首页 > 最新文献

IEEE Transactions on Mobile Computing最新文献

英文 中文
Federated Distributionally Robust Optimization With Non-Convex Objectives: Algorithm and Analysis 具有非凸目标的联邦分布鲁棒优化:算法与分析
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-26 DOI: 10.1109/TMC.2025.3602796
Yang Jiao;Kai Yang;Dongjin Song
Distributionally Robust Optimization (DRO), which aims to find an optimal decision that minimizes the worst case cost over the ambiguity set of probability distribution, has been widely applied in diverse applications, e.g., network behavior analysis, risk management, etc. Nevertheless, prevailing DRO techniques encounter three primary challenges in distributed environments: 1) addressing asynchronous updating efficiently; 2) leveraging the prior distribution effectively; 3) appropriately adjusting the degree of robustness based on varying scenarios. To this end, we propose an asynchronous distributed algorithm, named Asynchronous Single-looP alternatIve gRadient projEction (ASPIRE) algorithm with the itErative Active SEt method (EASE) to tackle the federated distributionally robust optimization (FDRO) problem. In addition, a new uncertainty set, i.e., constrained $D$-norm uncertainty set, is developed to effectively leverage the prior distribution and flexibly control the degree of robustness. We further enhance the proposed framework by integrating various uncertainty sets and conducting a comprehensive theoretical analysis of the computational complexity associated with each uncertainty set. To expedite convergence speed, we also introduce ASPIRE-ADP, a method that can dynamically adjust the number of active workers. Finally, our theoretical analysis elucidates that the proposed algorithm is guaranteed to converge and the iteration complexity and communication complexity are also analyzed. Extensive empirical studies on real-world datasets validate that the proposed method excels not only in achieving fast convergence and robustness against data heterogeneity and malicious attacks but also in effectively managing the trade-off between robustness and performance.
分布式鲁棒优化(distributed Robust Optimization, DRO)是在概率分布的模糊集上寻找最优决策,使最坏情况下的成本最小化,已广泛应用于网络行为分析、风险管理等领域。然而,当前的DRO技术在分布式环境中遇到了三个主要挑战:1)有效地处理异步更新;2)有效利用优先分配;3)根据不同情景,适当调整鲁棒性程度。为此,我们提出了一种异步分布式算法,即基于迭代活动集方法(EASE)的异步单环可选梯度投影(ASPIRE)算法来解决联邦分布鲁棒优化(FDRO)问题。此外,为了有效地利用先验分布,灵活地控制鲁棒程度,提出了一种新的不确定性集,即约束D -范数不确定性集。我们通过整合各种不确定性集并对每个不确定性集相关的计算复杂性进行全面的理论分析,进一步增强了所提出的框架。为了加快收敛速度,我们还引入了一种动态调整活动工人数量的方法ASPIRE-ADP。最后,通过理论分析证明了算法的收敛性,并对算法的迭代复杂度和通信复杂度进行了分析。对真实数据集的大量实证研究证明,该方法不仅在实现快速收敛和对数据异构和恶意攻击的鲁棒性方面表现出色,而且在鲁棒性和性能之间进行了有效的权衡。
{"title":"Federated Distributionally Robust Optimization With Non-Convex Objectives: Algorithm and Analysis","authors":"Yang Jiao;Kai Yang;Dongjin Song","doi":"10.1109/TMC.2025.3602796","DOIUrl":"https://doi.org/10.1109/TMC.2025.3602796","url":null,"abstract":"Distributionally Robust Optimization (DRO), which aims to find an optimal decision that minimizes the worst case cost over the ambiguity set of probability distribution, has been widely applied in diverse applications, e.g., network behavior analysis, risk management, etc. Nevertheless, prevailing DRO techniques encounter three primary challenges in distributed environments: 1) addressing asynchronous updating efficiently; 2) leveraging the prior distribution effectively; 3) appropriately adjusting the degree of robustness based on varying scenarios. To this end, we propose an asynchronous distributed algorithm, named <b>A</b>synchronous <b>S</b>ingle-loo<b>P</b> alternat<b>I</b>ve g<b>R</b>adient proj<b>E</b>ction (ASPIRE) algorithm with the it<b>E</b>rative <b>A</b>ctive <b>S</b><b>E</b>t method (EASE) to tackle the federated distributionally robust optimization (FDRO) problem. In addition, a new uncertainty set, i.e., constrained <inline-formula><tex-math>$D$</tex-math></inline-formula>-norm uncertainty set, is developed to effectively leverage the prior distribution and flexibly control the degree of robustness. We further enhance the proposed framework by integrating various uncertainty sets and conducting a comprehensive theoretical analysis of the computational complexity associated with each uncertainty set. To expedite convergence speed, we also introduce ASPIRE-ADP, a method that can dynamically adjust the number of active workers. Finally, our theoretical analysis elucidates that the proposed algorithm is guaranteed to converge and the iteration complexity and communication complexity are also analyzed. Extensive empirical studies on real-world datasets validate that the proposed method excels not only in achieving fast convergence and robustness against data heterogeneity and malicious attacks but also in effectively managing the trade-off between robustness and performance.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 1","pages":"1219-1235"},"PeriodicalIF":9.2,"publicationDate":"2025-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145659195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BlueKey: Exploiting Bluetooth Low Energy for Enhanced Physical-Layer Key Generation BlueKey:利用蓝牙低功耗增强物理层密钥生成
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-25 DOI: 10.1109/TMC.2025.3602221
Yawen Zheng;Fan Dang;Zihao Yang;Jinyan Jiang;Xu Wang;Lin Wang;Kebin Liu;Xinlei Chen;Yunhao Liu
Bluetooth Low Energy (BLE) is a prevalent technology in various applications due to its low power consumption and wide device compatibility. Despite its numerous advantages, the encryption methods of BLE often expose devices to potential attacks. To fortify security, we investigate the application of Physical-layer Key Generation (PKG), a promising technology that enables devices to generate a shared secret key from their shared physical environment. Although extensively investigated, PKG is generally discussed in the context of Wi-Fi, and existing solutions for BLE demonstrate significantly lower performance. To bridge this gap, we propose a distinctive approach that capitalizes on the inherent characteristics of BLE to facilitate efficient PKG. We utilize the constant tone extension within BLE protocols to extract comprehensive physical layer information and introduce an innovative method that employs Legendre polynomial quantization for PKG. This method facilitates the exchange of secret keys with a high key matching rate and a high key generation rate. The efficacy of our approach is validated through extensive experiments on a software-defined radio platform, underscoring its potential to enhance security in the rapidly expanding field of BLE applications. A pilot study on commercial off-the-shelf BLE devices further validates the system’s practicality, revealing important trade-offs between performance and hardware constraints in real-world deployments.
低功耗蓝牙(BLE)由于其低功耗和广泛的设备兼容性,在各种应用中是一种流行的技术。尽管具有许多优点,但BLE的加密方法经常使设备暴露于潜在的攻击中。为了加强安全性,我们研究了物理层密钥生成(PKG)的应用,这是一种很有前途的技术,它使设备能够从它们的共享物理环境中生成共享密钥。尽管进行了广泛的研究,但PKG通常是在Wi-Fi的背景下讨论的,现有的BLE解决方案表现出明显较低的性能。为了弥补这一差距,我们提出了一种独特的方法,利用BLE协议的固有特性来实现高效的PKG,我们利用BLE协议中的恒音扩展来提取全面的物理层信息,并引入了一种创新的方法,将Legendre多项式量化用于PKG,该方法可以实现高密钥匹配率和高密钥生成率的密钥交换。我们的方法的有效性通过在软件定义无线电平台上的广泛实验得到验证,强调了其在快速扩展的BLE应用领域增强安全性的潜力。对商用现成BLE设备的试点研究进一步验证了系统的实用性,揭示了在实际部署中性能和硬件限制之间的重要权衡。
{"title":"BlueKey: Exploiting Bluetooth Low Energy for Enhanced Physical-Layer Key Generation","authors":"Yawen Zheng;Fan Dang;Zihao Yang;Jinyan Jiang;Xu Wang;Lin Wang;Kebin Liu;Xinlei Chen;Yunhao Liu","doi":"10.1109/TMC.2025.3602221","DOIUrl":"https://doi.org/10.1109/TMC.2025.3602221","url":null,"abstract":"Bluetooth Low Energy (BLE) is a prevalent technology in various applications due to its low power consumption and wide device compatibility. Despite its numerous advantages, the encryption methods of BLE often expose devices to potential attacks. To fortify security, we investigate the application of Physical-layer Key Generation (PKG), a promising technology that enables devices to generate a shared secret key from their shared physical environment. Although extensively investigated, PKG is generally discussed in the context of Wi-Fi, and existing solutions for BLE demonstrate significantly lower performance. To bridge this gap, we propose a distinctive approach that capitalizes on the inherent characteristics of BLE to facilitate efficient PKG. We utilize the constant tone extension within BLE protocols to extract comprehensive physical layer information and introduce an innovative method that employs Legendre polynomial quantization for PKG. This method facilitates the exchange of secret keys with a high key matching rate and a high key generation rate. The efficacy of our approach is validated through extensive experiments on a software-defined radio platform, underscoring its potential to enhance security in the rapidly expanding field of BLE applications. A pilot study on commercial off-the-shelf BLE devices further validates the system’s practicality, revealing important trade-offs between performance and hardware constraints in real-world deployments.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 1","pages":"1337-1351"},"PeriodicalIF":9.2,"publicationDate":"2025-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145659213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Provably Secure and Reliable Privacy-Preserving Authentication Scheme for Drone-to-Drone Communications in Internet of Autonomous Things 自主物联网中无人机对无人机通信可证明安全可靠的隐私保护认证方案
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-21 DOI: 10.1109/TMC.2025.3601369
Mohd Shariq;Norziana Jamil;Gopal Singh Rawat;Shehzad Ashraf Chaudhry;Mehedi Masud;Ashok Kumar Das
With the rapid advancements in wireless communication technologies, Uncrewed Aerial Vehicles (UAVs), also known as Small Uncrewed Aerial Vehicles (SUAVs) or drones, have been increasingly used in various applications, including the civilian sector. As a result, the security of SUAVs has garnered significant attention from the research community. Furthermore, drones are resource-constrained in nature and can be vulnerable to various known cybersecurity attacks over wireless communication. In light of these considerations, we propose a Provably Secure and Reliable Privacy-Preserving Authentication Scheme for Drone-to-Drone Communications in Internet of Autonomous Things (PSRS-D2D). The proposed scheme employs a secure one-way cryptographic hash and Elliptic Curve Cryptography (ECC) to accomplish a certain level of security. We provide security and privacy analysis, comparing it with competing UAV authentication schemes. This ensures that the PSRS-D2D scheme can withstand various prominent security properties, including mutual authentication and strong anonymity, and is secure against several attacks, such as replay, impersonation, and Man-In-The-Middle (MITM) attacks. We evaluated the performance of the proposed scheme in terms of computational and communicational costs. Furthermore, we conducted a formal security analysis using the Real-Or-Random (ROR) model and the Scyther simulation tools, which demonstrate that our scheme offers significant advantages in terms of security and performance.
随着无线通信技术的快速发展,无人驾驶飞行器(uav),也被称为小型无人驾驶飞行器(SUAVs)或无人机,已经越来越多地用于各种应用,包括民用领域。因此,无人机的安全性已经引起了研究界的极大关注。此外,无人机本质上是资源受限的,可能容易受到各种已知的无线通信网络安全攻击。鉴于这些考虑,我们提出了一种可证明安全可靠的自主物联网无人机对无人机通信的隐私保护认证方案(PSRS-D2D)。该方案采用安全的单向加密哈希和椭圆曲线加密(ECC)来实现一定的安全性。我们提供了安全和隐私分析,并将其与竞争的无人机认证方案进行了比较。这确保了PSRS-D2D方案能够承受各种重要的安全属性,包括相互身份验证和强匿名性,并且能够抵御多种攻击,例如重放、模拟和中间人攻击。我们在计算和通信成本方面评估了所提出方案的性能。此外,我们使用Real-Or-Random (ROR)模型和Scyther仿真工具进行了正式的安全性分析,结果表明我们的方案在安全性和性能方面具有显着优势。
{"title":"Provably Secure and Reliable Privacy-Preserving Authentication Scheme for Drone-to-Drone Communications in Internet of Autonomous Things","authors":"Mohd Shariq;Norziana Jamil;Gopal Singh Rawat;Shehzad Ashraf Chaudhry;Mehedi Masud;Ashok Kumar Das","doi":"10.1109/TMC.2025.3601369","DOIUrl":"https://doi.org/10.1109/TMC.2025.3601369","url":null,"abstract":"With the rapid advancements in wireless communication technologies, Uncrewed Aerial Vehicles (UAVs), also known as Small Uncrewed Aerial Vehicles (SUAVs) or drones, have been increasingly used in various applications, including the civilian sector. As a result, the security of SUAVs has garnered significant attention from the research community. Furthermore, drones are resource-constrained in nature and can be vulnerable to various known cybersecurity attacks over wireless communication. In light of these considerations, we propose a <underline>P</u>rovably <underline>S</u>ecure and <underline>R</u>eliable Privacy-Preserving Authentication <underline>S</u>cheme for <underline>D</u>rone-to-<underline>D</u>rone Communications in Internet of Autonomous Things (PSRS-D2D). The proposed scheme employs a secure one-way cryptographic hash and Elliptic Curve Cryptography (ECC) to accomplish a certain level of security. We provide security and privacy analysis, comparing it with competing UAV authentication schemes. This ensures that the PSRS-D2D scheme can withstand various prominent security properties, including mutual authentication and strong anonymity, and is secure against several attacks, such as replay, impersonation, and Man-In-The-Middle (MITM) attacks. We evaluated the performance of the proposed scheme in terms of computational and communicational costs. Furthermore, we conducted a formal security analysis using the Real-Or-Random (ROR) model and the Scyther simulation tools, which demonstrate that our scheme offers significant advantages in terms of security and performance.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 1","pages":"1445-1456"},"PeriodicalIF":9.2,"publicationDate":"2025-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145659209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MobiFuse: A High-Precision On-Device Depth Perception System With Multi-Data Fusion MobiFuse:具有多数据融合的高精度设备上深度感知系统
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-21 DOI: 10.1109/TMC.2025.3601357
Jinrui Zhang;Deyu Zhang;Tingting Long;Wenxin Chen;Ju Ren;Yunxin Liu;Yudong Zhao;Yaoxue Zhang;Youngki Lee
We present MobiFuse, a high-precision depth perception system on mobile devices that combines dual RGB and Time-of-Flight (ToF) cameras. To achieve this, we leverage physical principles from various environmental factors to propose the Depth Error Indication (DEI) modality, characterizing the depth error of ToF and stereo-matching. Furthermore, we employ a progressive fusion strategy, merging geometric features from ToF and stereo depth maps with depth error features from the DEI modality to create precise depth maps. Additionally, we create a new ToF-Stereo depth dataset, RealToF, to train and validate our model. Our experiments demonstrate that MobiFuse excels over baselines by significantly reducing depth measurement errors by up to 77.7%. It also showcases strong generalization across diverse datasets and proves effectiveness in two downstream tasks: 3D reconstruction and 3D segmentation.
我们提出了MobiFuse,一种在移动设备上的高精度深度感知系统,它结合了双RGB和飞行时间(ToF)相机。为了实现这一目标,我们利用各种环境因素的物理原理提出了深度误差指示(DEI)模式,表征了ToF和立体匹配的深度误差。此外,我们采用渐进融合策略,将来自ToF和立体深度图的几何特征与来自DEI模态的深度误差特征合并在一起,以创建精确的深度图。此外,我们创建了一个新的ToF-Stereo深度数据集RealToF来训练和验证我们的模型。我们的实验表明,MobiFuse通过显著降低深度测量误差高达77.7%,优于基线。它还展示了跨不同数据集的强大泛化,并证明了在两个下游任务:3D重建和3D分割中的有效性。
{"title":"MobiFuse: A High-Precision On-Device Depth Perception System With Multi-Data Fusion","authors":"Jinrui Zhang;Deyu Zhang;Tingting Long;Wenxin Chen;Ju Ren;Yunxin Liu;Yudong Zhao;Yaoxue Zhang;Youngki Lee","doi":"10.1109/TMC.2025.3601357","DOIUrl":"https://doi.org/10.1109/TMC.2025.3601357","url":null,"abstract":"We present <bold>MobiFuse</b>, a high-precision depth perception system on mobile devices that combines dual RGB and Time-of-Flight (ToF) cameras. To achieve this, we leverage physical principles from various environmental factors to propose the Depth Error Indication (DEI) modality, characterizing the depth error of ToF and stereo-matching. Furthermore, we employ a progressive fusion strategy, merging geometric features from ToF and stereo depth maps with depth error features from the DEI modality to create precise depth maps. Additionally, we create a new ToF-Stereo depth dataset, <italic>RealToF</i>, to train and validate our model. Our experiments demonstrate that <bold>MobiFuse</b> excels over baselines by significantly reducing depth measurement errors by up to 77.7%. It also showcases strong generalization across diverse datasets and proves effectiveness in two downstream tasks: 3D reconstruction and 3D segmentation.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 1","pages":"1469-1482"},"PeriodicalIF":9.2,"publicationDate":"2025-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145659206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Learning on Heterogeneous and Long-Tailed Data via Disentangled Representation 基于解纠缠表示的异构长尾数据联邦学习
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-20 DOI: 10.1109/TMC.2025.3600767
Yizhi Zhou;Junxiao Wang;Yuchen Qin;Xin Xie;Zhipeng Song;Heng Qi
Federated Learning (FL) is a popular distributed machine learning method that enables the development of a robust global model through decentralized computation and periodic model aggregation, without requiring direct access to clients’ data. However, data heterogeneity poses a significant challenge in FL, and the global long-tail distribution exacerbates this issue. While substantial research has focused on mitigating performance degradation caused by long-tailed distributions, existing methods typically concentrate on addressing discrepancies between local and global class distributions, often overlooking the fact that these discrepancies stem from variations in the data itself. To address this, we propose a novel approach, Federated Context Optimization and Feature Information Decoupling (FedDR), which generates partition strategies for each sample to extract and leverage long-tail, global, personalized, and label-text information within its features to enhance the representational distinction of tail classes. Specifically, we first design a Feature Information Decoupling module that separates global, personalized, and long-tail information within the features and incorporates this information into the loss function to strengthen the global model’s focus on personalized information in tail samples. Furthermore, to exploit the textual label information embedded in the samples, we integrate a cross-modal model, CoOp, which utilizes open-vocabulary prior knowledge, and implement dynamic knowledge distillation between the client model and CoOp to enhance the client model’s feature representation capability. Extensive experimental results on multiple benchmarks demonstrate that the proposed FedDR outperforms state-of-the-art methods in the federated long-tailed learning setting.
联邦学习(FL)是一种流行的分布式机器学习方法,它可以通过分散计算和周期性模型聚合来开发健壮的全局模型,而不需要直接访问客户端的数据。然而,数据异质性对FL提出了重大挑战,全球长尾分布加剧了这一问题。虽然大量的研究集中在减轻长尾分布导致的性能下降上,但现有的方法通常集中在解决局部和全局类分布之间的差异上,往往忽略了这些差异源于数据本身变化的事实。为了解决这个问题,我们提出了一种新的方法,联邦上下文优化和特征信息解耦(federatedcontext Optimization and Feature Information Decoupling, federdr),它为每个样本生成分区策略,以提取和利用其特征中的长尾、全局、个性化和标签文本信息,以增强尾部类的代表性区别。具体来说,我们首先设计了一个特征信息解耦模块,将特征中的全局信息、个性化信息和长尾信息分离出来,并将这些信息合并到损失函数中,以加强全局模型对尾部样本中个性化信息的关注。此外,为了挖掘样本中嵌入的文本标签信息,我们集成了一个利用开放词汇先验知识的跨模态模型CoOp,并在客户端模型和CoOp之间实现动态知识蒸馏,以增强客户端模型的特征表示能力。在多个基准上的大量实验结果表明,在联邦长尾学习设置中,所提出的FedDR优于最先进的方法。
{"title":"Federated Learning on Heterogeneous and Long-Tailed Data via Disentangled Representation","authors":"Yizhi Zhou;Junxiao Wang;Yuchen Qin;Xin Xie;Zhipeng Song;Heng Qi","doi":"10.1109/TMC.2025.3600767","DOIUrl":"https://doi.org/10.1109/TMC.2025.3600767","url":null,"abstract":"Federated Learning (FL) is a popular distributed machine learning method that enables the development of a robust global model through decentralized computation and periodic model aggregation, without requiring direct access to clients’ data. However, data heterogeneity poses a significant challenge in FL, and the global long-tail distribution exacerbates this issue. While substantial research has focused on mitigating performance degradation caused by long-tailed distributions, existing methods typically concentrate on addressing discrepancies between local and global class distributions, often overlooking the fact that these discrepancies stem from variations in the data itself. To address this, we propose a novel approach, Federated Context Optimization and Feature Information Decoupling (FedDR), which generates partition strategies for each sample to extract and leverage long-tail, global, personalized, and label-text information within its features to enhance the representational distinction of tail classes. Specifically, we first design a Feature Information Decoupling module that separates global, personalized, and long-tail information within the features and incorporates this information into the loss function to strengthen the global model’s focus on personalized information in tail samples. Furthermore, to exploit the textual label information embedded in the samples, we integrate a cross-modal model, CoOp, which utilizes open-vocabulary prior knowledge, and implement dynamic knowledge distillation between the client model and CoOp to enhance the client model’s feature representation capability. Extensive experimental results on multiple benchmarks demonstrate that the proposed FedDR outperforms state-of-the-art methods in the federated long-tailed learning setting.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 1","pages":"1367-1380"},"PeriodicalIF":9.2,"publicationDate":"2025-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145659184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inference Service Fidelity Maximization in DT-Assisted Edge Computing dt辅助边缘计算中的推理服务保真度最大化
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-19 DOI: 10.1109/TMC.2025.3600390
Jing Li;Jianping Wang;Weifa Liang;Xiaohua Jia;Albert Y. Zomaya
Digital twin (DT) technology enables smooth integrations of cyber and physical worlds in alignment with the Industry 4.0 initiative. DTs are virtual presentations of physical objects. Through synchronizations with physical objects in real-time, DTs can reflect the states of their objects with high fidelity. Orthogonal to the DT technology, mobile edge computing (MEC) is a promising computing paradigm that shifts computing power to the edge network, which is appropriate for delay-sensitive intelligent services. In this paper, we study fidelity-aware inference services in a DT-assisted MEC environment, where machine learning-based inference models must be continuously retrained using updated DT data in order to provide high-fidelity services for consumers. To this end, we first formulate two novel optimization problems: the initial DT and model placement problem with the aim of minimizing the total cost of various resources consumed for the placements, and the cumulative fidelity maximization problem to maximize the long-term cumulative fidelity of all service models while minimizing the cost of resource consumption on enhancements of service model fidelitiess over a given time horizon, through jointly scheduling mobile devices to synchronize with their DTs by uploading their update data and determining whether DTs and/or models to be migrated at each time slot. We then develop an efficient algorithm for the initial DT and model placement problem, through a reduction to a series of minimum-cost maximum matching problems in auxiliary graphs. We also devise an online algorithm with a provable competitive ratio for the cumulative fidelity maximization problem, by designing an elegant service request admission strategy. Finally, we evaluate the performance of the proposed algorithms via simulations. Simulation results demonstrate that the proposed algorithms are promising, and outperform their baselines by no less than 28%.
数字孪生(DT)技术实现了网络世界和物理世界的平滑集成,与工业4.0计划保持一致。DTs是物理对象的虚拟表示。通过与物理对象的实时同步,dt可以高保真地反映对象的状态。与DT技术正交,移动边缘计算(MEC)是一种很有前途的计算范式,它将计算能力转移到边缘网络,适合于对延迟敏感的智能业务。在本文中,我们研究了DT辅助MEC环境中的保真度感知推理服务,其中基于机器学习的推理模型必须使用更新的DT数据不断重新训练,以便为消费者提供高保真度的服务。为此,我们首先提出了两个新的优化问题:初始DT和模型放置问题的目标是最小化放置所消耗的各种资源的总成本;累积保真度最大化问题的目标是最大化所有服务模型的长期累积保真度,同时最小化在给定时间范围内增强服务模型保真度的资源消耗成本;通过上传移动设备的更新数据,并决定是否在每个时隙迁移移动设备和/或模型,共同调度移动设备与它们的移动设备同步。然后,我们通过简化辅助图中的一系列最小成本最大匹配问题,为初始DT和模型放置问题开发了一种有效的算法。通过设计一个优雅的服务请求接纳策略,我们设计了一个具有可证明竞争比的在线算法来解决累积保真度最大化问题。最后,我们通过仿真来评估所提出算法的性能。仿真结果表明,所提出的算法是有前途的,并且比其基线高出不少于28%。
{"title":"Inference Service Fidelity Maximization in DT-Assisted Edge Computing","authors":"Jing Li;Jianping Wang;Weifa Liang;Xiaohua Jia;Albert Y. Zomaya","doi":"10.1109/TMC.2025.3600390","DOIUrl":"https://doi.org/10.1109/TMC.2025.3600390","url":null,"abstract":"Digital twin (DT) technology enables smooth integrations of cyber and physical worlds in alignment with the Industry 4.0 initiative. DTs are virtual presentations of physical objects. Through synchronizations with physical objects in real-time, DTs can reflect the states of their objects with high fidelity. Orthogonal to the DT technology, mobile edge computing (MEC) is a promising computing paradigm that shifts computing power to the edge network, which is appropriate for delay-sensitive intelligent services. In this paper, we study fidelity-aware inference services in a DT-assisted MEC environment, where machine learning-based inference models must be continuously retrained using updated DT data in order to provide high-fidelity services for consumers. To this end, we first formulate two novel optimization problems: the initial DT and model placement problem with the aim of minimizing the total cost of various resources consumed for the placements, and the cumulative fidelity maximization problem to maximize the long-term cumulative fidelity of all service models while minimizing the cost of resource consumption on enhancements of service model fidelitiess over a given time horizon, through jointly scheduling mobile devices to synchronize with their DTs by uploading their update data and determining whether DTs and/or models to be migrated at each time slot. We then develop an efficient algorithm for the initial DT and model placement problem, through a reduction to a series of minimum-cost maximum matching problems in auxiliary graphs. We also devise an online algorithm with a provable competitive ratio for the cumulative fidelity maximization problem, by designing an elegant service request admission strategy. Finally, we evaluate the performance of the proposed algorithms via simulations. Simulation results demonstrate that the proposed algorithms are promising, and outperform their baselines by no less than 28%.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 1","pages":"1352-1366"},"PeriodicalIF":9.2,"publicationDate":"2025-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145659185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Secure Split Federated Semantic Learning Framework and its Optimization for Digital Twin Network Evolution 面向数字孪生网络演化的安全分离联邦语义学习框架及其优化
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-19 DOI: 10.1109/TMC.2025.3599838
Samuel D. Okegbile;Haoran Gao;Jun Cai
This paper introduces a novel secure split federated semantic learning (SFsL) framework to facilitate the maintenance and evolution of digital twin networks (DTNs). Efficiently updating and evolving DTNs generally involves several critical processes: semantic extraction and transmission for physical-to-virtual synchronization, virtual model transformation and verification, and ensuring the security and privacy of physical entity data. While conventional semantic communication frameworks can effectively address semantic extraction and transmission, the complexities of virtual model transformation, verification, and data security demand a more comprehensive approach. To address these challenges, the proposed SFsL framework integrates split federated learning with task-oriented secure semantic communication schemes. In addition, it incorporates a token-based semantic defence method to distinguish between adversarial and authentic semantic data and an asynchronous secure model aggregation mechanism to enhance data-sharing efficiency. The system reliability is then formulated as a stochastic optimization problem, aiming to minimize cost complexity while maintaining high accuracy during periodic model aggregation. Evaluation results, obtained using performance metrics such as privacy loss, experienced loss, accuracy, cost and reliability, demonstrate that the SFsL framework outperforms other commonly adopted security and privacy schemes, offering improved efficiency towards the maintenance and evolution of such dynamic systems. This highlights the capability of SFsL to enable adaptive, efficient and reliable network evolutions when deployed in practical DTNs with dynamic resource constraints.
为了促进数字孪生网络的维护和发展,提出了一种新的安全分离联邦语义学习框架。有效地更新和发展dtn通常涉及几个关键过程:物理到虚拟同步的语义提取和传输,虚拟模型转换和验证,以及确保物理实体数据的安全性和隐私性。虽然传统的语义通信框架可以有效地解决语义提取和传输问题,但虚拟模型转换、验证和数据安全的复杂性需要更全面的方法。为了应对这些挑战,提出的SFsL框架将分离联邦学习与面向任务的安全语义通信方案集成在一起。此外,它还结合了基于令牌的语义防御方法来区分敌对和真实的语义数据,并采用异步安全模型聚合机制来提高数据共享效率。然后将系统可靠性表述为一个随机优化问题,旨在最小化成本复杂性,同时在周期性模型聚合过程中保持较高的准确性。使用诸如隐私损失、经验损失、准确性、成本和可靠性等性能指标获得的评估结果表明,SFsL框架优于其他常用的安全和隐私方案,为此类动态系统的维护和发展提供了更高的效率。这突出了SFsL在具有动态资源约束的实际ddn中部署时能够实现自适应、高效和可靠的网络演进的能力。
{"title":"A Novel Secure Split Federated Semantic Learning Framework and its Optimization for Digital Twin Network Evolution","authors":"Samuel D. Okegbile;Haoran Gao;Jun Cai","doi":"10.1109/TMC.2025.3599838","DOIUrl":"https://doi.org/10.1109/TMC.2025.3599838","url":null,"abstract":"This paper introduces a novel secure split federated semantic learning (SFsL) framework to facilitate the maintenance and evolution of digital twin networks (DTNs). Efficiently updating and evolving DTNs generally involves several critical processes: semantic extraction and transmission for physical-to-virtual synchronization, virtual model transformation and verification, and ensuring the security and privacy of physical entity data. While conventional semantic communication frameworks can effectively address semantic extraction and transmission, the complexities of virtual model transformation, verification, and data security demand a more comprehensive approach. To address these challenges, the proposed SFsL framework integrates split federated learning with task-oriented secure semantic communication schemes. In addition, it incorporates a token-based semantic defence method to distinguish between adversarial and authentic semantic data and an asynchronous secure model aggregation mechanism to enhance data-sharing efficiency. The system reliability is then formulated as a stochastic optimization problem, aiming to minimize cost complexity while maintaining high accuracy during periodic model aggregation. Evaluation results, obtained using performance metrics such as privacy loss, experienced loss, accuracy, cost and reliability, demonstrate that the SFsL framework outperforms other commonly adopted security and privacy schemes, offering improved efficiency towards the maintenance and evolution of such dynamic systems. This highlights the capability of SFsL to enable adaptive, efficient and reliable network evolutions when deployed in practical DTNs with dynamic resource constraints.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 1","pages":"1302-1319"},"PeriodicalIF":9.2,"publicationDate":"2025-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145659186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Network Reliability in UASNs: A Collision-Aware Critical Node Identification Algorithm 提高usns网络可靠性:一种冲突感知关键节点识别算法
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-19 DOI: 10.1109/TMC.2025.3600460
Shanshan Song;Xiujuan Wu;Cangzhu Xu;Miao Pan;Guangjie Han
Critical node identification is essential for Underwater Acoustic Sensor Networks (UASNs) to ensure network connectivity and reliability. Existing methods identify critical nodes by evaluating their contributions to network connectivity and node communication count. However, these methods identify critical nodes inaccurately due to neglecting the influence of packet collisions, leading to unreliable network. Packet collisions disrupt connected links and cause communication failures, resulting in unreliable network connectivity and improper communication count. To this end, we propose the Collision-Aware Critical Node Identification Algorithm (CCNIA), which accounts for the impact of packet collisions to improve the accuracy of critical node identification and enhance network reliability. CCNIA identifies critical nodes with high connectivity, large collision probability, and heavy network load, through building the three following interdependent models. Specifically, Topological Connectivity Model (TCM) evaluates link reachability by analyzing connectivity and density within a node’s local network. Based on TCM, Collision Probability Model (CPM) further ensures packet reliability by quantifying the impact of packet collisions on critical node identification. Through CPM’s reliable packet transmissions, Network Load Model (NLM) assesses network efficiency by analyzing node occurrence count within global end-to-end communication paths. Experiments show that CCNIA outperforms existing methods across diverse network configurations, enhancing network reliability in terms of packet delivery ratio, delay, and energy efficiency.
关键节点识别是水声传感器网络(uasn)中保证网络连通性和可靠性的关键。现有方法通过评估关键节点对网络连通性和节点通信计数的贡献来识别关键节点。然而,这些方法由于忽略了报文冲突的影响,不能准确地识别关键节点,导致网络不可靠。报文冲突会导致已连接的链路中断,导致通信失败,从而导致网络连通性不可靠,通信计数不正确。为此,我们提出了冲突感知关键节点识别算法(CCNIA),该算法考虑了数据包冲突的影响,以提高关键节点识别的准确性,增强网络的可靠性。CCNIA通过构建以下三个相互依存的模型,识别出高连通性、大碰撞概率和高网络负载的关键节点。具体来说,拓扑连通性模型(TCM)通过分析节点本地网络的连通性和密度来评估链路的可达性。在此基础上,碰撞概率模型(CPM)通过量化报文碰撞对关键节点识别的影响,进一步保证了报文的可靠性。通过CPM的可靠数据包传输,网络负载模型(NLM)通过分析全局端到端通信路径中的节点出现次数来评估网络效率。实验表明,CCNIA在不同的网络配置中优于现有的方法,在数据包传输率、延迟和能源效率方面提高了网络的可靠性。
{"title":"Enhancing Network Reliability in UASNs: A Collision-Aware Critical Node Identification Algorithm","authors":"Shanshan Song;Xiujuan Wu;Cangzhu Xu;Miao Pan;Guangjie Han","doi":"10.1109/TMC.2025.3600460","DOIUrl":"https://doi.org/10.1109/TMC.2025.3600460","url":null,"abstract":"Critical node identification is essential for Underwater Acoustic Sensor Networks (UASNs) to ensure network connectivity and reliability. Existing methods identify critical nodes by evaluating their contributions to network connectivity and node communication count. However, these methods identify critical nodes inaccurately due to neglecting the influence of packet collisions, leading to unreliable network. Packet collisions disrupt connected links and cause communication failures, resulting in unreliable network connectivity and improper communication count. To this end, we propose the Collision-Aware Critical Node Identification Algorithm (CCNIA), which accounts for the impact of packet collisions to improve the accuracy of critical node identification and enhance network reliability. CCNIA identifies critical nodes with high connectivity, large collision probability, and heavy network load, through building the three following interdependent models. Specifically, Topological Connectivity Model (TCM) evaluates link reachability by analyzing connectivity and density within a node’s local network. Based on TCM, Collision Probability Model (CPM) further ensures packet reliability by quantifying the impact of packet collisions on critical node identification. Through CPM’s reliable packet transmissions, Network Load Model (NLM) assesses network efficiency by analyzing node occurrence count within global end-to-end communication paths. Experiments show that CCNIA outperforms existing methods across diverse network configurations, enhancing network reliability in terms of packet delivery ratio, delay, and energy efficiency.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 1","pages":"1398-1413"},"PeriodicalIF":9.2,"publicationDate":"2025-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145659196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Optimization of UAV-Carried IRS for Urban Low Altitude mmWave Communications With Deep Reinforcement Learning 基于深度强化学习的城市低空毫米波通信机载红外系统联合优化
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-19 DOI: 10.1109/TMC.2025.3600682
Wenwen Xie;Geng Sun;Bei Liu;Jiahui Li;Jiacheng Wang;Hongyang Du;Dusit Niyato;Dong In Kim
Emerging technologies in sixth generation (6G) of wireless communications, such as terahertz communication and ultra-massive multiple-input multiple-output, present promising prospects. Despite the high data rate potential of millimeter wave communications, millimeter wave (mmWave) communications in urban low altitude economy (LAE) environments are constrained by challenges such as signal attenuation and multipath interference. Specially, in urban environments, mmWave communication experiences significant attenuation due to buildings, owing to its short wavelength, which necessitates developing innovative approaches to improve the robustness of such communications in LAE networking. In this paper, we explore the use of an uncrewed aerial vehicle (UAV)-carried intelligent reflecting surface (IRS) to support low altitude mmWave communication.Specifically, we consider a typical urban low altitude communication scenario where a UAV-carried IRS establishes a line-of-sight (LoS) channel between the mobile users and a source user (SU) despite the presence of obstacles. Subsequently, we formulate an optimization problem aimed at maximizing the transmission rates and minimizing the energy consumption of the UAV by jointly optimizing phase shifts of the IRS and UAV trajectory. Given the non-convex nature of the problem and its high dynamics, we propose a deep reinforcement learning-based approach incorporating neural episodic control, long short-term memory, and an IRS phase shift control method to enhance the stability and accelerate the convergence. Simulation results show that the proposed algorithm effectively resolves the problem and surpasses other benchmark algorithms in various performances.
第六代(6G)无线通信的新兴技术,如太赫兹通信、超大规模多输入多输出等,呈现出广阔的发展前景。尽管毫米波通信具有高数据速率潜力,但城市低空经济(LAE)环境下的毫米波通信受到信号衰减和多径干扰等挑战的制约。特别是,在城市环境中,毫米波通信由于波长短,由于建筑物的影响,会出现明显的衰减,这就需要开发创新方法来提高LAE网络中此类通信的鲁棒性。在本文中,我们探索了使用无人驾驶飞行器(UAV)携带的智能反射面(IRS)来支持低空毫米波通信。具体来说,我们考虑了一个典型的城市低空通信场景,其中尽管存在障碍物,但无人机携带的IRS在移动用户和源用户(SU)之间建立了视距(LoS)通道。随后,通过联合优化IRS和无人机轨迹的相移,提出了以无人机传输速率最大化和能耗最小化为目标的优化问题。鉴于该问题的非凸性及其高动态特性,我们提出了一种基于深度强化学习的方法,该方法结合了神经情景控制、长短期记忆和IRS相移控制方法,以增强稳定性并加速收敛。仿真结果表明,该算法有效地解决了该问题,各项性能均优于其他基准算法。
{"title":"Joint Optimization of UAV-Carried IRS for Urban Low Altitude mmWave Communications With Deep Reinforcement Learning","authors":"Wenwen Xie;Geng Sun;Bei Liu;Jiahui Li;Jiacheng Wang;Hongyang Du;Dusit Niyato;Dong In Kim","doi":"10.1109/TMC.2025.3600682","DOIUrl":"https://doi.org/10.1109/TMC.2025.3600682","url":null,"abstract":"Emerging technologies in sixth generation (6G) of wireless communications, such as terahertz communication and ultra-massive multiple-input multiple-output, present promising prospects. Despite the high data rate potential of millimeter wave communications, millimeter wave (mmWave) communications in urban low altitude economy (LAE) environments are constrained by challenges such as signal attenuation and multipath interference. Specially, in urban environments, mmWave communication experiences significant attenuation due to buildings, owing to its short wavelength, which necessitates developing innovative approaches to improve the robustness of such communications in LAE networking. In this paper, we explore the use of an uncrewed aerial vehicle (UAV)-carried intelligent reflecting surface (IRS) to support low altitude mmWave communication.Specifically, we consider a typical urban low altitude communication scenario where a UAV-carried IRS establishes a line-of-sight (LoS) channel between the mobile users and a source user (SU) despite the presence of obstacles. Subsequently, we formulate an optimization problem aimed at maximizing the transmission rates and minimizing the energy consumption of the UAV by jointly optimizing phase shifts of the IRS and UAV trajectory. Given the non-convex nature of the problem and its high dynamics, we propose a deep reinforcement learning-based approach incorporating neural episodic control, long short-term memory, and an IRS phase shift control method to enhance the stability and accelerate the convergence. Simulation results show that the proposed algorithm effectively resolves the problem and surpasses other benchmark algorithms in various performances.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 1","pages":"1381-1397"},"PeriodicalIF":9.2,"publicationDate":"2025-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145659210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G-TPS: A Two-Phase Real-Time Scheduling and Adaptation Framework for 5G Radio Access Networks 5G- tps: 5G无线接入网的两阶段实时调度和自适应框架
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-19 DOI: 10.1109/TMC.2025.3599880
Tianyu Zhang;Jiachen Wang;X. Sharon Hu;Song Han
Among the many industrial wireless solution candidates, 5G New Radio (NR) has drawn significant attention in recent years due to its capabilities to support ultra-high-speed communication, wide coverage, ultra-low latency, and massive connectivity. Despite its great potential, 5G NR also brings significant complexity in scheduling data flows to meet their hard real-time requirements in industrial applications. In this paper, we first leverage a 5G RAN testbed to benchmark the downlink throughput and explore the impact of modulation and coding scheme (MCS) selection on the network performance. We then formulate a real-time flow scheduling problem in industrial 5G NR, which features per-flow real-time schedulability guarantee through time-frequency resource allocation. We propose a novel two-phase scheduling framework, named 5G-TPS, to construct a schedule that meets the deadlines of all the flows. To adapt to dynamic channel conditions, 5G-TPS enables online schedule adjustment for affected flows to meet their timing requirements. For large-scale multi-cell 5G industrial systems with cloud radio access network (C-RAN) architecture, we further introduce a user association algorithm respecting the real-time requirements of individual user equipment (UEs). Extensive experimental studies show that 5G-TPS can achieve schedulability ratios comparable to the Satisfiability Modulo Theory (SMT)-based exact solution and outperform many other state-of-the-art scheduling approaches, including the built-in 5G NR schedulers.
在众多工业无线解决方案候选中,5G新无线电(NR)近年来因其支持超高速通信、广覆盖、超低延迟和大规模连接的能力而引起了广泛关注。尽管潜力巨大,但5G NR在调度数据流方面也带来了巨大的复杂性,以满足工业应用中的硬实时性要求。在本文中,我们首先利用5G RAN测试平台对下行链路吞吐量进行基准测试,并探索调制和编码方案(MCS)选择对网络性能的影响。在此基础上,提出了工业5G NR实时流调度问题,通过时频资源分配保证每流的实时可调度性。我们提出了一种新的两阶段调度框架,称为5G-TPS,以构建满足所有流截止日期的调度。为了适应动态通道条件,5G-TPS可以对受影响的流量进行在线调度调整,以满足其时间要求。对于具有云无线接入网络(C-RAN)架构的大规模多小区5G工业系统,我们进一步引入了一种尊重单个用户设备(ue)实时性要求的用户关联算法。大量的实验研究表明,5G- tps可以实现与基于可满足模理论(SMT)的精确解决方案相当的可调度性比率,并且优于许多其他最先进的调度方法,包括内置的5G NR调度器。
{"title":"5G-TPS: A Two-Phase Real-Time Scheduling and Adaptation Framework for 5G Radio Access Networks","authors":"Tianyu Zhang;Jiachen Wang;X. Sharon Hu;Song Han","doi":"10.1109/TMC.2025.3599880","DOIUrl":"https://doi.org/10.1109/TMC.2025.3599880","url":null,"abstract":"Among the many industrial wireless solution candidates, 5G New Radio (NR) has drawn significant attention in recent years due to its capabilities to support ultra-high-speed communication, wide coverage, ultra-low latency, and massive connectivity. Despite its great potential, 5G NR also brings significant complexity in scheduling data flows to meet their hard real-time requirements in industrial applications. In this paper, we first leverage a 5G RAN testbed to benchmark the downlink throughput and explore the impact of modulation and coding scheme (MCS) selection on the network performance. We then formulate a real-time flow scheduling problem in industrial 5G NR, which features per-flow real-time schedulability guarantee through time-frequency resource allocation. We propose a novel two-phase scheduling framework, named 5G-TPS, to construct a schedule that meets the deadlines of all the flows. To adapt to dynamic channel conditions, 5G-TPS enables online schedule adjustment for affected flows to meet their timing requirements. For large-scale multi-cell 5G industrial systems with cloud radio access network (C-RAN) architecture, we further introduce a user association algorithm respecting the real-time requirements of individual user equipment (UEs). Extensive experimental studies show that 5G-TPS can achieve schedulability ratios comparable to the Satisfiability Modulo Theory (SMT)-based exact solution and outperform many other state-of-the-art scheduling approaches, including the built-in 5G NR schedulers.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 1","pages":"1320-1336"},"PeriodicalIF":9.2,"publicationDate":"2025-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145659226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Mobile Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1