首页 > 最新文献

IEEE Transactions on Mobile Computing最新文献

英文 中文
Towards Workload-Constrained Efficient Order Assignment in Last-Mile Delivery 基于工作量约束的最后一英里交货高效订单分配研究
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-26 DOI: 10.1109/TMC.2024.3469236
Wenjun Lyu;Xiaolong Jin;Haotian Wang;Yiwei Song;Shuai Wang;Yunhuai Liu;Tian He;Desheng Zhang
Efficient order assignment in last-mile delivery benefits customers, couriers, and the platform. State-of-the-practice order assignment is based on the static delivery area partition, which cannot adapt well to the dynamic order quantity and destination distributions on different days. State-of-the-art methods focus on balancing order amounts or the payoff among couriers dynamically, neglecting the courier's workload in delivering orders. This paper explores the courier's heterogeneous behaviors for delivering orders to different destinations to measure the courier's workload and then achieve more efficient order assignments under the fair workload constraint. We design a workload-constrained order assignment system, called WORD, to reduce the cost of the last-mile delivery, i.e., the couriers’ total travel distance and overdue order rate. Specifically, the heterogeneous behaviors for delivering orders are first utilized for workload calculation. Then a two-stage order assignment framework is designed, including a sort-based initialization algorithm for initializing the assignment under the fair workload constraint and a coalition-game-based improvement algorithm for improving the assignment. Extensive evaluation results with real-world logistics data from one of the largest logistics companies in China show that WORD reduces the cost of the order assignment by up to 51.9% under the fair workload constraint compared to the state-of-the-art methods.
在最后一英里交货中,高效的订单分配对客户、快递员和平台都有好处。实践状态订单分配基于静态交付区域划分,不能很好地适应不同日期的动态订单数量和目的地分布。目前的配送方法主要关注快递员之间的订单数量或报酬的动态平衡,而忽略了快递员在配送过程中的工作量。本文研究了快递员在不同目的地投递订单时的异构行为,以衡量快递员的工作量,从而在公平的工作量约束下实现更高效的订单分配。我们设计了一个受工作量限制的订单分配系统,称为WORD,以减少最后一英里的交付成本,即快递员的总行程距离和逾期订单率。具体来说,首先将交付订单的异构行为用于工作量计算。然后设计了一个两阶段的订单分配框架,包括在公平工作量约束下基于排序的订单分配初始化算法和基于联盟博弈的订单分配改进算法。来自中国最大的物流公司之一的真实物流数据的广泛评估结果表明,与最先进的方法相比,在公平的工作量限制下,WORD将订单分配成本降低了51.9%。
{"title":"Towards Workload-Constrained Efficient Order Assignment in Last-Mile Delivery","authors":"Wenjun Lyu;Xiaolong Jin;Haotian Wang;Yiwei Song;Shuai Wang;Yunhuai Liu;Tian He;Desheng Zhang","doi":"10.1109/TMC.2024.3469236","DOIUrl":"https://doi.org/10.1109/TMC.2024.3469236","url":null,"abstract":"Efficient order assignment in last-mile delivery benefits customers, couriers, and the platform. State-of-the-practice order assignment is based on the static delivery area partition, which cannot adapt well to the dynamic order quantity and destination distributions on different days. State-of-the-art methods focus on balancing order amounts or the payoff among couriers dynamically, neglecting the courier's workload in delivering orders. This paper explores the courier's heterogeneous behaviors for delivering orders to different destinations to measure the courier's workload and then achieve more efficient order assignments under the fair workload constraint. We design a workload-constrained order assignment system, called \u0000<italic>WORD</i>\u0000, to reduce the cost of the last-mile delivery, i.e., the couriers’ total travel distance and overdue order rate. Specifically, the heterogeneous behaviors for delivering orders are first utilized for workload calculation. Then a two-stage order assignment framework is designed, including a sort-based initialization algorithm for initializing the assignment under the fair workload constraint and a coalition-game-based improvement algorithm for improving the assignment. Extensive evaluation results with real-world logistics data from one of the largest logistics companies in China show that \u0000<italic>WORD</i>\u0000 reduces the cost of the order assignment by up to 51.9% under the fair workload constraint compared to the state-of-the-art methods.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"557-570"},"PeriodicalIF":7.7,"publicationDate":"2024-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10696971","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Catch Me If You Can: Deep Meta-RL for Search-and-Rescue Using LoRa UAV Networks 如果你能抓住我:使用LoRa无人机网络进行搜索和救援的深度元强化学习
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-26 DOI: 10.1109/TMC.2024.3468382
Mehdi Naderi Soorki;Hossein Aghajari;Sajad Ahmadinabi;Hamed Bakhtiari Babadegani;Christina Chaccour;Walid Saad
Long-range (LoRa) wireless networks have been widely proposed as efficient wireless access networks for battery-constrained Internet of Things (IoT) devices. However, applying the LoRa-based IoT network in search-and-rescue (SAR) operations will have limited coverage caused by high signal attenuation due to terrestrial blockages, especially in highly remote areas. To overcome this challenge, using unmanned aerial vehicles (UAVs) as a flying LoRa gateway to transfer messages from ground LoRa nodes to the ground rescue station can be a promising solution. In this paper, an artificial intelligence-empowered SAR operation framework using a UAV-assisted LoRa network in different unknown search environments is designed and implemented. The problem of the flying LoRa (FL) gateway control policy is modeled as a partially observable Markov decision process to move the UAV towards the LoRa transmitter carried by a lost person in the known remote search area. A deep reinforcement learning (RL)-based policy is designed to determine the adaptive FL gateway trajectory in a given search environment. Then, as a general solution, a deep meta-RL framework is used for SAR in any new and unknown environments. The proposed deep meta-RL framework integrates the information of the prior FL gateway experience in the previous SAR environments to the new environment and then rapidly adapts the UAV control policy model for SAR operation in a new and unknown environment. To analyze the performance of the proposed framework in real-world scenarios, the proposed SAR system is experimentally tested in three environments: a university campus, a wide plain, and a slotted canyon at Mongasht mountain ranges, Iran. Experimental results show that if the deep meta-RL-based control policy is applied instead of the deep RL-based one, the number of SAR time slots decreases from 141 to 50. Moreover, in the slotted canyon environment, the UAV energy consumption under the deep meta-RL policy is respectively 57% and 23% less than the deep RL and Actor-Critic RL policies.
远程(LoRa)无线网络已被广泛提出作为电池受限的物联网(IoT)设备的高效无线接入网络。然而,在搜救(SAR)行动中应用基于lora的物联网网络,由于地面阻塞导致的高信号衰减,覆盖范围有限,特别是在高度偏远的地区。为了克服这一挑战,使用无人驾驶飞行器(uav)作为飞行的LoRa网关,将信息从地面LoRa节点传输到地面救援站,可能是一个很有前途的解决方案。本文设计并实现了在不同未知搜索环境下使用无人机辅助LoRa网络的人工智能增强SAR操作框架。将飞行LoRa (FL)网关控制策略问题建模为一个部分可观察的马尔可夫决策过程,使无人机向已知远程搜索区域内失踪者携带的LoRa发射机移动。设计了一种基于深度强化学习(RL)的策略来确定给定搜索环境中的自适应FL网关轨迹。然后,作为一般解决方案,在任何新的和未知的环境中使用深度元rl框架进行SAR。提出的深度元rl框架将以前的SAR环境下的FL网关经验信息集成到新环境中,然后快速调整无人机控制策略模型以适应新的未知环境下的SAR操作。为了分析所提出的框架在现实场景中的性能,所提出的SAR系统在三种环境中进行了实验测试:大学校园、广阔的平原和伊朗Mongasht山脉的狭缝峡谷。实验结果表明,采用基于深度元空域空域的控制策略代替基于深度空域空域的控制策略,SAR时隙数从141个减少到50个。此外,在狭缝峡谷环境下,深度元RL策略下的无人机能耗分别比深度RL和Actor-Critic RL策略低57%和23%。
{"title":"Catch Me If You Can: Deep Meta-RL for Search-and-Rescue Using LoRa UAV Networks","authors":"Mehdi Naderi Soorki;Hossein Aghajari;Sajad Ahmadinabi;Hamed Bakhtiari Babadegani;Christina Chaccour;Walid Saad","doi":"10.1109/TMC.2024.3468382","DOIUrl":"https://doi.org/10.1109/TMC.2024.3468382","url":null,"abstract":"Long-range (LoRa) wireless networks have been widely proposed as efficient wireless access networks for battery-constrained Internet of Things (IoT) devices. However, applying the LoRa-based IoT network in search-and-rescue (SAR) operations will have limited coverage caused by high signal attenuation due to terrestrial blockages, especially in highly remote areas. To overcome this challenge, using unmanned aerial vehicles (UAVs) as a flying LoRa gateway to transfer messages from ground LoRa nodes to the ground rescue station can be a promising solution. In this paper, an artificial intelligence-empowered SAR operation framework using a UAV-assisted LoRa network in different unknown search environments is designed and implemented. The problem of the flying LoRa (FL) gateway control policy is modeled as a partially observable Markov decision process to move the UAV towards the LoRa transmitter carried by a lost person in the known remote search area. A deep reinforcement learning (RL)-based policy is designed to determine the adaptive FL gateway trajectory in a given search environment. Then, as a general solution, a deep meta-RL framework is used for SAR in any new and unknown environments. The proposed deep meta-RL framework integrates the information of the prior FL gateway experience in the previous SAR environments to the new environment and then rapidly adapts the UAV control policy model for SAR operation in a new and unknown environment. To analyze the performance of the proposed framework in real-world scenarios, the proposed SAR system is experimentally tested in three environments: a university campus, a wide plain, and a slotted canyon at Mongasht mountain ranges, Iran. Experimental results show that if the deep meta-RL-based control policy is applied instead of the deep RL-based one, the number of SAR time slots decreases from 141 to 50. Moreover, in the slotted canyon environment, the UAV energy consumption under the deep meta-RL policy is respectively 57% and 23% less than the deep RL and Actor-Critic RL policies.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"763-778"},"PeriodicalIF":7.7,"publicationDate":"2024-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From Cells to Freedom: 6G's Evolutionary Shift With Cell-Free Massive MIMO 从蜂窝到自由:6G的进化转变与无蜂窝的大规模MIMO
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-25 DOI: 10.1109/TMC.2024.3468003
Guillem Femenias;Felip Riera-Palou
Cell-free massive MIMO (CF-mMIMO) is emerging as a technological pillar for future sixth generation (6G) mobile networks, promising consistently high spectral and energy efficiencies across the coverage area. Despite the reported advantages of CF-mMIMO over traditional cellular-based massive MIMO (mMIMO), the extensive deployment of access points (APs) and the associated fronthaul links present significant economic and logistical challenges. This paper proposes a transitional framework to facilitate the gradual integration of CF-mMIMO into existing cellular infrastructures, allowing mobile network operators to progressively realize the benefits of a distributed network topology. A comprehensive analysis of the spectral, energy, and computational efficiencies in heterogeneous network scenarios, incorporating both macrocellular and cell-free components, is presented. Our contributions include a unified assessment framework encompassing spectral, energy and computational aspects, a novel channel virtualization mechanism for effective downlink precoding, and a realistic industry-backed power consumption model for joint network operation. The potential performance gains are demonstrated and guidelines for the incremental deployment of CF-mMIMO are provided through detailed numerical results, ensuring a balanced trade-off between integration costs and operational benefits. This approach aims to leverage the capabilities of emerging network architectures to achieve a seamless evolution towards fully distributed 6G networks.
无蜂窝大规模MIMO (CF-mMIMO)正在成为未来第六代(6G)移动网络的技术支柱,有望在整个覆盖范围内保持高频谱和高能效。尽管有报道称cf - MIMO比传统的基于蜂窝的大规模MIMO (mMIMO)有优势,但接入点(ap)的广泛部署和相关的前传链路带来了重大的经济和后勤挑战。本文提出了一个过渡框架,以促进CF-mMIMO逐步集成到现有的蜂窝基础设施中,使移动网络运营商能够逐步实现分布式网络拓扑的优势。综合分析频谱,能量,和计算效率在异构网络场景,包括宏蜂窝和无蜂窝组件,提出。我们的贡献包括一个涵盖频谱、能量和计算方面的统一评估框架,一个用于有效下行预编码的新颖信道虚拟化机制,以及一个用于联合网络运行的现实的工业支持的功耗模型。通过详细的数值结果,展示了潜在的性能收益,并提供了CF-mMIMO增量部署的指导方针,确保了集成成本和操作效益之间的平衡。这种方法旨在利用新兴网络架构的能力,实现向完全分布式6G网络的无缝演进。
{"title":"From Cells to Freedom: 6G's Evolutionary Shift With Cell-Free Massive MIMO","authors":"Guillem Femenias;Felip Riera-Palou","doi":"10.1109/TMC.2024.3468003","DOIUrl":"https://doi.org/10.1109/TMC.2024.3468003","url":null,"abstract":"Cell-free massive MIMO (CF-mMIMO) is emerging as a technological pillar for future sixth generation (6G) mobile networks, promising consistently high spectral and energy efficiencies across the coverage area. Despite the reported advantages of CF-mMIMO over traditional cellular-based massive MIMO (mMIMO), the extensive deployment of access points (APs) and the associated fronthaul links present significant economic and logistical challenges. This paper proposes a transitional framework to facilitate the gradual integration of CF-mMIMO into existing cellular infrastructures, allowing mobile network operators to progressively realize the benefits of a distributed network topology. A comprehensive analysis of the spectral, energy, and computational efficiencies in heterogeneous network scenarios, incorporating both macrocellular and cell-free components, is presented. Our contributions include a unified assessment framework encompassing spectral, energy and computational aspects, a novel channel virtualization mechanism for effective downlink precoding, and a realistic industry-backed power consumption model for joint network operation. The potential performance gains are demonstrated and guidelines for the incremental deployment of CF-mMIMO are provided through detailed numerical results, ensuring a balanced trade-off between integration costs and operational benefits. This approach aims to leverage the capabilities of emerging network architectures to achieve a seamless evolution towards fully distributed 6G networks.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"812-829"},"PeriodicalIF":7.7,"publicationDate":"2024-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interference Recycling: Effective Utilization of Interference for Enhancing Data Transmission 干扰回收:有效利用干扰增强数据传输
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-25 DOI: 10.1109/TMC.2024.3467339
Zhao Li;Lijuan Zhang;Chengyu Liu;Siwei Le;Jie Chen;Kang G. Shin;Zheng Yan;Jia Liu
With the rapid development of wireless communication technologies, Internet of Things (IoT) has emerged as one of the most important application scenarios. Due to the high density of IoT devices and the limited spectrum resources, along with the miniaturization and sustainability requirements of these devices, the development of low-cost interference management (IM) methods has become crucial for widespread use of IoT. Interference has long been known to harm network performance. Since a desired signal can be distorted by interference, and thus be incorrectly decoded at the destination, we argue that interference can also be transformed intentionally to extract the desired data from interfering signal(s). Based on this observation, we propose Interference ReCycling (IRC) for the IoT. Under IRC, a recycling signal is generated using the interference a victim IoT device is subjected to, and then sent by the device’s associated gateway. Under the influence of the recycling signal, the desired data of the interfered/victim IoT transmission-pair can be recovered from the interference at the IoT device. We also show that the interfered user’s spectral efficiency (SE) with IRC can be optimized further by properly distributing the transmit power used for the desired signal’s transmission and the recycling signal. We validate the feasibility of IRC by implementing the method on the Universal Software Radio Peripheral (USRP) platform. Our theoretical analysis, experimental and numerical evaluation have shown that the proposed IRC can fully exploit interference, and hence can significantly improve the SE of the victim IoT device compared to other existing IM methods.
随着无线通信技术的快速发展,物联网(IoT)已成为最重要的应用场景之一。由于物联网设备的高密度和有限的频谱资源,以及这些设备的小型化和可持续性要求,开发低成本干扰管理(IM)方法对于物联网的广泛应用至关重要。人们早就知道干扰会损害网络性能。由于期望的信号可能被干扰扭曲,从而在目的地被错误解码,我们认为干扰也可以有意地转换,以从干扰信号中提取期望的数据。基于这一观察,我们提出了物联网的干扰回收(IRC)。在IRC下,利用受害者物联网设备受到的干扰产生回收信号,然后由设备相关的网关发送。在回收信号的影响下,受干扰/受害物联网传输对可以从物联网设备的干扰中恢复所需的数据。我们还表明,通过合理分配用于期望信号传输的发射功率和回收信号,可以进一步优化受干扰用户的频谱效率。通过在通用软件无线电外设(USRP)平台上实现该方法,验证了IRC的可行性。我们的理论分析、实验和数值评估表明,与其他现有的IM方法相比,所提出的IRC可以充分利用干扰,因此可以显着提高受害者物联网设备的SE。
{"title":"Interference Recycling: Effective Utilization of Interference for Enhancing Data Transmission","authors":"Zhao Li;Lijuan Zhang;Chengyu Liu;Siwei Le;Jie Chen;Kang G. Shin;Zheng Yan;Jia Liu","doi":"10.1109/TMC.2024.3467339","DOIUrl":"https://doi.org/10.1109/TMC.2024.3467339","url":null,"abstract":"With the rapid development of wireless communication technologies, Internet of Things (IoT) has emerged as one of the most important application scenarios. Due to the high density of IoT devices and the limited spectrum resources, along with the miniaturization and sustainability requirements of these devices, the development of low-cost interference management (IM) methods has become crucial for widespread use of IoT. Interference has long been known to harm network performance. Since a desired signal can be distorted by interference, and thus be incorrectly decoded at the destination, we argue that interference can also be transformed intentionally to extract the desired data from interfering signal(s). Based on this observation, we propose \u0000<italic>Interference ReCycling</i>\u0000 (IRC) for the IoT. Under IRC, a recycling signal is generated using the interference a victim IoT device is subjected to, and then sent by the device’s associated gateway. Under the influence of the recycling signal, the desired data of the interfered/victim IoT transmission-pair can be recovered from the interference at the IoT device. We also show that the interfered user’s spectral efficiency (SE) with IRC can be optimized further by properly distributing the transmit power used for the desired signal’s transmission and the recycling signal. We validate the feasibility of IRC by implementing the method on the Universal Software Radio Peripheral (USRP) platform. Our theoretical analysis, experimental and numerical evaluation have shown that the proposed IRC can fully exploit interference, and hence can significantly improve the SE of the victim IoT device compared to other existing IM methods.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"859-874"},"PeriodicalIF":7.7,"publicationDate":"2024-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Coordination of Federated Learning and Inference Offloading at the Edge: A Proactive Optimization Paradigm 联邦学习和边缘推理卸载的有效协调:一种主动优化范式
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-24 DOI: 10.1109/TMC.2024.3466844
Ke Luo;Kongyange Zhao;Tao Ouyang;Xiaoxi Zhang;Zhi Zhou;Hao Wang;Xu Chen
Benefiting from hardware upgrades and deep learning techniques, more and more end devices can independently support a variety of intelligent applications. Further powered by edge computing technologies, the end-edge collaboration paradigm becomes one mainstream approach for achieving advanced edge intelligence (EI). To fully exploit the system resources, it is desirable to coordinate diverse EI services efficiently. Thus, we present a novel framework to jointly optimize the cost-performance trade-off for two distinct but typical EI services, where end devices simultaneously perform federated learning (FL) model training and conduct model inference with the assistance of edge offloading. However, balancing the long-term cost-performance trade-off is highly non-trivial, especially in the absence of knowledge of future system dynamics. Moreover, the capacity heterogeneity further increases the difficulty of service coordination among resource-limited end devices. To overcome these challenges, we first analyze the optimality of inference offloading decisions with and without FL model training and quantify their mutual effects due to local resource contention. By incorporating the loss estimation of FL training model, we then propose a novel proactive policy with theoretical guarantees, which proactively controls the stopping of FL training procedure to balance well the trade-offs between FL model performance and resource costs while fulfilling the inference performance requirements. Extensive results show the efficiency and robustness of our proposed algorithm for EI service coordination in dynamic end-edge collaboration scenarios.
得益于硬件升级和深度学习技术,越来越多的终端设备可以独立支持各种智能应用。在边缘计算技术的进一步推动下,端到端协作范式成为实现高级边缘智能(EI)的主流方法。为了充分利用系统资源,需要有效地协调各种EI服务。因此,我们提出了一个新的框架来共同优化两种不同但典型的EI服务的成本-性能权衡,其中终端设备同时执行联邦学习(FL)模型训练并在边缘卸载的帮助下进行模型推理。然而,平衡长期的成本-性能权衡是非常重要的,特别是在缺乏未来系统动力学知识的情况下。此外,容量的异构性进一步增加了资源有限的终端设备之间业务协调的难度。为了克服这些挑战,我们首先分析了有和没有FL模型训练的推理卸载决策的最优性,并量化了它们由于局部资源争用而产生的相互影响。结合FL训练模型的损失估计,提出了一种具有理论保证的主动控制FL训练过程停止的策略,在满足推理性能要求的同时,很好地平衡FL模型性能和资源成本之间的权衡。大量的实验结果表明,本文提出的算法对动态端到端协作场景下的EI服务协调具有高效和鲁棒性。
{"title":"Efficient Coordination of Federated Learning and Inference Offloading at the Edge: A Proactive Optimization Paradigm","authors":"Ke Luo;Kongyange Zhao;Tao Ouyang;Xiaoxi Zhang;Zhi Zhou;Hao Wang;Xu Chen","doi":"10.1109/TMC.2024.3466844","DOIUrl":"https://doi.org/10.1109/TMC.2024.3466844","url":null,"abstract":"Benefiting from hardware upgrades and deep learning techniques, more and more end devices can independently support a variety of intelligent applications. Further powered by edge computing technologies, the end-edge collaboration paradigm becomes one mainstream approach for achieving advanced edge intelligence (EI). To fully exploit the system resources, it is desirable to coordinate diverse EI services efficiently. Thus, we present a novel framework to jointly optimize the cost-performance trade-off for two distinct but typical EI services, where end devices simultaneously perform federated learning (FL) model training and conduct model inference with the assistance of edge offloading. However, balancing the long-term cost-performance trade-off is highly non-trivial, especially in the absence of knowledge of future system dynamics. Moreover, the capacity heterogeneity further increases the difficulty of service coordination among resource-limited end devices. To overcome these challenges, we first analyze the optimality of inference offloading decisions with and without FL model training and quantify their mutual effects due to local resource contention. By incorporating the loss estimation of FL training model, we then propose a novel proactive policy with theoretical guarantees, which proactively controls the stopping of FL training procedure to balance well the trade-offs between FL model performance and resource costs while fulfilling the inference performance requirements. Extensive results show the efficiency and robustness of our proposed algorithm for EI service coordination in dynamic end-edge collaboration scenarios.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 1","pages":"407-421"},"PeriodicalIF":7.7,"publicationDate":"2024-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142777767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-User Task Offloading in UAV-Assisted LEO Satellite Edge Computing: A Game-Theoretic Approach 无人机辅助低轨道卫星边缘计算中的多用户任务卸载:一种博弈论方法
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-24 DOI: 10.1109/TMC.2024.3465591
Ying Chen;Jie Zhao;Yuan Wu;Jiwei Huang;Xuemin Sherman Shen
Unmanned Aerial Vehicle (UAV)-assisted Low Earth Orbit (LEO) satellite edge computing (ULSE) networks can address the challenge communications issues in areas with harsh terrain and achieve global wireless coverage to provide services for mobile user devices (MUDs). This paper studies the LEO-UAV task offloading problem where MUDs compete for limited resources in the ULSE networks. We formulate the optimization problem with the goal of minimizing the cost of all MUDs while meeting resource constraint and satellite coverage time constraint. We first theoretically prove that this problem is NP-hard. We then reformulate the problem as a LEO-UAV task offloading game (LUTO-Game), and show that there is at least one Nash equilibrium solution for the LUTO-Game. We propose a joint UAV and LEO satellite task offloading (JULTO) algorithm to obtain the Nash equilibrium offloading strategy, and analyze the performance of the worst-case offloading strategy obtained by the JULTO algorithm. Finally, extensive experiments, including convergence analysis and comparison experiments, are carried out to validate the effectiveness of our JULTO algorithm.
无人机(UAV)辅助的低地球轨道(LEO)卫星边缘计算(ULSE)网络可以解决地形恶劣地区的通信问题,并实现全球无线覆盖,为移动用户设备(mud)提供服务。本文研究了多机器人在ULSE网络中争夺有限资源的低空-无人机任务卸载问题。我们以满足资源约束和卫星覆盖时间约束的情况下,使所有mud的成本最小为目标来制定优化问题。我们首先从理论上证明这个问题是np困难的。然后,我们将问题重新表述为一个LEO-UAV任务卸载博弈(LUTO-Game),并证明了LUTO-Game至少存在一个纳什均衡解。提出了一种无人机和LEO卫星联合任务卸载(JULTO)算法,以获得纳什均衡卸载策略,并分析了JULTO算法得到的最坏情况卸载策略的性能。最后,进行了大量的实验,包括收敛性分析和对比实验,验证了我们的JULTO算法的有效性。
{"title":"Multi-User Task Offloading in UAV-Assisted LEO Satellite Edge Computing: A Game-Theoretic Approach","authors":"Ying Chen;Jie Zhao;Yuan Wu;Jiwei Huang;Xuemin Sherman Shen","doi":"10.1109/TMC.2024.3465591","DOIUrl":"https://doi.org/10.1109/TMC.2024.3465591","url":null,"abstract":"Unmanned Aerial Vehicle (UAV)-assisted Low Earth Orbit (LEO) satellite edge computing (ULSE) networks can address the challenge communications issues in areas with harsh terrain and achieve global wireless coverage to provide services for mobile user devices (MUDs). This paper studies the LEO-UAV task offloading problem where MUDs compete for limited resources in the ULSE networks. We formulate the optimization problem with the goal of minimizing the cost of all MUDs while meeting resource constraint and satellite coverage time constraint. We first theoretically prove that this problem is NP-hard. We then reformulate the problem as a LEO-UAV task offloading game (LUTO-Game), and show that there is at least one Nash equilibrium solution for the LUTO-Game. We propose a joint UAV and LEO satellite task offloading (JULTO) algorithm to obtain the Nash equilibrium offloading strategy, and analyze the performance of the worst-case offloading strategy obtained by the JULTO algorithm. Finally, extensive experiments, including convergence analysis and comparison experiments, are carried out to validate the effectiveness of our JULTO algorithm.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 1","pages":"363-378"},"PeriodicalIF":7.7,"publicationDate":"2024-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142789036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum-Assisted Joint Virtual Network Function Deployment and Maximum Flow Routing for Space Information Networks 空间信息网络量子辅助联合虚拟网络功能部署与最大流量路由
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-24 DOI: 10.1109/TMC.2024.3466857
Yu Zhang;Yanmin Gong;Lei Fan;Yu Wang;Zhu Han;Yuanxiong Guo
Network function virtualization (NFV)-enabled space information network (SIN) has emerged as a promising method to facilitate global coverage and seamless service. This paper proposes a novel NFV-enabled SIN to provide end-to-end communication and computation services for ground users. Based on the multi-functional time expanded graph (MF-TEG), we jointly optimize the user association, virtual network function (VNF) deployment, and flow routing strategy (U-VNF-R) to maximize the total processed data received by users. The original problem is a mixed-integer linear program (MILP) that is intractable for classical computers. Inspired by quantum computing techniques, we propose a hybrid quantum-classical Benders’ decomposition (HQCBD) algorithm. Specifically, we convert the master problem of the Benders’ decomposition into the quadratic unconstrained binary optimization (QUBO) model and solve it with quantum computers. To further accelerate the optimization, we also design a multi-cut strategy based on the quantum advantages in parallel computing. Numerical results demonstrate the effectiveness and efficiency of the proposed algorithm and U-VNF-R scheme.
基于网络功能虚拟化(NFV)的空间信息网络(SIN)已成为实现全球覆盖和无缝服务的一种有前景的方法。本文提出了一种新型的基于nfv的sins,为地面用户提供端到端的通信和计算服务。基于多功能时间展开图(MF-TEG),共同优化用户关联、虚拟网络功能(VNF)部署和流量路由策略(U-VNF-R),使用户接收的处理数据总量最大化。原始问题是一个经典计算机难以解决的混合整数线性规划(MILP)问题。受量子计算技术的启发,我们提出了一种混合量子-经典本德尔斯分解(HQCBD)算法。具体来说,我们将Benders分解的主问题转化为二次型无约束二进制优化(QUBO)模型,并用量子计算机进行求解。为了进一步加速优化,我们还设计了一种基于并行计算中的量子优势的多切策略。数值结果验证了该算法和U-VNF-R格式的有效性和高效性。
{"title":"Quantum-Assisted Joint Virtual Network Function Deployment and Maximum Flow Routing for Space Information Networks","authors":"Yu Zhang;Yanmin Gong;Lei Fan;Yu Wang;Zhu Han;Yuanxiong Guo","doi":"10.1109/TMC.2024.3466857","DOIUrl":"https://doi.org/10.1109/TMC.2024.3466857","url":null,"abstract":"Network function virtualization (NFV)-enabled space information network (SIN) has emerged as a promising method to facilitate global coverage and seamless service. This paper proposes a novel NFV-enabled SIN to provide end-to-end communication and computation services for ground users. Based on the multi-functional time expanded graph (MF-TEG), we jointly optimize the user association, virtual network function (VNF) deployment, and flow routing strategy (U-VNF-R) to maximize the total processed data received by users. The original problem is a mixed-integer linear program (MILP) that is intractable for classical computers. Inspired by quantum computing techniques, we propose a hybrid quantum-classical Benders’ decomposition (HQCBD) algorithm. Specifically, we convert the master problem of the Benders’ decomposition into the quadratic unconstrained binary optimization (QUBO) model and solve it with quantum computers. To further accelerate the optimization, we also design a multi-cut strategy based on the quantum advantages in parallel computing. Numerical results demonstrate the effectiveness and efficiency of the proposed algorithm and U-VNF-R scheme.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"830-844"},"PeriodicalIF":7.7,"publicationDate":"2024-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model Decomposition and Reassembly for Purified Knowledge Transfer in Personalized Federated Learning 个性化联邦学习中纯化知识转移的模型分解与重组
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-23 DOI: 10.1109/TMC.2024.3466227
Jie Zhang;Song Guo;Xiaosong Ma;Wenchao Xu;Qihua Zhou;Jingcai Guo;Zicong Hong;Jun Shan
Personalized federated learning (pFL) is to collaboratively train non-identical machine learning models for different clients to adapt to their heterogeneously distributed datasets. State-of-the-art pFL approaches pay much attention on exploiting clients’ inter-similarities to facilitate the collaborative learning process, meanwhile, can barely escape from the irrelevant knowledge pooling that is inevitable during the aggregation phase, and thus hindering the optimization convergence and degrading the personalization performance. To tackle such conflicts between facilitating collaboration and promoting personalization, we propose a novel pFL framework, dubbed pFedC, to first decompose the global aggregated knowledge into several compositional branches, and then selectively reassemble the relevant branches for supporting conflicts-aware collaboration among contradictory clients. Specifically, by reconstructing each local model into a shared feature extractor and multiple decomposed task-specific classifiers, the training on each client transforms into a mutually reinforced and relatively independent multi-task learning process, which provides a new perspective for pFL. Besides, we conduct a purified knowledge aggregation mechanism via quantifying the combination weights for each client to capture clients’ common prior, as well as mitigate potential conflicts from the divergent knowledge caused by the heterogeneous data. Extensive experiments over various models and datasets demonstrate the effectiveness and superior performance of the proposed algorithm.
个性化联邦学习(pFL)是为不同的客户协同训练不相同的机器学习模型,以适应其异构分布的数据集。现有的pFL方法注重利用客户之间的相互相似性来促进协同学习过程,同时难以摆脱聚合阶段不可避免的不相关知识池,从而阻碍了优化收敛,降低了个性化性能。为了解决这种促进协作和促进个性化之间的冲突,我们提出了一种新的pFL框架,称为pFedC,它首先将全局聚合的知识分解为多个组合分支,然后有选择地重新组装相关分支,以支持冲突客户之间的冲突感知协作。具体而言,通过将每个局部模型重构为一个共享的特征提取器和多个分解的任务分类器,将每个客户端的训练转化为一个相互强化且相对独立的多任务学习过程,为pFL研究提供了新的视角。此外,我们通过量化每个客户的组合权值,建立了一种纯化的知识聚合机制,以捕获客户的共同先验,并减轻由于异构数据引起的知识分歧所带来的潜在冲突。在各种模型和数据集上的大量实验证明了该算法的有效性和优越的性能。
{"title":"Model Decomposition and Reassembly for Purified Knowledge Transfer in Personalized Federated Learning","authors":"Jie Zhang;Song Guo;Xiaosong Ma;Wenchao Xu;Qihua Zhou;Jingcai Guo;Zicong Hong;Jun Shan","doi":"10.1109/TMC.2024.3466227","DOIUrl":"https://doi.org/10.1109/TMC.2024.3466227","url":null,"abstract":"Personalized federated learning (pFL) is to collaboratively train non-identical machine learning models for different clients to adapt to their heterogeneously distributed datasets. State-of-the-art pFL approaches pay much attention on exploiting clients’ inter-similarities to facilitate the collaborative learning process, meanwhile, can barely escape from the irrelevant knowledge pooling that is inevitable during the aggregation phase, and thus hindering the optimization convergence and degrading the personalization performance. To tackle such conflicts between facilitating collaboration and promoting personalization, we propose a novel pFL framework, dubbed pFedC, to first decompose the global aggregated knowledge into several compositional branches, and then selectively reassemble the relevant branches for supporting conflicts-aware collaboration among contradictory clients. Specifically, by reconstructing each local model into a shared feature extractor and multiple decomposed task-specific classifiers, the training on each client transforms into a mutually reinforced and relatively independent multi-task learning process, which provides a new perspective for pFL. Besides, we conduct a purified knowledge aggregation mechanism via quantifying the combination weights for each client to capture clients’ common prior, as well as mitigate potential conflicts from the divergent knowledge caused by the heterogeneous data. Extensive experiments over various models and datasets demonstrate the effectiveness and superior performance of the proposed algorithm.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 1","pages":"379-393"},"PeriodicalIF":7.7,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142777507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scrava: Super Resolution-Based Bandwidth-Efficient Cross-Camera Video Analytics Scrava:基于超高分辨率的带宽高效跨摄像头视频分析
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-23 DOI: 10.1109/TMC.2024.3461879
Yu Liang;Sheng Zhang;Jie Wu
Massively deployed cameras form a tightly connected network which generates video streams continuously. Benefiting from advances in computer vision, automated real-time analytics of video streams can be of practical value in various scenarios. As cameras become more dense, cross-camera video analytics has emerged. Combining video contents from multiple cameras for analytics is certainly more promising than single-camera analytics, which can realize cross-camera pedestrian tracking and cross-camera complex behavior recognition. Some works focused on optimization of cross-camera video analytic applications, but most of them ignore specific network situation between cameras and edge servers. Furthermore, most of them ignore the super resolution technique, which is proven to be a source of efficiency. In this paper, we first verify the potential gain of super resolution on cross-camera video analytic tasks. Then, we design and implement a cross-camera real-time video streaming analytic system, ${mathsf {Scrava}}$, which leverages super resolution to augment low-resolution videos and simultaneously reduce bandwidth consumption. ${mathsf {Scrava}}$ enables real-time cross-camera video analytics and enhances video segments with the SR module under poor network conditions. We take cross-camera pedestrian tracking as an example, and experimentally verifies the effectiveness of super resolution on real-time cross-camera video analytics. Compared with using low-resolution video segments, ${mathsf {Scrava}}$ can improve the F1 score by 47.16%, verifying the feasibility of exploiting super resolution to improve the performance of real-time cross-camera video analytic systems.
大量部署的摄像机形成一个紧密连接的网络,不断产生视频流。得益于计算机视觉的进步,视频流的自动实时分析可以在各种场景中具有实用价值。随着摄像头越来越密集,跨摄像头视频分析出现了。结合多个摄像机的视频内容进行分析肯定比单摄像机分析更有前景,它可以实现跨摄像机的行人跟踪和跨摄像机的复杂行为识别。一些工作侧重于跨摄像机视频分析应用的优化,但大多忽略了摄像机与边缘服务器之间的具体网络情况。此外,它们大多忽略了超分辨率技术,而超分辨率技术已被证明是效率的来源。在本文中,我们首先验证了超分辨率在跨摄像机视频分析任务中的潜在增益。然后,我们设计并实现了一个跨摄像头实时视频流分析系统${mathsf {Scrava}}$,该系统利用超分辨率来增强低分辨率视频,同时减少带宽消耗。${mathsf {Scrava}}$支持实时跨摄像头视频分析,并在恶劣网络条件下使用SR模块增强视频片段。以跨摄像机行人跟踪为例,通过实验验证了超分辨率在跨摄像机实时视频分析中的有效性。与使用低分辨率视频片段相比,${mathsf {Scrava}}$可将F1分数提高47.16%,验证了利用超分辨率提高实时跨摄像头视频分析系统性能的可行性。
{"title":"Scrava: Super Resolution-Based Bandwidth-Efficient Cross-Camera Video Analytics","authors":"Yu Liang;Sheng Zhang;Jie Wu","doi":"10.1109/TMC.2024.3461879","DOIUrl":"https://doi.org/10.1109/TMC.2024.3461879","url":null,"abstract":"Massively deployed cameras form a tightly connected network which generates video streams continuously. Benefiting from advances in computer vision, automated real-time analytics of video streams can be of practical value in various scenarios. As cameras become more dense, cross-camera video analytics has emerged. Combining video contents from multiple cameras for analytics is certainly more promising than single-camera analytics, which can realize cross-camera pedestrian tracking and cross-camera complex behavior recognition. Some works focused on optimization of cross-camera video analytic applications, but most of them ignore specific network situation between cameras and edge servers. Furthermore, most of them ignore the super resolution technique, which is proven to be a source of efficiency. In this paper, we first verify the potential gain of super resolution on cross-camera video analytic tasks. Then, we design and implement a cross-camera real-time video streaming analytic system, \u0000<inline-formula><tex-math>${mathsf {Scrava}}$</tex-math></inline-formula>\u0000, which leverages super resolution to augment low-resolution videos and simultaneously reduce bandwidth consumption. \u0000<inline-formula><tex-math>${mathsf {Scrava}}$</tex-math></inline-formula>\u0000 enables real-time cross-camera video analytics and enhances video segments with the SR module under poor network conditions. We take cross-camera pedestrian tracking as an example, and experimentally verifies the effectiveness of super resolution on real-time cross-camera video analytics. Compared with using low-resolution video segments, \u0000<inline-formula><tex-math>${mathsf {Scrava}}$</tex-math></inline-formula>\u0000 can improve the F1 score by 47.16%, verifying the feasibility of exploiting super resolution to improve the performance of real-time cross-camera video analytic systems.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 1","pages":"293-305"},"PeriodicalIF":7.7,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142789077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Echoes of Fingertip: Unveiling POS Terminal Passwords Through Wi-Fi Beamforming Feedback 指尖的回声:通过Wi-Fi波束形成反馈揭示POS终端密码
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-23 DOI: 10.1109/TMC.2024.3465564
Siyu Chen;Hongbo Jiang;Jingyang Hu;Tianyue Zheng;Mengyuan Wang;Zhu Xiao;Daibo Liu;Jun Luo
Recent years, point-of-sale (POS) terminals are no longer limited to wired connections, with many relying on Wi-Fi for data transmission. Although Wi-Fi offers the convenience of wireless connectivity, it introduces significant security vulnerabilities. This work presents a non-intrusive method for eavesdropping POS passwords via Wi-Fi sensing, named ${mathsf {BeamThief}}$. Instead of conventional Wi-Fi Channel State Information (CSI) readings, our approach employs Wi-Fi Beamforming Feedback Information (BFI) for an eavesdropping attack. Compared to CSI, which can only be extracted through intruding into the Access Point (AP) or from a limited selection of commercial Wi-Fi cards (e.g., Intel-5300), BFI readings can be more readily obtained from a broad array of commercial Wi-Fi devices. A key technological contribution of ${mathsf {BeamThief}}$ is the development of an analysis model for predicting finger motion trajectories. This model is based on the physical relationship between BFI readings and finger motion, thus eliminating the need for extensive labeled training data. Furthermore, we employ Maximum Ratio Combining (MRC) to enhance the BFI series, ensuring performance across various scenarios. We implement ${mathsf {BeamThief}}$ using everyday commercial Wi-Fi devices and conduct a series of experiments to assess the impact of this attack. Experimental results demonstrate that ${mathsf {BeamThief}}$ achieves an accuracy rate 79$%$ in inferring 6-digit POS passwords within the top-100 attempts.
近年来,销售点(POS)终端不再局限于有线连接,许多依赖Wi-Fi进行数据传输。尽管Wi-Fi提供了无线连接的便利,但它引入了重大的安全漏洞。本研究提出了一种通过Wi-Fi感应来窃听POS密码的非侵入式方法,命名为${mathsf {BeamThief}}$。与传统的Wi-Fi信道状态信息(CSI)读数不同,我们的方法采用Wi-Fi波束形成反馈信息(BFI)进行窃听攻击。CSI只能通过侵入接入点(AP)或从有限的商业Wi-Fi卡(例如,英特尔-5300)中提取,与CSI相比,BFI读数可以从广泛的商业Wi-Fi设备中更容易获得。${mathsf {BeamThief}}$的一个关键技术贡献是开发了预测手指运动轨迹的分析模型。该模型基于BFI读数和手指运动之间的物理关系,从而消除了对大量标记训练数据的需要。此外,我们采用最大比率组合(MRC)来增强BFI系列,确保在各种场景下的性能。我们使用日常商用Wi-Fi设备实现${mathsf {BeamThief}}$,并进行了一系列实验来评估这种攻击的影响。实验结果表明,${mathsf {BeamThief}}$在前100次尝试中推断6位POS密码的准确率为79$%$。
{"title":"Echoes of Fingertip: Unveiling POS Terminal Passwords Through Wi-Fi Beamforming Feedback","authors":"Siyu Chen;Hongbo Jiang;Jingyang Hu;Tianyue Zheng;Mengyuan Wang;Zhu Xiao;Daibo Liu;Jun Luo","doi":"10.1109/TMC.2024.3465564","DOIUrl":"https://doi.org/10.1109/TMC.2024.3465564","url":null,"abstract":"Recent years, point-of-sale (POS) terminals are no longer limited to wired connections, with many relying on Wi-Fi for data transmission. Although Wi-Fi offers the convenience of wireless connectivity, it introduces significant security vulnerabilities. This work presents a non-intrusive method for eavesdropping POS passwords via Wi-Fi sensing, named \u0000<inline-formula><tex-math>${mathsf {BeamThief}}$</tex-math></inline-formula>\u0000. Instead of conventional Wi-Fi Channel State Information (CSI) readings, our approach employs Wi-Fi Beamforming Feedback Information (BFI) for an eavesdropping attack. Compared to CSI, which can only be extracted through intruding into the Access Point (AP) or from a limited selection of commercial Wi-Fi cards (e.g., Intel-5300), BFI readings can be more readily obtained from a broad array of commercial Wi-Fi devices. A key technological contribution of \u0000<inline-formula><tex-math>${mathsf {BeamThief}}$</tex-math></inline-formula>\u0000 is the development of an analysis model for predicting finger motion trajectories. This model is based on the physical relationship between BFI readings and finger motion, thus eliminating the need for extensive labeled training data. Furthermore, we employ Maximum Ratio Combining (MRC) to enhance the BFI series, ensuring performance across various scenarios. We implement \u0000<inline-formula><tex-math>${mathsf {BeamThief}}$</tex-math></inline-formula>\u0000 using everyday commercial Wi-Fi devices and conduct a series of experiments to assess the impact of this attack. Experimental results demonstrate that \u0000<inline-formula><tex-math>${mathsf {BeamThief}}$</tex-math></inline-formula>\u0000 achieves an accuracy rate 79\u0000<inline-formula><tex-math>$%$</tex-math></inline-formula>\u0000 in inferring 6-digit POS passwords within the top-100 attempts.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"662-676"},"PeriodicalIF":7.7,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Mobile Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1