首页 > 最新文献

Journal of Communications and Networks最新文献

英文 中文
An efficient tasks offloading procedure for an integrated edge-computing architecture 集成边缘计算架构的高效任务卸载程序
IF 3.6 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.23919/JCN.2024.000004
Benedetta Picano;Romano Fantacci
The advent of sixth-generation networks has given rise to numerous challenges, requiring the synergistic exploitation of both ground and air edge computing facilities. This paper considers an integrated ground-air edge computing scenario where the computation offloading of a set of delay sensitive tasks has to be performed in a context where ground and air computational facilities are already involved in monitoring and control proceduers in a remote area under an unpredictable overload of computation requests, e.g., related to the management of an emergency situation. In this reference, a matching game is proposed to assign tasks to the most suitable computation nodes, in order to minimize the outage probability of the newly arrived tasks, i.e., the probability with which tasks experience a completion time greater than the corresponding deadline. To this regard, we have considered that new allocated task suffer for a waiting time due to the time needed to complete the service of all the tasks already in the ground or air computation node. As a consequence, to statistically characterize such waiting time, under proper assumptions, we have resorted to the G/G/1 queuing system model and the Lindley's integral equation approach to define a suitable metric to formulate a tasks allocation procedure based on the matching theory. Furthermore, matching stability has been theoretically proved for the proposed approach. Finally, numerical results have been provided in order to highlight the better behavior of the proposed task allocation scheme in comparison with different state-of-the-art alternatives.
第六代网络的出现带来了众多挑战,需要协同利用地面和空中的边缘计算设施。本文考虑了一种地空一体化边缘计算场景,在这种场景下,地面和空中计算设施已经参与到偏远地区的监控程序中,在不可预测的超负荷计算请求(例如与紧急情况管理相关的计算请求)下,必须对一组延迟敏感任务进行计算卸载。在这一参考文献中,我们提出了一种匹配博弈方法,将任务分配给最合适的计算节点,以尽量减少新到达任务的中断概率,即任务完成时间大于相应截止时间的概率。为此,我们考虑到新分配的任务由于需要时间来完成已在地面或空中计算节点中的所有任务的服务,因此需要等待一段时间。因此,为了在适当的假设条件下统计这种等待时间的特征,我们采用了 G/G/1 队列系统模型和林德利积分方程方法来定义一个合适的度量,以制定基于匹配理论的任务分配程序。此外,我们还从理论上证明了拟议方法的匹配稳定性。最后,还提供了数值结果,以突出所提任务分配方案与最先进的其他方案相比具有更好的性能。
{"title":"An efficient tasks offloading procedure for an integrated edge-computing architecture","authors":"Benedetta Picano;Romano Fantacci","doi":"10.23919/JCN.2024.000004","DOIUrl":"https://doi.org/10.23919/JCN.2024.000004","url":null,"abstract":"The advent of sixth-generation networks has given rise to numerous challenges, requiring the synergistic exploitation of both ground and air edge computing facilities. This paper considers an integrated ground-air edge computing scenario where the computation offloading of a set of delay sensitive tasks has to be performed in a context where ground and air computational facilities are already involved in monitoring and control proceduers in a remote area under an unpredictable overload of computation requests, e.g., related to the management of an emergency situation. In this reference, a matching game is proposed to assign tasks to the most suitable computation nodes, in order to minimize the outage probability of the newly arrived tasks, i.e., the probability with which tasks experience a completion time greater than the corresponding deadline. To this regard, we have considered that new allocated task suffer for a waiting time due to the time needed to complete the service of all the tasks already in the ground or air computation node. As a consequence, to statistically characterize such waiting time, under proper assumptions, we have resorted to the G/G/1 queuing system model and the Lindley's integral equation approach to define a suitable metric to formulate a tasks allocation procedure based on the matching theory. Furthermore, matching stability has been theoretically proved for the proposed approach. Finally, numerical results have been provided in order to highlight the better behavior of the proposed task allocation scheme in comparison with different state-of-the-art alternatives.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10522525","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information for authors 作者须知
IF 3.6 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.23919/JCN.2024.000019
{"title":"Information for authors","authors":"","doi":"10.23919/JCN.2024.000019","DOIUrl":"https://doi.org/10.23919/JCN.2024.000019","url":null,"abstract":"","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10522522","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SER performance analysis of generalized κ — μ and η — μ fading channels 广义 κ - μ 和 η - μ 衰减信道的 SER 性能分析
IF 3.6 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.23919/JCN.2024.000005
Jingjing Guo;Di Zhang;Li You;Xuewan Zhang;Shahid Mumtaz
System performance analysis is a vital issue in the fifth generation (5G) and beyond wireless communications, which is widely adopted for the design and estimation of wireless communication systems before deployments. To this end, the versatile system performance expressions that can be used under various conditions are of significant importance. This paper investigates the symbol error rate (SER) performance over the generalized κ — μ and η — μ fading channels, whereby the SER expressions in this case are versatile and can characterize the performance under various wireless channel models. To address the computational complexity associated with high-order trigonometric integration, we present the closed-form SER expressions with arbitrary small errors. Monte Carlo-based simulations demonstrate the validity of our derivation and analysis. Simulation results also show that: 1) the closed-form solutions we derived for SER yield minimal errors upon variations in the truncation factor T and are computationally more efficient, in which T can be set to a minimal value to attain precise outcomes or be optimally chosen contingent on the channel parameters; 2) elevating the values of parameters κ, μ and η results in decreased SER, with μ exerting a more significant impact than κ and η; and 3) our approximate expressions have superior accuracy compared to the previous estimated expressions.
系统性能分析是第五代(5G)及以后无线通信领域的一个重要问题,被广泛用于无线通信系统部署前的设计和估算。为此,可在各种条件下使用的通用系统性能表达式具有重要意义。本文研究了广义κ - μ和η - μ衰减信道上的符号错误率(SER)性能,在这种情况下,SER表达式具有多样性,可以表征各种无线信道模型下的性能。为了解决与高阶三角积分相关的计算复杂性问题,我们提出了具有任意小误差的闭式 SER 表达式。基于蒙特卡罗的仿真证明了我们的推导和分析的有效性。模拟结果还表明1) 我们推导出的 SER 闭式解在截断因子 T 变化时误差最小,计算效率更高,其中 T 可设置为最小值以获得精确结果,或根据信道参数进行优化选择;2) 提高参数 κ、μ 和 η 的值会降低 SER,其中 μ 比 κ 和 η 的影响更大;3) 与之前的估计表达式相比,我们的近似表达式具有更高的精确度。
{"title":"SER performance analysis of generalized κ — μ and η — μ fading channels","authors":"Jingjing Guo;Di Zhang;Li You;Xuewan Zhang;Shahid Mumtaz","doi":"10.23919/JCN.2024.000005","DOIUrl":"https://doi.org/10.23919/JCN.2024.000005","url":null,"abstract":"System performance analysis is a vital issue in the fifth generation (5G) and beyond wireless communications, which is widely adopted for the design and estimation of wireless communication systems before deployments. To this end, the versatile system performance expressions that can be used under various conditions are of significant importance. This paper investigates the symbol error rate (SER) performance over the generalized κ — μ and η — μ fading channels, whereby the SER expressions in this case are versatile and can characterize the performance under various wireless channel models. To address the computational complexity associated with high-order trigonometric integration, we present the closed-form SER expressions with arbitrary small errors. Monte Carlo-based simulations demonstrate the validity of our derivation and analysis. Simulation results also show that: 1) the closed-form solutions we derived for SER yield minimal errors upon variations in the truncation factor T and are computationally more efficient, in which T can be set to a minimal value to attain precise outcomes or be optimally chosen contingent on the channel parameters; 2) elevating the values of parameters κ, μ and η results in decreased SER, with μ exerting a more significant impact than κ and η; and 3) our approximate expressions have superior accuracy compared to the previous estimated expressions.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10522516","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Private and consortium blockchain-based authentication protocol for IoT devices using PUF 使用 PUF 为物联网设备提供基于区块链的私有和联盟认证协议
IF 3.6 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.23919/JCN.2024.000014
Tyson Baptist D. Cunha;Kiran Manjappa
In this work, a static random access memory-physical unclonable function (SRAM-PUF) based device security framework is proposed which uses the trending blockchain technology for securing the device credentials. The proposed framework produces a unique fingerprint called PUF key for each device based on its hardware characteristics which will act as an authenticating parameter for the devices during the authentication and re-authentication phase. The proposed work uses both consortium and private blockchains for storing device credentials and authentication, unlike the current trend of using either a secured database or only a public blockchain. The consortium blockchain is used for first-time authentication, while the private blockchain is used for repeated authentication which saves the time incurred in accessing the consortium blockchain during repeated authentication. The proposed protocol also includes mutual authentication between the entities involved and thus provides dual security (device authentication and mutual authentication) to the proposed protocol making the system more secure and robust against attacks. Security analysis of the proposed protocol is done using the Scyther tool and the protocol is also theoretically proven to be stable under various attacks using threat analysis and the real-or-random model (ROR). The performance analysis of the protocol is done by analyzing the computation and communication cost of the proposed protocol against other state-of-the-art protocols. Further, the proposed protocol is also evaluated in the blockchain testbed which includes Raspberry PI and Arduino components. The results conveyed that the introduction of a private blockchain reduces the time incurred in the device re-authentication.
在这项工作中,提出了一种基于静态随机存取存储器-物理不可克隆函数(SRAM-PUF)的设备安全框架,该框架利用时下流行的区块链技术确保设备凭证的安全。提议的框架根据每个设备的硬件特征为其生成一个称为 PUF 密钥的独特指纹,该密钥将作为设备在认证和再认证阶段的认证参数。与当前使用安全数据库或仅使用公共区块链的趋势不同,拟议的工作同时使用联盟区块链和私有区块链来存储设备凭证和验证。联盟区块链用于首次身份验证,而私有区块链用于重复身份验证,从而节省了在重复身份验证过程中访问联盟区块链所需的时间。拟议的协议还包括相关实体之间的相互认证,从而为拟议的协议提供了双重安全性(设备认证和相互认证),使系统更安全、更稳健地抵御攻击。我们使用 Scyther 工具对拟议协议进行了安全分析,并使用威胁分析和真实或随机模型(ROR)从理论上证明了该协议在各种攻击下的稳定性。协议的性能分析是通过分析拟议协议与其他最先进协议的计算和通信成本来完成的。此外,还在包括树莓派(Raspberry PI)和阿杜诺(Arduino)组件的区块链测试平台上对所提出的协议进行了评估。结果表明,引入私有区块链减少了设备重新认证所需的时间。
{"title":"Private and consortium blockchain-based authentication protocol for IoT devices using PUF","authors":"Tyson Baptist D. Cunha;Kiran Manjappa","doi":"10.23919/JCN.2024.000014","DOIUrl":"https://doi.org/10.23919/JCN.2024.000014","url":null,"abstract":"In this work, a static random access memory-physical unclonable function (SRAM-PUF) based device security framework is proposed which uses the trending blockchain technology for securing the device credentials. The proposed framework produces a unique fingerprint called PUF key for each device based on its hardware characteristics which will act as an authenticating parameter for the devices during the authentication and re-authentication phase. The proposed work uses both consortium and private blockchains for storing device credentials and authentication, unlike the current trend of using either a secured database or only a public blockchain. The consortium blockchain is used for first-time authentication, while the private blockchain is used for repeated authentication which saves the time incurred in accessing the consortium blockchain during repeated authentication. The proposed protocol also includes mutual authentication between the entities involved and thus provides dual security (device authentication and mutual authentication) to the proposed protocol making the system more secure and robust against attacks. Security analysis of the proposed protocol is done using the Scyther tool and the protocol is also theoretically proven to be stable under various attacks using threat analysis and the real-or-random model (ROR). The performance analysis of the protocol is done by analyzing the computation and communication cost of the proposed protocol against other state-of-the-art protocols. Further, the proposed protocol is also evaluated in the blockchain testbed which includes Raspberry PI and Arduino components. The results conveyed that the introduction of a private blockchain reduces the time incurred in the device re-authentication.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10522519","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Probabilistic resource rescheduling for C-V2X based on delivery rate estimation 基于交付率估计的 C-V2X 概率资源重新安排
IF 3.6 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.23919/JCN.2024.000006
Doyeon Hyeon;Chaeyeong Lee;Heemin Kim;Sungrae Cho;Jeongyeup Paek;Ramesh Govindan
Vehicle-to-everything (V2X) communication is an essential component for fully autonomous vehicles in future intelligent transportation systems, and cellular-V2X (C-V2X) is a standard that allows vehicles to communicate with its surroundings using cellular technology. Among the resource allocation modes of C-V2X, Mode 4 is a distributed scheme in which each vehicle independently selects a radio resource using the sensing-based semi-persistent scheduling (SB-SPS) algorithm. However, it is susceptible to resource conflicts especially with increased vehicle density or mobility, and the conflicts cannot be detected, leading to poor performance due to collisions and interference. To address this problem, this paper proposes a delivery rate estimation based probabilistic resource re-scheduling (EB-PRS) scheme. The delivery ratio is estimated using opportunistic bloom filter-based feedback on which vehicle's messages are received successfully. Based on the estimated delivery rate, EB-PRS carefully reselects resources probabilistically to maximize performance. EB-PRS is evaluated in highway and urban scenarios using WiLabV2Xsim simulator to show that it significantly improves upon the SB-SPS by reducing packet collisions.
车对物(V2X)通信是未来智能交通系统中完全自动驾驶车辆的重要组成部分,而蜂窝-V2X(C-V2X)是一种允许车辆使用蜂窝技术与周围环境通信的标准。在 C-V2X 的资源分配模式中,模式 4 是一种分布式方案,每辆车使用基于传感的半持久调度(SB-SPS)算法独立选择无线电资源。然而,它容易发生资源冲突,尤其是在车辆密度或移动性增加的情况下,而且冲突无法被检测到,从而导致因碰撞和干扰造成的性能低下。为解决这一问题,本文提出了一种基于交付率估计的概率资源重新调度(EB-PRS)方案。交付率是利用基于机会主义盛放滤波器的反馈来估计哪些车辆的信息被成功接收的。EB-PRS 根据估计的交付率,以概率方式谨慎地重新选择资源,以实现性能最大化。使用 WiLabV2Xsim 模拟器在高速公路和城市场景中对 EB-PRS 进行了评估,结果表明 EB-PRS 通过减少数据包碰撞,显著提高了 SB-SPS 的性能。
{"title":"Probabilistic resource rescheduling for C-V2X based on delivery rate estimation","authors":"Doyeon Hyeon;Chaeyeong Lee;Heemin Kim;Sungrae Cho;Jeongyeup Paek;Ramesh Govindan","doi":"10.23919/JCN.2024.000006","DOIUrl":"https://doi.org/10.23919/JCN.2024.000006","url":null,"abstract":"Vehicle-to-everything (V2X) communication is an essential component for fully autonomous vehicles in future intelligent transportation systems, and cellular-V2X (C-V2X) is a standard that allows vehicles to communicate with its surroundings using cellular technology. Among the resource allocation modes of C-V2X, Mode 4 is a distributed scheme in which each vehicle independently selects a radio resource using the sensing-based semi-persistent scheduling (SB-SPS) algorithm. However, it is susceptible to resource conflicts especially with increased vehicle density or mobility, and the conflicts cannot be detected, leading to poor performance due to collisions and interference. To address this problem, this paper proposes a delivery rate estimation based probabilistic resource re-scheduling (EB-PRS) scheme. The delivery ratio is estimated using opportunistic bloom filter-based feedback on which vehicle's messages are received successfully. Based on the estimated delivery rate, EB-PRS carefully reselects resources probabilistically to maximize performance. EB-PRS is evaluated in highway and urban scenarios using WiLabV2Xsim simulator to show that it significantly improves upon the SB-SPS by reducing packet collisions.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10522524","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed IIoT anomaly detection scheme based on blockchain and federated learning 基于区块链和联合学习的分布式物联网异常检测方案
IF 3.6 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.23919/JCN.2024.000016
Xiaojun Jin;Chao Ma;Song Luo;Pengyi Zeng;Yifei Wei
Anomaly detection in the industrial internet of things (IIoT) devices is significant due to its fundamental role in protecting modern critical infrastructure. In the IIoT, anomaly detection can be carried out by training machine learning models. Data sharing between factories can expand the data from which the model is trained, thus improving the performance of the model. However, due to the sensitivity and privacy of IIoT data, it is also difficult to build a high-performance anomaly detection model between factories. To address this problem, we design an anomaly detection method for IIoT devices combined blockchain of main-side structure and federated learning. We store the global model on the main-chain while the side-chain records the hash value of the global models and local models, which updated by participating nodes, controlling nodes access to the global model through the main-side blockchain and the smart contracts. Only the nodes participating in the current federated learning training can get the latest global model, so as to encourage the nodes to take part in the training of the global model. We designed a proof of accuracy consensus algorithm, and select the nodes to participate in training according to the accuracy of the local model on the test dataset to resist the poisoning attack of the models. We also use the local differential privacy (LDP) algorithm to protect user data privacy from model inference attacks by adding noise to the local model. Finally, we propose a new algorithm named Fed_Acc to keep the accuracy of the global model stable when the users add a lot of noise to their local models.
工业物联网(IIoT)设备中的异常检测在保护现代关键基础设施方面发挥着重要作用。在 IIoT 中,异常检测可以通过训练机器学习模型来实现。工厂之间的数据共享可以扩大训练模型的数据量,从而提高模型的性能。然而,由于物联网数据的敏感性和隐私性,在工厂之间建立高性能的异常检测模型也很困难。为了解决这个问题,我们设计了一种将主侧结构区块链和联合学习相结合的 IIoT 设备异常检测方法。我们将全局模型存储在主链上,侧链则记录全局模型和本地模型的哈希值,并由参与节点更新,通过主侧区块链和智能合约控制节点对全局模型的访问。只有参与当前联合学习训练的节点才能获得最新的全局模型,从而鼓励节点参与全局模型的训练。我们设计了一种精度证明共识算法,根据本地模型在测试数据集上的精度来选择参与训练的节点,以抵御模型的中毒攻击。我们还使用了局部差分隐私(LDP)算法,通过在局部模型中添加噪声来保护用户数据隐私免受模型推理攻击。最后,我们提出了一种名为 Fed_Acc 的新算法,以在用户向本地模型添加大量噪声时保持全局模型的准确性稳定。
{"title":"Distributed IIoT anomaly detection scheme based on blockchain and federated learning","authors":"Xiaojun Jin;Chao Ma;Song Luo;Pengyi Zeng;Yifei Wei","doi":"10.23919/JCN.2024.000016","DOIUrl":"https://doi.org/10.23919/JCN.2024.000016","url":null,"abstract":"Anomaly detection in the industrial internet of things (IIoT) devices is significant due to its fundamental role in protecting modern critical infrastructure. In the IIoT, anomaly detection can be carried out by training machine learning models. Data sharing between factories can expand the data from which the model is trained, thus improving the performance of the model. However, due to the sensitivity and privacy of IIoT data, it is also difficult to build a high-performance anomaly detection model between factories. To address this problem, we design an anomaly detection method for IIoT devices combined blockchain of main-side structure and federated learning. We store the global model on the main-chain while the side-chain records the hash value of the global models and local models, which updated by participating nodes, controlling nodes access to the global model through the main-side blockchain and the smart contracts. Only the nodes participating in the current federated learning training can get the latest global model, so as to encourage the nodes to take part in the training of the global model. We designed a proof of accuracy consensus algorithm, and select the nodes to participate in training according to the accuracy of the local model on the test dataset to resist the poisoning attack of the models. We also use the local differential privacy (LDP) algorithm to protect user data privacy from model inference attacks by adding noise to the local model. Finally, we propose a new algorithm named Fed_Acc to keep the accuracy of the global model stable when the users add a lot of noise to their local models.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10522517","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network resource allocation method based on blockchain and federated learning in IoT 物联网中基于区块链和联合学习的网络资源分配方法
IF 3.6 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.23919/JCN.2024.000007
Hui Zhi;Yaning Wang
Virtual network embedding (VNE) is an effective approach to solve the resource allocation problem in IoT networks. But most existing VNE methods are centralized methods, they not only impose an excessive burden on the central server but also result in significant communication overhead. Therefore, this paper proposes a distributed resource allocation method based on federated learning (DRAM-FL) to alleviate the computing and communication overhead, and improve network resource utilization. When utilizing DRAM-FL, it is essential to address the security challenges arising from the unreliable nature of IoT devices. So, we introduce blockchain into DRAM-FL, and propose a distributed resource allocation method based on blockchain and federated learning (DRAM-BFL). In DRAM-BFL, a dual-chain structure is designed to facilitate reliable information exchange among nodes, a node reliability assessment method and EPBFT-NRA consensus algorithm are proposed to improve the security of VNE. Simulation results demonstrate that, compared with other methods, DRAM-BFL can increase the VN acceptance rate and long-term average revenue-to-expenditure ratio while improving system security. In addition, DRAM-BFL exhibits good scalability, and has superior throughput and delay performance in IoT with malicious nodes.
虚拟网络嵌入(VNE)是解决物联网网络资源分配问题的一种有效方法。但现有的虚拟网络嵌入方法大多是集中式方法,它们不仅给中心服务器带来了过重的负担,还造成了巨大的通信开销。因此,本文提出了一种基于联合学习(DRAM-FL)的分布式资源分配方法,以减轻计算和通信开销,提高网络资源利用率。在使用 DRAM-FL 时,必须解决物联网设备的不可靠特性所带来的安全挑战。因此,我们将区块链引入 DRAM-FL,并提出了一种基于区块链和联合学习(DRAM-BFL)的分布式资源分配方法。在DRAM-BFL中,设计了双链结构以促进节点间可靠的信息交换,提出了节点可靠性评估方法和EPBFT-NRA共识算法以提高VNE的安全性。仿真结果表明,与其他方法相比,DRAM-BFL 在提高系统安全性的同时,还能提高虚拟网络接受率和长期平均收支比。此外,DRAM-BFL 还具有良好的可扩展性,在存在恶意节点的物联网中具有卓越的吞吐量和延迟性能。
{"title":"Network resource allocation method based on blockchain and federated learning in IoT","authors":"Hui Zhi;Yaning Wang","doi":"10.23919/JCN.2024.000007","DOIUrl":"https://doi.org/10.23919/JCN.2024.000007","url":null,"abstract":"Virtual network embedding (VNE) is an effective approach to solve the resource allocation problem in IoT networks. But most existing VNE methods are centralized methods, they not only impose an excessive burden on the central server but also result in significant communication overhead. Therefore, this paper proposes a distributed resource allocation method based on federated learning (DRAM-FL) to alleviate the computing and communication overhead, and improve network resource utilization. When utilizing DRAM-FL, it is essential to address the security challenges arising from the unreliable nature of IoT devices. So, we introduce blockchain into DRAM-FL, and propose a distributed resource allocation method based on blockchain and federated learning (DRAM-BFL). In DRAM-BFL, a dual-chain structure is designed to facilitate reliable information exchange among nodes, a node reliability assessment method and EPBFT-NRA consensus algorithm are proposed to improve the security of VNE. Simulation results demonstrate that, compared with other methods, DRAM-BFL can increase the VN acceptance rate and long-term average revenue-to-expenditure ratio while improving system security. In addition, DRAM-BFL exhibits good scalability, and has superior throughput and delay performance in IoT with malicious nodes.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10522527","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fatal C-V2X denial-of-service attack degrading quality of service in a highway scenario 高速公路场景中降低服务质量的致命 C-V2X 拒绝服务攻击
IF 3.6 3区 计算机科学 Q1 Computer Science Pub Date : 2024-03-11 DOI: 10.23919/JCN.2023.000066
Kyungtae Kim;Dongyoon Kwon;Woo-Cheol Jin;Sinuk Choi;Jinmo Kim;Ji-Woong Choi
A denial-of-service (DoS) attack, which prevents other nodes from accessing resources, is one of the fatal security threats in the V2X field. This paper analyzes the DoS attack on C-V2X networks from various viewpoints. First, we derive the conditions for the vulnerable vehicle that are expected to suffer fatal damage when subjected to the DoS attack. Then, we provide a method for the attacker to identify the vulnerable vehicle satisfying the derived conditions. We also verify that the attacker can more easily identify the vulnerable vehicle on a highway where the traffic density is generally constant. We confirm that the DoS attack that attacks the vulnerable vehicle satisfying the derived conditions causes more damage than the conventional DoS attack provided in another study in terms of reliability, coverage, and timeliness (up to 2% reduction in packet delivery ratio, up to 30 m reduction in communication coverage, and 0.15-second increase in the lower 1% update delay). In addition, we compare the ratio of packet errors by MAC of C-V2X to those caused by the DoS attack and verify the lethality of an attack depending on the traffic density. This paper provides insight into DoS attacks on C-V2X network, and future studies will cover the topic of attack detection and defense.
阻止其他节点访问资源的拒绝服务(DoS)攻击是 V2X 领域致命的安全威胁之一。本文从多个角度分析了对 C-V2X 网络的 DoS 攻击。首先,我们得出了易受攻击车辆在遭受 DoS 攻击时预计会遭受致命破坏的条件。然后,我们提供了一种方法,供攻击者识别满足推导条件的易受攻击车辆。我们还验证了在交通密度基本恒定的高速公路上,攻击者更容易识别易受攻击的车辆。我们证实,攻击满足推导条件的易受攻击车辆的 DoS 攻击在可靠性、覆盖范围和及时性方面比另一项研究中提供的传统 DoS 攻击造成的破坏更大(数据包传递率减少达 2%,通信覆盖范围减少达 30 米,低 1%更新延迟增加 0.15 秒)。此外,我们还比较了 C-V2X 的 MAC 与 DoS 攻击造成的数据包错误比率,并验证了攻击的致命性取决于流量密度。本文深入探讨了 C-V2X 网络的 DoS 攻击,未来的研究将涵盖攻击检测和防御主题。
{"title":"Fatal C-V2X denial-of-service attack degrading quality of service in a highway scenario","authors":"Kyungtae Kim;Dongyoon Kwon;Woo-Cheol Jin;Sinuk Choi;Jinmo Kim;Ji-Woong Choi","doi":"10.23919/JCN.2023.000066","DOIUrl":"https://doi.org/10.23919/JCN.2023.000066","url":null,"abstract":"A denial-of-service (DoS) attack, which prevents other nodes from accessing resources, is one of the fatal security threats in the V2X field. This paper analyzes the DoS attack on C-V2X networks from various viewpoints. First, we derive the conditions for the vulnerable vehicle that are expected to suffer fatal damage when subjected to the DoS attack. Then, we provide a method for the attacker to identify the vulnerable vehicle satisfying the derived conditions. We also verify that the attacker can more easily identify the vulnerable vehicle on a highway where the traffic density is generally constant. We confirm that the DoS attack that attacks the vulnerable vehicle satisfying the derived conditions causes more damage than the conventional DoS attack provided in another study in terms of reliability, coverage, and timeliness (up to 2% reduction in packet delivery ratio, up to 30 m reduction in communication coverage, and 0.15-second increase in the lower 1% update delay). In addition, we compare the ratio of packet errors by MAC of C-V2X to those caused by the DoS attack and verify the lethality of an attack depending on the traffic density. This paper provides insight into DoS attacks on C-V2X network, and future studies will cover the topic of attack detection and defense.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10466704","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
In-vehicle network latency analysis for a lane keeping assistance system 车道保持辅助系统的车载网络延迟分析
IF 3.6 3区 计算机科学 Q1 Computer Science Pub Date : 2024-03-11 DOI: 10.23919/JCN.2023.000064
Sinuk Choi;Hoseung Song;Eunmin Choi;Jeong-Woo Seo;Ji-Woong Choi
Due to the rapid advancements in automotive technologies, vehicles now rely on additional high-speed sensors. This development has led to an increase in transmission rates and traffic levels within in-vehicle networks (IVNs), thereby necessitating changes in the electrical/electronic (E/E) architecture and the emergence of next-generation IVNs. This paper explores the adoption of zonal architecture with an Ethernet backbone as the vehicle topology and analyzes the factors influencing end-to-end latency. Furthermore, to evaluate the impact of IVN latency on safety-critical applications, we adopted the lane-keeping assistance system (LKAS) and employed the widely used metric, lateral error distance, to analyze how much the vehicle deviates from its intended position. We determined the feasibility of LKAS support by establishing vehicle-specific lateral distance thresholds, as allowable lateral error distances vary depending on vehicle size and comparing them with the lateral error distance. Since LKAS demands higher resolutions to achieve enhanced accuracy, this study examines the required resolution for vehicles equipped with next-generation architectures. Additionally, the paper proposes guidelines for the compression ratio of camera sensors at various resolutions and determines the maximum lateral vehicle speed achievable.
由于汽车技术的飞速发展,汽车现在依赖于更多的高速传感器。这一发展导致了车载网络(IVN)内传输速率和流量水平的提高,从而需要改变电气/电子(E/E)架构,并出现下一代 IVN。本文探讨了采用以太网骨干网作为车载拓扑的分区架构,并分析了影响端到端延迟的因素。此外,为了评估 IVN 延迟对安全关键型应用的影响,我们采用了车道保持辅助系统(LKAS),并使用广泛使用的指标--横向误差距离来分析车辆偏离预定位置的程度。由于允许的横向误差距离因车辆大小而异,我们通过建立车辆特定的横向距离阈值并将其与横向误差距离进行比较,确定了 LKAS 支持的可行性。由于 LKAS 需要更高的分辨率才能实现更高的精度,因此本研究探讨了配备下一代架构的车辆所需的分辨率。此外,本文还提出了各种分辨率下摄像头传感器压缩比的指导原则,并确定了可实现的最大横向车速。
{"title":"In-vehicle network latency analysis for a lane keeping assistance system","authors":"Sinuk Choi;Hoseung Song;Eunmin Choi;Jeong-Woo Seo;Ji-Woong Choi","doi":"10.23919/JCN.2023.000064","DOIUrl":"https://doi.org/10.23919/JCN.2023.000064","url":null,"abstract":"Due to the rapid advancements in automotive technologies, vehicles now rely on additional high-speed sensors. This development has led to an increase in transmission rates and traffic levels within in-vehicle networks (IVNs), thereby necessitating changes in the electrical/electronic (E/E) architecture and the emergence of next-generation IVNs. This paper explores the adoption of zonal architecture with an Ethernet backbone as the vehicle topology and analyzes the factors influencing end-to-end latency. Furthermore, to evaluate the impact of IVN latency on safety-critical applications, we adopted the lane-keeping assistance system (LKAS) and employed the widely used metric, lateral error distance, to analyze how much the vehicle deviates from its intended position. We determined the feasibility of LKAS support by establishing vehicle-specific lateral distance thresholds, as allowable lateral error distances vary depending on vehicle size and comparing them with the lateral error distance. Since LKAS demands higher resolutions to achieve enhanced accuracy, this study examines the required resolution for vehicles equipped with next-generation architectures. Additionally, the paper proposes guidelines for the compression ratio of camera sensors at various resolutions and determines the maximum lateral vehicle speed achievable.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10466697","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
State-dependent broadcast channels with reversible input constraints 具有可逆输入约束条件的状态相关广播信道
IF 3.6 3区 计算机科学 Q1 Computer Science Pub Date : 2024-03-11 DOI: 10.23919/JCN.2023.000045
Viswanathan Ramachandran
A joint message communication and input reconstruction problem over a two-user state-dependent degraded discrete-memoryless broadcast channel is considered. The state process is assumed to be independent and identically distributed (i.i.d.), and known non-causally at the transmitter as well as the non-degraded receiver. The two receivers have to decode the messages from the transmitter, while the degraded receiver also needs to estimate the channel input codeword to meet a prescribed distortion limit. A complete characterization of the optimal rates versus distortion performance is provided. The tight characterization is also illustrated by means of an example of an additive binary broadcast channel with a Hamming distortion constraint for the input reconstruction at the degraded receiver.
本文考虑的是双用户状态相关降级无离散记忆广播信道上的联合信息通信和输入重构问题。假定状态过程是独立且同分布(i.i.d.)的,并且在发射机和非降级接收机上是非因果已知的。两个接收器必须对来自发射器的信息进行解码,而降级接收器还需要估计信道输入码字,以满足规定的失真限制。本文提供了最佳速率与失真性能的完整表征。此外,还通过一个加法二进制广播信道的例子说明了这一严密的特性,该信道对降级接收器的输入重构具有汉明失真限制。
{"title":"State-dependent broadcast channels with reversible input constraints","authors":"Viswanathan Ramachandran","doi":"10.23919/JCN.2023.000045","DOIUrl":"https://doi.org/10.23919/JCN.2023.000045","url":null,"abstract":"A joint message communication and input reconstruction problem over a two-user state-dependent degraded discrete-memoryless broadcast channel is considered. The state process is assumed to be independent and identically distributed (i.i.d.), and known non-causally at the transmitter as well as the non-degraded receiver. The two receivers have to decode the messages from the transmitter, while the degraded receiver also needs to estimate the channel input codeword to meet a prescribed distortion limit. A complete characterization of the optimal rates versus distortion performance is provided. The tight characterization is also illustrated by means of an example of an additive binary broadcast channel with a Hamming distortion constraint for the input reconstruction at the degraded receiver.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10466682","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1