Article
Computer Science, Interdisciplinary Applications
Shanchen Pang, Xiao He, Shihang Yu, Min Wang, Sibo Qiao, Haiyuan Gui, Yufeng Qi
Summary: This paper proposes a MES-IDs computing model and a three-way optimization calculation method to minimize EU calculation costs and improve MES and ID benefits. The PIMA algorithm obtained an approximate optimal solution for the nonlinear convex optimization problem and showed more robust stability in reducing task completion delay and computational cost compared to other algorithms.
SIMULATION MODELLING PRACTICE AND THEORY
(2023)
Article
Computer Science, Theory & Methods
Jordi Garcia, Francesc Aguilo, Adria Asensio, Ester Simo, Marisa Zaragoza, Xavi Masip-Bruin
Summary: A new model is proposed for offloading task execution in heterogeneous environments, considering nodes computing capacity, network bandwidth, and geographical location. Two optimization strategies are suggested, and the simulation results show that the staged model provides the optimal solution in most scenarios.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2021)
Article
Computer Science, Information Systems
Li Ma, Peng Wang, Chunlai Du, Yang Li
Summary: This paper aims to minimize the overall energy consumption of a mobile edge computing system by jointly optimizing the strategies of task deployment, offloading decisions, edge cache, and resource allocation. It proposes an energy-efficient edge caching and task deployment policy based on Deep Q-Learning. The simulation results show that the proposed algorithm can converge the model in very few iterations and significantly reduce system energy consumption and policy response delay compared to other algorithms.
Article
Telecommunications
Fenghui Zhang, Ruilong Deng, Xinsheng Zhao, Michael Mao Wang
Summary: The paper investigates the improvement of service quality in edge computing by introducing artificial intelligence, and proposes a state-based distributed learning algorithm to balance the load of distributed intelligent edge servers. The convergence of the algorithm is proved, demonstrating significant enhancement in load balancing and service performance for the distributed IESs compared to existing works.
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING
(2021)
Article
Engineering, Chemical
Zhe Wei, Xuebin Yu, Lei Zou
Summary: This study proposes a multi-resource computing offloading energy consumption model in the mobile edge computing environment, and designs a corresponding task scheduling algorithm, which can effectively reduce the energy consumption of edge devices in mobile edge computing while ensuring response time constraints.
Article
Computer Science, Information Systems
Fenghui Zhang, Michael Mao Wang
Summary: The study addresses the load balancing issues of multiple independent cloudlets and proposes decentralized learning algorithms to improve service quality and user experience. Application scenarios for static and dynamic users are tested, with experiments showing improved load balancing and service quality.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Engineering, Electrical & Electronic
Zhenjiang Zhang, Chen Li, ShengLung Peng, Xintong Pei
Summary: The Internet of Things is changing the world, and edge computing is an application that can help reduce user latency, enhance user experience, and balance resource utilization. Through deep reinforcement learning algorithms, reasonable task allocation can be achieved to improve system adaptability and stability.
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING
(2021)
Article
Computer Science, Hardware & Architecture
Qiang He, Cheng Wang, Guangming Cui, Bo Li, Rui Zhou, Qingguo Zhou, Yang Xiang, Hai Jin, Yun Yang
Summary: Edge computing is an emerging paradigm that extends cloud computing by pushing computing resources onto edge servers. However, the geographical distribution of edge servers poses new security threats, especially DDoS attacks. This article proposes two approaches to mitigate edge DDoS attacks and provides theoretical analysis and experimental evaluation to demonstrate their effectiveness and efficiency.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Chemistry, Analytical
Md Delowar Hossain, Tangina Sultana, Md Alamgir Hossain, Md Abu Layek, Md Imtiaz Hossain, Phoo Pyae Sone, Ga-Won Lee, Eui-Nam Huh
Summary: Vehicular edge computing (VEC) enhances computation and storage capabilities of vehicular networks through task offloading. This study proposes an efficient dynamic task offloading approach based on a non-cooperative game to address the challenges of determining the processing location for offloaded tasks in real time.
Article
Engineering, Electrical & Electronic
Xianbang Diao, Wendong Yang, Lianxin Yang, Yueming Cai
Summary: A UAV-relaying-assisted MEC system was investigated to minimize energy consumption through optimizing offloading and scheduling strategies. The proposed algorithm, overcoming the difficulty of UAV location optimization with circular deployment scheme, outperforms benchmark algorithms and approaches the performance of the relaxed lower bound algorithm.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2021)
Article
Computer Science, Information Systems
Min Huang, Yunxiang Zhao, Yazhou Chen
Summary: Most research on commonly used distributed computing frameworks ignores the difficulty of learning these frameworks. A new distributed computing system is proposed to address the balance between versatility and user learning difficulty. The system is designed based on the idea of divide and conquer in distributed computing.
Article
Computer Science, Information Systems
Mingjin Gao, Rujing Shen, Jun Li, Shihao Yan, Yonghui Li, Jinglin Shi, Zhu Han, Li Zhuo
Summary: Mobile edge computing is a promising approach to reduce task processing latency by offloading tasks from user equipments to servers. This article presents a two-stage computing offloading scheme to minimize task processing delay and manage server load properly.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2022)
Article
Computer Science, Information Systems
Shuai Chang, Chunlin Li, Chunping Deng, Youlong Luo
Summary: To address the issue of load balancing in multi-SDN controllers, a low-latency controller load balancing switch migration algorithm is proposed. It consists of a load monitoring module, a decision-making module, and a switch migration module. By migrating the switch with the highest load to a controller with better processing capacity and shorter distance, load balancing is achieved. Additionally, an offloading decision-generation algorithm based on Lyapunov optimization is proposed to consider the stability of the MEC system and maximize its profit while meeting stability and delay requirements.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Nakyoung Kim, Daejin Kim, Joohyung Lee, Dusit Niyato, Jun Kyun Choi
Summary: This article proposes novel coded distributed computing mechanisms on heterogeneous mobile devices to reduce latency in Internet-of-Things services. Through analyzing a Stackelberg game between task publishers and mobile devices, it achieves significant latency reduction and social welfare improvement compared to benchmark mechanisms. The proposed algorithms effectively balance computing speed, energy consumption, and workload allocation in a strategic decision-making structure.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Jaewook Lee, Haneul Ko
Summary: In the research, a neighbor-aware distributed task offloading algorithm (NA-DTOA) is proposed to address the issue of high task completion time and energy outage in a distributed task offloading system. The algorithm considers the energy status and decisions of neighbor devices to optimize task processing and edge cloud selection. A constrained stochastic game model and a best response dynamics-based algorithm are designed to achieve the solution. Evaluation results demonstrate that NA-DTOA significantly reduces the average task completion time by 47% and maintains a low-average energy outage probability of 0.03 compared to a probability-based scheme.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Review
Computer Science, Information Systems
Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, Heather Molyneaux, Ali A. Ghorbani
Summary: The Internet of Things (IoT) has the potential to revolutionize medical treatment in healthcare, but it also faces security threats. Advanced analytics can enhance IoT security, but generating realistic datasets is complex. This research conducts a review of Machine Learning (ML) solutions for IoT security in healthcare, focusing on existing datasets, resources, applications, and challenges, to highlight the current landscape and future requirements.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Duncan Deveaux, Takamasa Higuchi, Seyhan Ucar, Jerome Harri, Onur Altintas
Summary: This paper investigates the ability to predict the risk patterns of vehicles in a roundabout and suggests that constraining knowledge transfer to roundabouts with a similar context can significantly improve accuracy.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Lingjun Zhao, Qinglin Yang, Huakun Huang, Longtao Guo, Shan Jiang
Summary: Metaverse seamlessly integrates the real and virtual worlds, and intelligent wireless sensing technology can serve as an intelligent, flexible, non-contact way to access the metaverse and accelerate the establishment of a bridge between the real physical world and the metaverse. However, there are still challenges and open issues in this field.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Jing Xiong, Hong Zhu
Summary: With the rapid growth of data in the era of IoT, the challenge of data privacy protection arises. This article proposes a federated learning approach that uses collaborative training to obtain a global model without direct exposure to local datasets. By utilizing dynamic masking and adaptive differential privacy methods, the approach reduces communication overhead and improves the converge performance of the model.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Carlos Rubio Garcia, Simon Rommel, Sofiane Takarabt, Juan Jose Vegas Olmos, Sylvain Guilley, Philippe Nguyen, Idelfonso Tafur Monroy
Summary: The reliance on asymmetric public key cryptography and symmetric encryption for cyber-security in current telecommunication networks is threatened by quantum computing technology. Quantum Key Distribution and post-quantum cryptography provide resistance to quantum attacks. This paper proposes two novel hybrid solutions integrating QKD and PQC into TLS for quantum-resistant key exchange.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Annisa Sarah, Gianfranco Nencioni
Summary: This article explores the concept of a Slice Broker, an intermediate entity that purchases resources from Infrastructure Providers to offer customized network slices to users. The article proposes a cost-minimization problem and compares it with alternative problems to demonstrate its effectiveness and cost-saving capabilities.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Sumana Maiti, Sudip Misra, Ayan Mondal
Summary: The broadcast proxy re-encryption methods extend traditional proxy re-encryption mechanisms and propose a scheme called MBP for IoT applications. MBP calculates a single re-encryption key for all user groups and uses multi-channel broadcast encryption to reduce security element size. However, it increases computation time for receiver IoT devices. The use of Rubinstein-Stahl bargaining game approach addresses this issue and MBP is secure against selective group chosen-ciphertext attack in the random oracle model.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Pankaj Kumar, Hari Om
Summary: This paper presents NextGenV2V, a protocol for the next-generation vehicular network that achieves authenticated communication between vehicles using symmetric keys and a (2, n)-threshold scheme. The protocol reduces communication overhead and improves authentication delay, ensuring better security. Comparative analysis demonstrates the suitability of NextGenV2V in next-generation vehicular networks.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Eric Ossongo, Moez Esseghir, Leila Merghem-Boulahia
Summary: The implementation of 5G networks allows for the efficient coexistence of heterogeneous services in a single physical virtualized infrastructure. Virtualization of network functions enables more flexible resource management and customizable services. However, the increasing number of connected objects poses challenges in managing physical and virtual resources, requiring intelligent systems to ensure communication quality.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Suvrima Datta, U. Venkanna
Summary: The Internet of Things (IoT) enables real-time sensing and data transmission to make homes smarter. Effective device-type identification methods are crucial as the number of IoT devices continues to grow. In this paper, a P4-based gateway called PiGateway is proposed to classify and prioritize the type of IoT devices. By utilizing a decision tree model and flow rules, PiGateway enables real-time granular analysis and in-network classification of IoT traffic.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Saqib Hussain, Zulfiqar Ali Zardari, Ghulam Ali Mallah, Md. Jalil Piran, Fayaz Ali Dharejo
Summary: This paper explores the relationship between heterogeneous cluster networks and federated learning, as well as the challenges of implementing federated learning in heterogeneous networks and the Internet of Things. The authors propose an Intra-Clustered FL (ICFL) model that optimizes computation and communication to select heterogeneous FL nodes in each cluster, enabling efficient processing of asynchronous data and ensuring data security.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Rajesh Kumar, Deepak Sinwar, Vijander Singh
Summary: This paper investigates the coexistence mechanisms between eMBB and URLLC traffic for resource scheduling in 5G. Through examining different approaches and performance metrics, it provides detailed insights for researchers in the field, and highlights key issues, challenges, and future directions.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Giovanni Nardini, Giovanni Stea
Summary: Digital Twins of Networks (DTNs) are proposed as digital replicas of physical entities, enabling efficient data-driven network management and performance-driven network optimization. DTNs provide simulation services for dynamic reconfiguration and fault anticipation, using discrete-event network simulators as the ideal tools. Challenges include centralized vs. distributed implementation, input gathering from the physical network, security issues and hosting. The possibilities of network simulation for what-if analysis are explored, with the concepts of lockstep and branching analysis defined.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Zhaolin Ma, Jiali You, Haojiang Deng
Summary: This paper presents the Distributed In-Network Name Resolution System (DINNRS), which leverages software-defined networking and Information-Centric Networking (ICN) paradigm to provide high scalability and minimal request delay. Our methods, including an enhanced marked cuckoo filter for fast resolving, achieve significant performance gains in simulation experiments.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Yujie Wang, Ying Wang, Qingqing Liu, Yong Zhang
Summary: This paper proposes a dynamic indoor positioning method based on multi-scale metric learning of the channel state information (CSI). By constructing few-shot learning tasks, this method can achieve dynamic positioning using CSI signals without additional equipment. Experimental results show that compared to commonly used dynamic location and tracking algorithms, the proposed method has higher positioning accuracy and does not accumulate errors.
COMPUTER COMMUNICATIONS
(2024)