Engin Zeydan;Luis Blanco;Josep Mangues-Bafalluy;Suayb S. Arslan;Yekta Turk
{"title":"Post-Quantum Blockchain-Based Decentralized Identity Management for Resource Sharing in Open Radio Access Networks","authors":"Engin Zeydan;Luis Blanco;Josep Mangues-Bafalluy;Suayb S. Arslan;Yekta Turk","doi":"10.1109/TGCN.2024.3432689","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3432689","url":null,"abstract":"Blockchain Network (BCN)-based Self-Sovereign Identity (SSI) has recently surfaced as an identity and access management framework that allows users and organizations to control over their data. On the other hand, Open Radio Access Networks (O-RANs) propose a framework for facilitating the exchange of infrastructure-related data. This study presents the critical role of BCN-SSI in the O-RAN system architecture and promises an authentication process to provide insights into the robust security measures used to seamlessly establish the identification of users and entities within the O-RAN ecosystem in the post-quantum era. We show that the integration of BCN-SSI enhances security protocols and ensures the integrity of communication networks in the evolving technological landscape. As an illustrative use case, spectrum sharing, is also presented to demonstrate the practicality and the impact of the proposed framework. Furthermore, we address the potential threats posed by quantum attacks on BCN-based SSI systems by investigating Post-Quantum Cryptography (PQC). Simulation results confirm the effectiveness of the proposed BCN-based DIM and highlight its role in securing identity management processes within the O-RAN context. Finally, we address the use of efficient computational techniques in the context of PQC, which holds significant potential in terms of reducing energy consumption overall.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"8 3","pages":"895-909"},"PeriodicalIF":5.3,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142091077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QACM: QoS-Aware xApp Conflict Mitigation in Open RAN","authors":"Abdul Wadud;Fatemeh Golpayegani;Nima Afraz","doi":"10.1109/TGCN.2024.3431945","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3431945","url":null,"abstract":"The advent of Open Radio Access Network (RAN) has revolutionized the field of RAN by introducing elements of native support of intelligence and openness into the next generation of mobile network infrastructure. Open RAN paves the way for standardized interfaces and enables the integration of network applications from diverse vendors, thereby enhancing network management flexibility. However, control decision conflicts occur when components from different vendors are deployed together. This article provides an overview of various types of conflicts that may occur in Open RAN, with a particular focus on intra-component conflict mitigation among Extended Applications (xApps) in the Near Real Time RAN Intelligent Controller (Near-RT-RIC). A QoS-Aware Conflict Mitigation (QACM) method is proposed that finds the optimal configuration of conflicting parameters while maximizing the number of xApps that have their Quality of Service (QoS) requirements met. We compare the performance of the proposed QACM method with two benchmark methods for priority and non-priority cases. The results indicate that our proposed method is the most effective in maintaining QoS requirements for conflicting xApps.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"8 3","pages":"978-993"},"PeriodicalIF":5.3,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10608140","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NetDP: In-Network Differential Privacy for Large-Scale Data Processing","authors":"Zhengyan Zhou;Hanze Chen;Lingfei Chen;Dong Zhang;Chunming Wu;Xuan Liu;Muhammad Khurram Khan","doi":"10.1109/TGCN.2024.3432781","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3432781","url":null,"abstract":"Radio access network (RAN) enables large-scale collection of sensitive data. Privacy-preserving techniques aim to learn knowledge from sensitive data to improve services without compromising privacy. However, as the data scale increases, enforcing privacy-preserving techniques on sensitive data may consume a considerable amount of system resources and impose performance penalties. To reduce system resource consumption, we present NetDP, an in-network architecture for privacy-preserving techniques by leveraging programmable switches to improve resource efficiency (i.e., CPU cycles, network bandwidth, and privacy budgets). The key idea of NetDP is to accommodate and exploit cryptographic operators to reduce resource consumption rather than repetitively and exhaustively suppressing the impact of these techniques. To the best of our knowledge, this is the first time that privacy-preserving techniques in a large-scale data processing system have been enforced on programmable switches. Our experiments based on Tofino switches indicate that NetDP significantly reduces computation latency (e.g., 40.2%-55.8% latency in computations) without impacting fidelity.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"8 3","pages":"1076-1089"},"PeriodicalIF":5.3,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Renewable Energy Powered and Open RAN-Based Architecture for 5G Fixed Wireless Access Provisioning in Rural Areas","authors":"Anselme Ndikumana;Kim Khoa Nguyen;Mohamed Cheriet","doi":"10.1109/TGCN.2024.3431989","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3431989","url":null,"abstract":"Due to the high costs of optical fiber deployment in Low-Density and Rural Areas (LDRAs), 5G Fixed Wireless Access (5G FWA) recently emerged as an affordable solution. A widely adopted deployment scenario of 5G FWA includes edge cloud that supports computing services and Radio Access Network (RAN) functions. Such edge cloud requires network and energy resources for 5G FWA. This paper proposes renewable energy powered and Open RAN-based architecture for 5G FWA serving LDRAs using three-level closed-loops. Open RAN is a new 5G RAN architecture allowing Open Central Unit and Open Distributed Unit to be distributed in virtualized environment. The first closed-loop distributes radio resources to Open RAN instances and slices at the edge cloud. The second closed-loop allocates radio resources to houses. We design a new energy model that leverages renewable energy. We jointly optimize radio and energy resource allocation in closed-loop 3. We formulate ultra-small and small-time scale optimization problems that link closed-loops to maximize communication utility while minimizing energy costs. We propose reinforcement learning and successive convex approximation to solve the formulated problems. Then, we use solution data and continual learning to improve resource allocation on a large time scale. Our proposal satisfies 97.14% slice delay budget.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"8 3","pages":"994-1007"},"PeriodicalIF":5.3,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Heng Chang;Xueyu Kang;Hongjiang Lei;Theodoros A. Tsiftsis;Gaofeng Pan;Hongwu Liu
{"title":"STAR-RIS-Aided Covert Communications in MISO-RSMA Systems","authors":"Heng Chang;Xueyu Kang;Hongjiang Lei;Theodoros A. Tsiftsis;Gaofeng Pan;Hongwu Liu","doi":"10.1109/TGCN.2024.3432656","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3432656","url":null,"abstract":"In this paper, a simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) is deployed to aid covert communications in a multiple-input single-output (MISO) rate-splitting multiple access (RSMA) system. To maximize the covert communication rate, which is characterized by the shared common rate and private rate of the covert user, the transmit beamforming, reflection/refraction beamforming, and common rate allocation need to be jointly optimized. By decoupling the original covert communication rate maximization problem into three sub-problems, an alternating optimization (AO) algorithm is designed to obtain the optimized solution to achieve the maximum covert communication rate. For the sub-problem of optimizing the common rate allocation, a closed-form expression is derived for the optimal common rate allocation. For the multiple-ratio fractional programming sub-problems of optimizing the transmit beamforming and reflection/refraction beamforming, Lagrangian dual formulation and quadratic transformation are utilized to reconstruct the objective function in the form difference of convex functions. Then, a penalized successive convex approximation is utilized to tackle the rank-one constrained beamforming optimization. Simulation results clarify the effectiveness of the proposed AO algorithm to achieve the maximum covert communication rate. Compared to the benchmark scheme in which the common rate allocation is missing, it is verified by simulation results that the STAR-RIS-aided MISO-RSMA scheme effectively increases the covert communication rate.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"8 4","pages":"1318-1331"},"PeriodicalIF":5.3,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142672039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An AI-Enhanced Multipath TCP Scheduler for Open Radio Access Networks","authors":"Wenxuan Qiao;Yuyang Zhang;Ping Dong;Xiaojiang Du;Hongke Zhang;Mohsen Guizani","doi":"10.1109/TGCN.2024.3424202","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3424202","url":null,"abstract":"Multipath transmission technology has recently emerged as a crucial solution to address bandwidth resource constraints and uneven load distribution across access points caused by the surge in data-intensive applications. A well-designed multipath scheduler can improve the quality of service and balance the power consumption in evolving Open Radio Access Networks (O-RANs). However, wireless channel instability and RAN heterogeneity challenge the scheduler’s bandwidth aggregation capability. This paper introduces a Neural Aggregation Bandwidth Optimization (NABO) scheduler for O-RAN, combining bandwidth prediction with scheduling policy optimization. NABO employs an innovative approach by first constructing a Transformer-optimized Throughput (ToT) prediction model based on historical path characteristics. To train the model, we design a system to simulate various network conditions and collect datasets. This model is then integrated into a dual-network collaborative learning framework that combines ToT predictions with heterogeneity levels to guide the scheduler’s optimization process. The ToT model achieves a throughput prediction error of less than 2%. In numerous heterogeneous simulation scenarios and real-world wireless environments, NABO significantly outperforms state-of-the-art multipath transmission methods, with bandwidth aggregation improvements of approximately 51% and 30% over existing benchmarks, respectively. These findings demonstrate NABO’s superior efficacy and potential in enhancing the performance and energy efficiency of O-RANs.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"8 3","pages":"910-923"},"PeriodicalIF":5.3,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-Efficient Deployment and Resource Allocation for O-RAN-Enabled UAV-Assisted Communication","authors":"Huan Li;Xiao Tang;Daosen Zhai;Ruonan Zhang;Bin Li;Haotong Cao;Neeraj Kumar;Ahmad Almogren","doi":"10.1109/TGCN.2024.3422393","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3422393","url":null,"abstract":"Open Radio Access Network (O-RAN) has brought a significant transformation in the field of communication networks. Its openness propels communication networks towards a more open, flexible, and efficient direction. Meanwhile, Unmanned Aerial Vehicle (UAV) communication, as a key technology in the sixth generation mobile communication network, offers more flexible and efficient solutions to address diverse environments and requirements. On this basis, we investigate the O-RAN-enabled UAV-assisted network architecture, in which the UAV assists the terrestrial network to enhance the wireless coverage performance. To further explore the advantages of the proposed architecture, we propose a joint problem involving radio unit association, aerial radio unit deployment, and resource allocation, with the objective of maximizing network energy efficiency. To tackle this problem, we design a double-loop-based algorithm. Specifically, we employ the Dinkelbach method in the outer loop to handle the fractional form of the objective function and devise an iterative algorithm based on Block Coordinate Descent architecture in the inner loop to optimize the decoupled sub-problems. Comprehensive simulation results are provided to verify the effectiveness of the proposal.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"8 3","pages":"1128-1140"},"PeriodicalIF":5.3,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anderson Augusto Simiscuka;Mohammed Amine Togou;Mikel Zorrilla;Gabriel-Miro Muntean
{"title":"360-ADAPT: An Open-RAN-Based Adaptive Scheme for Quality Enhancement of Opera 360° Content Distribution","authors":"Anderson Augusto Simiscuka;Mohammed Amine Togou;Mikel Zorrilla;Gabriel-Miro Muntean","doi":"10.1109/TGCN.2024.3418948","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3418948","url":null,"abstract":"There is increasing viewer interest and technological support for streaming immersive clips over the Internet. There are, however, challenges in supporting high quality of viewer experience, mostly due to the large amounts of the data associated with immersive video and spatial audio (Ambisonics). In situations where there are limited network resources, the streamed 360° content needs to be adjusted dynamically to meet the network constraints. Dynamic Adaptive Streaming over HTTP (DASH) adaptation is a key technology for delivering high-quality video over open radio access networks (RANs). DASH allows for efficient adaptation of video streams to the available network conditions. This paper introduces 360-ADAPT, a DASH-based adaptation solution on an Open-RAN architecture for increased quality remote 360° opera experiences. Unlike existing schemes, 360-ADAPT gives precedence to audio over the video when selecting bitrates, increasing the overall quality of the artistic act and improving use of resources and energy. The proposed 360-ADAPT was tested with real opera viewers in the context of an artistic-oriented platform for opera delivery, part of the Horizon2020 TRACTION project. Results indicate that 360-ADAPT achieves higher perceived quality levels than alternative solutions both in QoS and QoE metrics.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"8 3","pages":"924-938"},"PeriodicalIF":5.3,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10571391","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Differential Privacy-Aware Generative Adversarial Network-Assisted Resource Scheduling for Green Multi-Mode Power IoT","authors":"Sunxuan Zhang;Jiapeng Xue;Jiayi Liu;Zhenyu Zhou;Xiaomei Chen;Shahid Mumtaz","doi":"10.1109/TGCN.2024.3417379","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3417379","url":null,"abstract":"The low-carbon and efficient operation of smart parks requires high-precision and real-time energy management model training. Multi-mode power Internet of Things (PIoT) consisting of open radio access networks (O-RAN) and power line communications (PLC) can effectively improve the model training performance. However, the negative effects of network threats, such as model inversion attacks, cannot be neglected. To solve this problem, we propose a diFferential pRivacy-aware gEnErative aDversarial netwOrk-assisted resource scheduling algorithM (FREEDOM). Firstly, we integrate a differential privacy mechanism with the energy management model training process and the related system model. Then, a joint resource scheduling optimization problem is constructed, the goal of which is to minimize the weighted sum of the global loss function, total energy consumption, and differential privacy cost under the long-term differential privacy constraint. The original problem is converted based on virtual queue theory and addressed by the FREEDOM. FREEDOM leverages a deep Q-learning network (DQN) to learn the resource scheduling strategy via differential privacy awareness. It improves optimization and convergence performances with the assistance of generative adversarial network (GAN). Simulation results show that FREEDOM can achieve excellent performances of global loss function, total energy consumption, differential privacy cost, and privacy preservation.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"8 3","pages":"956-967"},"PeriodicalIF":5.3,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Suleman Khan;Gurjot Singh Gaba;Andrei Gurtov;Leonardus J. A. Jansen;Nils Mäurer;Corinna Schmitt
{"title":"Post-Quantum Secure Handover Mechanism for Next-Generation Aviation Communication Networks","authors":"Suleman Khan;Gurjot Singh Gaba;Andrei Gurtov;Leonardus J. A. Jansen;Nils Mäurer;Corinna Schmitt","doi":"10.1109/TGCN.2024.3417298","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3417298","url":null,"abstract":"The L-band Digital Aeronautical Communications System (LDACS) is a key advancement for next-generation aviation networks, enhancing Communication, Navigation, and Surveillance (CNS) capabilities. It operates with VHF Datalink mode 2 (VDLm2) and features a seamless handover mechanism to maintain uninterrupted communication between aircraft and ground stations (GSs), improving safety and efficiency in air traffic management (ATM). However, LDACS’ handover process encounters significant security risks due to inadequate authentication and key agreement between aircraft and ground station controllers (GSCs) during handovers. This vulnerability threatens communications’ confidentiality, integrity, and authenticity, posing risks to flight safety and sensitive data. Therefore, developing and implementing a robust security framework to protect aviation communications is essential. In response, we have proposed a security solution specifically designed to protect LDACS handovers. Our solution uses a mutual authentication and key agreement mechanism tailored for LDACS handovers, ensuring robust security for all types of handovers, including Intra GSC - Intra Aeronautical Telecommunication Network (ATN), Inter GSC - Intra ATN, and Inter GSC - Inter ATN. Our approach utilizes post-quantum cryptography to protect aviation communication systems against potential post-quantum threats, such as unauthorized access to flight data, interception of communication, and spoofing of aircraft identity. Furthermore, our proposed solution has undergone a thorough informal security analysis to ensure its effectiveness in addressing handover challenges and offering robust protection against various threats. It seamlessly integrates with the LDACS framework, delivering low Bit Error Rate (BER) and latency levels, making it a highly reliable approach in practice.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"8 3","pages":"939-955"},"PeriodicalIF":5.3,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}