首页 > 最新文献

Future Internet最新文献

英文 中文
DDPG-MPCC: An Experience Driven Multipath Performance Oriented Congestion Control DDPG-MPCC:以经验为导向的多路径性能拥塞控制
Pub Date : 2024-01-23 DOI: 10.3390/fi16020037
Shiva Raj Pokhrel, Jonathan Kua, Deol Satish, Sebnem Ozer, Jeff Howe, Anwar Walid
We introduce a novel multipath data transport approach at the transport layer referred to as ‘Deep Deterministic Policy Gradient for Multipath Performance-oriented Congestion Control’ (DDPG-MPCC), which leverages deep reinforcement learning to enhance congestion management in multipath networks. Our method combines DDPG with online convex optimization to optimize fairness and performance in simultaneously challenging multipath internet congestion control scenarios. Through experiments by developing kernel implementation, we show how DDPG-MPCC performs compared to the state-of-the-art solutions.
我们在传输层引入了一种新颖的多路径数据传输方法,称为 "面向多路径性能的拥塞控制深度确定性策略梯度"(DDPG-MPCC),它利用深度强化学习来加强多路径网络的拥塞管理。我们的方法将 DDPG 与在线凸优化相结合,在同时具有挑战性的多径互联网拥塞控制场景中优化公平性和性能。通过开发内核实现的实验,我们展示了 DDPG-MPCC 与最先进解决方案相比的表现。
{"title":"DDPG-MPCC: An Experience Driven Multipath Performance Oriented Congestion Control","authors":"Shiva Raj Pokhrel, Jonathan Kua, Deol Satish, Sebnem Ozer, Jeff Howe, Anwar Walid","doi":"10.3390/fi16020037","DOIUrl":"https://doi.org/10.3390/fi16020037","url":null,"abstract":"We introduce a novel multipath data transport approach at the transport layer referred to as ‘Deep Deterministic Policy Gradient for Multipath Performance-oriented Congestion Control’ (DDPG-MPCC), which leverages deep reinforcement learning to enhance congestion management in multipath networks. Our method combines DDPG with online convex optimization to optimize fairness and performance in simultaneously challenging multipath internet congestion control scenarios. Through experiments by developing kernel implementation, we show how DDPG-MPCC performs compared to the state-of-the-art solutions.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140499227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks 全面评述物联网网络中的机器学习对抗性攻击
Pub Date : 2024-01-19 DOI: 10.3390/fi16010032
Hassan Khazane, Mohammed Ridouani, Fatima Salahdine, N. Kaabouch
With the rapid advancements and notable achievements across various application domains, Machine Learning (ML) has become a vital element within the Internet of Things (IoT) ecosystem. Among these use cases is IoT security, where numerous systems are deployed to identify or thwart attacks, including intrusion detection systems (IDSs), malware detection systems (MDSs), and device identification systems (DISs). Machine Learning-based (ML-based) IoT security systems can fulfill several security objectives, including detecting attacks, authenticating users before they gain access to the system, and categorizing suspicious activities. Nevertheless, ML faces numerous challenges, such as those resulting from the emergence of adversarial attacks crafted to mislead classifiers. This paper provides a comprehensive review of the body of knowledge about adversarial attacks and defense mechanisms, with a particular focus on three prominent IoT security systems: IDSs, MDSs, and DISs. The paper starts by establishing a taxonomy of adversarial attacks within the context of IoT. Then, various methodologies employed in the generation of adversarial attacks are described and classified within a two-dimensional framework. Additionally, we describe existing countermeasures for enhancing IoT security against adversarial attacks. Finally, we explore the most recent literature on the vulnerability of three ML-based IoT security systems to adversarial attacks.
随着机器学习(ML)在各个应用领域的快速发展和显著成就,它已成为物联网(IoT)生态系统中的一个重要元素。这些用例中包括物联网安全,其中部署了许多系统来识别或挫败攻击,包括入侵检测系统 (IDS)、恶意软件检测系统 (MDS) 和设备识别系统 (DIS)。基于机器学习(ML)的物联网安全系统可以实现多个安全目标,包括检测攻击、在用户访问系统前对其进行身份验证以及对可疑活动进行分类。然而,ML 也面临着许多挑战,例如,为误导分类器而精心设计的对抗性攻击的出现。本文全面回顾了有关对抗性攻击和防御机制的知识体系,并特别关注三个著名的物联网安全系统:IDS、MDS 和 DIS。本文首先对物联网背景下的对抗性攻击进行了分类。然后,在一个二维框架内描述了生成对抗性攻击所采用的各种方法,并对其进行了分类。此外,我们还介绍了增强物联网安全性、抵御对抗性攻击的现有对策。最后,我们探讨了三种基于 ML 的物联网安全系统在对抗性攻击面前的脆弱性的最新文献。
{"title":"A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks","authors":"Hassan Khazane, Mohammed Ridouani, Fatima Salahdine, N. Kaabouch","doi":"10.3390/fi16010032","DOIUrl":"https://doi.org/10.3390/fi16010032","url":null,"abstract":"With the rapid advancements and notable achievements across various application domains, Machine Learning (ML) has become a vital element within the Internet of Things (IoT) ecosystem. Among these use cases is IoT security, where numerous systems are deployed to identify or thwart attacks, including intrusion detection systems (IDSs), malware detection systems (MDSs), and device identification systems (DISs). Machine Learning-based (ML-based) IoT security systems can fulfill several security objectives, including detecting attacks, authenticating users before they gain access to the system, and categorizing suspicious activities. Nevertheless, ML faces numerous challenges, such as those resulting from the emergence of adversarial attacks crafted to mislead classifiers. This paper provides a comprehensive review of the body of knowledge about adversarial attacks and defense mechanisms, with a particular focus on three prominent IoT security systems: IDSs, MDSs, and DISs. The paper starts by establishing a taxonomy of adversarial attacks within the context of IoT. Then, various methodologies employed in the generation of adversarial attacks are described and classified within a two-dimensional framework. Additionally, we describe existing countermeasures for enhancing IoT security against adversarial attacks. Finally, we explore the most recent literature on the vulnerability of three ML-based IoT security systems to adversarial attacks.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139524890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of Phishing Susceptibility with Explainable Artificial Intelligence 利用可解释人工智能调查网络钓鱼的易感性
Pub Date : 2024-01-17 DOI: 10.3390/fi16010031
Zhengyang Fan, Wanru Li, Kathryn B. Laskey, Kuo-Chu Chang
Phishing attacks represent a significant and growing threat in the digital world, affecting individuals and organizations globally. Understanding the various factors that influence susceptibility to phishing is essential for developing more effective strategies to combat this pervasive cybersecurity challenge. Machine learning has become a prevalent method in the study of phishing susceptibility. Most studies in this area have taken one of two approaches: either they explore statistical associations between various factors and susceptibility, or they use complex models such as deep neural networks to predict phishing behavior. However, these approaches have limitations in terms of providing practical insights for individuals to avoid future phishing attacks and delivering personalized explanations regarding their susceptibility to phishing. In this paper, we propose a machine-learning approach that leverages explainable artificial intelligence techniques to examine the influence of human and demographic factors on susceptibility to phishing attacks. The machine learning model yielded an accuracy of 78%, with a recall of 71%, and a precision of 57%. Our analysis reveals that psychological factors such as impulsivity and conscientiousness, as well as appropriate online security habits, significantly affect an individual’s susceptibility to phishing attacks. Furthermore, our individualized case-by-case approach offers personalized recommendations on mitigating the risk of falling prey to phishing exploits, considering the specific circumstances of each individual.
网络钓鱼攻击是数字世界中一个日益严重的威胁,影响着全球的个人和组织。了解影响网络钓鱼易感性的各种因素对于制定更有效的策略来应对这一普遍存在的网络安全挑战至关重要。机器学习已成为研究网络钓鱼易感性的一种普遍方法。该领域的大多数研究都采用了两种方法中的一种:要么探索各种因素与易感性之间的统计关联,要么使用深度神经网络等复杂模型来预测网络钓鱼行为。然而,这些方法在为个人提供避免未来网络钓鱼攻击的实用见解以及提供有关其网络钓鱼易感性的个性化解释方面存在局限性。在本文中,我们提出了一种机器学习方法,利用可解释的人工智能技术来研究人类和人口因素对网络钓鱼攻击易感性的影响。机器学习模型的准确率为 78%,召回率为 71%,精确率为 57%。我们的分析表明,冲动性和自觉性等心理因素以及适当的在线安全习惯会显著影响个人对网络钓鱼攻击的易感性。此外,考虑到每个人的具体情况,我们的个性化个案分析方法可提供个性化建议,以降低遭受网络钓鱼攻击的风险。
{"title":"Investigation of Phishing Susceptibility with Explainable Artificial Intelligence","authors":"Zhengyang Fan, Wanru Li, Kathryn B. Laskey, Kuo-Chu Chang","doi":"10.3390/fi16010031","DOIUrl":"https://doi.org/10.3390/fi16010031","url":null,"abstract":"Phishing attacks represent a significant and growing threat in the digital world, affecting individuals and organizations globally. Understanding the various factors that influence susceptibility to phishing is essential for developing more effective strategies to combat this pervasive cybersecurity challenge. Machine learning has become a prevalent method in the study of phishing susceptibility. Most studies in this area have taken one of two approaches: either they explore statistical associations between various factors and susceptibility, or they use complex models such as deep neural networks to predict phishing behavior. However, these approaches have limitations in terms of providing practical insights for individuals to avoid future phishing attacks and delivering personalized explanations regarding their susceptibility to phishing. In this paper, we propose a machine-learning approach that leverages explainable artificial intelligence techniques to examine the influence of human and demographic factors on susceptibility to phishing attacks. The machine learning model yielded an accuracy of 78%, with a recall of 71%, and a precision of 57%. Our analysis reveals that psychological factors such as impulsivity and conscientiousness, as well as appropriate online security habits, significantly affect an individual’s susceptibility to phishing attacks. Furthermore, our individualized case-by-case approach offers personalized recommendations on mitigating the risk of falling prey to phishing exploits, considering the specific circumstances of each individual.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139527826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification Tendency Difference Index Model for Feature Selection and Extraction in Wireless Intrusion Detection 用于无线入侵检测中特征选择和提取的分类倾向差异指数模型
Pub Date : 2024-01-12 DOI: 10.3390/fi16010025
C. Tseng, Woei-Jiunn Tsaur, Yueh-Mao Shen
In detecting large-scale attacks, deep neural networks (DNNs) are an effective approach based on high-quality training data samples. Feature selection and feature extraction are the primary approaches for data quality enhancement for high-accuracy intrusion detection. However, their enhancement root causes usually present weak relationships to the differences between normal and attack behaviors in the data samples. Thus, we propose a Classification Tendency Difference Index (CTDI) model for feature selection and extraction in intrusion detection. The CTDI model consists of three indexes: Classification Tendency Frequency Difference (CTFD), Classification Tendency Membership Difference (CTMD), and Classification Tendency Distance Difference (CTDD). In the dataset, each feature has many feature values (FVs). In each FV, the normal and attack samples indicate the FV classification tendency, and CTDI shows the classification tendency differences between the normal and attack samples. CTFD is the frequency difference between the normal and attack samples. By employing fuzzy C means (FCM) to establish the normal and attack clusters, CTMD is the membership difference between the clusters, and CTDD is the distance difference between the cluster centers. CTDI calculates the index score in each FV and summarizes the scores of all FVs in the feature as the feature score for each of the three indexes. CTDI adopts an Auto Encoder for feature extraction to generate new features from the dataset and calculate the three index scores for the new features. CTDI sorts the original and new features for each of the three indexes to select the best features. The selected CTDI features indicate the best classification tendency differences between normal and attack samples. The experiment results demonstrate that the CTDI features achieve better detection accuracy as classified by DNN for the Aegean WiFi Intrusion Dataset than their related works, and the detection enhancements are based on the improved classification tendency differences in the CTDI features.
在检测大规模攻击时,深度神经网络(DNN)是一种基于高质量训练数据样本的有效方法。特征选择和特征提取是提高数据质量以实现高精度入侵检测的主要方法。然而,它们的增强根源通常与数据样本中正常行为和攻击行为之间的差异关系不大。因此,我们提出了一种用于入侵检测中特征选择和提取的分类倾向差异指数(CTDI)模型。CTDI 模型由三个指数组成:分类倾向频率差(CTFD)、分类倾向成员差(CTMD)和分类倾向距离差(CTDD)。在数据集中,每个特征都有许多特征值(FV)。在每个 FV 中,正常样本和攻击样本表示 FV 的分类倾向,CTDI 表示正常样本和攻击样本之间的分类倾向差异。CTFD 是正常样本和攻击样本之间的频率差异。通过使用模糊 C 平均法(FCM)建立正常样本和攻击样本聚类,CTMD 是聚类之间的成员差异,CTDD 是聚类中心之间的距离差异。CTDI 计算每个 FV 中的指数得分,并将特征中所有 FV 的得分汇总为三个指数的特征得分。CTDI 采用自动编码器进行特征提取,从数据集中生成新特征,并计算新特征的三个指数得分。CTDI 对原始特征和新特征的三个指标进行排序,选出最佳特征。选出的 CTDI 特征显示了正常样本和攻击样本之间的最佳分类倾向差异。实验结果表明,在爱琴海 WiFi 入侵数据集上,CTDI 特征经 DNN 分类后的检测准确率优于其相关作品,而检测增强正是基于 CTDI 特征改进后的分类趋势差异。
{"title":"Classification Tendency Difference Index Model for Feature Selection and Extraction in Wireless Intrusion Detection","authors":"C. Tseng, Woei-Jiunn Tsaur, Yueh-Mao Shen","doi":"10.3390/fi16010025","DOIUrl":"https://doi.org/10.3390/fi16010025","url":null,"abstract":"In detecting large-scale attacks, deep neural networks (DNNs) are an effective approach based on high-quality training data samples. Feature selection and feature extraction are the primary approaches for data quality enhancement for high-accuracy intrusion detection. However, their enhancement root causes usually present weak relationships to the differences between normal and attack behaviors in the data samples. Thus, we propose a Classification Tendency Difference Index (CTDI) model for feature selection and extraction in intrusion detection. The CTDI model consists of three indexes: Classification Tendency Frequency Difference (CTFD), Classification Tendency Membership Difference (CTMD), and Classification Tendency Distance Difference (CTDD). In the dataset, each feature has many feature values (FVs). In each FV, the normal and attack samples indicate the FV classification tendency, and CTDI shows the classification tendency differences between the normal and attack samples. CTFD is the frequency difference between the normal and attack samples. By employing fuzzy C means (FCM) to establish the normal and attack clusters, CTMD is the membership difference between the clusters, and CTDD is the distance difference between the cluster centers. CTDI calculates the index score in each FV and summarizes the scores of all FVs in the feature as the feature score for each of the three indexes. CTDI adopts an Auto Encoder for feature extraction to generate new features from the dataset and calculate the three index scores for the new features. CTDI sorts the original and new features for each of the three indexes to select the best features. The selected CTDI features indicate the best classification tendency differences between normal and attack samples. The experiment results demonstrate that the CTDI features achieve better detection accuracy as classified by DNN for the Aegean WiFi Intrusion Dataset than their related works, and the detection enhancements are based on the improved classification tendency differences in the CTDI features.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139533000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Future Sustainable Internet Energy-Defined Networking 未来的可持续互联网 能源定义的网络
Pub Date : 2024-01-09 DOI: 10.3390/fi16010023
Alex Galis
This paper presents a comprehensive set of design methods for making future Internet networking fully energy-aware and sustainably minimizing and managing the energy footprint. It includes (a) 41 energy-aware design methods, grouped into Service Operations Support, Management Operations Support, Compute Operations Support, Connectivity/Forwarding Operations Support, Traffic Engineering Methods, Architectural Support for Energy Instrumentation, and Network Configuration; (b) energy consumption models and energy metrics are identified and specified. It specifies the requirements for energy-defined network compliance, which include energy-measurable network devices with the support of several control messages: registration, discovery, provisioning, discharge, monitoring, synchronization, flooding, performance, and pushback.
本文介绍了一套全面的设计方法,用于使未来的互联网网络完全具备能源感知能力,并可持续地最大限度减少和管理能源足迹。它包括:(a) 41 种能源感知设计方法,分为服务运营支持、管理运营支持、计算运营支持、连接/转发运营支持、流量工程方法、能源仪表架构支持和网络配置;(b) 能源消耗模型和能源指标的确定和指定。它规定了符合能源定义网络的要求,其中包括支持以下几种控制信息的可测量能源的网络设备:注册、发现、供应、排放、监控、同步、泛洪、性能和推回。
{"title":"Future Sustainable Internet Energy-Defined Networking","authors":"Alex Galis","doi":"10.3390/fi16010023","DOIUrl":"https://doi.org/10.3390/fi16010023","url":null,"abstract":"This paper presents a comprehensive set of design methods for making future Internet networking fully energy-aware and sustainably minimizing and managing the energy footprint. It includes (a) 41 energy-aware design methods, grouped into Service Operations Support, Management Operations Support, Compute Operations Support, Connectivity/Forwarding Operations Support, Traffic Engineering Methods, Architectural Support for Energy Instrumentation, and Network Configuration; (b) energy consumption models and energy metrics are identified and specified. It specifies the requirements for energy-defined network compliance, which include energy-measurable network devices with the support of several control messages: registration, discovery, provisioning, discharge, monitoring, synchronization, flooding, performance, and pushback.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139442471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Semantic IoT Middleware for Secure Data Management: Blockchain and AI-Driven Context Awareness 用于安全数据管理的新型语义物联网中间件:区块链和人工智能驱动的情境感知
Pub Date : 2024-01-07 DOI: 10.3390/fi16010022
M. Elkhodr, Samiya Khan, E. Gide
In the modern digital landscape of the Internet of Things (IoT), data interoperability and heterogeneity present critical challenges, particularly with the increasing complexity of IoT systems and networks. Addressing these challenges, while ensuring data security and user trust, is pivotal. This paper proposes a novel Semantic IoT Middleware (SIM) for healthcare. The architecture of this middleware comprises the following main processes: data generation, semantic annotation, security encryption, and semantic operations. The data generation module facilitates seamless data and event sourcing, while the Semantic Annotation Component assigns structured vocabulary for uniformity. SIM adopts blockchain technology to provide enhanced data security, and its layered approach ensures robust interoperability and intuitive user-centric operations for IoT systems. The security encryption module offers data protection, and the semantic operations module underpins data processing and integration. A distinctive feature of this middleware is its proficiency in service integration, leveraging semantic descriptions augmented by user feedback. Additionally, SIM integrates artificial intelligence (AI) feedback mechanisms to continuously refine and optimise the middleware’s operational efficiency.
在物联网(IoT)的现代数字环境中,数据互操作性和异构性带来了严峻的挑战,尤其是随着物联网系统和网络的复杂性不断增加。在确保数据安全和用户信任的同时,应对这些挑战至关重要。本文提出了一种用于医疗保健的新型语义物联网中间件(SIM)。该中间件的架构包括以下主要流程:数据生成、语义注释、安全加密和语义操作。数据生成模块促进无缝数据和事件来源,而语义注释组件则分配结构化词汇以实现统一性。SIM 采用区块链技术提供更强的数据安全性,其分层方法可确保物联网系统具有强大的互操作性和以用户为中心的直观操作。安全加密模块提供数据保护,而语义操作模块则是数据处理和集成的基础。该中间件的一个显著特点是其精通服务集成,利用用户反馈增强语义描述。此外,SIM 还集成了人工智能(AI)反馈机制,以不断完善和优化中间件的运行效率。
{"title":"A Novel Semantic IoT Middleware for Secure Data Management: Blockchain and AI-Driven Context Awareness","authors":"M. Elkhodr, Samiya Khan, E. Gide","doi":"10.3390/fi16010022","DOIUrl":"https://doi.org/10.3390/fi16010022","url":null,"abstract":"In the modern digital landscape of the Internet of Things (IoT), data interoperability and heterogeneity present critical challenges, particularly with the increasing complexity of IoT systems and networks. Addressing these challenges, while ensuring data security and user trust, is pivotal. This paper proposes a novel Semantic IoT Middleware (SIM) for healthcare. The architecture of this middleware comprises the following main processes: data generation, semantic annotation, security encryption, and semantic operations. The data generation module facilitates seamless data and event sourcing, while the Semantic Annotation Component assigns structured vocabulary for uniformity. SIM adopts blockchain technology to provide enhanced data security, and its layered approach ensures robust interoperability and intuitive user-centric operations for IoT systems. The security encryption module offers data protection, and the semantic operations module underpins data processing and integration. A distinctive feature of this middleware is its proficiency in service integration, leveraging semantic descriptions augmented by user feedback. Additionally, SIM integrates artificial intelligence (AI) feedback mechanisms to continuously refine and optimise the middleware’s operational efficiency.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139448816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Beam-Forming Optimization for Active-RIS-Assisted Internet-of-Things Networks with SWIPT 利用 SWIPT 实现主动 RIS 辅助物联网网络的联合波束成形优化
Pub Date : 2024-01-06 DOI: 10.3390/fi16010020
Lidong Liu, Shidang Li, Mingsheng Wei, Jinsong Xu, Bencheng Yu
Network energy resources are limited in communication systems, which may cause energy shortages in mobile devices at the user end. Active Reconfigurable Intelligent Surfaces (A-RIS) not only have phase modulation properties but also enhance the signal strength; thus, they are expected to solve the energy shortage problem experience at the user end in 6G communications. In this paper, a resource allocation algorithm for maximizing the sum of harvested energy is proposed for an active RIS-assisted Simultaneous Wireless Information and Power Transfer (SWIPT) system to solve the problem of low performance of harvested energy for users due to multiplicative fading. First, in the active RIS-assisted SWIPT system using a power splitting architecture to achieve information and energy co-transmission, the joint resource allocation problem is constructed with the objective function of maximizing the sum of the collected energy of all users, under the constraints of signal-to-noise ratio, active RIS and base station transmit power, and power splitting factors. Second, the considered non-convex problem can be turned into a standard convex problem by using alternating optimization, semi-definite relaxation, successive convex approximation, penalty function, etc., and then an alternating iterative algorithm for harvesting energy is proposed. The proposed algorithm splits the problem into two sub-problems and then performs iterative optimization separately, and then the whole is alternately optimized to obtain the optimal solution. Simulation results show that the proposed algorithm improves the performance by 45.2% and 103.7% compared to the passive RIS algorithm and the traditional without-RIS algorithm, respectively, at the maximum permissible transmitting power of 45 dBm at the base station.
在通信系统中,网络能源资源是有限的,这可能会造成用户端移动设备的能源短缺。有源可重构智能表面(A-RIS)不仅具有相位调制特性,还能增强信号强度,因此有望解决 6G 通信中用户端遇到的能量短缺问题。本文为有源 RIS 辅助同步无线信息和功率传输(SWIPT)系统提出了一种最大化收获能量总和的资源分配算法,以解决乘法衰落导致的用户收获能量性能低下的问题。首先,在有源 RIS 辅助的 SWIPT 系统中,使用功率分配结构实现信息和能量的协同传输,在信噪比、有源 RIS 和基站发射功率以及功率分配系数的约束下,构建了联合资源分配问题,其目标函数为最大化所有用户的采集能量之和。其次,通过交替优化、半无限松弛、连续凸近似、惩罚函数等方法,将所考虑的非凸问题转化为标准凸问题,然后提出一种交替迭代的能量收集算法。所提算法将问题分成两个子问题,分别进行迭代优化,然后整体交替优化,得到最优解。仿真结果表明,在基站最大允许发射功率为 45 dBm 时,与无源 RIS 算法和传统的无 RIS 算法相比,所提算法的性能分别提高了 45.2% 和 103.7%。
{"title":"Joint Beam-Forming Optimization for Active-RIS-Assisted Internet-of-Things Networks with SWIPT","authors":"Lidong Liu, Shidang Li, Mingsheng Wei, Jinsong Xu, Bencheng Yu","doi":"10.3390/fi16010020","DOIUrl":"https://doi.org/10.3390/fi16010020","url":null,"abstract":"Network energy resources are limited in communication systems, which may cause energy shortages in mobile devices at the user end. Active Reconfigurable Intelligent Surfaces (A-RIS) not only have phase modulation properties but also enhance the signal strength; thus, they are expected to solve the energy shortage problem experience at the user end in 6G communications. In this paper, a resource allocation algorithm for maximizing the sum of harvested energy is proposed for an active RIS-assisted Simultaneous Wireless Information and Power Transfer (SWIPT) system to solve the problem of low performance of harvested energy for users due to multiplicative fading. First, in the active RIS-assisted SWIPT system using a power splitting architecture to achieve information and energy co-transmission, the joint resource allocation problem is constructed with the objective function of maximizing the sum of the collected energy of all users, under the constraints of signal-to-noise ratio, active RIS and base station transmit power, and power splitting factors. Second, the considered non-convex problem can be turned into a standard convex problem by using alternating optimization, semi-definite relaxation, successive convex approximation, penalty function, etc., and then an alternating iterative algorithm for harvesting energy is proposed. The proposed algorithm splits the problem into two sub-problems and then performs iterative optimization separately, and then the whole is alternately optimized to obtain the optimal solution. Simulation results show that the proposed algorithm improves the performance by 45.2% and 103.7% compared to the passive RIS algorithm and the traditional without-RIS algorithm, respectively, at the maximum permissible transmitting power of 45 dBm at the base station.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139449443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Study and Analysis of the Third Generation Partnership Project’s 5G New Radio for Vehicle-to-Everything Communication 全面研究和分析第三代合作伙伴计划用于车对车通信的 5G 新无线电
Pub Date : 2024-01-06 DOI: 10.3390/fi16010021
G. M. N. Ali, Mohammad Nazmus Sadat, Md. Suruz Miah, Sameer Ahmed Sharief, Yun Wang
Recently, the Third Generation Partnership Project (3GPP) introduced new radio (NR) technology for vehicle-to-everything (V2X) communication to enable delay-sensitive and bandwidth-hungry applications in vehicular communication. The NR system is strategically crafted to complement the existing long-term evolution (LTE) cellular-vehicle-to-everything (C-V2X) infrastructure, particularly to support advanced services such as the operation of automated vehicles. It is widely anticipated that the fifth-generation (5G) NR system will surpass LTE C-V2X in terms of achieving superior performance in scenarios characterized by high throughput, low latency, and enhanced reliability, especially in the context of congested traffic conditions and a diverse range of vehicular applications. This article will provide a comprehensive literature review on vehicular communications from dedicated short-range communication (DSRC) to NR V2X. Subsequently, it delves into a detailed examination of the challenges and opportunities inherent in NR V2X technology. Finally, we proceed to elucidate the process of creating and analyzing an open-source 5G NR V2X module in network simulation-3 (ns-3) and then demonstrate the NR V2X performance in terms of different key performance indicators implemented through diverse operational scenarios.
最近,第三代合作伙伴计划(3GPP)为车对万物(V2X)通信引入了新的无线电(NR)技术,以支持车辆通信中对延迟敏感和带宽要求高的应用。NR 系统是对现有的长期演进(LTE)蜂窝-车载-万物(C-V2X)基础设施的战略性补充,特别是支持自动驾驶汽车运行等先进服务。人们普遍预计,第五代(5G)NR 系统将超越 LTE C-V2X,在以高吞吐量、低延迟和增强可靠性为特征的场景中实现卓越性能,特别是在交通拥堵的条件下和各种车辆应用中。本文将对从专用短程通信(DSRC)到 NR V2X 的车辆通信进行全面的文献综述。随后,文章将详细探讨 NR V2X 技术所固有的挑战和机遇。最后,我们将阐明在网络仿真-3(ns-3)中创建和分析开源 5G NR V2X 模块的过程,然后通过不同的运行场景,从不同的关键性能指标方面展示 NR V2X 的性能。
{"title":"A Comprehensive Study and Analysis of the Third Generation Partnership Project’s 5G New Radio for Vehicle-to-Everything Communication","authors":"G. M. N. Ali, Mohammad Nazmus Sadat, Md. Suruz Miah, Sameer Ahmed Sharief, Yun Wang","doi":"10.3390/fi16010021","DOIUrl":"https://doi.org/10.3390/fi16010021","url":null,"abstract":"Recently, the Third Generation Partnership Project (3GPP) introduced new radio (NR) technology for vehicle-to-everything (V2X) communication to enable delay-sensitive and bandwidth-hungry applications in vehicular communication. The NR system is strategically crafted to complement the existing long-term evolution (LTE) cellular-vehicle-to-everything (C-V2X) infrastructure, particularly to support advanced services such as the operation of automated vehicles. It is widely anticipated that the fifth-generation (5G) NR system will surpass LTE C-V2X in terms of achieving superior performance in scenarios characterized by high throughput, low latency, and enhanced reliability, especially in the context of congested traffic conditions and a diverse range of vehicular applications. This article will provide a comprehensive literature review on vehicular communications from dedicated short-range communication (DSRC) to NR V2X. Subsequently, it delves into a detailed examination of the challenges and opportunities inherent in NR V2X technology. Finally, we proceed to elucidate the process of creating and analyzing an open-source 5G NR V2X module in network simulation-3 (ns-3) and then demonstrate the NR V2X performance in terms of different key performance indicators implemented through diverse operational scenarios.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139449355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proximal Policy Optimization for Efficient D2D-Assisted Computation Offloading and Resource Allocation in Multi-Access Edge Computing 针对多接入边缘计算中高效 D2D 辅助计算卸载和资源分配的近端策略优化
Pub Date : 2024-01-02 DOI: 10.3390/fi16010019
Chen Zhang, Celimuge Wu, Min Lin, Yangfei Lin, William Liu
In the advanced 5G and beyond networks, multi-access edge computing (MEC) is increasingly recognized as a promising technology, offering the dual advantages of reducing energy utilization in cloud data centers while catering to the demands for reliability and real-time responsiveness in end devices. However, the inherent complexity and variability of MEC networks pose significant challenges in computational offloading decisions. To tackle this problem, we propose a proximal policy optimization (PPO)-based Device-to-Device (D2D)-assisted computation offloading and resource allocation scheme. We construct a realistic MEC network environment and develop a Markov decision process (MDP) model that minimizes time loss and energy consumption. The integration of a D2D communication-based offloading framework allows for collaborative task offloading between end devices and MEC servers, enhancing both resource utilization and computational efficiency. The MDP model is solved using the PPO algorithm in deep reinforcement learning to derive an optimal policy for offloading and resource allocation. Extensive comparative analysis with three benchmarked approaches has confirmed our scheme’s superior performance in latency, energy consumption, and algorithmic convergence, demonstrating its potential to improve MEC network operations in the context of emerging 5G and beyond technologies.
在先进的 5G 及更先进的网络中,多接入边缘计算(MEC)越来越被认为是一项前景广阔的技术,它具有双重优势:既能降低云数据中心的能源利用率,又能满足终端设备对可靠性和实时响应能力的要求。然而,MEC 网络固有的复杂性和多变性给计算卸载决策带来了巨大挑战。为了解决这个问题,我们提出了一种基于近端策略优化(PPO)的设备到设备(D2D)辅助计算卸载和资源分配方案。我们构建了一个现实的 MEC 网络环境,并开发了一个马尔可夫决策过程 (MDP) 模型,该模型能最大限度地减少时间损失和能源消耗。通过整合基于 D2D 通信的卸载框架,可以在终端设备和 MEC 服务器之间协同卸载任务,从而提高资源利用率和计算效率。利用深度强化学习中的 PPO 算法对 MDP 模型进行求解,从而得出卸载和资源分配的最优策略。与三种基准方法的广泛比较分析证实了我们的方案在延迟、能耗和算法收敛性方面的优越性能,证明了它在新兴的 5G 及其他技术背景下改善 MEC 网络运营的潜力。
{"title":"Proximal Policy Optimization for Efficient D2D-Assisted Computation Offloading and Resource Allocation in Multi-Access Edge Computing","authors":"Chen Zhang, Celimuge Wu, Min Lin, Yangfei Lin, William Liu","doi":"10.3390/fi16010019","DOIUrl":"https://doi.org/10.3390/fi16010019","url":null,"abstract":"In the advanced 5G and beyond networks, multi-access edge computing (MEC) is increasingly recognized as a promising technology, offering the dual advantages of reducing energy utilization in cloud data centers while catering to the demands for reliability and real-time responsiveness in end devices. However, the inherent complexity and variability of MEC networks pose significant challenges in computational offloading decisions. To tackle this problem, we propose a proximal policy optimization (PPO)-based Device-to-Device (D2D)-assisted computation offloading and resource allocation scheme. We construct a realistic MEC network environment and develop a Markov decision process (MDP) model that minimizes time loss and energy consumption. The integration of a D2D communication-based offloading framework allows for collaborative task offloading between end devices and MEC servers, enhancing both resource utilization and computational efficiency. The MDP model is solved using the PPO algorithm in deep reinforcement learning to derive an optimal policy for offloading and resource allocation. Extensive comparative analysis with three benchmarked approaches has confirmed our scheme’s superior performance in latency, energy consumption, and algorithmic convergence, demonstrating its potential to improve MEC network operations in the context of emerging 5G and beyond technologies.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139390866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Future Internet
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1