91 research outputs found

    Reinforcement learning-based trust and reputation model for spectrum leasing in cognitive radio networks

    Get PDF
    Cognitive Radio (CR), which is the next generation wireless communication system, enables unlicensed users or Secondary Users (SUs) to exploit underutilized spectrum (called white spaces) owned by the licensed users or Primary Users(PUs) so that bandwidth availability improves at the SUs, which helps to improve the overall spectrum utilization. Collaboration, which has been adopted in various schemes such distributed channel sensing and channel access, is an intrinsic characteristic of CR to improve network performance. However, the requirement to collaborate has inevitably open doors to various forms of attacks by malicious SUs, and this can be addressed using Trust and Reputation Management (TRM). Generally speaking, TRM detects malicious SUs including honest SUs that turn malicious. To achieve a more efficient detection, we advocate the use of Reinforcement Learning (RL), which is known to be flexible and adaptable to the changes in operating environment in order to achieve optimal network performance. Its ability to learn and re-learn throughout the duration of its existence provides intelligence to the proposed TRM model, and so the focus on RL-based TRM model in this paper. Our preliminary results show that the detection performance of RLbased TRM model has an improvement of 15% over the traditional TRM in a centralized cognitive radio network. The investigation in the paper serves as an important foundation for future work in this research field

    Spectrum leasing in cognitive radio networks: a survey

    Get PDF
    Cognitive Radio (CR) is a dynamic spectrum access approach, in which unlicensed users (or secondary users, SUs) exploit the underutilized channels (or white spaces) owned by the licensed users (or primary users, PUs). Traditionally, SUs are oblivious to PUs, and therefore the acquisition of white spaces is not guaranteed. Hence, a SU must vacate its channel whenever a PU reappears on it in an unpredictablemanner,which may affect the SUs’ network performance. Spectrumleasing has been proposed to tackle the aforementioned problem through negotiation between the PU and SU networks, which allows the SUs to acquire white spaces for a guaranteed period of time.Through spectrumleasing, the PUs and SUs enhance their network performances, and additionally PUs maximize their respective monetary gains. Numerous research efforts have been made to investigate the CR, whereas the research into spectrum leasing remains at its infancy. In this paper, we present a comprehensive review on spectrum leasing schemes in CR networks by highlighting some pioneering approaches and discuss the gains, functionalities, characteristics, and challenges of spectrum leasing schemes along with the performance enhancement in CR networks. Additionally, we discuss various open issues in order to spark new interests in this research area

    Guest editorial

    Get PDF

    Addressing the major information technology challenges of electronic textbooks

    Get PDF
    Electronic textbooks (e-Textbooks) are digitized forms of textbooks which are envisioned to replace existing paper-based textbooks. After intensive literature review, together with interview results, our study has figured out four major IT-based challenges associated with e-Textbooks in its pursuit to replace the traditional textbooks, namely standardizing format of content, improving service reliability, improving quality and accuracy of content, and improving readability. This paper also provides an extensive review on how these challenges have been approached using existing e-Textbook solutions, such as N-Screen services, cloud computing, open market place, P2P between devices and HTML5. For each solution, we develop a usage scenario in which users apply the aforementioned technologies to interact with e-Textbooks and share contents among themselves. This article aims to provide a strong foundation for further investigations into the development and distribution of e-Textbooks for eventual successful adoption of e-Textbooks in school education

    Can an electronic textbooks be part of K-12 education?: Challenges, technological solutions and open issues

    Get PDF
    An electronic textbook (e-Textbook) is a digitized (or electronic) form of textbook, which normally needs an endorsement by the national or state government when it is used in the K-12 education system. E-Textbooks have been envisioned to replace existing paper-based textbooks due to its educational advantages. Hence, it is of paramount importance for the relevant parties (i.e. national and state governments, or school districts) to draw a comprehensive roadmap of technologies necessary for the successful adoption of e-Textbooks nationwide. This paper provides a brief overview of e-Textbooks and subsequently an extensive discussion on challenges associated with e-Textbooks in the pursuit of replacing traditional textbooks with e-Textbooks. This paper further provides an extensive review on how the challenges have been approached using existing e-Textbook technologies, such as multi-touch technology, e-Paper, Web 2.0 and cloud computing. Literature review and interview have been conducted to identify the challenges of e Textbooks implementation in terms of e-Textbook usage levels and the reasons of its refusal. There were 180 students and 20 academic staff participated as a sample for interviews. Eight categories of key challenges were identified. Subsequently, assessment was performed on how the evolving e-Textbook technology has been applied to address the key challenges and problems. This article aims to provide a strong foundation for further investigations in e-Textbooks for successful adoption of e-Textbooks in school education

    IEEE Access special section editorial: Artificial intelligence enabled networking

    Get PDF
    With today’s computer networks becoming increasingly dynamic, heterogeneous, and complex, there is great interest in deploying artificial intelligence (AI) based techniques for optimization and management of computer networks. AI techniques—that subsume multidisciplinary techniques from machine learning, optimization theory, game theory, control theory, and meta-heuristics—have long been applied to optimize computer networks in many diverse settings. Such an approach is gaining increased traction with the emergence of novel networking paradigms that promise to simplify network management (e.g., cloud computing, network functions virtualization, and software-defined networking) and provide intelligent services (e.g., future 5G mobile networks). Looking ahead, greater integration of AI into networking architectures can help develop a future vision of cognitive networks that will show network-wide intelligent behavior to solve problems of network heterogeneity, performance, and quality of service (QoS)

    Exploiting the power of multiplicity: a holistic survey of network-layer multipath

    Get PDF
    The Internet is inherently a multipath network: For an underlying network with only a single path, connecting various nodes would have been debilitatingly fragile. Unfortunately, traditional Internet technologies have been designed around the restrictive assumption of a single working path between a source and a destination. The lack of native multipath support constrains network performance even as the underlying network is richly connected and has redundant multiple paths. Computer networks can exploit the power of multiplicity, through which a diverse collection of paths is resource pooled as a single resource, to unlock the inherent redundancy of the Internet. This opens up a new vista of opportunities, promising increased throughput (through concurrent usage of multiple paths) and increased reliability and fault tolerance (through the use of multiple paths in backup/redundant arrangements). There are many emerging trends in networking that signify that the Internet's future will be multipath, including the use of multipath technology in data center computing; the ready availability of multiple heterogeneous radio interfaces in wireless (such as Wi-Fi and cellular) in wireless devices; ubiquity of mobile devices that are multihomed with heterogeneous access networks; and the development and standardization of multipath transport protocols such as multipath TCP. The aim of this paper is to provide a comprehensive survey of the literature on network-layer multipath solutions. We will present a detailed investigation of two important design issues, namely, the control plane problem of how to compute and select the routes and the data plane problem of how to split the flow on the computed paths. The main contribution of this paper is a systematic articulation of the main design issues in network-layer multipath routing along with a broad-ranging survey of the vast literature on network-layer multipathing. We also highlight open issues and identify directions for future work

    Trust and reputation management for securing collaboration in 5G access networks: the road ahead

    Get PDF
    Trust represents the belief or perception of an entity, such as a mobile device or a node, in the extent to which future actions and reactions are appropriate in a collaborative relationship. Reputation represents the network-wide belief or perception of the trustworthiness of an entity. Each entity computes and assigns a trust or reputation value, which increases and decreases with the appropriateness of actions and reactions, to another entity in order to ensure a healthy collaborative relationship. Trust and reputation management (TRM) has been investigated to improve the security of traditional networks, particularly the access networks. In 5G, the access networks are multi-hop networks formed by entities which may not be trustable, and so such networks are prone to attacks, such as Sybil and crude attacks. TRM addresses such attacks to enhance the overall network performance, including reliability, scalability, and stability. Nevertheless, the investigation of TRM in 5G, which is the next-generation wireless networks, is still at its infancy. TRM must cater for the characteristics of 5G. Firstly, ultra-densification due to the exponential growth of mobile users and data traffic. Secondly, high heterogeneity due to the different characteristics of mobile users, such as different transmission characteristics (e.g., different transmission power) and different user equipment (e.g., laptops and smartphones). Thirdly, high variability due to the dynamicity of the entities’ behaviors and operating environment. TRM must also cater for the core features of 5G (e.g., millimeter wave transmission, and device-to-device communication) and the core technologies of 5G (e.g., massive MIMO and beamforming, and network virtualization). In this paper, a review of TRM schemes in 5G and traditional networks, which can be leveraged to 5G, is presented. We also provide an insight on some of the important open issues and vulnerabilities in 5G networks that can be resolved using a TRM framework
    corecore