50 research outputs found
A Federated Filtering Framework for Internet of Medical Things
Based on the dominant paradigm, all the wearable IoT devices used in the
healthcare sector also known as the internet of medical things (IoMT) are
resource constrained in power and computational capabilities. The IoMT devices
are continuously pushing their readings to the remote cloud servers for
real-time data analytics, that causes faster drainage of the device battery.
Moreover, other demerits of continuous centralizing of data include exposed
privacy and high latency. This paper presents a novel Federated Filtering
Framework for IoMT devices which is based on the prediction of data at the
central fog server using shared models provided by the local IoMT devices. The
fog server performs model averaging to predict the aggregated data matrix and
also computes filter parameters for local IoMT devices. Two significant
theoretical contributions of this paper are the global tolerable perturbation
error () and the local filtering parameter (); where the
former controls the decision-making accuracy due to eigenvalue perturbation and
the later balances the tradeoff between the communication overhead and
perturbation error of the aggregated data matrix (predicted matrix) at the fog
server. Experimental evaluation based on real healthcare data demonstrates that
the proposed scheme saves upto 95\% of the communication cost while maintaining
reasonable data privacy and low latency.Comment: 6 pages, 6 Figures, accepted for oral presentation in IEEE ICC 2019,
Internet of Things, Federated Learning and Perturbation theor
How Far Can We Go in Compute-less Networking: Computation Correctness and Accuracy
Emerging applications such as augmented reality and tactile Internet are
compute-intensive and latency-sensitive, which hampers their running in
constrained end devices alone or in the distant cloud. The stringent
requirements of such application drove to the realization of Edge computing in
which computation is offloaded near to users. Compute-less networking is an
extension of edge computing that aims at reducing computation and abridging
communication by adopting in-network computing and computation reuse.
Computation reuse aims to cache the result of computations and use them to
perform similar tasks in the future and, therefore, avoid redundant
calculations and optimize the use of resources. In this paper, we focus on the
correctness of the final output produced by computation reuse. Since the input
might not be identical but similar, the reuse of previous computation raises
questions about the accuracy of the final results. To this end, we implement a
proof of concept to study and gauge the effectiveness and efficiency of
computation reuse. We are able to reduce task completion time by up to 80%
while ensuring high correctness. We further discuss open challenges and
highlight future research directions.Comment: Accepted for publication by the IEEE Network Magazin
A QoS-aware cache replacement policy for Vehicular Named Data Networks
International audienceVehicular Named Data Network (VNDN) uses Named Data Network (NDN) as a communication enabler. The communication is achieved using the content name instead of the host address. NDN integrates content caching at the network level rather than the application level. Hence, the network becomes aware of content caching and delivering. The content caching is a fundamental element in VNDN communication. However, due to the limitations of the cache store, only the most used content should be cached while the less used should be evicted. Traditional caching replacement policies may not work efficiently in VNDN due to the large and diverse exchanged content. To solve this issue, we propose an efficient cache replacement policy that takes the quality of service into consideration. The idea consists of classifying the traffic into different classes, and split the cache store into a set of sub-cache stores according to the defined traffic classes with different storage capacities according to the network requirements. Each content is assigned a popularity-density value that balances the content popularity with its size. Content with the highest popularity-density value is cached while the lowest is evicted. Simulation results prove the efficiency of the proposed solution to enhance the overall network quality of service
Coexistence of ICN and IP networks: an NFV as a service approach
International audienceIn contrast to the current host-centric architecture, Information-Centric Networking (ICN) adopts content naming instead of host address and in-network caching to enhance the content delivery, improve the data distribution, and satisfy users' requirements. As ICN is being incrementally deployed in different real-world scenarios, it will exist with IP-based services in a hybrid network setting. Full deployment of ICN and total replacement of IP protocol is not feasible at the current stage since IP is dominating the Internet. On the other hand, redesigning TCP/IP applications from ICN perspective is a time-consuming task and requires a careful investigation from both business and technical point of view. Thus, the coexistence of ICN and IP is one of the suitable solutions. Towards this end, we propose a simple yet efficient coexistence solution based on Network Function Virtualization (NFV) technology. We define a set of communication regions and control virtual functions. A gateway node is used as an intermediate entity to fetch and deliver content over regions. The simulation results show that the proposed approach is valid and allow content fetching and delivering from different ICN and/to IP regions in an efficient manner
Access Control Mechanisms in Named Data Networks:A Comprehensive Survey
Information-Centric Networking (ICN) has recently emerged as a prominent
candidate for the Future Internet Architecture (FIA) that addresses existing
issues with the host-centric communication model of the current TCP/IP-based
Internet. Named Data Networking (NDN) is one of the most recent and active ICN
architectures that provides a clean slate approach for Internet communication.
NDN provides intrinsic content security where security is directly provided to
the content instead of communication channel. Among other security aspects,
Access Control (AC) rules specify the privileges for the entities that can
access the content. In TCP/IP-based AC systems, due to the client-server
communication model, the servers control which client can access a particular
content. In contrast, ICN-based networks use content names to drive
communication and decouple the content from its original location. This
phenomenon leads to the loss of control over the content causing different
challenges for the realization of efficient AC mechanisms. To date,
considerable efforts have been made to develop various AC mechanisms in NDN. In
this paper, we provide a detailed and comprehensive survey of the AC mechanisms
in NDN. We follow a holistic approach towards AC in NDN where we first
summarize the ICN paradigm, describe the changes from channel-based security to
content-based security and highlight different cryptographic algorithms and
security protocols in NDN. We then classify the existing AC mechanisms into two
main categories: Encryption-based AC and Encryption-independent AC. Each
category has different classes based on the working principle of AC (e.g.,
Attribute-based AC, Name-based AC, Identity-based AC, etc). Finally, we present
the lessons learned from the existing AC mechanisms and identify the challenges
of NDN-based AC at large, highlighting future research directions for the
community.Comment: This paper has been accepted for publication by the ACM Computing
Surveys. The final version will be published by the AC
A Blockchain-Based Network Slice Broker for 5G Services
With advent of 5G, the classical mobile network business model is shifting from a network-operator-oriented business to a more open system with several actors. In this context, the Network Slice provider will play the role of an intermediate entity between the vertical service provider and the resource provider. To deploy a network slice, the network slice provider will require a brokering mechanism, which allows it to lease resources from different providers in a secure and private way. In this paper we propose a broker design based on Blockchain technology, providing a mechanism that secures and ensures anonymous transactions.This work was partially funded by the European Union’s Horizon 2020 research and innovation program under the 5G-Transformer project (grant no. 761536). Dr. Ksentini is corresponding author
Named Data Networking in Vehicular Ad hoc Networks: State-of-the-Art and Challenges
International audienceInformation-Centric Networking (ICN) has been proposed as one of the future Internet architectures. It is poised to address the challenges faced by today's Internet that include, but not limited to, scalability, addressing, security, and privacy. Furthermore, it also aims at meeting the requirements for new emerging Internet applications. To realize ICN, Named Data Networking (NDN) is one of the recent implementations of ICN that provides a suitable communication approach due to its clean slate design and simple communication model. There are a plethora of applications realized through ICN in different domains where data is the focal point of communication. One such domain is Intelligent Transportation System (ITS) realized through Vehicular Ad hoc NETwork (VANET) where vehicles exchange information and content with each other and with the infrastructure. To date, excellent research results have been yielded in the VANET domain aiming at safe, reliable, and infotainment-rich driving experience. However, due to the dynamic topologies, host-centric model, and ephemeral nature of vehicular communication, various challenges are faced by VANET that hinder the realization of successful vehicular networks and adversely affect the data dissemination, content delivery, and user experiences. To fill these gaps, NDN has been extensively used as underlying communication paradigm for VANET. Inspired by the extensive research results in NDN-based VANET, in this paper, we provide a detailed and systematic review of NDN-driven VANET. More precisely, we investigate the role of NDN in VANET and discuss the feasibility of NDN architecture in VANET environment. Subsequently, we cover in detail, NDN-based naming, routing and forwarding, caching, mobility, and security mechanism for VANET. Furthermore, we discuss the existing standards, solutions, and simulation tools used in NDN-based VANET. Finally, we also identify open challenges and issues faced by NDN-driven VANET and highlight future research directions that should be addressed by the research community