A survey on deep learning for challenged networks: Applications and trends

被引:35
作者
Bochie, Kaylani [1 ]
Gilbert, Mateus S. [1 ]
Gantert, Luana [1 ]
Barbosa, Mariana S. M. [1 ]
Medeiros, Dianne S. V. [2 ]
Campista, Miguel Elias M. [1 ]
机构
[1] Univ Fed Rio de Janeiro UFRJ, PEE COPPE DEL POLI, Grp Teleinformat & Automacao GTA, Rio De Janeiro, RJ, Brazil
[2] Univ Fed Fluminense UFF, PPGEET, MidiaCom, Niteroi, RJ, Brazil
基金
巴西圣保罗研究基金会;
关键词
Challenged networks; Internet of Things; Sensor networks; Industrial networks; Wireless mobile networks; Vehicular networks; Deep learning; Machine learning; HUMAN ACTIVITY RECOGNITION; OF-THE-ART; MOBILITY PREDICTION; WIRELESS NETWORKS; NEURAL-NETWORK; BIG DATA; DENOISING AUTOENCODER; DATA ANALYTICS; INDUSTRY; 4.0; INTERNET;
D O I
10.1016/j.jnca.2021.103213
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Computer networks are dealing with growing complexity, given the ever-increasing volume of data produced by all sorts of network nodes. Performance improvements are a non-stop ambition and require tuning fine-grained details of the system operation. Analyzing such data deluge, however, is not straightforward and sometimes not supported by the system. There are often problems regarding scalability and the predisposition of the involved nodes to understand and transfer the data. This issue is at least partially circumvented by knowledge acquisition from past experiences, which is a characteristic of the herein called "challenged networks". The addition of intelligence in these scenarios is fundamental to extract linear and non-linear relationships from the data collected by multiple sources. This is undoubtedly an invitation to machine learning and, more particularly, to deep learning. This paper identifies five different challenged networks: IoT and sensor, mobile, industrial, and vehicular networks as typical scenarios that may have multiple and heterogeneous data sources and face obstacles concerning connectivity. As a consequence, deep learning solutions can contribute to system performance by adding intelligence and the ability to interpret data. We start the paper by providing an overview of deep learning, further explaining this approach's benefits over the cited scenarios. We propose a workflow based on our observations of deep learning applications over challenged networks, and based on it, we strive to survey the literature on deep-learning-based solutions at an application-oriented level using the PRISMA methodology. Afterward, we also discuss new deep learning techniques that show enormous potential for further improvements as well as transversal issues, such as security. Finally, we provide lessons learned raising trends linking all surveyed papers to deep learning approaches. We are confident that the proposed paper contributes to the state of the art and can be a piece of inspiration for beginners and also for enthusiasts on advanced networking research.
引用
收藏
页数:30
相关论文
共 198 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[3]   Rate-Distortion Balanced Data Compression for Wireless Sensor Networks [J].
Abu Alsheikh, Mohammad ;
Lin, Shaowei ;
Niyato, Dusit ;
Tan, Hwee-Pink .
IEEE SENSORS JOURNAL, 2016, 16 (12) :5072-5083
[4]   A Survey on Information and Communication Technologies for Industry 4.0: State-of-the-Art, Taxonomies, Perspectives, and Challenges [J].
Aceto, Giuseppe ;
Persico, Valerio ;
Pescape, Antonio .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3467-3501
[5]   Mobile Encrypted Traffic Classification Using Deep Learning: Experimental Evaluation, Lessons Learned, and Challenges [J].
Aceto, Giuseppe ;
Ciuonzo, Domenico ;
Montieri, Antonio ;
Pescape, Antonio .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (02) :445-458
[6]   Network Slice Mobility in Next Generation Mobile Systems: Challenges and Potential Solutions [J].
Addad, Rami A. ;
Taleb, Tarik ;
Flinck, Hannu ;
Bagaa, Miloud ;
Dutra, Diego .
IEEE NETWORK, 2020, 34 (01) :84-93
[7]   Elasticity in Cloud Computing: State of the Art and Research Challenges [J].
Al-Dhuraibi, Yahya ;
Paraiso, Fawaz ;
Djarallah, Nabil ;
Merle, Philippe .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2018, 11 (02) :430-447
[8]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[9]   Identification of malicious activities in industrial internet of things based on deep learning models [J].
AL-Hawawreh, Muna ;
Moustafa, Nour ;
Sitnikova, Elena .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 :1-11
[10]  
Alsheikh M.A., 2015, ARXIV PREPRINT ARXIV