Next Article in Journal
Recent Approaches to Design and Analysis of Electrical Impedance Systems for Single Cells Using Machine Learning
Next Article in Special Issue
Delay-Informed Intelligent Formation Control for UAV-Assisted IoT Application
Previous Article in Journal
Context-Aware Statistical Dead Reckoning for Localization in IoT Scenarios
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Preference-Aware User Access Control Policy in Internet of Things

1
State Grid Chongqing Electric Power Research Institute, Chongqing 401123, China
2
School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(13), 5989; https://doi.org/10.3390/s23135989
Submission received: 3 May 2023 / Revised: 5 June 2023 / Accepted: 15 June 2023 / Published: 28 June 2023
(This article belongs to the Special Issue Challenges and Future Trends of Artificial Internet of Things)

Abstract

:
There are multiple types of services in the Internet of Things, and existing access control methods do not consider situations wherein the same types of services have multiple access options. In order to ensure the QoS quality of user access and realize the reasonable utilization of Internet of Things network resources, it is necessary to consider the characteristics of different services to design applicable access control strategies. In this paper, a preference-aware user access control strategy in slices is proposed, which can increase the number of users in the system while balancing slice resource utilization. First, we establish the user QoS model and slice QoS index range according to the delay, rate and reliability requirements, and we select users with multiple access options. Secondly, a user preference matrix is established according to the user QoS requirements and the slice QoS index range. Finally, a preference matrix of the slice is built according to the optimization objective, and access control decisions are made for users through the resource utilization state of the slice and the preference matrix. The verification results show that the proposed strategy not only balances slice resource utilization but also increases the number of users who can access the system.

1. Introduction

In recent years, the gradual popularization of mobile intelligent terminals of the Internet of Things and the development of emerging business demands such as smart cities, telemedicine, unmanned driving, and virtual reality have put forward stricter requirements for the Internet of Things [1]. For example, there are fault diagnosis applications in industrial Internet of Things applications. The authors of [2] proposed an unsupervised cross-domain rolling-bearing fault diagnosis method based on time–frequency information fusion to enhance the diagnosis accuracy and strong robustness in the industrial Internet of Things. The authors of [3] designed a feedback-aided PD-type ILC design for time-varying systems with non-uniform trial lengths, which can achieve asymptotic tracking of the desired trajectories for time-varying systems with non-uniform trial lengths in the industrial Internet of Things. Different services have different network requirements. According to different service requirements, the network can be divided into three application scenarios: enhanced mobile broadband (eMBB), ultra-reliable and low-latency communication (URLLC) and massive machine-type communication (mMTC) [4]. These three different scenarios correspond to different Quality of Service (QoS) requirements. The eMBB type of traffic focuses on services that require large and guaranteed bandwidth, such as augmented reality services; the uRLLC type mainly serves low-latency, high-reliability services, such as the Industrial Internet of Things. Finally, mMTC needs to support large-scale devices that can tolerate certain access delays, such as smart-home services. The business requests of the Internet of Things may not only belong to one type of business; for example, the requests related to smart medical care belong to both URLLC business and mMTC business. Therefore, there are situations where a service has multiple access options. Therefore, in order to connect users to the network as much as possible while ensuring the QoS requirements of users, it is necessary to perform appropriate access control on users. Network slicing can provide a logically separated independent network, which can realize QoS isolation of different traffic and support more service requests. Due to the introduction of network slicing technology, in IoT network slicing, user access is fundamentally different from that in traditional mobile networks [5]. On the one hand, network slicing is logical virtualization and isolation by sharing physical infrastructure. Therefore, physical and virtual resources should be considered in network slicing resource allocation. On the other hand, in order to meet service requirements, user equipment needs to select an appropriate network slice for access. Due to resource constraints, not all base stations can provide specific slice services. For users with specific QoS requirements, the association between network slices and base stations should be jointly optimized. In IoT access network slicing, the service guarantee for slice users is more complicated than that in traditional mobile networks because not only are physical access constraints between users and base stations required, but logical access constraints between users and slices also need to be considered. Therefore, the user–base station–slicing three-layer association problem has become an important and challenging problem, and an appropriate user access control strategy is the key to solving this problem.
There have been studies for user access control in slicing. The authors of [6] studied access control in slicing, considered the delayed access problem, modeled the problem as a multiple knapsack problem with random reach for unknown future information, and proposed a heuristic algorithm to obtain suboptimal gains under resource constraints. The authors of [7] guaranteed the minimum data rate requirement of users within a slice by controlling the number of users accessing the slice and proposed a user access control policy that rejected new users when the slice could not guarantee the rate requirement of all users and removed users when a tenant changed its resource allocation policy and could not meet the user rate; they described the user access problem as a network slicing game problem by solving the Nash equilibrium to improve network performance. The authors of [8] designed a joint resource allocation and admission control scheme to maximize the number of terminals that could be accessed by slicing while satisfying the terminal interference constraint. In [9], an access control scheme considering inter-slice and intra-slice priorities was proposed for network slicing, which improved user experience while increasing throughput and resource utilization. The authors of [10] pointed out that admission control and resource allocation mechanisms are pivotal for realizing network slicing efficiently; this paper proposed an approach encompassing intelligent and efficient mechanisms for admission control and resource allocation for network slicing in the 5G core network. The admission control mechanism introduces two solutions, one based on reinforcement learning and the other based on deep reinforcement learning, considering the QoS requirements of 5G use-cases, differentiating network core nodes from edge nodes and processing slice requests in time windows to favor the service provider’s profit and resource utilization. Reference [11] presented a Network Slice Selection Function (NSSF) validation for IoT scenarios in an E2E network slicing architecture, considering traffic prioritization for critical applications. For this, data analytics, machine learning and multi-criteria decision-making methods were used. However, the above-mentioned references fail to consider the problem of multiple access control for a single service, which can lead to load imbalance between slices and thus affect the network utility.
There is similarity in QoS requests for different types of services. As presented in Figure 1, only a small number of applications can access only one slice type, while the performance index requirements of most applications are located between two or more slices, and there are multiple access options. For example, the data rate of a user can be satisfied by multiple slices simultaneously [12], i.e., there will be an intersection of QoS between different slices. Therefore, in this paper, we consider the existence of such users in the IoT system and define such users as fuzzy users, and for users with multiple access options, reasonable user access is achieved by designing an access control mechanism. First, the fuzzy users are defined, and the users with multiple access options are filtered. Then, the user preference matrix is established according to user QoS requirements and slice QoS interval, the slice preference matrix is built according to the objective function, and fuzzy users and slices are grouped according to the preference matrix. Thus the main contributions of this paper are as follows.
  • A fuzzy user selection strategy is proposed by considering the characteristics of different services with similar QoS requirements, the user’s delay, data rate and reliability indicators, and corresponding slice QoS intervals are designed. The slice membership function is defined to calculate the degree of membership of users to different slices, and the fuzzy users with multiple access options are screened out according to the degree of membership.
  • A user access control strategy is designed, and user-slice grouping is performed according to the preference matrix by designing the slice preference matrix and the user’s preference matrix. Furthermore, user access control decisions are made according to the current resource utilization of different slices, and users are connected to slices with low resource utilization, thereby effectively increasing the number of access users while ensuring load balancing.
The remainder of this paper is organized as follows. Section 2 introduces the related work. Section 3 designs the system model. Section 4 proposes the user QoS demand analysis. Section 5 is problem modeling. Section 6 presents the user association strategy. Section 7 describes the simulation analysis. Section 8 concludes the paper.

2. Related Works

In Cloud Radio Access Network (C-RAN) for IoT, the available resources and the distance to the user vary from one Remote Radio Head (RRH) to another because the location of the user is uncertain. Therefore, there are differences in the QoS performance that various RRHs can provide for users. For each user, not all RRHs can provide the service. Therefore, choosing the right RRH for each user is a key issue.
The problem of user access control in IoT has been studied and analyzed by several researchers. The authors of [13] investigated the problem of associating users with RRHs to minimize the number of switches in the network while ensuring user QoS. A reinforcement learning algorithm was used to ensure that the user had a long communication connection after accessing the RRH. The index of candidate RRHs and the distance, angle and direction between the user and the RRH was considered as the state space, and an intelligent body selected the appropriate RRH for the user to associate with the candidate RRHs so that the cumulative reward could be maximized. In [14], a concept of coupled multiple access under ultra-dense networks was proposed to allow users to access multiple base stations for uplink and downlink, respectively. By constructing a decoupled multi-access matching game, a switching matching game algorithm was adopted to obtain higher data transmission rates with guaranteed user QoS requirements. The authors of [15] considered the user access problem in small-cell systems and proposed a Gale–Shapley stable matching algorithm based on user access control to optimize the throughput performance of each user by selecting the access point with the maximum channel gain.
Network slicing has been widely recognized as a key architectural technology for cellular IoT. In C-RAN slicing, the user access strategy is more complex due to the inclusion of network slicing. An efficient user access scheme for RAN slicing was proposed in [16] to improve network throughput while reducing equipment switching cost. User access control under wireless network slicing has a crucial role in load balancing, radio spectrum efficiency and network efficiency [17,18,19]. User access in a network slicing architecture is related to how users access the base station and also to the slices associated with the base station. Increasing the data rate of users in traffic intensive areas under traditional network architectures is limited by interference, network congestion, and operational cost. In [20], a new network slicing architecture is proposed to solve the user access problem in wireless LANs using technologies such as SDN (Software Defined Network) and NFV (Network Function Virtualization). Firstly, the isolation property of slices was used to eliminate the interference between base stations, while user access control algorithms were adopted to find a stable match between user devices and different network slices. The authors of [21] pointed out that user access based on the maximum signal-to-noise ratio was not an effective access control strategy. Therefore, the authors investigated the user access problem for multi-tenant network slices in heterogeneous networks combined with fairness, quality of service, energy consumption and energy efficiency aspects while considering the priority of tenants and users, and utilized genetic algorithms were implemented for user access control to maximize the weighting and rate.
Different services in the network have large variability in throughput and delay requirements, and to achieve different service requirements, the authors of [22] proposed a network slicing throughput and delay model, and the user access problem was abstracted as a mixed integer programming problem. For small networks, the global search method was used to solve user access decisions. For large networks, heuristic algorithms were adopted to balance the bandwidth and delay issues of different services so as to ensure the quality of user access. However, the above-mentioned references do not consider the access control problem for multiple access users in network slicing.
The above results ignore the multiple access control issues of a single service, which leads to unbalanced load among slices, thereby affecting network utility. However, this paper considers the existence of such users in the system, defines such users as fuzzy users, and realizes reasonable user access through an access policy designed for users with multiple access options. Therefore, the number of users connected to the system can increased while the load is relatively balanced.

3. System Model

In this paper, the system model consists of an RRH, a Base Band Unit (BBU), slices of different service types and users in an IoT C-RAN network slice scenario. Figure 2 shows that there are three types of slices associated with the RRH and four types of user requests within the RRH coverage area, namely, enhanced mobile broadband (eMBB) users, ultra-reliable and low-latency communication (URLLC) users, massive machine-type communication (mMTC) users and a large number of fuzzy users. Fuzzy users are described specifically in Section 4. As shown in Figure 2, each slice has data rate, delay and reliability metrics, and when a usersubmits a business access request, the slice selects the user that can satisfy its QoS requirements for access. However, we must consider that slices have different service times for different tasks, i.e., some tasks have large service delays, and the occupied resources cannot be released in a short time. Therefore, there are two cases of high resource utilization and low resource utilization for different slices in the same period. Considering the different resource utilization of slices in different periods, to reduce the load imbalance of slices and ensure the system throughput, effective access control of slices is required.
Thus, the requests in the system can be represented as having a large number of fuzzy user requests and a small number of extreme user requests. In this paper, we assume that there are a large number of fuzzy users in the system, i.e., there are multiple slices in the system that can satisfy the QoS demand of those fuzzy users, but each user can only access one of the slices. First, the slices select the users that can be satisfied based on their QoS requirements. However, when the slice is relatively low in available resources, the user accesses the slice with relatively low resource utilization that can meet its QoS need.
Considering the whole system, in order to provide access to as many users as possible, reasonable access control for users is required; namely, the system must determine which slices can create the maximum number of users accessing the system while ensuring the relative load balance of slices in the system under the condition of ensuring the QoS requirements of users. The label of different types of slices is denoted by  N = { 1 , 2 , 3 , , N } , the number of users in the system is defined as  U = { 1 , 2 , , u } , and the user attribute characteristics are modeled as  t u = ( R u , ε u , T u ) , where  R u  is the data rate request of users,  ε u  is the reliability requirement of users, and  T u  is the delay requirement of users.

4. QoS Demand Model

This section describes the delay, rate and reliability metrics of fuzzy users. First, the fuzzy users are defined; eMBB, URLLC, and mMTC are the three main types of services in 5G. In the 5G large-scale IoT scenario, some requests belong to both mMTC services and URLLC services: that is, the mMTC service and URLLC service have an intersection of QoS. Here, we consider users at the intersection of multiple service QoS as fuzzy users. For example, the QoS attribute interval of a slice  n 1  is denoted as  Ω 1 , the QoS attribute interval of slice  n 2  is denoted as  Ω 2 , and so on. Additionally, the intersection of attributes between slices is denoted as  Δ = Ω 1 Ω 2 Ω n . The QoS request of user u is denoted as  r e q e s t u . Then, if Formula (1) is satisfied,
r e q u e s t u Δ , u U ,
user u is defined as a fuzzy user. If Equation (1) is not satisfied, then user u is grouped with other users, where  Δ  is denoted as the intersection part of QoS attributes between any two or more slices.
Assuming that the number of resources in different slices is represented as a set  M = { M 1 , M 2 , , M N } . The user request is not served immediately and may even be denied due to the network state. In this case, the user will choose to re-initiate the request after a random delay or join the queue for queuing. To ensure fairness [23], this paper uses queuing to describe the delay when the user does not have immediate access to the network. Considering that an excessively long queue can lead to a long queuing delay—which causes some users to regret joining the queue or leave it, resulting in queue instability—this paper considers reducing the queue length as much as possible, which means it allows users to access other slices that can satisfy their QoS requests when the slice resources are limited.
We assume that the arrival of user requests obeys a Poisson process and that the time of user services is exponentially distributed, and, considering that users have multiple choices of access slices, we consider M/M/n queuing to model this process.
Assuming that user requests obey a Poisson distribution with parameter  λ , the probability that the number of tasks generated in time interval T is defined by Formula (2).
P ( k ) = ( λ T ) k e λ T / k !
where  λ  is the average number of tasks arriving per unit of time. The service time for each request obeys an exponential distribution, with parameter  γ  as
P { t < t } = 1 exp ( λ t )
It is assumed that the arrival of the request and the receipt of the service by the user are independent of each other. We assume that  η u , n  denotes the service efficiency of user u on slice n. Thus, the service rate of the whole system is  n η n , which denotes the average number of users that can be served per unit of time. When a user request arrives, it can choose between the slices that can satisfy its QoS to be served.
The delay, rate and reliability issues for users are modeled separately below.

4.1. Time Delay

The user’s latency is mainly composed of transmission latency, queuing latency, processing latency and frame allocation latency [9]. The transmission delay  T u , n t  is the time required for user packet transmission and can be measured by the user’s packet size as well as the user’s transmission rate. In this study, it is assumed that the packets should be transmitted within one scheduling time slot, so the transmission delay is the size of one scheduling time slot. Queuing delay  W u , n  refers to the time interval from when a packet arrives in the queue buffer to when the packet is served. Processing delay  T u , n p  refers to the processing delay of slices and users, which mainly depends on the processing capacity of users and slices. The frame allocation delay  T u , k f  depends on the load of the network and is usually between 0 and 1 symbol length [24]. The transmission delay of the task is:
T u , n t = L u / B u
where  L u  is the packet size of user u and  B u  is the rate assigned to user u.
As the computing power of the base station and the terminal increases, the processing delay is short compared to the transmission delay and can be ignored. The transmission delay and processing delay are expressed as the service delay of the service. Since the average service rate of user u in slice n is  η u , n , the second-order moment of the average service delay of a user u in slice n is as defined in Equation (5).
X u , n 2 = E { X u , n 2 } = 1 η u , n 2
According to the Pollaczek–Khinchine (P-K) theorem, the average queuing delay of service packets of a user u for transmission on the n-th slice is:
W u , n ¯ = λ X u , n 2 2 ( 1 ρ u , n ) = ρ u , n 2 η u , n ( 1 ρ u , n )
where  ρ u , n  can be expressed as  ρ u , n = λ / η u , n . Thus, the user’s time delay can be expressed as:
T u = T u . n t + W u , n + T u , k f
To ensure QoS for users, the user’s latency should be no greater than the upper limit of his/her tolerable latency:
T u τ max
where  τ max  denotes the upper limit of tolerable delay for slices accessed by users.

4.2. User Rate

The rate requested by user u is represented by  R u . According to Shannon’s formula, the bandwidth that can be allocated to user u’s access to slice n is:
B u , n = R u log ( 1 + S I N R )
where  R u  denotes the transmission rate required by the user and  S I N R  denotes the signal-to-noise ratio. When the user accesses slice n, according to the user’s QoS demand, slice n immediately allocates a certain resource  B u , n  to user u and ensure that the resource allocated by slice n does not exceed its resource limit  M n , denoted as:
u n B u , n M n , n N

4.3. Reliability

Since communication is mainly considered in terms of message validity and reliability, validity is related to the data rate in Section 4.2. Therefore, this subsection mainly considers the modeling of reliability. For simplicity, only reliability modeling without secondary retransmission is considered in this paper.
For the reliability requirements of the service, two main factors are considered: the failure of task completion due to the violation of the delay constraint or failure caused by the instability of the channel state [25]. According to [26], the reliability of the delay is measured by ( 1 ε u , n q ), where  ε u , n q  is the probability of delay violation, denoted as:
ε u , n q = Pr ( D > D u , n q , max ) e θ u , n B u , n D u , n q , max
where  D u , n q , max  is the upper limit of queuing delay that can guarantee the service demand,  B u , n  is the bandwidth allocated to the user, and  θ u , n  is the QoS metric of a user u on slice n, denoted as:
θ u , n = ln ( ln ( 1 / ε u , n q ) λ u D u , n q , max + 1 )
We assume that the reliability threshold of the user is  ε u g . To ensure the reliability requirements of the user, that is, to meet that the user’s error rate is not greater than his/her maximum tolerable error rate, the conditions that need to be met are:
ε u , n q ε u g

5. Problem Modeling

It is assumed that users accessing the slice will not leave or drop during a period of time T. Access control is performed with guaranteed user QoS. We denote the access of a user u to slice n by the binary variable  α u , n  as
α u , n = 1 , if user u access slice n 0 , otherwise
The performance indicators of the user include data rate  β , delay  τ  and reliability  ε . The slice also has corresponding performance indicators, and when the performance indicators of the slice include the performance indicators of the user, that is, when Equation (1) is satisfied, it means that the slice can meet the QoS demand of the user, and the slice can be used as one of the access choices of the user at that time. The QoS index interval of the slice is expressed as follows:
{ ( β min , β max ) , ( τ min , τ max ) , ( ε min , ε max ) }
Since only three indices of data rate  β , delay  τ  and reliability  ε  are considered in this paper, the QoS metric is a three-dimensional matrix of  U × 3 × 3  in a network of U users. The performance index of user u can be described as:
Q o S u = f ( β u , τ u , α u ) | β u ( β min , β max ) , τ u ( τ min , τ max ) , ε u ( ε min , ε max )
All slices that can satisfy Equation (17) can be used as one of the access options for users. At the same time, to ensure the load balancing of slices, access control selection needs to be based on the remaining available resource status of slices when access control is performed.
Assume that the total resources of a slice remain constant over its lifetime. Denote the total bandwidth of slice n as  M n . Describe the remaining resource state of slice n at moment t as the current state of the slice based on the queue situation of the slice and the current resource occupation:
γ n = u B u M n
where  u B u  denotes the bandwidth resource occupied by slice n at the current moment.
Based on the current degree of resource utilization of slices and the QoS requirements of users, access control is applied to users, and as many users as possible are provided access by optimizing the access control policy  π . The number of users provided access in the system is the sum of binary variables for each user in the system as defined in Equation (18).
A t o t a l = u U n N α u , n
Considering that the resources of each slice are limited, to ensure that more users are provided access, it is necessary to allocate the minimum bandwidth  B u  that can satisfy the QoS demand of users after they are provided access to the slice so that more resources are left to provide access to more users. Therefore, the objective function is expressed as maximizing the number of users  A t o t a l  as
max π , B u   A t o t a l s . t . c 1 : γ u γ t h r , u U c 2 : T u τ max , u U c 3 : ε u , n ε u g , u U , n N c 4 : u U B u M n , u U , n N c 5 : α u , n { 0 , 1 }
where the constraint c1 indicates that a user can be provided access when the remaining available resources of the slice can satisfy the user’s QoS request, c2 means that slice n can satisfy the delay requirement of the user, c3 represents that the slice can satisfy the reliability requirement of user u, c4 denotes that the sum of the bandwidth allocated to all users cannot exceed the total bandwidth of slice n, and c5 is a constraint on the access variables to ensure that a user u can access at most one slice at a time.

6. Methodology

Considering that users have multiple choices of slice access but that only one slice can be associated with a user in the end, a suitable user access policy is needed to ensure the maximum number of users that can be provided access in the system. Meanwhile, the load of the slices is relatively balanced. In this section, a preference-based access control policy is considered. First, the set of users preferred by a slice is selected based on the load of the slice. Secondly, the set of slices from which users are provided access is selected based on their QoS requirements. Finally, a set of user slices is selected for access.

6.1. User Multi-Access Inference

According to Table 1, the following inferences can be drawn: requests in the network have different requirements for bandwidth, latency and reliability and can be sliced separately for eMBB services (e.g., video conferencing) and URLLC services (e.g., autonomous driving), but for applications such as e-commerce and partial immersion, both eMBB and URLLC slices can be accessed. Such users who have multiple access options are defined as fuzzy users in the slice scenario, but each user can eventually be served by only one slice. Therefore, access control for fuzzy users is required.

6.2. Time Delay

In the scenario considered in this paper, it is difficult to decide whether a certain user request belongs to a definite type of slice and not another type because it belongs to a certain type of slice to some extent; that is, each type of task request belongs to one of the fuzzy subsets in the slice set. There exists a large number of fuzzy users and a small number of other users. Other users do not need to make access control decisions because they have only one access choice. Therefore, the set of fuzzy users that need to make access decisions should be selected first.
The set of users  U = { 1 , 2 , , u }  is a finite set, and the u users are classified into n classes, which are represented by the fuzzy matrix of  n × u  as:
X = x 11 , x 12 , , x 1 u x 21 , x 22 , , x 2 u x n 1 , x n 2 , , x n u
where  x n u  denotes the degree of affiliation of user u to different slice types n, which is calculated by the affiliation function  F n ( x ) . Since this paper considers users with three QoS attributes, the affiliation function is expressed as:
F n ( x ) = F n ( β u ) + F n ( τ u ) + F n ( ε u ) 3
where  F n ( β u ) , F n ( τ u ) , F n ( ε u )  denote the affiliation functions of data rate, delay and reliability, respectively, of user u to slice n. Their affiliation functions can be calculated by Equations (22)–(24), respectively.
F n ( β u ) = 0 , β u β min n β u β max n β u β min n β max n β min n , β min n < β u < β max n
F n ( τ u ) = 0 , τ u τ min n τ u τ max n τ u τ min n τ max n τ min n , τ min n < τ u < τ max n
F n ( ε u ) = 0 , ε u ε min n ε u ε max n ε u ε min n ε max n ε min n , ε min n < ε u < ε max n
By calculating the affiliation functions  F n ( β u ) , F n ( τ u ) , F n ( ε u ) , we get a four-dimensional matrix of affiliation functions of  U × U × U × U . For user u, his/her three corresponding affiliation functions are not zero, which means that user u has affiliation degree  F n ( x )  to slice n. For each column of the fuzzy matrix X, if there is only one non-zero value, it means that the user is not a fuzzy user. Conversely, if there is more than one non-zero value, it implies that the user is a fuzzy user, and thus, the fuzzy user is filtered out.

6.3. Slicing Preference

In order to provide access to more users, according to the bandwidth required by users, slices are more inclined to provide access to users with small bandwidth requirements. However, according to Equation (9), the actual bandwidth allocated to a user is related to the user’s requested rate and channel conditions [29]. When a user has poor channel conditions, more bandwidth resources need to be consumed to compensate to meet his/her rate requirements. This affects the access of users with better channel conditions. Therefore, the preference for slicing is related to the bandwidth consumed by the user. The preference matrix of slicing can be expressed as a one-dimensional matrix  Φ :
Φ = [ φ 1 , φ 2 , , φ u ]
where  φ u  denotes the degree of preference of slice n over user u and  φ u 1 > φ u  denotes the degree of preference of slice n of user  u 1  over user u.
Since the preference for slicing is related to the bandwidth consumed by the access user, the one-dimensional preference matrix  Φ  can be ranked according to the bandwidth, i.e.,
φ u arg   min u { u , U } B u
Equation (26) indicates that the user with the least bandwidth required from the u-th user to the U-th user is selected and ranked in position n in the preference matrix of slice  φ u .

6.4. User Preference

Denote the multiple access selection policies of a user u as  ff u = ( α u , 1 , , α u , 2 , , α u , n ) . Consider the acceptance or rejection of user requests in different remaining available resource states of slices as a binary variable  α u , n . Since the user can only access one of the slices,  | | ff u | | 1 . However, the users’ preferences for different slices are different, and we denote the preference matrix of user u as  Φ :
Φ = [ Φ 1 , Φ 2 , , Φ N ]
where  Φ n  indicates the degree of preference of user u for slice n. The higher the value is, the higher the preference.
Each user attribute corresponds to a set of acceptable slice resource states, and the remaining resource state is denoted as  Υ = { γ 1 , γ 2 , , γ n } . Under different slice states, user preferences for slices differ according to the access policy  π  and are related to the user’s QoS requirements and the remaining available resource state of the slice:
Φ n = [ Φ 1 , Φ 2 , , Φ Υ , ] = φ 1 , 1 , φ 1 , 2 , , φ 1 , Υ φ 2 , 1 , φ 2 , 2 , , φ 2 , Υ φ N , 1 , φ N , 2 , , φ N , Υ
where column i indicates the preference of user u for different slices when the remaining resources of the slice are in state  γ i . Row n indicates the degree of preference of user u for slice n in different resource states. Equation (28) indicates that the user selects the slice that can satisfy his/her QoS according to the attributes of the slice, and if the resource state of the slice cannot satisfy the QoS demand, then the user’s preference degree  φ n , γ = 0  for slice n.
The user’s preference for slices is related to the affiliation degree  F n ( x )  between the user’s QoS requirements and the QoS attributes of slices, and the larger the affiliation degree, the higher the value of the user’s preference for slices. However, the degree of affiliation is only the preference for QoS attributes, and the remaining resource state of the slice should be fully considered to ensure the QoS requirements of users. The preference degree  φ n , γ  of user u for slice n as a whole is expressed as:
φ n , γ F n ( x ) , Remaining resource of slice n meets user QoS φ n , γ = 0 , Otherwise
Equation (29) indicates that users have a corresponding preference value for slices that can satisfy their QoS needs. It implies that user u prefers slices with a QoS similar to his/her demand, but as the user is provided access, the preference value changes to 0 when the remaining resources of the slice are insufficient to satisfy his/her QoS. The preference value can be updated by calculating the user’s preference value for each slice and the remaining resource status of each slice.

6.5. Slice–User Association Strategy

Based on the slice preferences and user preferences, a set of slice–user association schemes are designed. There are multiple slices preferring the same user in this association scheme, and the final slice–user association decision is related to the remaining resource status of the slice itself, considering the load balancing of the achieved slices. The resource utilization status of the slice is used as the criterion for user access and is denoted as:
μ = min { γ 1 , , γ n }
In the case of multiple slices associated with the same user, Equation (30) indicates that the slice with the lowest resource utilization among them is selected for user access.

7. Simulation Analysis

In this paper, we use the Python 3.7 simulation platform to validate the preference-aware user access control policy. A C-RAN system consisting of one RRH, two network slices, one BBU pool and an optical forwarding network is considered, and 100 users with different QoS requirements are randomly generated. We compare our results with the QoS-guaranteed user access control strategy [30], greedy-based access control strategy and random-based access control strategy to maximize the number of users accessed. The simulation parameters are shown in Table 2.
Figure 3 shows the user’s degree of affiliation to different slices. The horizontal axis indicates the bandwidth interval of the slice, and the vertical axis indicates the user’s degree of affiliation. It can be seen that the subscriber’s affiliation level decreases as the required bandwidth approaches the upper limit that can be satisfied by the slice. This is because users prefer slices that can provide higher bandwidth to ensure their QoS is satisfied. For the overlapping area of the bandwidth of Slice 1 and Slice 2 in the figure, it can be seen that users have different preferences for the same bandwidth because the lower limit of bandwidth that can be provided by different slices is different, which is related to the affiliation function.
Figure 4 shows the degree of affiliation of users with joint consideration of delay and bandwidth. It can be seen that the degree of user affiliation decreases with the increase in required bandwidth and increases with the increase in required delay. This is due to the instability of the channel state and the need to guarantee the minimum delay required for the users. Therefore, the smaller the minimum delay that can be satisfied for a slice, the higher the user’s degree of preference. Therefore, for a certain slice QoS interval, the less delay-sensitive and less bandwidth-demanding users have a higher degree of affiliation with the slice. In addition, due to the variability of QoS between slices, the degree of affiliation of the same user to different slices also varies. For example, a user with a bandwidth requirement of 78 Mb and a latency requirement of 150 ms has a joint affiliation of about 0.7 for Slice 1, while the joint affiliation for Slice 2 is only 0.56.
Figure 5 shows the effect of different fuzzy user percentages on the number of users provided access in the system. It can be seen that as the percentage of fuzzy users increases, more users are provided access by the proposed algorithm that considers fuzzy users, which can provide access to 20.2% more users than the QoS-guaranteed user access algorithm when the number of fuzzy users is 60% of the total users in the system. The QoS-guaranteed user access algorithm allocates more resources to users to ensure their quality of service, while the algorithm proposed in this paper allocates resources to users to satisfy their QoS to provide access to more users, so that there are more remaining resources to provide access to more users. In the algorithm that does not consider fuzzy users, the number of accessed users decreases gradually as the proportion of fuzzy users increases because fuzzy users account for a certain proportion in the QoS interval of slices, and not considering fuzzy users leads to some users not being able to access the slices, and thus, the number of users provided access decreases. We also find that the performance of our proposed algorithm that considers fuzzy users is much higher than greedy-based and random-based access control strategies.
Figure 6 shows the number of subscribers who are provided access at different signal-to-noise ratios. It can be seen that as the S/N ratio increases, the overall trend of the number of users provided access increases. This is because the S/N ratio increases and users have less bandwidth to make up for channel consumption, i.e., users can use less bandwidth to meet the data rate demand. Therefore, more surplus resources can be available to provide access to more users. When considering 40% fuzzy users and a signal-to-noise ratio of 25 dB, the proposed algorithm in this paper can provide access to 42.46% more users than the QoS-guaranteed user access algorithm. It can also be seen from Figure 6 that the performance of our proposed method is better than the greedy-based and random-based access control algorithms for both 40% and 20% fuzzy users. Among them, the performance based on greedy is slightly better than that based on random.
Figure 7 shows the slice loadings under different signal-to-noise ratios. In the case of a small signal-to-noise ratio, the slice load situation of the proposed algorithm is relatively balanced. At a signal-to-noise ratio of nine, the difference between the load of Slice 1 and Slice 2 in the proposed algorithm is 9.1%, while the difference between the load of Slice 1 and Slice 2 in the comparison algorithm is 50%. When the S/N ratio is greater than nine, it can be seen that the number of users provided access by Slice 1 increases slowly, which is related to the QoS requests of users in the system, indicating that the number of users that can be satisfied by Slice 1 has reached the upper limit.

8. Conclusions

To solve the problem of multiple access for a single service for IoT, this paper proposes a preference-aware user access control strategy. Firstly, a fuzzy user selection strategy is proposed by establishing user QoS requirements and slice QoS intervals and affiliation functions. Then, a user access control strategy is designed, and user–slice grouping is performed based on the slice preference, the user preference matrix and the load of the slice. Simulation results show that the proposed algorithm can increase the number of users who are provided access to the system while ensuring user QoS. The flexibility of network slicing and the mobility of users increases the difficulty of resource management. Traditional network models have difficulty making optimization decisions, and artificial intelligence is usually used to solve complex problems. Therefore, artificial intelligence algorithms can be applied to C-RAN network slice resource management strategies in the future to improve the accuracy and flexibility of resource management.

Author Contributions

Conceptualization, S.L. and P.Z.; methodology, S.L.; validation, S.L., Y.Y. and L.W.; formal analysis, W.P.; investigation, Y.Y.; resources, Y.J.; data curation, Y.J.; writing—original draft preparation, P.Z.; writing—review and editing, L.W.; visualization, P.Z.; supervision, W.P.; project administration, W.P.; funding acquisition, Y.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Key Research and Development Project of State Grid Chongqing Electric Power Company with funder grant number (2022 Chongqing Electric Science and Technology 2#) and the National Natural Science Foundation of China (grant 61901071).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Huang, S.; Guo, B.; Liu, Y. 5G-oriented optical underlay network slicing technology and challenges. IEEE Commun. Mag. 2020, 58, 13–19. [Google Scholar] [CrossRef]
  2. Tao, H.; Qiu, J.; Chen, Y.; Stojanovic, V.; Cheng, L. Unsupervised cross-domain rolling bearing fault diagnosis based on time-frequency information fusion. J. Frankl. Inst. 2023, 360, 1454–1477. [Google Scholar] [CrossRef]
  3. Guan, S.; Zhuang, Z.; Tao, H.; Chen, Y.; Stojanovic, V.; Paszke, W. Feedback-aided PD-type iterative learning control for time-varying systems with non-uniform trial lengths. Trans. Inst. Meas. Control 2023, 45, 2015–2026. [Google Scholar] [CrossRef]
  4. Wu, Y.; Dai, H.N.; Wang, H.; Xiong, Z.; Guo, S. A Survey of Intelligent Network Slicing Management for Industrial IoT: Integrated Approaches for Smart Transportation, Smart Energy, and Smart Factory. IEEE Commun. Surv. Tutor. 2022, 24, 1175–1211. [Google Scholar] [CrossRef]
  5. Hurtado Sánchez, J.A.; Casilimas, K.; Wang, H.; Xiong, Z.; Caicedo Rendon, O.M. Deep reinforcement learning for resource management on network slicing: A survey. Sensors 2022, 22, 3031. [Google Scholar] [CrossRef] [PubMed]
  6. Challa, R.; Zalyubovskiy, V.V.; Raza, S.M.; Choo, H.; De, A. Network slice admission model: Tradeoff between monetization and rejections. IEEE Syst. J. 2021, 14, 657–660. [Google Scholar] [CrossRef]
  7. Caballero, P.; Banchs, A.; Veciana, G.D.; Costa-Pérez, X.; Azcorra, A. Network slicing for guaranteed rate services: Admission control and resource allocation games. IEEE Trans. Wirel. Commun. 2018, 17, 6419–6432. [Google Scholar] [CrossRef] [Green Version]
  8. Ai, Y.; Qiu, G.; Liu, C.; Sun, Y. Joint resource allocation and admission control in sliced fog radio access networks. China Commun. 2020, 17, 14–30. [Google Scholar] [CrossRef]
  9. Adedotun, A.T.; Falowo, O.E. Resource allocation and admission control strategy for 5G networks using slices and users priorities. In Proceedings of the 2019 IEEE AFRICON, Accra, Ghana, 25–27 September 2019; pp. 1–6. [Google Scholar] [CrossRef]
  10. Villota-Jacome, W.F.; Rendon, O.M.C.; Da-Fonseca, N.L. Admission Control for 5G Core Network Slicing Based on Deep Reinforcement Learning. IEEE Syst. J. 2022, 16, 4686–4697. [Google Scholar] [CrossRef]
  11. da Silva, D.C.; de Sousa, M.A.F.; Bressan, G.; Silveira, R.M. 5G Network Slice Selector in IoT Services Scenarios with QoS Requirements Guarantee. In Proceedings of the 2022 IEEE Wireless Communications and Networking Conference (WCNC), Austin, TX, USA, 10–13 April 2022; pp. 90–95. [Google Scholar] [CrossRef]
  12. Lee, Y.L.; Loo, J.; Chuah, T.C.; Wang, L.C. Dynamic network slicing for multitenant heterogeneous cloud radio access networks. IEEE Trans. Wirel. Commun. 2018, 17, 2146–2161. [Google Scholar] [CrossRef]
  13. Rodoshi, R.T.; Kim, T.; Choi, W. Fuzzy logic and accelerated reinforcement learning-based user association for dense C-RANs. IEEE Access 2021, 9, 117910–117924. [Google Scholar] [CrossRef]
  14. Dai, C.; Zhu, K.; Yi, C.; Hossain, E. Decoupled uplink-downlink association in full-duplex cellular networks: A contract-theory approach. IEEE Trans. Mob. Comput. 2022, 21, 911–925. [Google Scholar] [CrossRef]
  15. Yang, H. How to associate users with access points in a small cell network? In Proceedings of the 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), Antwerp, Belgium, 25–28 May 2020; pp. 1–5. [Google Scholar] [CrossRef]
  16. Liu, Y.; Feng, G.; Sun, Y.; Qin, S.; Liang, Y.C. Device association for RAN slicing based on hybrid federated deep reinforcement learning. IEEE Trans. Veh. Technol. 2020, 69, 15731–15745. [Google Scholar] [CrossRef]
  17. Reyhanian, N.; Farmanbar, H.; Luo, Z. Data-driven adaptive network slicing for multi-tenant networks. IEEE J. Sel. Top. Signal Process. 2022, 16, 113–128. [Google Scholar] [CrossRef]
  18. Sun, Y.; Qin, S.; Feng, G.; Zhang, L.; Imran, M.A. Service provisioning framework for RAN slicing: User admissibility, slice association and bandwidth allocation. IEEE Trans. Mob. Comput. 2020, 20, 3409–3422. [Google Scholar] [CrossRef]
  19. Liu, D.; Wang, L.; Chen, Y.; Elkashlan, M.; Wong, K.; Schober, R.; Hanzo, L. User association in 5G networks: A survey and an outlook. IEEE Commun. Surv. Tutor. 2016, 18, 1018–1044. [Google Scholar] [CrossRef] [Green Version]
  20. Amine, M.; Kobbane, A.; Ben-Othman, J. New network slicing scheme for UE association solution in 5G ultra dense HetNets. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar] [CrossRef]
  21. Jayanthi, S.S.; Lee, Y.L.; Chang, Y.C. User association for multi-tenant heterogeneous network slicing using genetic algorithm. In Proceedings of the 2021 8th International Conference on Computer and Communication Engineering (ICCCE), Kuala Lumpur, Malaysia, 22–23 June 2021; pp. 326–330. [Google Scholar] [CrossRef]
  22. Long, K.; Qian, M.; Chen, K.; Yu, X. Joint bandwidth orchestration and user association in 5G network slicing. In Proceedings of the 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), Kuala Lumpur, Malaysia, 28 April–1 May 2019; pp. 1–5. [Google Scholar] [CrossRef]
  23. Han, B.; Sciancalepore, V.; Feng, D.; Costa-Perez, X.; Schotten, H.D. A Utility-Driven Multi-Queue Admission Control Solution for Network Slicing. In Proceedings of the IEEE INFOCOM 2019— IEEE Conference on Computer Communications, Paris, France, 29 April–2 May 2019; pp. 55–63. [Google Scholar] [CrossRef] [Green Version]
  24. Zhang, K.; Xu, X.; Zhang, J.; Zhang, B.; Tao, X.; Zhang, Y. Dynamic Multiconnectivity Based Joint Scheduling of eMBB and uRLLC in 5G Networks. IEEE Syst. J. 2021, 15, 1333–1343. [Google Scholar] [CrossRef]
  25. Dawaliby, S.; Bradai, A.; Pousset, Y. Distributed Network Slicing in Large Scale IoT Based on Coalitional Multi-Game Theory. IEEE Trans. Netw. Serv. Manag. 2019, 16, 1567–1580. [Google Scholar] [CrossRef]
  26. Zhang, B.; Xu, X.; Zhang, K.; Zhang, J.; Guan, H.; Zhang, Y.; Zhang, Y.; Zheng, N.; Teng, Y. Goodput-Aware Traffic Splitting Scheme with Non-ideal Backhaul for 5G-LTE Multi-Connectivity. In Proceedings of the 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco, 15–18 April 2019; pp. 1–6. [Google Scholar] [CrossRef]
  27. China Unicom 5G Network Slicing White Paper; China United Communications Corporation Network Technology Research Institute: Beijing, China, 23 March 2021.
  28. Huawei QoS Technical White Paper; Huawei Technologies Co.: Shenzhen, China, 5 July 2021.
  29. Liu, L.; Zhou, Y.; Yuan, J.; Zhuang, W.; Wang, Y. Economically Optimal MS Association for Multimedia Content Delivery in Cache-Enabled Heterogeneous Cloud Radio Access Networks. IEEE J. Sel. Areas Commun. 2019, 37, 1584–1593. [Google Scholar] [CrossRef]
  30. Li, J.; Yang, Q.; Yang, J.; Qin, M.; Kwak, K.S. User perceived QoS provisioning for video streaming in wireless OFDMA systems: Admission control and resource allocation. IEEE Access. 2018, 6, 44747–44762. [Google Scholar] [CrossRef]
Figure 1. Network slicing service distribution diagram.
Figure 1. Network slicing service distribution diagram.
Sensors 23 05989 g001
Figure 2. Access control schematic.
Figure 2. Access control schematic.
Sensors 23 05989 g002
Figure 3. Degree of affiliation: (a) Slice 1 and (b) Slice 2.
Figure 3. Degree of affiliation: (a) Slice 1 and (b) Slice 2.
Sensors 23 05989 g003
Figure 4. User affiliation with joint consideration of bandwidth and latency: (a) Slice 1 and (b) Slice 2.
Figure 4. User affiliation with joint consideration of bandwidth and latency: (a) Slice 1 and (b) Slice 2.
Sensors 23 05989 g004
Figure 5. Impact of different numbers of fuzzy users on user access.
Figure 5. Impact of different numbers of fuzzy users on user access.
Sensors 23 05989 g005
Figure 6. Impact of different numbers of fuzzy users on user access.
Figure 6. Impact of different numbers of fuzzy users on user access.
Sensors 23 05989 g006
Figure 7. Impact of different numbers of fuzzy users on user access.
Figure 7. Impact of different numbers of fuzzy users on user access.
Sensors 23 05989 g007
Table 1. QoS metrics [27,28].
Table 1. QoS metrics [27,28].
Business TypeSpeedPTime Delay LimitReliability
Video teleconferencingHigh speed50 msMust be reliably transmitted
E-commerceAppropriate speed100 msMust be reliably transmitted
EmailLow speedNADo your best
HTML web browsingVariable speed requirementsNADo your best
Autopilot>100 Mbps<10 msMust be reliably transmitted
ARHigh speed<20 ms
Primary immersion20 Mbps>40 ms
Partial immersion100 Mbps–1 Gbps<30 ms
Deep immersion1–4 Gps<13 ms
Total immersion>4 Gps<8 ms
Table 2. Simulation parameter settings.
Table 2. Simulation parameter settings.
Parameter SettingsParameter Values
Transmitting power1 W
Noise power 10 13  W
Number of users100
Number of slices2
Packet size0.2–0.5 M
Average arrival rate2000 pps
User rate interval[40, 100] Mb/s
User time delay interval[130, 160] ms
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, S.; Yan, Y.; Ji, Y.; Peng, W.; Wan, L.; Zhang, P. Preference-Aware User Access Control Policy in Internet of Things. Sensors 2023, 23, 5989. https://doi.org/10.3390/s23135989

AMA Style

Li S, Yan Y, Ji Y, Peng W, Wan L, Zhang P. Preference-Aware User Access Control Policy in Internet of Things. Sensors. 2023; 23(13):5989. https://doi.org/10.3390/s23135989

Chicago/Turabian Style

Li, Songnong, Yao Yan, Yongliang Ji, Wenxin Peng, Lingyun Wan, and Puning Zhang. 2023. "Preference-Aware User Access Control Policy in Internet of Things" Sensors 23, no. 13: 5989. https://doi.org/10.3390/s23135989

APA Style

Li, S., Yan, Y., Ji, Y., Peng, W., Wan, L., & Zhang, P. (2023). Preference-Aware User Access Control Policy in Internet of Things. Sensors, 23(13), 5989. https://doi.org/10.3390/s23135989

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop