首页 > 最新文献

Annals of Telecommunications最新文献

英文 中文
Performance analysis of majority-based transmit antenna selection and maximal ratio combining in MIMO-NOMA networks MIMO-NOMA网络中基于多数的发射天线选择和最大比组合性能分析
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-11-22 DOI: 10.1007/s12243-023-00998-z
Princewill Kum Kumson, Mahmoud Aldababsa, Khalid Yahya, Mahmoud Obaid, Allam Abu Mwais

Non-orthogonal multiple access (NOMA) is paramount in modern wireless communication systems since it enables efficient multiple access schemes, allowing multiple users to share the same spectrum resources and thus improving overall network capacity. Multiple-input multiple-output (MIMO) technology is crucial in wireless communication as it leverages multiple antennas to enhance data throughput, increase link reliability, and mitigate signal interference, resulting in improved communication performance. The combination of MIMO and NOMA represents a transformative synergy that harnesses the benefits of both technologies, facilitating efficient spectrum utilization, higher data rates, and improved reliability in wireless networks. This makes it particularly valuable in the fifth-generation (5G) era and beyond. This paper investigates the performance of majority-based transmit antenna selection and maximal ratio combining (TAS-maj/MRC) in MIMO-NOMA networks. We derive a closed-form expression for the exact bit error rate (BER) for binary phase shift keying (BPSK) modulation in Nakagami-m fading channels. Moreover, asymptotic expressions are obtained in the high signal-to-noise ratio (SNR) region to get further insight into the BER behavior of the system. Finally, we verify the analytical results’ accuracy through simulations. The results demonstrate that diversity and code gains are achieved. In addition, the BER performance is significantly improved as the number of receive antennas increases or channel condition enhances.

非正交多址(NOMA)在现代无线通信系统中至关重要,因为它实现了高效的多址方案,允许多个用户共享相同的频谱资源,从而提高了整体网络容量。多输入多输出(MIMO)技术在无线通信中至关重要,因为它利用多个天线来提高数据吞吐量,提高链路可靠性,减轻信号干扰,从而提高通信性能。MIMO和NOMA的结合代表了一种变革性的协同作用,它利用了两种技术的优势,促进了高效的频谱利用,提高了数据速率,提高了无线网络的可靠性。这使得它在第五代(5G)时代及以后尤其有价值。研究了MIMO-NOMA网络中基于多数的发射天线选择和最大比组合(tas - major /MRC)的性能。我们导出了在Nakagami-m衰落信道中二进制相移键控(BPSK)调制的精确误码率(BER)的封闭表达式。此外,在高信噪比(SNR)区域得到渐近表达式,进一步了解系统的误码率行为。最后,通过仿真验证了分析结果的准确性。结果表明,该方法实现了分集和码增益。此外,随着接收天线数量的增加或信道条件的改善,误码率性能得到显著提高。
{"title":"Performance analysis of majority-based transmit antenna selection and maximal ratio combining in MIMO-NOMA networks","authors":"Princewill Kum Kumson,&nbsp;Mahmoud Aldababsa,&nbsp;Khalid Yahya,&nbsp;Mahmoud Obaid,&nbsp;Allam Abu Mwais","doi":"10.1007/s12243-023-00998-z","DOIUrl":"10.1007/s12243-023-00998-z","url":null,"abstract":"<div><p>Non-orthogonal multiple access (NOMA) is paramount in modern wireless communication systems since it enables efficient multiple access schemes, allowing multiple users to share the same spectrum resources and thus improving overall network capacity. Multiple-input multiple-output (MIMO) technology is crucial in wireless communication as it leverages multiple antennas to enhance data throughput, increase link reliability, and mitigate signal interference, resulting in improved communication performance. The combination of MIMO and NOMA represents a transformative synergy that harnesses the benefits of both technologies, facilitating efficient spectrum utilization, higher data rates, and improved reliability in wireless networks. This makes it particularly valuable in the fifth-generation (5G) era and beyond. This paper investigates the performance of majority-based transmit antenna selection and maximal ratio combining (TAS-maj/MRC) in MIMO-NOMA networks. We derive a closed-form expression for the exact bit error rate (BER) for binary phase shift keying (BPSK) modulation in Nakagami-<i>m</i> fading channels. Moreover, asymptotic expressions are obtained in the high signal-to-noise ratio (SNR) region to get further insight into the BER behavior of the system. Finally, we verify the analytical results’ accuracy through simulations. The results demonstrate that diversity and code gains are achieved. In addition, the BER performance is significantly improved as the number of receive antennas increases or channel condition enhances.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 7-8","pages":"567 - 576"},"PeriodicalIF":1.8,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138503479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computing paradigms for smart farming in the era of drones: a systematic review 无人机时代智能农业的计算范式:系统回顾
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-11-18 DOI: 10.1007/s12243-023-00997-0
Sourour Dhifaoui, Chiraz Houaidia, Leila Azouz Saidane

In the current era of agricultural robotization, it is necessary to use a suitable automated data collection system for constant plant, animal, and machine monitoring. In this context, cloud computing (CC) is a well-established paradigm for building service-centric farming applications. However, the huge amount of data has put an important burden on data centers and network bandwidth and pointed out issues that cloud-based applications face such as large latency, bottlenecks because of central processing, compromised security, and lack of offline processing. Fog computing (FC), edge computing (EC), and mobile edge computing (MEC) (or flying edge computing FEC) are gaining exponential attention and becoming attractive solutions to bring CC processes within reach of users and address computation-intensive offloading and latency issues. These paradigms from cloud to mobile edge computing are already forming a unique ecosystem with different architectures, storage, and processing capabilities. The heterogeneity of this ecosystem comes with certain limitations and challenges. This paper carries out a systematic review of the latest high-quality literature and aims to identify similarities, differences, and the main use cases in the mentioned computing paradigms, particularly when using drones. Our expectation from this work is to become a good reference for researchers and help them address hot topics and challenging issues related to this scope.

在当前农业机器人化时代,有必要使用合适的自动化数据采集系统对植物、动物和机器进行持续监测。在这种情况下,云计算(CC)是构建以服务为中心的农业应用程序的成熟范例。然而,巨大的数据量给数据中心和网络带宽带来了沉重的负担,并指出了基于云的应用程序面临的问题,如大延迟、中央处理造成的瓶颈、安全性受损以及缺乏离线处理。雾计算(FC)、边缘计算(EC)和移动边缘计算(MEC)(或飞行边缘计算FEC)正获得指数级的关注,并成为有吸引力的解决方案,将CC流程带到用户触手可及的范围内,并解决计算密集型的卸载和延迟问题。从云计算到移动边缘计算,这些范式已经形成了一个独特的生态系统,具有不同的架构、存储和处理能力。这个生态系统的异质性带来了一定的限制和挑战。本文对最新的高质量文献进行了系统回顾,旨在识别上述计算范式中的异同点和主要用例,特别是在使用无人机时。我们希望这项工作能够成为研究人员的良好参考,帮助他们解决与该领域相关的热点和挑战性问题。
{"title":"Computing paradigms for smart farming in the era of drones: a systematic review","authors":"Sourour Dhifaoui,&nbsp;Chiraz Houaidia,&nbsp;Leila Azouz Saidane","doi":"10.1007/s12243-023-00997-0","DOIUrl":"10.1007/s12243-023-00997-0","url":null,"abstract":"<div><p>In the current era of agricultural robotization, it is necessary to use a suitable automated data collection system for constant plant, animal, and machine monitoring. In this context, cloud computing (CC) is a well-established paradigm for building service-centric farming applications. However, the huge amount of data has put an important burden on data centers and network bandwidth and pointed out issues that cloud-based applications face such as large latency, bottlenecks because of central processing, compromised security, and lack of offline processing. Fog computing (FC), edge computing (EC), and mobile edge computing (MEC) (or flying edge computing FEC) are gaining exponential attention and becoming attractive solutions to bring CC processes within reach of users and address computation-intensive offloading and latency issues. These paradigms from cloud to mobile edge computing are already forming a unique ecosystem with different architectures, storage, and processing capabilities. The heterogeneity of this ecosystem comes with certain limitations and challenges. This paper carries out a systematic review of the latest high-quality literature and aims to identify similarities, differences, and the main use cases in the mentioned computing paradigms, particularly when using drones. Our expectation from this work is to become a good reference for researchers and help them address hot topics and challenging issues related to this scope.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 1-2","pages":"35 - 59"},"PeriodicalIF":1.8,"publicationDate":"2023-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138503480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A lightweight, efficient, and secure identity-based authentication scheme for underwater green transport systems 用于水下绿色运输系统的轻量级、高效和安全的基于身份的验证方案
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-11-14 DOI: 10.1007/s12243-023-00999-y
Ritika Yaduvanshi, Shivendu Mishra, Nimisha Yadav, Prince Rajpoot

The underwater green transport system (UwGTs) is a network of connected, intelligent underwater sensors or Internet of Things (IoT) devices. The sensor networks used in UwGTs are distinct from traditional territorial wireless sensor networks in many ways, including their lengthy propagation delays, restricted bandwidths, and poor reliability. UwGTs would face significant security difficulties due to these unique traits. The main goal of this paper is to resolve authentication issues across the entire UwGTs network. The more significant challenge in developing an authentication scheme for UwGTs is to develop a simple, efficient, and secure system that considers the sensor nodes’ resource limitations. In light of this, we suggest an identity-based signature-based authentication scheme based on elliptic curve cryptography that enhances network lifetime by reducing sensor node energy consumption. The security of the suggested scheme has also been confirmed using a formal security assessment technique like the Random Oracle Model (ROM) and Automated Validation of Internet Security Protocols and Applications (AVISPA) software tools. In addition, the proposed scheme is more effective and lightweight regarding computation costs, communication costs, energy consumption, and comparative energy efficiency than the existing identity-based authentication schemes.

水下绿色运输系统(UwGTs)是一个由联网的智能水下传感器或物联网(IoT)设备组成的网络。UwGTs 中使用的传感器网络与传统的全域无线传感器网络有许多不同之处,包括传播延迟长、带宽受限和可靠性差。由于这些独特性,UwGT 将面临巨大的安全困难。本文的主要目标是解决整个 UwGTs 网络的身份验证问题。为 UwGTs 开发认证方案的更大挑战是开发一个简单、高效和安全的系统,同时考虑到传感器节点的资源限制。有鉴于此,我们提出了一种基于身份签名的椭圆曲线加密方案,该方案通过减少传感器节点的能耗来提高网络寿命。我们还利用随机甲骨文模型(ROM)和互联网安全协议与应用自动验证(AVISPA)软件工具等正式安全评估技术,确认了所建议方案的安全性。此外,在计算成本、通信成本、能源消耗和能效比较方面,建议的方案比现有的基于身份的认证方案更有效、更轻便。
{"title":"A lightweight, efficient, and secure identity-based authentication scheme for underwater green transport systems","authors":"Ritika Yaduvanshi,&nbsp;Shivendu Mishra,&nbsp;Nimisha Yadav,&nbsp;Prince Rajpoot","doi":"10.1007/s12243-023-00999-y","DOIUrl":"10.1007/s12243-023-00999-y","url":null,"abstract":"<div><p>The underwater green transport system (<i>UwGTs</i>) is a network of connected, intelligent underwater sensors or Internet of Things (IoT) devices. The sensor networks used in <i>UwGTs</i> are distinct from traditional territorial wireless sensor networks in many ways, including their lengthy propagation delays, restricted bandwidths, and poor reliability. <i>UwGTs</i> would face significant security difficulties due to these unique traits. The main goal of this paper is to resolve authentication issues across the entire <i>UwGTs</i> network. The more significant challenge in developing an authentication scheme for <i>UwGTs</i> is to develop a simple, efficient, and secure system that considers the sensor nodes’ resource limitations. In light of this, we suggest an identity-based signature-based authentication scheme based on elliptic curve cryptography that enhances network lifetime by reducing sensor node energy consumption. The security of the suggested scheme has also been confirmed using a formal security assessment technique like the Random Oracle Model (ROM) and Automated Validation of Internet Security Protocols and Applications (AVISPA) software tools. In addition, the proposed scheme is more effective and lightweight regarding computation costs, communication costs, energy consumption, and comparative energy efficiency than the existing identity-based authentication schemes.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 5-6","pages":"415 - 436"},"PeriodicalIF":1.8,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134991220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the capacity of multiple antenna systems 关于多天线系统的容量
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-11-13 DOI: 10.1007/s12243-023-01000-6
Omar Abu Ella

The significant role of multiple antenna techniques is vital to enable wireless systems to support the ever-rising demand for higher data rates and reliability. Thus, investigating these systems is continually important, and one of the essential aspects of this study is analyzing the capacity of such systems to gain insight into their performance. This paper presents several closed-form formulae to express the capacity of the multiple antenna system, by introducing newly derived finite and unconditionally valid solutions. It is also mathematically describing the outage probability of multiple antenna system in several scenarios. The numerical results show the tight fit between the obtained formulae and the Monte Carlo simulation outcomes.

多天线技术的重要作用是使无线系统能够支持对更高数据传输速率和可靠性不断增长的需求。因此,研究这些系统一直都很重要,而本研究的一个重要方面就是分析这些系统的容量,以深入了解其性能。本文通过引入新导出的有限且无条件有效的解,提出了几种闭式公式来表达多天线系统的容量。本文还从数学角度描述了多天线系统在几种情况下的中断概率。数值结果表明,所获得的公式与蒙特卡罗模拟结果非常吻合。
{"title":"On the capacity of multiple antenna systems","authors":"Omar Abu Ella","doi":"10.1007/s12243-023-01000-6","DOIUrl":"10.1007/s12243-023-01000-6","url":null,"abstract":"<div><p>The significant role of multiple antenna techniques is vital to enable wireless systems to support the ever-rising demand for higher data rates and reliability. Thus, investigating these systems is continually important, and one of the essential aspects of this study is analyzing the capacity of such systems to gain insight into their performance. This paper presents several closed-form formulae to express the capacity of the multiple antenna system, by introducing newly derived finite and unconditionally valid solutions. It is also mathematically describing the outage probability of multiple antenna system in several scenarios. The numerical results show the tight fit between the obtained formulae and the Monte Carlo simulation outcomes.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 5-6","pages":"437 - 446"},"PeriodicalIF":1.8,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136346344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wi-Fi faces the new wireless ecosystem: a critical review Wi-Fi 面临新的无线生态系统:批判性评论
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-11-09 DOI: 10.1007/s12243-023-00995-2
Víctor M. G. Martínez, Moisés R. N. Ribeiro, Vinícius F. S. Mota

Over the last three decades, we have become more dependent on wireless connectivity to access services and applications from nearly anywhere. The overstated emergence of the all-encompassing fifth generation (5G) of mobile systems begs the question of the future of the new generation of IEEE 802.11 (Wi-Fi) solutions. However, Wi-Fi has certain advantages compared to cellular systems in different ways: (i) a fast-paced standardization process; (ii) a diverse, agile, and highly competitive manufacturer base; and (iii) a broad base of early adopters for both office and house wireless networks. In addition, the rise of enabling technologies, such as software-defined wireless networks, may allow more robust and reliable Wi-Fi networks to bridge gaps in Wi-Fi technology to reach several vertical sectors. This review provides a technical analysis of the relationship between broadband wireless and Wi-Fi technologies. Wi-Fi has taken decisive steps with the evolution of several standards, and there is already evidence that Wi-Fi may partially (or completely) fulfill 5G’s strict service requirements. Next, we discussed the Wi-Fi and 5G convergence, which allow more control over user experiences and provide better service. This review concludes with an analysis of open challenges in the convergence of 5G and Wi-Fi systems. We conclude that Wi-Fi technology has and will continue to have a decisive role as an access technology in the new ecosystem of wireless networks.

过去三十年来,我们越来越依赖无线连接,几乎可以在任何地方访问服务和应用。全面的第五代(5G)移动系统的出现被夸大了,这不禁让人怀疑新一代 IEEE 802.11(Wi-Fi)解决方案的未来。然而,与蜂窝系统相比,Wi-Fi 在不同方面具有一定的优势:(i) 快速的标准化进程;(ii) 多样、灵活、极具竞争力的制造商基础;(iii) 广泛的办公室和家庭无线网络早期采用者基础。此外,软件定义无线网络等使能技术的兴起,可能会让更强大、更可靠的 Wi-Fi 网络弥合 Wi-Fi 技术的差距,从而覆盖多个垂直领域。本综述对宽带无线技术和 Wi-Fi 技术之间的关系进行了技术分析。随着多项标准的演进,Wi-Fi 已经迈出了决定性的一步,而且已经有证据表明,Wi-Fi 可以部分(或完全)满足 5G 的严格服务要求。接下来,我们讨论了 Wi-Fi 与 5G 的融合,这种融合允许对用户体验进行更多控制并提供更好的服务。本综述最后分析了 5G 和 Wi-Fi 系统融合过程中面临的挑战。我们的结论是,Wi-Fi 技术作为一种接入技术,已经并将继续在新的无线网络生态系统中发挥决定性作用。
{"title":"Wi-Fi faces the new wireless ecosystem: a critical review","authors":"Víctor M. G. Martínez,&nbsp;Moisés R. N. Ribeiro,&nbsp;Vinícius F. S. Mota","doi":"10.1007/s12243-023-00995-2","DOIUrl":"10.1007/s12243-023-00995-2","url":null,"abstract":"<div><p>Over the last three decades, we have become more dependent on wireless connectivity to access services and applications from nearly anywhere. The overstated emergence of the all-encompassing fifth generation (5G) of mobile systems begs the question of the future of the new generation of IEEE 802.11 (Wi-Fi) solutions. However, Wi-Fi has certain advantages compared to cellular systems in different ways: (i) a fast-paced standardization process; (ii) a diverse, agile, and highly competitive manufacturer base; and (iii) a broad base of early adopters for both office and house wireless networks. In addition, the rise of enabling technologies, such as software-defined wireless networks, may allow more robust and reliable Wi-Fi networks to bridge gaps in Wi-Fi technology to reach several vertical sectors. This review provides a technical analysis of the relationship between broadband wireless and Wi-Fi technologies. Wi-Fi has taken decisive steps with the evolution of several standards, and there is already evidence that Wi-Fi may partially (or completely) fulfill 5G’s strict service requirements. Next, we discussed the Wi-Fi and 5G convergence, which allow more control over user experiences and provide better service. This review concludes with an analysis of open challenges in the convergence of 5G and Wi-Fi systems. We conclude that Wi-Fi technology has and will continue to have a decisive role as an access technology in the new ecosystem of wireless networks.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 5-6","pages":"397 - 413"},"PeriodicalIF":1.8,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135243425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-latency remote-offloading system for accelerator 用于加速器的低延迟远程卸载系统
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-11-03 DOI: 10.1007/s12243-023-00994-3
Shogo Saito, Kei Fujimoto, Akinori Shiraga

Specific workloads are increasingly offloaded to accelerators such as a graphic processing unit (GPU) and field-programmable gate array (FPGA) for real-time processing and computing efficiency. Because accelerators are expensive and consume much power, it is desirable to increase the efficiency of accelerator utilization by sharing accelerators among multiple servers over a network. However, task offloading over a network has the problem of latency due to network processing overhead in remote offloading. This paper proposes a low-latency system for accelerator offloading over a network. To reduce the overhead of remote offloading, we propose a system composed of (1) fast recombination processing of chunked data with a simple protocol to reduce the number of memory copies, (2) polling-based packet receiving check to reduce overhead due to interrupts in interaction with a network interface card, and (3) a run-to-completion model in network processing and accelerator offloading to reduce overhead with context switching. We show that the system can improve performance by 66.40% compared with a simple implementation using kernel protocol stack and confirmed the performance improvement with a virtual radio access network use case as a low-latency application. Furthermore, we show that this performance can also be achieved in practical usage in data center networks.

为了实时处理和提高计算效率,越来越多的特定工作负载被卸载到图形处理器(GPU)和现场可编程门阵列(FPGA)等加速器上。由于加速器价格昂贵且耗电量大,通过网络在多台服务器之间共享加速器来提高加速器的利用效率是可取的。然而,通过网络卸载任务存在延迟问题,这是由于远程卸载时的网络处理开销造成的。本文提出了一种低延迟的网络加速器卸载系统。为了减少远程卸载的开销,我们提出了一个由以下部分组成的系统:(1) 采用简单的协议对分块数据进行快速重组处理,以减少内存副本的数量;(2) 基于轮询的数据包接收检查,以减少与网络接口卡交互时中断造成的开销;(3) 在网络处理和加速器卸载中采用运行到完成模型,以减少上下文切换造成的开销。我们的研究表明,与使用内核协议栈的简单实现相比,该系统的性能提高了 66.40%,并通过虚拟无线接入网络作为低延迟应用程序的使用案例证实了性能的提高。此外,我们还展示了在数据中心网络的实际应用中也能实现这一性能。
{"title":"Low-latency remote-offloading system for accelerator","authors":"Shogo Saito,&nbsp;Kei Fujimoto,&nbsp;Akinori Shiraga","doi":"10.1007/s12243-023-00994-3","DOIUrl":"10.1007/s12243-023-00994-3","url":null,"abstract":"<div><p>Specific workloads are increasingly offloaded to accelerators such as a graphic processing unit (GPU) and field-programmable gate array (FPGA) for real-time processing and computing efficiency. Because accelerators are expensive and consume much power, it is desirable to increase the efficiency of accelerator utilization by sharing accelerators among multiple servers over a network. However, task offloading over a network has the problem of latency due to network processing overhead in remote offloading. This paper proposes a low-latency system for accelerator offloading over a network. To reduce the overhead of remote offloading, we propose a system composed of (1) fast recombination processing of chunked data with a simple protocol to reduce the number of memory copies, (2) polling-based packet receiving check to reduce overhead due to interrupts in interaction with a network interface card, and (3) a run-to-completion model in network processing and accelerator offloading to reduce overhead with context switching. We show that the system can improve performance by 66.40% compared with a simple implementation using kernel protocol stack and confirmed the performance improvement with a virtual radio access network use case as a low-latency application. Furthermore, we show that this performance can also be achieved in practical usage in data center networks.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 3-4","pages":"179 - 196"},"PeriodicalIF":1.8,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-023-00994-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135869132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The role of SIC on the design of next generation multiple access SIC 对下一代多址接入设计的作用
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-10-12 DOI: 10.1007/s12243-023-00992-5
Asmad Bin Abdul Razzaque, Hassaan Khaliq Qureshi, Andrea Baiocchi

The interplay of physical layer enhancements and classic random access protocols is the objective of this paper. Successive interference cancellation (SIC) is among the major enhancements of the physical layer. Considering the classic representatives of random access protocols, Slotted ALOHA and Channel Sensing Multiple Access (CSMA), we show that two regimes can be identified as a function of the communication link spectral efficiency. In case of high levels of spectral efficiency, multi-packet reception enabled by SIC is of limited benefit. Sum-rate performance is dominated by the effectiveness of the Medium Access Control (MAC) protocol. On the contrary, for low spectral efficiency levels, sum-rate performance is essentially dependent on physical layer SIC capability, while the MAC protocol has a marginal impact. Limitations due to transmission power dynamic range are shown to induce unfairness among nodes. However, the unfairness issue fades away when the system is driven to work around the sum-rate peak achieved for low spectral efficiency. This can also be confirmed by looking at Age of Information (AoI) metric. The major finding of this work is that SIC can boost performance, while still maintaining a fair sharing of the communication channel among nodes. In this regime, the MAC protocol appears to play a marginal role, while multi-packet reception endowed by SIC is prominent to provide high sum-rate, low energy consumption, and low AoI.

物理层增强与经典随机存取协议的相互作用是本文的目标。连续干扰消除(SIC)是物理层的主要改进之一。考虑到随机接入协议的经典代表--插槽式 ALOHA 和信道感知多路访问 (CSMA),我们发现可以根据通信链路的频谱效率确定两种状态。在频谱效率较高的情况下,由 SIC 实现的多数据包接收效果有限。和速率性能主要取决于介质访问控制(MAC)协议的有效性。相反,在频谱效率较低的情况下,和速率性能基本上取决于物理层 SIC 的能力,而 MAC 协议的影响微乎其微。传输功率动态范围的限制导致了节点间的不公平。然而,当系统在低频谱效率下达到总速率峰值时,不公平问题就会消失。信息年龄(AoI)指标也证实了这一点。这项工作的主要发现是,SIC 可以提高性能,同时仍能保持节点间通信信道的公平共享。在这种情况下,MAC 协议的作用似乎微乎其微,而 SIC 赋予的多数据包接收功能则在提供高总和速率、低能耗和低 AoI 方面表现突出。
{"title":"The role of SIC on the design of next generation multiple access","authors":"Asmad Bin Abdul Razzaque,&nbsp;Hassaan Khaliq Qureshi,&nbsp;Andrea Baiocchi","doi":"10.1007/s12243-023-00992-5","DOIUrl":"10.1007/s12243-023-00992-5","url":null,"abstract":"<div><p>The interplay of physical layer enhancements and classic random access protocols is the objective of this paper. Successive interference cancellation (SIC) is among the major enhancements of the physical layer. Considering the classic representatives of random access protocols, Slotted ALOHA and Channel Sensing Multiple Access (CSMA), we show that two regimes can be identified as a function of the communication link spectral efficiency. In case of high levels of spectral efficiency, multi-packet reception enabled by SIC is of limited benefit. Sum-rate performance is dominated by the effectiveness of the Medium Access Control (MAC) protocol. On the contrary, for low spectral efficiency levels, sum-rate performance is essentially dependent on physical layer SIC capability, while the MAC protocol has a marginal impact. Limitations due to transmission power dynamic range are shown to induce unfairness among nodes. However, the unfairness issue fades away when the system is driven to work around the sum-rate peak achieved for low spectral efficiency. This can also be confirmed by looking at Age of Information (AoI) metric. The major finding of this work is that SIC can boost performance, while still maintaining a fair sharing of the communication channel among nodes. In this regime, the MAC protocol appears to play a marginal role, while multi-packet reception endowed by SIC is prominent to provide high sum-rate, low energy consumption, and low AoI.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 5-6","pages":"343 - 360"},"PeriodicalIF":1.8,"publicationDate":"2023-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-023-00992-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136012551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An approach for detecting multi-institution attacks 检测多机构攻击的方法
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-10-09 DOI: 10.1007/s12243-023-00993-4
Saif Zabarah, Omar Naman, Mohammad A. Salahuddin, Raouf Boutaba, Samer Al-Kiswany

We present Soteria, a data processing pipeline for detecting multi-institution attacks. Soteria uses a set of machine learning techniques to detect future attacks, predict their future targets, and rank attacks based on their predicted severity. Our evaluation with real data from Canada-wide academic institution networks shows that Soteria can predict future attacks with 95% recall rate, predict the next targets of an attack with 97% recall rate, and detect attacks in the first 20% of their life span. Soteria is deployed in production and is in use by tens of Canadian academic institutions that are part of the CANARIE IDS project.

我们介绍了用于检测多机构攻击的数据处理管道 Soteria。Soteria 使用一系列机器学习技术来检测未来攻击、预测未来攻击目标,并根据预测的严重程度对攻击进行排序。我们使用加拿大学术机构网络的真实数据进行的评估表明,Soteria 可以以 95% 的召回率预测未来攻击,以 97% 的召回率预测攻击的下一个目标,并在攻击生命周期的前 20% 检测到攻击。Soteria 已部署到生产中,并被 CANARIE IDS 项目中的数十家加拿大学术机构使用。
{"title":"An approach for detecting multi-institution attacks","authors":"Saif Zabarah,&nbsp;Omar Naman,&nbsp;Mohammad A. Salahuddin,&nbsp;Raouf Boutaba,&nbsp;Samer Al-Kiswany","doi":"10.1007/s12243-023-00993-4","DOIUrl":"10.1007/s12243-023-00993-4","url":null,"abstract":"<div><p>We present Soteria, a data processing pipeline for detecting multi-institution attacks. Soteria uses a set of machine learning techniques to detect future attacks, predict their future targets, and rank attacks based on their predicted severity. Our evaluation with real data from Canada-wide academic institution networks shows that Soteria can predict future attacks with 95% recall rate, predict the next targets of an attack with 97% recall rate, and detect attacks in the first 20% of their life span. Soteria is deployed in production and is in use by tens of Canadian academic institutions that are part of the CANARIE IDS project.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 3-4","pages":"257 - 270"},"PeriodicalIF":1.8,"publicationDate":"2023-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135095363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A data infrastructure for heterogeneous telemetry adaptation: application to Netflow-based cryptojacking detection 异构遥测适应数据基础设施:应用于基于 Netflow 的密码劫持检测
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-10-03 DOI: 10.1007/s12243-023-00991-6
Alejandro A. Moreno-Sancho, Antonio Pastor, Ignacio D. Martinez-Casanueva, Daniel González-Sánchez, Luis Bellido Triana

The increasing development of cryptocurrencies has brought cryptojacking as a new security threat in which attackers steal computing resources for cryptomining. The digitization of the supply chain is a potential major target for cryptojacking due to the large number of different infrastructures involved. These different infrastructures provide information sources that can be useful to detect cryptojacking, but with a wide variety of data formats and encodings. This paper describes the semantic data aggregator (SDA), a normalization and aggregation system based on data modelling and low-latency processing of data streams that facilitates the integration of heterogeneous information sources. As a use case, the paper describes a cryptomining detection system (CDS) based on network traffic flows processed by a machine learning engine. The results show how the SDA is leveraged in this use case to obtain aggregated information that improves the performance of the CDS.

加密货币的日益发展带来了加密劫持这一新的安全威胁,攻击者会窃取计算资源进行加密挖掘。由于涉及大量不同的基础设施,供应链数字化是加密劫持的潜在主要目标。这些不同的基础设施提供了有助于检测加密劫持的信息源,但其数据格式和编码却多种多样。本文介绍了语义数据聚合器(SDA),这是一种基于数据建模和低延迟数据流处理的规范化和聚合系统,有助于整合异构信息源。作为一个用例,本文介绍了基于机器学习引擎处理的网络流量的加密侦测系统(CDS)。结果表明,在该用例中如何利用 SDA 来获取汇总信息,从而提高 CDS 的性能。
{"title":"A data infrastructure for heterogeneous telemetry adaptation: application to Netflow-based cryptojacking detection","authors":"Alejandro A. Moreno-Sancho,&nbsp;Antonio Pastor,&nbsp;Ignacio D. Martinez-Casanueva,&nbsp;Daniel González-Sánchez,&nbsp;Luis Bellido Triana","doi":"10.1007/s12243-023-00991-6","DOIUrl":"10.1007/s12243-023-00991-6","url":null,"abstract":"<div><p>The increasing development of cryptocurrencies has brought cryptojacking as a new security threat in which attackers steal computing resources for cryptomining. The digitization of the supply chain is a potential major target for cryptojacking due to the large number of different infrastructures involved. These different infrastructures provide information sources that can be useful to detect cryptojacking, but with a wide variety of data formats and encodings. This paper describes the semantic data aggregator (SDA), a normalization and aggregation system based on data modelling and low-latency processing of data streams that facilitates the integration of heterogeneous information sources. As a use case, the paper describes a cryptomining detection system (CDS) based on network traffic flows processed by a machine learning engine. The results show how the SDA is leveraged in this use case to obtain aggregated information that improves the performance of the CDS.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 3-4","pages":"241 - 256"},"PeriodicalIF":1.8,"publicationDate":"2023-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135697050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep learning-based sequential models for multi-user detection with M-PSK for downlink NOMA wireless communication systems 基于深度学习的顺序模型,用于下行 NOMA 无线通信系统的 M-PSK 多用户检测
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-09-25 DOI: 10.1007/s12243-023-00990-7
Bibekananda Panda, Poonam Singh

Non-orthogonal multiple access (NOMA) techniques have the potential to achieve large connectivity requirements for future-generation wireless communication. NOMA detection techniques require conventional successive interference cancellation (SIC) techniques for uplink and downlink transmissions on the receiver side to decode the transmitted signals. Multipath fading significantly impacts the SIC process and correct signal detection due to propagation delay and fading channel. Deep learning (DL) techniques can overcome conventional SIC detection limitations. Signal detection for a multi-user NOMA wireless communication system that relies on orthogonal frequency-division multiplexing (OFDM) is discussed using various DL approaches in this paper. For multi-user signal detection, different deep learning-based sequential model neural networks, gated recurrent unit (GRU), long short-term memory (LSTM), and bi-directional long short-term memory (Bi-LSTM) are applied. The deep neural network is initially trained offline with multi-user NOMA signals in the OFDM system and used to recover transmitted signals directly. DL-based sequential models with different cyclic prefixes and fast Fourier transforms with various M-phase shift keying (M-PSK) modulation schemes are discussed with deep learning optimization algorithms. In simulation results, the conventional SIC technique with minimum mean square error approach is compared to the effectiveness of DL-based models for signal detection of multi-user NOMA systems by their bit error rate performances. The root mean square error performance of different deep learning-based sequence models with other optimizers is also discussed. Moreover, the robustness of the Bi-LSTM is evaluated with the reliability of other DL-based sequential model applications in the multi-user downlink NOMA wireless communication systems.

非正交多址(NOMA)技术有可能满足未来新一代无线通信的大量连接要求。非正交多址检测技术要求接收端采用传统的上行和下行连续干扰消除(SIC)技术来解码传输信号。由于传播延迟和衰减信道,多径衰减严重影响了 SIC 过程和正确的信号检测。深度学习(DL)技术可以克服传统 SIC 检测的局限性。本文使用各种深度学习方法讨论了依赖于正交频分复用(OFDM)的多用户 NOMA 无线通信系统的信号检测。在多用户信号检测中,应用了不同的基于深度学习的序列模型神经网络、门控递归单元(GRU)、长短期记忆(LSTM)和双向长短期记忆(Bi-LSTM)。深度神经网络最初使用 OFDM 系统中的多用户 NOMA 信号进行离线训练,然后直接用于恢复传输信号。利用深度学习优化算法讨论了基于 DL 的序列模型,该模型具有不同的循环前缀和快速傅里叶变换,并采用了各种 M 相移键控(M-PSK)调制方案。在仿真结果中,采用最小均方误差方法的传统 SIC 技术与基于 DL 的模型在多用户 NOMA 系统信号检测中的误码率性能进行了比较。此外,还讨论了基于深度学习的不同序列模型与其他优化器的均方根误差性能。此外,还评估了 Bi-LSTM 的鲁棒性与其他基于 DL 的序列模型在多用户下行 NOMA 无线通信系统中应用的可靠性。
{"title":"Deep learning-based sequential models for multi-user detection with M-PSK for downlink NOMA wireless communication systems","authors":"Bibekananda Panda,&nbsp;Poonam Singh","doi":"10.1007/s12243-023-00990-7","DOIUrl":"10.1007/s12243-023-00990-7","url":null,"abstract":"<div><p>Non-orthogonal multiple access (NOMA) techniques have the potential to achieve large connectivity requirements for future-generation wireless communication. NOMA detection techniques require conventional successive interference cancellation (SIC) techniques for uplink and downlink transmissions on the receiver side to decode the transmitted signals. Multipath fading significantly impacts the SIC process and correct signal detection due to propagation delay and fading channel. Deep learning (DL) techniques can overcome conventional SIC detection limitations. Signal detection for a multi-user NOMA wireless communication system that relies on orthogonal frequency-division multiplexing (OFDM) is discussed using various DL approaches in this paper. For multi-user signal detection, different deep learning-based sequential model neural networks, gated recurrent unit (GRU), long short-term memory (LSTM), and bi-directional long short-term memory (Bi-LSTM) are applied. The deep neural network is initially trained offline with multi-user NOMA signals in the OFDM system and used to recover transmitted signals directly. DL-based sequential models with different cyclic prefixes and fast Fourier transforms with various M-phase shift keying (M-PSK) modulation schemes are discussed with deep learning optimization algorithms. In simulation results, the conventional SIC technique with minimum mean square error approach is compared to the effectiveness of DL-based models for signal detection of multi-user NOMA systems by their bit error rate performances. The root mean square error performance of different deep learning-based sequence models with other optimizers is also discussed. Moreover, the robustness of the Bi-LSTM is evaluated with the reliability of other DL-based sequential model applications in the multi-user downlink NOMA wireless communication systems.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 5-6","pages":"327 - 341"},"PeriodicalIF":1.8,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135770455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Annals of Telecommunications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1