑战往往使单一方法的 RL 方法无法满足需要,尤其是在无人机操作中,现实应用中的高成本和安全风险不容忽视。为了解决这些问题,本文介绍了一种新颖的 RL 框架,该框架协同整合了元学习和模仿学习。通过利用元学习中的 Reptile 算法和生成式对抗模仿学习(GAIL),以及处理状态数据的状态归一化技术,该框架显著增强了模型的适应性。它通过识别和利用各种任务的共性来实现这一目标,从而无需复杂的奖励函数设计就能迅速适应新的挑战。为了确定这种集成方法的有效性,我们在两个二维环境中进行了模拟实验。实证结果清楚地表明,我们的 GAIL 增强 Reptile 方法在训练效率方面超过了传统的单一方法 RL 算法。这些证据凸显了元学习和模仿学习相结合的潜力,可以克服强化学习在无人机轨迹规划和决策过程中所面临的传统障碍。
{"title":"UAV Control Method Combining Reptile Meta-Reinforcement Learning and Generative Adversarial Imitation Learning","authors":"Shui Jiang, Yanning Ge, Xu Yang, Wencheng Yang, Hui Cui","doi":"10.3390/fi16030105","DOIUrl":"https://doi.org/10.3390/fi16030105","url":null,"abstract":"Reinforcement learning (RL) is pivotal in empowering Unmanned Aerial Vehicles (UAVs) to navigate and make decisions efficiently and intelligently within complex and dynamic surroundings. Despite its significance, RL is hampered by inherent limitations such as low sample efficiency, restricted generalization capabilities, and a heavy reliance on the intricacies of reward function design. These challenges often render single-method RL approaches inadequate, particularly in the context of UAV operations where high costs and safety risks in real-world applications cannot be overlooked. To address these issues, this paper introduces a novel RL framework that synergistically integrates meta-learning and imitation learning. By leveraging the Reptile algorithm from meta-learning and Generative Adversarial Imitation Learning (GAIL), coupled with state normalization techniques for processing state data, this framework significantly enhances the model’s adaptability. It achieves this by identifying and leveraging commonalities across various tasks, allowing for swift adaptation to new challenges without the need for complex reward function designs. To ascertain the efficacy of this integrated approach, we conducted simulation experiments within both two-dimensional environments. The empirical results clearly indicate that our GAIL-enhanced Reptile method surpasses conventional single-method RL algorithms in terms of training efficiency. This evidence underscores the potential of combining meta-learning and imitation learning to surmount the traditional barriers faced by reinforcement learning in UAV trajectory planning and decision-making processes.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140227386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Computer Vision to Collect Information on Cycling and Hiking Trails Users 利用计算机视觉收集自行车道和远足径使用者的信息
IF 3.4 Q1 Computer Science Pub Date : 2024-03-20 DOI: 10.3390/fi16030104
Joaquim Miguel, Pedro Mendonça, Agnelo Quelhas, J. M. L. P. Caldeira, Vasco N. G. J. Soares
Hiking and cycling have become popular activities for promoting well-being and physical activity. Portugal has been investing in hiking and cycling trail infrastructures to boost sustainable tourism. However, the lack of reliable data on the use of these trails means that the times of greatest affluence or the type of user who makes the most use of them are not recorded. These data are of the utmost importance to the managing bodies, with which they can adjust their actions to improve the management, maintenance, promotion, and use of the infrastructures for which they are responsible. The aim of this work is to present a review study on projects, techniques, and methods that can be used to identify and count the different types of users on these trails. The most promising computer vision techniques are identified and described: YOLOv3-Tiny, MobileNet-SSD V2, and FasterRCNN with ResNet-50. Their performance is evaluated and compared. The results observed can be very useful for proposing future prototypes. The challenges, future directions, and research opportunities are also discussed.
徒步旅行和骑自行车已成为促进健康和体育锻炼的热门活动。葡萄牙一直在投资建设徒步旅行和自行车道基础设施,以促进可持续旅游业的发展。然而,由于缺乏关于这些路径使用情况的可靠数据,因此无法记录最富裕的时期或最常使用这些路径的用户类型。这些数据对管理机构至关重要,它们可以据此调整行动,改善其负责的基础设施的管理、维护、推广和使用。这项工作的目的是对可用于识别和统计这些路径上不同类型用户的项目、技术和方法进行回顾性研究。我们确定并介绍了最有前途的计算机视觉技术:YOLOv3-Tiny、MobileNet-SSD V2 和带有 ResNet-50 的 FasterRCNN。对它们的性能进行了评估和比较。观察到的结果对提出未来的原型非常有用。此外,还讨论了挑战、未来方向和研究机会。
{"title":"Using Computer Vision to Collect Information on Cycling and Hiking Trails Users","authors":"Joaquim Miguel, Pedro Mendonça, Agnelo Quelhas, J. M. L. P. Caldeira, Vasco N. G. J. Soares","doi":"10.3390/fi16030104","DOIUrl":"https://doi.org/10.3390/fi16030104","url":null,"abstract":"Hiking and cycling have become popular activities for promoting well-being and physical activity. Portugal has been investing in hiking and cycling trail infrastructures to boost sustainable tourism. However, the lack of reliable data on the use of these trails means that the times of greatest affluence or the type of user who makes the most use of them are not recorded. These data are of the utmost importance to the managing bodies, with which they can adjust their actions to improve the management, maintenance, promotion, and use of the infrastructures for which they are responsible. The aim of this work is to present a review study on projects, techniques, and methods that can be used to identify and count the different types of users on these trails. The most promising computer vision techniques are identified and described: YOLOv3-Tiny, MobileNet-SSD V2, and FasterRCNN with ResNet-50. Their performance is evaluated and compared. The results observed can be very useful for proposing future prototypes. The challenges, future directions, and research opportunities are also discussed.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140227148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Resource Orchestration for 5G Edge Infrastructures 面向 5G 边缘基础设施的智能资源协调
IF 3.4 Q1 Computer Science Pub Date : 2024-03-19 DOI: 10.3390/fi16030103
R. Moreno-Vozmediano, R. Montero, E. Huedo, I. Llorente
The adoption of edge infrastructure in 5G environments stands out as a transformative technology aimed at meeting the increasing demands of latency-sensitive and data-intensive applications. This research paper presents a comprehensive study on the intelligent orchestration of 5G edge computing infrastructures. The proposed Smart 5G Edge-Cloud Management Architecture, built upon an OpenNebula foundation, incorporates a ONEedge5G experimental component, which offers intelligent workload forecasting and infrastructure orchestration and automation capabilities, for optimal allocation of virtual resources across diverse edge locations. The research evaluated different forecasting models, based both on traditional statistical techniques and machine learning techniques, comparing their accuracy in CPU usage prediction for a dataset of virtual machines (VMs). Additionally, an integer linear programming formulation was proposed to solve the optimization problem of mapping VMs to physical servers in distributed edge infrastructure. Different optimization criteria such as minimizing server usage, load balancing, and reducing latency violations were considered, along with mapping constraints. Comprehensive tests and experiments were conducted to evaluate the efficacy of the proposed architecture.
在 5G 环境中采用边缘基础设施是一项变革性技术,旨在满足延迟敏感和数据密集型应用日益增长的需求。本研究论文对 5G 边缘计算基础设施的智能协调进行了全面研究。所提出的智能 5G 边缘-云管理架构建立在 OpenNebula 基础之上,包含 ONEedge5G 实验组件,可提供智能工作负载预测、基础设施协调和自动化功能,从而在不同的边缘位置优化虚拟资源分配。研究评估了基于传统统计技术和机器学习技术的不同预测模型,比较了它们对虚拟机(VM)数据集的 CPU 使用量预测的准确性。此外,还提出了一种整数线性编程公式,用于解决将虚拟机映射到分布式边缘基础设施中的物理服务器的优化问题。在考虑映射约束的同时,还考虑了不同的优化标准,如最小化服务器使用、负载平衡和减少延迟违规。为评估所提架构的功效,还进行了全面的测试和实验。
{"title":"Intelligent Resource Orchestration for 5G Edge Infrastructures","authors":"R. Moreno-Vozmediano, R. Montero, E. Huedo, I. Llorente","doi":"10.3390/fi16030103","DOIUrl":"https://doi.org/10.3390/fi16030103","url":null,"abstract":"The adoption of edge infrastructure in 5G environments stands out as a transformative technology aimed at meeting the increasing demands of latency-sensitive and data-intensive applications. This research paper presents a comprehensive study on the intelligent orchestration of 5G edge computing infrastructures. The proposed Smart 5G Edge-Cloud Management Architecture, built upon an OpenNebula foundation, incorporates a ONEedge5G experimental component, which offers intelligent workload forecasting and infrastructure orchestration and automation capabilities, for optimal allocation of virtual resources across diverse edge locations. The research evaluated different forecasting models, based both on traditional statistical techniques and machine learning techniques, comparing their accuracy in CPU usage prediction for a dataset of virtual machines (VMs). Additionally, an integer linear programming formulation was proposed to solve the optimization problem of mapping VMs to physical servers in distributed edge infrastructure. Different optimization criteria such as minimizing server usage, load balancing, and reducing latency violations were considered, along with mapping constraints. Comprehensive tests and experiments were conducted to evaluate the efficacy of the proposed architecture.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140229317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UP-SDCG: A Method of Sensitive Data Classification for Collaborative Edge Computing in Financial Cloud Environment UP-SDCG:一种用于金融云环境中协作边缘计算的敏感数据分类方法
IF 3.4 Q1 Computer Science Pub Date : 2024-03-18 DOI: 10.3390/fi16030102
Lijun Zu, Wenyu Qi, Hongyi Li, Xiaohua Men, Zhihui Lu, Jiawei Ye, Liang Zhang
The digital transformation of banks has led to a paradigm shift, promoting the open sharing of data and services with third-party providers through APIs, SDKs, and other technological means. While data sharing brings personalized, convenient, and enriched services to users, it also introduces security risks, including sensitive data leakage and misuse, highlighting the importance of data classification and grading as the foundational pillar of security. This paper presents a cloud-edge collaborative banking data open application scenario, focusing on the critical need for an accurate and automated sensitive data classification and categorization method. The regulatory outpost module addresses this requirement, aiming to enhance the precision and efficiency of data classification. Firstly, regulatory policies impose strict requirements concerning data protection. Secondly, the sheer volume of business and the complexity of the work situation make it impractical to rely on manual experts, as they incur high labor costs and are unable to guarantee significant accuracy. Therefore, we propose a scheme UP-SDCG for automatically classifying and grading financially sensitive structured data. We developed a financial data hierarchical classification library. Additionally, we employed library augmentation technology and implemented a synonym discrimination model. We conducted an experimental analysis using simulation datasets, where UP-SDCG achieved precision surpassing 95%, outperforming the other three comparison models. Moreover, we performed real-world testing in financial institutions, achieving good detection results in customer data, supervision, and additional in personally sensitive information, aligning with application goals. Our ongoing work will extend the model’s capabilities to encompass unstructured data classification and grading, broadening the scope of application.
银行的数字化转型带来了模式的转变,通过 API、SDK 和其他技术手段促进了与第三方提供商的数据和服务开放共享。数据共享在为用户带来个性化、便捷化和丰富化服务的同时,也带来了敏感数据泄露和滥用等安全风险,凸显了数据分类和分级作为安全基础支柱的重要性。本文介绍了一个云端协作银行数据开放应用场景,重点阐述了对精确、自动化的敏感数据分类和分级方法的迫切需求。监管前哨模块针对这一需求,旨在提高数据分类的精确度和效率。首先,监管政策对数据保护提出了严格要求。其次,由于业务量大,工作情况复杂,依靠人工专家并不现实,因为人工成本高昂,而且无法保证显著的准确性。因此,我们提出了一种 UP-SDCG 方案,用于自动对金融敏感的结构化数据进行分类和分级。我们开发了一个金融数据分层分类库。此外,我们还采用了库增强技术,并实现了同义词辨别模型。我们使用模拟数据集进行了实验分析,UP-SDCG 的精确度超过了 95%,优于其他三种比较模型。此外,我们还在金融机构中进行了实际测试,在客户数据、监管和额外的个人敏感信息方面取得了良好的检测结果,符合应用目标。我们正在进行的工作将扩展该模型的功能,使其包括非结构化数据分类和分级,从而扩大应用范围。
{"title":"UP-SDCG: A Method of Sensitive Data Classification for Collaborative Edge Computing in Financial Cloud Environment","authors":"Lijun Zu, Wenyu Qi, Hongyi Li, Xiaohua Men, Zhihui Lu, Jiawei Ye, Liang Zhang","doi":"10.3390/fi16030102","DOIUrl":"https://doi.org/10.3390/fi16030102","url":null,"abstract":"The digital transformation of banks has led to a paradigm shift, promoting the open sharing of data and services with third-party providers through APIs, SDKs, and other technological means. While data sharing brings personalized, convenient, and enriched services to users, it also introduces security risks, including sensitive data leakage and misuse, highlighting the importance of data classification and grading as the foundational pillar of security. This paper presents a cloud-edge collaborative banking data open application scenario, focusing on the critical need for an accurate and automated sensitive data classification and categorization method. The regulatory outpost module addresses this requirement, aiming to enhance the precision and efficiency of data classification. Firstly, regulatory policies impose strict requirements concerning data protection. Secondly, the sheer volume of business and the complexity of the work situation make it impractical to rely on manual experts, as they incur high labor costs and are unable to guarantee significant accuracy. Therefore, we propose a scheme UP-SDCG for automatically classifying and grading financially sensitive structured data. We developed a financial data hierarchical classification library. Additionally, we employed library augmentation technology and implemented a synonym discrimination model. We conducted an experimental analysis using simulation datasets, where UP-SDCG achieved precision surpassing 95%, outperforming the other three comparison models. Moreover, we performed real-world testing in financial institutions, achieving good detection results in customer data, supervision, and additional in personally sensitive information, aligning with application goals. Our ongoing work will extend the model’s capabilities to encompass unstructured data classification and grading, broadening the scope of application.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140232602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge and Fog Computing for the Internet of Things 面向物联网的边缘和雾计算
IF 3.4 Q1 Computer Science Pub Date : 2024-03-16 DOI: 10.3390/fi16030101
A. Pozzebon
Over the last years few years, the number of interconnected devices within the context of Internet of Things (IoT) has rapidly grown; some statistics state that the total number of IoT-connected devices in 2023 has reached the groundbreaking number of 17 billion [...]
在过去几年中,物联网(IoT)范围内的互联设备数量迅速增长;有统计称,2023 年物联网互联设备的总数将达到 170 亿台这一突破性数字 [...] 。
{"title":"Edge and Fog Computing for the Internet of Things","authors":"A. Pozzebon","doi":"10.3390/fi16030101","DOIUrl":"https://doi.org/10.3390/fi16030101","url":null,"abstract":"Over the last years few years, the number of interconnected devices within the context of Internet of Things (IoT) has rapidly grown; some statistics state that the total number of IoT-connected devices in 2023 has reached the groundbreaking number of 17 billion [...]","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140236263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application Scenarios of Digital Twins for Smart Crop Farming through Cloud–Fog–Edge Infrastructure 通过云-雾-边基础设施实现智能作物耕作的数字孪生应用场景
IF 3.4 Q1 Computer Science Pub Date : 2024-03-16 DOI: 10.3390/fi16030100
Y. Kalyani, Liam Vorster, Rebecca Whetton, Rem Collier
In the last decade, digital twin (DT) technology has received considerable attention across various domains, such as manufacturing, smart healthcare, and smart cities. The digital twin represents a digital representation of a physical entity, object, system, or process. Although it is relatively new in the agricultural domain, it has gained increasing attention recently. Recent reviews of DTs show that this technology has the potential to revolutionise agriculture management and activities. It can also provide numerous benefits to all agricultural stakeholders, including farmers, agronomists, researchers, and others, in terms of making decisions on various agricultural processes. In smart crop farming, DTs help simulate various farming tasks like irrigation, fertilisation, nutrient management, and pest control, as well as access real-time data and guide farmers through ‘what-if’ scenarios. By utilising the latest technologies, such as cloud–fog–edge computing, multi-agent systems, and the semantic web, farmers can access real-time data and analytics. This enables them to make accurate decisions about optimising their processes and improving efficiency. This paper presents a proposed architectural framework for DTs, exploring various potential application scenarios that integrate this architecture. It also analyses the benefits and challenges of implementing this technology in agricultural environments. Additionally, we investigate how cloud–fog–edge computing contributes to developing decentralised, real-time systems essential for effective management and monitoring in agriculture.
近十年来,数字孪生(DT)技术在制造业、智能医疗和智慧城市等各个领域都受到了广泛关注。数字孪生代表了物理实体、物体、系统或流程的数字化呈现。虽然它在农业领域相对较新,但近来已获得越来越多的关注。最近对数字孪生的研究表明,这项技术具有彻底改变农业管理和活动的潜力。它还能为所有农业利益相关者(包括农民、农学家、研究人员和其他人)在各种农业流程决策方面带来诸多好处。在智能作物耕作方面,DTs 可帮助模拟灌溉、施肥、养分管理和病虫害防治等各种耕作任务,还能获取实时数据并指导农民完成 "假设 "场景。通过利用云雾边缘计算、多代理系统和语义网等最新技术,农民可以访问实时数据和分析。这使他们能够就优化流程和提高效率做出准确决策。本文介绍了一个拟议的 DT 架构框架,探讨了整合该架构的各种潜在应用场景。本文还分析了在农业环境中实施这项技术的优势和挑战。此外,我们还研究了云雾边缘计算如何有助于开发对农业有效管理和监控至关重要的分散式实时系统。
{"title":"Application Scenarios of Digital Twins for Smart Crop Farming through Cloud–Fog–Edge Infrastructure","authors":"Y. Kalyani, Liam Vorster, Rebecca Whetton, Rem Collier","doi":"10.3390/fi16030100","DOIUrl":"https://doi.org/10.3390/fi16030100","url":null,"abstract":"In the last decade, digital twin (DT) technology has received considerable attention across various domains, such as manufacturing, smart healthcare, and smart cities. The digital twin represents a digital representation of a physical entity, object, system, or process. Although it is relatively new in the agricultural domain, it has gained increasing attention recently. Recent reviews of DTs show that this technology has the potential to revolutionise agriculture management and activities. It can also provide numerous benefits to all agricultural stakeholders, including farmers, agronomists, researchers, and others, in terms of making decisions on various agricultural processes. In smart crop farming, DTs help simulate various farming tasks like irrigation, fertilisation, nutrient management, and pest control, as well as access real-time data and guide farmers through ‘what-if’ scenarios. By utilising the latest technologies, such as cloud–fog–edge computing, multi-agent systems, and the semantic web, farmers can access real-time data and analytics. This enables them to make accurate decisions about optimising their processes and improving efficiency. This paper presents a proposed architectural framework for DTs, exploring various potential application scenarios that integrate this architecture. It also analyses the benefits and challenges of implementing this technology in agricultural environments. Additionally, we investigate how cloud–fog–edge computing contributes to developing decentralised, real-time systems essential for effective management and monitoring in agriculture.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140236724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient and Secure Distributed Data Storage and Retrieval Using Interplanetary File System and Blockchain 利用星际文件系统和区块链实现高效安全的分布式数据存储和检索
IF 3.4 Q1 Computer Science Pub Date : 2024-03-15 DOI: 10.3390/fi16030098
Muhammad Bin Saif, Sara Migliorini, Fausto Spoto
Blockchain technology has been successfully applied in recent years to promote the immutability, traceability, and authenticity of previously collected and stored data. However, the amount of data stored in the blockchain is usually limited for economic and technological issues. Namely, the blockchain usually stores only a fingerprint of data, such as the hash of data, while full, raw information is stored off-chain. This is generally enough to guarantee immutability and traceability, but misses to support another important property, that is, data availability. This is particularly true when a traditional, centralized database is chosen for off-chain storage. For this reason, many proposals try to properly combine blockchain with decentralized IPFS storage. However, the storage of data on IPFS could pose some privacy problems. This paper proposes a solution that properly combines blockchain, IPFS, and encryption techniques to guarantee immutability, traceability, availability, and data privacy.
近年来,区块链技术已成功应用于促进先前收集和存储的数据的不可篡改性、可追溯性和真实性。然而,由于经济和技术问题,区块链存储的数据量通常有限。也就是说,区块链通常只存储数据的指纹,如数据的哈希值,而完整的原始信息则存储在链外。这通常足以保证不变性和可追溯性,但却无法支持另一个重要特性,即数据可用性。当选择传统的集中式数据库作为链外存储时,情况尤其如此。因此,许多建议都试图将区块链与去中心化的 IPFS 存储适当地结合起来。然而,在 IPFS 上存储数据可能会带来一些隐私问题。本文提出了一种将区块链、IPFS 和加密技术适当结合的解决方案,以保证不变性、可追溯性、可用性和数据隐私。
{"title":"Efficient and Secure Distributed Data Storage and Retrieval Using Interplanetary File System and Blockchain","authors":"Muhammad Bin Saif, Sara Migliorini, Fausto Spoto","doi":"10.3390/fi16030098","DOIUrl":"https://doi.org/10.3390/fi16030098","url":null,"abstract":"Blockchain technology has been successfully applied in recent years to promote the immutability, traceability, and authenticity of previously collected and stored data. However, the amount of data stored in the blockchain is usually limited for economic and technological issues. Namely, the blockchain usually stores only a fingerprint of data, such as the hash of data, while full, raw information is stored off-chain. This is generally enough to guarantee immutability and traceability, but misses to support another important property, that is, data availability. This is particularly true when a traditional, centralized database is chosen for off-chain storage. For this reason, many proposals try to properly combine blockchain with decentralized IPFS storage. However, the storage of data on IPFS could pose some privacy problems. This paper proposes a solution that properly combines blockchain, IPFS, and encryption techniques to guarantee immutability, traceability, availability, and data privacy.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140241647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Future Internet
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1