Kai Li;Yilei Liang;Xin Yuan;Wei Ni;Jon Crowcroft;Chau Yuen;Ozgur B. Akan
{"title":"A Novel Framework of Horizontal-Vertical Hybrid Federated Learning for EdgeIoT","authors":"Kai Li;Yilei Liang;Xin Yuan;Wei Ni;Jon Crowcroft;Chau Yuen;Ozgur B. Akan","doi":"10.1109/LNET.2025.3540268","DOIUrl":"https://doi.org/10.1109/LNET.2025.3540268","url":null,"abstract":"This letter puts forth a new hybrid horizontal-vertical federated learning (HoVeFL) for mobile edge computing-enabled Internet of Things (EdgeIoT). In this framework, certain EdgeIoT devices train local models using the same data samples but analyze disparate data features, while the others focus on the same features using non-independent and identically distributed (non-IID) data samples. Thus, even though the data features are consistent, the data samples vary across devices. The proposed HoVeFL formulates the training of local and global models to minimize the global loss function. Performance evaluations on CIFAR-10 and SVHN datasets reveal that the testing loss of HoVeFL with 12 horizontal FL devices and six vertical FL devices is 5.5% and 25.2% higher, respectively, compared to a setup with six horizontal FL devices and 12 vertical FL devices.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 2","pages":"83-87"},"PeriodicalIF":0.0,"publicationDate":"2025-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AoI-Aware and Privacy Protection Incentive Mechanism for Crowdsensing Networks","authors":"Xuying Zhou;Jingyi Xu;Wenqian Zhou;Dusit Niyato;Chau Yuen","doi":"10.1109/LNET.2025.3538172","DOIUrl":"https://doi.org/10.1109/LNET.2025.3538172","url":null,"abstract":"In Crowdsensing Networks, the freshness of sensing data is critical for accurate analysis and reliable decisions, which is measured by Age of Information (AoI). However, the Sensing Users (SUs) are reluctant to execute frequent sensing without any incentive, since they incur not only the inevitable energy consumption but also the potential privacy leakage. Adopting Differential Privacy (DP) can effectively protect the privacy of SUs, through it reduces the AoI performance. To address this issue, we propose a freshness-aware privacy-preserving incentive mechanism to balance the trade-off between data value and privacy. SUs are classified with different update cycles, while the Sensing Platform (SP) is unknown about the information. Therefore, we design a contract to solve the information asymmetry problem, which is proved to be optimal and truth-telling. Finally, numerical results demonstrate that the proposed contract is feasible and achieves a utility for the SP when compared with other mechanisms.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 2","pages":"98-102"},"PeriodicalIF":0.0,"publicationDate":"2025-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fairness-Aware Demodulator Allocation in LoRa Multi-Gateway Networks","authors":"Alexandre Guitton;Megumi Kaneko","doi":"10.1109/LNET.2025.3532765","DOIUrl":"https://doi.org/10.1109/LNET.2025.3532765","url":null,"abstract":"The literature has shown the drastic decrease of the achievable LoRa network throughput, due to the limited number of demodulators that are supported by LoRaWAN gateways. Unlike existing approaches, in this letter, we design fairness-aware algorithms under this stringent constraint. By taking the efficient demodulation time ratio as a fairness metric, our algorithms enable to prioritize frames with larger spreading factors, while increasing the total demodulation time thanks to collaboration among gateways. Numerical results demonstrate that our proposed methods largely outperform LoRaWAN baselines, while closely approaching their performance upper bounds.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 2","pages":"93-97"},"PeriodicalIF":0.0,"publicationDate":"2025-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Regret-Optimal Online Caching","authors":"Amrit Rao;Joel Anto Paul;Sharayu Moharir;Nikhil Karamchandani","doi":"10.1109/LNET.2025.3529461","DOIUrl":"https://doi.org/10.1109/LNET.2025.3529461","url":null,"abstract":"We focus on the online caching problem with a catalog of N equal-sized files and a cache that can store up to K files at a time. We consider a time-slotted system with the cache receiving one request per slot. We consider two types of request arrival processes: stochastic arrivals, where requests are generated by an i.i.d. process with an unknown distribution, and adversarial arrivals where we make no structural assumptions on the arrival process. We use regret as the performance metric to evaluate caching policies. It is known that Follow the Perturbed Leader (FTPL) has order-optimal regret performance for both stochastic and adversarial arrivals. A key limitation of FTPL is its <inline-formula> <tex-math>${mathcal {O}}{(N)}$ </tex-math></inline-formula> computational complexity, which can be prohibitively large for applications with huge catalogs. To address this, we propose a novel variant of FTPL and show that it has the same regret performance at a significantly lower computational complexity of <inline-formula> <tex-math>${mathcal {O}}{(K)}$ </tex-math></inline-formula>. We supplement our analytical results with simulations using synthetic and trace-based arrivals.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 2","pages":"145-149"},"PeriodicalIF":0.0,"publicationDate":"2025-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"When to Reach for the Skies? A DRL-Based Routing Framework for Non-Terrestrial Networks","authors":"Akanksha Sharma;Sharda Tripathi;Sandeep Joshi","doi":"10.1109/LNET.2025.3529514","DOIUrl":"https://doi.org/10.1109/LNET.2025.3529514","url":null,"abstract":"Non-terrestrial networks are envisioned to be an integral component of the beyond-fifth-generation wireless communication networks, catering to both conventional and emerging communication applications. In particular, a plethora of use cases are emerging for ultra-reliable low-latency communication, which require dynamic and quality of service compliant frameworks. In this letter, we formulate a binary integer non-linear programming problem to route time-critical traffic through non-terrestrial nodes. As the problem is NP-hard, we propose the solution using a deep reinforcement learning framework, taking into account the interactions between the terrestrial and various non-terrestrial nodes with an end-to-end latency target while maximizing the coverage probability. We perform simulations for multiple latency deadlines and outage thresholds and the results corroborate the efficiency of the proposed framework. Furthermore, we benchmark the proposed framework and show an improvement of 96.31% in coverage while incurring only 3.2% latency violations compared to the state-of-the-art.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 1","pages":"16-20"},"PeriodicalIF":0.0,"publicationDate":"2025-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10841394","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Salim El Ghalbzouri;Karim Boutiba;Adlen Ksentini;Mustapha Benjillali
{"title":"Neural-Driven Control of RIS in 6G Networks: A GoSimRIS and xApp-Based Framework","authors":"Salim El Ghalbzouri;Karim Boutiba;Adlen Ksentini;Mustapha Benjillali","doi":"10.1109/LNET.2025.3527683","DOIUrl":"https://doi.org/10.1109/LNET.2025.3527683","url":null,"abstract":"In this letter, we propose an O-RAN-based framework for reconfigurable Intelligent Surfaces (RIS) control in 6G. The key objective is to enable the development of RIS control algorithms as xApps running at the real-time intelligent controller (RIC) of Open RAN (O-RAN). To validate the proposed framework, we developed a Golang-based RIS simulator, GoSimRIS, intended to mimic and examine RIS behavior in various environmental scenarios. The simulator is linked with the RIC via a specialized Service Model (SM) devised in this letter, namely E2SM RIS, which allows the design of xApps that dynamically optimize RIS coefficients by computing the ideal phase shifts and applying them in real-time to maximize network performance using channel information that is retrieved from the GoSimRIS environment. Finally, we introduce an ML-based RIS control mechanism that runs as an xApp using only the positions of the transmitter (Tx) and receiver (Rx) and the presence of Line-of-Sight (LOS) conditions, which corresponds to a realistic indoor scenario in 6G such industry 4.0","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2025-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Seyed Mohammad Azimi-Abarghouyi;Nicola Bastianello;Karl H. Johansson;Viktoria Fodor
{"title":"Hierarchical Federated ADMM","authors":"Seyed Mohammad Azimi-Abarghouyi;Nicola Bastianello;Karl H. Johansson;Viktoria Fodor","doi":"10.1109/LNET.2025.3527161","DOIUrl":"https://doi.org/10.1109/LNET.2025.3527161","url":null,"abstract":"In this letter, we depart from the widely-used gradient descent-based hierarchical federated learning (FL) algorithms to develop a novel hierarchical FL framework based on the alternating direction method of multipliers (ADMM), leveraging a network architecture consisting of a single cloud server and multiple edge servers, where each edge server is dedicated to a specific client set. Within this framework, we propose two novel FL algorithms, which both use ADMM in the top layer: one that employs ADMM in the lower layer and another that uses the conventional gradient descent-based approach. The proposed framework enhances privacy, and experiments demonstrate the superiority of the proposed algorithms compared to the conventional algorithms in terms of learning convergence and accuracy. Additionally, gradient descent on the lower layer performs well even if the number of local steps is very limited, while ADMM on both layers lead to better performance otherwise.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 1","pages":"11-15"},"PeriodicalIF":0.0,"publicationDate":"2025-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10833716","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SGMFuzz: State Guided Mutation Protocol Fuzzing","authors":"Zhenyu Wen;Jianfeng Yu;Zening Huang;Yiming Wu;Zhen Hong;Rajiv Ranjan","doi":"10.1109/LNET.2025.3526776","DOIUrl":"https://doi.org/10.1109/LNET.2025.3526776","url":null,"abstract":"Protocol implementations are fundamental components in network communication systems, and their security is crucial to the overall system. Fuzzing is one of the most popular techniques for detecting vulnerabilities and has been widely applied to the security evaluation of protocol implementations. However, due to the lack of machine-understandable prior knowledge and effective state-guided strategies, existing protocol fuzzing tools tailored for stateful network protocol implementations often suffer from shallow state coverage and generate numerous invalid test cases, thereby impacting the effectiveness of the testing process. In this letter, we introduce SGMFuzz, a grey-box fuzzing tool that combines a state-guided mutation mechanism to detect security vulnerabilities in protocol implementations. SGMFuzz uses the feedback collected during fuzzing to construct a finite-state machine, which aids in a deeper exploration of the program. Additionally, we design a message-aware module to enhance the tool’s ability to generate valid test cases. Our evaluation demonstrates that, compared to the most advanced and widely used network protocol fuzzing tools, SGMFuzz increases the number of discovered execution paths by over 15% on average and improves state transition coverage by over 10%, providing a more comprehensive security assessment of protocol implementations.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 1","pages":"71-75"},"PeriodicalIF":0.0,"publicationDate":"2025-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}