首页 > 最新文献

Journal of Communications and Networks最新文献

英文 中文
Distributed IIoT anomaly detection scheme based on blockchain and federated learning 基于区块链和联合学习的分布式物联网异常检测方案
IF 3.6 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-01 DOI: 10.23919/JCN.2024.000016
Xiaojun Jin;Chao Ma;Song Luo;Pengyi Zeng;Yifei Wei
Anomaly detection in the industrial internet of things (IIoT) devices is significant due to its fundamental role in protecting modern critical infrastructure. In the IIoT, anomaly detection can be carried out by training machine learning models. Data sharing between factories can expand the data from which the model is trained, thus improving the performance of the model. However, due to the sensitivity and privacy of IIoT data, it is also difficult to build a high-performance anomaly detection model between factories. To address this problem, we design an anomaly detection method for IIoT devices combined blockchain of main-side structure and federated learning. We store the global model on the main-chain while the side-chain records the hash value of the global models and local models, which updated by participating nodes, controlling nodes access to the global model through the main-side blockchain and the smart contracts. Only the nodes participating in the current federated learning training can get the latest global model, so as to encourage the nodes to take part in the training of the global model. We designed a proof of accuracy consensus algorithm, and select the nodes to participate in training according to the accuracy of the local model on the test dataset to resist the poisoning attack of the models. We also use the local differential privacy (LDP) algorithm to protect user data privacy from model inference attacks by adding noise to the local model. Finally, we propose a new algorithm named Fed_Acc to keep the accuracy of the global model stable when the users add a lot of noise to their local models.
工业物联网(IIoT)设备中的异常检测在保护现代关键基础设施方面发挥着重要作用。在 IIoT 中,异常检测可以通过训练机器学习模型来实现。工厂之间的数据共享可以扩大训练模型的数据量,从而提高模型的性能。然而,由于物联网数据的敏感性和隐私性,在工厂之间建立高性能的异常检测模型也很困难。为了解决这个问题,我们设计了一种将主侧结构区块链和联合学习相结合的 IIoT 设备异常检测方法。我们将全局模型存储在主链上,侧链则记录全局模型和本地模型的哈希值,并由参与节点更新,通过主侧区块链和智能合约控制节点对全局模型的访问。只有参与当前联合学习训练的节点才能获得最新的全局模型,从而鼓励节点参与全局模型的训练。我们设计了一种精度证明共识算法,根据本地模型在测试数据集上的精度来选择参与训练的节点,以抵御模型的中毒攻击。我们还使用了局部差分隐私(LDP)算法,通过在局部模型中添加噪声来保护用户数据隐私免受模型推理攻击。最后,我们提出了一种名为 Fed_Acc 的新算法,以在用户向本地模型添加大量噪声时保持全局模型的准确性稳定。
{"title":"Distributed IIoT anomaly detection scheme based on blockchain and federated learning","authors":"Xiaojun Jin;Chao Ma;Song Luo;Pengyi Zeng;Yifei Wei","doi":"10.23919/JCN.2024.000016","DOIUrl":"https://doi.org/10.23919/JCN.2024.000016","url":null,"abstract":"Anomaly detection in the industrial internet of things (IIoT) devices is significant due to its fundamental role in protecting modern critical infrastructure. In the IIoT, anomaly detection can be carried out by training machine learning models. Data sharing between factories can expand the data from which the model is trained, thus improving the performance of the model. However, due to the sensitivity and privacy of IIoT data, it is also difficult to build a high-performance anomaly detection model between factories. To address this problem, we design an anomaly detection method for IIoT devices combined blockchain of main-side structure and federated learning. We store the global model on the main-chain while the side-chain records the hash value of the global models and local models, which updated by participating nodes, controlling nodes access to the global model through the main-side blockchain and the smart contracts. Only the nodes participating in the current federated learning training can get the latest global model, so as to encourage the nodes to take part in the training of the global model. We designed a proof of accuracy consensus algorithm, and select the nodes to participate in training according to the accuracy of the local model on the test dataset to resist the poisoning attack of the models. We also use the local differential privacy (LDP) algorithm to protect user data privacy from model inference attacks by adding noise to the local model. Finally, we propose a new algorithm named Fed_Acc to keep the accuracy of the global model stable when the users add a lot of noise to their local models.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":"26 2","pages":"252-262"},"PeriodicalIF":3.6,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10522517","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fatal C-V2X denial-of-service attack degrading quality of service in a highway scenario 高速公路场景中降低服务质量的致命 C-V2X 拒绝服务攻击
IF 3.6 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-11 DOI: 10.23919/JCN.2023.000066
Kyungtae Kim;Dongyoon Kwon;Woo-Cheol Jin;Sinuk Choi;Jinmo Kim;Ji-Woong Choi
A denial-of-service (DoS) attack, which prevents other nodes from accessing resources, is one of the fatal security threats in the V2X field. This paper analyzes the DoS attack on C-V2X networks from various viewpoints. First, we derive the conditions for the vulnerable vehicle that are expected to suffer fatal damage when subjected to the DoS attack. Then, we provide a method for the attacker to identify the vulnerable vehicle satisfying the derived conditions. We also verify that the attacker can more easily identify the vulnerable vehicle on a highway where the traffic density is generally constant. We confirm that the DoS attack that attacks the vulnerable vehicle satisfying the derived conditions causes more damage than the conventional DoS attack provided in another study in terms of reliability, coverage, and timeliness (up to 2% reduction in packet delivery ratio, up to 30 m reduction in communication coverage, and 0.15-second increase in the lower 1% update delay). In addition, we compare the ratio of packet errors by MAC of C-V2X to those caused by the DoS attack and verify the lethality of an attack depending on the traffic density. This paper provides insight into DoS attacks on C-V2X network, and future studies will cover the topic of attack detection and defense.
阻止其他节点访问资源的拒绝服务(DoS)攻击是 V2X 领域致命的安全威胁之一。本文从多个角度分析了对 C-V2X 网络的 DoS 攻击。首先,我们得出了易受攻击车辆在遭受 DoS 攻击时预计会遭受致命破坏的条件。然后,我们提供了一种方法,供攻击者识别满足推导条件的易受攻击车辆。我们还验证了在交通密度基本恒定的高速公路上,攻击者更容易识别易受攻击的车辆。我们证实,攻击满足推导条件的易受攻击车辆的 DoS 攻击在可靠性、覆盖范围和及时性方面比另一项研究中提供的传统 DoS 攻击造成的破坏更大(数据包传递率减少达 2%,通信覆盖范围减少达 30 米,低 1%更新延迟增加 0.15 秒)。此外,我们还比较了 C-V2X 的 MAC 与 DoS 攻击造成的数据包错误比率,并验证了攻击的致命性取决于流量密度。本文深入探讨了 C-V2X 网络的 DoS 攻击,未来的研究将涵盖攻击检测和防御主题。
{"title":"Fatal C-V2X denial-of-service attack degrading quality of service in a highway scenario","authors":"Kyungtae Kim;Dongyoon Kwon;Woo-Cheol Jin;Sinuk Choi;Jinmo Kim;Ji-Woong Choi","doi":"10.23919/JCN.2023.000066","DOIUrl":"https://doi.org/10.23919/JCN.2023.000066","url":null,"abstract":"A denial-of-service (DoS) attack, which prevents other nodes from accessing resources, is one of the fatal security threats in the V2X field. This paper analyzes the DoS attack on C-V2X networks from various viewpoints. First, we derive the conditions for the vulnerable vehicle that are expected to suffer fatal damage when subjected to the DoS attack. Then, we provide a method for the attacker to identify the vulnerable vehicle satisfying the derived conditions. We also verify that the attacker can more easily identify the vulnerable vehicle on a highway where the traffic density is generally constant. We confirm that the DoS attack that attacks the vulnerable vehicle satisfying the derived conditions causes more damage than the conventional DoS attack provided in another study in terms of reliability, coverage, and timeliness (up to 2% reduction in packet delivery ratio, up to 30 m reduction in communication coverage, and 0.15-second increase in the lower 1% update delay). In addition, we compare the ratio of packet errors by MAC of C-V2X to those caused by the DoS attack and verify the lethality of an attack depending on the traffic density. This paper provides insight into DoS attacks on C-V2X network, and future studies will cover the topic of attack detection and defense.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":"26 2","pages":"182-192"},"PeriodicalIF":3.6,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10466704","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
In-vehicle network latency analysis for a lane keeping assistance system 车道保持辅助系统的车载网络延迟分析
IF 3.6 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-11 DOI: 10.23919/JCN.2023.000064
Sinuk Choi;Hoseung Song;Eunmin Choi;Jeong-Woo Seo;Ji-Woong Choi
Due to the rapid advancements in automotive technologies, vehicles now rely on additional high-speed sensors. This development has led to an increase in transmission rates and traffic levels within in-vehicle networks (IVNs), thereby necessitating changes in the electrical/electronic (E/E) architecture and the emergence of next-generation IVNs. This paper explores the adoption of zonal architecture with an Ethernet backbone as the vehicle topology and analyzes the factors influencing end-to-end latency. Furthermore, to evaluate the impact of IVN latency on safety-critical applications, we adopted the lane-keeping assistance system (LKAS) and employed the widely used metric, lateral error distance, to analyze how much the vehicle deviates from its intended position. We determined the feasibility of LKAS support by establishing vehicle-specific lateral distance thresholds, as allowable lateral error distances vary depending on vehicle size and comparing them with the lateral error distance. Since LKAS demands higher resolutions to achieve enhanced accuracy, this study examines the required resolution for vehicles equipped with next-generation architectures. Additionally, the paper proposes guidelines for the compression ratio of camera sensors at various resolutions and determines the maximum lateral vehicle speed achievable.
由于汽车技术的飞速发展,汽车现在依赖于更多的高速传感器。这一发展导致了车载网络(IVN)内传输速率和流量水平的提高,从而需要改变电气/电子(E/E)架构,并出现下一代 IVN。本文探讨了采用以太网骨干网作为车载拓扑的分区架构,并分析了影响端到端延迟的因素。此外,为了评估 IVN 延迟对安全关键型应用的影响,我们采用了车道保持辅助系统(LKAS),并使用广泛使用的指标--横向误差距离来分析车辆偏离预定位置的程度。由于允许的横向误差距离因车辆大小而异,我们通过建立车辆特定的横向距离阈值并将其与横向误差距离进行比较,确定了 LKAS 支持的可行性。由于 LKAS 需要更高的分辨率才能实现更高的精度,因此本研究探讨了配备下一代架构的车辆所需的分辨率。此外,本文还提出了各种分辨率下摄像头传感器压缩比的指导原则,并确定了可实现的最大横向车速。
{"title":"In-vehicle network latency analysis for a lane keeping assistance system","authors":"Sinuk Choi;Hoseung Song;Eunmin Choi;Jeong-Woo Seo;Ji-Woong Choi","doi":"10.23919/JCN.2023.000064","DOIUrl":"https://doi.org/10.23919/JCN.2023.000064","url":null,"abstract":"Due to the rapid advancements in automotive technologies, vehicles now rely on additional high-speed sensors. This development has led to an increase in transmission rates and traffic levels within in-vehicle networks (IVNs), thereby necessitating changes in the electrical/electronic (E/E) architecture and the emergence of next-generation IVNs. This paper explores the adoption of zonal architecture with an Ethernet backbone as the vehicle topology and analyzes the factors influencing end-to-end latency. Furthermore, to evaluate the impact of IVN latency on safety-critical applications, we adopted the lane-keeping assistance system (LKAS) and employed the widely used metric, lateral error distance, to analyze how much the vehicle deviates from its intended position. We determined the feasibility of LKAS support by establishing vehicle-specific lateral distance thresholds, as allowable lateral error distances vary depending on vehicle size and comparing them with the lateral error distance. Since LKAS demands higher resolutions to achieve enhanced accuracy, this study examines the required resolution for vehicles equipped with next-generation architectures. Additionally, the paper proposes guidelines for the compression ratio of camera sensors at various resolutions and determines the maximum lateral vehicle speed achievable.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":"26 2","pages":"262-272"},"PeriodicalIF":3.6,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10466697","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
State-dependent broadcast channels with reversible input constraints 具有可逆输入约束条件的状态相关广播信道
IF 3.6 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-11 DOI: 10.23919/JCN.2023.000045
Viswanathan Ramachandran
A joint message communication and input reconstruction problem over a two-user state-dependent degraded discrete-memoryless broadcast channel is considered. The state process is assumed to be independent and identically distributed (i.i.d.), and known non-causally at the transmitter as well as the non-degraded receiver. The two receivers have to decode the messages from the transmitter, while the degraded receiver also needs to estimate the channel input codeword to meet a prescribed distortion limit. A complete characterization of the optimal rates versus distortion performance is provided. The tight characterization is also illustrated by means of an example of an additive binary broadcast channel with a Hamming distortion constraint for the input reconstruction at the degraded receiver.
本文考虑的是双用户状态相关降级无离散记忆广播信道上的联合信息通信和输入重构问题。假定状态过程是独立且同分布(i.i.d.)的,并且在发射机和非降级接收机上是非因果已知的。两个接收器必须对来自发射器的信息进行解码,而降级接收器还需要估计信道输入码字,以满足规定的失真限制。本文提供了最佳速率与失真性能的完整表征。此外,还通过一个加法二进制广播信道的例子说明了这一严密的特性,该信道对降级接收器的输入重构具有汉明失真限制。
{"title":"State-dependent broadcast channels with reversible input constraints","authors":"Viswanathan Ramachandran","doi":"10.23919/JCN.2023.000045","DOIUrl":"https://doi.org/10.23919/JCN.2023.000045","url":null,"abstract":"A joint message communication and input reconstruction problem over a two-user state-dependent degraded discrete-memoryless broadcast channel is considered. The state process is assumed to be independent and identically distributed (i.i.d.), and known non-causally at the transmitter as well as the non-degraded receiver. The two receivers have to decode the messages from the transmitter, while the degraded receiver also needs to estimate the channel input codeword to meet a prescribed distortion limit. A complete characterization of the optimal rates versus distortion performance is provided. The tight characterization is also illustrated by means of an example of an additive binary broadcast channel with a Hamming distortion constraint for the input reconstruction at the degraded receiver.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":"26 2","pages":"158-165"},"PeriodicalIF":3.6,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10466682","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NetLabeller: Architecture with data extraction and labelling framework for beyond 5G networks NetLabeller:超越 5G 网络的数据提取和标签框架架构
IF 3.6 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-01 DOI: 10.23919/JCN.2023.000063
Jimena Andrade-Hoz;Jose M. Alcaraz-Calero;Qi Wang
The next generation of network capabilities coupled with artificial intelligence (AI) can provide innovative solutions for network control and self-optimisation. Network control demands a detailed knowledge of the network components to enforce the correct control rules. To this end, an immense number of metrics related to devices, flows, network rules, etc. can be used to describe the state of the network and to gain insights about which rule to enforce depending on the context. However, selection of the most relevant metrics often proves challenging and there is no readily available tool that can facilitate the dataset extraction and labelling for AI model training. This research work therefore first develops an analysis of the most relevant metrics in terms of network control to create a training dataset for future AI development purposes. It then presents a new architecture to allow the extraction of these metrics from a 5G network with a novel dataset visualisation and labelling tool to help perform the exploratory analysis and the labelling process of the resultant dataset. It is expected that the proposed architecture and its associated tools would significantly speed up the training process, which is crucial for the data-driven approach in developing AI-based network control capabilities.
下一代网络功能与人工智能(AI)相结合,可为网络控制和自我优化提供创新解决方案。网络控制需要详细了解网络组件,以执行正确的控制规则。为此,可以使用大量与设备、流量、网络规则等相关的指标来描述网络状态,并根据上下文深入了解应执行的规则。然而,选择最相关的指标往往具有挑战性,而且没有现成的工具可以帮助提取和标记数据集,用于人工智能模型训练。因此,这项研究工作首先对网络控制方面最相关的指标进行了分析,以便为未来的人工智能开发目的创建一个训练数据集。然后,它提出了一种新的架构,允许从 5G 网络中提取这些指标,并提供了一种新颖的数据集可视化和标记工具,以帮助执行探索性分析和结果数据集的标记过程。预计所提出的架构及其相关工具将大大加快训练过程,这对开发基于人工智能的网络控制能力的数据驱动方法至关重要。
{"title":"NetLabeller: Architecture with data extraction and labelling framework for beyond 5G networks","authors":"Jimena Andrade-Hoz;Jose M. Alcaraz-Calero;Qi Wang","doi":"10.23919/JCN.2023.000063","DOIUrl":"https://doi.org/10.23919/JCN.2023.000063","url":null,"abstract":"The next generation of network capabilities coupled with artificial intelligence (AI) can provide innovative solutions for network control and self-optimisation. Network control demands a detailed knowledge of the network components to enforce the correct control rules. To this end, an immense number of metrics related to devices, flows, network rules, etc. can be used to describe the state of the network and to gain insights about which rule to enforce depending on the context. However, selection of the most relevant metrics often proves challenging and there is no readily available tool that can facilitate the dataset extraction and labelling for AI model training. This research work therefore first develops an analysis of the most relevant metrics in terms of network control to create a training dataset for future AI development purposes. It then presents a new architecture to allow the extraction of these metrics from a 5G network with a novel dataset visualisation and labelling tool to help perform the exploratory analysis and the labelling process of the resultant dataset. It is expected that the proposed architecture and its associated tools would significantly speed up the training process, which is crucial for the data-driven approach in developing AI-based network control capabilities.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":"26 1","pages":"80-98"},"PeriodicalIF":3.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10459140","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140031620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A popularity-based caching strategy for improved efficiency in SVRF-based multicast control-planes 基于流行度的缓存策略,提高基于 SVRF 的组播控制平面的效率
IF 3.6 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-01 DOI: 10.23919/JCN.2023.000054
Ruisi Wu;Wen-Kang Jia
The packet forwarding engine (PFE), a vital component of high-performance switches and routers, plays a pivotal role in rapidly selecting the appropriate output port for tens of thousands of packets. The performance of the PFE hinges on the efficacy of the group membership algorithm. In this research, we present a hybrid approach called caching scalar-pair and vectors routing and forwarding (CSVRF), which comprises virtual output port bitmap caching (VOPBC) and fractional-N SVRF, designed to address significant multicast forwarding challenges such as scalability. We achieve this through the implementation of content address memory (CAM). Within the CSVRF framework, we introduce an innovative virtual output port bitmap cache table, which encompasses the most frequently occurring combinations of output port bitmaps (OPB). Furthermore, we divide the larger scalar-pair into N subgroups to enhance the reusability of prime resources. We validate our findings using Matlab-based mathematical models and simulations. Our results demonstrate significant decreases in both memory space usage and forwarding latency. Our approach assures minimized memory consumption, faster processing, and robust scalability in high port-density settings.
数据包转发引擎(PFE)是高性能交换机和路由器的重要组成部分,在为数以万计的数据包快速选择合适的输出端口方面发挥着关键作用。PFE 的性能取决于群成员算法的有效性。在这项研究中,我们提出了一种名为 "缓存标量对和矢量路由与转发(CSVRF)"的混合方法,其中包括虚拟输出端口位图缓存(VOPBC)和分数-N SVRF,旨在解决可扩展性等重大组播转发挑战。我们通过实施内容地址存储器(CAM)来实现这一目标。在 CSVRF 框架内,我们引入了创新的虚拟输出端口位图缓存表,其中包含最常出现的输出端口位图 (OPB) 组合。此外,我们还将较大的标量对分为 N 个子组,以提高素数资源的重用性。我们使用基于 Matlab 的数学模型和仿真验证了我们的研究结果。我们的结果表明,内存空间使用量和转发延迟都大幅减少。我们的方法可确保在高端口密度环境中最大限度地减少内存消耗、加快处理速度并实现稳健的可扩展性。
{"title":"A popularity-based caching strategy for improved efficiency in SVRF-based multicast control-planes","authors":"Ruisi Wu;Wen-Kang Jia","doi":"10.23919/JCN.2023.000054","DOIUrl":"https://doi.org/10.23919/JCN.2023.000054","url":null,"abstract":"The packet forwarding engine (PFE), a vital component of high-performance switches and routers, plays a pivotal role in rapidly selecting the appropriate output port for tens of thousands of packets. The performance of the PFE hinges on the efficacy of the group membership algorithm. In this research, we present a hybrid approach called caching scalar-pair and vectors routing and forwarding (CSVRF), which comprises virtual output port bitmap caching (VOPBC) and fractional-N SVRF, designed to address significant multicast forwarding challenges such as scalability. We achieve this through the implementation of content address memory (CAM). Within the CSVRF framework, we introduce an innovative virtual output port bitmap cache table, which encompasses the most frequently occurring combinations of output port bitmaps (OPB). Furthermore, we divide the larger scalar-pair into N subgroups to enhance the reusability of prime resources. We validate our findings using Matlab-based mathematical models and simulations. Our results demonstrate significant decreases in both memory space usage and forwarding latency. Our approach assures minimized memory consumption, faster processing, and robust scalability in high port-density settings.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":"26 1","pages":"115-130"},"PeriodicalIF":3.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10459134","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140031680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information for authors 作者须知
IF 3.6 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-01 DOI: 10.23919/JCN.2024.000009
{"title":"Information for authors","authors":"","doi":"10.23919/JCN.2024.000009","DOIUrl":"https://doi.org/10.23919/JCN.2024.000009","url":null,"abstract":"","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":"26 1","pages":"148-152"},"PeriodicalIF":3.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10459128","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140031682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Statistical analysis of cascaded Nakagami-m fading channels with generalized correlation 具有广义相关性的级联中上消隐信道的统计分析
IF 3.6 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-01 DOI: 10.23919/JCN.2024.000001
Ibrahim Ghareeb;Osama Al-Shalali
This paper studies the statistical analysis of cascaded Nakagami-m fading channels that are arbitrarily correlated and not necessarily identically distributed. The probability density function (PDF), cumulative distribution function (CDF), and the nth moment for the product of N correlated Nakagami-m random variables (RVs) are derived and presented in exact form expressions using the Meijer's G function. The cascaded channels are assumed to have flat and slow fading with arbitrarily non-identical fading severity parameters. Using these results, the impact of channel correlation and fading severity parameters are investigated for the cascaded Nakagami-m channels. Furthermore, performance analysis addressed by outage probability (OP), average channel capacity, and average bit error probability (BEP) for coherently detected binary PSK and FSK signals are derived. As a consequence of the versatility of Nakagami-m distribution, the derived expressions can compromise the statistics of other useful multivariate distributions such as One-sided Gaussian distribution with m = 1/2 and Rayleigh distribution with m = 1. To the best of the authors' knowledge, the derived expressions are novel and have not been reported in the literature. To aid and verify the theoretical analysis, numerical results authenticated by Monte Carlo simulation are presented.
本文研究了任意相关且不一定同分布的级联中上-m 渐变信道的统计分析。利用 Meijer's G 函数推导出了 N 个相关 Nakagami-m 随机变量(RV)乘积的概率密度函数(PDF)、累积分布函数(CDF)和第 n 矩,并以精确形式表达出来。级联信道被假定为具有任意非相同衰减严重性参数的平缓衰减。利用这些结果,研究了级联中上-m 信道的信道相关性和衰落严重性参数的影响。此外,还得出了相干检测二进制 PSK 和 FSK 信号的中断概率 (OP)、平均信道容量和平均误码概率 (BEP) 等性能分析。由于中神-m 分布的多功能性,推导出的表达式可以折中其他有用的多元分布的统计量,如 m = 1/2 的单边高斯分布和 m = 1 的瑞利分布。据作者所知,推导出的表达式是新颖的,在文献中从未报道过。为了帮助和验证理论分析,本文介绍了经蒙特卡罗模拟验证的数值结果。
{"title":"Statistical analysis of cascaded Nakagami-m fading channels with generalized correlation","authors":"Ibrahim Ghareeb;Osama Al-Shalali","doi":"10.23919/JCN.2024.000001","DOIUrl":"https://doi.org/10.23919/JCN.2024.000001","url":null,"abstract":"This paper studies the statistical analysis of cascaded Nakagami-m fading channels that are arbitrarily correlated and not necessarily identically distributed. The probability density function (PDF), cumulative distribution function (CDF), and the nth moment for the product of N correlated Nakagami-m random variables (RVs) are derived and presented in exact form expressions using the Meijer's G function. The cascaded channels are assumed to have flat and slow fading with arbitrarily non-identical fading severity parameters. Using these results, the impact of channel correlation and fading severity parameters are investigated for the cascaded Nakagami-m channels. Furthermore, performance analysis addressed by outage probability (OP), average channel capacity, and average bit error probability (BEP) for coherently detected binary PSK and FSK signals are derived. As a consequence of the versatility of Nakagami-m distribution, the derived expressions can compromise the statistics of other useful multivariate distributions such as One-sided Gaussian distribution with m = 1/2 and Rayleigh distribution with m = 1. To the best of the authors' knowledge, the derived expressions are novel and have not been reported in the literature. To aid and verify the theoretical analysis, numerical results authenticated by Monte Carlo simulation are presented.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":"26 1","pages":"1-18"},"PeriodicalIF":3.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10459136","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140031708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing age of information in multiaccess networks with time-varying channels: A fluid limits approach 分析具有时变信道的多接入网络中的信息年龄:流体极限方法
IF 3.6 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-01 DOI: 10.23919/JCN.2024.000003
Feng Yuan;Zeyu Hu;Zhiyuan Jiang
In this paper, we adopt the fluid limits approach to analyze the age of information (AoI) in a wireless multi-access network where users share the channel and transmissions are unreliable. We prove the convergence of the AoI occupancy measure to the fluid limit, represented by a partial differential equation (PDE). Furthermore, we demonstrate the global convergence to the equilibrium of the PDE, i.e., the stationary AoI distribution. Within this framework, we first consider the case of i.i.d. channel conditions and generate-at-will statuses for users. We demonstrate that a previously established AoI lower bound in the literature is asymptotically accurate, and a straightforward threshold-based access policy can be asymptotically optimal. Next, we consider the case where the channel states are time-varying, i.e., the Gilbert-Elliott channel model. We assume partial channel state information (CSI) is available due to channel probing singals. Theoretical analysis reveals that only a fraction of CSI is required to approach the optimal performance. Additionally, we numerically evaluate the performance of the proposed policy and the existing Whittle's index policy under time-varying channels. Simulation results demonstrate that the proposed policy outperforms the Whittle's index policy since the latter cannot adapt to time-varying channels.
在本文中,我们采用流体极限方法来分析用户共享信道且传输不可靠的无线多接入网络中的信息年龄(AoI)。我们证明了 AoI 占用度量向流体极限的收敛,流体极限由偏微分方程 (PDE) 表示。此外,我们还证明了向偏微分方程平衡点的全局收敛性,即静态 AoI 分布。在此框架内,我们首先考虑了 i.i.d. 信道条件和用户随意生成状态的情况。我们证明了之前文献中建立的 AoI 下限是渐进准确的,而且基于阈值的直接接入策略也是渐进最优的。接下来,我们考虑信道状态时变的情况,即 Gilbert-Elliott 信道模型。我们假定由于信道探测信号的存在,部分信道状态信息(CSI)是可用的。理论分析表明,只需要部分 CSI 就能达到最佳性能。此外,我们还从数值上评估了提议的策略和现有惠特尔指数策略在时变信道下的性能。仿真结果表明,由于惠特尔指数策略无法适应时变信道,因此建议的策略优于惠特尔指数策略。
{"title":"Analyzing age of information in multiaccess networks with time-varying channels: A fluid limits approach","authors":"Feng Yuan;Zeyu Hu;Zhiyuan Jiang","doi":"10.23919/JCN.2024.000003","DOIUrl":"https://doi.org/10.23919/JCN.2024.000003","url":null,"abstract":"In this paper, we adopt the fluid limits approach to analyze the age of information (AoI) in a wireless multi-access network where users share the channel and transmissions are unreliable. We prove the convergence of the AoI occupancy measure to the fluid limit, represented by a partial differential equation (PDE). Furthermore, we demonstrate the global convergence to the equilibrium of the PDE, i.e., the stationary AoI distribution. Within this framework, we first consider the case of i.i.d. channel conditions and generate-at-will statuses for users. We demonstrate that a previously established AoI lower bound in the literature is asymptotically accurate, and a straightforward threshold-based access policy can be asymptotically optimal. Next, we consider the case where the channel states are time-varying, i.e., the Gilbert-Elliott channel model. We assume partial channel state information (CSI) is available due to channel probing singals. Theoretical analysis reveals that only a fraction of CSI is required to approach the optimal performance. Additionally, we numerically evaluate the performance of the proposed policy and the existing Whittle's index policy under time-varying channels. Simulation results demonstrate that the proposed policy outperforms the Whittle's index policy since the latter cannot adapt to time-varying channels.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":"26 1","pages":"49-64"},"PeriodicalIF":3.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10459132","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140031706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic engineering and QoS/QoE supporting techniques for emerging service-oriented software-defined network 新兴的面向服务的软件定义网络的流量工程和 QoS/QoE 支持技术
IF 3.6 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-01 DOI: 10.23919/JCN.2023.000065
Mykola Beshley;Natalia Kryvinska;Halyna Beshley;Oleksiy Panchenko;Mykhailo Medvetskyi
The future integration of software-defined network (SDN) with the service-oriented architecture (SOA) paradigm requires new solutions to ensure the quality of service (QoS) according to the users' requirements. The paper presents a user experience-centric approach to traffic engineering and QoS/quality of experience (QoE) support for service-oriented software-defined network (SOSDN) architecture. This approach is to enable end-to-end QoS across the networking and computing domain by monitoring and agreeing on the dynamic state of their functioning. The proposed SOSDN is based on improved traffic engineering techniques, such as adaptive prioritization of services, server selection, and QoS/QoE-based routing. The developed adaptive service prioritization algorithm automatically changes the priority of flows in the network operation mode by the SDN controller for individual users under the concluded service level agreements (SLA) contract. We proposed a mathematical model of correlation of user satisfaction level by QoE score with technical QoS parameters. This model is based on the normalized value of the integral additive QoS criterion. Accordingly, ensuring the ordered user-centric QoS/QoE is carried out by means of proposed multi-criteria adaptive routing of data flows, the metric of which is based on the integral additive QoS criterion. The simulation results showed that, in contrast to known practical solutions, the integrated use of the proposed method of adaptive multi-criteria routing and prioritization of data flows provides a high level of QoE required by users in the SOSDN paradigm.
未来,软件定义网络(SDN)与面向服务架构(SOA)范例的整合需要新的解决方案,以根据用户需求确保服务质量(QoS)。本文提出了一种以用户体验为中心的方法,用于面向服务的软件定义网络(SOSDN)架构的流量工程和 QoS/体验质量(QoE)支持。这种方法旨在通过监控和商定网络和计算领域的动态运行状态,实现整个网络和计算领域的端到端 QoS。拟议的 SOSDN 基于改进的流量工程技术,如自适应服务优先级、服务器选择和基于 QoS/QoE 的路由。所开发的自适应服务优先级算法通过 SDN 控制器自动改变网络运行模式中流量的优先级,以满足已签订服务水平协议(SLA)合同的单个用户的需求。我们提出了 QoE 分数与 QoS 技术参数相关的用户满意度数学模型。该模型基于积分加法 QoS 标准的归一化值。因此,确保有序的以用户为中心的 QoS/QoE 是通过建议的数据流多标准自适应路由来实现的,其度量标准是基于积分加法 QoS 标准。仿真结果表明,与已知的实际解决方案相比,综合使用所提出的数据流多标准自适应路由和优先级排序方法,可在 SOSDN 范例中提供用户所需的高水平 QoE。
{"title":"Traffic engineering and QoS/QoE supporting techniques for emerging service-oriented software-defined network","authors":"Mykola Beshley;Natalia Kryvinska;Halyna Beshley;Oleksiy Panchenko;Mykhailo Medvetskyi","doi":"10.23919/JCN.2023.000065","DOIUrl":"https://doi.org/10.23919/JCN.2023.000065","url":null,"abstract":"The future integration of software-defined network (SDN) with the service-oriented architecture (SOA) paradigm requires new solutions to ensure the quality of service (QoS) according to the users' requirements. The paper presents a user experience-centric approach to traffic engineering and QoS/quality of experience (QoE) support for service-oriented software-defined network (SOSDN) architecture. This approach is to enable end-to-end QoS across the networking and computing domain by monitoring and agreeing on the dynamic state of their functioning. The proposed SOSDN is based on improved traffic engineering techniques, such as adaptive prioritization of services, server selection, and QoS/QoE-based routing. The developed adaptive service prioritization algorithm automatically changes the priority of flows in the network operation mode by the SDN controller for individual users under the concluded service level agreements (SLA) contract. We proposed a mathematical model of correlation of user satisfaction level by QoE score with technical QoS parameters. This model is based on the normalized value of the integral additive QoS criterion. Accordingly, ensuring the ordered user-centric QoS/QoE is carried out by means of proposed multi-criteria adaptive routing of data flows, the metric of which is based on the integral additive QoS criterion. The simulation results showed that, in contrast to known practical solutions, the integrated use of the proposed method of adaptive multi-criteria routing and prioritization of data flows provides a high level of QoE required by users in the SOSDN paradigm.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":"26 1","pages":"99-114"},"PeriodicalIF":3.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10459131","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140031619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1