-
Internet of Agents: Fundamentals, Applications, and Challenges
Authors:
Yuntao Wang,
Shaolong Guo,
Yanghe Pan,
Zhou Su,
Fahao Chen,
Tom H. Luan,
Peng Li,
Jiawen Kang,
Dusit Niyato
Abstract:
With the rapid proliferation of large language models and vision-language models, AI agents have evolved from isolated, task-specific systems into autonomous, interactive entities capable of perceiving, reasoning, and acting without human intervention. As these agents proliferate across virtual and physical environments, from virtual assistants to embodied robots, the need for a unified, agent-cen…
▽ More
With the rapid proliferation of large language models and vision-language models, AI agents have evolved from isolated, task-specific systems into autonomous, interactive entities capable of perceiving, reasoning, and acting without human intervention. As these agents proliferate across virtual and physical environments, from virtual assistants to embodied robots, the need for a unified, agent-centric infrastructure becomes paramount. In this survey, we introduce the Internet of Agents (IoA) as a foundational framework that enables seamless interconnection, dynamic discovery, and collaborative orchestration among heterogeneous agents at scale. We begin by presenting a general IoA architecture, highlighting its hierarchical organization, distinguishing features relative to the traditional Internet, and emerging applications. Next, we analyze the key operational enablers of IoA, including capability notification and discovery, adaptive communication protocols, dynamic task matching, consensus and conflict-resolution mechanisms, and incentive models. Finally, we identify open research directions toward building resilient and trustworthy IoA ecosystems.
△ Less
Submitted 11 May, 2025;
originally announced May 2025.
-
SPIN: Accelerating Large Language Model Inference with Heterogeneous Speculative Models
Authors:
Fahao Chen,
Peng Li,
Tom H. Luan,
Zhou Su,
Jing Deng
Abstract:
Speculative decoding has been shown as an effective way to accelerate Large Language Model (LLM) inference by using a Small Speculative Model (SSM) to generate candidate tokens in a so-called speculation phase, which are subsequently verified by the LLM in a verification phase. However, current state-of-the-art speculative decoding approaches have three key limitations: handling requests with vary…
▽ More
Speculative decoding has been shown as an effective way to accelerate Large Language Model (LLM) inference by using a Small Speculative Model (SSM) to generate candidate tokens in a so-called speculation phase, which are subsequently verified by the LLM in a verification phase. However, current state-of-the-art speculative decoding approaches have three key limitations: handling requests with varying difficulty using homogeneous SSMs, lack of robust support for batch processing, and insufficient holistic optimization for both speculation and verification phases. In this paper, we introduce SPIN, an efficient LLM inference serving system based on speculative decoding, designed to address these challenges through three main innovations. First, SPIN improves token speculation by using multiple heterogeneous SSMs, with a learning-based algorithm for SSM selection that operates without prior knowledge of request difficulty. Second, SPIN employs a request decomposition method to minimize batching overhead during LLM verification. Finally, SPIN orchestrates speculation and verification phases by pipelining their executions on GPUs to achieve further acceleration. Experimental results demonstrate that SPIN significantly outperforms state-of-the-art methods, achieving a performance increase of approximately 2.28X.
△ Less
Submitted 20 March, 2025;
originally announced March 2025.
-
Movable Antennas Enabled ISAC Systems: Fundamentals, Opportunities, and Future Directions
Authors:
Zhendong Li,
Jianle Ba,
Zhou Su,
Jinyuan Huang,
Haixia Peng,
Wen Chen,
Linkang Du,
Tom H. Luan
Abstract:
The movable antenna (MA)-enabled integrated sensing and communication (ISAC) system attracts widespread attention as an innovative framework. The ISAC system integrates sensing and communication functions, achieving resource sharing across various domains, significantly enhancing communication and sensing performance, and promoting the intelligent interconnection of everything. Meanwhile, MA utili…
▽ More
The movable antenna (MA)-enabled integrated sensing and communication (ISAC) system attracts widespread attention as an innovative framework. The ISAC system integrates sensing and communication functions, achieving resource sharing across various domains, significantly enhancing communication and sensing performance, and promoting the intelligent interconnection of everything. Meanwhile, MA utilizes the spatial variations of wireless channels by dynamically adjusting the positions of MA elements at the transmitter and receiver to improve the channel and further enhance the performance of the ISAC systems. In this paper, we first outline the fundamental principles of MA and introduce the application scenarios of MA-enabled ISAC systems. Then, we summarize the advantages of MA-enabled ISAC systems in enhancing spectral efficiency, achieving flexible and precise beamforming, and making the signal coverage range adjustable. Besides, a specific case is studied to show the performance gains in terms of transmit power that MA brings to ISAC systems. Finally, we discuss the challenges of MA-enabled ISAC and future research directions, aiming to provide insights for future research on MA-enabled ISAC systems.
△ Less
Submitted 30 December, 2024;
originally announced December 2024.
-
AI-Native Network Digital Twin for Intelligent Network Management in 6G
Authors:
Wen Wu,
Xinyu Huang,
Tom H. Luan
Abstract:
As a pivotal virtualization technology, network digital twin is expected to accurately reflect real-time status and abstract features in the on-going sixth generation (6G) networks. In this article, we propose an artificial intelligence (AI)-native network digital twin framework for 6G networks to enable the synergy of AI and network digital twin, thereby facilitating intelligent network managemen…
▽ More
As a pivotal virtualization technology, network digital twin is expected to accurately reflect real-time status and abstract features in the on-going sixth generation (6G) networks. In this article, we propose an artificial intelligence (AI)-native network digital twin framework for 6G networks to enable the synergy of AI and network digital twin, thereby facilitating intelligent network management. In the proposed framework, AI models are utilized to establish network digital twin models to facilitate network status prediction, network pattern abstraction, and network management decision-making. Furthermore, potential solutions are proposed for enhance the performance of network digital twin. Finally, a case study is presented, followed by a discussion of open research issues that are essential for AI-native network digital twin in 6G networks.
△ Less
Submitted 9 October, 2024; v1 submitted 2 October, 2024;
originally announced October 2024.
-
Large Model Based Agents: State-of-the-Art, Cooperation Paradigms, Security and Privacy, and Future Trends
Authors:
Yuntao Wang,
Yanghe Pan,
Zhou Su,
Yi Deng,
Quan Zhao,
Linkang Du,
Tom H. Luan,
Jiawen Kang,
Dusit Niyato
Abstract:
With the rapid advancement of large models (LMs), the development of general-purpose intelligent agents powered by LMs has become a reality. It is foreseeable that in the near future, LM-driven general AI agents will serve as essential tools in production tasks, capable of autonomous communication and collaboration without human intervention. This paper investigates scenarios involving the autonom…
▽ More
With the rapid advancement of large models (LMs), the development of general-purpose intelligent agents powered by LMs has become a reality. It is foreseeable that in the near future, LM-driven general AI agents will serve as essential tools in production tasks, capable of autonomous communication and collaboration without human intervention. This paper investigates scenarios involving the autonomous collaboration of future LM agents. We review the current state of LM agents, the key technologies enabling LM agent collaboration, and the security and privacy challenges they face during cooperative operations. To this end, we first explore the foundational principles of LM agents, including their general architecture, key components, enabling technologies, and modern applications. We then discuss practical collaboration paradigms from data, computation, and knowledge perspectives to achieve connected intelligence among LM agents. After that, we analyze the security vulnerabilities and privacy risks associated with LM agents, particularly in multi-agent settings, examining underlying mechanisms and reviewing current and potential countermeasures. Lastly, we propose future research directions for building robust and secure LM agent ecosystems.
△ Less
Submitted 1 June, 2025; v1 submitted 22 September, 2024;
originally announced September 2024.
-
A Survey on Semantic Communication Networks: Architecture, Security, and Privacy
Authors:
Shaolong Guo,
Yuntao Wang,
Ning Zhang,
Zhou Su,
Tom H. Luan,
Zhiyi Tian,
Xuemin,
Shen
Abstract:
With the rapid advancement and deployment of intelligent agents and artificial general intelligence (AGI), a fundamental challenge for future networks is enabling efficient communications among agents. Unlike traditional human-centric, data-driven communication networks, the primary goal of agent-based communication is to facilitate coordination among agents. Therefore, task comprehension and coll…
▽ More
With the rapid advancement and deployment of intelligent agents and artificial general intelligence (AGI), a fundamental challenge for future networks is enabling efficient communications among agents. Unlike traditional human-centric, data-driven communication networks, the primary goal of agent-based communication is to facilitate coordination among agents. Therefore, task comprehension and collaboration become the key objectives of communications, rather than data synchronization. Semantic communication (SemCom) aims to align information and knowledge among agents to expedite task comprehension. While significant research has been conducted on SemCom for two-agent systems, the development of semantic communication networks (SemComNet) for multi-agent systems remains largely unexplored. In this paper, we provide a comprehensive and up-to-date survey of SemComNet, focusing on their fundamentals, security, and privacy aspects. We introduce a novel three-layer architecture for multi-agent interaction, comprising the control layer, semantic transmission layer, and cognitive sensing layer. We explore working modes and enabling technologies, and present a taxonomy of security and privacy threats, along with state-of-the-art defense mechanisms. Finally, we outline future research directions, paving the way toward intelligent, robust, and energy-efficient SemComNet. This survey represents the first comprehensive analysis of SemComNet, offering detailed insights into its core principles as well as associated security and privacy challenges.
△ Less
Submitted 2 December, 2024; v1 submitted 2 May, 2024;
originally announced May 2024.
-
Learning Decentralized Traffic Signal Controllers with Multi-Agent Graph Reinforcement Learning
Authors:
Yao Zhang,
Zhiwen Yu,
Jun Zhang,
Liang Wang,
Tom H. Luan,
Bin Guo,
Chau Yuen
Abstract:
This paper considers optimal traffic signal control in smart cities, which has been taken as a complex networked system control problem. Given the interacting dynamics among traffic lights and road networks, attaining controller adaptivity and scalability stands out as a primary challenge. Capturing the spatial-temporal correlation among traffic lights under the framework of Multi-Agent Reinforcem…
▽ More
This paper considers optimal traffic signal control in smart cities, which has been taken as a complex networked system control problem. Given the interacting dynamics among traffic lights and road networks, attaining controller adaptivity and scalability stands out as a primary challenge. Capturing the spatial-temporal correlation among traffic lights under the framework of Multi-Agent Reinforcement Learning (MARL) is a promising solution. Nevertheless, existing MARL algorithms ignore effective information aggregation which is fundamental for improving the learning capacity of decentralized agents. In this paper, we design a new decentralized control architecture with improved environmental observability to capture the spatial-temporal correlation. Specifically, we first develop a topology-aware information aggregation strategy to extract correlation-related information from unstructured data gathered in the road network. Particularly, we transfer the road network topology into a graph shift operator by forming a diffusion process on the topology, which subsequently facilitates the construction of graph signals. A diffusion convolution module is developed, forming a new MARL algorithm, which endows agents with the capabilities of graph learning. Extensive experiments based on both synthetic and real-world datasets verify that our proposal outperforms existing decentralized algorithms.
△ Less
Submitted 7 November, 2023;
originally announced November 2023.
-
Label-free Deep Learning Driven Secure Access Selection in Space-Air-Ground Integrated Networks
Authors:
Zhaowei Wang,
Zhisheng Yin,
Xiucheng Wang,
Nan Cheng,
Yuan Zhang,
Tom H. Luan
Abstract:
In Space-air-ground integrated networks (SAGIN), the inherent openness and extensive broadcast coverage expose these networks to significant eavesdropping threats. Considering the inherent co-channel interference due to spectrum sharing among multi-tier access networks in SAGIN, it can be leveraged to assist the physical layer security among heterogeneous transmissions. However, it is challenging…
▽ More
In Space-air-ground integrated networks (SAGIN), the inherent openness and extensive broadcast coverage expose these networks to significant eavesdropping threats. Considering the inherent co-channel interference due to spectrum sharing among multi-tier access networks in SAGIN, it can be leveraged to assist the physical layer security among heterogeneous transmissions. However, it is challenging to conduct a secrecy-oriented access strategy due to both heterogeneous resources and different eavesdropping models. In this paper, we explore secure access selection for a scenario involving multi-mode users capable of accessing satellites, unmanned aerial vehicles, or base stations in the presence of eavesdroppers. Particularly, we propose a Q-network approximation based deep learning approach for selecting the optimal access strategy for maximizing the sum secrecy rate. Meanwhile, the power optimization is also carried out by an unsupervised learning approach to improve the secrecy performance. Remarkably, two neural networks are trained by unsupervised learning and Q-network approximation which are both label-free methods without knowing the optimal solution as labels. Numerical results verify the efficiency of our proposed power optimization approach and access strategy, leading to enhanced secure transmission performance.
△ Less
Submitted 28 August, 2023;
originally announced August 2023.
-
A Survey on ChatGPT: AI-Generated Contents, Challenges, and Solutions
Authors:
Yuntao Wang,
Yanghe Pan,
Miao Yan,
Zhou Su,
Tom H. Luan
Abstract:
With the widespread use of large artificial intelligence (AI) models such as ChatGPT, AI-generated content (AIGC) has garnered increasing attention and is leading a paradigm shift in content creation and knowledge representation. AIGC uses generative large AI algorithms to assist or replace humans in creating massive, high-quality, and human-like content at a faster pace and lower cost, based on u…
▽ More
With the widespread use of large artificial intelligence (AI) models such as ChatGPT, AI-generated content (AIGC) has garnered increasing attention and is leading a paradigm shift in content creation and knowledge representation. AIGC uses generative large AI algorithms to assist or replace humans in creating massive, high-quality, and human-like content at a faster pace and lower cost, based on user-provided prompts. Despite the recent significant progress in AIGC, security, privacy, ethical, and legal challenges still need to be addressed. This paper presents an in-depth survey of working principles, security and privacy threats, state-of-the-art solutions, and future challenges of the AIGC paradigm. Specifically, we first explore the enabling technologies, general architecture of AIGC, and discuss its working modes and key characteristics. Then, we investigate the taxonomy of security and privacy threats to AIGC and highlight the ethical and societal implications of GPT and AIGC technologies. Furthermore, we review the state-of-the-art AIGC watermarking approaches for regulatable AIGC paradigms regarding the AIGC model and its produced content. Finally, we identify future challenges and open research directions related to AIGC.
△ Less
Submitted 29 July, 2023; v1 submitted 25 May, 2023;
originally announced May 2023.
-
SEAL: A Strategy-Proof and Privacy-Preserving UAV Computation Offloading Framework
Authors:
Yuntao Wang,
Zhou Su,
Tom H. Luan,
Jiliang Li,
Qichao Xu,
Ruidong Li
Abstract:
Due to the limited battery and computing resource, offloading unmanned aerial vehicles (UAVs)' computation tasks to ground infrastructure, e.g., vehicles, is a fundamental framework. Under such an open and untrusted environment, vehicles are reluctant to share their computing resource unless provisioning strong incentives, privacy protection, and fairness guarantee. Precisely, without strategy-pro…
▽ More
Due to the limited battery and computing resource, offloading unmanned aerial vehicles (UAVs)' computation tasks to ground infrastructure, e.g., vehicles, is a fundamental framework. Under such an open and untrusted environment, vehicles are reluctant to share their computing resource unless provisioning strong incentives, privacy protection, and fairness guarantee. Precisely, without strategy-proofness guarantee, the strategic vehicles can overclaim participation costs so as to conduct market manipulation. Without the fairness provision, vehicles can deliberately abort the assigned tasks without any punishments, and UAVs can refuse to pay by the end, causing an exchange dilemma. Lastly, the strategy-proofness and fairness provision typically require transparent payment/task results exchange under public audit, which may disclose sensitive information of vehicles and make the privacy preservation a foremost issue. To achieve the three design goals, we propose SEAL, an integrated framework to address strategy-proof, fair, and privacy-preserving UAV computation offloading. SEAL deploys a strategy-proof reverse combinatorial auction mechanism to optimize UAVs' task offloading under practical constraints while ensuring economic-robustness and polynomial-time efficiency. Based on smart contracts and hashchain micropayment, SEAL implements a fair on-chain exchange protocol to realize the atomic completion of batch payments and computing results in multi-round auctions. In addition, a privacy-preserving off-chain auction protocol is devised with the assistance of the trusted processor to efficiently protect vehicles' bid privacy. Using rigorous theoretical analysis and extensive simulations, we validate that SEAL can effectively prevent vehicles from manipulating, ensure privacy protection and fairness, improve the offloading efficiency.
△ Less
Submitted 15 May, 2023;
originally announced May 2023.
-
Secured and Cooperative Publish/Subscribe Scheme in Autonomous Vehicular Networks
Authors:
Yuntao Wang,
Zhou Su,
Qichao Xu,
Tom H. Luan,
Rongxing Lu
Abstract:
In order to save computing power yet enhance safety, there is a strong intention for autonomous vehicles (AVs) in future to drive collaboratively by sharing sensory data and computing results among neighbors. However, the intense collaborative computing and data transmissions among unknown others will inevitably introduce severe security concerns. Aiming at addressing security concerns in future A…
▽ More
In order to save computing power yet enhance safety, there is a strong intention for autonomous vehicles (AVs) in future to drive collaboratively by sharing sensory data and computing results among neighbors. However, the intense collaborative computing and data transmissions among unknown others will inevitably introduce severe security concerns. Aiming at addressing security concerns in future AVs, in this paper, we develop SPAD, a secured framework to forbid free-riders and {promote trustworthy data dissemination} in collaborative autonomous driving. Specifically, we first introduce a publish/subscribe framework for inter-vehicle data transmissions{. To defend against free-riding attacks,} we formulate the interactions between publisher AVs and subscriber AVs as a vehicular publish/subscribe game, {and incentivize AVs to deliver high-quality data by analyzing the Stackelberg equilibrium of the game. We also design a reputation evaluation mechanism in the game} to identify malicious AVs {in disseminating fake information}. {Furthermore, for} lack of sufficient knowledge on parameters of {the} network model and user cost model {in dynamic game scenarios}, a two-tier reinforcement learning based algorithm with hotbooting is developed to obtain the optimal {strategies of subscriber AVs and publisher AVs with free-rider prevention}. Extensive simulations are conducted, and the results validate that our SPAD can effectively {prevent free-riders and enhance the dependability of disseminated contents,} compared with conventional schemes.
△ Less
Submitted 28 April, 2023; v1 submitted 18 April, 2023;
originally announced April 2023.
-
A Survey on Digital Twins: Architecture, Enabling Technologies, Security and Privacy, and Future Prospects
Authors:
Yuntao Wang,
Zhou Su,
Shaolong Guo,
Minghui Dai,
Tom H. Luan,
Yiliang Liu
Abstract:
By interacting, synchronizing, and cooperating with its physical counterpart in real time, digital twin is promised to promote an intelligent, predictive, and optimized modern city. Via interconnecting massive physical entities and their virtual twins with inter-twin and intra-twin communications, the Internet of digital twins (IoDT) enables free data exchange, dynamic mission cooperation, and eff…
▽ More
By interacting, synchronizing, and cooperating with its physical counterpart in real time, digital twin is promised to promote an intelligent, predictive, and optimized modern city. Via interconnecting massive physical entities and their virtual twins with inter-twin and intra-twin communications, the Internet of digital twins (IoDT) enables free data exchange, dynamic mission cooperation, and efficient information aggregation for composite insights across vast physical/virtual entities. However, as IoDT incorporates various cutting-edge technologies to spawn the new ecology, severe known/unknown security flaws and privacy invasions of IoDT hinders its wide deployment. Besides, the intrinsic characteristics of IoDT such as \emph{decentralized structure}, \emph{information-centric routing} and \emph{semantic communications} entail critical challenges for security service provisioning in IoDT. To this end, this paper presents an in-depth review of the IoDT with respect to system architecture, enabling technologies, and security/privacy issues. Specifically, we first explore a novel distributed IoDT architecture with cyber-physical interactions and discuss its key characteristics and communication modes. Afterward, we investigate the taxonomy of security and privacy threats in IoDT, discuss the key research challenges, and review the state-of-the-art defense approaches. Finally, we point out the new trends and open research directions related to IoDT.
△ Less
Submitted 30 January, 2023;
originally announced January 2023.
-
Trade Privacy for Utility: A Learning-Based Privacy Pricing Game in Federated Learning
Authors:
Yuntao Wang,
Zhou Su,
Yanghe Pan,
Abderrahim Benslimane,
Yiliang Liu,
Tom H. Luan,
Ruidong Li
Abstract:
To prevent implicit privacy disclosure in sharing gradients among data owners (DOs) under federated learning (FL), differential privacy (DP) and its variants have become a common practice to offer formal privacy guarantees with low overheads. However, individual DOs generally tend to inject larger DP noises for stronger privacy provisions (which entails severe degradation of model utility), while…
▽ More
To prevent implicit privacy disclosure in sharing gradients among data owners (DOs) under federated learning (FL), differential privacy (DP) and its variants have become a common practice to offer formal privacy guarantees with low overheads. However, individual DOs generally tend to inject larger DP noises for stronger privacy provisions (which entails severe degradation of model utility), while the curator (i.e., aggregation server) aims to minimize the overall effect of added random noises for satisfactory model performance. To address this conflicting goal, we propose a novel dynamic privacy pricing (DyPP) game which allows DOs to sell individual privacy (by lowering the scale of locally added DP noise) for differentiated economic compensations (offered by the curator), thereby enhancing FL model utility. Considering multi-dimensional information asymmetry among players (e.g., DO's data distribution and privacy preference, and curator's maximum affordable payment) as well as their varying private information in distinct FL tasks, it is hard to directly attain the Nash equilibrium of the mixed-strategy DyPP game. Alternatively, we devise a fast reinforcement learning algorithm with two layers to quickly learn the optimal mixed noise-saving strategy of DOs and the optimal mixed pricing strategy of the curator without prior knowledge of players' private information. Experiments on real datasets validate the feasibility and effectiveness of the proposed scheme in terms of faster convergence speed and enhanced FL model utility with lower payment costs.
△ Less
Submitted 14 February, 2023; v1 submitted 20 January, 2023;
originally announced January 2023.
-
Social-Aware Clustered Federated Learning with Customized Privacy Preservation
Authors:
Yuntao Wang,
Zhou Su,
Yanghe Pan,
Tom H Luan,
Ruidong Li,
Shui Yu
Abstract:
A key feature of federated learning (FL) is to preserve the data privacy of end users. However, there still exist potential privacy leakage in exchanging gradients under FL. As a result, recent research often explores the differential privacy (DP) approaches to add noises to the computing results to address privacy concerns with low overheads, which however degrade the model performance. In this p…
▽ More
A key feature of federated learning (FL) is to preserve the data privacy of end users. However, there still exist potential privacy leakage in exchanging gradients under FL. As a result, recent research often explores the differential privacy (DP) approaches to add noises to the computing results to address privacy concerns with low overheads, which however degrade the model performance. In this paper, we strike the balance of data privacy and efficiency by utilizing the pervasive social connections between users. Specifically, we propose SCFL, a novel Social-aware Clustered Federated Learning scheme, where mutually trusted individuals can freely form a social cluster and aggregate their raw model updates (e.g., gradients) inside each cluster before uploading to the cloud for global aggregation. By mixing model updates in a social group, adversaries can only eavesdrop the social-layer combined results, but not the privacy of individuals. We unfold the design of SCFL in three steps.i) Stable social cluster formation. Considering users' heterogeneous training samples and data distributions, we formulate the optimal social cluster formation problem as a federation game and devise a fair revenue allocation mechanism to resist free-riders. ii) Differentiated trust-privacy mapping}. For the clusters with low mutual trust, we design a customizable privacy preservation mechanism to adaptively sanitize participants' model updates depending on social trust degrees. iii) Distributed convergence}. A distributed two-sided matching algorithm is devised to attain an optimized disjoint partition with Nash-stable convergence. Experiments on Facebook network and MNIST/CIFAR-10 datasets validate that our SCFL can effectively enhance learning utility, improve user payoff, and enforce customizable privacy protection.
△ Less
Submitted 19 March, 2024; v1 submitted 25 December, 2022;
originally announced December 2022.
-
A Secure and Intelligent Data Sharing Scheme for UAV-Assisted Disaster Rescue
Authors:
Yuntao Wang,
Zhou Su,
Qichao Xu,
Ruidong Li,
Tom H. Luan,
Pinghui Wang
Abstract:
Unmanned aerial vehicles (UAVs) have the potential to establish flexible and reliable emergency networks in disaster sites when terrestrial communication infrastructures go down. Nevertheless, potential security threats may occur on UAVs during data transmissions due to the untrusted environment and open-access UAV networks. Moreover, UAVs typically have limited battery and computation capacity, m…
▽ More
Unmanned aerial vehicles (UAVs) have the potential to establish flexible and reliable emergency networks in disaster sites when terrestrial communication infrastructures go down. Nevertheless, potential security threats may occur on UAVs during data transmissions due to the untrusted environment and open-access UAV networks. Moreover, UAVs typically have limited battery and computation capacity, making them unaffordable for heavy security provisioning operations when performing complicated rescue tasks. In this paper, we develop RescueChain, a secure and efficient information sharing scheme for UAV-assisted disaster rescue. Specifically, we first implement a lightweight blockchain-based framework to safeguard data sharing under disasters and immutably trace misbehaving entities. A reputation-based consensus protocol is devised to adapt the weakly connected environment with improved consensus efficiency and promoted UAVs' honest behaviors. Furthermore, we introduce a novel vehicular fog computing (VFC)-based off-chain mechanism by leveraging ground vehicles as moving fog nodes to offload UAVs' heavy data processing and storage tasks. To offload computational tasks from the UAVs to ground vehicles having idle computing resources, an optimal allocation strategy is developed by choosing payoffs that achieve equilibrium in a Stackelberg game formulation of the allocation problem. For lack of sufficient knowledge on network model parameters and users' private cost parameters in practical environment, we also design a two-tier deep reinforcement learning-based algorithm to seek the optimal payment and resource strategies of UAVs and vehicles with improved learning efficiency. Simulation results show that RescueChain can effectively accelerate consensus process, improve offloading efficiency, reduce energy consumption, and enhance user payoffs.
△ Less
Submitted 23 November, 2022;
originally announced November 2022.
-
A Platform-Free Proof of Federated Learning Consensus Mechanism for Sustainable Blockchains
Authors:
Yuntao Wang,
Haixia Peng,
Zhou Su,
Tom H Luan,
Abderrahim Benslimane,
Yuan Wu
Abstract:
Proof of work (PoW), as the representative consensus protocol for blockchain, consumes enormous amounts of computation and energy to determine bookkeeping rights among miners but does not achieve any practical purposes. To address the drawback of PoW, we propose a novel energy-recycling consensus mechanism named platform-free proof of federated learning (PF-PoFL), which leverages the computing pow…
▽ More
Proof of work (PoW), as the representative consensus protocol for blockchain, consumes enormous amounts of computation and energy to determine bookkeeping rights among miners but does not achieve any practical purposes. To address the drawback of PoW, we propose a novel energy-recycling consensus mechanism named platform-free proof of federated learning (PF-PoFL), which leverages the computing power originally wasted in solving hard but meaningless PoW puzzles to conduct practical federated learning (FL) tasks. Nevertheless, potential security threats and efficiency concerns may occur due to the untrusted environment and miners' self-interested features. In this paper, by devising a novel block structure, new transaction types, and credit-based incentives, PF-PoFL allows efficient artificial intelligence (AI) task outsourcing, federated mining, model evaluation, and reward distribution in a fully decentralized manner, while resisting spoofing and Sybil attacks. Besides, PF-PoFL equips with a user-level differential privacy mechanism for miners to prevent implicit privacy leakage in training FL models. Furthermore, by considering dynamic miner characteristics (e.g., training samples, non-IID degree, and network delay) under diverse FL tasks, a federation formation game-based mechanism is presented to distributively form the optimized disjoint miner partition structure with Nash-stable convergence. Extensive simulations validate the efficiency and effectiveness of PF-PoFL.
△ Less
Submitted 29 October, 2022; v1 submitted 23 August, 2022;
originally announced August 2022.
-
An Efficient and Reliable Asynchronous Federated Learning Scheme for Smart Public Transportation
Authors:
Chenhao Xu,
Youyang Qu,
Tom H. Luan,
Peter W. Eklund,
Yong Xiang,
Longxiang Gao
Abstract:
Since the traffic conditions change over time, machine learning models that predict traffic flows must be updated continuously and efficiently in smart public transportation. Federated learning (FL) is a distributed machine learning scheme that allows buses to receive model updates without waiting for model training on the cloud. However, FL is vulnerable to poisoning or DDoS attacks since buses t…
▽ More
Since the traffic conditions change over time, machine learning models that predict traffic flows must be updated continuously and efficiently in smart public transportation. Federated learning (FL) is a distributed machine learning scheme that allows buses to receive model updates without waiting for model training on the cloud. However, FL is vulnerable to poisoning or DDoS attacks since buses travel in public. Some work introduces blockchain to improve reliability, but the additional latency from the consensus process reduces the efficiency of FL. Asynchronous Federated Learning (AFL) is a scheme that reduces the latency of aggregation to improve efficiency, but the learning performance is unstable due to unreasonably weighted local models. To address the above challenges, this paper offers a blockchain-based asynchronous federated learning scheme with a dynamic scaling factor (DBAFL). Specifically, the novel committee-based consensus algorithm for blockchain improves reliability at the lowest possible cost of time. Meanwhile, the devised dynamic scaling factor allows AFL to assign reasonable weights to stale local models. Extensive experiments conducted on heterogeneous devices validate outperformed learning performance, efficiency, and reliability of DBAFL.
△ Less
Submitted 26 December, 2022; v1 submitted 15 August, 2022;
originally announced August 2022.
-
Green Interference Based Symbiotic Security in Integrated Satellite-terrestrial Communications
Authors:
Zhisheng Yin,
Nan Cheng,
Tom H. Luan,
Yilong Hui,
Wei Wang
Abstract:
In this paper, we investigate secure transmissions in integrated satellite-terrestrial communications and the green interference based symbiotic security scheme is proposed. Particularly, the co-channel interference induced by the spectrum sharing between satellite and terrestrial networks and the inter-beam interference due to frequency reuse among satellite multi-beam serve as the green interfer…
▽ More
In this paper, we investigate secure transmissions in integrated satellite-terrestrial communications and the green interference based symbiotic security scheme is proposed. Particularly, the co-channel interference induced by the spectrum sharing between satellite and terrestrial networks and the inter-beam interference due to frequency reuse among satellite multi-beam serve as the green interference to assist the symbiotic secure transmission, where the secure transmissions of both satellite and terrestrial links are guaranteed simultaneously. Specifically, to realize the symbiotic security, we formulate a problem to maximize the sum secrecy rate of satellite users by cooperatively beamforming optimizing and a constraint of secrecy rate of each terrestrial user is guaranteed. Since the formulated problem is non-convex and intractable, the Taylor expansion and semi-definite relaxation (SDR) are adopted to further reformulate this problem, and the successive convex approximation (SCA) algorithm is designed to solve it. Finally, the tightness of the relaxation is proved. In addition, numerical results verify the efficiency of our proposed approach.
△ Less
Submitted 6 June, 2022;
originally announced June 2022.
-
Cybertwin-enabled 6G Space-air-ground Integrated Networks: Architecture, Open Issue, and Challenges
Authors:
Zhisheng Yin,
Tom H. Luan,
Nan Cheng,
Yilong Hui,
Wei Wang
Abstract:
Space-air-ground integrated network (SAGIN) is considered as a core requirement in emerging 6G networks, which integrates the terrestrial and non-terrestrial networks to reach the full network coverage and ubiquitous services. To envision the ubiquitous intelligence and the deep integration in 6G SAGIN, a paradigm of cybertwin-enabled 6G SAGIN is presented in this paper. Specifically, a cybertwin-…
▽ More
Space-air-ground integrated network (SAGIN) is considered as a core requirement in emerging 6G networks, which integrates the terrestrial and non-terrestrial networks to reach the full network coverage and ubiquitous services. To envision the ubiquitous intelligence and the deep integration in 6G SAGIN, a paradigm of cybertwin-enabled 6G SAGIN is presented in this paper. Specifically, a cybertwin-enabled SAGIN architecture is first presented, where a novel five-dimension digital twin (DT) model is presented. Particularly, three categories of critical technologies are presented based on the cybertwin of SAGIN, i.e., cybertwin-based multi-source heterogeneous network integration, cybertwin-based integrated cloud-edge-end, and cybertwin-based integrated sensing-communication-computing. Besides, two open issues in the cybertwin-enabled SAGIN are studied, i.e., the networking decision and optimization and the cybertwin-enabled cross-layer privacy and security, where the challenges are discussed and the potential solutions are directed. In addition, a case study with federal learning is developed and open research issues are discussed.
△ Less
Submitted 26 April, 2022;
originally announced April 2022.
-
Collaborative Driving: Learning- Aided Joint Topology Formulation and Beamforming
Authors:
Yao Zhang,
Changle Li,
Tom H. Luan,
Chau Yuen Yuchuan Fu
Abstract:
Currently, autonomous vehicles are able to drive more naturally based on the driving policies learned from millions of driving miles in real environments. However, to further improve the automation level of vehicles is a challenging task, especially in the case of multi-vehicle cooperation. In recent heated discussions of 6G, millimeter-wave (mmWave) and terahertz (THz) bands are deemed to play im…
▽ More
Currently, autonomous vehicles are able to drive more naturally based on the driving policies learned from millions of driving miles in real environments. However, to further improve the automation level of vehicles is a challenging task, especially in the case of multi-vehicle cooperation. In recent heated discussions of 6G, millimeter-wave (mmWave) and terahertz (THz) bands are deemed to play important roles in new radio communication architectures and algorithms. To enable reliable autonomous driving in 6G, in this paper, we envision collaborative autonomous driving, a new framework that jointly controls driving topology and formulate vehicular networks in the mmWave/THz bands. As a swarm intelligence system, the collaborative driving scheme goes beyond existing autonomous driving patterns based on single-vehicle intelligence in terms of safety and efficiency. With efficient data sharing, the proposed framework is able to achieve cooperative sensing and load balancing so that improve sensing efficiency with saved computational resources. To deal with the new challenges in the collaborative driving framework, we further illustrate two promising approaches for mmWave/THz-based vehicle-to-vehicle (V2V) communications. Finally, we discuss several potential open research problems for the proposed collaborative driving scheme.
△ Less
Submitted 18 March, 2022;
originally announced March 2022.
-
A Survey on Metaverse: Fundamentals, Security, and Privacy
Authors:
Yuntao Wang,
Zhou Su,
Ning Zhang,
Rui Xing,
Dongxiao Liu,
Tom H. Luan,
Xuemin Shen
Abstract:
Metaverse, as an evolving paradigm of the next-generation Internet, aims to build a fully immersive, hyper spatiotemporal, and self-sustaining virtual shared space for humans to play, work, and socialize. Driven by recent advances in emerging technologies such as extended reality, artificial intelligence, and blockchain, metaverse is stepping from science fiction to an upcoming reality. However, s…
▽ More
Metaverse, as an evolving paradigm of the next-generation Internet, aims to build a fully immersive, hyper spatiotemporal, and self-sustaining virtual shared space for humans to play, work, and socialize. Driven by recent advances in emerging technologies such as extended reality, artificial intelligence, and blockchain, metaverse is stepping from science fiction to an upcoming reality. However, severe privacy invasions and security breaches (inherited from underlying technologies or emerged in the new digital ecology) of metaverse can impede its wide deployment. At the same time, a series of fundamental challenges (e.g., scalability and interoperability) can arise in metaverse security provisioning owing to the intrinsic characteristics of metaverse, such as immersive realism, hyper spatiotemporality, sustainability, and heterogeneity. In this paper, we present a comprehensive survey of the fundamentals, security, and privacy of metaverse. Specifically, we first investigate a novel distributed metaverse architecture and its key characteristics with ternary-world interactions. Then, we discuss the security and privacy threats, present the critical challenges of metaverse systems, and review the state-of-the-art countermeasures. Finally, we draw open research directions for building future metaverse systems.
△ Less
Submitted 8 September, 2022; v1 submitted 5 March, 2022;
originally announced March 2022.
-
Learning Based Task Offloading in Digital Twin Empowered Internet of Vehicles
Authors:
Jinkai Zheng,
Tom H. Luan,
Longxiang Gao,
Yao Zhang,
Yuan Wu
Abstract:
Mobile edge computing has become an effective and fundamental paradigm for futuristic autonomous vehicles to offload computing tasks. However, due to the high mobility of vehicles, the dynamics of the wireless conditions, and the uncertainty of the arrival computing tasks, it is difficult for a single vehicle to determine the optimal offloading strategy. In this paper, we propose a Digital Twin (D…
▽ More
Mobile edge computing has become an effective and fundamental paradigm for futuristic autonomous vehicles to offload computing tasks. However, due to the high mobility of vehicles, the dynamics of the wireless conditions, and the uncertainty of the arrival computing tasks, it is difficult for a single vehicle to determine the optimal offloading strategy. In this paper, we propose a Digital Twin (DT) empowered task offloading framework for Internet of Vehicles. As a software agent residing in the cloud, a DT can obtain both global network information by using communications among DTs, and historical information of a vehicle by using the communications within the twin. The global network information and historical vehicular information can significantly facilitate the offloading. In specific, to preserve the precious computing resource at different levels for most appropriate computing tasks, we integrate a learning scheme based on the prediction of futuristic computing tasks in DT. Accordingly, we model the offloading scheduling process as a Markov Decision Process (MDP) to minimize the long-term cost in terms of a trade off between task latency, energy consumption, and renting cost of clouds. Simulation results demonstrate that our algorithm can effectively find the optimal offloading strategy, as well as achieve the fast convergence speed and high performance, compared with other existing approaches.
△ Less
Submitted 28 December, 2021;
originally announced January 2022.
-
Autonomous Vehicular Networks: Perspective and Open Issues
Authors:
Tom H. Luan,
Yao Zhang,
Lin Cai,
Yilong Hui,
Changle Li,
Nan Cheng
Abstract:
The vehicular ad hoc networks (VANETs) have been researched for over twenty years. Although being a fundamental communication approach for vehicles, the conventional VANETs are challenged by the newly emerged autonomous vehicles (AVs) which introduce new features and challenges on communications. In the meantime, with the recent advances of artificial intelligence and 5G cellular networks, how sho…
▽ More
The vehicular ad hoc networks (VANETs) have been researched for over twenty years. Although being a fundamental communication approach for vehicles, the conventional VANETs are challenged by the newly emerged autonomous vehicles (AVs) which introduce new features and challenges on communications. In the meantime, with the recent advances of artificial intelligence and 5G cellular networks, how should the fundamental framework of VANET evolve to utilize the new technologies? In this article, we reconsider the problem of vehicle-to-vehicle communications when the network is composed of AVs. We discuss the features and specific demands of AVs and how the conventional VANETs should adapt to fit them.
△ Less
Submitted 2 December, 2021;
originally announced December 2021.
-
Futuristic Intelligent Transportation System
Authors:
Yilong Hui,
Zhou Su,
Tom H. Luan,
Nan Cheng
Abstract:
The emerging autonomous vehicles (AVs) will inevitably revolutionize the transportation systems. This is because of a key feature of AVs; instead of being managed by human drivers as the conventional vehicles, AVs are of the complete capability to manage the driving by themselves. As a result, the futuristic intelligent transportation system (FITS) can be a centrally managed and optimized system w…
▽ More
The emerging autonomous vehicles (AVs) will inevitably revolutionize the transportation systems. This is because of a key feature of AVs; instead of being managed by human drivers as the conventional vehicles, AVs are of the complete capability to manage the driving by themselves. As a result, the futuristic intelligent transportation system (FITS) can be a centrally managed and optimized system with the fully coordinated driving of vehicles, which is impossible by the current transportation systems controlled by humans. In this article, we envision the operation of such FITS when AVs, advanced vehicular networks (VANETs) and artificial intelligence (AI) are adopted. Specifically, we first develop the autonomous vehicular networks (AVNs) based on the advanced development of AVs and heterogeneous vehicular communication technologies to achieve global data collection and real-time data sharing. With this network architecture, we then integrate AVNs and AI based on the intelligent digital twin (IDT) to design the FITS with the target of setting up an accurate and efficient global traffic scheduling system. After that, compared with the conventional schemes, a customized path planning case is studied to evaluate the performance of the proposed FITS. Finally, we highlight the emerging issues related to the FITS for future research.
△ Less
Submitted 19 May, 2021;
originally announced May 2021.
-
The Paradigm of Digital Twin Communications
Authors:
Tom H. Luan,
Ruhan Liu,
Longxiang Gao,
Rui Li,
Haibo Zhou
Abstract:
With the fast evolving of cloud computing and artificial intelligence (AI), the concept of digital twin (DT) has recently been proposed and finds broad applications in industrial Internet, IoT, smart city, etc. The DT builds a mirror integrated multi-physics of the physical system in the digital space. By doing so, the DT can utilize the rich computing power and AI at the cloud to operate on the m…
▽ More
With the fast evolving of cloud computing and artificial intelligence (AI), the concept of digital twin (DT) has recently been proposed and finds broad applications in industrial Internet, IoT, smart city, etc. The DT builds a mirror integrated multi-physics of the physical system in the digital space. By doing so, the DT can utilize the rich computing power and AI at the cloud to operate on the mirror physical system, and accordingly provides feedbacks to help the real-world physical system in their practical task completion. The existing literature mainly considers DT as a simulation/emulation approach, whereas the communication framework for DT has not been clearly defined and discussed. In this article, we describe the basic DT communication models and present the open research issues. By combining wireless communications, artificial intelligence (AI) and cloud computing, we show that the DT communication provides a novel framework for futuristic mobile agent systems.
△ Less
Submitted 15 May, 2021;
originally announced May 2021.
-
Eliminating the Barriers: Demystifying Wi-Fi Baseband Design and Introducing the PicoScenes Wi-Fi Sensing Platform
Authors:
Zhiping Jiang,
Tom H. Luan,
Xincheng Ren,
Dongtao Lv,
Han Hao,
Jing Wang,
Kun Zhao,
Wei Xi,
Yueshen Xu,
Rui Li
Abstract:
The research on Wi-Fi sensing has been thriving over the past decade but the process has not been smooth. Three barriers always hamper the research: unknown baseband design and its influence, inadequate hardware, and the lack of versatile and flexible measurement software. This paper tries to eliminate these barriers through the following work. First, we present an in-depth study of the baseband d…
▽ More
The research on Wi-Fi sensing has been thriving over the past decade but the process has not been smooth. Three barriers always hamper the research: unknown baseband design and its influence, inadequate hardware, and the lack of versatile and flexible measurement software. This paper tries to eliminate these barriers through the following work. First, we present an in-depth study of the baseband design of the Qualcomm Atheros AR9300 (QCA9300) NIC. We identify a missing item of the existing CSI model, namely, the CSI distortion, and identify the baseband filter as its origin. We also propose a distortion removal method. Second, we reintroduce both the QCA9300 and software-defined radio (SDR) as powerful hardware for research. For the QCA9300, we unlock the arbitrary tuning of both the carrier frequency and bandwidth. For SDR, we develop a high?performance software implementation of the 802.11a/g/n/ac/ax baseband, allowing users to fully control the baseband and access the complete physical-layer information. Third, we release the PicoScenes software, which supports concurrent CSI measure?ment from multiple QCA9300, Intel Wireless Link (IWL5300) and SDR hardware. PicoScenes features rich low-level controls, packet injection and software baseband implementation. It also allows users to develop their own measurement plugins. Finally, we report state-of-the-art results in the extensive evaluations of the PicoScenes system, such as the >2 GHz available spectrum on the QCA9300, concurrent CSI measurement, and up to 40 kHz and 1 kHz CSI measurement rates achieved by the QCA9300 and SDR. PicoScenes is available at https://ps.zpj.io.
△ Less
Submitted 11 August, 2021; v1 submitted 20 October, 2020;
originally announced October 2020.
-
A Mobility-Aware Vehicular Caching Scheme in Content Centric Networks: Model and Optimization
Authors:
Yao Zhang,
Changle Li,
Tom H. Luan,
Yuchuan Fu,
Weisong Shi,
Lina Zhu
Abstract:
Edge caching is being explored as a promising technology to alleviate the network burden of cellular networks by separating the computing functionalities away from cellular base stations. However, the service capability of existing caching scheme is limited by fixed edge infrastructure when facing the uncertainties of users' requests and locations. The vehicular caching, which uses the moving vehi…
▽ More
Edge caching is being explored as a promising technology to alleviate the network burden of cellular networks by separating the computing functionalities away from cellular base stations. However, the service capability of existing caching scheme is limited by fixed edge infrastructure when facing the uncertainties of users' requests and locations. The vehicular caching, which uses the moving vehicles as cache carriers, is regard as an efficient method to solve the problem above. This paper studies the effectiveness of vehicular caching scheme in content centric networks by developing optimization model towards the minimization of network energy consumption. Particularly, we model the interactions between caching vehicles and mobile users as a 2-D Markov process, in order to characterize the network availability of mobile users. Based on the developed model, we propose an online vehicular caching design by optimizing network energy efficiency. Specifically, the problem of caching decision making is firstly formulated as a fractional optimization model, towards the optimal energy efficiency. Using nonlinear fractional programming technology and Lyapunov optimization theory, we derive the theoretical solution for the optimization model. An online caching algorithm to enable the optimal vehicular caching is developed based on the solution. Finally, extensive simulations are conducted to examine the performance of our proposal. By comparison, our online caching scheme outperforms the existing scheme in terms of energy efficiency, hit ratio, cache utilization, and system gain.
△ Less
Submitted 19 February, 2019;
originally announced February 2019.
-
Building Transmission Backbone for Highway Vehicular Networks: Framework and Analysis
Authors:
Changle Li,
Yao Zhang,
Tom H. Luan,
Yuchuan Fu
Abstract:
The highway vehicular ad hoc networks, where vehicles are wirelessly inter-connected, rely on the multi-hop transmissions for end-to-end communications. This, however, is severely challenged by the unreliable wireless connections, signal attenuation and channel contentions in the dynamic vehicular environment. To overcome the network dynamics, selecting appropriate relays for end-to-end connection…
▽ More
The highway vehicular ad hoc networks, where vehicles are wirelessly inter-connected, rely on the multi-hop transmissions for end-to-end communications. This, however, is severely challenged by the unreliable wireless connections, signal attenuation and channel contentions in the dynamic vehicular environment. To overcome the network dynamics, selecting appropriate relays for end-to-end connections is important. Different from the previous efforts (\emph{e.g.}, clustering and cooperative downloading), this paper explores the existence of stable vehicles and propose building a stable multi-hop transmission backbone network in the highway vehicular ad hoc network. Our work is composed of three parts. Firstly, by analyzing the real-world vehicle traffic traces, we observe that the large-size vehicles, \emph{e.g.}, trucks, are typically stable with low variations of mobility and stable channel condition of low signal attenuation; this makes their inter-connections stable in both connection time and transmission rate. Secondly, by exploring the stable vehicles, we propose a distributed protocol to build a multi-hop backbone link for end-to-end transmissions, accordingly forming a two-tier network architecture in highway vehicular ad hoc networks. Lastly, to show the resulting data performance, we develop a queueing analysis model to evaluate the end-to-end transmission delay and throughput.
Using extensive simulations, we show that the proposed transmission backbone can significantly improve the reliability of multi-hop data transmissions with higher throughput, less transmission interruptions and end-to-end delay.
△ Less
Submitted 5 July, 2018;
originally announced July 2018.
-
Optimal Base Station Antenna Downtilt in Downlink Cellular Networks
Authors:
Junnan Yang,
Ming Ding,
Guoqiang Mao,
Zihuai Lin,
De-gan Zhang,
Tom Hao Luan
Abstract:
From very recent studies, the area spectral efficiency (ASE) performance of downlink (DL) cellular networks will continuously decrease and finally to zero with the network densification in a fully loaded ultra-dense network (UDN) when the absolute height difference between a base station (BS) antenna and a user equipment (UE) antenna is larger than zero, which is referred as the ASE Crash. We revi…
▽ More
From very recent studies, the area spectral efficiency (ASE) performance of downlink (DL) cellular networks will continuously decrease and finally to zero with the network densification in a fully loaded ultra-dense network (UDN) when the absolute height difference between a base station (BS) antenna and a user equipment (UE) antenna is larger than zero, which is referred as the ASE Crash. We revisit this issue by considering the impact of the BS antenna downtilt on the downlink network capacity. In general, there exists a height difference between a BS and a UE in practical networks. It is common to utilize antenna downtilt to adjust the direction of the vertical antenna pattern, and thus increase received signal power or reduce inter-cell interference power to improve network performance. This paper focuses on investigating the relationship between the base station antenna downtilt and the downlink network capacity in terms of the coverage probability and the ASE. The analytical results of the coverage probability and the ASE are derived, and we find that there exists an optimal antenna downtilt to achieve the maximal coverage probability for each base station density. Moreover, we derive numerically solvable expressions for the optimal antenna downtilt, which is a function of the base station density. Our theoretical and numerical results show that after applying the optimal antenna downtilt, the network performance can be improved significantly. Specifically, with the optimal antenna downtilt, the ASE crash can be delayed by nearly one order of magnitude in terms of the base station density.
△ Less
Submitted 21 February, 2018;
originally announced February 2018.
-
Connected Vehicular Transportation: Data Analytics and Traffic-dependent Networking
Authors:
Cailian Chen,
Tom Hao Luan,
Xinping Guan,
Ning Lu,
Yunshu Liu
Abstract:
With onboard operating systems becoming increasingly common in vehicles, the real-time broadband infotainment and Intelligent Transportation System (ITS) service applications in fast-motion vehicles become ever demanding, which are highly expected to significantly improve the efficiency and safety of our daily on-road lives. The emerging ITS and vehicular applications, e.g., trip planning, however…
▽ More
With onboard operating systems becoming increasingly common in vehicles, the real-time broadband infotainment and Intelligent Transportation System (ITS) service applications in fast-motion vehicles become ever demanding, which are highly expected to significantly improve the efficiency and safety of our daily on-road lives. The emerging ITS and vehicular applications, e.g., trip planning, however, require substantial efforts on the real-time pervasive information collection and big data processing so as to provide quick decision making and feedbacks to the fast moving vehicles, which thus impose the significant challenges on the development of an efficient vehicular communication platform. In this article, we present TrasoNET, an integrated network framework to provide realtime intelligent transportation services to connected vehicles by exploring the data analytics and networking techniques. TrasoNET is built upon two key components. The first one guides vehicles to the appropriate access networks by exploring the information of realtime traffic status, specific user preferences, service applications and network conditions. The second component mainly involves a distributed automatic access engine, which enables individual vehicles to make distributed access decisions based on access recommender, local observation and historic information. We showcase the application of TrasoNET in a case study on real-time traffic sensing based on real traces of taxis.
△ Less
Submitted 26 April, 2017;
originally announced April 2017.
-
CFT: A Cluster-based File Transfer Scheme for Highway
Authors:
Quyuan Luo,
Changle Li,
Qiang Ye,
Tom H. Luan,
Lina Zhu,
Xiaolei Han
Abstract:
Effective file transfer between vehicles is fundamental to many emerging vehicular infotainment applications in the highway Vehicular Ad Hoc Networks (VANETs), such as content distribution and social networking. However, due to fast mobility, the connection between vehicles tends to be short-lived and lossy, which makes intact file transfer extremely challenging. To tackle this problem, we present…
▽ More
Effective file transfer between vehicles is fundamental to many emerging vehicular infotainment applications in the highway Vehicular Ad Hoc Networks (VANETs), such as content distribution and social networking. However, due to fast mobility, the connection between vehicles tends to be short-lived and lossy, which makes intact file transfer extremely challenging. To tackle this problem, we presents a novel Cluster-based File Transfer (CFT) scheme for highway VANETs in this paper. With CFT, when a vehicle requests a file, the transmission capacity between the resource vehicle and the destination vehicle is evaluated. If the requested file can be successfully transferred over the direct Vehicular-to-Vehicular (V2V) connection, the file transfer will be completed by the resource and the destination themselves. Otherwise, a cluster will be formed to help the file transfer. As a fully-distributed scheme that relies on the collaboration of cluster members, CFT does not require any assistance from roadside units or access points. Our experimental results indicate that CFT outperforms the existing file transfer schemes for highway VANETs.
△ Less
Submitted 8 January, 2017;
originally announced January 2017.
-
See the Near Future: A Short-Term Predictive Methodology to Traffic Load in ITS
Authors:
Xun Zhou,
Changle Li,
Zhe Liu,
Tom H. Luan,
Zhifang Miao,
Lina Zhu,
Lei Xiong
Abstract:
The Intelligent Transportation System (ITS) targets to a coordinated traffic system by applying the advanced wireless communication technologies for road traffic scheduling. Towards an accurate road traffic control, the short-term traffic forecasting to predict the road traffic at the particular site in a short period is often useful and important. In existing works, Seasonal Autoregressive Integr…
▽ More
The Intelligent Transportation System (ITS) targets to a coordinated traffic system by applying the advanced wireless communication technologies for road traffic scheduling. Towards an accurate road traffic control, the short-term traffic forecasting to predict the road traffic at the particular site in a short period is often useful and important. In existing works, Seasonal Autoregressive Integrated Moving Average (SARIMA) model is a popular approach. The scheme however encounters two challenges: 1) the analysis on related data is insufficient whereas some important features of data may be neglected; and 2) with data presenting different features, it is unlikely to have one predictive model that can fit all situations. To tackle above issues, in this work, we develop a hybrid model to improve accuracy of SARIMA. In specific, we first explore the autocorrelation and distribution features existed in traffic flow to revise structure of the time series model. Based on the Gaussian distribution of traffic flow, a hybrid model with a Bayesian learning algorithm is developed which can effectively expand the application scenarios of SARIMA. We show the efficiency and accuracy of our proposal using both analysis and experimental studies. Using the real-world trace data, we show that the proposed predicting approach can achieve satisfactory performance in practice.
△ Less
Submitted 8 January, 2017;
originally announced January 2017.
-
Urban Rail Transit System Operation Optimization A Game Theoretical Methodology
Authors:
Jiao Ma,
Changle Li,
Weiwei Dong,
Zhe Liu,
Tom H. Luan,
Lina Zhu,
Lei Xiong
Abstract:
The Urban Rail Transit (URT) has been one of the major trip modes in cities worldwide. As the passengers arrive at variable rates in different time slots, e.g., rush and non-rush hours, the departure frequency at a site directly relates to perceived service quality of passengers; the high departure frequency, however, incurs more operation cost to URT. Therefore, a tradeoff between the interest of…
▽ More
The Urban Rail Transit (URT) has been one of the major trip modes in cities worldwide. As the passengers arrive at variable rates in different time slots, e.g., rush and non-rush hours, the departure frequency at a site directly relates to perceived service quality of passengers; the high departure frequency, however, incurs more operation cost to URT. Therefore, a tradeoff between the interest of railway operator and the service quality of passengers needs to be addressed. In this paper, we develop a model on the operation method of train operation scheduling using a Stackelberg game model. The railway operator is modeled as the game leader and the passengers as the game follower, and an optimal departure frequency can be determine the tradeoff between passengers' service quality and operation cost. We present several numerical examples based on the operation data from Nanjing transit subway at China. The results demonstrate that the proposed model can significantly improve the traffic efficiency.
△ Less
Submitted 7 January, 2017;
originally announced January 2017.
-
A View of Fog Computing from Networking Perspective
Authors:
Tom H. Luan,
Longxiang Gao,
Zhi Li,
Yang Xiang,
Guiyi We,
Limin Sun
Abstract:
With smart devices, particular smartphones, becoming our everyday companions, the ubiquitous mobile Internet and computing applications pervade people's daily lives. With the surge demand on high-quality mobile services at anywhere, how to address the ubiquitous user demand and accommodate the explosive growth of mobile traffics is the key issue of the next generation mobile networks. The Fog comp…
▽ More
With smart devices, particular smartphones, becoming our everyday companions, the ubiquitous mobile Internet and computing applications pervade people's daily lives. With the surge demand on high-quality mobile services at anywhere, how to address the ubiquitous user demand and accommodate the explosive growth of mobile traffics is the key issue of the next generation mobile networks. The Fog computing is a promising solution towards this goal. Fog computing extends cloud computing by providing virtualized resources and engaged location-based services to the edge of the mobile networks so as to better serve mobile traffics. Therefore, Fog computing is a lubricant of the combination of cloud computing and mobile applications. In this article, we outline the main features of Fog computing and describe its concept, architecture and design goals. Lastly, we discuss some of the future research issues from the networking perspective.
△ Less
Submitted 7 March, 2016; v1 submitted 3 February, 2016;
originally announced February 2016.
-
Fog Computing: Focusing on Mobile Users at the Edge
Authors:
Tom H. Luan,
Longxiang Gao,
Zhi Li,
Yang Xiang,
Guiyi Wei,
Limin Sun
Abstract:
With smart devices, particular smartphones, becoming our everyday companions, the ubiquitous mobile Internet and computing applications pervade people daily lives. With the surge demand on high-quality mobile services at anywhere, how to address the ubiquitous user demand and accommodate the explosive growth of mobile traffics is the key issue of the next generation mobile networks. The Fog comput…
▽ More
With smart devices, particular smartphones, becoming our everyday companions, the ubiquitous mobile Internet and computing applications pervade people daily lives. With the surge demand on high-quality mobile services at anywhere, how to address the ubiquitous user demand and accommodate the explosive growth of mobile traffics is the key issue of the next generation mobile networks. The Fog computing is a promising solution towards this goal. Fog computing extends cloud computing by providing virtualized resources and engaged location-based services to the edge of the mobile networks so as to better serve mobile traffics. Therefore, Fog computing is a lubricant of the combination of cloud computing and mobile applications. In this article, we outline the main features of Fog computing and describe its concept, architecture and design goals. Lastly, we discuss some of the future research issues from the networking perspective.
△ Less
Submitted 29 March, 2016; v1 submitted 6 February, 2015;
originally announced February 2015.