首页 > 最新文献

EURASIP Journal on Wireless Communications and Networking最新文献

英文 中文
A computationally intelligent framework for traffic engineering and congestion management in software-defined network (SDN) 用于软件定义网络(SDN)中流量工程和拥塞管理的计算智能框架
IF 2.6 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-08-19 DOI: 10.1186/s13638-024-02392-2
L. Leo Prasanth, E. Uma

Software-defined networking (SDN) revolutionizes network administration by centralizing control and decoupling the data plane from the control plane. Despite its advantages, the escalating volume of network traffic induces congestion at nodes, adversely affecting routing quality and overall performance. Addressing congestion has become imperative due to its emergence as a fundamental challenge in network management. Previous strategies often faced drawbacks in handling congestion, with issues arising from the inability to efficiently manage heavy packet surges in specific network regions. In response, this research introduces a novel approach integrating a multiplicative gated recurrent neural network with a congestion-aware hunter prey optimization (HPO) algorithm for effective traffic management in SDN. The framework leverages machine learning and deep learning techniques, acknowledged for their proficiency in processing traffic data. Comparative simulations showcase the congestion-aware HPO algorithm's superiority, achieving a normalized throughput 3.4–7.6% higher than genetic algorithm (GA) and particle swarm optimization (PSO) alternatives. Notably, the proposed framework significantly reduces data transmission delays by 58–65% compared to the GA and PSO algorithms. This research not only contributes a state-of-the-art solution but also addresses drawbacks observed in existing methodologies, thereby advancing the field of traffic engineering and congestion management in SDN. The proposed framework demonstrates notable enhancements in both throughput and latency, providing a more robust foundation for future SDN implementations.

软件定义网络(SDN)通过集中控制和将数据平面与控制平面解耦,彻底改变了网络管理。尽管软件定义网络具有诸多优势,但不断攀升的网络流量会导致节点拥塞,从而对路由质量和整体性能造成不利影响。由于拥塞已成为网络管理中的一项基本挑战,因此解决拥塞问题已势在必行。以往的策略在处理拥塞问题时往往存在缺陷,无法有效管理特定网络区域的大量数据包激增。为此,本研究引入了一种新方法,将乘法门控递归神经网络与拥塞感知猎人猎物优化(HPO)算法整合在一起,用于在 SDN 中实现有效的流量管理。该框架利用了机器学习和深度学习技术,它们在处理流量数据方面的能力已得到公认。对比仿真显示了拥塞感知 HPO 算法的优越性,其正常化吞吐量比遗传算法(GA)和粒子群优化(PSO)高出 3.4-7.6%。值得注意的是,与遗传算法和粒子群优化算法相比,所提出的框架大大减少了 58-65% 的数据传输延迟。这项研究不仅提供了最先进的解决方案,还解决了现有方法中存在的弊端,从而推动了 SDN 中流量工程和拥塞管理领域的发展。所提出的框架在吞吐量和延迟方面都有显著提升,为未来的 SDN 实施奠定了更坚实的基础。
{"title":"A computationally intelligent framework for traffic engineering and congestion management in software-defined network (SDN)","authors":"L. Leo Prasanth, E. Uma","doi":"10.1186/s13638-024-02392-2","DOIUrl":"https://doi.org/10.1186/s13638-024-02392-2","url":null,"abstract":"<p>Software-defined networking (SDN) revolutionizes network administration by centralizing control and decoupling the data plane from the control plane. Despite its advantages, the escalating volume of network traffic induces congestion at nodes, adversely affecting routing quality and overall performance. Addressing congestion has become imperative due to its emergence as a fundamental challenge in network management. Previous strategies often faced drawbacks in handling congestion, with issues arising from the inability to efficiently manage heavy packet surges in specific network regions. In response, this research introduces a novel approach integrating a multiplicative gated recurrent neural network with a congestion-aware hunter prey optimization (HPO) algorithm for effective traffic management in SDN. The framework leverages machine learning and deep learning techniques, acknowledged for their proficiency in processing traffic data. Comparative simulations showcase the congestion-aware HPO algorithm's superiority, achieving a normalized throughput 3.4–7.6% higher than genetic algorithm (GA) and particle swarm optimization (PSO) alternatives. Notably, the proposed framework significantly reduces data transmission delays by 58–65% compared to the GA and PSO algorithms. This research not only contributes a state-of-the-art solution but also addresses drawbacks observed in existing methodologies, thereby advancing the field of traffic engineering and congestion management in SDN. The proposed framework demonstrates notable enhancements in both throughput and latency, providing a more robust foundation for future SDN implementations.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"25 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating MEV attacks with a two-tiered architecture utilizing verifiable decryption 利用可验证解密的双层架构缓解 MEV 攻击
IF 2.6 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-08-13 DOI: 10.1186/s13638-024-02390-4
Mustafa Ibrahim Alnajjar, Mehmet Sabir Kiraz, Ali Al-Bayatti, Suleyman Kardas

A distributed ledger is a shared and synchronized database across multiple designated nodes, often referred to as miners, validators, or peers. These nodes record, distribute, and access data to ensure security and transparency. However, these nodes can be compromised and manipulated by selectively choosing which user transactions to include, exclude, or reorder, thereby gaining an unfair advantage. This is known as a miner/maximal extractable value (MEV) attack. Existing solutions can be classified into various categories, such as MEV auction platforms and time-based ordering properties, which rely on private transaction Mempools. In this paper, we first identify some architectural weaknesses inherent in the latest proposals that divide the block creation and execution roles into separate functions: block builders and block executors. The existing schemes mainly suffer from the verifiability of the decryption process, where a corrupted builder or executor can simply deny the inclusion of specific targeted transactions by exploiting the fact that all transactions are in plain format. To address this, we propose an enhanced version that incorporates a verifiable decryption process. On a very high level, within our proposal, whenever an Executor or a Builder performs a decryption, the decrypted values must be broadcasted. This enables any entity in the network to publicly verify whether the decryption was executed correctly, thus preventing malicious behavior by either party from going undetected. We also define a new adversary model for MEV and conduct a comprehensive security analysis of our protocol against all kinds of potential adversaries related to MEV. Finally, we present the performance analysis of the proposed solution.

分布式账本是多个指定节点(通常称为矿工、验证器或对等节点)共享和同步的数据库。这些节点记录、分发和访问数据,以确保安全性和透明度。然而,这些节点可能会被破坏和操纵,有选择性地选择包含、排除或重新排序哪些用户交易,从而获得不公平的优势。这就是所谓的矿工/最大可提取值(MEV)攻击。现有的解决方案可分为多种类型,如 MEV 拍卖平台和基于时间的排序属性,它们都依赖于私有交易 Mempool。在本文中,我们首先确定了最新方案中固有的一些架构缺陷,这些方案将区块创建和执行角色分为不同的功能:区块创建者和区块执行者。现有方案的主要缺陷在于解密过程的可验证性,在这种情况下,被破坏的构建者或执行者可以利用所有交易都是明文格式这一事实,简单地拒绝包含特定的目标交易。为了解决这个问题,我们提出了一个包含可验证解密过程的增强版本。从高层次上讲,在我们的建议中,每当执行者或构建者执行解密时,解密后的值必须进行广播。这使得网络中的任何实体都能公开验证解密是否正确执行,从而防止任何一方的恶意行为不被发现。我们还为 MEV 定义了一个新的对手模型,并针对与 MEV 相关的各种潜在对手对我们的协议进行了全面的安全分析。最后,我们介绍了所提解决方案的性能分析。
{"title":"Mitigating MEV attacks with a two-tiered architecture utilizing verifiable decryption","authors":"Mustafa Ibrahim Alnajjar, Mehmet Sabir Kiraz, Ali Al-Bayatti, Suleyman Kardas","doi":"10.1186/s13638-024-02390-4","DOIUrl":"https://doi.org/10.1186/s13638-024-02390-4","url":null,"abstract":"<p>A distributed ledger is a shared and synchronized database across multiple designated nodes, often referred to as miners, validators, or peers. These nodes record, distribute, and access data to ensure security and transparency. However, these nodes can be compromised and manipulated by selectively choosing which user transactions to include, exclude, or reorder, thereby gaining an unfair advantage. This is known as a miner/maximal extractable value (MEV) attack. Existing solutions can be classified into various categories, such as MEV auction platforms and time-based ordering properties, which rely on private transaction Mempools. In this paper, we first identify some architectural weaknesses inherent in the latest proposals that divide the block creation and execution roles into separate functions: block builders and block executors. The existing schemes mainly suffer from the verifiability of the decryption process, where a corrupted builder or executor can simply deny the inclusion of specific targeted transactions by exploiting the fact that all transactions are in plain format. To address this, we propose an enhanced version that incorporates a verifiable decryption process. On a very high level, within our proposal, whenever an Executor or a Builder performs a decryption, the decrypted values must be broadcasted. This enables any entity in the network to publicly verify whether the decryption was executed correctly, thus preventing malicious behavior by either party from going undetected. We also define a new adversary model for MEV and conduct a comprehensive security analysis of our protocol against all kinds of potential adversaries related to MEV. Finally, we present the performance analysis of the proposed solution.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"11 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Floating meta-bubbles: aerial gateway and routing on the sky 漂浮的元气泡:空中网关和空中路由
IF 2.6 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-08-05 DOI: 10.1186/s13638-024-02372-6
Mostafa Salah

Reflecting intelligent surface technology (RIS) is regarded as a key enabler of the sixth-generation (6G) communication system. It provides the ability to reshape radio channels through passively reflecting beams in a reconstructive manner. Furthermore, aerial RIS (ARIS) introduces more flexibility in providing line-of-sight (LOS) links. Unfortunately, most of the related research efforts supposed the system as a planar RIS mounted on a satellite, unmanned aerial vehicle (UAV), or balloon despite reported limitations of planar RISs. The essential problem in designing any planar RIS network resides in mutual orientation and alignment difficulty, especially under random fluctuation of position/orientation due to wind conditions or UAV wobbling in the hover state. So, this paper highlights spherical RIS (bubble) as the optimal choice for aerial beam routing where the orientation/rotation can be completely relaxed. It outperforms planar RIS in terms of RIS networking flexibility, dead zone relaxation, and coverage extension. Consequently, due to the added degrees of freedom, many new deployment scenarios/use cases are recommended such as introducing meta-bubbles as intermediate gateways between satellite and ground nodes and extending network infrastructure installation down to the client level to enhance its visibility and throughput. Simulations demonstrate the superiority of meta-bubbles in minimizing channel loss over successive multi-hop routing.

反射智能表面技术(RIS)被认为是第六代(6G)通信系统的关键推动因素。它能够以重构方式通过被动反射波束重塑无线电信道。此外,空中 RIS(ARIS)在提供视距(LOS)链路方面具有更大的灵活性。遗憾的是,尽管有报告称平面 RIS 存在局限性,但大多数相关研究都认为该系统是安装在卫星、无人机或气球上的平面 RIS。设计任何平面 RIS 网络的根本问题在于相互定位和对齐困难,尤其是在风力条件或无人飞行器悬停状态下摇摆造成位置/方位随机波动的情况下。因此,本文强调球形 RIS(气泡)是空中光束路由的最佳选择,其定向/旋转可以完全放宽。在路由系统组网灵活性、死区放松和覆盖范围扩展方面,球形路由系统优于平面路由系统。因此,由于增加了自由度,建议采用许多新的部署方案/用例,例如引入元气泡作为卫星和地面节点之间的中间网关,以及将网络基础设施安装延伸到客户端一级,以提高其可见性和吞吐量。仿真结果表明,与连续多跳路由相比,元气泡在最大限度减少信道损耗方面更具优势。
{"title":"Floating meta-bubbles: aerial gateway and routing on the sky","authors":"Mostafa Salah","doi":"10.1186/s13638-024-02372-6","DOIUrl":"https://doi.org/10.1186/s13638-024-02372-6","url":null,"abstract":"<p>Reflecting intelligent surface technology (RIS) is regarded as a key enabler of the sixth-generation (6G) communication system. It provides the ability to reshape radio channels through passively reflecting beams in a reconstructive manner. Furthermore, aerial RIS (ARIS) introduces more flexibility in providing line-of-sight (LOS) links. Unfortunately, most of the related research efforts supposed the system as a planar RIS mounted on a satellite, unmanned aerial vehicle (UAV), or balloon despite reported limitations of planar RISs. The essential problem in designing any planar RIS network resides in mutual orientation and alignment difficulty, especially under random fluctuation of position/orientation due to wind conditions or UAV wobbling in the hover state. So, this paper highlights spherical RIS (bubble) as the optimal choice for aerial beam routing where the orientation/rotation can be completely relaxed. It outperforms planar RIS in terms of RIS networking flexibility, dead zone relaxation, and coverage extension. Consequently, due to the added degrees of freedom, many new deployment scenarios/use cases are recommended such as introducing meta-bubbles as intermediate gateways between satellite and ground nodes and extending network infrastructure installation down to the client level to enhance its visibility and throughput. Simulations demonstrate the superiority of meta-bubbles in minimizing channel loss over successive multi-hop routing.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"51 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141938813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Gaussian phase noise effects in DFT-s-OFDM systems for sub-THz transmissions 亚千赫传输 DFT-s-OFDM 系统中的高斯相位噪声效应分析
IF 2.6 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-30 DOI: 10.1186/s13638-024-02350-y
Yaya Bello, Jean-Baptiste Doré, David Demmer

The future generations of communication technologies envision the transmission of signals across the millimeter wave and sub-THz spectrums. However, the characteristics of the propagation channel at such high frequencies differ from what is observed in the conventional low-frequency spectrum with for instance, the apparition of stronger phase noise (PN) induced by the Radio Frequency (RF) transceivers and more especially by the oscillators. That is why there is growing interest in evaluating and adapting the 5G new radio (5G-NR) physical layer to the presence of PN. This article is dedicated to the study of discrete Fourier transform-spread-Orthogonal Frequency Division Multiplexing (DFT-s-OFDM) under uncorrelated Gaussian PN (GPN) impairments. We show that the presence of GPN induces two distortions: (i) a frequency-dependent random rotation of data, namely the subcarrier phase error (SPE) and (ii) a frequency-dependent intercarrier interference (ICI) that are analytically expressed. Then, we investigate the design of the adapted and optimal detection criterion according to the baseband model we derived in this paper. We demonstrate that (i) the proposed polar detector outperforms the conventional Euclidean detector and (ii) contrary to legacy OFDM, DFT-s-OFDM is a promising solution when strong GPN is involved.

未来的通信技术将在毫米波和亚千赫频谱上传输信号。然而,这种高频率的传播信道特性与传统低频频谱不同,例如,射频(RF)收发器,尤其是振荡器会产生较强的相位噪声(PN)。因此,人们对评估和调整 5G 新无线电(5G-NR)物理层以适应 PN 的存在越来越感兴趣。本文致力于研究非相关高斯 PN(GPN)损伤下的离散傅里叶变换-传播-正交频分复用(DFT-s-OFDM)。我们证明,GPN 的存在会引起两种失真:(i) 与频率相关的数据随机旋转,即子载波相位误差 (SPE);(ii) 与频率相关的载波间干扰 (ICI),这两种失真都可以通过分析来表示。然后,我们根据本文推导出的基带模型,研究了适应性最优检测准则的设计。我们证明:(i) 所提出的极性检测器优于传统的欧几里得检测器;(ii) 与传统的 OFDM 相反,当涉及强 GPN 时,DFT-s-OFDM 是一种很有前途的解决方案。
{"title":"Analysis of Gaussian phase noise effects in DFT-s-OFDM systems for sub-THz transmissions","authors":"Yaya Bello, Jean-Baptiste Doré, David Demmer","doi":"10.1186/s13638-024-02350-y","DOIUrl":"https://doi.org/10.1186/s13638-024-02350-y","url":null,"abstract":"<p>The future generations of communication technologies envision the transmission of signals across the millimeter wave and sub-THz spectrums. However, the characteristics of the propagation channel at such high frequencies differ from what is observed in the conventional low-frequency spectrum with for instance, the apparition of stronger phase noise (PN) induced by the Radio Frequency (RF) transceivers and more especially by the oscillators. That is why there is growing interest in evaluating and adapting the 5G new radio (5G-NR) physical layer to the presence of PN. This article is dedicated to the study of discrete Fourier transform-spread-Orthogonal Frequency Division Multiplexing (DFT-s-OFDM) under uncorrelated Gaussian PN (GPN) impairments. We show that the presence of GPN induces two distortions: (i) a frequency-dependent random rotation of data, namely the subcarrier phase error (SPE) and (ii) a frequency-dependent intercarrier interference (ICI) that are analytically expressed. Then, we investigate the design of the adapted and optimal detection criterion according to the baseband model we derived in this paper. We demonstrate that (i) the proposed polar detector outperforms the conventional Euclidean detector and (ii) contrary to legacy OFDM, DFT-s-OFDM is a promising solution when strong GPN is involved.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"65 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141872602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beamforming design for Star-RIS assisted secure wireless communication system under hardware impairments 硬件损伤条件下 Star-RIS 辅助安全无线通信系统的波束成形设计
IF 2.6 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-30 DOI: 10.1186/s13638-024-02389-x
Seyedeh Reyhane Shahcheragh, Kamal Mohamed-Pour

Simultaneous transmission and reflection reconfigurable intelligent surface (Star-RIS) has been recently introduced as one of the hopeful technologies in future communications. In this work, we investigate a beamforming design for Star-RIS-assisted secure wireless communications with two practical protocols, namely energy splitting (ES) and mode switching (MS). We assume that our transceivers are not ideal and have residual hardware impairments that lead to distortion noise. We aim to maximize the total secrecy rate by optimizing the beamforming in BS and Star-RIS under the limitation of transmission power consumption. The proposed non-convex optimization problem is solved via successive convex approximation and alternating optimization.

同时传输和反射可重构智能表面(Star-RIS)最近作为未来通信的希望技术之一被提出。在这项工作中,我们研究了 Star-RIS 辅助安全无线通信的波束成形设计,并采用了两种实用协议,即能量分割(ES)和模式切换(MS)。我们假设我们的收发器并不理想,存在导致失真噪声的残余硬件损伤。我们的目标是在传输功耗的限制下,通过优化 BS 和 Star-RIS 的波束成形,最大限度地提高总保密率。所提出的非凸优化问题是通过连续凸近似和交替优化来解决的。
{"title":"Beamforming design for Star-RIS assisted secure wireless communication system under hardware impairments","authors":"Seyedeh Reyhane Shahcheragh, Kamal Mohamed-Pour","doi":"10.1186/s13638-024-02389-x","DOIUrl":"https://doi.org/10.1186/s13638-024-02389-x","url":null,"abstract":"<p>Simultaneous transmission and reflection reconfigurable intelligent surface (Star-RIS) has been recently introduced as one of the hopeful technologies in future communications. In this work, we investigate a beamforming design for Star-RIS-assisted secure wireless communications with two practical protocols, namely energy splitting (ES) and mode switching (MS). We assume that our transceivers are not ideal and have residual hardware impairments that lead to distortion noise. We aim to maximize the total secrecy rate by optimizing the beamforming in BS and Star-RIS under the limitation of transmission power consumption. The proposed non-convex optimization problem is solved via successive convex approximation and alternating optimization.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"5 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141873441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical layer secure transmission in the coexistence of V2I and V2V with RIS assistance 在有 RIS 辅助的 V2I 和 V2V 共存情况下的物理层安全传输
IF 2.6 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-19 DOI: 10.1186/s13638-024-02387-z
Zerong Tang, Tiecheng Song, Jing Hu

The security of vehicle communication becomes increasingly important due to the transmission requirement of large-scale security and privacy data in the Internet of Vehicles (IoV). This paper investigates the physical layer secure transmission with reconfigurable intelligent surface (RIS) assistance in the coexistence of vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V). It establishes a communication model for physical layer secure transmission where the eavesdropping user exists. Based on this model, we propose a V2I physical layer secure transmission rate (PLSTR) maximization problem and solve it by employing an alternating optimization algorithm based on generalized Rayleigh entropy and semi-definite relaxation programming so as to obtain optimal V2I base station precoding and RIS reflection coefficient matrix. Simulation results further validate the superiority of the proposed algorithm and analyze the impact of relevant parameters on system performance.

由于车联网(IoV)需要传输大量安全和隐私数据,车辆通信的安全性变得越来越重要。本文研究了在车对基础设施(V2I)和车对车(V2V)共存的情况下,利用可重构智能表面(RIS)辅助的物理层安全传输。它为存在窃听用户的物理层安全传输建立了一个通信模型。基于该模型,我们提出了 V2I 物理层安全传输速率(PLSTR)最大化问题,并通过采用基于广义瑞利熵和半无限松弛编程的交替优化算法来解决该问题,从而获得最优的 V2I 基站预编码和 RIS 反射系数矩阵。仿真结果进一步验证了所提算法的优越性,并分析了相关参数对系统性能的影响。
{"title":"Physical layer secure transmission in the coexistence of V2I and V2V with RIS assistance","authors":"Zerong Tang, Tiecheng Song, Jing Hu","doi":"10.1186/s13638-024-02387-z","DOIUrl":"https://doi.org/10.1186/s13638-024-02387-z","url":null,"abstract":"<p>The security of vehicle communication becomes increasingly important due to the transmission requirement of large-scale security and privacy data in the Internet of Vehicles (IoV). This paper investigates the physical layer secure transmission with reconfigurable intelligent surface (RIS) assistance in the coexistence of vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V). It establishes a communication model for physical layer secure transmission where the eavesdropping user exists. Based on this model, we propose a V2I physical layer secure transmission rate (PLSTR) maximization problem and solve it by employing an alternating optimization algorithm based on generalized Rayleigh entropy and semi-definite relaxation programming so as to obtain optimal V2I base station precoding and RIS reflection coefficient matrix. Simulation results further validate the superiority of the proposed algorithm and analyze the impact of relevant parameters on system performance.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"52 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141737154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital twin based DDPG reinforcement learning for sum-rate maximization of AI-UAV communications 基于数字孪生的 DDPG 强化学习,实现人工智能-无人机通信的总速率最大化
IF 2.6 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-18 DOI: 10.1186/s13638-024-02386-0
Jeongyoon Lee, Taeje Park, Wonjin Sung

Construction of wireless infrastructure using unmanned aerial vehicle (UAV) can effectively expand the coverage and support high-density traffic of next-generation communication systems. Designing wireless systems including UAVs as aerial base stations (ABSs) is a challenging task, due to the mobility of ABSs causing time-varying nature of environmental surroundings and relative propagation paths to user equipment (UE) devices. Therefore, it is essential to have an accurate estimate of the channel for varying positioning of the UAVs. In this paper, we propose to adopt a digital twin based performance evaluation procedure for wireless systems including ABSs, providing enhanced accuracy of channel modeling for specific target deployment areas. Using ray-tracing channel models reflecting detailed building and terrain information of the transmission environment, an UAV position optimization algorithm based on reinforcement learning is presented. By utilizing deep deterministic policy gradient (DDPG), the proposed algorithm calculates the overall throughput in the digital twin and determines the desired states of the UAV. Performance evaluation results demonstrate the trajectory training ability of the algorithm and the performance advantage of the system with a reduced amount of shadow area compared to those with ground base stations (GBSs).

利用无人飞行器(UAV)建设无线基础设施可有效扩大下一代通信系统的覆盖范围并支持高密度通信。由于无人机作为空中基站(ABS)具有移动性,导致周围环境和到用户设备(UE)的相对传播路径随时间变化,因此设计包括无人机在内的无线系统是一项具有挑战性的任务。因此,必须对无人机的不同定位进行准确的信道估计。在本文中,我们建议采用基于数字孪生的无线系统性能评估程序,为特定目标部署区域提供更准确的信道建模。利用光线跟踪信道模型反映传输环境的详细建筑和地形信息,提出了一种基于强化学习的无人机位置优化算法。通过利用深度确定性策略梯度(DDPG),所提出的算法计算了数字孪生中的总体吞吐量,并确定了无人机的理想状态。性能评估结果表明了算法的轨迹训练能力,以及与地面基站(GBS)相比,系统在减少阴影面积方面的性能优势。
{"title":"Digital twin based DDPG reinforcement learning for sum-rate maximization of AI-UAV communications","authors":"Jeongyoon Lee, Taeje Park, Wonjin Sung","doi":"10.1186/s13638-024-02386-0","DOIUrl":"https://doi.org/10.1186/s13638-024-02386-0","url":null,"abstract":"<p>Construction of wireless infrastructure using unmanned aerial vehicle (UAV) can effectively expand the coverage and support high-density traffic of next-generation communication systems. Designing wireless systems including UAVs as aerial base stations (ABSs) is a challenging task, due to the mobility of ABSs causing time-varying nature of environmental surroundings and relative propagation paths to user equipment (UE) devices. Therefore, it is essential to have an accurate estimate of the channel for varying positioning of the UAVs. In this paper, we propose to adopt a digital twin based performance evaluation procedure for wireless systems including ABSs, providing enhanced accuracy of channel modeling for specific target deployment areas. Using ray-tracing channel models reflecting detailed building and terrain information of the transmission environment, an UAV position optimization algorithm based on reinforcement learning is presented. By utilizing deep deterministic policy gradient (DDPG), the proposed algorithm calculates the overall throughput in the digital twin and determines the desired states of the UAV. Performance evaluation results demonstrate the trajectory training ability of the algorithm and the performance advantage of the system with a reduced amount of shadow area compared to those with ground base stations (GBSs).</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"49 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141745469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-user directional modulation with reconfigurable holographic surfaces 利用可重构全息表面进行多用户定向调制
IF 2.6 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-11 DOI: 10.1186/s13638-024-02383-3
M. Yaser Yağan, Samed Keşir, İbrahim Hökelek, Ali E. Pusane, Ali Görçin

Large intelligent surfaces arise as an emerging technology and critical building block for sixth-generation (6G) wireless networks. Reconfigurable holographic surfaces (RHSs) have been attracting significant attention recently as active antenna arrays with the capability of forming narrow beams at low cost and complexity. This paper introduces the directional modulation (DM) concept for RHS, where a large number of elements are exploited to control not only the signal’s power at the receiver but also its phase. Thus, a novel DM algorithm is proposed for RHS enables modulating a carrier wave to transmit information toward specific directions while broadcasting arbitrary signals toward other directions. Error vector magnitude results are reported for multiple users, where the directions of two users with respect to the RHS are varied. Mutual information result is also provided for 6 users to demonstrate the application of RHS for the physical layer security. Results are highly promising for future low-cost and secure spatially multiplexed communications.

大型智能表面是一种新兴技术,也是第六代(6G)无线网络的关键构件。可重构全息表面(RHS)作为有源天线阵列,能够以较低的成本和复杂度形成窄波束,近来备受关注。本文介绍了 RHS 的定向调制(DM)概念,即利用大量元素不仅控制接收器的信号功率,还控制其相位。因此,本文为 RHS 提出了一种新颖的 DM 算法,通过调制载波向特定方向传输信息,同时向其他方向广播任意信号。报告了多个用户的误差矢量大小结果,其中两个用户相对于 RHS 的方向是不同的。还提供了 6 个用户的互信息结果,以展示 RHS 在物理层安全方面的应用。这些结果对未来低成本、安全的空间多路复用通信大有可为。
{"title":"Multi-user directional modulation with reconfigurable holographic surfaces","authors":"M. Yaser Yağan, Samed Keşir, İbrahim Hökelek, Ali E. Pusane, Ali Görçin","doi":"10.1186/s13638-024-02383-3","DOIUrl":"https://doi.org/10.1186/s13638-024-02383-3","url":null,"abstract":"<p>Large intelligent surfaces arise as an emerging technology and critical building block for sixth-generation (6G) wireless networks. Reconfigurable holographic surfaces (RHSs) have been attracting significant attention recently as active antenna arrays with the capability of forming narrow beams at low cost and complexity. This paper introduces the directional modulation (DM) concept for RHS, where a large number of elements are exploited to control not only the signal’s power at the receiver but also its phase. Thus, a novel DM algorithm is proposed for RHS enables modulating a carrier wave to transmit information toward specific directions while broadcasting arbitrary signals toward other directions. Error vector magnitude results are reported for multiple users, where the directions of two users with respect to the RHS are varied. Mutual information result is also provided for 6 users to demonstrate the application of RHS for the physical layer security. Results are highly promising for future low-cost and secure spatially multiplexed communications.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"58 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141609876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A powerful adversary model and corresponding OTP time slot allocation scheme in RIS-assisted physical layer key generation RIS 辅助物理层密钥生成中的强大对手模型和相应 OTP 时隙分配方案
IF 2.6 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-11 DOI: 10.1186/s13638-024-02384-2
Liquan Chen, Yufan Song, Wanting Ma, Tianyu Lu, Peng Zhang, Liang Chen

Physical layer key generation (PLKG) is a technique of information-theoretic security to tackle the problem of key distribution between resource-constrained legitimate users and is a promising candidate for the one time pad (OTP) technique. However, in quasi-static, the key rate is greatly limited due to low entropy. Reconfigurable intelligent surface (RIS) is introduced to adaptively reconfigure the radio environment. However, how to allocate time slots in the OTP to counter the increasingly powerful adversary model is an urgent problem to be solved. In this paper, we propose a very powerful adversary model and give an attack strategy called eavesdropping channel search, which allows Eve to use its search and eavesdropping capabilities to maximize the probability of successful attacks. Meanwhile, we propose a time slot allocation algorithm in the OTP to ensure the security of the key. Simulations validate that our proposed attack strategy is more powerful than any existing adversary model and our proposed time slot allocation algorithm does not have any security loss.

物理层密钥生成(PLKG)是一种信息论安全技术,用于解决资源受限的合法用户之间的密钥分配问题,也是一次性密码(OTP)技术的一种很有前途的候选技术。然而,在准静态中,由于熵值较低,密钥率受到很大限制。可重构智能表面(RIS)被引入用来自适应地重构无线电环境。然而,如何在 OTP 中分配时隙以应对日益强大的对手模型是一个亟待解决的问题。在本文中,我们提出了一个非常强大的对手模型,并给出了一种名为窃听信道搜索的攻击策略,让夏娃利用其搜索和窃听能力最大限度地提高攻击成功的概率。同时,我们在 OTP 中提出了一种时隙分配算法,以确保密钥的安全性。仿真验证了我们提出的攻击策略比任何现有的对手模型都更强大,而且我们提出的时隙分配算法不会有任何安全损失。
{"title":"A powerful adversary model and corresponding OTP time slot allocation scheme in RIS-assisted physical layer key generation","authors":"Liquan Chen, Yufan Song, Wanting Ma, Tianyu Lu, Peng Zhang, Liang Chen","doi":"10.1186/s13638-024-02384-2","DOIUrl":"https://doi.org/10.1186/s13638-024-02384-2","url":null,"abstract":"<p>Physical layer key generation (PLKG) is a technique of information-theoretic security to tackle the problem of key distribution between resource-constrained legitimate users and is a promising candidate for the one time pad (OTP) technique. However, in quasi-static, the key rate is greatly limited due to low entropy. Reconfigurable intelligent surface (RIS) is introduced to adaptively reconfigure the radio environment. However, how to allocate time slots in the OTP to counter the increasingly powerful adversary model is an urgent problem to be solved. In this paper, we propose a very powerful adversary model and give an attack strategy called eavesdropping channel search, which allows Eve to use its search and eavesdropping capabilities to maximize the probability of successful attacks. Meanwhile, we propose a time slot allocation algorithm in the OTP to ensure the security of the key. Simulations validate that our proposed attack strategy is more powerful than any existing adversary model and our proposed time slot allocation algorithm does not have any security loss.\u0000</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"39 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141609877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive pulse shaping for OFDM RadCom systems in highly dynamic scenarios 高动态场景下 OFDM RadCom 系统的自适应脉冲整形
IF 2.6 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-09 DOI: 10.1186/s13638-024-02370-8
Haonan He, Tianhao Liang, Tingting Zhang

Due to the spectrum and complexity efficiency, the integrated radar and communications (RadCom) systems have been widely favored, in which orthogonal frequency division multiplexing (OFDM) is the most popular signal to conduct the two functions simultaneously. However, an unoptimized pulse could suffer from severe inter-carrier interference (ICI) and high out-of-band emission (OOBE), which greatly degrades the system performance. In this paper, we introduce the pulse shaping scheme dedicated to RadCom systems, in which both transmitter and receiver can adaptively design pulses with the assistance of radar estimation. We first optimize the transmitting pulse with the weighted sum of signal-to-interference-plus-noise ratio (SINR) and OOBE by employing the popular genetic algorithm. Then, we design an improved-matched pulse at the receiver for maximizing the SINR with the fmincon solver. In this way, they both utilize the readily available radar information and keep the pulse optimal even in highly dynamic scenarios, which makes the most of RadCom systems while avoiding the overhead of channel estimation and feedback. Simulations prove the feasibility of proposed scheme and reveal that the radar image and communications SINR stay close to their optimum in most cases with much lower OOBE. An improved-matched pulse can further improve the communications performance when severe ICI occurs compared with a matched pulse.

由于频谱和复杂性效率高,集成雷达和通信(RadCom)系统受到广泛青睐,其中正交频分复用(OFDM)是同时实现两种功能的最常用信号。然而,未经优化的脉冲会产生严重的载波间干扰(ICI)和高带外发射(OOBE),从而大大降低系统性能。在本文中,我们介绍了 RadCom 系统专用的脉冲整形方案,在该方案中,发射机和接收机都可以在雷达估计的帮助下自适应地设计脉冲。我们首先利用流行的遗传算法,通过信号干扰加噪声比(SINR)和 OOBE 的加权和来优化发射脉冲。然后,我们利用 fmincon 求解器在接收器处设计改进的匹配脉冲,以最大化 SINR。这样,它们既能利用现成的雷达信息,又能在高度动态的情况下保持最佳脉冲,从而充分利用 RadCom 系统,同时避免信道估计和反馈的开销。仿真证明了所提方案的可行性,并显示雷达图像和通信 SINR 在大多数情况下都接近最佳值,OOBE 更低。与匹配脉冲相比,当出现严重 ICI 时,改进匹配脉冲可进一步提高通信性能。
{"title":"Adaptive pulse shaping for OFDM RadCom systems in highly dynamic scenarios","authors":"Haonan He, Tianhao Liang, Tingting Zhang","doi":"10.1186/s13638-024-02370-8","DOIUrl":"https://doi.org/10.1186/s13638-024-02370-8","url":null,"abstract":"<p>Due to the spectrum and complexity efficiency, the integrated radar and communications (RadCom) systems have been widely favored, in which orthogonal frequency division multiplexing (OFDM) is the most popular signal to conduct the two functions simultaneously. However, an unoptimized pulse could suffer from severe inter-carrier interference (ICI) and high out-of-band emission (OOBE), which greatly degrades the system performance. In this paper, we introduce the pulse shaping scheme dedicated to RadCom systems, in which both transmitter and receiver can adaptively design pulses with the assistance of radar estimation. We first optimize the transmitting pulse with the weighted sum of signal-to-interference-plus-noise ratio (SINR) and OOBE by employing the popular genetic algorithm. Then, we design an improved-matched pulse at the receiver for maximizing the SINR with the fmincon solver. In this way, they both utilize the readily available radar information and keep the pulse optimal even in highly dynamic scenarios, which makes the most of RadCom systems while avoiding the overhead of channel estimation and feedback. Simulations prove the feasibility of proposed scheme and reveal that the radar image and communications SINR stay close to their optimum in most cases with much lower OOBE. An improved-matched pulse can further improve the communications performance when severe ICI occurs compared with a matched pulse.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"20 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141568118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
EURASIP Journal on Wireless Communications and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1