396 research outputs found
Caching-Aided Collaborative D2D Operation for Predictive Data Dissemination in Industrial IoT
Industrial automation deployments constitute challenging environments where
moving IoT machines may produce high-definition video and other heavy sensor
data during surveying and inspection operations. Transporting massive contents
to the edge network infrastructure and then eventually to the remote human
operator requires reliable and high-rate radio links supported by intelligent
data caching and delivery mechanisms. In this work, we address the challenges
of contents dissemination in characteristic factory automation scenarios by
proposing to engage moving industrial machines as device-to-device (D2D)
caching helpers. With the goal to improve reliability of high-rate
millimeter-wave (mmWave) data connections, we introduce the alternative
contents dissemination modes and then construct a novel mobility-aware
methodology that helps develop predictive mode selection strategies based on
the anticipated radio link conditions. We also conduct a thorough system-level
evaluation of representative data dissemination strategies to confirm the
benefits of predictive solutions that employ D2D-enabled collaborative caching
at the wireless edge to lower contents delivery latency and improve data
acquisition reliability
Cooperative Cashing? An Economic Analysis of Document Duplication in Cooperative Web Caching
Cooperative caching is a popular mechanism to allow an array of distributed caches to cooperate and serve each others\u27 Web requests. Controlling duplication of documents across cooperating caches is a challenging problem faced by cache managers. In this paper, we study the economics of document duplication in strategic and nonstrategic settings. We have three primary findings. First, we find that the optimum level of duplication at a cache is nondecreasing in intercache latency, cache size, and extent of request locality. Second, in situations in which cache peering spans organizations, we find that the interaction between caches is a game of strategic substitutes wherein a cache employs lesser resources towards eliminating duplicate documents when the other caches employs more resources towards eliminating duplicate documents at that cache. Thus, a significant challenge will be to simultaneously induce multiple caches to contribute more resources towards reducing duplicate documents in the system. Finally, centralized decision making, which as expected provides improvements in average latency over a decentralized setup, can entail highly asymmetric duplication levels at the caches. This in turn can benefit one set of users at the expense of the other, and thus will be challenging to implement
Named Data Networking in Vehicular Ad hoc Networks: State-of-the-Art and Challenges
International audienceInformation-Centric Networking (ICN) has been proposed as one of the future Internet architectures. It is poised to address the challenges faced by today's Internet that include, but not limited to, scalability, addressing, security, and privacy. Furthermore, it also aims at meeting the requirements for new emerging Internet applications. To realize ICN, Named Data Networking (NDN) is one of the recent implementations of ICN that provides a suitable communication approach due to its clean slate design and simple communication model. There are a plethora of applications realized through ICN in different domains where data is the focal point of communication. One such domain is Intelligent Transportation System (ITS) realized through Vehicular Ad hoc NETwork (VANET) where vehicles exchange information and content with each other and with the infrastructure. To date, excellent research results have been yielded in the VANET domain aiming at safe, reliable, and infotainment-rich driving experience. However, due to the dynamic topologies, host-centric model, and ephemeral nature of vehicular communication, various challenges are faced by VANET that hinder the realization of successful vehicular networks and adversely affect the data dissemination, content delivery, and user experiences. To fill these gaps, NDN has been extensively used as underlying communication paradigm for VANET. Inspired by the extensive research results in NDN-based VANET, in this paper, we provide a detailed and systematic review of NDN-driven VANET. More precisely, we investigate the role of NDN in VANET and discuss the feasibility of NDN architecture in VANET environment. Subsequently, we cover in detail, NDN-based naming, routing and forwarding, caching, mobility, and security mechanism for VANET. Furthermore, we discuss the existing standards, solutions, and simulation tools used in NDN-based VANET. Finally, we also identify open challenges and issues faced by NDN-driven VANET and highlight future research directions that should be addressed by the research community
Self-configuring resource management in cooperative and uncooperative autonomous systems
In several circumstances, cooperation among autonomous agents
is a prerequisite for effective or efficient task processing.
This stems from the inherent or transient asymmetry of the
agents resources and capabilities. Since agents process tasks
autonomously, they have to decide by themselves under which
conditions and to which means they cooperate. Such local
decision making renders dedicated entities for resource
management dispensable and, thus, may increase the systems
fault-tolerance. In this report, we propose a framework for
self-configuring resource management in cooperative and
uncooperative environments. Therefore, we recognize the
relatedness of autonomous agents and economic entities. Both
are REMMs assess their resources and demands locally which
leads to more efficiency of the overall system. We identify
and discuss two dimensions of autonomy, i.e.
principal-agent and inter-agent autonomy
Generative AI-empowered Simulation for Autonomous Driving in Vehicular Mixed Reality Metaverses
In the vehicular mixed reality (MR) Metaverse, the distance between physical
and virtual entities can be overcome by fusing the physical and virtual
environments with multi-dimensional communications in autonomous driving
systems. Assisted by digital twin (DT) technologies, connected autonomous
vehicles (AVs), roadside units (RSU), and virtual simulators can maintain the
vehicular MR Metaverse via digital simulations for sharing data and making
driving decisions collaboratively. However, large-scale traffic and driving
simulation via realistic data collection and fusion from the physical world for
online prediction and offline training in autonomous driving systems are
difficult and costly. In this paper, we propose an autonomous driving
architecture, where generative AI is leveraged to synthesize unlimited
conditioned traffic and driving data in simulations for improving driving
safety and traffic efficiency. First, we propose a multi-task DT offloading
model for the reliable execution of heterogeneous DT tasks with different
requirements at RSUs. Then, based on the preferences of AV's DTs and collected
realistic data, virtual simulators can synthesize unlimited conditioned driving
and traffic datasets to further improve robustness. Finally, we propose a
multi-task enhanced auction-based mechanism to provide fine-grained incentives
for RSUs in providing resources for autonomous driving. The property analysis
and experimental results demonstrate that the proposed mechanism and
architecture are strategy-proof and effective, respectively
Trustworthy Edge Machine Learning: A Survey
The convergence of Edge Computing (EC) and Machine Learning (ML), known as
Edge Machine Learning (EML), has become a highly regarded research area by
utilizing distributed network resources to perform joint training and inference
in a cooperative manner. However, EML faces various challenges due to resource
constraints, heterogeneous network environments, and diverse service
requirements of different applications, which together affect the
trustworthiness of EML in the eyes of its stakeholders. This survey provides a
comprehensive summary of definitions, attributes, frameworks, techniques, and
solutions for trustworthy EML. Specifically, we first emphasize the importance
of trustworthy EML within the context of Sixth-Generation (6G) networks. We
then discuss the necessity of trustworthiness from the perspective of
challenges encountered during deployment and real-world application scenarios.
Subsequently, we provide a preliminary definition of trustworthy EML and
explore its key attributes. Following this, we introduce fundamental frameworks
and enabling technologies for trustworthy EML systems, and provide an in-depth
literature review of the latest solutions to enhance trustworthiness of EML.
Finally, we discuss corresponding research challenges and open issues.Comment: 27 pages, 7 figures, 10 table
Mathematical analysis of scheduling policies in peer-to-peer video streaming networks
Las redes de pares son comunidades virtuales autogestionadas, desarrolladas en la capa de aplicación sobre la infraestructura de Internet, donde los usuarios (denominados pares) comparten recursos (ancho de banda, memoria, procesamiento) para alcanzar un fin común. La distribución de video representa la aplicación más desafiante, dadas las limitaciones de ancho de banda. Existen básicamente tres servicios de video. El más simple es la descarga, donde un conjunto de servidores posee el contenido original, y los usuarios deben descargar completamente este contenido previo a su reproducción. Un segundo servicio se denomina video bajo demanda, donde los pares se unen a una red virtual siempre que inicien una solicitud de un contenido de video, e inician una descarga progresiva en lÃnea. El último servicio es video en vivo, donde el contenido de video es generado, distribuido y visualizado simultáneamente. En esta tesis se estudian aspectos de diseño para la distribución de video en vivo y bajo demanda. Se presenta un análisis matemático de estabilidad y capacidad de arquitecturas de distribución bajo demanda hÃbridas, asistidas por pares. Los pares inician descargas concurrentes de múltiples contenidos, y se desconectan cuando lo desean. Se predice la evolución esperada del sistema asumiendo proceso Poisson de arribos y egresos exponenciales, mediante un modelo determinÃstico de fluidos. Un sub-modelo de descargas secuenciales (no simultáneas) es globalmente y estructuralmente estable, independientemente de los parámetros de la red. Mediante la Ley de Little se determina el tiempo medio de residencia de usuarios en un sistema bajo demanda secuencial estacionario. Se demuestra teóricamente que la filosofÃa hÃbrida de cooperación entre pares siempre desempeña mejor que la tecnologÃa pura basada en cliente-servidor
A Review of Research on Privacy Protection of Internet of Vehicles Based on Blockchain
Numerous academic and industrial fields, such as healthcare, banking, and supply chain management, are rapidly adopting and relying on blockchain technology. It has also been suggested for application in the internet of vehicles (IoV) ecosystem as a way to improve service availability and reliability. Blockchain offers decentralized, distributed and tamper-proof solutions that bring innovation to data sharing and management, but do not themselves protect privacy and data confidentiality. Therefore, solutions using blockchain technology must take user privacy concerns into account. This article reviews the proposed solutions that use blockchain technology to provide different vehicle services while overcoming the privacy leakage problem which inherently exists in blockchain and vehicle services. We analyze the key features and attributes of prior schemes and identify their contributions to provide a comprehensive and critical overview. In addition, we highlight prospective future research topics and present research problems
- …