Leveraging energy harvesting abilities in wireless network devices has emerged as an effective way to prolong the lifetime of energy constrained systems.The system gains are usually optimized by designing resource all...Leveraging energy harvesting abilities in wireless network devices has emerged as an effective way to prolong the lifetime of energy constrained systems.The system gains are usually optimized by designing resource allocation algorithm appropriately.However,few works focus on the interaction that channel’s time-vary characters make the energy transfer inefficiently.To address this,we propose a novel system operation sequence for sensor-cloud system where the Sinks provide SWIPT for sensor nodes opportunistically during downlink phase and collect the data transmitted from sensor nodes in uplink phase.Then,the energy-efficiency maximization problem of the Sinks is presented by considering the time costs and energy consumption of channel detection.It is proved that the formulated problem is an optimal stopping process with optimal stopping rules.An optimal energy-efficiency(OEE)algorithm is designed to obtain the optimal stopping rules for SWIPT.Finally,the simulations are performed based on the OEE algorithm compared with the other two strategies to verify the effectiveness and gains in improving the system efficiency.展开更多
Based on the wide application of cloud computing and wireless sensor networks in various fields,the Sensor-Cloud System(SCS)plays an indispensable role between the physical world and the network world.However,due to t...Based on the wide application of cloud computing and wireless sensor networks in various fields,the Sensor-Cloud System(SCS)plays an indispensable role between the physical world and the network world.However,due to the close connection and interdependence between the physical resource network and computing resource network,there are security problems such as cascading failures between systems in the SCS.In this paper,we propose a model with two interdependent networks to represent a sensor-cloud system.Besides,based on the percolation theory,we have carried out a formulaic theoretical analysis of the whole process of cascading failure.When the system’s subnetwork presents a steady state where there is no further collapse,we can obtain the largest remaining connected subgroup components and the penetration threshold.Theoretically,this result is the critical maximum that the coupled SCS can withstand.To verify the correctness of the theoretical results,we further carried out actual simulation experiments.The results show that a scale-free network priority attack’s percolation threshold is always less than that of ER network which is priority attacked.Similarly,when the scale-free network is attacked first,adding the power law exponentλcan be more intuitive and more effective to improve the network’s reliability.展开更多
面向大规模感知与智能应用场景,集中式计算在时延、带宽、能耗与隐私保护的多重约束下逐渐呈现边际效益递减,计算范式因此由单一的“万物上云”模式,逐步转向“就地计算与云边协同”的新形态。在此背景下,本文首先梳理集中化计算路径在...面向大规模感知与智能应用场景,集中式计算在时延、带宽、能耗与隐私保护的多重约束下逐渐呈现边际效益递减,计算范式因此由单一的“万物上云”模式,逐步转向“就地计算与云边协同”的新形态。在此背景下,本文首先梳理集中化计算路径在不同发展阶段所具备的优势及其适用边界,进而界定边缘计算在端-云之间所扮演的关键角色。在此基础上,进一步概述“传感云-边缘-端”协同计算框架,重点分析其中的核心机制,包括数据“必要即上行”的传输原则、面向服务级别协议(SLA)感知的任务分配与双层调度策略,以及边侧即时闭环执行与云侧全局策略治理之间的分工与协同关系。随着计算与智能能力向边缘侧持续下沉,本文进一步讨论边缘智能的发展方向,涵盖模型轻量化与本地学习机制、联邦学习与知识蒸馏的协同范式,以及面向边缘环境的智能运维(AIOps for Edge)与多级降级机制所支撑的自治能力。同时,强调构建以端到端闭环效率、系统韧性与可追责性为导向的综合评价体系的重要性。最后,结合教育等典型应用场景以及产业实践,论证就地计算与云边协同在保障确定性时延、提升系统整体韧性以及实现跨域一致性方面的现实有效性,并据此指出计算范式由边缘计算向云边智能协同演进的必然趋势与发展方向。展开更多
In view of the privacy security issues such as location information leakage in the interaction process between the base station and the sensor nodes in the sensor-cloud system, a base station location privacy protecti...In view of the privacy security issues such as location information leakage in the interaction process between the base station and the sensor nodes in the sensor-cloud system, a base station location privacy protection algorithm based on local differential privacy(LDP) is proposed. Firstly, through the local obfuscation algorithm(LOA), the base station can get the data of the real location and the pseudo location by flipping a coin, and then send the data to the fog layer, then the obfuscation location domain set is obtained. Secondly, in order to reconstruct the location distribution of the real location and the pseudo location in the base station, the location domain of the base station is divided into several decentralized sub-regions, and a privacy location reconstruction algorithm(PLRA) is performed in each sub-region. Finally, the base station correlates the location information of each sub-region, and then uploads the data information containing the disturbance location to the fog node layer. The simulation results show that compared with the existing base station location anonymity and security technique(BLAST) algorithm, the proposed method not only reduce the algorithm’s running time and network delay, but also improve the data availability. So the proposed method can protect the location privacy of the base station more safely and efficiently.展开更多
基金This work was supported by Scientific Research Ability Improving Foundation for Young and Middle-Aged University Teachers in Guangxi(No.2020KY04030)The school introduces talents to start scientific research projects(No.2019KJQD17)+1 种基金This work was supported in part by the National Natural Science Foundation of China(No.61762010,No.61862007)Guangxi Natural Science Foundation(No.2018GXNSFAA138147).
文摘Leveraging energy harvesting abilities in wireless network devices has emerged as an effective way to prolong the lifetime of energy constrained systems.The system gains are usually optimized by designing resource allocation algorithm appropriately.However,few works focus on the interaction that channel’s time-vary characters make the energy transfer inefficiently.To address this,we propose a novel system operation sequence for sensor-cloud system where the Sinks provide SWIPT for sensor nodes opportunistically during downlink phase and collect the data transmitted from sensor nodes in uplink phase.Then,the energy-efficiency maximization problem of the Sinks is presented by considering the time costs and energy consumption of channel detection.It is proved that the formulated problem is an optimal stopping process with optimal stopping rules.An optimal energy-efficiency(OEE)algorithm is designed to obtain the optimal stopping rules for SWIPT.Finally,the simulations are performed based on the OEE algorithm compared with the other two strategies to verify the effectiveness and gains in improving the system efficiency.
基金supported by National Natural Science Foundation of China under Grant No.62072412,61902359,U1736115in part by the Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security under Grant No.AGK2018001.
文摘Based on the wide application of cloud computing and wireless sensor networks in various fields,the Sensor-Cloud System(SCS)plays an indispensable role between the physical world and the network world.However,due to the close connection and interdependence between the physical resource network and computing resource network,there are security problems such as cascading failures between systems in the SCS.In this paper,we propose a model with two interdependent networks to represent a sensor-cloud system.Besides,based on the percolation theory,we have carried out a formulaic theoretical analysis of the whole process of cascading failure.When the system’s subnetwork presents a steady state where there is no further collapse,we can obtain the largest remaining connected subgroup components and the penetration threshold.Theoretically,this result is the critical maximum that the coupled SCS can withstand.To verify the correctness of the theoretical results,we further carried out actual simulation experiments.The results show that a scale-free network priority attack’s percolation threshold is always less than that of ER network which is priority attacked.Similarly,when the scale-free network is attacked first,adding the power law exponentλcan be more intuitive and more effective to improve the network’s reliability.
文摘面向大规模感知与智能应用场景,集中式计算在时延、带宽、能耗与隐私保护的多重约束下逐渐呈现边际效益递减,计算范式因此由单一的“万物上云”模式,逐步转向“就地计算与云边协同”的新形态。在此背景下,本文首先梳理集中化计算路径在不同发展阶段所具备的优势及其适用边界,进而界定边缘计算在端-云之间所扮演的关键角色。在此基础上,进一步概述“传感云-边缘-端”协同计算框架,重点分析其中的核心机制,包括数据“必要即上行”的传输原则、面向服务级别协议(SLA)感知的任务分配与双层调度策略,以及边侧即时闭环执行与云侧全局策略治理之间的分工与协同关系。随着计算与智能能力向边缘侧持续下沉,本文进一步讨论边缘智能的发展方向,涵盖模型轻量化与本地学习机制、联邦学习与知识蒸馏的协同范式,以及面向边缘环境的智能运维(AIOps for Edge)与多级降级机制所支撑的自治能力。同时,强调构建以端到端闭环效率、系统韧性与可追责性为导向的综合评价体系的重要性。最后,结合教育等典型应用场景以及产业实践,论证就地计算与云边协同在保障确定性时延、提升系统整体韧性以及实现跨域一致性方面的现实有效性,并据此指出计算范式由边缘计算向云边智能协同演进的必然趋势与发展方向。
基金supported by the National Natural Science Foundation of China (61202458, 61403109)the Natural Science Foundation of Heilongjiang Province of China(LH2020F034)the Harbin Science and Technology Innovation Research Funds (2016RAQXJ036)。
文摘In view of the privacy security issues such as location information leakage in the interaction process between the base station and the sensor nodes in the sensor-cloud system, a base station location privacy protection algorithm based on local differential privacy(LDP) is proposed. Firstly, through the local obfuscation algorithm(LOA), the base station can get the data of the real location and the pseudo location by flipping a coin, and then send the data to the fog layer, then the obfuscation location domain set is obtained. Secondly, in order to reconstruct the location distribution of the real location and the pseudo location in the base station, the location domain of the base station is divided into several decentralized sub-regions, and a privacy location reconstruction algorithm(PLRA) is performed in each sub-region. Finally, the base station correlates the location information of each sub-region, and then uploads the data information containing the disturbance location to the fog node layer. The simulation results show that compared with the existing base station location anonymity and security technique(BLAST) algorithm, the proposed method not only reduce the algorithm’s running time and network delay, but also improve the data availability. So the proposed method can protect the location privacy of the base station more safely and efficiently.