Pub Date : 2023-10-20DOI: 10.1186/s13638-023-02318-4
Wided Ben Daoud, Salwa Othmen, Monia Hamdi, Radhia Khdhir, Habib Hamam
{"title":"Correction: Fog computing network security based on resources management","authors":"Wided Ben Daoud, Salwa Othmen, Monia Hamdi, Radhia Khdhir, Habib Hamam","doi":"10.1186/s13638-023-02318-4","DOIUrl":"https://doi.org/10.1186/s13638-023-02318-4","url":null,"abstract":"","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135570628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-18DOI: 10.1186/s13638-023-02315-7
Chang Zhao, Linghao Zhang
Abstract The rapid development of infinite networks and information technology has promoted the wide deployment and rapid growth of intelligent interactive devices. However, at the same time, touch interaction technology also faces many challenges such as lack of precision. This study combines federated learning with LayerGesture technology to optimize and design a touch interaction system with higher interaction accuracy and applies it to practice. The analysis results show that with the increase in the number of iterations of the federated model, the accuracy of the human–computer recognition interaction and the amount of information contained in it increases, and the accuracy curve reaches stability at about 2800 times and is at the optimal interaction adaptation. At this point, the loss function also decreases gradually, while the loss factor tends to 0, which verifies the stability of the optimized model. According to the participants’ interaction experience and experimental results, the optimized LayerGesture technique of the federated learning model has an average correctness rate of 90.4% and the lowest average selection time, while the average selection time of LayerGesture in the interaction area at the edge of the screen is 2510 ms and the average correctness rate is 93.60%, which is better than the Shift technique. In addition, the subjective survey results indicated that more participants favored the optimized LayerGesture technique. In summary, this paper’s joint learning algorithm contributes to the recognition effectiveness and efficiency of intelligent interactive systems.
{"title":"Optimized design and application research of smart interactive screen for wireless networks based on federated learning","authors":"Chang Zhao, Linghao Zhang","doi":"10.1186/s13638-023-02315-7","DOIUrl":"https://doi.org/10.1186/s13638-023-02315-7","url":null,"abstract":"Abstract The rapid development of infinite networks and information technology has promoted the wide deployment and rapid growth of intelligent interactive devices. However, at the same time, touch interaction technology also faces many challenges such as lack of precision. This study combines federated learning with LayerGesture technology to optimize and design a touch interaction system with higher interaction accuracy and applies it to practice. The analysis results show that with the increase in the number of iterations of the federated model, the accuracy of the human–computer recognition interaction and the amount of information contained in it increases, and the accuracy curve reaches stability at about 2800 times and is at the optimal interaction adaptation. At this point, the loss function also decreases gradually, while the loss factor tends to 0, which verifies the stability of the optimized model. According to the participants’ interaction experience and experimental results, the optimized LayerGesture technique of the federated learning model has an average correctness rate of 90.4% and the lowest average selection time, while the average selection time of LayerGesture in the interaction area at the edge of the screen is 2510 ms and the average correctness rate is 93.60%, which is better than the Shift technique. In addition, the subjective survey results indicated that more participants favored the optimized LayerGesture technique. In summary, this paper’s joint learning algorithm contributes to the recognition effectiveness and efficiency of intelligent interactive systems.","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"257 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135888268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract The new intelligent factory introduces Time-Sensitive Network into industrial Ethernet to provide real time and deterministic guarantee communication for production system. Since the problem pertaining to data leakage or damage during transmission has increasingly become pronounced, security protection technology has been introduced, but this technology will bring about a delay in user response and a decline in the quality of service. Meanwhile, ensuring the deterministic mixed transmission of time-sensitive and large-bandwidth data traffic supported by the same switching device is a still challenging problem. Therefore, this study proposes a hybrid security scheduling scheme which combines Time-Aware Shaper and cycle specified queuing and forwarding (CSQF). Specifically, the mechanism first adopts various encryption methods for different traffic, and afterward, it reduces its resource occupation by adjusting the sampling period of the time-sensitive traffic. At the same time, it adopts CSQF to schedule the large-bandwidth data traffic, thereby improving the scheduling success rate. According to the experimental results, this scheme enhances network security and network scheduling success rate by up to 51%. The scheduling of mixed traffic in the Time-sensitive Network is realized securely and efficiently.
{"title":"Hybrid traffic security shaping scheme combining TAS and CQSF of time-sensitive networks in smart grid","authors":"Hongting Zhai, Qingrui Zhang, Ruilin Tang, Yantong Zhang, Lili Sun, Qi Zhai, Ruochen Bian, Xinxin He","doi":"10.1186/s13638-023-02278-9","DOIUrl":"https://doi.org/10.1186/s13638-023-02278-9","url":null,"abstract":"Abstract The new intelligent factory introduces Time-Sensitive Network into industrial Ethernet to provide real time and deterministic guarantee communication for production system. Since the problem pertaining to data leakage or damage during transmission has increasingly become pronounced, security protection technology has been introduced, but this technology will bring about a delay in user response and a decline in the quality of service. Meanwhile, ensuring the deterministic mixed transmission of time-sensitive and large-bandwidth data traffic supported by the same switching device is a still challenging problem. Therefore, this study proposes a hybrid security scheduling scheme which combines Time-Aware Shaper and cycle specified queuing and forwarding (CSQF). Specifically, the mechanism first adopts various encryption methods for different traffic, and afterward, it reduces its resource occupation by adjusting the sampling period of the time-sensitive traffic. At the same time, it adopts CSQF to schedule the large-bandwidth data traffic, thereby improving the scheduling success rate. According to the experimental results, this scheme enhances network security and network scheduling success rate by up to 51%. The scheduling of mixed traffic in the Time-sensitive Network is realized securely and efficiently.","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136013712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-11DOI: 10.1186/s13638-023-02309-5
Si-Phu Le, Hong-Nhu Nguyen, Nhat-Tien Nguyen, Cuu Ho Van, Anh-Tu Le, Miroslav Voznak
Abstract In recent years, the development of intelligent reflecting surface (IRS) in wireless communications has enabled control of radio waves to reduce the detrimental impacts of natural wireless propagation. These can achieve significant spectrum and energy efficiency in wireless networks. Non-orthogonal multiple access (NOMA) technology, on the other hand, is predicted to improve the spectrum efficiency of fifth-generation and later wireless networks. Motivated by this reality, we consider the IRS-based NOMA network in the downlink and uplink scenario with a pernicious eavesdropper. Moreover, we investigated the physical layer security (PLS) of the proposed system by invoking the connection outage probability (COP), secrecy outage probability (SOP), and average secrecy rate (ASR) with analytical derivations. The simulation results reveal that (i) it is carried out to validate the analytical formulas, (ii) the number of meta-surfaces in IRS, transmit power at the base station, and power allocation parameters all play an essential role in improving the system performance, and (iii) it demonstrates the superiority of NOMA to the traditional orthogonal multiple access (OMA).
{"title":"Physical layer security analysis of IRS-based downlink and uplink NOMA networks","authors":"Si-Phu Le, Hong-Nhu Nguyen, Nhat-Tien Nguyen, Cuu Ho Van, Anh-Tu Le, Miroslav Voznak","doi":"10.1186/s13638-023-02309-5","DOIUrl":"https://doi.org/10.1186/s13638-023-02309-5","url":null,"abstract":"Abstract In recent years, the development of intelligent reflecting surface (IRS) in wireless communications has enabled control of radio waves to reduce the detrimental impacts of natural wireless propagation. These can achieve significant spectrum and energy efficiency in wireless networks. Non-orthogonal multiple access (NOMA) technology, on the other hand, is predicted to improve the spectrum efficiency of fifth-generation and later wireless networks. Motivated by this reality, we consider the IRS-based NOMA network in the downlink and uplink scenario with a pernicious eavesdropper. Moreover, we investigated the physical layer security (PLS) of the proposed system by invoking the connection outage probability (COP), secrecy outage probability (SOP), and average secrecy rate (ASR) with analytical derivations. The simulation results reveal that (i) it is carried out to validate the analytical formulas, (ii) the number of meta-surfaces in IRS, transmit power at the base station, and power allocation parameters all play an essential role in improving the system performance, and (iii) it demonstrates the superiority of NOMA to the traditional orthogonal multiple access (OMA).","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136210401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-10DOI: 10.1186/s13638-023-02306-8
Amruta A. Nikam, Rupali B. Patil
Abstract This paper aims to introduce a custom-designed multiband planar inverted-F antenna (PIFA) suitable for automotive applications in LTE/5G schemes operating under 6 GHz, as well as Vehicle-to-Everything (V2X) communications. The PIFA antenna has a broad bandwidth capability, resonating from 950 MHz to 6 GHz. The proposed PIFA antenna is divided into three parts: the top, front, and back, resulting in a unique and effective antenna structure. The antenna is fabricated using a substrate made of FR4 material with a dielectric constant of 4.4. The whole measurements of the antenna are 54 × 38 × 25 mm 3 .The proposed PIFA antenna has been tested and has achieved a voltage standing wave ratio (VSWR) of less than 2 across the entire frequency range of 950 MHz to 6 GHz. Additionally, the maximum gain achieved by the antenna is 7.08 dBi at a frequency of 5.5 GHz, 6.81 dBi at 5.2 GHz, and 6.65 dBi at 5.9 GHz. The antenna also achieved a gain of 6.67 dBi at 3.8 GHz and a gain of 3.31 dBi at 1.7 GHz. Overall, this paper presents a well-designed and effective multiband PIFA antenna that is appropriate for use in vehicular applications. The antenna ability to cover a wide range of bandwidth and achieve high gain makes it an excellent candidate for use in LTE/5G systems and V2X communications.
{"title":"Design and development of multiband PIFA antenna for vehicular LTE/5G and V2X communication","authors":"Amruta A. Nikam, Rupali B. Patil","doi":"10.1186/s13638-023-02306-8","DOIUrl":"https://doi.org/10.1186/s13638-023-02306-8","url":null,"abstract":"Abstract This paper aims to introduce a custom-designed multiband planar inverted-F antenna (PIFA) suitable for automotive applications in LTE/5G schemes operating under 6 GHz, as well as Vehicle-to-Everything (V2X) communications. The PIFA antenna has a broad bandwidth capability, resonating from 950 MHz to 6 GHz. The proposed PIFA antenna is divided into three parts: the top, front, and back, resulting in a unique and effective antenna structure. The antenna is fabricated using a substrate made of FR4 material with a dielectric constant of 4.4. The whole measurements of the antenna are 54 × 38 × 25 mm 3 .The proposed PIFA antenna has been tested and has achieved a voltage standing wave ratio (VSWR) of less than 2 across the entire frequency range of 950 MHz to 6 GHz. Additionally, the maximum gain achieved by the antenna is 7.08 dBi at a frequency of 5.5 GHz, 6.81 dBi at 5.2 GHz, and 6.65 dBi at 5.9 GHz. The antenna also achieved a gain of 6.67 dBi at 3.8 GHz and a gain of 3.31 dBi at 1.7 GHz. Overall, this paper presents a well-designed and effective multiband PIFA antenna that is appropriate for use in vehicular applications. The antenna ability to cover a wide range of bandwidth and achieve high gain makes it an excellent candidate for use in LTE/5G systems and V2X communications.","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136356851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-10DOI: 10.1186/s13638-023-02295-8
George C. Alexandropoulos, Dinh-Thuy Phan-Huy, Konstantinos D. Katsanos, Maurizio Crozzoli, Henk Wymeersch, Petar Popovski, Philippe Ratajczak, Yohann Bénédic, Marie-Helene Hamon, Sebastien Herraiz Gonzalez, Placido Mursia, Marco Rossanese, Vincenzo Sciancalepore, Jean-Baptiste Gros, Sergio Terranova, Gabriele Gradoni, Paolo Di Lorenzo, Moustafa Rahal, Benoit Denis, Raffaele D’Errico, Antonio Clemente, Emilio Calvanese Strinati
Abstract Reconfigurable intelligent surfaces (RISs) constitute the key enabler for programmable electromagnetic propagation environments and are lately being considered as a candidate physical-layer technology for the demanding connectivity, reliability, localisation, and sustainability requirements of next-generation wireless networks. In this paper, we first present the deployment scenarios for RIS-enabled smart wireless environments that have been recently designed within the ongoing European Union Horizon 2020 RISE-6G project, as well as a network architecture integrating RISs with existing standardised interfaces. We identify various RIS deployment strategies and sketch the core architectural requirements in terms of RIS control and signalling, depending on the RIS hardware architectures and respective capabilities. Furthermore, we introduce and discuss, with the aid of simulations and reflect array measurements, two novel metrics that emerge in the context of RIS-empowered wireless systems: the RIS bandwidth of influence and the RIS area of influence. Their extensive investigation corroborates the need for careful deployment and planning of the RIS technology in future wireless networks.
{"title":"RIS-enabled smart wireless environments: deployment scenarios, network architecture, bandwidth and area of influence","authors":"George C. Alexandropoulos, Dinh-Thuy Phan-Huy, Konstantinos D. Katsanos, Maurizio Crozzoli, Henk Wymeersch, Petar Popovski, Philippe Ratajczak, Yohann Bénédic, Marie-Helene Hamon, Sebastien Herraiz Gonzalez, Placido Mursia, Marco Rossanese, Vincenzo Sciancalepore, Jean-Baptiste Gros, Sergio Terranova, Gabriele Gradoni, Paolo Di Lorenzo, Moustafa Rahal, Benoit Denis, Raffaele D’Errico, Antonio Clemente, Emilio Calvanese Strinati","doi":"10.1186/s13638-023-02295-8","DOIUrl":"https://doi.org/10.1186/s13638-023-02295-8","url":null,"abstract":"Abstract Reconfigurable intelligent surfaces (RISs) constitute the key enabler for programmable electromagnetic propagation environments and are lately being considered as a candidate physical-layer technology for the demanding connectivity, reliability, localisation, and sustainability requirements of next-generation wireless networks. In this paper, we first present the deployment scenarios for RIS-enabled smart wireless environments that have been recently designed within the ongoing European Union Horizon 2020 RISE-6G project, as well as a network architecture integrating RISs with existing standardised interfaces. We identify various RIS deployment strategies and sketch the core architectural requirements in terms of RIS control and signalling, depending on the RIS hardware architectures and respective capabilities. Furthermore, we introduce and discuss, with the aid of simulations and reflect array measurements, two novel metrics that emerge in the context of RIS-empowered wireless systems: the RIS bandwidth of influence and the RIS area of influence. Their extensive investigation corroborates the need for careful deployment and planning of the RIS technology in future wireless networks.","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136255219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-09DOI: 10.1186/s13638-023-02314-8
Yuanyuan Wu
Abstract The Internet of Things (IoT), which is built on software-defined networking (SDN), employs a paradigm known as channel reassignment. This paradigm has great potential for enhancing the communication capabilities of the network. The traffic loads may be scheduled more effectively with the help of an SDN controller, which allows for the transaction of matching channels via a single connection. The present techniques of channel reassignment, on the other hand, are plagued by problems with optimisation and cooperative multi-channel reassignment, which affect both traffic and routers. In this paper, we provide a framework for SDN–IoT in the cloud that permits multi-channel reassignment and traffic management simultaneously. The multi-channel reassignment based on traffic management is optimised via the use of a deep reinforcement learning technique, which was developed in this paper. We do an analysis of the performance metrics in order to optimise the throughput while simultaneously reducing the rate of packet loss and the amount of delay in the process. This is achieved by distributing the required traffic loads over the linked channels that make up a single connection.
{"title":"Auto scheduling through distributed reinforcement learning in SDN based IoT environment","authors":"Yuanyuan Wu","doi":"10.1186/s13638-023-02314-8","DOIUrl":"https://doi.org/10.1186/s13638-023-02314-8","url":null,"abstract":"Abstract The Internet of Things (IoT), which is built on software-defined networking (SDN), employs a paradigm known as channel reassignment. This paradigm has great potential for enhancing the communication capabilities of the network. The traffic loads may be scheduled more effectively with the help of an SDN controller, which allows for the transaction of matching channels via a single connection. The present techniques of channel reassignment, on the other hand, are plagued by problems with optimisation and cooperative multi-channel reassignment, which affect both traffic and routers. In this paper, we provide a framework for SDN–IoT in the cloud that permits multi-channel reassignment and traffic management simultaneously. The multi-channel reassignment based on traffic management is optimised via the use of a deep reinforcement learning technique, which was developed in this paper. We do an analysis of the performance metrics in order to optimise the throughput while simultaneously reducing the rate of packet loss and the amount of delay in the process. This is achieved by distributing the required traffic loads over the linked channels that make up a single connection.","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135141215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-05DOI: 10.1186/s13638-023-02313-9
Yu Han, Xiaowei Zhu
Abstract The data are sent by the nodes taking part in frequency hopping communications (FHC) utilising carrier frequencies and time slots that are pseudo-randomly assigned. Because of this, a high degree of protection against eavesdropping and anti-interference capabilities is provided. When using FHC in an environment, sharing time and frequency resources, avoiding collisions, and differentiating services are all made more complex as a result of this. A protocol for FHC that is based on dispersed wireless networks is presented by the authors of this research. It is a mechanism for multiple access control, which is prioritised and distributed. The ratio of empty channels metric can be found in the previous sentence. It is possible to provide priority in channel access by assigning different preset ratios of empty channel thresholds to the various traffic classes. Frames from frequency spread segments that have a partial collision are included as well. An analytical model is simulated for the analysis in terms of collision probability, transmission probability, and frame service time in order to carry out a theoretical examination of the performance of FHC. The objective of this inquiry is to determine how well FHC works. The analytical model has been proven correct by the exhaustive simulations as well as the theoretical findings. Cloud platforms are often used in the instruction of the most cutting-edge machine learning techniques of today, such as deep neural networks. This is done in order to take advantage of the cloud's capacity to scale elastically. In order to satisfy the criteria of these sorts of applications, federated learning, has been proposed as a distributed machine learning solution. This is done in order to fulfil the requirements of these kinds of applications. In federated learning (FL), even though everyone who uses the system works together to train a model, nobody ever shares their data with anybody else. Each user trains a local model with their own data, and then communicates the updated models with a FL server so that the data can be aggregated and a global model can be constructed. This process ensures that each user's model is unique. This process is repeated until a global model has been developed. This kind of training not only reduces the amount of network overhead that is necessary to transfer data to a centralised server, but it also safeguards the personal information of the users. Within the framework of this work, we looked at the feasibility of using the FL technique of learning on the many devices that are part of the dispersed network. On a centralised server, we conduct an analysis of the performance of the FL model by comparing its accuracy and the amount of time it takes to train using a range of various parameter value combinations. Additionally, the accuracy of these federated models may be made to reach a level that is comparable to that of the accuracy of central models.
{"title":"Enhancing throughput using channel access priorities in frequency hopping network using federated learning","authors":"Yu Han, Xiaowei Zhu","doi":"10.1186/s13638-023-02313-9","DOIUrl":"https://doi.org/10.1186/s13638-023-02313-9","url":null,"abstract":"Abstract The data are sent by the nodes taking part in frequency hopping communications (FHC) utilising carrier frequencies and time slots that are pseudo-randomly assigned. Because of this, a high degree of protection against eavesdropping and anti-interference capabilities is provided. When using FHC in an environment, sharing time and frequency resources, avoiding collisions, and differentiating services are all made more complex as a result of this. A protocol for FHC that is based on dispersed wireless networks is presented by the authors of this research. It is a mechanism for multiple access control, which is prioritised and distributed. The ratio of empty channels metric can be found in the previous sentence. It is possible to provide priority in channel access by assigning different preset ratios of empty channel thresholds to the various traffic classes. Frames from frequency spread segments that have a partial collision are included as well. An analytical model is simulated for the analysis in terms of collision probability, transmission probability, and frame service time in order to carry out a theoretical examination of the performance of FHC. The objective of this inquiry is to determine how well FHC works. The analytical model has been proven correct by the exhaustive simulations as well as the theoretical findings. Cloud platforms are often used in the instruction of the most cutting-edge machine learning techniques of today, such as deep neural networks. This is done in order to take advantage of the cloud's capacity to scale elastically. In order to satisfy the criteria of these sorts of applications, federated learning, has been proposed as a distributed machine learning solution. This is done in order to fulfil the requirements of these kinds of applications. In federated learning (FL), even though everyone who uses the system works together to train a model, nobody ever shares their data with anybody else. Each user trains a local model with their own data, and then communicates the updated models with a FL server so that the data can be aggregated and a global model can be constructed. This process ensures that each user's model is unique. This process is repeated until a global model has been developed. This kind of training not only reduces the amount of network overhead that is necessary to transfer data to a centralised server, but it also safeguards the personal information of the users. Within the framework of this work, we looked at the feasibility of using the FL technique of learning on the many devices that are part of the dispersed network. On a centralised server, we conduct an analysis of the performance of the FL model by comparing its accuracy and the amount of time it takes to train using a range of various parameter value combinations. Additionally, the accuracy of these federated models may be made to reach a level that is comparable to that of the accuracy of central models.","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135435251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-02DOI: 10.1186/s13638-023-02311-x
Jiayong Chai, Jian Li, Muhua Wei, Chuangying Zhu
Abstract In this work, we present a blockchain-based federated learning (FL) framework that aims achieving high system efficiency while simultaneously addressing issues relating to data sparsity and the disclosure of private information. It is more efficient to build a number of smaller clusters rather than one big cluster for multiple networks. Blockchain-based FL is carried out in each cluster, with the model changes being compiled at the end of the process. Following that, the accumulated updates are swapped across the clusters, which, in practise, improves the updates that are accessible for each cluster. When compared to the extensive interactions that take place in blockchain-based FL, cluster-based FL only sends a limited number of aggregated updates across a substantial distance. This is in contrast to the extensive interactions that take place in blockchain-based FL. In order to conduct an analysis of our system, we have implemented the prototypes of both cluster and blockchain-based FL models. The findings of the experiments show that cluster-based FL model raise the accuracy goes upto 72.6%, and goes down to 11%. The loss goes upto 3.6 and goes down to 0.8. In addition, cluster-based FL model has the potential to hasten the convergence of the model, provided that the same quantity of data is input into it. The reason for this is due to the fact that during a training cycle, cluster-based FL model combines the computational resources of many different clusters.
{"title":"Blockchain managed federated learning for a secure IoT framework","authors":"Jiayong Chai, Jian Li, Muhua Wei, Chuangying Zhu","doi":"10.1186/s13638-023-02311-x","DOIUrl":"https://doi.org/10.1186/s13638-023-02311-x","url":null,"abstract":"Abstract In this work, we present a blockchain-based federated learning (FL) framework that aims achieving high system efficiency while simultaneously addressing issues relating to data sparsity and the disclosure of private information. It is more efficient to build a number of smaller clusters rather than one big cluster for multiple networks. Blockchain-based FL is carried out in each cluster, with the model changes being compiled at the end of the process. Following that, the accumulated updates are swapped across the clusters, which, in practise, improves the updates that are accessible for each cluster. When compared to the extensive interactions that take place in blockchain-based FL, cluster-based FL only sends a limited number of aggregated updates across a substantial distance. This is in contrast to the extensive interactions that take place in blockchain-based FL. In order to conduct an analysis of our system, we have implemented the prototypes of both cluster and blockchain-based FL models. The findings of the experiments show that cluster-based FL model raise the accuracy goes upto 72.6%, and goes down to 11%. The loss goes upto 3.6 and goes down to 0.8. In addition, cluster-based FL model has the potential to hasten the convergence of the model, provided that the same quantity of data is input into it. The reason for this is due to the fact that during a training cycle, cluster-based FL model combines the computational resources of many different clusters.","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135833649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-02DOI: 10.1186/s13638-023-02312-w
Dingzhu Lu
Abstract Because of the increased mobility of vehicle users, it might be difficult to keep communication services in vehicle networks effective and dependable. Huge hurdles have been presented to vehicular networks as a result of the meteoric rise in the amount of data, which comes with the needs of high dependability and low latency. The deployment of access point servers at geographic locations that are closer to the vehicles in order to provide real-time service to applications that are based on the vehicles is one possible option. However, there is a limited amount of cache store space, and there is also a lack of a tractable access mode allocation method. As a result of these factors, it is very difficult to strike a compromise between the network transmission performance and fronthaul savings. Because the signal-to-interference-ratio (SIR) can be enhanced with switching mode in vehicular infrastructure, it may be possible to achieve higher levels of dependability. To serve all of the vehicles, the conventional allocation in vehicular network may not be sufficient on its own for two reasons: (1) the number of vehicles exceeds the number of paths, and (2) a vehicle may be located outside of the coverage path. Therefore, the implementation of switching mode allocation in vehicular communication is very necessary in order to increase the number of vehicles that can be supplied. In this paper, allocation using V2I, V2V, and V2X modes have been analyzed to provide dependable coverage for vehicles. These methods are used for communicating with other vehicles. In this paper, the numerical analysis has been performed such that SIR is optimized. In switching mode allocation, it has been shown that establishing a variable SIR threshold is helpful in achieving a path coverage that can be relied upon. It has been shown beyond a reasonable doubt that the coverage probability is likewise directly dependent on SIR thresholds. The theoretical analysis is verified, and it is confirmed that the suggested method is capable of achieving significant performance improvement in terms of coverage probability and data rate.
{"title":"Switching mode allocation in planning paths for vehicular network communication","authors":"Dingzhu Lu","doi":"10.1186/s13638-023-02312-w","DOIUrl":"https://doi.org/10.1186/s13638-023-02312-w","url":null,"abstract":"Abstract Because of the increased mobility of vehicle users, it might be difficult to keep communication services in vehicle networks effective and dependable. Huge hurdles have been presented to vehicular networks as a result of the meteoric rise in the amount of data, which comes with the needs of high dependability and low latency. The deployment of access point servers at geographic locations that are closer to the vehicles in order to provide real-time service to applications that are based on the vehicles is one possible option. However, there is a limited amount of cache store space, and there is also a lack of a tractable access mode allocation method. As a result of these factors, it is very difficult to strike a compromise between the network transmission performance and fronthaul savings. Because the signal-to-interference-ratio (SIR) can be enhanced with switching mode in vehicular infrastructure, it may be possible to achieve higher levels of dependability. To serve all of the vehicles, the conventional allocation in vehicular network may not be sufficient on its own for two reasons: (1) the number of vehicles exceeds the number of paths, and (2) a vehicle may be located outside of the coverage path. Therefore, the implementation of switching mode allocation in vehicular communication is very necessary in order to increase the number of vehicles that can be supplied. In this paper, allocation using V2I, V2V, and V2X modes have been analyzed to provide dependable coverage for vehicles. These methods are used for communicating with other vehicles. In this paper, the numerical analysis has been performed such that SIR is optimized. In switching mode allocation, it has been shown that establishing a variable SIR threshold is helpful in achieving a path coverage that can be relied upon. It has been shown beyond a reasonable doubt that the coverage probability is likewise directly dependent on SIR thresholds. The theoretical analysis is verified, and it is confirmed that the suggested method is capable of achieving significant performance improvement in terms of coverage probability and data rate.","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135833366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}