Computer Communications最新文献

筛选
英文 中文
Time varying channel estimation for RIS assisted network with outdated CSI: Looking beyond coherence time 基于过时CSI的RIS辅助网络时变信道估计:超越相干时间
IF 4.5 3区 计算机科学
Computer Communications Pub Date : 2025-05-14 DOI: 10.1016/j.comcom.2025.108202
Souvik Deb, Sasthi C. Ghosh
{"title":"Time varying channel estimation for RIS assisted network with outdated CSI: Looking beyond coherence time","authors":"Souvik Deb,&nbsp;Sasthi C. Ghosh","doi":"10.1016/j.comcom.2025.108202","DOIUrl":"10.1016/j.comcom.2025.108202","url":null,"abstract":"<div><div>The channel estimation (CE) overhead for unstructured multipath-rich channels increases linearly with the number of reflective elements of reconfigurable intelligent surface (RIS). This results in a significant portion of the channel coherence time being spent on CE, reducing data communication time. Furthermore, due to the mobility of the user equipment (UE) and the time consumed during CE, the estimated channel state information (CSI) may become outdated during actual data communication. In recent studies, the timing for CE has been primarily determined based on the coherence time interval, which is dependent on the velocity of the UE. However, the effect of the current channel condition and pathloss of the UEs can also be utilized to control the duration between successive CE to reduce the overhead while still maintaining the quality of service. Furthermore, for multi-user systems, the appropriate coherence time intervals of different users may be different depending on their velocities. Therefore CE carried out ignoring the difference in coherence time of different UEs may result in the estimated CSI being detrimentally outdated for some users. In contrast, others may not have sufficient time for data communication. To this end, based on the throughput analysis on outdated CSI, an algorithm has been designed to dynamically predict the next time instant for CE after the current CSI acquisition. In the first step, optimal RIS phase shifts to maximize channel gain is computed. Based on this and the amount of degradation of signal to interference plus noise ratio due to outdated CSI, transmit powers and bandwidth are allocated for the UEs and finally the next time instant for CE is predicted such that the aggregated throughput is maximized. Simulation results confirm that our proposed algorithm outperforms the coherence time-based strategies and an existing algorithm that adaptively changes inter CE duration.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"240 ","pages":"Article 108202"},"PeriodicalIF":4.5,"publicationDate":"2025-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144070406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A methodology for extracting and decoding smart contracts data
IF 4.5 3区 计算机科学
Computer Communications Pub Date : 2025-05-12 DOI: 10.1016/j.comcom.2025.108204
Flavio Corradini, Alessandro Marcelletti, Andrea Morichetta, Barbara Re
{"title":"A methodology for extracting and decoding smart contracts data","authors":"Flavio Corradini,&nbsp;Alessandro Marcelletti,&nbsp;Andrea Morichetta,&nbsp;Barbara Re","doi":"10.1016/j.comcom.2025.108204","DOIUrl":"10.1016/j.comcom.2025.108204","url":null,"abstract":"<div><div>Blockchain technology has been widely adopted to enhance the security and the decentralisation of smart applications in large-scale pervasive systems. In such a context, data extraction is crucial as it provides a better understanding of the system’s behaviours. However, several challenges arise in automatically extracting data, due to the variety of data sources, such as transactions, events, contract storage, and the complexity of the blockchain structure. In particular, retrieving smart contract state changes remains unexplored despite its potential usage for discovering unexpected behaviour. For such reasons, in this work, we propose a novel methodology and a supporting application for extracting smart contract state changes and other execution-related data. The obtained data is then decoded and offered in a standard format to be easily reused. The methodology provides additional functionalities such as transaction filtering and capabilities for querying over extracted data. The effectiveness and the performance of the methodology were evaluated on three real-world projects from different EVM-based blockchains.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"240 ","pages":"Article 108204"},"PeriodicalIF":4.5,"publicationDate":"2025-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143941702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An analysis of pervasive payment channel networks for Central Bank Digital Currencies 央行数字货币普遍支付渠道网络分析
IF 4.5 3区 计算机科学
Computer Communications Pub Date : 2025-05-12 DOI: 10.1016/j.comcom.2025.108199
Marco Benedetti , Francesco De Sclavis , Marco Favorito , Giuseppe Galano , Sara Giammusso , Antonio Muci , Matteo Nardelli
{"title":"An analysis of pervasive payment channel networks for Central Bank Digital Currencies","authors":"Marco Benedetti ,&nbsp;Francesco De Sclavis ,&nbsp;Marco Favorito ,&nbsp;Giuseppe Galano ,&nbsp;Sara Giammusso ,&nbsp;Antonio Muci ,&nbsp;Matteo Nardelli","doi":"10.1016/j.comcom.2025.108199","DOIUrl":"10.1016/j.comcom.2025.108199","url":null,"abstract":"<div><div>The recent advancement of blockchain technology presents interesting opportunities that are worth a systematic investigation for their potential use in a Central Bank Digital Currency (CBDC). A blockchain alone has known scalability issues that can be overcome by, e.g., a layer-2 payment channel network (PCN). However, not all aspects of such a PCN are easy to specify and optimize. Therefore, its overall behavior, given the multitude of decentralized and individually configured nodes, is challenging to fully comprehend. In this paper, we consider a two-layer hypothetical CBDC in which the wholesale layer utilizes a permissioned blockchain, which ensures high integrity and verifiability, while the retail layer leverages an off-ledger PCN model (with pervasive nodes distributed on a large-scale) that supports instant, privacy-preserving, and retail payments. We systematically analyze the performances of two families of PCNs, namely SF-PCNs and SH-PCNs, characterized respectively by a Scale-Free topology and a Semi-Hierarchical topology. Through extensive simulations and analyses, we offer insights into optimizing PCN structures for CBDCs by exploring the trade-offs among liquidity locked by market operators, payment success rate, throughput, payment completion time, as well as load on the underlying blockchain. Although both SH-PCNs and SF-PCNs can offer state-of-the-art guarantees of fault-tolerance and integrity, we demonstrate that SH-PCNs are better suited for handling large volumes of payments, scale better with the number of network nodes, are more aligned with the anatomy of the current monetary and financial system, and therefore should be preferred in CBDC designs.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"240 ","pages":"Article 108199"},"PeriodicalIF":4.5,"publicationDate":"2025-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144070287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A privacy-enhancing and lightweight framework for device-free localization-based AIoT system 一个增强隐私的轻量级框架,用于无设备的基于本地化的AIoT系统
IF 4.5 3区 计算机科学
Computer Communications Pub Date : 2025-05-12 DOI: 10.1016/j.comcom.2025.108200
Haoda Wang , Chen Zhang , Lingjun Zhao , Huakun Huang , Chunhua Su
{"title":"A privacy-enhancing and lightweight framework for device-free localization-based AIoT system","authors":"Haoda Wang ,&nbsp;Chen Zhang ,&nbsp;Lingjun Zhao ,&nbsp;Huakun Huang ,&nbsp;Chunhua Su","doi":"10.1016/j.comcom.2025.108200","DOIUrl":"10.1016/j.comcom.2025.108200","url":null,"abstract":"<div><div>With the growing demand for location-based services in smart cities, Artificial Intelligence of Things (AIoT)-enabled device-free methods have gained attention for their ability to address privacy and usability challenges. WiFi-based target localization, leveraging channel state information, offers advantages such as ease of deployment and obstacle penetration but faces privacy and computational challenges in centralized training. To address these issues, we propose a privacy-enhancing and lightweight federated device-free localization framework (PLDFL). The PLDFL integrates local differential privacy in federated learning to safeguard user data, uses the Fisher Information Matrix for model pruning to reduce model complexity, and employs three-dimensional convolutional neural network (3DCNN) for efficient feature extraction. Experimental results on real-world data validate its effectiveness in achieving accurate, private, and lightweight device-free localization.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"240 ","pages":"Article 108200"},"PeriodicalIF":4.5,"publicationDate":"2025-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143941656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Standardizing the evaluation framework for ECG-based authentication in IoT devices 标准化物联网设备中基于ecg的认证评估框架
IF 4.5 3区 计算机科学
Computer Communications Pub Date : 2025-05-10 DOI: 10.1016/j.comcom.2025.108201
Bonan Zhang , Lin Li , Chao Chen , Ickjai Lee , Kyungmi Lee , Kok-Leong Ong
{"title":"Standardizing the evaluation framework for ECG-based authentication in IoT devices","authors":"Bonan Zhang ,&nbsp;Lin Li ,&nbsp;Chao Chen ,&nbsp;Ickjai Lee ,&nbsp;Kyungmi Lee ,&nbsp;Kok-Leong Ong","doi":"10.1016/j.comcom.2025.108201","DOIUrl":"10.1016/j.comcom.2025.108201","url":null,"abstract":"<div><div>Devices on the Internet of Things (IoT) often have constrained resources and operate in diverse environments, making them vulnerable to unauthorized access and cyber threats. Electrocardiogram (ECG) signals have emerged as a promising biometric for authenticating users in such settings. However, current ECG-based authentication studies lack a standardized evaluation framework tailored to resource-limited IoT contexts and long-term usage, making it difficult to assess their practical reliability. In this paper, we introduce a new evaluation framework for ECG-based authentication on IoT devices and construct a standardized dataset to facilitate rigorous testing. We categorize performance metrics into four key dimensions: scalability, adaptability, efficiency, and cancelability. Using this framework, we evaluate four representative ECG authentication algorithms for IoT devices. The results show that these algorithms struggle to maintain consistent performance under cross-session authentication scenarios. These findings highlight the critical importance of addressing the temporal variability of ECG signals and the current gap in robust ECG-based authentication for IoT devices. We believe the proposed framework will guide future research toward more resilient and secure ECG authentication systems for the IoT.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"240 ","pages":"Article 108201"},"PeriodicalIF":4.5,"publicationDate":"2025-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143948818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LEBFL: Lightweight authentication and efficient consensus for blockchained federated learning in vehicle–road cooperation systems with AIoT LEBFL:基于AIoT的车路协同系统中区块链联合学习的轻量级认证和高效共识
IF 4.5 3区 计算机科学
Computer Communications Pub Date : 2025-05-08 DOI: 10.1016/j.comcom.2025.108196
Peng Liu , Qian He , Sen Li , Yiting Chen , Anfeng Liu
{"title":"LEBFL: Lightweight authentication and efficient consensus for blockchained federated learning in vehicle–road cooperation systems with AIoT","authors":"Peng Liu ,&nbsp;Qian He ,&nbsp;Sen Li ,&nbsp;Yiting Chen ,&nbsp;Anfeng Liu","doi":"10.1016/j.comcom.2025.108196","DOIUrl":"10.1016/j.comcom.2025.108196","url":null,"abstract":"<div><div>Artificial Intelligence Internet of Things (AIoT) technology is gradually overcoming challenges related to traffic data transmission and processing in vehicle-road cooperative systems. However, the dynamism and openness of the vehicle-road cooperative networks make it susceptible to potential attacks, where attackers might intercept or tamper with transmitted local model parameters, thereby compromising the integrity of the models and leaking user privacy. Although existing solutions such as differential privacy and encryption can address these issues, they may reduce data availability or increase computational complexity. To tackle these challenges, we propose a lightweight authentication and efficient consensus for blockchained federated learning in vehicle–road cooperation systems(LEBFL), which provides lightweight privacy-enhanced authentication and efficient consensus while ensuring the privacy of local models and datasets. Specifically, we first introduce a blockchain-based federated learning architecture that enhances privacy and efficient consensus, utilizing the consortium blockchain to replace the centralized server. Subsequently, we design a lightweight anonymous authentication and key agreement protocol using efficient cryptographic primitives to establish secure session keys for the transmission of local models. Furthermore, we propose a utility-based Raft consensus algorithm, which selects the optimal fog server as the leader node using a resource matrix and weight vector, and enhances the performance of the blockchain network by leveraging the idle computing resources of fog servers. Security analysis and experimental results confirm that the proposed scheme shows superior performance without sacrificing security.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"239 ","pages":"Article 108196"},"PeriodicalIF":4.5,"publicationDate":"2025-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143928713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of path congestion status for network performance tomography using deep spatial–temporal learning 基于深度时空学习的网络性能断层扫描路径拥塞状态识别
IF 4.5 3区 计算机科学
Computer Communications Pub Date : 2025-05-08 DOI: 10.1016/j.comcom.2025.108194
Chengze Du, Zhiwei Yu, Xiangyu Wang
{"title":"Identification of path congestion status for network performance tomography using deep spatial–temporal learning","authors":"Chengze Du,&nbsp;Zhiwei Yu,&nbsp;Xiangyu Wang","doi":"10.1016/j.comcom.2025.108194","DOIUrl":"10.1016/j.comcom.2025.108194","url":null,"abstract":"<div><div>Network tomography plays a crucial role in assessing the operational status of internal links within networks through end-to-end path-level measurements, independently of cooperation from the network infrastructure. However, the accuracy of performance inference in internal network links heavily relies on comprehensive end-to-end path performance data. Most network tomography algorithms employ conventional threshold-based methods to identify congestion along paths, while these methods encounter limitations stemming from network complexities, resulting in inaccuracies such as misidentifying abnormal links and overlooking congestion attacks, thereby impeding algorithm performance. This paper introduces the concept of Additive Congestion Status to address these challenges effectively. Using a framework that combines Adversarial Autoencoders (AAE) with Long Short-Term Memory (LSTM) networks, this approach robustly categorizes (as uncongested, single-congested, or multiple-congested) and quantifies (regarding the number of congested links) the Additive Congestion Status. Leveraging prior path information and capturing spatio-temporal characteristics of probing flows, this method significantly enhances the localization of congested links and the inference of link performance compared to conventional network tomography algorithms, as demonstrated through experimental evaluations.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"239 ","pages":"Article 108194"},"PeriodicalIF":4.5,"publicationDate":"2025-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143941096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Disjoint end-to-end walks for Service Function Chain provisioning and protection 不相交的端到端行走,用于业务功能链的发放和保护
IF 4.5 3区 计算机科学
Computer Communications Pub Date : 2025-05-06 DOI: 10.1016/j.comcom.2025.108193
Mohand Yazid Saidi
{"title":"Disjoint end-to-end walks for Service Function Chain provisioning and protection","authors":"Mohand Yazid Saidi","doi":"10.1016/j.comcom.2025.108193","DOIUrl":"10.1016/j.comcom.2025.108193","url":null,"abstract":"<div><div>Service Function Chains (SFCs) enable traffic to flow through Virtual Network Functions (VNFs) deployed on physical servers to deliver network services. While SDN (Software Defined Network)/NFV (Network Function Virtualization) provides flexible network management, ensuring service continuity remains challenging and requires robust protection mechanisms.</div><div>Network failures can be addressed through local or end-to-end protection approaches. Local protection relies on multiple detours, potentially protecting against failures of the same components, which leads to complex management and multiple detour activations for single failures. End-to-end protection ensures service continuity through two end-to-end disjoint SFC provisioning paths, significantly reducing both route maintenance overhead and resource allocations.</div><div>This paper addresses the challenge of finding two end-to-end disjoint paths for SFC provisioning and protection. We first model the problem using ILP and prove its <span><math><mi>NP</mi></math></span>-completeness, even in over-resourced networks where single SFC provisioning is polynomial-time solvable. To address this complexity, we propose a novel three-step heuristic that enhances protection through transient route computation that is intended to “leave room” and facilitate disjoint provisioning identification. Recomputation of the transient route is established to enhance the resource allocation while improving the protection efficiency. Our extensive simulations demonstrate significant improvements over conventional approaches, showing notable enhancement in both protection efficiency and SFC path quality without incurring additional costs.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"239 ","pages":"Article 108193"},"PeriodicalIF":4.5,"publicationDate":"2025-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143928712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An anonymous and privacy-preserving lightweight authentication protocol for secure communication in UAV-assisted IoAV networks 一种用于无人机辅助IoAV网络安全通信的匿名和保护隐私的轻量级认证协议
IF 4.5 3区 计算机科学
Computer Communications Pub Date : 2025-05-05 DOI: 10.1016/j.comcom.2025.108192
Mohd Shariq , Norziana Jamil , Gopal Singh Rawat , Shehzad Ashraf Chaudhry , Mehedi Masud , Angelo Cangelosi
{"title":"An anonymous and privacy-preserving lightweight authentication protocol for secure communication in UAV-assisted IoAV networks","authors":"Mohd Shariq ,&nbsp;Norziana Jamil ,&nbsp;Gopal Singh Rawat ,&nbsp;Shehzad Ashraf Chaudhry ,&nbsp;Mehedi Masud ,&nbsp;Angelo Cangelosi","doi":"10.1016/j.comcom.2025.108192","DOIUrl":"10.1016/j.comcom.2025.108192","url":null,"abstract":"<div><div>With the rapid proliferation of the Internet of Things (IoT), autonomous vehicles (AVs), or self-driving cars, rely heavily on real-time data sharing and message exchanges over wireless networks. AVs use sensors, artificial intelligence, machine learning, and advanced algorithms to perform various functions, enabling users to operate without human intervention. Owing to the flexibility and high mobility of drones, they could aid in the operations of AVs. However, the security and privacy are the main concerns; specifically, the threat of physical capture and violation of anonymity are the main hurdles for realization of secure communication among the AVs and drones. To address these challenges, we propose an anonymous and provably Secure Lightweight Authentication Protocol for unmanned-aerial-vehicle-assisted Internet of Autonomous Vehicles (SLAP-IoAV). The proposed protocol uses cryptographic primitives such as exclusive-OR operations, elliptic-curve cryptography, collision-resistant one-way hashing, and concatenation to ensure robust security. An informal security analysis found that SLAP-IoAV is secure against several known attacks, and a performance analysis established that the protocol has less computational and communication overhead than existing competitive protocols. Additionally, Scyther simulation results confirm that no security vulnerabilities are present. Overall, our protocol delivers superior security and performance, making it well-suited to real-world applications in the AV industry.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"239 ","pages":"Article 108192"},"PeriodicalIF":4.5,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143947434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive layer-wise personalized federated learning via dual delay update in future communication networks 未来通信网络中基于双延迟更新的自适应分层个性化联邦学习
IF 4.5 3区 计算机科学
Computer Communications Pub Date : 2025-05-05 DOI: 10.1016/j.comcom.2025.108195
Haowen Xu , Yingchi Mao , Si Chen , Yi Rong , Tasiu Muazu , Xiaoming He
{"title":"Adaptive layer-wise personalized federated learning via dual delay update in future communication networks","authors":"Haowen Xu ,&nbsp;Yingchi Mao ,&nbsp;Si Chen ,&nbsp;Yi Rong ,&nbsp;Tasiu Muazu ,&nbsp;Xiaoming He","doi":"10.1016/j.comcom.2025.108195","DOIUrl":"10.1016/j.comcom.2025.108195","url":null,"abstract":"<div><div>The future communication networks refers to large-scale mass-connected networks consisting of billions of cloud, edge, and end devices, which are expected to support the ever-growing communication demands. In the future communication networks, billions of end devices generate massive amount of data that needs to be processed and analyzed (<em>e.g.</em>, model training). Artificial Intelligence of Things (AIoT) is a groundbreaking technology that leverages artificial intelligence models to process and analyze data generated by a large number of internet of things devices. As an emerging AIoT method, personalized Federated Learning (pFL) has emerged prominently in distributed model training using massive data from the future communication networks. However, it is challenging to accomplish high-performance and communication-efficient model training by existing pFL methods in the future communication networks, due to the following limitations. a) Dynamic role differences in each layer of a multi-layer model are neglected, leading to poor accuracy in customized models deployed on end devices. b) Owing to numerous end devices in the future communication networks, the communication frequency between a cloud server and end devices is extremely high in each communication round, resulting in expensive communication cost. To solve these two limitations, this paper presents a novel pFL framework for distributed model training in the future communication networks, called <em>Adaptive Layer-wise personalized Federated Learning via Dual Delay Update</em> (ALpFLDDU). First, in end devices, a layer-wise aggregation scheme based on an adaptive weight calculation mechanism is designed to capture the dynamic role differences of model layers. Second, in each communication round, we develop a dual delay update strategy to reduce communication frequency between a cloud server and end devices while ensuring model performance. Simulation experiments on text and image classification datasets are conducted. The experimental results show that ALpFLDDU realizes higher classification precision and lower communication cost than advanced pFL benchmarks on various classification tasks.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"239 ","pages":"Article 108195"},"PeriodicalIF":4.5,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143918540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信