首页 > 最新文献

Journal of Network and Computer Applications最新文献

英文 中文
Skin lesion classification using modified deep and multi-directional invariant handcrafted features 利用改进的深度和多向不变手工特征进行皮肤病变分类
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-14 DOI: 10.1016/j.jnca.2024.103949
Jitesh Pradhan , Ashish Singh , Abhinav Kumar , Muhammad Khurram Khan

Skin lesions encompass various skin conditions, including cancerous growths resulting from uncontrolled proliferation of skin cells. Globally, this disease affects a significant portion of the population, with millions of fatalities recorded. Over the past three decades, there has been a concerning escalation in diagnosed cases of skin cancer. Early detection is crucial for effective treatment, as late diagnosis significantly heightens mortality risk. Existing research often focuses on either handcrafted or deep features, neglecting the diverse textural and structural properties inherent in skin lesion images. Additionally, reliance on a single optimizer in CNN-based schemes poses efficiency challenges. To tackle these issues, this paper presents two novel approaches for classifying skin lesions in dermoscopic images to assess cancer severity. The first approach enhances classification accuracy by leveraging a modified VGG-16 network and employing both RMSProp and Adam optimizers. The second approach introduces a Hybrid CNN Model, integrating deep features from the modified VGG-16 network with handcrafted color and multi-directional texture features. Color features are extracted using a non-uniform cumulative probability-based histogram method, while texture features are derived from a 45 rotated complex wavelet filter-based dual-tree complex wavelet transform. The amalgamated features facilitate accurate prediction of skin lesion classes. Evaluation on ISIC 2017 skin cancer classification challenge images demonstrates significant performance enhancements over existing techniques.

皮损包括各种皮肤病,其中包括皮肤细胞失控增殖导致的癌变。在全球范围内,这种疾病影响着相当一部分人口,死亡人数达数百万。在过去的三十年里,皮肤癌确诊病例呈上升趋势,令人担忧。早期发现对有效治疗至关重要,因为晚期诊断会大大增加死亡风险。现有的研究通常侧重于手工制作或深度特征,而忽略了皮肤病变图像固有的各种纹理和结构特性。此外,在基于 CNN 的方案中,对单一优化器的依赖也带来了效率方面的挑战。为了解决这些问题,本文提出了两种新方法,用于对皮肤镜图像中的皮肤病变进行分类,以评估癌症的严重程度。第一种方法利用改进的 VGG-16 网络,同时采用 RMSProp 和 Adam 优化器,提高了分类准确性。第二种方法引入了混合 CNN 模型,将改进的 VGG-16 网络的深度特征与手工制作的颜色和多方向纹理特征整合在一起。颜色特征采用基于非均匀累积概率的直方图方法提取,而纹理特征则来自基于双树复小波变换的 45∘旋转复小波滤波器。综合特征有助于准确预测皮损类别。在 ISIC 2017 皮肤癌分类挑战赛图像上进行的评估表明,与现有技术相比,该技术的性能有了显著提高。
{"title":"Skin lesion classification using modified deep and multi-directional invariant handcrafted features","authors":"Jitesh Pradhan ,&nbsp;Ashish Singh ,&nbsp;Abhinav Kumar ,&nbsp;Muhammad Khurram Khan","doi":"10.1016/j.jnca.2024.103949","DOIUrl":"10.1016/j.jnca.2024.103949","url":null,"abstract":"<div><p>Skin lesions encompass various skin conditions, including cancerous growths resulting from uncontrolled proliferation of skin cells. Globally, this disease affects a significant portion of the population, with millions of fatalities recorded. Over the past three decades, there has been a concerning escalation in diagnosed cases of skin cancer. Early detection is crucial for effective treatment, as late diagnosis significantly heightens mortality risk. Existing research often focuses on either handcrafted or deep features, neglecting the diverse textural and structural properties inherent in skin lesion images. Additionally, reliance on a single optimizer in CNN-based schemes poses efficiency challenges. To tackle these issues, this paper presents two novel approaches for classifying skin lesions in dermoscopic images to assess cancer severity. The first approach enhances classification accuracy by leveraging a modified VGG-16 network and employing both RMSProp and Adam optimizers. The second approach introduces a Hybrid CNN Model, integrating deep features from the modified VGG-16 network with handcrafted color and multi-directional texture features. Color features are extracted using a non-uniform cumulative probability-based histogram method, while texture features are derived from a 45<span><math><msup><mrow></mrow><mrow><mo>∘</mo></mrow></msup></math></span> rotated complex wavelet filter-based dual-tree complex wavelet transform. The amalgamated features facilitate accurate prediction of skin lesion classes. Evaluation on ISIC 2017 skin cancer classification challenge images demonstrates significant performance enhancements over existing techniques.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"231 ","pages":"Article 103949"},"PeriodicalIF":7.7,"publicationDate":"2024-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141689712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CL-AP2: A composite learning approach to attack prediction via attack portraying CL-AP2:通过攻击描绘进行攻击预测的复合学习方法
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-04 DOI: 10.1016/j.jnca.2024.103963
Yingze Liu, Yuanbo Guo

The capabilities of accurate prediction of cyberattacks have long been desired as detection methods cannot avoid the damages caused by occurrences of cyberattack. Attack prediction still remains an open issue especially to specify the upcoming steps of an attack with the quickly evolving intelligent techniques at the attackers’ side. This study proposes a composite learning approach (namely CL-AP2), which fulfills this task in two phases of “attack portraying” and “attack prediction”: (1) (Attack Portraying) CL-AP2 generates a Temporal Attack Knowledge Graph (TAKG) from real-time system logs providing full knowledge that formulates time-aware entities related to attacks and the relations amongst them; Over the TAKG, a Tactic-based Cyber Kill Chain (TCKC) model highlights the attacker’s portrait via evaluation of behaviors in the past, i.e., presenting the tactical path and attack steps taken by the attacker; (2) (Attack Prediction) The Soft Actor–Critic algorithm applies to identify the most possible attack trajectory confined in the attack portrait; The transformer model finally derives the specific attack technique to be taken next.

Experiments have been performed versus the state-of-the-art counterparts over a public dataset and results indicate that: (1) CL-AP2 can effectively reveal the tactical path taken by the attacker and form a complete portrait of the attack; and (2) CL-AP2 excels in predicting attack techniques to be taken by attackers and providing the defense guidance against the predicted attacks.

由于检测方法无法避免网络攻击造成的损失,人们一直希望能够准确预测网络攻击。攻击预测仍然是一个悬而未决的问题,尤其是在攻击方的智能技术快速发展的情况下,如何明确即将发生的攻击步骤。本研究提出了一种复合学习方法(即 CL-AP2),通过 "攻击描绘 "和 "攻击预测 "两个阶段来完成这项任务:(1)(攻击描绘)CL-AP2 从实时系统日志中生成时态攻击知识图(TAKG),提供完整的知识,形成与攻击相关的时间感知实体以及它们之间的关系;在 TAKG 上,基于战术的网络杀伤链(TCKC)模型通过对过去行为的评估来突出攻击者的肖像,即:呈现攻击者的战术路径和攻击行为、(2)(攻击预测)软行为批判算法用于识别攻击肖像中最可能的攻击轨迹;转换器模型最终得出下一步要采取的具体攻击技术:实验结果表明:(1) CL-AP2 能够有效揭示攻击者采取的战术路径,并形成完整的攻击肖像;(2) CL-AP2 在预测攻击者采取的攻击技术以及针对预测攻击提供防御指导方面表现出色。
{"title":"CL-AP2: A composite learning approach to attack prediction via attack portraying","authors":"Yingze Liu,&nbsp;Yuanbo Guo","doi":"10.1016/j.jnca.2024.103963","DOIUrl":"10.1016/j.jnca.2024.103963","url":null,"abstract":"<div><p>The capabilities of accurate prediction of cyberattacks have long been desired as detection methods cannot avoid the damages caused by occurrences of cyberattack. Attack prediction still remains an open issue especially to specify the upcoming steps of an attack with the quickly evolving intelligent techniques at the attackers’ side. This study proposes a composite learning approach (namely CL-AP<span><math><msup><mrow></mrow><mrow><mn>2</mn></mrow></msup></math></span>), which fulfills this task in two phases of “attack portraying” and “attack prediction”: (1) (Attack Portraying) CL-AP<span><math><msup><mrow></mrow><mrow><mn>2</mn></mrow></msup></math></span> generates a Temporal Attack Knowledge Graph (TAKG) from real-time system logs providing full knowledge that formulates time-aware entities related to attacks and the relations amongst them; Over the TAKG, a Tactic-based Cyber Kill Chain (TCKC) model highlights the attacker’s <em>portrait</em> via evaluation of behaviors in the past, <em>i.e.</em>, presenting the tactical path and attack steps taken by the attacker; (2) (Attack Prediction) The Soft Actor–Critic algorithm applies to identify the most possible attack trajectory confined in the attack portrait; The transformer model finally derives the specific attack technique to be taken next.</p><p>Experiments have been performed versus the state-of-the-art counterparts over a public dataset and results indicate that: (1) CL-AP<span><math><msup><mrow></mrow><mrow><mn>2</mn></mrow></msup></math></span> can effectively reveal the tactical path taken by the attacker and form a complete portrait of the attack; and (2) CL-AP<span><math><msup><mrow></mrow><mrow><mn>2</mn></mrow></msup></math></span> excels in predicting attack techniques to be taken by attackers and providing the defense guidance against the predicted attacks.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"230 ","pages":"Article 103963"},"PeriodicalIF":7.7,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141638146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attenuating majority attack class bias using hybrid deep learning based IDS framework 利用基于混合深度学习的 IDS 框架削弱多数攻击类别偏差
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-03 DOI: 10.1016/j.jnca.2024.103954
K.G. Raghavendra Narayan , Rakesh Ganesula , Tamminaina Sai Somasekhar , Srijanee Mookherji , Vanga Odelu , Rajendra Prasath , Alavalapati Goutham Reddy

In real-time application domains, like finance, healthcare and defence, delay in service or stealing information may lead to unrecoverable consequences. So, early detection of intrusion is important to prevent security breaches. In recent days, anomaly-based intrusion detection using Hybrid Deep Learning approaches are becoming more popular. The most used benchmark datasets in the literature are NSL-KDD and UNSW-NB15, and these datasets are imbalanced. The models built on imbalanced datasets may lead to biased results towards majority classes by neglecting the minority class, even though they are equally important. In many cases, high accuracy is achieved for majority classes in the imbalanced datasets. But, the class-level performances are poor with respect to the minority class. The class balancing will also play an important role in attenuating the bias in prediction for imbalanced datasets. In this paper, a Hybrid Deep Learning Based Intrusion Detection (HDLBID) framework is proposed with CNN-BiLSTM combination. The four techniques, namely, Random Oversampling (ROS), ADASYN, SMOTE, and SMOTE-Tomek, are used for class balancing in the proposed HDLBID framework. The proposed HDLBID with SMOTE-Tomek achieves an overall accuracy of 99.6% with NSL-KDD and 89.02% for UNSW-NB15. It results in an improvement of 13.67% for NSL-KDD and 10.62% for UNSW-NB15 over the existing recent related models. In the proposed HDLBID, in addition to overall accuracy, the class-level F1 score is also calculated. A comparative study is presented to show the effectiveness of balancing dataset compared to imbalanced dataset, and observed that the SMOTE-Tomek class balancing comparatively performed well. An improvement of 37.43% is observed in the U2R class of the NSL-KDD dataset and 61.65% improvement is seen in the Worms class of the UNSW-NB15 dataset, both with SMOTE-Tomek class balancing. Therefore, the proposed HDLBID with SMOTE-Tomek class balancing reports the best results in terms of overall accuracy compared to existing recent related approaches. Also, in terms of class-level analysis, HDLBID reports best results with SMOTE-Tomek over imbalanced version of datasets.

在金融、医疗保健和国防等实时应用领域,服务延迟或信息被盗可能会导致无法挽回的后果。因此,早期检测入侵对于防止安全漏洞非常重要。近年来,使用混合深度学习方法进行基于异常的入侵检测正变得越来越流行。文献中使用最多的基准数据集是 NSL-KDD 和 UNSW-NB15,这些数据集是不平衡的。在不平衡数据集上建立的模型可能会导致结果偏向多数类,而忽略少数类,即使它们同样重要。在许多情况下,不平衡数据集中的多数类都能获得较高的准确率。但是,对于少数群体来说,类级的性能却很差。对于不平衡数据集来说,类平衡在减少预测偏差方面也将发挥重要作用。本文提出了一种基于深度学习的混合入侵检测(HDLBID)框架,与 CNN-BiLSTM 相结合。在拟议的 HDLBID 框架中,使用了四种技术,即随机过度采样(ROS)、ADASYN、SMOTE 和 SMOTE-Tomek,来实现类平衡。使用 SMOTE-Tomek 的拟议 HDLBID 在 NSL-KDD 中的总体准确率达到 99.6%,在 UNSW-NB15 中达到 89.02%。与现有的相关模型相比,NSL-KDD 提高了 13.67%,UNSW-NB15 提高了 10.62%。在拟议的 HDLBID 中,除了总体准确率外,还计算了类级的 F1 分数。比较研究显示了平衡数据集与不平衡数据集的有效性,并观察到 SMOTE-Tomek 类别平衡相对表现良好。在 NSL-KDD 数据集的 U2R 类中观察到 37.43% 的改进,在 UNSW-NB15 数据集的 Worms 类中观察到 61.65% 的改进,这两个数据集都采用了 SMOTE-Tomek 类平衡。因此,与现有的相关方法相比,采用 SMOTE-Tomek 类别平衡技术的 HDLBID 在总体准确率方面取得了最佳结果。此外,在类级分析方面,HDLBID 与 SMOTE-Tomek 在不平衡版本的数据集上也取得了最佳结果。
{"title":"Attenuating majority attack class bias using hybrid deep learning based IDS framework","authors":"K.G. Raghavendra Narayan ,&nbsp;Rakesh Ganesula ,&nbsp;Tamminaina Sai Somasekhar ,&nbsp;Srijanee Mookherji ,&nbsp;Vanga Odelu ,&nbsp;Rajendra Prasath ,&nbsp;Alavalapati Goutham Reddy","doi":"10.1016/j.jnca.2024.103954","DOIUrl":"10.1016/j.jnca.2024.103954","url":null,"abstract":"<div><p>In real-time application domains, like finance, healthcare and defence, delay in service or stealing information may lead to unrecoverable consequences. So, early detection of intrusion is important to prevent security breaches. In recent days, anomaly-based intrusion detection using Hybrid Deep Learning approaches are becoming more popular. The most used benchmark datasets in the literature are NSL-KDD and UNSW-NB15, and these datasets are imbalanced. The models built on imbalanced datasets may lead to biased results towards majority classes by neglecting the minority class, even though they are equally important. In many cases, high accuracy is achieved for majority classes in the imbalanced datasets. But, the class-level performances are poor with respect to the minority class. The class balancing will also play an important role in attenuating the bias in prediction for imbalanced datasets. In this paper, a Hybrid Deep Learning Based Intrusion Detection (HDLBID) framework is proposed with CNN-BiLSTM combination. The four techniques, namely, Random Oversampling (ROS), ADASYN, SMOTE, and SMOTE-Tomek, are used for class balancing in the proposed HDLBID framework. The proposed HDLBID with SMOTE-Tomek achieves an overall accuracy of 99.6% with NSL-KDD and 89.02% for UNSW-NB15. It results in an improvement of 13.67% for NSL-KDD and 10.62% for UNSW-NB15 over the existing recent related models. In the proposed HDLBID, in addition to overall accuracy, the class-level <span><math><msub><mrow><mi>F</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span> score is also calculated. A comparative study is presented to show the effectiveness of balancing dataset compared to imbalanced dataset, and observed that the SMOTE-Tomek class balancing comparatively performed well. An improvement of 37.43% is observed in the U2R class of the NSL-KDD dataset and 61.65% improvement is seen in the Worms class of the UNSW-NB15 dataset, both with SMOTE-Tomek class balancing. Therefore, the proposed HDLBID with SMOTE-Tomek class balancing reports the best results in terms of overall accuracy compared to existing recent related approaches. Also, in terms of class-level analysis, HDLBID reports best results with SMOTE-Tomek over imbalanced version of datasets.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"230 ","pages":"Article 103954"},"PeriodicalIF":7.7,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141623263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Uncovering phishing attacks using principles of persuasion analysis 利用说服分析原理揭露网络钓鱼攻击
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-03 DOI: 10.1016/j.jnca.2024.103964
Lázaro Bustio-Martínez , Vitali Herrera-Semenets , Juan Luis García-Mendoza , Miguel Ángel Álvarez-Carmona , Jorge Ángel González-Ordiano , Luis Zúñiga-Morales , J. Emilio Quiróz-Ibarra , Pedro Antonio Santander-Molina , Jan van den Berg

With the rising of Internet in early ’90s, many fraudulent activities have migrated from physical to digital: one of them is phishing. Phishing is a deceptive practice focused on exploiting the human factor, which is the most vulnerable aspect of any security process. In this scam, social engineering techniques are extensively utilized, specifically focusing on the principles of persuasion, to deceive individuals into disclosing sensitive information or engaging in malicious actions. This research explores the use of message subjectivity for detecting phishing attacks. It does so by assessing the impact of various data representations and classifiers on automatically identifying principles of persuasion. Furthermore, it investigates how these detected principles of persuasion can be leveraged for identifying phishing attacks. The experiments conducted revealed that there is no universal solution for data representation and classifier selection to effectively detect all principles of persuasion. Instead, a tailored combination of data representation and classifiers is required for detecting each principle. The Machine Learning models created automatically detect principles of persuasion with confidence levels ranging from 0.7306 to 0.8191 for AUC-ROC. Next, principles of persuasion detected are used for phishing detection. This study also emphasizes the need for user-friendly and comprehensible models. To validate the proposal presented, several families of classifiers were tested, but among all of them, tree-based models (and Random Forest in particular) stand out as preferred option. These models achieve similar level of effectiveness as alternative methods while offering improved clarity and user-friendliness, with an AUC-ROC of 0.859842.

随着互联网在 90 年代初的兴起,许多欺诈活动从实体转移到了数字领域:网络钓鱼就是其中之一。网络钓鱼是一种侧重于利用人的因素的欺骗行为,而人的因素是任何安全程序中最脆弱的方面。在这种骗局中,社交工程技术被广泛使用,特别是侧重于说服原则,以欺骗个人披露敏感信息或参与恶意行动。本研究探讨了如何利用信息主观性来检测网络钓鱼攻击。为此,它评估了各种数据表示和分类器对自动识别说服原则的影响。此外,研究还探讨了如何利用这些检测到的说服原则来识别网络钓鱼攻击。实验结果表明,在数据表示和分类器选择方面没有通用的解决方案来有效地检测所有劝诱原则。相反,需要量身定制的数据表示和分类器组合来检测每种原则。所创建的机器学习模型能自动检测出说服原则,AUC-ROC 的置信度从 0.7306 到 0.8191 不等。接下来,检测出的说服原则将用于网络钓鱼检测。这项研究还强调了建立用户友好、易于理解的模型的必要性。为了验证所提出的建议,我们对多个分类器系列进行了测试,但在所有分类器中,基于树的模型(尤其是随机森林)脱颖而出,成为首选。这些模型达到了与其他方法相似的有效性水平,同时提供了更高的清晰度和用户友好性,AUC-ROC 为 0.859842。
{"title":"Uncovering phishing attacks using principles of persuasion analysis","authors":"Lázaro Bustio-Martínez ,&nbsp;Vitali Herrera-Semenets ,&nbsp;Juan Luis García-Mendoza ,&nbsp;Miguel Ángel Álvarez-Carmona ,&nbsp;Jorge Ángel González-Ordiano ,&nbsp;Luis Zúñiga-Morales ,&nbsp;J. Emilio Quiróz-Ibarra ,&nbsp;Pedro Antonio Santander-Molina ,&nbsp;Jan van den Berg","doi":"10.1016/j.jnca.2024.103964","DOIUrl":"10.1016/j.jnca.2024.103964","url":null,"abstract":"<div><p>With the rising of Internet in early ’90s, many fraudulent activities have migrated from physical to digital: one of them is phishing. Phishing is a deceptive practice focused on exploiting the human factor, which is the most vulnerable aspect of any security process. In this scam, social engineering techniques are extensively utilized, specifically focusing on the principles of persuasion, to deceive individuals into disclosing sensitive information or engaging in malicious actions. This research explores the use of message subjectivity for detecting phishing attacks. It does so by assessing the impact of various data representations and classifiers on automatically identifying principles of persuasion. Furthermore, it investigates how these detected principles of persuasion can be leveraged for identifying phishing attacks. The experiments conducted revealed that there is no universal solution for data representation and classifier selection to effectively detect all principles of persuasion. Instead, a tailored combination of data representation and classifiers is required for detecting each principle. The Machine Learning models created automatically detect principles of persuasion with confidence levels ranging from 0.7306 to 0.8191 for AUC-ROC. Next, principles of persuasion detected are used for phishing detection. This study also emphasizes the need for user-friendly and comprehensible models. To validate the proposal presented, several families of classifiers were tested, but among all of them, tree-based models (and Random Forest in particular) stand out as preferred option. These models achieve similar level of effectiveness as alternative methods while offering improved clarity and user-friendliness, with an AUC-ROC of 0.859842.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"230 ","pages":"Article 103964"},"PeriodicalIF":7.7,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141566472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On designing a profitable system model to harmonize the tripartite dissension in content delivery applications 设计盈利系统模型,协调内容交付应用中的三方分歧
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-02 DOI: 10.1016/j.jnca.2024.103965
Libin Yang , Wei Lou

The popularity of commercial content delivery applications has led to dissension among three embroiled parties: Content Service Providers (CSPs), Internet Service Providers (ISPs), and End Users (EUs). This dissension is not only a technical problem but an economic problem. To harmonize this dissension, this paper takes live streaming as a typical content delivery application. It proposes a profitable system model that enables all three parties to enlarge their benefits with the help of a prevalent content delivery architecture integrated with edge caching and traffic engineering technologies. Specifically, the interactions among CSPs, ISPs, and EUs are modeled as a tripartite game where more and more ISPs and CSPs are involved in the market. A pricing scheme is introduced to capture the application features. The tripartite game is studied in different market scenarios and a dynamic three-stage Stackelberg game is proposed that is combined with the Cournot game that characterizes the interdependent, interactive, and competitive relationship among the three parties. Moreover, how the market competition motivates ISPs to upgrade the cache service infrastructure is further investigated. The theoretical analysis and empirical study show that the model can result in a win-win-win outcome.

商业内容交付应用的普及导致了三方的分歧:内容服务提供商(CSP)、互联网服务提供商(ISP)和最终用户(EU)。这种分歧不仅是一个技术问题,也是一个经济问题。为了协调这种分歧,本文将直播流媒体作为一种典型的内容传输应用。它提出了一种有利可图的系统模型,使所有三方都能借助与边缘缓存和流量工程技术相集成的流行内容交付架构扩大自身利益。具体来说,CSP、ISP 和 EU 之间的互动被模拟为三方博弈,越来越多的 ISP 和 CSP 参与到市场中来。我们引入了一种定价方案来捕捉应用特征。在不同的市场情景下对三方博弈进行了研究,并提出了一个动态的三阶段斯塔克尔伯格博弈,该博弈与库诺博弈相结合,描述了三方之间相互依存、互动和竞争的关系。此外,还进一步研究了市场竞争如何激励互联网服务提供商升级高速缓存服务基础设施。理论分析和实证研究表明,该模型可以带来三赢的结果。
{"title":"On designing a profitable system model to harmonize the tripartite dissension in content delivery applications","authors":"Libin Yang ,&nbsp;Wei Lou","doi":"10.1016/j.jnca.2024.103965","DOIUrl":"10.1016/j.jnca.2024.103965","url":null,"abstract":"<div><p>The popularity of commercial content delivery applications has led to dissension among three embroiled parties: Content Service Providers (CSPs), Internet Service Providers (ISPs), and End Users (EUs). This dissension is not only a technical problem but an economic problem. To harmonize this dissension, this paper takes live streaming as a typical content delivery application. It proposes a profitable system model that enables all three parties to enlarge their benefits with the help of a prevalent content delivery architecture integrated with edge caching and traffic engineering technologies. Specifically, the interactions among CSPs, ISPs, and EUs are modeled as a tripartite game where more and more ISPs and CSPs are involved in the market. A pricing scheme is introduced to capture the application features. The tripartite game is studied in different market scenarios and a dynamic three-stage Stackelberg game is proposed that is combined with the Cournot game that characterizes the interdependent, interactive, and competitive relationship among the three parties. Moreover, how the market competition motivates ISPs to upgrade the cache service infrastructure is further investigated. The theoretical analysis and empirical study show that the model can result in a win-win-win outcome.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"230 ","pages":"Article 103965"},"PeriodicalIF":7.7,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141638145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Satellite synergy: Navigating resource allocation and energy efficiency in IoT networks 卫星协同效应:物联网网络中的资源分配和能效导航
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-02 DOI: 10.1016/j.jnca.2024.103966
Muhammad Abdullah , Humayun Zubair Khan , Umair Fakhar , Ahmad Naeem Akhtar , Shuja Ansari

Satellite-assisted internet of things (IoT) networks have emerged as a beacon of promise, offering global coverage and uninterrupted connectivity. However, the challenges of resource allocation and task offloading in such networks are intricate due to the unique characteristics of satellite communication systems. This research’s findings enrich the landscape of energy-efficient and dependable satellite-assisted IoT networks. The paper navigates the delicate balance between energy efficiency, network throughput, and fairness in distributing resources among IoT devices. The proposed techniques, notably the Outer Approximation Algorithm (OAA), usher in seamless connectivity and resource optimization. The central challenge at hand, a concave fractional programming problem, transforms through the Charnes–Cooper transformation, presenting as a concave optimization enigma. Herein, the proposed outer approximation algorithm takes flight, navigating the intricate paths of concave optimization. The performance of the epsilon-optimal solution faces scrutiny under diverse system parameters—the constellation of IoT devices, their affiliations, fairness considerations, and the equitable distribution of resource blocks. This contribution not only enriches research but also opens doors to the boundless possibilities of satellite-assisted IoT networks.

卫星辅助的物联网(IoT)网络已成为前景光明的灯塔,可提供全球覆盖和不间断的连接。然而,由于卫星通信系统的独特性,此类网络在资源分配和任务卸载方面面临着错综复杂的挑战。这项研究成果丰富了高能效、高可靠性的卫星辅助物联网网络。论文在物联网设备之间分配资源时,在能效、网络吞吐量和公平性之间实现了微妙的平衡。所提出的技术,特别是外近似算法(OAA),可实现无缝连接和资源优化。当前的核心挑战是一个凹分编程问题,通过 Charnes-Cooper 变换,呈现为一个凹优化之谜。在这里,所提出的外近似算法将在凹面优化的复杂路径上飞行。在不同的系统参数--物联网设备群、它们的隶属关系、公平性考虑以及资源块的公平分配--下,ε最优解的性能面临着严格的审查。这一贡献不仅丰富了研究内容,还为卫星辅助物联网网络的无限可能性打开了大门。
{"title":"Satellite synergy: Navigating resource allocation and energy efficiency in IoT networks","authors":"Muhammad Abdullah ,&nbsp;Humayun Zubair Khan ,&nbsp;Umair Fakhar ,&nbsp;Ahmad Naeem Akhtar ,&nbsp;Shuja Ansari","doi":"10.1016/j.jnca.2024.103966","DOIUrl":"10.1016/j.jnca.2024.103966","url":null,"abstract":"<div><p>Satellite-assisted internet of things (IoT) networks have emerged as a beacon of promise, offering global coverage and uninterrupted connectivity. However, the challenges of resource allocation and task offloading in such networks are intricate due to the unique characteristics of satellite communication systems. This research’s findings enrich the landscape of energy-efficient and dependable satellite-assisted IoT networks. The paper navigates the delicate balance between energy efficiency, network throughput, and fairness in distributing resources among IoT devices. The proposed techniques, notably the Outer Approximation Algorithm (OAA), usher in seamless connectivity and resource optimization. The central challenge at hand, a concave fractional programming problem, transforms through the Charnes–Cooper transformation, presenting as a concave optimization enigma. Herein, the proposed outer approximation algorithm takes flight, navigating the intricate paths of concave optimization. The performance of the epsilon-optimal solution faces scrutiny under diverse system parameters—the constellation of IoT devices, their affiliations, fairness considerations, and the equitable distribution of resource blocks. This contribution not only enriches research but also opens doors to the boundless possibilities of satellite-assisted IoT networks.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"230 ","pages":"Article 103966"},"PeriodicalIF":7.7,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1084804524001437/pdfft?md5=6e5bd16c957bd71a21dca1e3c0884dd5&pid=1-s2.0-S1084804524001437-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141566466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving generation and publication of synthetic trajectory microdata: A comprehensive survey 合成轨迹微数据的隐私保护生成与发布:全面调查
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1016/j.jnca.2024.103951
Jong Wook Kim , Beakcheol Jang

The generation of trajectory data has increased dramatically with the advent and widespread use of GPS-enabled devices. This rich source of data provides invaluable insights for various applications such as traffic optimization, urban planning, crowd management, and public safety. However, the increasing demand for the publication and sharing of trajectory data for big data analytics raises significant privacy concerns due to the sensitive nature of the location information embedded in the trajectory data. Privacy-preserving trajectory publishing (PPTP) has been an active research area to address these concerns, and synthetic trajectory generation has emerged as a promising direction within PPTP. This survey paper provides a comprehensive overview of PPTP with a focus on synthetic trajectory generation methods, which have been insufficiently covered in previous surveys. Our contributions include a comparison of existing PPTP techniques based on their applicability and effectiveness for data analysis tasks. We then review and discuss the existing work on synthetic trajectory generation in the context of PPTP. Specifically, we classify the existing studies into two main categories, algorithm-based and deep learning-based approaches, and within each category, we perform a comparative analysis of the studied methods, focusing on their different characteristics. Finally, in order to encourage further research in this area, we identify and highlight a number of promising directions for future investigation that deserve to be explored in greater depth.

随着 GPS 设备的出现和广泛使用,轨迹数据的生成量急剧增加。这一丰富的数据源为交通优化、城市规划、人群管理和公共安全等各种应用提供了宝贵的见解。然而,由于轨迹数据中蕴含的位置信息具有敏感性,大数据分析对发布和共享轨迹数据的需求日益增长,这引发了人们对隐私的极大关注。为解决这些问题,隐私保护轨迹发布(PPTP)一直是一个活跃的研究领域,而合成轨迹生成已成为 PPTP 中一个很有前景的方向。本调查论文全面概述了 PPTP,并重点介绍了合成轨迹生成方法,而以往的调查报告对这些方法的介绍不够充分。我们的贡献包括根据现有 PPTP 技术在数据分析任务中的适用性和有效性对其进行比较。然后,我们回顾并讨论了在 PPTP 背景下合成轨迹生成方面的现有工作。具体来说,我们将现有研究分为两大类:基于算法的方法和基于深度学习的方法,并在每一类中对所研究的方法进行比较分析,重点关注它们的不同特点。最后,为了鼓励在这一领域开展进一步研究,我们确定并强调了一些值得深入探讨的未来研究方向。
{"title":"Privacy-preserving generation and publication of synthetic trajectory microdata: A comprehensive survey","authors":"Jong Wook Kim ,&nbsp;Beakcheol Jang","doi":"10.1016/j.jnca.2024.103951","DOIUrl":"https://doi.org/10.1016/j.jnca.2024.103951","url":null,"abstract":"<div><p>The generation of trajectory data has increased dramatically with the advent and widespread use of GPS-enabled devices. This rich source of data provides invaluable insights for various applications such as traffic optimization, urban planning, crowd management, and public safety. However, the increasing demand for the publication and sharing of trajectory data for big data analytics raises significant privacy concerns due to the sensitive nature of the location information embedded in the trajectory data. Privacy-preserving trajectory publishing (PPTP) has been an active research area to address these concerns, and synthetic trajectory generation has emerged as a promising direction within PPTP. This survey paper provides a comprehensive overview of PPTP with a focus on synthetic trajectory generation methods, which have been insufficiently covered in previous surveys. Our contributions include a comparison of existing PPTP techniques based on their applicability and effectiveness for data analysis tasks. We then review and discuss the existing work on synthetic trajectory generation in the context of PPTP. Specifically, we classify the existing studies into two main categories, algorithm-based and deep learning-based approaches, and within each category, we perform a comparative analysis of the studied methods, focusing on their different characteristics. Finally, in order to encourage further research in this area, we identify and highlight a number of promising directions for future investigation that deserve to be explored in greater depth.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"230 ","pages":"Article 103951"},"PeriodicalIF":7.7,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141604755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Contextual Multi-Armed Bandit approach for NDN forwarding 用于 NDN 转发的上下文多臂匪帮法
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-29 DOI: 10.1016/j.jnca.2024.103952
Yakoub Mordjana, Badis Djamaa, Mustapha Reda Senouci, Aymen Herzallah

Named Data Networking (NDN) is a promising Internet architecture that aims to supersede the current IP-based architecture and shift the host-centric model to a data-centric one. Within NDN, forwarding Interest packets remains a significant challenge and has attracted considerable recent research attention. The momentum behind machine learning techniques, especially reinforcement learning, is steadily growing, offering the potential to deliver intelligent, adaptable, and reliable NDN forwarding algorithms. In this context, this paper proposes efficient NDN forwarding strategies based on Contextual Multi-Armed Bandit (CMAB). Initially, we employ CMAB to address the challenge of forwarding Interest packets and introduce a new CMAB model tailored for NDN, dubbed CMAB4NDN. Subsequently, we construct the CMAB context using information derived from the content name and the network congestion state, which are then fed into the CMAB4NDN learning algorithm to decide on the best forwarding action. Further, we develop three CMAB strategies, namely Lin-ɛ-Greedy, Linear Upper Confidence Bound, and Contextual Thompson Sampling, and deploy them within our proposal. CMAB4NDN was implemented in ndnSIM, thoroughly evaluated, and compared with multiple state-of-the-art NDN forwarding algorithms across various scenarios. The obtained results confirm the relevance and superiority of our approach in terms of delay, throughput, and packet loss.

命名数据网络(NDN)是一种前景广阔的互联网架构,旨在取代当前基于 IP 的架构,将以主机为中心的模式转变为以数据为中心的模式。在 NDN 中,转发兴趣数据包仍然是一项重大挑战,并吸引了近期大量研究的关注。机器学习技术(尤其是强化学习)的发展势头正在稳步增长,为提供智能、适应性强且可靠的 NDN 转发算法提供了可能。在此背景下,本文提出了基于上下文多臂匪帮(CMAB)的高效 NDN 转发策略。首先,我们采用 CMAB 来应对转发兴趣数据包的挑战,并引入了一个为 NDN 量身定制的新 CMAB 模型,称为 CMAB4NDN。随后,我们利用从内容名称和网络拥塞状态中获得的信息构建 CMAB 上下文,然后将其输入 CMAB4NDN 学习算法,以决定最佳转发操作。此外,我们还开发了三种CMAB策略,即Lin--Greedy、线性置信度上限和上下文汤普森采样,并将它们部署在我们的建议中。我们在ndnSIM中实现了CMAB4NDN,对其进行了全面评估,并在各种场景下与多种最先进的NDN转发算法进行了比较。所获得的结果证实了我们的方法在延迟、吞吐量和数据包丢失方面的相关性和优越性。
{"title":"A Contextual Multi-Armed Bandit approach for NDN forwarding","authors":"Yakoub Mordjana,&nbsp;Badis Djamaa,&nbsp;Mustapha Reda Senouci,&nbsp;Aymen Herzallah","doi":"10.1016/j.jnca.2024.103952","DOIUrl":"10.1016/j.jnca.2024.103952","url":null,"abstract":"<div><p>Named Data Networking (NDN) is a promising Internet architecture that aims to supersede the current IP-based architecture and shift the host-centric model to a data-centric one. Within NDN, forwarding Interest packets remains a significant challenge and has attracted considerable recent research attention. The momentum behind machine learning techniques, especially reinforcement learning, is steadily growing, offering the potential to deliver intelligent, adaptable, and reliable NDN forwarding algorithms. In this context, this paper proposes efficient NDN forwarding strategies based on Contextual Multi-Armed Bandit (CMAB). Initially, we employ CMAB to address the challenge of forwarding Interest packets and introduce a new CMAB model tailored for NDN, dubbed CMAB4NDN. Subsequently, we construct the CMAB context using information derived from the content name and the network congestion state, which are then fed into the CMAB4NDN learning algorithm to decide on the best forwarding action. Further, we develop three CMAB strategies, namely Lin-<span><math><mi>ɛ</mi></math></span>-Greedy, Linear Upper Confidence Bound, and Contextual Thompson Sampling, and deploy them within our proposal. CMAB4NDN was implemented in ndnSIM, thoroughly evaluated, and compared with multiple state-of-the-art NDN forwarding algorithms across various scenarios. The obtained results confirm the relevance and superiority of our approach in terms of delay, throughput, and packet loss.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"230 ","pages":"Article 103952"},"PeriodicalIF":7.7,"publicationDate":"2024-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141566467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
JamholeHunter: On detecting new wormhole attack in Opportunistic Mobile Networks JamholeHunter:关于检测机会移动网络中的新虫洞攻击
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-28 DOI: 10.1016/j.jnca.2024.103953
Ala Altaweel, Sidra Aslam, Ibrahim Kamel

This paper first shows that Prophet, Spray and Wait, Epidemic, and First Contact routing protocols in Opportunistic Mobile Networks (OMNs) are vulnerable to the Jamhole attack. In Jamhole attack, an attacker, Eve, compromises two different locations in OMNs by (i) jamming the GPS signal of victim nodes in these locations and (ii) by establishing a pair-wise hidden wormhole tunnel among these locations to route packets and to achieve high packet delivery ratio. The Jamhole attack enables Eve to disrupt the routing, obtain more packets of victim nodes, and possibly launch more severe attacks like packet modification, packet dropping, and packet injection attacks.

In this paper, the impact of Jamhole attack on OMNs routing protocols is investigated using different attack parameters (i.e., area of compromised locations, attack frequency, and attack duration). To identify the Jamhole attack, this paper proposes JamholeHunter, a detection protocol that employs nodes’ wireless ranges, velocities, and last available GPS locations. The paper measured the impact of Jamhole attack and evaluated the JamholeHunter technique through extensive simulation experiments using synthetic and real-world mobility traces. The results demonstrate that (i) the Jamhole attack can cause a serious impact on the OMNs routing protocols, (ii) the effectiveness of JamholeHunter in identifying Jamhole attack with Detection Rate (75% to 100%) depending on various attack parameters with 95% Accuracy, and low False Positive Rate ( 3.7%), and (iii) the reliability of JamholeHunter in real-world scenarios of OMNs under different attack parameters, mobility models, and nodes velocity.

本文首先展示了机会移动网络(OMN)中的先知、喷洒与等待、流行和首次接触路由协议易受虫洞攻击(Jamhole attack)的影响。在Jamhole攻击中,攻击者夏娃(Eve)通过(i)干扰OMN中两个不同地点的受害节点的GPS信号,(ii)在这些地点之间建立成对的隐蔽虫洞隧道来路由数据包并实现高数据包传输率。Jamhole 攻击使 Eve 能够破坏路由,获取更多受害节点的数据包,并可能发起更严重的攻击,如数据包修改、数据包丢弃和数据包注入攻击。为了识别 Jamhole 攻击,本文提出了 JamholeHunter,一种利用节点的无线范围、速度和最后可用 GPS 位置的检测协议。本文测量了 Jamhole 攻击的影响,并通过使用合成和真实世界移动轨迹进行广泛的模拟实验评估了 JamholeHunter 技术。结果表明:(i) Jamhole 攻击会对 OMN 路由协议造成严重影响;(ii) JamholeHunter 能有效识别 Jamhole 攻击,其检测率(75% 至 100%)取决于各种攻击参数,准确率达 95%,误报率低(≤ 3.7%);(iii) JamholeHunter 在不同攻击参数、移动模型和节点速度下的 OMN 真实场景中具有可靠性。
{"title":"JamholeHunter: On detecting new wormhole attack in Opportunistic Mobile Networks","authors":"Ala Altaweel,&nbsp;Sidra Aslam,&nbsp;Ibrahim Kamel","doi":"10.1016/j.jnca.2024.103953","DOIUrl":"https://doi.org/10.1016/j.jnca.2024.103953","url":null,"abstract":"<div><p>This paper first shows that Prophet, Spray and Wait, Epidemic, and First Contact routing protocols in Opportunistic Mobile Networks (OMNs) are vulnerable to the Jamhole attack. In Jamhole attack, an attacker, Eve, compromises two different locations in OMNs by (i) jamming the GPS signal of victim nodes in these locations and (ii) by establishing a pair-wise hidden wormhole tunnel among these locations to route packets and to achieve high packet delivery ratio. The Jamhole attack enables Eve to disrupt the routing, obtain more packets of victim nodes, and possibly launch more severe attacks like packet modification, packet dropping, and packet injection attacks.</p><p>In this paper, the impact of Jamhole attack on OMNs routing protocols is investigated using different attack parameters (i.e., area of compromised locations, attack frequency, and attack duration). To identify the Jamhole attack, this paper proposes JamholeHunter, a detection protocol that employs nodes’ wireless ranges, velocities, and last available GPS locations. The paper measured the impact of Jamhole attack and evaluated the JamholeHunter technique through extensive simulation experiments using synthetic and real-world mobility traces. The results demonstrate that (i) the Jamhole attack can cause a serious impact on the OMNs routing protocols, (ii) the effectiveness of JamholeHunter in identifying Jamhole attack with Detection Rate (75% to 100%) depending on various attack parameters with <span><math><mo>∼</mo></math></span>95% Accuracy, and low False Positive Rate (<span><math><mo>≤</mo></math></span> 3.7%), and (iii) the reliability of JamholeHunter in real-world scenarios of OMNs under different attack parameters, mobility models, and nodes velocity.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"230 ","pages":"Article 103953"},"PeriodicalIF":7.7,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141543346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-UAV aided energy-aware transmissions in mmWave communication network: Action-branching QMIX network 毫米波通信网络中的多无人机辅助能量感知传输:行动分支 QMIX 网络
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-26 DOI: 10.1016/j.jnca.2024.103948
Quang Tuan Do , Thien Duc Hua , Anh-Tien Tran , Dongwook Won , Geeranuch Woraphonbenjakul , Wonjong Noh , Sungrae Cho

Advancements in drone technology and high-frequency millimeter-wave communications are transforming unmanned-aerial-vehicles (UAV)-aided networks, expanding their potential across diverse applications. Despite the advantages of broad frequency bandwidth and enhanced line of sight connectivity in the UAV-aided millimeter-wave networks, it is challenging to provide high network performance because of the inherent limitations of limited UAV energy and millimeter-wave’s large path loss. This challenge becomes more important in dynamically changing multi-UAV environments. To address this challenge in multi-UAV networks, we propose a novel approach based on multi-agent deep reinforcement learning called action-branching QMIX. Our method determines nearly optimal codebook-based discrete beamforming vectors and UAV trajectories while maintaining a balance between communication efficiency and energy consumption. The proposed approach employs a new Long Short-Term Memory module to control long sequences effectively and enables it to adapt to changing environmental variables in real-time. We thoroughly evaluate the proposed control with a real-world measurement-based channel model. The evaluation confirms that the proposed control converges stably and consistently, and provides enhanced performance in terms of downlink data rate, success rate of reaching the destination, and service duration when compared to traditional benchmark multi-agent reinforcement learning schemes. These results emphasize the enhanced energy sustainability, robustness, and stability of the proposed approach in dynamically changing multi-UAV environments when compared to the existing benchmark algorithms.

无人机技术和高频毫米波通信的进步正在改变无人机辅助网络,扩大其在各种应用中的潜力。尽管无人机辅助毫米波网络具有宽频带宽和增强视线连接等优势,但由于无人机能量有限和毫米波路径损耗大等固有限制,提供高网络性能仍面临挑战。在动态变化的多无人机环境中,这一挑战变得更加重要。为了应对多无人机网络中的这一挑战,我们提出了一种基于多代理深度强化学习的新方法,称为行动分支 QMIX。我们的方法能确定近乎最优的基于编码本的离散波束成形向量和无人机轨迹,同时保持通信效率和能耗之间的平衡。所提出的方法采用了新的长短期记忆模块来有效控制长序列,并使其能够实时适应不断变化的环境变量。我们利用现实世界中基于测量的信道模型对所提出的控制方法进行了全面评估。评估证实,与传统的基准多代理强化学习方案相比,所提出的控制方案收敛稳定、持续,并在下行链路数据速率、到达目的地的成功率和服务持续时间方面提供了更高的性能。这些结果表明,与现有的基准算法相比,所提出的方法在动态变化的多无人飞行器环境中具有更强的能源可持续性、鲁棒性和稳定性。
{"title":"Multi-UAV aided energy-aware transmissions in mmWave communication network: Action-branching QMIX network","authors":"Quang Tuan Do ,&nbsp;Thien Duc Hua ,&nbsp;Anh-Tien Tran ,&nbsp;Dongwook Won ,&nbsp;Geeranuch Woraphonbenjakul ,&nbsp;Wonjong Noh ,&nbsp;Sungrae Cho","doi":"10.1016/j.jnca.2024.103948","DOIUrl":"https://doi.org/10.1016/j.jnca.2024.103948","url":null,"abstract":"<div><p>Advancements in drone technology and high-frequency millimeter-wave communications are transforming unmanned-aerial-vehicles (UAV)-aided networks, expanding their potential across diverse applications. Despite the advantages of broad frequency bandwidth and enhanced line of sight connectivity in the UAV-aided millimeter-wave networks, it is challenging to provide high network performance because of the inherent limitations of limited UAV energy and millimeter-wave’s large path loss. This challenge becomes more important in dynamically changing multi-UAV environments. To address this challenge in multi-UAV networks, we propose a novel approach based on multi-agent deep reinforcement learning called action-branching QMIX. Our method determines nearly optimal codebook-based discrete beamforming vectors and UAV trajectories while maintaining a balance between communication efficiency and energy consumption. The proposed approach employs a new Long Short-Term Memory module to control long sequences effectively and enables it to adapt to changing environmental variables in real-time. We thoroughly evaluate the proposed control with a real-world measurement-based channel model. The evaluation confirms that the proposed control converges stably and consistently, and provides enhanced performance in terms of downlink data rate, success rate of reaching the destination, and service duration when compared to traditional benchmark multi-agent reinforcement learning schemes. These results emphasize the enhanced energy sustainability, robustness, and stability of the proposed approach in dynamically changing multi-UAV environments when compared to the existing benchmark algorithms.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"230 ","pages":"Article 103948"},"PeriodicalIF":7.7,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141604880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Network and Computer Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1