With growing concern on data privacy, traditional Recommendation System (RS) raises the risk of privacy disclosure since it needs to collect a large amount of personal data. To tackle this problem, ...implementing RS in a federated learning (FL) manner is proposed as an efficient approach. Although various solutions have been proposed to improve privacy of federated RS models, related works ignore the communication efficiency. Moreover, most of related works merely consider one server to coordination with all users, which might not suitable for large-scale networks. To protect privacy and reduce communication overhead, we propose a privacy-preserving hierarchical federated collaborative filtering scheme for the RS. Finally, we provide the simulation results to evaluate our proposed scheme, which show that our scheme can maintain good recommendation accuracy, preserve data privacy and reduce communication overhead.
Direct Acyclic Graph (DAG)-based ledger and the corresponding consensus algorithm has been identified as a promising technology for Internet of Things (IoT). Compared with Proof-of-Work (PoW) and ...Proof-of-Stake (PoS) that have been widely used in blockchain, the consensus mechanism designed on DAG structure (simply called as DAG consensus) can overcome some shortcomings such as high resource consumption, high transaction fee, low transaction throughput and long confirmation delay. However, the theoretic analysis on the DAG consensus is an untapped venue to be explored. To this end, based on one of the most typical DAG consensuses, Tangle, we investigate the impact of network load on the performance and security of the DAG-based ledger. Considering unsteady network load, we first propose a Markov chain model to capture the behavior of DAG consensus process under dynamic load conditions. The key performance metrics, i.e., cumulative weight and confirmation delay are analysed based on the proposed model. Then, we leverage a stochastic model to analyse the probability of a successful double-spending attack in different network load regimes. The results can provide an insightful understanding of DAG consensus process, e.g., how the network load affects the confirmation delay and the probability of a successful attack. Meanwhile, we also demonstrate the trade-off between security level and confirmation delay, which can act as a guidance for practical deployment of DAG-based ledgers.
In cellular networks, proximity users may communicate directly without going through the base station, which is called Device-to-device (D2D) communications and it can improve spectral efficiency. ...However, D2D communications may generate interference to the existing cellular networks if not designed properly. In this paper, we study a resource allocation problem to maximize the overall network throughput while guaranteeing the quality-of-service (QoS) requirements for both D2D users and regular cellular users (CUs). A three-step scheme is proposed. It first performs admission control and then allocates powers for each admissible D2D pair and its potential CU partners. Next, a maximum weight bipartite matching based scheme is developed to select a suitable CU partner for each admissible D2D pair to maximize the overall network throughput. Numerical results show that the proposed scheme can significantly improve the performance of the hybrid system in terms of D2D access rate and the overall network throughput. The performance of D2D communications depends on D2D user locations, cell radius, the numbers of active CUs and D2D pairs, and the maximum power constraint for the D2D pairs.
In this correspondence, we jointly optimize the caching decision and radio and computation resource allocation for video service in mobile edge computing (MEC) enabled network to maximize the system ...revenue. To tolerate the uncertainty in the network traffic and avoid "hard constraint" based on constant content request rate, we employ robust optimization to obtain optimal caching decisions, and then accordingly allocate the radio and computation resources for video transcoding. Simulation results demonstrate the effectiveness of the proposed scheme.
In the past decade, blockchain has shown a promising vision to build trust without any powerful third party in a secure, decentralized and scalable manner. However, due to the wide application and ...future development from cryptocurrency to the Internet of Things, blockchain is an extremely complex system enabling integration with mathematics, computer science, communication and network engineering, etc. By revealing the intrinsic relationship between blockchain and communication, networking and computing from a methodological perspective, it provided a view to the challenge that engineers, experts and researchers hardly fully understand the blockchain process in a systematic view from top to bottom. In this article we first introduce how blockchain works, the research activities and challenges, and illustrate the roadmap involving the classic methodologies with typical blockchain use cases and topics. Second, in blockchain systems, how to adopt stochastic process, game theory, optimization theory, and machine learning to study the blockchain running processes and design the blockchain protocols/algorithms are discussed in details. Moreover, the advantages and limitations using these methods are also summarized as the guide of future work to be further considered. Finally, some remaining problems from technical, commercial and political views are discussed as the open issues. The main findings of this article will provide a survey from a methodological perspective to study theoretical model for blockchain fundamentals understanding, design network service for blockchain-based mechanisms and algorithms, as well as apply blockchain for the Internet of Things, etc.
The emerging Internet of Things (IoT) applications, such as smart manufacturing and smart home, lead to a huge demand on the provisioning of low-cost and high-accuracy positioning and navigation ...solutions. Inertial measurement unit (IMU) can provide an accurate inertial navigation solution in a short time but its positioning error increases fast with time due to the cumulative error of accelerometer measurement. On the other hand, ultrawideband (UWB) positioning and navigation accuracy will be affected by the actual environment and may lead to uncertain jumps even under line-of-sight (LOS) conditions. Therefore, it is hard to use a standalone positioning and navigation system to achieve high accuracy in indoor environments. In this article, we propose an integrated indoor positioning system (IPS) combining IMU and UWB through the extended Kalman filter (EKF) and unscented Kalman filter (UKF) to improve the robustness and accuracy. We also discuss the relationship between the geometric distribution of the base stations (BSs) and the dilution of precision (DOP) to reasonably deploy the BSs. The simulation results show that the prior information provided by IMU can significantly suppress the observation error of UWB. It is also shown that the integrated positioning and navigation accuracy of IPS significantly improves that of the least squares (LSs) algorithm, which only depends on UWB measurements. Moreover, the proposed algorithm has high computational efficiency and can realize real-time computation on general embedded devices. In addition, two random motion approximation model algorithms are proposed and evaluated in the real environment. The experimental results show that the two algorithms can achieve certain robustness and continuous tracking ability in the actual IPS.
Reducing energy consumption in wireless communications has attracted increasing attention recently. Advanced physical layer techniques such as multiple-input multiple-output (MIMO) and orthogonal ...frequency division multiplexing (OFDM), cognitive radio, network coding, cooperative communication, etc.; new network architectures such as heterogeneous networks, distributed antennas, multi-hop cellulars, etc.; as well as radio and network resource management schemes such as various cross-layer optimization algorithms, dynamic power saving, multiple radio access technologies coordination, etc. have been proposed to address this issue. In this article, we overview these technologies and present the state-of-the-art on each aspect. Some challenges that need to be solved in the area are also described.
Device-to-device (D2D) communications have been recently proposed as an effective way to increase both spectrum and energy efficiency for future cellular systems. In this paper, joint mode selection, ...channel assignment, and power control in D2D communications are addressed. We aim at maximizing the overall system throughput while guaranteeing the signal-to-noise-and-interference ratio of both D2D and cellular links. Three communication modes are considered for D2D users: cellular mode, dedicated mode, and reuse mode. The optimization problem could be decomposed into two subproblems: power control and joint mode selection and channel assignment. The joint mode selection and channel assignment problem is NP-hard, whose optimal solution can be found by the branch-and-bound method, but is very complicated. Therefore, we develop low-complexity algorithms according to the network load. Through comparing different algorithms under different network loads, proximity gain, hop gain, and reuse gain could be demonstrated in D2D communications.
Stream media content caching is a key enabling technology to promote the value chain of future urban vehicular networks. Nevertheless, the high mobility of vehicles, intermittency of information ...transmissions, high dynamics of user requests, limited caching capacities and extreme complexity of business scenarios pose an enormous challenge to content caching and distribution in vehicular networks. To tackle this problem, this paper aims to design a novel edge-computing-enabled hierarchical cooperative caching framework. Firstly, we profoundly analyze the spatio-temporal correlation between the historical vehicle trajectory of user requests and construct the system model to predict the vehicle trajectory and content popularity, which lays a foundation for mobility-aware content caching and dispatching. Meanwhile, we probe into privacy protection strategies to realize privacy-preserved prediction model. Furthermore, based on trajectory and popular content prediction results, content caching strategy is studied, and adaptive and dynamic resource management schemes are proposed for hierarchical cooperative caching networks. Finally, simulations are provided to verify the superiority of our proposed scheme and algorithms. It shows that the proposed algorithms effectively improve the performance of the considered system in terms of hit ratio and average delay, and narrow the gap to the optimal caching scheme comparing with the traditional schemes.
The notion of age-of-information (AoI) is investigated in the context of large-scale wireless networks, in which transmitters need to send a sequence of information packets, which are generated as ...independent Bernoulli processes, to their intended receivers over a shared spectrum. Due to interference, the rate of packet depletion at any given node is entangled with both the spatial configurations, which determine the path loss, and temporal dynamics, which influence the active states, of the other transmitters, resulting in the queues to interact with each other in both space and time over the entire network. To that end, variants in the packet update frequency affect not just the inter-arrival time but also the departure process, and the impact of such phenomena on the AoI is not well understood. In this paper, we establish a theoretical framework to characterize the AoI performance in the aforementioned setting. Particularly, tractable expressions are derived for both the peak and average AoI under two different transmission protocols, namely the first-come-first-serve (FCFS) and the last-come-first-serve with preemption (LCFS-PR). Additionally, our analysis also accounts for the effects of channel access controls such as ALOHA on the AoI. The accuracy of the analysis is verified via simulations, and based on the theoretical outcomes, we find that: <inline-formula> <tex-math notation="LaTeX">i </tex-math></inline-formula>) networks operating under LCFS-PR are able to attain smaller values of peak and average AoI than that under FCFS, whereas the gain is more pronounced when the infrastructure is densely deployed, <inline-formula> <tex-math notation="LaTeX">ii </tex-math></inline-formula>) in sparsely deployed networks, ALOHA with a universally designed channel access probability is not instrumental in reducing the AoI, thus calling for more advanced channel access approaches, and <inline-formula> <tex-math notation="LaTeX">iii </tex-math></inline-formula>) when the infrastructure is densely rolled out, there exists a non-trivial ALOHA channel access probability that minimizes the peak and average AoI under both FCFS and LCFS-PR.