首页 > 最新文献

Computer Networks最新文献

英文 中文
Satellite-based positioning enhanced by quantum synchronization 通过量子同步增强卫星定位功能
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-31 DOI: 10.1016/j.comnet.2024.110734

This study focuses on the innovative field of quantum synchronization for satellite-based navigation systems including Global Navigation Satellite Systems (GNSSs) and the Non-Terrestrial Network (NTN) component of future 6G networks integrating both communication and navigation services.

By combining a four-qubit system with the theoretical approach of the Lindblad master equation, we transcend the inherent limits of standard synchronization techniques. This achievement represents a quantum leap in satellite-based positioning, highlighting the scalability and cost-effectiveness of our technique for smaller satellites. The study demonstrates the possibility of reducing synchronization errors to less than one meter, significantly improving the reliability and precision of satellite-based navigation systems.

The results of this study may contribute to the future development of both user-centric localization systems (typically GNSS systems) and network-centric localization systems (typically through the NTN component of 6G networks), leading to better positioning performance, more flexible multi-functional systems with the potential to limit both cost and size of satellites.

通过将四量子比特系统与林德布拉德主方程的理论方法相结合,我们超越了标准同步技术的固有限制。这一成果代表了卫星定位技术的质的飞跃,凸显了我们的技术对于小型卫星的可扩展性和成本效益。这项研究表明,有可能将同步误差降低到一米以下,从而显著提高星基导航系统的可靠性和精确度。这项研究的结果可能有助于未来以用户为中心的定位系统(通常是全球导航卫星系统)和以网络为中心的定位系统(通常是通过 6G 网络的 NTN 组件)的发展,从而带来更好的定位性能和更灵活的多功能系统,并有可能限制卫星的成本和尺寸。
{"title":"Satellite-based positioning enhanced by quantum synchronization","authors":"","doi":"10.1016/j.comnet.2024.110734","DOIUrl":"10.1016/j.comnet.2024.110734","url":null,"abstract":"<div><p>This study focuses on the innovative field of quantum synchronization for satellite-based navigation systems including Global Navigation Satellite Systems (GNSSs) and the Non-Terrestrial Network (NTN) component of future 6G networks integrating both communication and navigation services.</p><p>By combining a four-qubit system with the theoretical approach of the Lindblad master equation, we transcend the inherent limits of standard synchronization techniques. This achievement represents a quantum leap in satellite-based positioning, highlighting the scalability and cost-effectiveness of our technique for smaller satellites. The study demonstrates the possibility of reducing synchronization errors to less than one meter, significantly improving the reliability and precision of satellite-based navigation systems.</p><p>The results of this study may contribute to the future development of both user-centric localization systems (typically GNSS systems) and network-centric localization systems (typically through the NTN component of 6G networks), leading to better positioning performance, more flexible multi-functional systems with the potential to limit both cost and size of satellites.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1389128624005668/pdfft?md5=45618b70ef7bfbb89a30254c8f4eb34c&pid=1-s2.0-S1389128624005668-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142148189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative spatiotemporal image exploitation for datacenter traffic prediction 利用生成时空图像进行数据中心流量预测
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-30 DOI: 10.1016/j.comnet.2024.110755

The tremendous growth rate of global internet traffic in past years increases the importance of traffic prediction for network operators to ensure seamless Quality of Service (QoS) with proactive traffic engineering. Even minor anomalies in traffic management can lead to service disruptions that affect a vast user base, necessitating highly accurate traffic predictions. While recent studies have exploited Deep Learning for accurate traffic predictions, most of them have targeted mobile network traffic and they often fall short in delivering precise long-range predictions and effective spatiotemporal feature extraction from single-stream time-series data. This research addresses these limitations by proposing a Convolutional Recurrent Generative Adversarial Network (CoRe-GAN) consisting of generator and discriminator neural networks for high-accuracy traffic prediction. The generator with Convolutional Long Short-Term Memory (ConvLSTM) model effectively captures intricate features, whereas the discriminator utilizes a Convolutional Neural Network (CNN) to train the generator through feedback. Moreover, advanced training techniques like fact forcing and feature matching increase the learning convergence rate, avoid mode collapse, and amplify prediction accuracy of CoRe-GAN. The evaluation with Pangyo Network Dataset (PND) and synthetic Intrusion Detection Dataset (IDD) confirms CoRe-GAN superiority. The results show that it outperforms ConvLSTM models with an average 20% and 16% lower Mean Square Error (MSE) with PND and IDD traffic data, respectively.

近年来,全球互联网流量增长迅猛,网络运营商为确保无缝服务质量(QoS)而进行的前瞻性流量工程中,流量预测的重要性与日俱增。流量管理中的微小异常都可能导致服务中断,影响广大用户群,因此需要高精度的流量预测。虽然最近的研究利用深度学习进行了准确的流量预测,但其中大多数都是针对移动网络流量的,在提供精确的远程预测和从单流时间序列数据中进行有效的时空特征提取方面往往存在不足。本研究针对这些局限性,提出了一种由生成器和判别器神经网络组成的卷积递归生成对抗网络(CoRe-GAN),用于高精度流量预测。生成器采用卷积长短期记忆(ConvLSTM)模型,能有效捕捉复杂的特征,而判别器则利用卷积神经网络(CNN)通过反馈来训练生成器。此外,事实强迫和特征匹配等先进的训练技术提高了学习收敛速度,避免了模式崩溃,并提高了 CoRe-GAN 的预测准确性。使用 Pangyo 网络数据集(PND)和合成入侵检测数据集(IDD)进行的评估证实了 CoRe-GAN 的优越性。结果表明,在使用 PND 和 IDD 流量数据时,CoRe-GAN 优于 ConvLSTM 模型,平均平方误差 (MSE) 分别降低了 20% 和 16%。
{"title":"Generative spatiotemporal image exploitation for datacenter traffic prediction","authors":"","doi":"10.1016/j.comnet.2024.110755","DOIUrl":"10.1016/j.comnet.2024.110755","url":null,"abstract":"<div><p>The tremendous growth rate of global internet traffic in past years increases the importance of traffic prediction for network operators to ensure seamless Quality of Service (QoS) with proactive traffic engineering. Even minor anomalies in traffic management can lead to service disruptions that affect a vast user base, necessitating highly accurate traffic predictions. While recent studies have exploited Deep Learning for accurate traffic predictions, most of them have targeted mobile network traffic and they often fall short in delivering precise long-range predictions and effective spatiotemporal feature extraction from single-stream time-series data. This research addresses these limitations by proposing a Convolutional Recurrent Generative Adversarial Network (CoRe-GAN) consisting of generator and discriminator neural networks for high-accuracy traffic prediction. The generator with Convolutional Long Short-Term Memory (ConvLSTM) model effectively captures intricate features, whereas the discriminator utilizes a Convolutional Neural Network (CNN) to train the generator through feedback. Moreover, advanced training techniques like fact forcing and feature matching increase the learning convergence rate, avoid mode collapse, and amplify prediction accuracy of CoRe-GAN. The evaluation with Pangyo Network Dataset (PND) and synthetic Intrusion Detection Dataset (IDD) confirms CoRe-GAN superiority. The results show that it outperforms ConvLSTM models with an average 20% and 16% lower Mean Square Error (MSE) with PND and IDD traffic data, respectively.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142228555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BIAS: A novel secure and efficient biometric-based anonymous authentication scheme BIAS:基于生物特征的新型安全高效匿名身份验证方案
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-30 DOI: 10.1016/j.comnet.2024.110754

Currently, biometric-based authentication schemes are widely adopted in the field of online payments. Consequently, this has led to an increasing number of people becoming concerned about the privacy-preservation of their biometric data. Gunasinghe et al. presented PrivBioMTAuth, a solution for mobile phone biometric-based authentication designed to protect users’ privacy. However, the solution has drawbacks, such as its impact on the execution efficiency of the authentication protocol or its vulnerability to man-in-the-middle attacks during the authentication phase. Moreover, the user’s biometric image and the password must be revealed to the identity provider, which may raise security concerns. In this work, we present a novel secure and efficient biometric-based anonymous authentication solution with fully succinct verification and significantly lower storage and communication overhead. Different from PrivBioMTAuth, we rely on the NIZK argument given in Groth’s work to reduce the size of the anonymous identity and simplify the verification complexity. In addition, we design a high-performance protocol for conducting large-scale verification of the user’s anonymous identities. We propose an optimized multi-exponentiation argument based on Bayer et al.’s work and utilize it to ensure that a semi-trusted identity provider who seeks to access the users’ sensitive biometric information can faithfully execute the users’ identity registration protocol. The experiment results show that our proposed scheme is efficient and has privacy-preserving capabilities, and it can be applied in the resource-constrained devices.

目前,网上支付领域广泛采用基于生物特征的身份验证方案。因此,越来越多的人开始关注生物识别数据的隐私保护问题。Gunasinghe 等人提出的 PrivBioMTAuth 是一种基于手机生物识别技术的身份验证解决方案,旨在保护用户隐私。然而,该解决方案也有不足之处,例如会影响身份验证协议的执行效率,或在身份验证阶段容易受到中间人攻击。此外,用户的生物识别图像和密码必须透露给身份提供者,这可能会引发安全问题。在这项工作中,我们提出了一种新颖、安全、高效的基于生物识别技术的匿名身份验证解决方案,它具有完全简洁的验证功能,并大大降低了存储和通信开销。与 PrivBioMTAuth 不同的是,我们依靠 Groth 工作中给出的 NIZK 论证来减小匿名身份的大小并简化验证的复杂性。此外,我们还设计了一种高性能协议,用于对用户的匿名身份进行大规模验证。我们在拜尔等人的工作基础上提出了一个优化的多幂级数论证,并利用它来确保试图访问用户敏感生物识别信息的半信任身份提供商能够忠实地执行用户身份注册协议。实验结果表明,我们提出的方案既高效又能保护隐私,而且可以应用于资源受限的设备中。
{"title":"BIAS: A novel secure and efficient biometric-based anonymous authentication scheme","authors":"","doi":"10.1016/j.comnet.2024.110754","DOIUrl":"10.1016/j.comnet.2024.110754","url":null,"abstract":"<div><p>Currently, biometric-based authentication schemes are widely adopted in the field of online payments. Consequently, this has led to an increasing number of people becoming concerned about the privacy-preservation of their biometric data. Gunasinghe et al. presented PrivBioMTAuth, a solution for mobile phone biometric-based authentication designed to protect users’ privacy. However, the solution has drawbacks, such as its impact on the execution efficiency of the authentication protocol or its vulnerability to man-in-the-middle attacks during the authentication phase. Moreover, the user’s biometric image and the password must be revealed to the identity provider, which may raise security concerns. In this work, we present a novel secure and efficient biometric-based anonymous authentication solution with fully succinct verification and significantly lower storage and communication overhead. Different from PrivBioMTAuth, we rely on the NIZK argument given in Groth’s work to reduce the size of the anonymous identity and simplify the verification complexity. In addition, we design a high-performance protocol for conducting large-scale verification of the user’s anonymous identities. We propose an optimized multi-exponentiation argument based on Bayer et al.’s work and utilize it to ensure that a semi-trusted identity provider who seeks to access the users’ sensitive biometric information can faithfully execute the users’ identity registration protocol. The experiment results show that our proposed scheme is efficient and has privacy-preserving capabilities, and it can be applied in the resource-constrained devices.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142148191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PFL-DKD: Modeling decoupled knowledge fusion with distillation for improving personalized federated learning PFL-DKD:为改进个性化联合学习建立去耦合知识融合与提炼模型
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-30 DOI: 10.1016/j.comnet.2024.110758

We develop a novel framework for personalized federated learning (PFL) utilizing a decoupled version of knowledge distillation (DKD). Unlike traditional PFL methods, the proposed PFL-DKD creates a dynamically connected network among local clients and categorizes them according to their knowledge, storage, and computational capabilities. The developed decoupling of knowledge distillation into target class (TC) and latent class (LC) enables knowledge-rich clients to efficiently transfer their expertise to knowledge-poor clients. To further enhance our innovative PFL-DKD approach, we extend it to PFL-FDKD by introducing a ”logit fusion” that seamlessly aggregates knowledge and experiences from neighboring clients. Both our theoretical analyses and extensive experiments reveal that PFL-DKD outperforms existing centralized and decentralized PFL approaches, making significant strides in mitigating the challenges associated with heterogeneous data and system configurations. The details of our implementation with the codebase are in PFL-DKD.

我们开发了一种新颖的个性化联合学习(PFL)框架,利用了一种解耦版本的知识蒸馏(DKD)。与传统的 PFL 方法不同,我们提出的 PFL-DKD 在本地客户端之间创建了一个动态连接网络,并根据它们的知识、存储和计算能力对其进行分类。将知识蒸馏解耦为目标类(TC)和潜在类(LC)的做法使知识丰富的客户能够高效地将其专业知识转移给知识贫乏的客户。为了进一步增强我们的创新 PFL-DKD 方法,我们将其扩展到 PFL-FDKD,引入了 "logit 融合",无缝聚合来自相邻客户的知识和经验。我们的理论分析和大量实验都表明,PFL-DKD 优于现有的集中式和分散式 PFL 方法,在缓解与异构数据和系统配置相关的挑战方面取得了重大进展。我们的实现细节和代码库见 PFL-DKD。
{"title":"PFL-DKD: Modeling decoupled knowledge fusion with distillation for improving personalized federated learning","authors":"","doi":"10.1016/j.comnet.2024.110758","DOIUrl":"10.1016/j.comnet.2024.110758","url":null,"abstract":"<div><p>We develop a novel framework for personalized federated learning (PFL) utilizing a decoupled version of knowledge distillation (DKD). Unlike traditional PFL methods, the proposed PFL-DKD creates a dynamically connected network among local clients and categorizes them according to their knowledge, storage, and computational capabilities. The developed decoupling of knowledge distillation into target class (TC) and latent class (LC) enables knowledge-rich clients to efficiently transfer their expertise to knowledge-poor clients. To further enhance our innovative PFL-DKD approach, we extend it to PFL-FDKD by introducing a ”logit fusion” that seamlessly aggregates knowledge and experiences from neighboring clients. Both our theoretical analyses and extensive experiments reveal that PFL-DKD outperforms existing centralized and decentralized PFL approaches, making significant strides in mitigating the challenges associated with heterogeneous data and system configurations. The details of our implementation with the codebase are in <span><span>PFL-DKD</span><svg><path></path></svg></span>.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142148187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Service recommendation in JointCloud environments: An efficient regret theory-based Qos-aware approach 联合云环境中的服务推荐:基于遗憾理论的高效 Qos 感知方法
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-30 DOI: 10.1016/j.comnet.2024.110716

With the proliferation of data-intensive applications, there arises an urgent demand for a substantial amount of cloud services to meet their requirements for data analysis. This globalized yet cooperative business landscape necessitates new cooperative models across the world. JointCloud, as a novel cross-cloud cooperation computing model, takes the first step towards establishing an evolving cloud ecosystem where all cloud service providers could collaboratively serve globalized computation needs. The collaboration among various cloud service providers enhances both the availability and Quality of Services(QoS) of cloud services, enabling a cloud service provider to concurrently serve users with differentiated QoS requirements. This unique characteristic further complicates the problems of QoS-aware service recommendations, rendering conventional approaches obsolete and inefficient. Thus, there is an urgent need to improve the efficiency and effectiveness of the service recommendation method, which is of vital importance for the JointCloud environment. In this paper, we present a two-stage efficient regret theory-based service recommendation method for the JointCloud environment. In the first stage of our proposed method, we cluster the cloud service providers to reduce the choice space to improve the efficiency of cloud service recommendations. In the second stage, we meticulously identify the most appropriate services within one cluster. To enhance the overall rationality of service recommendation, we introduce a subjective and objective combined weighting method and a regret theory based ranking method. Extensive experimental results demonstrate that our approach can facilitate fast and accurate service recommendations.

随着数据密集型应用的激增,人们迫切需要大量的云服务来满足他们对数据分析的要求。这种全球化而又合作的商业格局要求在全球范围内建立新的合作模式。联合云(JointCloud)作为一种新型的跨云合作计算模式,为建立一个不断发展的云生态系统迈出了第一步,在这个生态系统中,所有云服务提供商都可以合作满足全球化的计算需求。不同云服务提供商之间的合作提高了云服务的可用性和服务质量(QoS),使云服务提供商能够同时为具有不同 QoS 要求的用户提供服务。这种独特的特性使 QoS 感知服务推荐问题变得更加复杂,使传统方法变得过时和低效。因此,迫切需要提高服务推荐方法的效率和有效性,这对联合云环境至关重要。本文针对联合云环境提出了一种基于遗憾理论的两阶段高效服务推荐方法。在所提方法的第一阶段,我们对云服务提供商进行聚类,以缩小选择空间,从而提高云服务推荐的效率。在第二阶段,我们在一个聚类中细致地找出最合适的服务。为了提高服务推荐的整体合理性,我们引入了主客观相结合的加权方法和基于后悔理论的排序方法。广泛的实验结果表明,我们的方法可以促进快速、准确的服务推荐。
{"title":"Service recommendation in JointCloud environments: An efficient regret theory-based Qos-aware approach","authors":"","doi":"10.1016/j.comnet.2024.110716","DOIUrl":"10.1016/j.comnet.2024.110716","url":null,"abstract":"<div><p>With the proliferation of data-intensive applications, there arises an urgent demand for a substantial amount of cloud services to meet their requirements for data analysis. This globalized yet cooperative business landscape necessitates new cooperative models across the world. JointCloud, as a novel cross-cloud cooperation computing model, takes the first step towards establishing an evolving cloud ecosystem where all cloud service providers could collaboratively serve globalized computation needs. The collaboration among various cloud service providers enhances both the availability and Quality of Services(QoS) of cloud services, enabling a cloud service provider to concurrently serve users with differentiated QoS requirements. This unique characteristic further complicates the problems of QoS-aware service recommendations, rendering conventional approaches obsolete and inefficient. Thus, there is an urgent need to improve the efficiency and effectiveness of the service recommendation method, which is of vital importance for the JointCloud environment. In this paper, we present a two-stage efficient regret theory-based service recommendation method for the JointCloud environment. In the first stage of our proposed method, we cluster the cloud service providers to reduce the choice space to improve the efficiency of cloud service recommendations. In the second stage, we meticulously identify the most appropriate services within one cluster. To enhance the overall rationality of service recommendation, we introduce a subjective and objective combined weighting method and a regret theory based ranking method. Extensive experimental results demonstrate that our approach can facilitate fast and accurate service recommendations.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142148185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum advantages for data transmission in future networks: An overview 量子在未来网络数据传输中的优势:概述
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-30 DOI: 10.1016/j.comnet.2024.110727

We review recent advancements in the domain of Joint Detection Receivers and Entanglement-Assisted Data transmission links with an emphasis on their potential use in future networks. Both data transmission techniques can surpass the Shannon limit by significant amounts in situations where either the number of photons per received information carrier or the number of transmitted photons per information carrier is extremely small. To obtain an advantage from shared entanglement, significant noise levels are needed as well. These fundamental constraints dictate that only certain application scenarios are of relevance to the new technology. We discuss these constraints in detail in the context of the current network architecture and stress the relation to optical computation. Based on our discussion, we go on to propose potential domains of application for the new technology.

我们回顾了联合检测接收器和纠缠辅助数据传输链路领域的最新进展,重点是它们在未来网络中的潜在用途。在每个接收信息载波的光子数或每个信息载波的传输光子数极少的情况下,这两种数据传输技术都能显著超越香农极限。要从共享纠缠中获得优势,还需要很大的噪声水平。这些基本制约因素决定了新技术只适用于某些应用场景。我们将结合当前的网络架构详细讨论这些限制因素,并强调与光计算的关系。在讨论的基础上,我们将继续提出新技术的潜在应用领域。
{"title":"Quantum advantages for data transmission in future networks: An overview","authors":"","doi":"10.1016/j.comnet.2024.110727","DOIUrl":"10.1016/j.comnet.2024.110727","url":null,"abstract":"<div><p>We review recent advancements in the domain of Joint Detection Receivers and Entanglement-Assisted Data transmission links with an emphasis on their potential use in future networks. Both data transmission techniques can surpass the Shannon limit by significant amounts in situations where either the number of photons per received information carrier or the number of transmitted photons per information carrier is extremely small. To obtain an advantage from shared entanglement, significant noise levels are needed as well. These fundamental constraints dictate that only certain application scenarios are of relevance to the new technology. We discuss these constraints in detail in the context of the current network architecture and stress the relation to optical computation. Based on our discussion, we go on to propose potential domains of application for the new technology.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1389128624005590/pdfft?md5=9e82a28ccf9d01a9534e0799198a279f&pid=1-s2.0-S1389128624005590-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DBUP: Dynamic blockchain UTXO processing for storage efficiency optimization DBUP:动态区块链UTXO处理,优化存储效率
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-28 DOI: 10.1016/j.comnet.2024.110744

In traditional blockchain systems, the Unsent Transaction Output (UTXO) dataset stores all generated UTXOs, which typically represent digital assets of the users. UTXOs can be used to track the output status of cryptocurrency transactions. However, with the development of blockchain networks, the UTXO dataset continuously increasing in scale. In the UTXO dataset, a large number of low-value UTXOs occupied huge storage space, making the blockchain dataset expanded. This impacts the running performance of the whole blockchain system. To address this issue, this paper proposes the Dynamic Blockchain UTXO Processing strategy (DBUP) for UTXO storage efficiency optimization. This strategy aims to rapidly consume the low-value UTXOs, effectively alleviating UTXO dataset expansion. Furthermore, Through improved simulated annealing (ISA) algorithm and a UTXO dynamic adjustment mechanism in DBUP, the strategy ensures that the transaction fee in the transaction process remain at a low level. The experimental evaluation indicates that our strategy can achieve the better performance against the Low Value First (LVF) and the First-In-First-Out (FIFO) strategies, enhancing the storage efficiency of blockchain systems.

在传统区块链系统中,未发送交易输出(UTXO)数据集存储所有生成的UTXO,这些UTXO通常代表用户的数字资产。UTXOs可用于跟踪加密货币交易的输出状态。然而,随着区块链网络的发展,UTXO 数据集的规模不断扩大。在UTXO数据集中,大量低价值的UTXO占据了巨大的存储空间,使得区块链数据集不断扩大。这影响了整个区块链系统的运行性能。针对这一问题,本文提出了动态区块链UTXO处理策略(DBUP),以优化UTXO存储效率。该策略旨在快速消耗低价值的UTXO,有效缓解UTXO数据集的膨胀。此外,该策略通过改进的模拟退火(ISA)算法和 DBUP 中的UTXO 动态调整机制,确保交易过程中的交易费保持在较低水平。实验评估表明,与低值优先(LVF)和先进先出(FIFO)策略相比,我们的策略可以实现更好的性能,提高区块链系统的存储效率。
{"title":"DBUP: Dynamic blockchain UTXO processing for storage efficiency optimization","authors":"","doi":"10.1016/j.comnet.2024.110744","DOIUrl":"10.1016/j.comnet.2024.110744","url":null,"abstract":"<div><p>In traditional blockchain systems, the Unsent Transaction Output (UTXO) dataset stores all generated UTXOs, which typically represent digital assets of the users. UTXOs can be used to track the output status of cryptocurrency transactions. However, with the development of blockchain networks, the UTXO dataset continuously increasing in scale. In the UTXO dataset, a large number of low-value UTXOs occupied huge storage space, making the blockchain dataset expanded. This impacts the running performance of the whole blockchain system. To address this issue, this paper proposes the Dynamic Blockchain UTXO Processing strategy (DBUP) for UTXO storage efficiency optimization. This strategy aims to rapidly consume the low-value UTXOs, effectively alleviating UTXO dataset expansion. Furthermore, Through improved simulated annealing (ISA) algorithm and a UTXO dynamic adjustment mechanism in DBUP, the strategy ensures that the transaction fee in the transaction process remain at a low level. The experimental evaluation indicates that our strategy can achieve the better performance against the Low Value First (LVF) and the First-In-First-Out (FIFO) strategies, enhancing the storage efficiency of blockchain systems.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ray tracing routing using packet reception timing in dense nanonetworks 利用密集纳米网络中的数据包接收定时进行光线追踪路由选择
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-28 DOI: 10.1016/j.comnet.2024.110753

This paper presents a novel routing method called ray tracing. The method targets wireless nanonetworks, which are networks of nanometer-sized nodes with applications in various domains such as future medicine and metamaterial. Due to their tiny size, nanonodes have quite limited resources, in particular energy, and it is crucial to use as few resources as possible. In multi-hop nanonetworks, resource consumption for routing depends on several factors, such as the number of nodes that forward packets, and the number of packets sent and received. To reduce the energy used, in the proposed ray tracing routing, only the nodes that receive duplicate packets at the same time forward them. This leads to the selection of the forwarding nodes over a quasistraight line between the source and the destination, which can bend at the edges of the network. The proposed method is a major improvement over its previous version, aiming to fix several crucial issues such as double propagation, large forwarding angle, and die-out. Moreover, the applicability of ray tracing in heterogeneous and 3D nanonetworks is also analyzed and a practical application for the protocol is proposed. Extensive simulation results demonstrate the fixing of these issues, and the superiority of the proposed improved ray tracing algorithm over other routing methods in the long and narrow nanonetworks, such as blood vessels and branches.

本文介绍了一种名为射线追踪的新型路由选择方法。无线纳米网络是由纳米级节点组成的网络,可应用于未来医学和超材料等多个领域。由于尺寸微小,纳米节点的资源非常有限,尤其是能源,因此尽可能少地使用资源至关重要。在多跳纳米网络中,路由资源消耗取决于多个因素,如转发数据包的节点数量、发送和接收数据包的数量。为了减少能耗,在所提出的光线追踪路由中,只有同时接收重复数据包的节点才会转发这些数据包。这就导致在源和目的地之间的准直线上选择转发节点,而这条直线在网络边缘可能会弯曲。与之前的方法相比,所提出的方法有了重大改进,旨在解决一些关键问题,如双重传播、大转发角度和死机等。此外,还分析了光线追踪在异构和三维纳米网络中的适用性,并提出了该协议的实际应用。广泛的仿真结果表明,在血管和分支等狭长纳米网络中,改进的光线追踪算法解决了这些问题,并优于其他路由方法。
{"title":"Ray tracing routing using packet reception timing in dense nanonetworks","authors":"","doi":"10.1016/j.comnet.2024.110753","DOIUrl":"10.1016/j.comnet.2024.110753","url":null,"abstract":"<div><p>This paper presents a novel routing method called ray tracing. The method targets wireless nanonetworks, which are networks of nanometer-sized nodes with applications in various domains such as future medicine and metamaterial. Due to their tiny size, nanonodes have quite limited resources, in particular energy, and it is crucial to use as few resources as possible. In multi-hop nanonetworks, resource consumption for routing depends on several factors, such as the number of nodes that forward packets, and the number of packets sent and received. To reduce the energy used, in the proposed ray tracing routing, only the nodes that receive duplicate packets at the same time forward them. This leads to the selection of the forwarding nodes over a quasistraight line between the source and the destination, which can bend at the edges of the network. The proposed method is a major improvement over its previous version, aiming to fix several crucial issues such as double propagation, large forwarding angle, and die-out. Moreover, the applicability of ray tracing in heterogeneous and 3D nanonetworks is also analyzed and a practical application for the protocol is proposed. Extensive simulation results demonstrate the fixing of these issues, and the superiority of the proposed improved ray tracing algorithm over other routing methods in the long and narrow nanonetworks, such as blood vessels and branches.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OTFS modulated massive MIMO with 5G NR LDPC coding: Trends, challenges and future directions 采用 5G NR LDPC 编码的 OTFS 调制大规模 MIMO:趋势、挑战和未来方向
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-26 DOI: 10.1016/j.comnet.2024.110751

This paper investigates the performance of coded massive multiple-input multiple-output (MIMO) systems utilizing Orthogonal Time Frequency and Space modulation (OTFS). Our innovative approach harnesses the power of OTFS modulation, a cutting-edge modulation technique renowned for its capacity to mitigate the detrimental effects of time-varying channels. Additionally, we introduce a comprehensive system model that incorporates the pivotal elements of channel coding and decoding The system model incorporates channel coding and decoding to improve the bit error rate and enhance the overall performance. The numerical results show that the proposed scheme outperforms existing techniques in terms of BER and spectral efficiency, especially in high-mobility scenarios. The proposed system demonstrates significant robustness against channel estimation errors and Doppler spread. This indicates that coded massive MIMO employing OTFS modulation offers a highly effective solution for future wireless communication systems. The findings highlight the potential of this approach to enhance the reliability and performance of next-generation networks.

本文研究了利用正交时频和空间调制(OTFS)的编码大规模多输入多输出(MIMO)系统的性能。我们的创新方法利用了 OTFS 调制的强大功能,这是一种尖端调制技术,因其能够减轻时变信道的不利影响而闻名。此外,我们还引入了一个综合系统模型,其中包含信道编码和解码的关键要素。数值结果表明,所提出的方案在误码率和频谱效率方面优于现有技术,尤其是在高移动性场景下。拟议系统对信道估计误差和多普勒频差具有显著的鲁棒性。这表明,采用 OTFS 调制的编码大规模 MIMO 为未来的无线通信系统提供了一种高效的解决方案。研究结果凸显了这种方法在提高下一代网络可靠性和性能方面的潜力。
{"title":"OTFS modulated massive MIMO with 5G NR LDPC coding: Trends, challenges and future directions","authors":"","doi":"10.1016/j.comnet.2024.110751","DOIUrl":"10.1016/j.comnet.2024.110751","url":null,"abstract":"<div><p>This paper investigates the performance of coded massive multiple-input multiple-output (MIMO) systems utilizing Orthogonal Time Frequency and Space modulation (OTFS). Our innovative approach harnesses the power of OTFS modulation, a cutting-edge modulation technique renowned for its capacity to mitigate the detrimental effects of time-varying channels. Additionally, we introduce a comprehensive system model that incorporates the pivotal elements of channel coding and decoding The system model incorporates channel coding and decoding to improve the bit error rate and enhance the overall performance. The numerical results show that the proposed scheme outperforms existing techniques in terms of BER and spectral efficiency, especially in high-mobility scenarios. The proposed system demonstrates significant robustness against channel estimation errors and Doppler spread. This indicates that coded massive MIMO employing OTFS modulation offers a highly effective solution for future wireless communication systems. The findings highlight the potential of this approach to enhance the reliability and performance of next-generation networks.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142122848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DDQN-SFCAG: A service function chain recovery method against network attacks in 6G networks DDQN-SFCAG:针对 6G 网络攻击的服务功能链恢复方法
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-26 DOI: 10.1016/j.comnet.2024.110748

Service Function Chain (SFC) as an effective solution can satisfy the diverse service requirements of six application scenarios in Network Function Virtualization (NFV)-enabled 6G networks. Resilience as a new key capability indicator in 6G networks puts forward higher requirements for the Quality of Service (QoS) of SFCs. In this article, we study the resilience recovery method in network attack scenarios. We make full use of the monitoring and early warning capability of the monitoring function and propose a proactive recovery method called Double Deep Q-Network based on SFC Attack Graph (DDQN-SFCAG). We fully consider the characteristics of network attacks to generate SFC attack graphs and determine the recovery strategy of SFC according to the service security requirements to provide guidance for recovery. Among them, we design three recovery modes for the recovered Virtual Network Functions (VNFs) to determine the optimal recovery strategy and avoid resource waste. We formalize the SFC recovery problem, which aims to minimize the recovery cost while meeting the recovery strategy. In order to shorten the interruption time, we use DDQN to quickly solve the recovery solution to ensure optimal recovery performance. Our extensive evaluation shows DDQN-SFCAG has excellent recovery performance in network attack scenarios and can reduce the recovery cost by at least 31% compared to the state-of-the-art methods.

服务功能链(SFC)作为一种有效的解决方案,可以满足网络功能虚拟化(NFV)支持的 6G 网络中六种应用场景的多样化服务需求。弹性作为 6G 网络新的关键能力指标,对 SFC 的服务质量(QoS)提出了更高的要求。本文研究了网络攻击场景下的弹性恢复方法。我们充分利用监测功能的监测和预警能力,提出了一种主动恢复方法--基于 SFC 攻击图的双深 Q 网络(DDQN-SFCAG)。我们充分考虑网络攻击的特点,生成 SFC 攻击图,并根据业务安全需求确定 SFC 的恢复策略,为恢复提供指导。其中,我们为被恢复的虚拟网络功能(VNF)设计了三种恢复模式,以确定最优恢复策略,避免资源浪费。我们将 SFC 恢复问题形式化,其目的是在满足恢复策略的同时使恢复成本最小化。为了缩短中断时间,我们使用 DDQN 快速求解恢复解决方案,以确保最佳恢复性能。我们的广泛评估表明,DDQN-SFCAG 在网络攻击场景下具有出色的恢复性能,与最先进的方法相比,至少能降低 31% 的恢复成本。
{"title":"DDQN-SFCAG: A service function chain recovery method against network attacks in 6G networks","authors":"","doi":"10.1016/j.comnet.2024.110748","DOIUrl":"10.1016/j.comnet.2024.110748","url":null,"abstract":"<div><p>Service Function Chain (SFC) as an effective solution can satisfy the diverse service requirements of six application scenarios in Network Function Virtualization (NFV)-enabled 6G networks. Resilience as a new key capability indicator in 6G networks puts forward higher requirements for the Quality of Service (QoS) of SFCs. In this article, we study the resilience recovery method in network attack scenarios. We make full use of the monitoring and early warning capability of the monitoring function and propose a proactive recovery method called Double Deep Q-Network based on SFC Attack Graph (DDQN-SFCAG). We fully consider the characteristics of network attacks to generate SFC attack graphs and determine the recovery strategy of SFC according to the service security requirements to provide guidance for recovery. Among them, we design three recovery modes for the recovered Virtual Network Functions (VNFs) to determine the optimal recovery strategy and avoid resource waste. We formalize the SFC recovery problem, which aims to minimize the recovery cost while meeting the recovery strategy. In order to shorten the interruption time, we use DDQN to quickly solve the recovery solution to ensure optimal recovery performance. Our extensive evaluation shows DDQN-SFCAG has excellent recovery performance in network attack scenarios and can reduce the recovery cost by at least 31% compared to the state-of-the-art methods.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1