首页 > 最新文献

Journal of Computer Networks and Communications最新文献

英文 中文
A Systematic Review of Blockchain Technology Assisted with Artificial Intelligence Technology for Networks and Communication Systems 人工智能技术辅助区块链技术在网络和通信系统中的应用系统综述
IF 2 Q1 Computer Science Pub Date : 2024-02-09 DOI: 10.1155/2024/9979371
Kamal Kumar, Vinod Kumar, Seema, M. Sharma, Akber Ali Khan, M. J. Idrisi
Blockchain is a very secure, authentic, and distributed technology and is very prominent in areas such as edge computation, cloud computation, and Internet-of-things. Artificial intelligence assists in the completion of activities efficiently and effectively by providing intelligence, analytics, and predicting capabilities. There is an obvious convergence between the two technologies. Artificial intelligence systems can utilize blockchain to establish trust in communication channels, ensuring that messages are securely transmitted and received without the need for a centralized intermediary. By leveraging blockchain, artificial intelligence systems can maintain an immutable record of communications, ensuring transparency and preventing unauthorized modifications. The integration of blockchain and artificial intelligence technologies can enhance the security, transparency, and privacy of communication systems. By leveraging blockchain’s decentralized nature and artificial intelligence’s analytical capabilities, secure and trustworthy communication channels can be established, benefiting various domains such as finance, healthcare, and supply chain. Overall, the integration of blockchain and artificial intelligence has the potential to offer several benefits, and as these technologies continue to evolve, new and innovative applications will continue to emerge.
区块链是一种非常安全、真实和分布式的技术,在边缘计算、云计算和物联网等领域非常突出。人工智能通过提供智能、分析和预测能力,协助高效完成各项活动。这两种技术之间存在明显的融合。人工智能系统可以利用区块链建立通信渠道的信任,确保信息安全收发,而无需中央中介。通过利用区块链,人工智能系统可以维护不可更改的通信记录,确保透明度并防止未经授权的修改。区块链与人工智能技术的融合可以增强通信系统的安全性、透明度和隐私性。利用区块链的去中心化特性和人工智能的分析能力,可以建立安全可信的通信渠道,使金融、医疗保健和供应链等各个领域受益。总之,区块链与人工智能的融合有可能带来多种益处,随着这些技术的不断发展,新的创新应用也将不断涌现。
{"title":"A Systematic Review of Blockchain Technology Assisted with Artificial Intelligence Technology for Networks and Communication Systems","authors":"Kamal Kumar, Vinod Kumar, Seema, M. Sharma, Akber Ali Khan, M. J. Idrisi","doi":"10.1155/2024/9979371","DOIUrl":"https://doi.org/10.1155/2024/9979371","url":null,"abstract":"Blockchain is a very secure, authentic, and distributed technology and is very prominent in areas such as edge computation, cloud computation, and Internet-of-things. Artificial intelligence assists in the completion of activities efficiently and effectively by providing intelligence, analytics, and predicting capabilities. There is an obvious convergence between the two technologies. Artificial intelligence systems can utilize blockchain to establish trust in communication channels, ensuring that messages are securely transmitted and received without the need for a centralized intermediary. By leveraging blockchain, artificial intelligence systems can maintain an immutable record of communications, ensuring transparency and preventing unauthorized modifications. The integration of blockchain and artificial intelligence technologies can enhance the security, transparency, and privacy of communication systems. By leveraging blockchain’s decentralized nature and artificial intelligence’s analytical capabilities, secure and trustworthy communication channels can be established, benefiting various domains such as finance, healthcare, and supply chain. Overall, the integration of blockchain and artificial intelligence has the potential to offer several benefits, and as these technologies continue to evolve, new and innovative applications will continue to emerge.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139788653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Review of Blockchain Technology Assisted with Artificial Intelligence Technology for Networks and Communication Systems 人工智能技术辅助区块链技术在网络和通信系统中的应用系统综述
IF 2 Q1 Computer Science Pub Date : 2024-02-09 DOI: 10.1155/2024/9979371
Kamal Kumar, Vinod Kumar, Seema, M. Sharma, Akber Ali Khan, M. J. Idrisi
Blockchain is a very secure, authentic, and distributed technology and is very prominent in areas such as edge computation, cloud computation, and Internet-of-things. Artificial intelligence assists in the completion of activities efficiently and effectively by providing intelligence, analytics, and predicting capabilities. There is an obvious convergence between the two technologies. Artificial intelligence systems can utilize blockchain to establish trust in communication channels, ensuring that messages are securely transmitted and received without the need for a centralized intermediary. By leveraging blockchain, artificial intelligence systems can maintain an immutable record of communications, ensuring transparency and preventing unauthorized modifications. The integration of blockchain and artificial intelligence technologies can enhance the security, transparency, and privacy of communication systems. By leveraging blockchain’s decentralized nature and artificial intelligence’s analytical capabilities, secure and trustworthy communication channels can be established, benefiting various domains such as finance, healthcare, and supply chain. Overall, the integration of blockchain and artificial intelligence has the potential to offer several benefits, and as these technologies continue to evolve, new and innovative applications will continue to emerge.
区块链是一种非常安全、真实和分布式的技术,在边缘计算、云计算和物联网等领域非常突出。人工智能通过提供智能、分析和预测能力,协助高效完成各项活动。这两种技术之间存在明显的融合。人工智能系统可以利用区块链建立通信渠道的信任,确保信息安全收发,而无需中央中介。通过利用区块链,人工智能系统可以维护不可更改的通信记录,确保透明度并防止未经授权的修改。区块链与人工智能技术的融合可以增强通信系统的安全性、透明度和隐私性。利用区块链的去中心化特性和人工智能的分析能力,可以建立安全可信的通信渠道,使金融、医疗保健和供应链等各个领域受益。总之,区块链与人工智能的融合有可能带来多种益处,随着这些技术的不断发展,新的创新应用也将不断涌现。
{"title":"A Systematic Review of Blockchain Technology Assisted with Artificial Intelligence Technology for Networks and Communication Systems","authors":"Kamal Kumar, Vinod Kumar, Seema, M. Sharma, Akber Ali Khan, M. J. Idrisi","doi":"10.1155/2024/9979371","DOIUrl":"https://doi.org/10.1155/2024/9979371","url":null,"abstract":"Blockchain is a very secure, authentic, and distributed technology and is very prominent in areas such as edge computation, cloud computation, and Internet-of-things. Artificial intelligence assists in the completion of activities efficiently and effectively by providing intelligence, analytics, and predicting capabilities. There is an obvious convergence between the two technologies. Artificial intelligence systems can utilize blockchain to establish trust in communication channels, ensuring that messages are securely transmitted and received without the need for a centralized intermediary. By leveraging blockchain, artificial intelligence systems can maintain an immutable record of communications, ensuring transparency and preventing unauthorized modifications. The integration of blockchain and artificial intelligence technologies can enhance the security, transparency, and privacy of communication systems. By leveraging blockchain’s decentralized nature and artificial intelligence’s analytical capabilities, secure and trustworthy communication channels can be established, benefiting various domains such as finance, healthcare, and supply chain. Overall, the integration of blockchain and artificial intelligence has the potential to offer several benefits, and as these technologies continue to evolve, new and innovative applications will continue to emerge.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139848400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of an AI-Enabled Q-Agent for Making Data Offloading Decisions in a Multi-RAT Wireless Network 开发人工智能 Q 代理,用于在多 RAT 无线网络中做出数据卸载决策
IF 2 Q1 Computer Science Pub Date : 2024-01-24 DOI: 10.1155/2024/9571987
Murk Marvi, Adnan Aijaz, Anam Qureshi, Muhammad Khurram
Data offloading is considered as a potential candidate for alleviating congestion on wireless networks and for improving user experience. However, due to the stochastic nature of the wireless networks, it is important to take optimal actions under different conditions such that the user experience is enhanced and congestion on heavy-loaded radio access technologies (RATs) is reduced by offloading data through lower loaded RATs. Since artificial intelligence (AI)-based techniques can learn optimal actions and adapt to different conditions, in this work, we develop an AI-enabled Q-agent for making data offloading decisions in a multi-RAT wireless network. We employ a model-free Q-learning algorithm for training of the Q-agent. We use stochastic geometry as a tool for estimating the average data rate offered by the network in a given region by considering the effect of interference. We use the Markov process for modeling users’ mobility, that is, estimating the probability that a user is currently located in a region given its previous location. The user equipment (UE) plays the role of a Q-agent responsible for taking sequence of actions such that the long-term discounted cost for using network service is minimized. Q-agent performance has been evaluated and compared with the existing data offloading policies. The results suggest that the existing policies offer the best performance under specific situations. However, the Q-agent has learned to take near-optimal actions under different conditions. Thus, the Q-agent offers performance which is close to the best under different conditions.
数据卸载被认为是缓解无线网络拥塞和改善用户体验的潜在方法。然而,由于无线网络具有随机性,因此必须在不同条件下采取最佳行动,以便通过较低负载的 RAT 卸载数据来提高用户体验并减少重负载无线接入技术(RAT)的拥塞。由于基于人工智能(AI)的技术可以学习最佳行动并适应不同条件,因此在这项工作中,我们开发了一个支持人工智能的 Q-agent,用于在多 RAT 无线网络中做出数据卸载决策。我们采用无模型 Q 学习算法来训练 Q 代理。我们使用随机几何作为工具,通过考虑干扰的影响来估算网络在给定区域内提供的平均数据传输速率。我们使用马尔可夫过程来模拟用户的移动性,即根据用户之前的位置来估算其当前位于某一区域的概率。用户设备(UE)扮演 Q 代理的角色,负责采取一系列行动,使使用网络服务的长期贴现成本最小化。对 Q 代理的性能进行了评估,并与现有的数据卸载策略进行了比较。结果表明,在特定情况下,现有策略能提供最佳性能。然而,Q 代理学会了在不同条件下采取接近最优的行动。因此,Q 代理在不同条件下都能提供接近最佳的性能。
{"title":"Development of an AI-Enabled Q-Agent for Making Data Offloading Decisions in a Multi-RAT Wireless Network","authors":"Murk Marvi, Adnan Aijaz, Anam Qureshi, Muhammad Khurram","doi":"10.1155/2024/9571987","DOIUrl":"https://doi.org/10.1155/2024/9571987","url":null,"abstract":"Data offloading is considered as a potential candidate for alleviating congestion on wireless networks and for improving user experience. However, due to the stochastic nature of the wireless networks, it is important to take optimal actions under different conditions such that the user experience is enhanced and congestion on heavy-loaded radio access technologies (RATs) is reduced by offloading data through lower loaded RATs. Since artificial intelligence (AI)-based techniques can learn optimal actions and adapt to different conditions, in this work, we develop an AI-enabled Q-agent for making data offloading decisions in a multi-RAT wireless network. We employ a model-free Q-learning algorithm for training of the Q-agent. We use stochastic geometry as a tool for estimating the average data rate offered by the network in a given region by considering the effect of interference. We use the Markov process for modeling users’ mobility, that is, estimating the probability that a user is currently located in a region given its previous location. The user equipment (UE) plays the role of a Q-agent responsible for taking sequence of actions such that the long-term discounted cost for using network service is minimized. Q-agent performance has been evaluated and compared with the existing data offloading policies. The results suggest that the existing policies offer the best performance under specific situations. However, the Q-agent has learned to take near-optimal actions under different conditions. Thus, the Q-agent offers performance which is close to the best under different conditions.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139599089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maximum Entropy Principle Based on Bank Customer Account Validation Using the Spark Method 基于最大熵原理的火花法银行客户账户验证
IF 2 Q1 Computer Science Pub Date : 2023-12-31 DOI: 10.1155/2023/8840168
Xiaorong Qiu, Ye Xu, Yingzhong Shi, S. K. Deepa, S. Balakumar
Bank customer validation is carried out with the aim of providing a series of services to users of a bank and financial institutions. It is necessary to perform various analytical methods for user’s accounts due to the high volume of banking data. This research works in the field of money laundering detection from real bank data. Banking data analysis is a complex process that involves information gathered from various sources, mainly in terms of personality, such as bills or bank account transactions which have qualitative characteristics such as the testimony of eyewitnesses. Operational or research activities can be greatly improved if supported by proprietary techniques and tools, due to the vast nature of this information. The application of data mining operations with the aim of discovering new knowledge of banking data with an intelligent approach is considered in this research. The approach of this research is to use the spiking neural network (SNN) with a group of sparks to detect money laundering, but due to the weakness in accurately identifying the characteristics of money laundering, the maximum entropy principle (MEP) method is also used. This approach will have a mapping from clustering and feature extraction to classification for accurate detection. Based on the analysis and simulation, it is observed that the proposed approach SNN-MFP has 87% accuracy and is 84.71% more functional than the classical method of using only the SNN. In this analysis, it is observed that in real banking data from Mellat Bank, Iran, in its third and fourth data, with a comprehensive analysis and reaching different outputs, there have been two money laundering cases.
银行客户验证的目的是为银行和金融机构的用户提供一系列服务。由于银行数据量大,有必要对用户账户进行各种分析方法。本研究致力于从真实银行数据中发现洗钱行为。银行数据分析是一个复杂的过程,涉及从各种来源收集的信息,主要是人格方面的信息,如票据或银行账户交易,这些信息具有定性特征,如目击者的证词。由于这些信息的庞大性,如果有专有技术和工具的支持,业务或研究活动可以得到极大的改善。本研究考虑了数据挖掘操作的应用,目的是以智能方法发现银行数据的新知识。本研究的方法是使用带有一组火花的尖峰神经网络(SNN)来检测洗钱活动,但由于在准确识别洗钱活动特征方面存在弱点,因此还使用了最大熵原理(MEP)方法。这种方法将有一个从聚类、特征提取到分类的映射,以实现准确检测。根据分析和模拟,可以观察到所提出的 SNN-MFP 方法的准确率为 87%,比只使用 SNN 的经典方法的功能高出 84.71%。在这次分析中,观察到伊朗 Mellat 银行的真实银行数据,在其第三和第四个数据中,经过综合分析并得出不同的输出结果,出现了两个洗钱案件。
{"title":"Maximum Entropy Principle Based on Bank Customer Account Validation Using the Spark Method","authors":"Xiaorong Qiu, Ye Xu, Yingzhong Shi, S. K. Deepa, S. Balakumar","doi":"10.1155/2023/8840168","DOIUrl":"https://doi.org/10.1155/2023/8840168","url":null,"abstract":"Bank customer validation is carried out with the aim of providing a series of services to users of a bank and financial institutions. It is necessary to perform various analytical methods for user’s accounts due to the high volume of banking data. This research works in the field of money laundering detection from real bank data. Banking data analysis is a complex process that involves information gathered from various sources, mainly in terms of personality, such as bills or bank account transactions which have qualitative characteristics such as the testimony of eyewitnesses. Operational or research activities can be greatly improved if supported by proprietary techniques and tools, due to the vast nature of this information. The application of data mining operations with the aim of discovering new knowledge of banking data with an intelligent approach is considered in this research. The approach of this research is to use the spiking neural network (SNN) with a group of sparks to detect money laundering, but due to the weakness in accurately identifying the characteristics of money laundering, the maximum entropy principle (MEP) method is also used. This approach will have a mapping from clustering and feature extraction to classification for accurate detection. Based on the analysis and simulation, it is observed that the proposed approach SNN-MFP has 87% accuracy and is 84.71% more functional than the classical method of using only the SNN. In this analysis, it is observed that in real banking data from Mellat Bank, Iran, in its third and fourth data, with a comprehensive analysis and reaching different outputs, there have been two money laundering cases.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2023-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139132505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Application-Level Associations Between IoT Devices Using a Modified Apriori Algorithm 使用改进的Apriori算法检测物联网设备之间的应用级关联
Q1 Computer Science Pub Date : 2023-10-17 DOI: 10.37256/cnc.1220233263
Juan Benedicto L. Aceron, Marc Elizette R. Teves, Wilson M. Tan
Internet of Things (IoT) for home systems enables new functionalities and results in significant conveniences. However, their reliance on a stable, continuous Internet connectivity reduces their overall reliability. Losing connectivity to the Internet, for many of these devices, translates to the cessation of even the most basic of functionalities (e.g., being able to turn on the light, even from within the house). A possible solution to this problem is to shift some functionalities done by cloud-based servers to the edge (e.g. the home router), but doing so conveniently would necessitate the ability to dynamically identify pairs of IoT devices (usually sensor-actuator pairs) that communicate (their associations), and the rewriting/rerouting of packets or messages between those devices. The first problem is also known as the association detection problem, and is where this paper makes a contribution. We describe a solution to the association detection problem using a modified Apriori algorithm and a method to create its input from network traffic, and then revise the solution to respond to fluctuating network conditions. The final design accurately discovers sensor-actuator pairs using a simple approach with low computational complexity, and with only the hardware addresses of monitored IoT devices as its starting knowledge.
家庭系统的物联网(IoT)实现了新功能,并带来了极大的便利。然而,它们对稳定、持续的互联网连接的依赖降低了它们的整体可靠性。对于许多这样的设备来说,失去互联网连接意味着连最基本的功能都无法使用(例如,即使在家里也不能开灯)。这个问题的一个可能的解决方案是将一些由基于云的服务器完成的功能转移到边缘(例如家庭路由器),但这样做很方便,需要能够动态识别通信的物联网设备对(通常是传感器-执行器对)(它们的关联),以及这些设备之间的数据包或消息的重写/重路由。第一个问题也被称为关联检测问题,这也是本文的贡献所在。我们描述了一种使用改进的Apriori算法和一种从网络流量中创建其输入的方法来解决关联检测问题,然后修改该解决方案以响应波动的网络条件。最终的设计使用一种计算复杂度低的简单方法准确地发现传感器-执行器对,并且仅将被监控的物联网设备的硬件地址作为其起始知识。
{"title":"Detecting Application-Level Associations Between IoT Devices Using a Modified Apriori Algorithm","authors":"Juan Benedicto L. Aceron, Marc Elizette R. Teves, Wilson M. Tan","doi":"10.37256/cnc.1220233263","DOIUrl":"https://doi.org/10.37256/cnc.1220233263","url":null,"abstract":"Internet of Things (IoT) for home systems enables new functionalities and results in significant conveniences. However, their reliance on a stable, continuous Internet connectivity reduces their overall reliability. Losing connectivity to the Internet, for many of these devices, translates to the cessation of even the most basic of functionalities (e.g., being able to turn on the light, even from within the house). A possible solution to this problem is to shift some functionalities done by cloud-based servers to the edge (e.g. the home router), but doing so conveniently would necessitate the ability to dynamically identify pairs of IoT devices (usually sensor-actuator pairs) that communicate (their associations), and the rewriting/rerouting of packets or messages between those devices. The first problem is also known as the association detection problem, and is where this paper makes a contribution. We describe a solution to the association detection problem using a modified Apriori algorithm and a method to create its input from network traffic, and then revise the solution to respond to fluctuating network conditions. The final design accurately discovers sensor-actuator pairs using a simple approach with low computational complexity, and with only the hardware addresses of monitored IoT devices as its starting knowledge.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135992826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optical Switching Data Center Networks: Understanding Techniques and Challenges 光交换数据中心网络:理解技术和挑战
Q1 Computer Science Pub Date : 2023-09-04 DOI: 10.37256/cnc.1220233159
Yisong Zhao, Xuwei Xue, Xiongfei Ren, Wenzhe Li, Yuanzhi Guo, Changsheng Yang, Daohang Dang, Shicheng Zhang, Bingli Guo, Shanguo Huang
Relying on the flexible-access interconnects to the scalable storage and compute resources, data centers deliver critical communications connectivity among numerous servers to support the housed applications and services. To provide the high-speeds and long-distance communications, the data centers have turned to fiber interconnections. With the stringently increased traffic volume, the data centers are then expected to further deploy the optical switches into the systems infrastructure to implement the full optical switching. This paper first summarizes the topologies and traffic characteristics in data centers and analyzes the reasons and importance of moving to optical switching. Recent techniques related to the optical switching, and main challenges limiting the practical deployments of optical switches in data centers are also summarized and reported.
数据中心依靠可伸缩存储和计算资源的灵活访问互连,在众多服务器之间提供关键的通信连接,以支持内部应用程序和服务。为了提供高速和远距离的通信,数据中心已经转向光纤互连。随着业务量的急剧增加,数据中心需要将光交换机进一步部署到系统基础设施中,以实现全光交换。本文首先总结了数据中心的拓扑结构和业务特点,分析了采用光交换的原因和重要性。本文还总结和报告了与光交换相关的最新技术,以及限制光交换在数据中心实际部署的主要挑战。
{"title":"Optical Switching Data Center Networks: Understanding Techniques and Challenges","authors":"Yisong Zhao, Xuwei Xue, Xiongfei Ren, Wenzhe Li, Yuanzhi Guo, Changsheng Yang, Daohang Dang, Shicheng Zhang, Bingli Guo, Shanguo Huang","doi":"10.37256/cnc.1220233159","DOIUrl":"https://doi.org/10.37256/cnc.1220233159","url":null,"abstract":"Relying on the flexible-access interconnects to the scalable storage and compute resources, data centers deliver critical communications connectivity among numerous servers to support the housed applications and services. To provide the high-speeds and long-distance communications, the data centers have turned to fiber interconnections. With the stringently increased traffic volume, the data centers are then expected to further deploy the optical switches into the systems infrastructure to implement the full optical switching. This paper first summarizes the topologies and traffic characteristics in data centers and analyzes the reasons and importance of moving to optical switching. Recent techniques related to the optical switching, and main challenges limiting the practical deployments of optical switches in data centers are also summarized and reported.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135402473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative Game-Based Resource Allocation Scheme for Heterogeneous Networks with eICIC Technology 基于协作博弈的eICIC异构网络资源分配方案
IF 2 Q1 Computer Science Pub Date : 2023-08-28 DOI: 10.1155/2023/5526441
Sungwook Kim
Heterogeneous network (HetNet) is considered to be the most promising approach for increasing communication capacity. However, HetNet control problems are difficult due to their intertier interference. Recently, the enhanced intercell interference coordination (eICIC) technology is introduced to offer several benefits, including a more equitable traffic load distribution across the macro and embedded small cells. In this paper, we design a new resource allocation scheme for the eICIC-based HetNet. Our proposed scheme is formulated as a joint cooperative game to handle conflicting requirements. By adopting the ideas of Kalai and Smorodinsky solution (KSS), multicriteria Kalai and Smorodinsky solution (MCKSS), and sequential Raiffa solution (SRS), we develop a hybrid control algorithm for an adaptive resource sharing between different base stations. To effectively adjust the eICIC fraction rates, the concepts of MCKSS and SRS are applied in an interactive manner. For mobile devices in the HetNet, the assigned resource is distributed by using the idea of KSS. The key insight of our algorithm is to translate the originally competitive problem into a hierarchical cooperative problem to reach a socially optimal outcome. The main novelty of our approach is its flexibility to reach a reciprocal consensus under dynamic HetNet environments. Exhaustive system simulations illustrate the performance gains along different dimensions, such as system throughput, device payoff, and fairness among devices. The superiority of our proposed scheme is fully demonstrated in comparison with three other existing eICIC control protocols.
异构网络(HetNet)被认为是提高通信容量最有前途的方法。然而,由于内部干扰的存在,使得网络控制问题变得十分困难。最近,增强型小区间干扰协调(eICIC)技术被引入,它提供了几个优点,包括在宏小区和嵌入式小小区之间更公平的流量负载分配。在本文中,我们设计了一种新的基于eicic的HetNet资源分配方案。我们提出的方案被制定为一个联合合作博弈来处理冲突的需求。采用Kalai和Smorodinsky解决方案(KSS)、多准则Kalai和Smorodinsky解决方案(MCKSS)和顺序Raiffa解决方案(SRS)的思想,开发了一种用于不同基站间自适应资源共享的混合控制算法。为了有效地调整eICIC分数率,以交互的方式应用MCKSS和SRS的概念。对于HetNet中的移动设备,分配的资源采用KSS的思想进行分配。该算法的核心思想是将原来的竞争问题转化为层次合作问题,以达到社会最优结果。该方法的主要新颖之处在于其在动态HetNet环境下达成互惠共识的灵活性。详尽的系统模拟说明了不同维度上的性能增益,例如系统吞吐量、设备收益和设备之间的公平性。通过与其他三种现有eICIC控制协议的比较,充分证明了该方案的优越性。
{"title":"Cooperative Game-Based Resource Allocation Scheme for Heterogeneous Networks with eICIC Technology","authors":"Sungwook Kim","doi":"10.1155/2023/5526441","DOIUrl":"https://doi.org/10.1155/2023/5526441","url":null,"abstract":"Heterogeneous network (HetNet) is considered to be the most promising approach for increasing communication capacity. However, HetNet control problems are difficult due to their intertier interference. Recently, the enhanced intercell interference coordination (eICIC) technology is introduced to offer several benefits, including a more equitable traffic load distribution across the macro and embedded small cells. In this paper, we design a new resource allocation scheme for the eICIC-based HetNet. Our proposed scheme is formulated as a joint cooperative game to handle conflicting requirements. By adopting the ideas of Kalai and Smorodinsky solution (KSS), multicriteria Kalai and Smorodinsky solution (MCKSS), and sequential Raiffa solution (SRS), we develop a hybrid control algorithm for an adaptive resource sharing between different base stations. To effectively adjust the eICIC fraction rates, the concepts of MCKSS and SRS are applied in an interactive manner. For mobile devices in the HetNet, the assigned resource is distributed by using the idea of KSS. The key insight of our algorithm is to translate the originally competitive problem into a hierarchical cooperative problem to reach a socially optimal outcome. The main novelty of our approach is its flexibility to reach a reciprocal consensus under dynamic HetNet environments. Exhaustive system simulations illustrate the performance gains along different dimensions, such as system throughput, device payoff, and fairness among devices. The superiority of our proposed scheme is fully demonstrated in comparison with three other existing eICIC control protocols.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41924262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized Identity With Applications to Security and Privacy for the Internet of Things 物联网安全与隐私的去中心化身份应用
IF 2 Q1 Computer Science Pub Date : 2023-08-28 DOI: 10.37256/cnc.1220233048
Chalima Dimitra Nassar Kyriakidou, Athanasia Maria Papathanasiou, G.C. Polyzos
Decentralized Identity (dID) has brought to the forefront the advantages and importance of total user control over identity. Previous solutions delegate identity management to the responsibility of third-party applications or services, which may raise multiple privacy and security concerns regarding users' personal data. In this paper, we highlight the significance of dID and in particular Self-Sovereign Identity (SSI) for a rapidly evolving ecosystem with a plethora of interconnected devices with different characteristics, such as the Internet of Things (IoT). Specifically, we analyze the benefits of incorporating SSI principles and technologies in IoT environments, while also discussing the challenges that may be introduced when combining the complexity of SSI concepts with the diverse and large-scale IoT environment. In addition, we present a thorough overview of existing systems that integrate SSI components into IoT environments, in order to address the challenges of authentication, authorization, and access control even for constrained IoT devices. Finally, we provide a comprehensive analysis regarding the contributions of Decentralized Identifiers and Verifiable Credentials, the two main pillars of SSI, for enhanced privacy and security for the Internet at large and for the IoT in particular.
去中心化身份(dID)将用户完全控制身份的优势和重要性带到了最前沿。以前的解决方案将身份管理委托给第三方应用程序或服务,这可能会引起有关用户个人数据的多重隐私和安全问题。在本文中,我们强调了dID,特别是自我主权身份(SSI)对于快速发展的生态系统的重要性,该生态系统具有大量具有不同特征的互联设备,例如物联网(IoT)。具体来说,我们分析了将SSI原理和技术纳入物联网环境的好处,同时也讨论了将SSI概念的复杂性与多样化和大规模物联网环境相结合时可能引入的挑战。此外,我们还全面概述了将SSI组件集成到物联网环境中的现有系统,以解决身份验证、授权和访问控制方面的挑战,即使对于受限的物联网设备也是如此。最后,我们对分散标识符和可验证凭据(SSI的两个主要支柱)的贡献进行了全面分析,以增强整个互联网(特别是物联网)的隐私和安全性。
{"title":"Decentralized Identity With Applications to Security and Privacy for the Internet of Things","authors":"Chalima Dimitra Nassar Kyriakidou, Athanasia Maria Papathanasiou, G.C. Polyzos","doi":"10.37256/cnc.1220233048","DOIUrl":"https://doi.org/10.37256/cnc.1220233048","url":null,"abstract":"Decentralized Identity (dID) has brought to the forefront the advantages and importance of total user control over identity. Previous solutions delegate identity management to the responsibility of third-party applications or services, which may raise multiple privacy and security concerns regarding users' personal data. In this paper, we highlight the significance of dID and in particular Self-Sovereign Identity (SSI) for a rapidly evolving ecosystem with a plethora of interconnected devices with different characteristics, such as the Internet of Things (IoT). Specifically, we analyze the benefits of incorporating SSI principles and technologies in IoT environments, while also discussing the challenges that may be introduced when combining the complexity of SSI concepts with the diverse and large-scale IoT environment. In addition, we present a thorough overview of existing systems that integrate SSI components into IoT environments, in order to address the challenges of authentication, authorization, and access control even for constrained IoT devices. Finally, we provide a comprehensive analysis regarding the contributions of Decentralized Identifiers and Verifiable Credentials, the two main pillars of SSI, for enhanced privacy and security for the Internet at large and for the IoT in particular.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76246938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Session Layer Selection in IoT Actuation 物联网驱动中的动态会话层选择
IF 2 Q1 Computer Science Pub Date : 2023-07-28 DOI: 10.37256/cnc.1220232874
Rolando Herrero
While most Internet of Things (IoT) solutions involve sensing, some of them also introduce actuation mechanisms. Specifically, devices interact with assets in the environment and transmit sensor readouts to applications that perform analytics. These applications typically reside on the network core and, in turn, process the readouts that trigger the transmission of actuation commands to the device. One important issue in these schemes is the nature of the communication channels. Most devices are wireless and therefore they are affected by the effects of signal multipath fading that results in application loss. More importantly, these impairments may cause actuation commands to be lost or to be critically delayed. In this context, several standard mechanisms have been proposed for the transmission of traffic from the application to the devices. They fall under two main architectural categories: (1) Representational State Transfer (REST) and (2) Event Driven Architecture (EDA). In this paper, we analyze two protocols associated with each of these two architectures by comparing them in order to assess their efficiency in IoT actuation solutions. This analysis leads to the development of a mathematical model that enables the dynamic selection of the right technology based on network impairments.
虽然大多数物联网(IoT)解决方案涉及传感,但其中一些还引入了驱动机制。具体来说,设备与环境中的资产交互,并将传感器读数传输到执行分析的应用程序。这些应用程序通常驻留在网络核心上,并依次处理触发向设备传输驱动命令的读出。这些方案中的一个重要问题是通信通道的性质。大多数设备都是无线的,因此它们受到信号多径衰落的影响,从而导致应用程序丢失。更重要的是,这些损伤可能导致驱动命令丢失或严重延迟。在这种情况下,已经提出了几种标准机制,用于将流量从应用程序传输到设备。它们属于两个主要的体系结构类别:(1)具象状态传输(REST)和(2)事件驱动体系结构(EDA)。在本文中,我们分析了与这两种架构相关的两个协议,通过比较它们来评估它们在物联网驱动解决方案中的效率。这种分析导致了一个数学模型的发展,该模型能够根据网络缺陷动态选择正确的技术。
{"title":"Dynamic Session Layer Selection in IoT Actuation","authors":"Rolando Herrero","doi":"10.37256/cnc.1220232874","DOIUrl":"https://doi.org/10.37256/cnc.1220232874","url":null,"abstract":"While most Internet of Things (IoT) solutions involve sensing, some of them also introduce actuation mechanisms. Specifically, devices interact with assets in the environment and transmit sensor readouts to applications that perform analytics. These applications typically reside on the network core and, in turn, process the readouts that trigger the transmission of actuation commands to the device. One important issue in these schemes is the nature of the communication channels. Most devices are wireless and therefore they are affected by the effects of signal multipath fading that results in application loss. More importantly, these impairments may cause actuation commands to be lost or to be critically delayed. In this context, several standard mechanisms have been proposed for the transmission of traffic from the application to the devices. They fall under two main architectural categories: (1) Representational State Transfer (REST) and (2) Event Driven Architecture (EDA). In this paper, we analyze two protocols associated with each of these two architectures by comparing them in order to assess their efficiency in IoT actuation solutions. This analysis leads to the development of a mathematical model that enables the dynamic selection of the right technology based on network impairments.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2023-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78779145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review on Machine Learning for Intelligent Routing, Key Requirement and Challenges Towards 6G 面向6G智能路由的机器学习、关键需求和挑战综述
IF 2 Q1 Computer Science Pub Date : 2023-07-21 DOI: 10.37256/cnc.1220233039
Bidyarani Langpoklakpam, Lithungo K Murry
The constant desire for faster data rates, lower latency, improved reliability, global device integration, and pervasiveness are some of the factors driving the development of next-generation communication systems. Sixth-generation (6G) networks have received a lot of attention from the industry and academics as fifth-generation (5G) communications are being rolled out globally. With the proliferation of smart devices and the Internet of Things (IoT), 6G networks will require ultra-reliable and low-latency communication. Routing protocols have a significant role in improving the performance of a network. Traditional routing techniques will have difficulty coping with the highly complex and dynamic 6G environments. Recently, machine learning (ML), a key component of artificial intelligence, is emerging as the key to managing complex and dynamic networks efficiently. However, there are still several significant challenges that need to be addressed. In this paper, we provide an overview of current machine-learning techniques used in network routing. Lastly, we highlight open research problems that need to be addressed and prospects for future research.
对更快的数据速率、更低的延迟、更高的可靠性、全球设备集成和普遍性的持续需求是推动下一代通信系统发展的一些因素。随着第五代(5G)通信在全球范围内的推广,第六代(6G)网络受到了业界和学术界的广泛关注。随着智能设备和物联网(IoT)的普及,6G网络将需要超可靠和低延迟的通信。路由协议在提高网络性能方面起着重要的作用。传统的路由技术将难以应对高度复杂和动态的6G环境。最近,机器学习(ML)作为人工智能的一个关键组成部分,正在成为有效管理复杂和动态网络的关键。然而,仍有几个重大挑战需要解决。在本文中,我们概述了当前用于网络路由的机器学习技术。最后,我们强调了需要解决的开放性研究问题和未来研究的前景。
{"title":"Review on Machine Learning for Intelligent Routing, Key Requirement and Challenges Towards 6G","authors":"Bidyarani Langpoklakpam, Lithungo K Murry","doi":"10.37256/cnc.1220233039","DOIUrl":"https://doi.org/10.37256/cnc.1220233039","url":null,"abstract":"The constant desire for faster data rates, lower latency, improved reliability, global device integration, and pervasiveness are some of the factors driving the development of next-generation communication systems. Sixth-generation (6G) networks have received a lot of attention from the industry and academics as fifth-generation (5G) communications are being rolled out globally. With the proliferation of smart devices and the Internet of Things (IoT), 6G networks will require ultra-reliable and low-latency communication. Routing protocols have a significant role in improving the performance of a network. Traditional routing techniques will have difficulty coping with the highly complex and dynamic 6G environments. Recently, machine learning (ML), a key component of artificial intelligence, is emerging as the key to managing complex and dynamic networks efficiently. However, there are still several significant challenges that need to be addressed. In this paper, we provide an overview of current machine-learning techniques used in network routing. Lastly, we highlight open research problems that need to be addressed and prospects for future research.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2023-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90956550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computer Networks and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1