首页 > 最新文献

Journal of Network and Systems Management最新文献

英文 中文
Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture 安全、弹性的 6 G RAN 网络:零信任架构的分散式方法
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-13 DOI: 10.1007/s10922-024-09807-x

Abstract

The upcoming sixth generation (6 G) networks present significant security challenges due to the growing demand for virtualization, as indicated by their key performance indicators (KPIs). To ensure communication secrecy in such a distributed network, we propose an intelligent zero trust (ZT) framework that safeguards the radio access network (RAN) from potential threats. Our proposed ZT model is specifically designed to cater to the distributed nature of 6 G networks. It accommodates secrecy modules in various nodes, such as the base station, core network, and cloud, to monitor the network while performing hierarchical and distributed threat detection. This approach enables the distributed modules to work together to efficiently identify and respond to the suspected RAN threats. As a RAN security use case, we address the intrusion detection issues of the 6 G-enabled internet of drones. Our simulation results show the robustness of our ZT framework, which is based on distributed security modules, against potential attacks. The framework exhibits low detection time and low false positives, making it a reliable solution for securing 6 G networks. Furthermore, the ZT model enables the accommodation of secrecy modules in various nodes and provides the needed enhanced security measures in the network.

摘要 正如关键性能指标(KPI)所显示的那样,由于对虚拟化的需求日益增长,即将到来的第六代(6 G)网络面临着巨大的安全挑战。为了确保这种分布式网络的通信保密性,我们提出了一种智能零信任(ZT)框架,以保护无线接入网(RAN)免受潜在威胁。我们提出的零信任模型是专门针对 6 G 网络的分布式特性而设计的。它在基站、核心网络和云等不同节点中安装了保密模块,以监控网络,同时执行分层和分布式威胁检测。这种方法使分布式模块能够协同工作,有效地识别和应对可疑的 RAN 威胁。作为一个 RAN 安全用例,我们解决了支持 6 G 的无人机互联网的入侵检测问题。我们的仿真结果表明,我们基于分布式安全模块的 ZT 框架对潜在攻击具有鲁棒性。该框架检测时间短,误报率低,是保护 6 G 网络安全的可靠解决方案。此外,ZT 模型还能在不同节点中容纳保密模块,并在网络中提供所需的增强安全措施。
{"title":"Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture","authors":"","doi":"10.1007/s10922-024-09807-x","DOIUrl":"https://doi.org/10.1007/s10922-024-09807-x","url":null,"abstract":"<h3>Abstract</h3> <p>The upcoming sixth generation (6 G) networks present significant security challenges due to the growing demand for virtualization, as indicated by their key performance indicators (KPIs). To ensure communication secrecy in such a distributed network, we propose an intelligent zero trust (ZT) framework that safeguards the radio access network (RAN) from potential threats. Our proposed ZT model is specifically designed to cater to the distributed nature of 6 G networks. It accommodates secrecy modules in various nodes, such as the base station, core network, and cloud, to monitor the network while performing hierarchical and distributed threat detection. This approach enables the distributed modules to work together to efficiently identify and respond to the suspected RAN threats. As a RAN security use case, we address the intrusion detection issues of the 6 G-enabled internet of drones. Our simulation results show the robustness of our ZT framework, which is based on distributed security modules, against potential attacks. The framework exhibits low detection time and low false positives, making it a reliable solution for securing 6 G networks. Furthermore, the ZT model enables the accommodation of secrecy modules in various nodes and provides the needed enhanced security measures in the network.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"99 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140115917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Networked Industrial Control Device Asset Identification Method Based on Improved Decision Tree 基于改进决策树的联网工业控制设备资产识别方法
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-05 DOI: 10.1007/s10922-024-09805-z
Wei Yang, Yushan Fang, Xiaoming Zhou, Yijia Shen, Wenjie Zhang, Yu Yao

Industrial control device asset identification is essential to the active defense and situational awareness system for industrial control network security. However, industrial control device asset information is challenging to obtain, and efficient asset detection models and identification methods are urgently needed. Existing active detection techniques send many packets to the system, affecting device operation, while passive identification can only analyze publicly available industrial control data. Based on this problem, we propose an asset identification method including networked industrial control device asset detection, fingerprint feature extraction and classification. The proposed method use TCP SYN semi-networked probing in the asset detection phase to reduce the number of packets sent and remove honeypot device data. The fingerprint feature extraction phase considers the periodicity and long-term stability characteristics of industrial control device and proposes a set of asset fingerprint feature combinations. The classification phase uses an improved decision tree algorithm based on feature weight correction and uses AdaBoost ensemble learning algorithm to strengthen the classification model. The experimental results show that the detection technique proposed by our method has the advantages of high efficiency, low frequency and noise immunity.

工业控制设备资产识别对于工业控制网络安全的主动防御和态势感知系统至关重要。然而,工业控制设备资产信息的获取非常困难,迫切需要高效的资产检测模型和识别方法。现有的主动检测技术会向系统发送大量数据包,影响设备运行,而被动识别只能分析公开的工业控制数据。基于这一问题,我们提出了一种资产识别方法,包括联网工控设备资产检测、指纹特征提取和分类。该方法在资产检测阶段使用 TCP SYN 半联网探测,以减少发送数据包的数量并删除蜜罐设备数据。指纹特征提取阶段考虑了工业控制设备的周期性和长期稳定性特征,提出了一套资产指纹特征组合。分类阶段采用基于特征权重校正的改进决策树算法,并使用 AdaBoost 集合学习算法强化分类模型。实验结果表明,我们的方法提出的检测技术具有高效、低频和抗噪声等优点。
{"title":"Networked Industrial Control Device Asset Identification Method Based on Improved Decision Tree","authors":"Wei Yang, Yushan Fang, Xiaoming Zhou, Yijia Shen, Wenjie Zhang, Yu Yao","doi":"10.1007/s10922-024-09805-z","DOIUrl":"https://doi.org/10.1007/s10922-024-09805-z","url":null,"abstract":"<p>Industrial control device asset identification is essential to the active defense and situational awareness system for industrial control network security. However, industrial control device asset information is challenging to obtain, and efficient asset detection models and identification methods are urgently needed. Existing active detection techniques send many packets to the system, affecting device operation, while passive identification can only analyze publicly available industrial control data. Based on this problem, we propose an asset identification method including networked industrial control device asset detection, fingerprint feature extraction and classification. The proposed method use TCP SYN semi-networked probing in the asset detection phase to reduce the number of packets sent and remove honeypot device data. The fingerprint feature extraction phase considers the periodicity and long-term stability characteristics of industrial control device and proposes a set of asset fingerprint feature combinations. The classification phase uses an improved decision tree algorithm based on feature weight correction and uses AdaBoost ensemble learning algorithm to strengthen the classification model. The experimental results show that the detection technique proposed by our method has the advantages of high efficiency, low frequency and noise immunity.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"25 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140036140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SA-O2DCA: Seasonal Adapted Online Outlier Detection and Classification Approach for WSN SA-O2DCA:适用于 WSN 的季节性适应在线离群点检测和分类方法
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-04 DOI: 10.1007/s10922-024-09801-3
Mustafa Al Samara, Ismail Bennis, Abdelhafid Abouaissa, Pascal Lorenz

Wireless Sensor Networks (WSNs) play a critical role in the Internet of Things by collecting information for real-world applications such as healthcare, agriculture, and smart cities. These networks consist of low-resource sensors that produce streaming data requiring online processing. However, since data outliers can occur, it’s important to identify and classify them as errors or events using outlier detection and classification techniques. In this paper, we propose a new and enhanced approach for online outlier detection and classification in WSNs. Our approach is titled SA-O2DCA for Seasonal Adapted Online Outlier Detection and Classification Approach. SA-O2DCA, combines the benefits of the K-means algorithm for clustering, the Iforest algorithm for outlier detection and the Newton interpolation to classify the outliers. We evaluate our approach against other works in literature using multivariate datasets. The simulation results, which encompass the assessment of our proposed approach using a combination of synthetic and real-life multivariate datasets, reveal that SA-O2DCA is stable with fewer training models number and outperforms other works on various metrics, including Detection Rate, False Alarm Rate, and Accuracy Rate. Furthermore, our enhanced approach is suitable for working with seasonal real-life applications as it can dynamically change the Training Model at the end of each season period.

无线传感器网络(WSN)通过为医疗保健、农业和智能城市等现实世界应用收集信息,在物联网中发挥着至关重要的作用。这些网络由低资源传感器组成,产生的流式数据需要在线处理。然而,由于数据异常值时有发生,因此使用异常值检测和分类技术将其识别并分类为错误或事件非常重要。在本文中,我们提出了一种新的增强型方法,用于 WSN 中的离群值在线检测和分类。我们的方法名为 SA-O2DCA,即季节性适应在线离群点检测和分类方法。SA-O2DCA 结合了 K-means 算法(用于聚类)、Iforest 算法(用于离群点检测)和牛顿插值法(用于离群点分类)的优点。我们利用多元数据集对我们的方法和其他文献进行了评估。模拟结果显示,SA-O2DCA 在训练模型数量较少的情况下也能保持稳定,而且在检测率、误报率和准确率等各种指标上都优于其他作品。此外,我们的增强型方法适用于季节性的现实生活应用,因为它可以在每个季节结束时动态更改训练模型。
{"title":"SA-O2DCA: Seasonal Adapted Online Outlier Detection and Classification Approach for WSN","authors":"Mustafa Al Samara, Ismail Bennis, Abdelhafid Abouaissa, Pascal Lorenz","doi":"10.1007/s10922-024-09801-3","DOIUrl":"https://doi.org/10.1007/s10922-024-09801-3","url":null,"abstract":"<p>Wireless Sensor Networks (WSNs) play a critical role in the Internet of Things by collecting information for real-world applications such as healthcare, agriculture, and smart cities. These networks consist of low-resource sensors that produce streaming data requiring online processing. However, since data outliers can occur, it’s important to identify and classify them as errors or events using outlier detection and classification techniques. In this paper, we propose a new and enhanced approach for online outlier detection and classification in WSNs. Our approach is titled SA-O<sup>2</sup>DCA for Seasonal Adapted Online Outlier Detection and Classification Approach. SA-O<sup>2</sup>DCA, combines the benefits of the K-means algorithm for clustering, the Iforest algorithm for outlier detection and the Newton interpolation to classify the outliers. We evaluate our approach against other works in literature using multivariate datasets. The simulation results, which encompass the assessment of our proposed approach using a combination of synthetic and real-life multivariate datasets, reveal that SA-O<sup>2</sup>DCA is stable with fewer training models number and outperforms other works on various metrics, including Detection Rate, False Alarm Rate, and Accuracy Rate. Furthermore, our enhanced approach is suitable for working with seasonal real-life applications as it can dynamically change the Training Model at the end of each season period.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"17 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140036134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Aware Cluster Based Routing Algorithm for Optimal Routing and Fault Tolerance in Wireless Sensor Networks 基于能量感知的集群路由算法,用于无线传感器网络中的最优路由和容错
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-02 DOI: 10.1007/s10922-024-09806-y
Sateesh Gorikapudi, Hari Kishan Kondaveeti

In order to prevent the overloading, the routing algorithm aids in building productive paths both within and between clusters. When sending information from the source Internet of Things (IoT) device to a Base Station (BS), not all IoT devices are utilized in the path. We introduced an energy aware cluster-based routing in this paper, in which Improved Fuzzy C-means (IFCM) model plays a major role in clustering initially. Meanwhile, the clustering procedure considers the factors like energy and distance. Subsequent to the clustering process, optimal routing will be takes place by a new hybrid optimization algorithm named Custom Honey Badger and Coot Optimization (CHBCO) that combines the models like Honey badger optimization and Coot optimization model, respectively. For routing, the model considers the constraints like Energy as well as link quality. Also, this model establishes the fault tolerance method, which ensures that the network will continue to operate normally even in the situation of a Cluster Head (CH) failure. During this, the cluster members switch to another CH. The performance of proposed CHBCO based routing model is compared over existing models with respect to convergence rate, distance evaluation, energy, alive nodes, distance, normalized energy and link quality under various scenarios.

为了防止过载,路由算法有助于在集群内部和集群之间建立富有成效的路径。从源物联网(IoT)设备向基站(BS)发送信息时,并非所有的物联网设备都会在路径中被利用。本文介绍了一种基于能量感知的聚类路由,其中改进模糊 C 均值(IFCM)模型在最初的聚类中发挥了重要作用。同时,聚类过程考虑了能量和距离等因素。在聚类过程之后,将通过一种名为 "自定义蜜獾和库特优化(CHBCO)"的新型混合优化算法进行最优路由选择,该算法分别结合了蜜獾优化模型和库特优化模型。在路由选择方面,该模型考虑了能量和链路质量等约束条件。此外,该模型还建立了容错方法,确保即使在簇头(CH)失效的情况下,网络也能继续正常运行。在此期间,簇成员会切换到另一个 CH。与现有模型相比,所提出的基于 CHBCO 的路由模型在各种情况下的收敛速度、距离评估、能量、存活节点、距离、归一化能量和链路质量等方面的性能进行了比较。
{"title":"Energy Aware Cluster Based Routing Algorithm for Optimal Routing and Fault Tolerance in Wireless Sensor Networks","authors":"Sateesh Gorikapudi, Hari Kishan Kondaveeti","doi":"10.1007/s10922-024-09806-y","DOIUrl":"https://doi.org/10.1007/s10922-024-09806-y","url":null,"abstract":"<p>In order to prevent the overloading, the routing algorithm aids in building productive paths both within and between clusters. When sending information from the source Internet of Things (IoT) device to a Base Station (BS), not all IoT devices are utilized in the path. We introduced an energy aware cluster-based routing in this paper, in which Improved Fuzzy C-means (IFCM) model plays a major role in clustering initially. Meanwhile, the clustering procedure considers the factors like energy and distance. Subsequent to the clustering process, optimal routing will be takes place by a new hybrid optimization algorithm named Custom Honey Badger and Coot Optimization (CHBCO) that combines the models like Honey badger optimization and Coot optimization model, respectively. For routing, the model considers the constraints like Energy as well as link quality. Also, this model establishes the fault tolerance method, which ensures that the network will continue to operate normally even in the situation of a Cluster Head (CH) failure. During this, the cluster members switch to another CH. The performance of proposed CHBCO based routing model is compared over existing models with respect to convergence rate, distance evaluation, energy, alive nodes, distance, normalized energy and link quality under various scenarios.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"62 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140019296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review 智能家居应用程序的漏洞、威胁和解决方案:系统性文献综述
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-29 DOI: 10.1007/s10922-024-09803-1
Adeeb Mansoor Ansari, Mohammed Nazir, Khurram Mustafa

The smart home is one of the most significant applications of Internet of Things (IoT). Smart home is basically the combination of different components like devices, hub, cloud, and smart apps. These components may often be vulnerable, and most likely to be exploited by attackers. Being the main link among all the components to establish communication, the compromised smart apps are the most threatening to smart home security. The existing surveys covers vulnerabilities and issues of smart homes and its components in various perspectives. Still, there is a gap to understand and organize the smart apps, security issues and their impact on smart homes and its stakeholders. The paper presents a systematic literature review on the smart apps related vulnerabilities, their possible threats and current state of the art of the available security mechanisms. In our survey we observed that currently research focuses on rules interaction and access control issue. The conclusive findings reveal the fact that available security mechanisms are not widely applicable and incur overheads to developers and users. The critical review of pertinent literature shows that these mechanisms are not enough to address the issues effectively. Therefore, a generalized and robust solution is essentially required to tackle the issues at their origin. We summarized the insights of our SLR, highlighting current scenario and future directions of research in this domain.

智能家居是物联网(IoT)最重要的应用之一。智能家居基本上是设备、集线器、云和智能应用程序等不同组件的组合。这些组件通常都很脆弱,最容易被攻击者利用。作为所有组件之间建立通信的主要纽带,被入侵的智能应用程序对智能家居安全的威胁最大。现有的调查从不同角度探讨了智能家居及其组件的脆弱性和问题。但在了解和整理智能应用程序、安全问题及其对智能家居和利益相关者的影响方面仍存在差距。本文对智能应用程序的相关漏洞、可能的威胁以及现有安全机制的现状进行了系统的文献综述。我们在调查中发现,目前的研究主要集中在规则交互和访问控制问题上。这些结论揭示了一个事实,即现有的安全机制并不广泛适用,而且会给开发人员和用户带来开销。对相关文献的严格审查表明,这些机制不足以有效解决这些问题。因此,从根本上解决这些问题需要一个通用的、稳健的解决方案。我们总结了 SLR 的见解,强调了该领域当前的情况和未来的研究方向。
{"title":"Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review","authors":"Adeeb Mansoor Ansari, Mohammed Nazir, Khurram Mustafa","doi":"10.1007/s10922-024-09803-1","DOIUrl":"https://doi.org/10.1007/s10922-024-09803-1","url":null,"abstract":"<p>The smart home is one of the most significant applications of Internet of Things (IoT). Smart home is basically the combination of different components like devices, hub, cloud, and smart apps. These components may often be vulnerable, and most likely to be exploited by attackers. Being the main link among all the components to establish communication, the compromised smart apps are the most threatening to smart home security. The existing surveys covers vulnerabilities and issues of smart homes and its components in various perspectives. Still, there is a gap to understand and organize the smart apps, security issues and their impact on smart homes and its stakeholders. The paper presents a systematic literature review on the smart apps related vulnerabilities, their possible threats and current state of the art of the available security mechanisms. In our survey we observed that currently research focuses on rules interaction and access control issue. The conclusive findings reveal the fact that available security mechanisms are not widely applicable and incur overheads to developers and users. The critical review of pertinent literature shows that these mechanisms are not enough to address the issues effectively. Therefore, a generalized and robust solution is essentially required to tackle the issues at their origin. We summarized the insights of our SLR, highlighting current scenario and future directions of research in this domain.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"9 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140006207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Completion Time of Requests in Serverless Computing 优化无服务器计算中的请求完成时间
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-22 DOI: 10.1007/s10922-024-09800-4
Ajay Sherawat, Shubha Brata Nath, Sourav Kanti Addya

Serverless computing offers people with the liberty of not thinking about the backend side of the things in an application development. They are scalable and cost efficient as they provide pay-for-use service. Providing acceptable performance while having no knowledge about the kind of application is the main challenge the cloud providers have. Many applications may have the need to be completed before the deadline. In that case, the request has to be completed before the deadline or else it will lead to service level agreement violation. If the cloud provider completes the requests faster, there would be less SLA violations. This will also reduce cost for the user as the functions will be completed sooner. Therefore, improving the completion time of the requests will benefit the user as well as the provider. In this paper, we present a method to improve the completion time of requests using genetic algorithm for allocation of requests to virtual machines that could provide optimal completion time for them.

无服务器计算为人们提供了在应用程序开发中无需考虑后端问题的自由。它们具有可扩展性和成本效益,因为它们提供的是按使用付费的服务。在不了解应用程序类型的情况下提供可接受的性能是云计算提供商面临的主要挑战。许多应用程序可能需要在截止日期前完成。在这种情况下,请求必须在截止日期前完成,否则将导致违反服务级别协议。如果云提供商能更快地完成请求,那么违反服务级别协议的情况就会减少。这也会降低用户的成本,因为功能会更快完成。因此,缩短请求的完成时间对用户和提供商都有好处。在本文中,我们提出了一种利用遗传算法改善请求完成时间的方法,用于将请求分配给可提供最佳完成时间的虚拟机。
{"title":"Optimizing Completion Time of Requests in Serverless Computing","authors":"Ajay Sherawat, Shubha Brata Nath, Sourav Kanti Addya","doi":"10.1007/s10922-024-09800-4","DOIUrl":"https://doi.org/10.1007/s10922-024-09800-4","url":null,"abstract":"<p>Serverless computing offers people with the liberty of not thinking about the backend side of the things in an application development. They are scalable and cost efficient as they provide pay-for-use service. Providing acceptable performance while having no knowledge about the kind of application is the main challenge the cloud providers have. Many applications may have the need to be completed before the deadline. In that case, the request has to be completed before the deadline or else it will lead to service level agreement violation. If the cloud provider completes the requests faster, there would be less SLA violations. This will also reduce cost for the user as the functions will be completed sooner. Therefore, improving the completion time of the requests will benefit the user as well as the provider. In this paper, we present a method to improve the completion time of requests using genetic algorithm for allocation of requests to virtual machines that could provide optimal completion time for them.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"6 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139919643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling Efficient Semantic Stream Processing Across the IoT Network Through Adaptive Distribution with DIVIDE 通过 DIVIDE 的自适应分发功能在整个物联网网络中实现高效语义流处理
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-21 DOI: 10.1007/s10922-023-09797-2
Mathias De Brouwer, Filip De Turck, Femke Ongenae

In the Internet of Things (IoT), semantic IoT platforms are often used to solve the challenges associated with the real-time integration of heterogeneous IoT sensor data, domain knowledge and context information. Existing platforms mostly have a static distribution and configuration of queries deployed on the platform’s stream processing components. In contrast, the environmental context in which queries are deployed has a very dynamic nature: real-world set-ups involve varying tasks, device resource usage, networking conditions, etc. To solve this mismatch, this paper presents DIVIDE, an IoT platform component built on Semantic Web technologies. DIVIDE has a generic design containing multiple subcomponents that monitor the environment across a cascading architecture. By monitoring the use case context, DIVIDE adaptively derives the appropriate stream processing queries in a context-aware way. Using a Local Monitor deployed on edge devices, situational context parameters are measured and aggregated. The Meta Model allows modeling these measurements, and meta-information about devices and deployed stream processing queries. Through the definition of application-specific Global Monitor queries that are continuously evaluated centrally on the Meta Model, end users can dynamically configure how the situational context should influence the window parameter configuration and distribution of queries in the network. The paper evaluates a first implementation of DIVIDE on a homecare monitoring use case. The results show how DIVIDE can successfully adapt to varying device and networking conditions, taking into account the use case requirements. This way, DIVIDE allows better balancing use case specific trade-offs and achieves more efficient stream processing.

在物联网(IoT)中,语义物联网平台通常用于解决与异构物联网传感器数据、领域知识和上下文信息的实时集成相关的挑战。现有的平台大多在平台的流处理组件上部署了查询的静态分布和配置。与此相反,部署查询的环境背景具有非常强的动态性:现实世界的设置涉及不同的任务、设备资源使用情况、网络条件等。为了解决这一不匹配问题,本文介绍了基于语义网技术的物联网平台组件 DIVIDE。DIVIDE 采用通用设计,包含多个子组件,通过级联架构监控环境。通过监控用例上下文,DIVIDE 以上下文感知的方式自适应地推导出适当的流处理查询。利用部署在边缘设备上的本地监控器,可以测量和汇总情景参数。元模型允许对这些测量结果、设备元信息和部署的流处理查询进行建模。通过定义在元模型上不断集中评估的特定于应用的全局监控器查询,终端用户可以动态配置态势上下文应如何影响网络中的窗口参数配置和查询分布。本文评估了 DIVIDE 在家庭护理监控使用案例中的首次实施。结果表明了 DIVIDE 如何在考虑到用例需求的情况下成功适应不同的设备和网络条件。通过这种方式,DIVIDE 可以更好地平衡特定用例的权衡,并实现更高效的流处理。
{"title":"Enabling Efficient Semantic Stream Processing Across the IoT Network Through Adaptive Distribution with DIVIDE","authors":"Mathias De Brouwer, Filip De Turck, Femke Ongenae","doi":"10.1007/s10922-023-09797-2","DOIUrl":"https://doi.org/10.1007/s10922-023-09797-2","url":null,"abstract":"<p>In the Internet of Things (IoT), semantic IoT platforms are often used to solve the challenges associated with the real-time integration of heterogeneous IoT sensor data, domain knowledge and context information. Existing platforms mostly have a static distribution and configuration of queries deployed on the platform’s stream processing components. In contrast, the environmental context in which queries are deployed has a very dynamic nature: real-world set-ups involve varying tasks, device resource usage, networking conditions, etc. To solve this mismatch, this paper presents DIVIDE, an IoT platform component built on Semantic Web technologies. DIVIDE has a generic design containing multiple subcomponents that monitor the environment across a cascading architecture. By monitoring the use case context, DIVIDE adaptively derives the appropriate stream processing queries in a context-aware way. Using a Local Monitor deployed on edge devices, situational context parameters are measured and aggregated. The Meta Model allows modeling these measurements, and meta-information about devices and deployed stream processing queries. Through the definition of application-specific Global Monitor queries that are continuously evaluated centrally on the Meta Model, end users can dynamically configure how the situational context should influence the window parameter configuration and distribution of queries in the network. The paper evaluates a first implementation of DIVIDE on a homecare monitoring use case. The results show how DIVIDE can successfully adapt to varying device and networking conditions, taking into account the use case requirements. This way, DIVIDE allows better balancing use case specific trade-offs and achieves more efficient stream processing.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"238 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139919870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fog-based Federated Time Series Forecasting for IoT Data 基于雾的物联网数据联邦时间序列预测
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-20 DOI: 10.1007/s10922-024-09802-2
Mradula Sharma, Parmeet Kaur

Federated learning (FL) allows multiple nodes or clients to train a model collaboratively without actual sharing of data. Thus, FL avoids data privacy leakage by keeping the data locally at the clients. Fog computing is a natural fit for decentralized FL where local training can take place at fog nodes using the data of connected Internet of Things (IoT) or edge devices. A cloud-based node can act as the server for global model updates. Although FL has been utilized in fog and edge computing for a few applications, its efficacy has been demonstrated majorly for independent and identically distributed (IID) data. However, real-world IoT applications are generally time-series (TS) data and non-IID. Since there has not been any significant effort towards using FL for non-IID time-series data, this paper presents a fog-based decentralized methodology for time series forecasting utilizing Federated Learning. The efficacy of the proposed methodology for the non-IID data is evaluated using a FL framework Flower. It is observed that the FL based TS forecasting performs at par with a centralized method for the same and yields promising results even when the data exhibits quantity skew. Additionally, the FL based method does not require sharing of data and hence, decreases the network load and preserves client privacy.

联合学习(FL)允许多个节点或客户端在不实际共享数据的情况下协作训练一个模型。因此,FL 通过将数据保存在客户端本地,避免了数据隐私泄露。雾计算非常适合分散式 FL,在雾节点上,可以使用联网的物联网(IoT)或边缘设备的数据进行本地训练。基于云的节点可以充当全局模型更新的服务器。虽然 FL 已被用于雾计算和边缘计算的一些应用中,但其功效主要是针对独立且同分布(IID)的数据。然而,现实世界中的物联网应用一般都是时间序列(TS)数据和非独立同分布(IID)数据。由于目前还没有针对非独立同分布式(IID)时间序列数据使用 FL 的重大努力,本文提出了一种基于雾的分散方法,利用联邦学习(Federated Learning)进行时间序列预测。使用 FL 框架 Flower 评估了所提方法对非 IID 数据的功效。结果表明,基于 FL 的 TS 预测与集中式方法的性能相当,即使在数据呈现数量偏差的情况下,也能产生可喜的结果。此外,基于 FL 的方法不需要共享数据,因此降低了网络负荷,保护了客户隐私。
{"title":"Fog-based Federated Time Series Forecasting for IoT Data","authors":"Mradula Sharma, Parmeet Kaur","doi":"10.1007/s10922-024-09802-2","DOIUrl":"https://doi.org/10.1007/s10922-024-09802-2","url":null,"abstract":"<p>Federated learning (FL) allows multiple nodes or clients to train a model collaboratively without actual sharing of data. Thus, FL avoids data privacy leakage by keeping the data locally at the clients. Fog computing is a natural fit for decentralized FL where local training can take place at fog nodes using the data of connected Internet of Things (IoT) or edge devices. A cloud-based node can act as the server for global model updates. Although FL has been utilized in fog and edge computing for a few applications, its efficacy has been demonstrated majorly for independent and identically distributed (IID) data. However, real-world IoT applications are generally time-series (TS) data and non-IID. Since there has not been any significant effort towards using FL for non-IID time-series data, this paper presents a fog-based decentralized methodology for time series forecasting utilizing Federated Learning. The efficacy of the proposed methodology for the non-IID data is evaluated using a FL framework Flower. It is observed that the FL based TS forecasting performs at par with a centralized method for the same and yields promising results even when the data exhibits quantity skew. Additionally, the FL based method does not require sharing of data and hence, decreases the network load and preserves client privacy.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"15 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139919759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Exploration Strategy for Q-Learning Based Multipath Routing in SDN Networks SDN 网络中基于 Q 学习的多路径路由的改进探索策略
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-16 DOI: 10.1007/s10922-024-09804-0

Abstract

Software-Defined Networking (SDN) is characterized by a high level of programmability and offers a rich set of capabilities for network management operations. Network intelligence is centralized in the controller, which is responsible for updating the routing policies according to the applications’ requirements. To further enhance such capabilities, the controller has to be endowed with intelligence by integrating Artificial Intelligence (AI) tools in order to provide the controller the ability to autonomously reconfigure the network in a timely way. In this paper, we address the deployment of a Q-learning algorithm for the routing optimization problem in terms of latency minimization. Using a direct modeling approach of the multi-path flow-routing problem, we delve deeper into the impact of the exploration-exploitation strategies on the algorithm’s performance. Furthermore, we propose a couple of improvements to the Q-Learning algorithm to enhance its performance within the considered environment. On the one hand, we integrate a congestion-avoidance mechanism in the exploration phase, which leads to effective improvements in the algorithm’s performance with regard to average latency, convergence time, and computation time. On the other hand, we propose to implement a novel strategy based on the Max-Boltzman Exploration method (MBE), which is a combination of the traditional (varepsilon) - greedy and softmax strategies. The results show that, for an appropriate tuning of the hyperparameters, the MBE strategy combined with the congestion-avoidance mechanism performs better than the (varepsilon) -greedy, (varepsilon) -decay, and Softmax strategies in terms of average latency, convergence time, and computation time.

摘要 软件定义网络(Software-Defined Networking,SDN)的特点是具有高度的可编程性,可为网络管理操作提供丰富的功能。网络智能集中在控制器中,控制器负责根据应用需求更新路由策略。为了进一步增强这种能力,必须通过集成人工智能(AI)工具赋予控制器智能,以便使控制器具备及时自主重新配置网络的能力。在本文中,我们针对延迟最小化的路由优化问题部署了 Q-learning 算法。利用多路径流量路由问题的直接建模方法,我们深入探讨了探索-开发策略对算法性能的影响。此外,我们还对 Q-Learning 算法提出了一些改进建议,以提高其在所考虑环境中的性能。一方面,我们在探索阶段集成了拥塞规避机制,从而有效改善了算法在平均延迟、收敛时间和计算时间方面的性能。另一方面,我们提出了一种基于 Max-Boltzman 探索法(MBE)的新策略,它是传统的贪婪策略和软最大策略的结合。结果表明,在适当调整超参数的情况下,MBE策略与拥塞规避机制相结合,在平均延迟、收敛时间和计算时间方面都优于贪婪策略、衰减策略和软最大策略。
{"title":"Improved Exploration Strategy for Q-Learning Based Multipath Routing in SDN Networks","authors":"","doi":"10.1007/s10922-024-09804-0","DOIUrl":"https://doi.org/10.1007/s10922-024-09804-0","url":null,"abstract":"<h3>Abstract</h3> <p>Software-Defined Networking (SDN) is characterized by a high level of programmability and offers a rich set of capabilities for network management operations. Network intelligence is centralized in the controller, which is responsible for updating the routing policies according to the applications’ requirements. To further enhance such capabilities, the controller has to be endowed with intelligence by integrating Artificial Intelligence (AI) tools in order to provide the controller the ability to autonomously reconfigure the network in a timely way. In this paper, we address the deployment of a Q-learning algorithm for the routing optimization problem in terms of latency minimization. Using a direct modeling approach of the multi-path flow-routing problem, we delve deeper into the impact of the exploration-exploitation strategies on the algorithm’s performance. Furthermore, we propose a couple of improvements to the Q-Learning algorithm to enhance its performance within the considered environment. On the one hand, we integrate a congestion-avoidance mechanism in the exploration phase, which leads to effective improvements in the algorithm’s performance with regard to average latency, convergence time, and computation time. On the other hand, we propose to implement a novel strategy based on the Max-Boltzman Exploration method (MBE), which is a combination of the traditional <span> <span>(varepsilon)</span> </span>- greedy and softmax strategies. The results show that, for an appropriate tuning of the hyperparameters, the MBE strategy combined with the congestion-avoidance mechanism performs better than the <span> <span>(varepsilon)</span> </span>-greedy, <span> <span>(varepsilon)</span> </span>-decay, and Softmax strategies in terms of average latency, convergence time, and computation time.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"18 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139771921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cluster-Based Hybrid Approach for PCI Configuration and Optimization in 5G EN-DC Heterogeneous Networks 基于集群的混合方法用于 5G EN-DC 异构网络中的 PCI 配置和优化
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-01 DOI: 10.1007/s10922-023-09799-0
Pengzhao Li, Heng Yang, Iksang Kim, Zhenyu Liu, Shanshan Li

With the development of 5G technologies and the implementation of EN-DC architecture in heterogeneous networks, managing Physical Cell Identity (PCI) has become increasingly complex. EN-DC, facilitating the coexistence of eNBs and gNBs, creates a densely populated environment that heightens the risk of PCI collisions and confusions. This study introduces a novel hybrid approach to PCI configuration in EN-DC networks, integrating centralized and distributed strategies. By organizing the network into clusters and employing newly introduced algorithms, Symmetrical Comparison (SC) and Symmetrical Triangular Cycling (STC), the method efficiently identifies and resolves PCI confusions. Simulations were conducted to evaluate the effectiveness of the proposed model under various scenarios, revealing its proficiency in preventing PCI confusion and (mod 30) collisions. The results underscore the critical role of PCI pool size and offer insights into network planning and optimization. Despite some challenges in handling specific collisions, such as (mod 3) and (mod 4), the study suggests that incorporating reinforcement learning techniques could provide more adaptive solutions, laying the foundation for future research in this area. The research contributes to the evolving landscape of 5G EN-DC networks, emphasizing the importance of intelligent design and meticulous planning in network management.

随着 5G 技术的发展和 EN-DC 架构在异构网络中的实施,物理小区身份(PCI)管理变得越来越复杂。EN-DC 促进了 eNB 和 gNB 的共存,创造了一个人口密集的环境,从而增加了 PCI 碰撞和混乱的风险。本研究引入了一种新颖的混合方法,将集中式和分布式策略整合到 EN-DC 网络的 PCI 配置中。通过将网络组织成群,并采用新引入的算法--对称比较(SC)和对称三角循环(STC),该方法能有效识别并解决 PCI 混乱问题。模拟评估了所提模型在各种情况下的有效性,揭示了它在防止 PCI 混乱和碰撞方面的能力。结果强调了 PCI 池大小的关键作用,并为网络规划和优化提供了启示。尽管在处理特定碰撞(如(mod 3) 和(mod 4) )方面存在一些挑战,但研究表明,结合强化学习技术可以提供更具适应性的解决方案,从而为这一领域的未来研究奠定基础。这项研究为不断发展的5G EN-DC网络做出了贡献,强调了智能设计和精细规划在网络管理中的重要性。
{"title":"Cluster-Based Hybrid Approach for PCI Configuration and Optimization in 5G EN-DC Heterogeneous Networks","authors":"Pengzhao Li, Heng Yang, Iksang Kim, Zhenyu Liu, Shanshan Li","doi":"10.1007/s10922-023-09799-0","DOIUrl":"https://doi.org/10.1007/s10922-023-09799-0","url":null,"abstract":"<p>With the development of 5G technologies and the implementation of EN-DC architecture in heterogeneous networks, managing Physical Cell Identity (PCI) has become increasingly complex. EN-DC, facilitating the coexistence of eNBs and gNBs, creates a densely populated environment that heightens the risk of PCI collisions and confusions. This study introduces a novel hybrid approach to PCI configuration in EN-DC networks, integrating centralized and distributed strategies. By organizing the network into clusters and employing newly introduced algorithms, Symmetrical Comparison (SC) and Symmetrical Triangular Cycling (STC), the method efficiently identifies and resolves PCI confusions. Simulations were conducted to evaluate the effectiveness of the proposed model under various scenarios, revealing its proficiency in preventing PCI confusion and <span>(mod 30)</span> collisions. The results underscore the critical role of PCI pool size and offer insights into network planning and optimization. Despite some challenges in handling specific collisions, such as <span>(mod 3)</span> and <span>(mod 4)</span>, the study suggests that incorporating reinforcement learning techniques could provide more adaptive solutions, laying the foundation for future research in this area. The research contributes to the evolving landscape of 5G EN-DC networks, emphasizing the importance of intelligent design and meticulous planning in network management.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"9 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139664774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Network and Systems Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1