首页 > 最新文献

IEEE journal on selected areas in communications : a publication of the IEEE Communications Society最新文献

英文 中文
Deep Learning-Enabled RIS Massive MIMO Systems for Industrial IoT: A Joint Communication and Computation Approach 基于深度学习的RIS大规模MIMO工业物联网系统:一种联合通信和计算方法
Wei Xiang;Muhammad Umer Zia;Jameel Ahmad;Peng Cheng;Kan Yu;Tao Huang
Accurate estimation and detection, along with phase shift optimization, are vital for implementing reconfigurable intelligent surface (RIS)-enabled multi-antenna systems in highly disruptive industrial IoT environments. Motivated by the remarkable capabilities of deep learning (DL) techniques, this paper introduces a pioneering approach to address challenges in channel estimation, channel correlation prediction, and symbol detection for industrial IoT. We develop an optimization framework for large-scale IoT deployments to maximize the signal-to-interference-plus-noise ratio (SINR) while minimizing transmit power. We also propose a transformer-based channel correlation predictor for IoT devices, which enables adaptive pilot retransmissions and reduces training overhead through a co-design approach that integrates communication, computation, and control. Extensive simulations under realistic, time-varying industrial IoT channel conditions demonstrate the superiority of our DL-driven approach, achieving significant improvements in detection accuracy and SINR.
准确的估计和检测以及相移优化对于在高度破坏性的工业物联网环境中实施可重构智能表面(RIS)的多天线系统至关重要。在深度学习(DL)技术卓越能力的激励下,本文介绍了一种开创性的方法来解决工业物联网中信道估计、信道相关预测和符号检测方面的挑战。我们为大规模物联网部署开发了一个优化框架,以最大限度地提高信噪比(SINR),同时最大限度地降低发射功率。我们还为物联网设备提出了一种基于变压器的信道相关预测器,它可以通过集成通信、计算和控制的协同设计方法实现自适应导频重传,并减少训练开销。在现实的、时变的工业物联网信道条件下的广泛模拟证明了我们的dl驱动方法的优越性,在检测精度和信噪比方面取得了显着提高。
{"title":"Deep Learning-Enabled RIS Massive MIMO Systems for Industrial IoT: A Joint Communication and Computation Approach","authors":"Wei Xiang;Muhammad Umer Zia;Jameel Ahmad;Peng Cheng;Kan Yu;Tao Huang","doi":"10.1109/JSAC.2025.3574603","DOIUrl":"10.1109/JSAC.2025.3574603","url":null,"abstract":"Accurate estimation and detection, along with phase shift optimization, are vital for implementing reconfigurable intelligent surface (RIS)-enabled multi-antenna systems in highly disruptive industrial IoT environments. Motivated by the remarkable capabilities of deep learning (DL) techniques, this paper introduces a pioneering approach to address challenges in channel estimation, channel correlation prediction, and symbol detection for industrial IoT. We develop an optimization framework for large-scale IoT deployments to maximize the signal-to-interference-plus-noise ratio (SINR) while minimizing transmit power. We also propose a transformer-based channel correlation predictor for IoT devices, which enables adaptive pilot retransmissions and reduces training overhead through a co-design approach that integrates communication, computation, and control. Extensive simulations under realistic, time-varying industrial IoT channel conditions demonstrate the superiority of our DL-driven approach, achieving significant improvements in detection accuracy and SINR.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 9","pages":"2981-2996"},"PeriodicalIF":17.2,"publicationDate":"2025-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144201844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge-Aware Privacy-Preserving Model Customization in Zero-Trust Federated Learning Model Marketplaces 零信任联邦学习模型市场中知识感知的隐私保护模型定制
Yanghe Pan;Zhou Su;Yuntao Wang;Han Liu;Ruidong Li;Abderrahim Benslimane
Federated learning (FL) model marketplaces require qualified workers to collaboratively train customized models. However, recruiting optimal workers on a limited budget in non-independent and identically distributed (non-IID) data settings remains a fundamental issue. Moreover, inadequate quality verification exposes the marketplace to spoofing and poisoning attacks, while verifying data and model quality without accessing local storage remains a significant dilemma. To bridge the research gap, this paper proposes a knowledge-aware model customization scheme in FL model marketplaces, to facilitate zero-trust worker recruitment and verification while ensuring privacy preservation. Specifically, (i) we design a knowledge-aware quality evaluation mechanism by leveraging the knowledge of workers, i.e., soft-label predictions of their local models on a privacy-free reference dataset (provided by the customer), to assess their data quality in a privacy-preserving manner. (ii) We formulate the optimal worker recruitment problem under budget constraints as an NP-hard integer programming problem and design a dynamic programming-based optimal worker recruitment algorithm with budget feasibility and computational efficiency. (iii) We devise a two-stage zero-trust quality verification mechanism by utilizing zero-knowledge proof (ZKP) to exclude distrustful workers, thereby preventing spoofing and poisoning attacks. Extensive experimental results demonstrate that the proposed scheme enhances model customization performance by up to 34.3% on label-skewed non-IID data and 36.2% on feature-skewed non-IID data compared with existing representatives.
联邦学习(FL)模型市场需要合格的工作人员协作训练定制的模型。然而,在非独立和同分布(非iid)数据设置中,以有限的预算招聘最佳员工仍然是一个基本问题。此外,不充分的质量验证使市场暴露于欺骗和中毒攻击,而在不访问本地存储的情况下验证数据和模型质量仍然是一个重大的难题。为了弥补研究差距,本文提出了一种知识感知模型定制方案,用于FL模型市场,以促进零信任员工的招聘和验证,同时确保隐私保护。具体而言,(i)我们通过利用工作人员的知识设计了一个知识感知的质量评估机制,即在无隐私参考数据集(由客户提供)上对其本地模型进行软标签预测,以保护隐私的方式评估其数据质量。(ii)将预算约束下的最优工人招聘问题表述为NP-hard整数规划问题,设计了一种基于动态规划的最优工人招聘算法,该算法具有预算可行性和计算效率。(iii)我们设计了一个两阶段的零信任质量验证机制,利用零知识证明(ZKP)来排除不信任的工人,从而防止欺骗和中毒攻击。大量的实验结果表明,与现有代表相比,该方案在标签倾斜的非iid数据上的模型自定义性能提高了34.3%,在特征倾斜的非iid数据上提高了36.2%。
{"title":"Knowledge-Aware Privacy-Preserving Model Customization in Zero-Trust Federated Learning Model Marketplaces","authors":"Yanghe Pan;Zhou Su;Yuntao Wang;Han Liu;Ruidong Li;Abderrahim Benslimane","doi":"10.1109/JSAC.2025.3560010","DOIUrl":"10.1109/JSAC.2025.3560010","url":null,"abstract":"Federated learning (FL) model marketplaces require qualified workers to collaboratively train customized models. However, recruiting optimal workers on a limited budget in non-independent and identically distributed (non-IID) data settings remains a fundamental issue. Moreover, inadequate quality verification exposes the marketplace to spoofing and poisoning attacks, while verifying data and model quality without accessing local storage remains a significant dilemma. To bridge the research gap, this paper proposes a knowledge-aware model customization scheme in FL model marketplaces, to facilitate zero-trust worker recruitment and verification while ensuring privacy preservation. Specifically, (i) we design a knowledge-aware quality evaluation mechanism by leveraging the knowledge of workers, i.e., soft-label predictions of their local models on a privacy-free reference dataset (provided by the customer), to assess their data quality in a privacy-preserving manner. (ii) We formulate the optimal worker recruitment problem under budget constraints as an NP-hard integer programming problem and design a dynamic programming-based optimal worker recruitment algorithm with budget feasibility and computational efficiency. (iii) We devise a two-stage zero-trust quality verification mechanism by utilizing zero-knowledge proof (ZKP) to exclude distrustful workers, thereby preventing spoofing and poisoning attacks. Extensive experimental results demonstrate that the proposed scheme enhances model customization performance by up to 34.3% on label-skewed non-IID data and 36.2% on feature-skewed non-IID data compared with existing representatives.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"1923-1937"},"PeriodicalIF":0.0,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143884481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Object-Attribute-Relation Representation-Based Video Semantic Communication 基于对象-属性-关系表示的视频语义通信
Qiyuan Du;Yiping Duan;Qianqian Yang;Xiaoming Tao;Mérouane Debbah
With the rapid growth of multimedia data volume, there is an increasing need for efficient video transmission in applications such as virtual reality and future video streaming services. Semantic communication is emerging as a vital technique for ensuring efficient and reliable transmission in low-bandwidth, high-noise settings. However, most current approaches focus on joint source-channel coding (JSCC) that depends on end-to-end training. These methods often lack an interpretable semantic representation and struggle with adaptability to various downstream tasks. In this paper, we introduce the use of object-attribute-relation (OAR) as a semantic framework for videos to facilitate low bit-rate coding and enhance the JSCC process for more effective video transmission. We utilize OAR sequences for both low bit-rate representation and generative video reconstruction. Additionally, we incorporate OAR into the image JSCC model to prioritize communication resources for areas more critical to downstream tasks. Our experiments on traffic surveillance video datasets assess the effectiveness of our approach in terms of video transmission performance. The empirical findings demonstrate that our OAR-based video coding method not only outperforms H.265 coding at lower bit-rates but also synergizes with JSCC to deliver robust and efficient video transmission.
随着多媒体数据量的快速增长,虚拟现实和未来视频流等应用对高效视频传输的需求越来越大。语义通信正在成为确保在低带宽、高噪声环境下高效、可靠传输的重要技术。然而,目前大多数方法都集中在依赖于端到端训练的联合源信道编码(JSCC)上。这些方法通常缺乏可解释的语义表示,难以适应各种下游任务。在本文中,我们介绍了使用对象-属性-关系(OAR)作为视频的语义框架,以促进低比特率编码和增强JSCC过程,从而实现更有效的视频传输。我们利用桨序列进行低比特率表示和生成视频重建。此外,我们将OAR合并到图像JSCC模型中,以优先考虑对下游任务更重要的区域的通信资源。我们在交通监控视频数据集上的实验评估了我们的方法在视频传输性能方面的有效性。实证结果表明,基于ar的视频编码方法不仅在较低比特率下优于H.265编码,而且可以与JSCC协同实现鲁棒高效的视频传输。
{"title":"Object-Attribute-Relation Representation-Based Video Semantic Communication","authors":"Qiyuan Du;Yiping Duan;Qianqian Yang;Xiaoming Tao;Mérouane Debbah","doi":"10.1109/JSAC.2025.3559115","DOIUrl":"10.1109/JSAC.2025.3559115","url":null,"abstract":"With the rapid growth of multimedia data volume, there is an increasing need for efficient video transmission in applications such as virtual reality and future video streaming services. Semantic communication is emerging as a vital technique for ensuring efficient and reliable transmission in low-bandwidth, high-noise settings. However, most current approaches focus on joint source-channel coding (JSCC) that depends on end-to-end training. These methods often lack an interpretable semantic representation and struggle with adaptability to various downstream tasks. In this paper, we introduce the use of object-attribute-relation (OAR) as a semantic framework for videos to facilitate low bit-rate coding and enhance the JSCC process for more effective video transmission. We utilize OAR sequences for both low bit-rate representation and generative video reconstruction. Additionally, we incorporate OAR into the image JSCC model to prioritize communication resources for areas more critical to downstream tasks. Our experiments on traffic surveillance video datasets assess the effectiveness of our approach in terms of video transmission performance. The empirical findings demonstrate that our OAR-based video coding method not only outperforms H.265 coding at lower bit-rates but also synergizes with JSCC to deliver robust and efficient video transmission.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 7","pages":"2446-2461"},"PeriodicalIF":0.0,"publicationDate":"2025-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143862374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Channel Uncertainty in Trusted Wireless Services via Repeated Interactions 基于重复交互的可信无线业务信道不确定性分析
Bingwen Chen;Xintong Ling;Weihang Cao;Jiaheng Wang;Zhi Ding
The coexistence of heterogeneous sub-networks in 6G poses new security and trust concerns and thus calls for a perimeterless-security model. Blockchain radio access network (B-RAN) provides a trust-building approach via repeated interactions rather than relying on pre-established trust or central authentication. Such a trust-building process naturally supports dynamic trusted services across various service providers (SP) without the need for perimeter-based authentications; however, it remains vulnerable to environmental and system unreliability such as wireless channel uncertainty. In this study, we investigate channel unreliability in the trust-building framework based on repeated interactions for secure wireless services. We derive specific requirements for achieving cooperation between SPs and clients via a repeated game model and illustrate the implications of channel unreliability on sustaining trusted wireless services. We consider the framework design and optimization to guarantee SP-client cooperation, given the worst channel condition and/or the least cooperation willingness. Furthermore, we explore the maximum cooperation area to enhance service resilience and reveal the trade-off relationship between transmission efficiency, security integrity, and cooperative margin. Finally, we present simulations to demonstrate the system performance over fading channels and verify our results.
6G异构子网的共存带来了新的安全和信任问题,因此需要一种无边界安全模型。区块链无线接入网(B-RAN)提供了一种通过重复交互建立信任的方法,而不是依赖于预先建立的信任或中央认证。这种信任构建过程自然支持跨各种服务提供者(SP)的动态可信服务,而不需要基于边界的身份验证;然而,它仍然容易受到环境和系统不可靠性的影响,如无线信道的不确定性。在本研究中,我们研究了基于重复交互的安全无线服务信任构建框架中的信道不可靠性。我们通过重复博弈模型推导了实现服务提供商和客户之间合作的具体要求,并说明了信道不可靠性对维持可信无线服务的影响。在最坏的信道条件和/或最小的合作意愿下,我们考虑框架设计和优化以保证sp -客户端的合作。在此基础上,探讨了增强业务弹性的最大合作区域,揭示了传输效率、安全完整性和合作裕度之间的权衡关系。最后,通过仿真验证了系统在衰落信道下的性能,并验证了结果。
{"title":"Analysis of Channel Uncertainty in Trusted Wireless Services via Repeated Interactions","authors":"Bingwen Chen;Xintong Ling;Weihang Cao;Jiaheng Wang;Zhi Ding","doi":"10.1109/JSAC.2025.3560005","DOIUrl":"10.1109/JSAC.2025.3560005","url":null,"abstract":"The coexistence of heterogeneous sub-networks in 6G poses new security and trust concerns and thus calls for a perimeterless-security model. Blockchain radio access network (B-RAN) provides a trust-building approach via repeated interactions rather than relying on pre-established trust or central authentication. Such a trust-building process naturally supports dynamic trusted services across various service providers (SP) without the need for perimeter-based authentications; however, it remains vulnerable to environmental and system unreliability such as wireless channel uncertainty. In this study, we investigate channel unreliability in the trust-building framework based on repeated interactions for secure wireless services. We derive specific requirements for achieving cooperation between SPs and clients via a repeated game model and illustrate the implications of channel unreliability on sustaining trusted wireless services. We consider the framework design and optimization to guarantee SP-client cooperation, given the worst channel condition and/or the least cooperation willingness. Furthermore, we explore the maximum cooperation area to enhance service resilience and reveal the trade-off relationship between transmission efficiency, security integrity, and cooperative margin. Finally, we present simulations to demonstrate the system performance over fading channels and verify our results.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"2248-2265"},"PeriodicalIF":0.0,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143857784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-Layer Management Framework for Enhancing XR-Based System Security in Zero-Trust Wireless Communications 在零信任无线通信中增强基于 XR 的系统安全的跨层管理框架
Esraa M. Ghourab;Mohamed Azab;Denis Gračanin;Mahmoud Al-Qutayri;Sami Muhaidat
Extended reality (XR) and 6G networks are set to transform mobile immersive experiences, with privacy and security being paramount in XR communications. Achieving secure and reliable XR experiences while meeting high-resolution and low-latency requirements is challenging for wireless networks. A novel security-aware cross-layer communication management framework is proposed, employing zero-trust spatiotemporal physical layer level manipulations for moving-target defense. Driven by deep reinforcement learning and real-time monitoring, the proposed framework adaptively reprograms the network configuration to maximize the user’s quality of experience (QoE), reduce the overall latency, and minimize the attacker’s intercept probability. The framework was evaluated in a simulated scenario featuring an indirect multi-hop communication setup. The results show that the proposed framework effectively and efficiently secures XR user communications while maintaining QoE, outperforming conventional Q-learning algorithms.
扩展现实(XR)和6G网络将改变移动沉浸式体验,隐私和安全在XR通信中至关重要。在满足高分辨率和低延迟要求的同时,实现安全可靠的XR体验对无线网络来说是一项挑战。提出了一种新的安全感知跨层通信管理框架,采用零信任时空物理层操作实现移动目标防御。在深度强化学习和实时监控的驱动下,该框架自适应地重新编程网络配置,以最大限度地提高用户体验质量(QoE),减少整体延迟,并最大限度地降低攻击者的拦截概率。该框架在具有间接多跳通信设置的模拟场景中进行了评估。结果表明,该框架在保持QoE的同时有效地保护了XR用户通信,优于传统的q -学习算法。
{"title":"Cross-Layer Management Framework for Enhancing XR-Based System Security in Zero-Trust Wireless Communications","authors":"Esraa M. Ghourab;Mohamed Azab;Denis Gračanin;Mahmoud Al-Qutayri;Sami Muhaidat","doi":"10.1109/JSAC.2025.3560004","DOIUrl":"10.1109/JSAC.2025.3560004","url":null,"abstract":"Extended reality (XR) and 6G networks are set to transform mobile immersive experiences, with privacy and security being paramount in XR communications. Achieving secure and reliable XR experiences while meeting high-resolution and low-latency requirements is challenging for wireless networks. A novel security-aware cross-layer communication management framework is proposed, employing zero-trust spatiotemporal physical layer level manipulations for moving-target defense. Driven by deep reinforcement learning and real-time monitoring, the proposed framework adaptively reprograms the network configuration to maximize the user’s quality of experience (QoE), reduce the overall latency, and minimize the attacker’s intercept probability. The framework was evaluated in a simulated scenario featuring an indirect multi-hop communication setup. The results show that the proposed framework effectively and efficiently secures XR user communications while maintaining QoE, outperforming conventional Q-learning algorithms.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"2011-2024"},"PeriodicalIF":0.0,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143857981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protection Against Poisoning Attacks on Federated Learning-Based Spectrum Sensing $$ $ lg $$ $ }} ?> 基于联邦学习的频谱感知防中毒攻击
Małgorzata Wasilewska;Hanna Bogucka
Federated-Learning (FL) based Spectrum Sensing (SS) method is considered for the application in future cognitive radio communication systems due to its supreme performance in changing radio environments as compared to classic cooperative or non-cooperative SS. It also avoids transferring large training datasets with high-resolution localization data. The FL algorithm is the subject of poisoning attacks that can be random or coordinated. In this paper, we first evaluate the impact of such attacks on the FL-based SS performance. Next, we propose a zero-trust method based on continuous monitoring and classification of the sensors’ models to detect attacked models. These models are then eliminated from the global model construction in FL. Our method is semi-blind, i.e., it does not require an apriori knowledge of who are the genuine actors participating in FL. Simulation results of the system under various attacks (random or coordinated, moderate or very aggressive, deliberately increasing or decreasing the spectrum occupancy) show that our method decreases the SS probability of false alarms by 89 % and increases the SS probability of detection by 16 % in case of the most severe targeted attacks in the most critical SNR ranges.
基于联邦学习(FL)的频谱感知(SS)方法被认为是未来认知无线电通信系统的应用,因为与传统的合作或非合作SS相比,它在不断变化的无线电环境中具有最高的性能。它还避免了传输具有高分辨率定位数据的大型训练数据集。FL算法是中毒攻击的主题,可以是随机的或协调的。在本文中,我们首先评估了此类攻击对基于fl的SS性能的影响。接下来,我们提出了一种基于连续监测和分类传感器模型的零信任方法来检测被攻击的模型。然后从FL的全局模型构建中消除这些模型。我们的方法是半盲的,即它不需要先验地知道谁是参与FL的真正参与者。系统在各种攻击(随机或协调,中等或非常激进)下的仿真结果,故意增加或减少频谱占用)表明,在最关键信噪比范围内最严重的针对性攻击的情况下,我们的方法将假警报的SS概率降低了89%,并将SS检测概率提高了16%。
{"title":"Protection Against Poisoning Attacks on Federated Learning-Based Spectrum Sensing $$ $ lg $$ $ }} ?>","authors":"Małgorzata Wasilewska;Hanna Bogucka","doi":"10.1109/JSAC.2025.3560285","DOIUrl":"10.1109/JSAC.2025.3560285","url":null,"abstract":"Federated-Learning (FL) based Spectrum Sensing (SS) method is considered for the application in future cognitive radio communication systems due to its supreme performance in changing radio environments as compared to classic cooperative or non-cooperative SS. It also avoids transferring large training datasets with high-resolution localization data. The FL algorithm is the subject of poisoning attacks that can be random or coordinated. In this paper, we first evaluate the impact of such attacks on the FL-based SS performance. Next, we propose a zero-trust method based on continuous monitoring and classification of the sensors’ models to detect attacked models. These models are then eliminated from the global model construction in FL. Our method is semi-blind, i.e., it does not require an apriori knowledge of who are the genuine actors participating in FL. Simulation results of the system under various attacks (random or coordinated, moderate or very aggressive, deliberately increasing or decreasing the spectrum occupancy) show that our method decreases the SS probability of false alarms by 89 % and increases the SS probability of detection by 16 % in case of the most severe targeted attacks in the most critical SNR ranges.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"2042-2055"},"PeriodicalIF":0.0,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10966417","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143841643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SecureFedPROM: A Zero-Trust Federated Learning Approach With Multi-Criteria Client Selection SecureFedPROM:一种多标准客户端选择的零信任联邦学习方法
Mehreen Tahir;Tanjila Mawla;Feras Awaysheh;Sadi Alawadi;Maanak Gupta;Muhammad Intizar Ali
Federated Learning (FL) enables decentralized learning while preserving data privacy. However, ensuring security and optimizing resource utilization in FL remains challenging, particularly in untrusted environments. To address this, we propose SecureFedPROM, a novel zero-trust FL framework that integrates Attribute-Based Access Control (ABAC) for secure client authorization and Preference Ranking Organization Method for Enrichment of Evaluations (PROMETHEE) for dynamic, multi-criteria client selection. Unlike traditional FL client selection methods that prioritize security or efficiency, SecureFedPROM optimizes trustworthiness, computational efficiency, and performance, ensuring robust participation in each training round. We evaluate SecureFedPROM across multiple real-world datasets, demonstrating its superiority over state-of-the-art client selection protocols. Our results show that SecureFedPROM achieves a 7.19% improvement in model accuracy, accelerates convergence, and reduces the number of training rounds. Additionally, it minimizes wall-clock time and computational overhead, making it highly scalable for edge AI environments. These findings highlight the importance of integrating zero-trust security principles with multi-criteria decision-making to enhance security and efficiency in FL.
联邦学习(FL)支持分散学习,同时保护数据隐私。然而,在FL中确保安全和优化资源利用仍然具有挑战性,特别是在不受信任的环境中。为了解决这个问题,我们提出了SecureFedPROM,这是一个新的零信任FL框架,它集成了用于安全客户端授权的基于属性的访问控制(ABAC)和用于丰富评估的偏好排序组织方法(PROMETHEE),用于动态,多标准客户端选择。与传统的优先考虑安全性或效率的FL客户端选择方法不同,SecureFedPROM优化了可信度、计算效率和性能,确保了每一轮培训的稳健参与。我们在多个真实世界的数据集上对SecureFedPROM进行了评估,证明了其优于最先进的客户端选择协议。我们的结果表明,SecureFedPROM在模型精度上提高了7.19%,加速了收敛,并减少了训练轮数。此外,它最大限度地减少了挂钟时间和计算开销,使其在边缘AI环境中具有高度可扩展性。这些发现强调了将零信任安全原则与多标准决策相结合以提高FL的安全性和效率的重要性。
{"title":"SecureFedPROM: A Zero-Trust Federated Learning Approach With Multi-Criteria Client Selection","authors":"Mehreen Tahir;Tanjila Mawla;Feras Awaysheh;Sadi Alawadi;Maanak Gupta;Muhammad Intizar Ali","doi":"10.1109/JSAC.2025.3560008","DOIUrl":"10.1109/JSAC.2025.3560008","url":null,"abstract":"Federated Learning (FL) enables decentralized learning while preserving data privacy. However, ensuring security and optimizing resource utilization in FL remains challenging, particularly in untrusted environments. To address this, we propose SecureFedPROM, a novel zero-trust FL framework that integrates Attribute-Based Access Control (ABAC) for secure client authorization and Preference Ranking Organization Method for Enrichment of Evaluations (PROMETHEE) for dynamic, multi-criteria client selection. Unlike traditional FL client selection methods that prioritize security or efficiency, SecureFedPROM optimizes trustworthiness, computational efficiency, and performance, ensuring robust participation in each training round. We evaluate SecureFedPROM across multiple real-world datasets, demonstrating its superiority over state-of-the-art client selection protocols. Our results show that SecureFedPROM achieves a 7.19% improvement in model accuracy, accelerates convergence, and reduces the number of training rounds. Additionally, it minimizes wall-clock time and computational overhead, making it highly scalable for edge AI environments. These findings highlight the importance of integrating zero-trust security principles with multi-criteria decision-making to enhance security and efficiency in FL.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"2025-2041"},"PeriodicalIF":0.0,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10966024","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143898246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Byzantine-Resilient Over-the-Air Federated Learning Under Zero-Trust Architecture 零信任架构下的拜占庭弹性空中联邦学习
Jiacheng Yao;Wei Shi;Wei Xu;Zhaohui Yang;A. Lee Swindlehurst;Dusit Niyato
Over-the-air computation (AirComp) has emerged as an essential approach for enabling communication-efficient federated learning (FL) over wireless networks. Nonetheless, the inherent analog transmission mechanism in AirComp-based FL (AirFL) intensifies challenges posed by potential Byzantine attacks. In this paper, we propose a novel Byzantine-robust FL paradigm for over-the-air transmissions, referred to as federated learning with secure adaptive clustering (FedSAC). FedSAC aims to protect a portion of the devices from attacks through zero trust architecture (ZTA) based Byzantine identification and adaptive device clustering. By conducting a one-step convergence analysis, we theoretically characterize the convergence behavior with different device clustering mechanisms and uneven aggregation weighting factors for each device. Building upon our analytical results, we formulate a joint optimization problem for the clustering and weighting factors in each communication round. To facilitate the targeted optimization, we propose a dynamic Byzantine identification method using historical reputation based on ZTA. Furthermore, we introduce a sequential clustering method, transforming the joint optimization into a weighting optimization problem without sacrificing the optimality. To optimize the weighting, we capitalize on the penalty convex-concave procedure (P-CCP) to obtain a stationary solution. Numerical results substantiate the superiority of the proposed FedSAC over existing methods in terms of both test accuracy and convergence rate.
空中计算(AirComp)已经成为在无线网络上实现高效通信的联邦学习(FL)的基本方法。尽管如此,基于aircompp的FL (AirFL)中固有的模拟传输机制加剧了潜在拜占庭攻击带来的挑战。在本文中,我们提出了一种用于空中传输的新型拜占庭鲁棒FL范式,称为安全自适应聚类联邦学习(FedSAC)。FedSAC旨在通过基于拜占庭式识别和自适应设备集群的零信任架构(ZTA)保护部分设备免受攻击。通过一步收敛分析,从理论上描述了不同设备聚类机制和每个设备不均匀聚集权重因子的收敛行为。基于我们的分析结果,我们为每一轮通信中的聚类和加权因子制定了一个联合优化问题。为了便于有针对性的优化,我们提出了一种基于ZTA的历史声誉动态拜占庭识别方法。在此基础上,引入顺序聚类方法,在不牺牲最优性的前提下,将联合优化问题转化为加权优化问题。为了优化权重,我们利用惩罚凹凸过程(P-CCP)来获得平稳解。数值结果表明,该方法在测试精度和收敛速度方面都优于现有方法。
{"title":"Byzantine-Resilient Over-the-Air Federated Learning Under Zero-Trust Architecture","authors":"Jiacheng Yao;Wei Shi;Wei Xu;Zhaohui Yang;A. Lee Swindlehurst;Dusit Niyato","doi":"10.1109/JSAC.2025.3560046","DOIUrl":"10.1109/JSAC.2025.3560046","url":null,"abstract":"Over-the-air computation (AirComp) has emerged as an essential approach for enabling communication-efficient federated learning (FL) over wireless networks. Nonetheless, the inherent analog transmission mechanism in AirComp-based FL (AirFL) intensifies challenges posed by potential Byzantine attacks. In this paper, we propose a novel Byzantine-robust FL paradigm for over-the-air transmissions, referred to as federated learning with secure adaptive clustering (FedSAC). FedSAC aims to protect a portion of the devices from attacks through zero trust architecture (ZTA) based Byzantine identification and adaptive device clustering. By conducting a one-step convergence analysis, we theoretically characterize the convergence behavior with different device clustering mechanisms and uneven aggregation weighting factors for each device. Building upon our analytical results, we formulate a joint optimization problem for the clustering and weighting factors in each communication round. To facilitate the targeted optimization, we propose a dynamic Byzantine identification method using historical reputation based on ZTA. Furthermore, we introduce a sequential clustering method, transforming the joint optimization into a weighting optimization problem without sacrificing the optimality. To optimize the weighting, we capitalize on the penalty convex-concave procedure (P-CCP) to obtain a stationary solution. Numerical results substantiate the superiority of the proposed FedSAC over existing methods in terms of both test accuracy and convergence rate.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"1954-1969"},"PeriodicalIF":0.0,"publicationDate":"2025-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143836712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verify All Traffic: Towards Zero-Trust In-Network Intrusion Detection Against Multipath Routing 验证所有流量:针对多路径路由的网络零信任入侵检测
Ziming Zhao;Zhaoxuan Li;Xiaofei Xie;Zhipeng Liu;Tingting Li;Jiongchi Yu;Fan Zhang;Binbin Chen
With the popularity of encryption protocols, machine learning (ML)-based traffic analysis technologies have attracted widespread attention. To adapt to modern high-speed bandwidth, recent research is dedicated to advancing zero-trust intrusion detection by offloading feature extraction and model inference into the network dataplane. Especially, with the rise of programmable switches, achieving line-speed ML inference becomes promising. However, existing research only considers a single switch node as a relay to conduct evaluation. This is far from real-world deployments involving multiple switches (given that zero-trust security assumes that threats can originate from anywhere, including within the network), particularly the multipath routing phenomenon that exists in practice. In this paper, we reveal practical challenges in the context of enabling line-speed model inference in the network dataplane. Furthermore, we propose FCPlane, the forwarding and computing integrated dataplane for zero-trust intrusion detection that aims to enable efficient load balancing while providing reliable traffic analysis results, even against multipath routing. The core idea is to reconcile forwarding and computation to the flowlet level, for which a tailor-made Markov chain model is designed. Based on two public traffic datasets, we evaluate seven state-of-the-art in-network traffic analysis models deployed in four types of topologies (three with multipath routing and one without) to explore performance impact and demonstrate the effectiveness of our proposal.
随着加密协议的普及,基于机器学习(ML)的流量分析技术受到了广泛关注。为了适应现代高速带宽的要求,研究人员将特征提取和模型推断工作转移到网络数据平面上来推进零信任入侵检测。特别是,随着可编程开关的兴起,实现线速ML推理变得很有希望。然而,现有的研究只考虑单个交换节点作为中继进行评估。这与涉及多个交换机的实际部署相距甚远(考虑到零信任安全性假设威胁可以来自任何地方,包括网络内部),特别是在实践中存在的多路径路由现象。在本文中,我们揭示了在网络数据平面中实现线速模型推理的实际挑战。此外,我们提出FCPlane,用于零信任入侵检测的转发和计算集成数据平面,旨在实现有效的负载平衡,同时提供可靠的流量分析结果,即使针对多路径路由。其核心思想是将转发和计算协调到流层,为此设计了一个量身定制的马尔可夫链模型。基于两个公共流量数据集,我们评估了部署在四种类型拓扑(三种带有多路径路由,一种没有)中的七种最先进的网络内流量分析模型,以探索性能影响并证明我们建议的有效性。
{"title":"Verify All Traffic: Towards Zero-Trust In-Network Intrusion Detection Against Multipath Routing","authors":"Ziming Zhao;Zhaoxuan Li;Xiaofei Xie;Zhipeng Liu;Tingting Li;Jiongchi Yu;Fan Zhang;Binbin Chen","doi":"10.1109/JSAC.2025.3560045","DOIUrl":"10.1109/JSAC.2025.3560045","url":null,"abstract":"With the popularity of encryption protocols, machine learning (ML)-based traffic analysis technologies have attracted widespread attention. To adapt to modern high-speed bandwidth, recent research is dedicated to advancing zero-trust intrusion detection by offloading feature extraction and model inference into the network dataplane. Especially, with the rise of programmable switches, achieving line-speed ML inference becomes promising. However, existing research only considers a single switch node as a relay to conduct evaluation. This is far from real-world deployments involving multiple switches (given that zero-trust security assumes that threats can originate from anywhere, including within the network), particularly the multipath routing phenomenon that exists in practice. In this paper, we reveal practical challenges in the context of enabling line-speed model inference in the network dataplane. Furthermore, we propose FCPlane, the forwarding and computing integrated dataplane for zero-trust intrusion detection that aims to enable efficient load balancing while providing reliable traffic analysis results, even against multipath routing. The core idea is to reconcile forwarding and computation to the flowlet level, for which a tailor-made Markov chain model is designed. Based on two public traffic datasets, we evaluate seven state-of-the-art in-network traffic analysis models deployed in four types of topologies (three with multipath routing and one without) to explore performance impact and demonstrate the effectiveness of our proposal.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"2155-2171"},"PeriodicalIF":0.0,"publicationDate":"2025-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143836710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Compression in the AI Era: Recent Advances and Future Challenges 人工智能时代的信息压缩:最新进展和未来挑战
Jun Chen;Yong Fang;Ashish Khisti;Ayfer Özgür;Nir Shlezinger
This survey article focuses on the emerging connections between machine learning and data compression. While the fundamental limits of classical (lossy) data compression are well-established through rate-distortion theory, recent advancements have uncovered new theoretical analyses and application areas inspired by machine learning. We review recent works on task-based and goal-oriented compression, rate-distortion-perception theory, and compression for estimation and inference. Deep learning-based approaches have provided natural, data-driven methods for compression. Accordingly, we survey recent efforts in applying deep learning techniques to task-based or goal-oriented compression, as well as image/video compression and transmission. Additionally, we discuss the potential use of large language models for text compression. Finally, we outline future research directions in this promising field.
这篇综述文章主要关注机器学习和数据压缩之间的新兴联系。虽然经典(有损)数据压缩的基本限制是通过率失真理论建立的,但最近的进展已经发现了受机器学习启发的新的理论分析和应用领域。我们回顾了最近在基于任务和面向目标的压缩、速率扭曲感知理论以及用于估计和推理的压缩方面的研究。基于深度学习的方法提供了自然的、数据驱动的压缩方法。因此,我们调查了最近在将深度学习技术应用于基于任务或面向目标的压缩以及图像/视频压缩和传输方面的努力。此外,我们还讨论了用于文本压缩的大型语言模型的潜在用途。最后,展望了该领域未来的研究方向。
{"title":"Information Compression in the AI Era: Recent Advances and Future Challenges","authors":"Jun Chen;Yong Fang;Ashish Khisti;Ayfer Özgür;Nir Shlezinger","doi":"10.1109/JSAC.2025.3560359","DOIUrl":"10.1109/JSAC.2025.3560359","url":null,"abstract":"This survey article focuses on the emerging connections between machine learning and data compression. While the fundamental limits of classical (lossy) data compression are well-established through rate-distortion theory, recent advancements have uncovered new theoretical analyses and application areas inspired by machine learning. We review recent works on task-based and goal-oriented compression, rate-distortion-perception theory, and compression for estimation and inference. Deep learning-based approaches have provided natural, data-driven methods for compression. Accordingly, we survey recent efforts in applying deep learning techniques to task-based or goal-oriented compression, as well as image/video compression and transmission. Additionally, we discuss the potential use of large language models for text compression. Finally, we outline future research directions in this promising field.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 7","pages":"2333-2348"},"PeriodicalIF":0.0,"publicationDate":"2025-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143836717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE journal on selected areas in communications : a publication of the IEEE Communications Society
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1