Mohamed-Aymen Chalouf - Intelligent Security Management and Control in the IoT

Здесь есть возможность читать онлайн «Mohamed-Aymen Chalouf - Intelligent Security Management and Control in the IoT» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Intelligent Security Management and Control in the IoT: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Intelligent Security Management and Control in the IoT»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

The Internet of Things (IoT) has contributed greatly to the growth of data traffic on the Internet. Access technologies and object constraints associated with the IoT can cause performance and security problems. This relates to important challenges such as the control of radio communications and network access, the management of service quality and energy consumption, and the implementation of security mechanisms dedicated to the IoT.<br /><br />In response to these issues, this book presents new solutions for the management and control of performance and security in the IoT. The originality of these proposals lies mainly in the use of intelligent techniques. This notion of intelligence allows, among other things, the support of object heterogeneity and limited capacities as well as the vast dynamics characterizing the IoT.

Intelligent Security Management and Control in the IoT — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Intelligent Security Management and Control in the IoT», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Given its criticality, the random access procedure has been the subject of several studies. Some studies, such as Baracat and Brito (2018), Harwahyu et al. (2018) and Jiang et al. (2018), have suggested analytical models for optimizing the probability of success for access attempts at the terminals and the average access time in different configurations especially under time constraints (Harwahyu et al. 2018). Others are focused on retransmissions. So in Sun et al. (2017), a model based on Markov chains has been proposed to model the number of retransmissions; in Harwahyu et al. (2019), the authors propose a model to find a compromise between the number of repetitions predicted in the physical layer and the number of retransmissions expected in the MAC layer to optimize these two values by using the probability of preamble detection. The study has shown that the retransmissions considered in NPRACH can reduce the number of repetitions. These are only necessary when the network conditions deteriorate.

In Lin et al. (2016), Hwang et al . (2018) and Jeon et al. (2018), the focus has been on transmission of the preamble and estimation of the arrival time. Thus, a detection algorithm on the receiver side, a new jump model in the NPRACH frequency domain and a framework to detect multiple users have been proposed, respectively. In Zhang et al. (2020), the TA preambles that have undergone a collision are used to improve performances of the random access procedure.

From the perspective of standardization, congestion control at the level of access to the network was very early on identified as a priority by the 3GPP and ETSI organisms (3GPP 2011). The cellular IoT, especially NB-IoT, therefore benefits naturally from the solutions proposed for the standards that precede them. Among the solutions proposed, we find ACB (Access Class Barring) and EAB extension, slotted random access, backoffs specific to MTC, a dynamic allocation of resources, etc. (Ali et al. 2017).

The ACB and EAB are those that tackle the problem at its root by blocking access to the network via the diffusion of blocking parameters in the system’s information blocks (SIB) blocks at each RAO. The terminals receive, especially, a probability of blocking p and a blocking time Tb for this opportunity. Each terminal wanting to access the network generates an access probability q . if q < p , the terminal has permission to make an access attempt, otherwise this is postponed for a time Tb This mechanism has been extended. In the EAB, the terminals are classed according to their requirements in terms of Quality of Service (QoS) and the EAB algorithm dynamically blocks low-priority terminals according to the arrival rate by diffusing a bitmap in the SIB14.

It seems clear that congestion control via these techniques relies entirely on the probability of blocking defined by the network. In fact, if the probability of blocking is too high, then a significant number of terminals would pass the access control, thus leading to collisions, and if, on the other hand, this probability is too small, then collisions will be reduced, but a large number of terminals will switch to the inactive mode and this will lead to under-use of resources. It is, therefore, essential to calculate a probability of optimal blocking for effective congestion management.

A study of ACB and EAB performances was carried out in Toor and Jin (2017). Comparison of the two techniques via simulation has shown that the ACB is best adapted to communications with high delay constraints and the EAB in the case of energy-constrained terminals. However, calculating the probability of optimal blocking relies on the base station ability to know the number of terminals attempting the access to the network. In practice, this is not the case. In fact, the base station does not have knowledge of the number of terminals whose access attempts have been blocked.

Several mechanisms have been proposed to estimate the number of terminals attempting to access the network (including the terminals blocked by the access control) so as to deduce from this the blocking probability to be used. In Park and Lim (2016), in the absence of knowledge of the number of blocked terminals, the authors use a heuristic to adapt the probability of blocking. The algorithm proposed in Liu et al. (2020) makes a recursive Bayesian estimation of the active terminals in each class, and depending on this estimation some preambles are allocated to different classes. The algorithm was then improved by assigning an ACB blocking factors to each of the classes, independently of the others, for better congestion control. In Jin et al. (2017), a recursive Bayesian estimation of the active terminals, based on the number of unchosen preambles, makes it possible to calculate a blocking factor for those arrivals from the terminals that are sporadic in character. Performance of the EAB technique is studied in Cheng et al. (2015) for LTE-A networks. The optimal values of the radio messaging cycle as well as the periodicity of SIB14 are then derived by submitting the analytic model to targeted QoS constraints.

In this chapter, we base ourselves on an estimator proposed in an earlier work (Bouzouita et al. 2019) and unlike the work cited above, we use reinforcement learning techniques, especially the TD3 algorithm, to calculate an optimal blocking factor from a set of past estimations. To our knowledge, this is the first time that this type of algorithm has been used in managing massive access to terminals in NB-IoT networks, excepting our previous contribution (Hadjadj-Aoul and Ait-Chellouche 2020).

2.4. Model for accessing IoT terminals

The model proposed represents an overview of IoT devices executing the ACB algorithm. During the random access attempt, the IoT devices compete for the same available preambles. As the 3GPP standard indicates, the number of preambles N should be an integer as explained in section 2.3(ETSI 2011).

During each access opportunity (i.e. Random Access Channel, RACH), these preambles are divided into successful preambles, chosen by a single device, in collision, chosen by two or more devices, and free, not chosen by any of these devices.

In what follows, we calculate the average values of these quantities, which we determined in Bouzouita et al. (2015). These will thereafter be used by our algorithms.

Let us define qN =1 – 1/ N . The average number of successful preambles NS , during RACH opportunities, is given as follows (this is a classic problem of throwing balls into bins):

[2.1] Intelligent Security Management and Control in the IoT - изображение 25

where x 2represents the number of devices attempting access. As we have been able to demonstrate in Bouzouita et al. (2019), equation [2.1]is maximized (i.e. derivative equals zero) when the number of devices картинка 26attempting access simultaneously is

[2.2] картинка 27

The average number of free preambles NI is given by equation [2.3]:

[2.3] Intelligent Security Management and Control in the IoT - изображение 28

From [2.1] and [2.2], we obtain the expected number of failed preambles NF :

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Intelligent Security Management and Control in the IoT»

Представляем Вашему вниманию похожие книги на «Intelligent Security Management and Control in the IoT» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Intelligent Security Management and Control in the IoT»

Обсуждение, отзывы о книге «Intelligent Security Management and Control in the IoT» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x