Pub Date : 2024-03-20DOI: 10.1109/TGCN.2024.3394073
{"title":"IEEE Communications Society Information","authors":"","doi":"10.1109/TGCN.2024.3394073","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3394073","url":null,"abstract":"","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10535377","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141073604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-20DOI: 10.1109/TGCN.2024.3379960
Qiang He;Ji Li;Xiaogang Zhu;Alireza Jolfaei;Zheng Feng;Amr Tolba;Keping Yu;Yukai Fu
As information technology rapidly advances, 5G technology, Radio Access Networks (RAN), and the Internet of Things (IoT) have emerged as the core elements of next-generation communication technology. There is an increasing demand for real-time communication and reduced latency in various applications. Therefore, this paper proposes a four-layer Mobile Edge Computing (MEC) architecture that connects user devices to the core network using RAN. Blockchain verification is used for data storage and access permission separation. The architecture aims to address the high latency, low flexibility, and security issues in cloud computing communication. We also propose a MEC server location algorithm to optimize communication distance, and a Q-learning algorithm for selection and resource allocation. Experimental results demonstrate significant energy savings compared to baseline algorithms.
随着信息技术的快速发展,5G 技术、无线接入网(RAN)和物联网(IoT)已成为下一代通信技术的核心要素。各种应用对实时通信和减少延迟的需求日益增长。因此,本文提出了一种四层移动边缘计算(MEC)架构,利用 RAN 将用户设备连接到核心网络。区块链验证用于数据存储和访问权限分离。该架构旨在解决云计算通信中的高延迟、低灵活性和安全问题。我们还提出了优化通信距离的 MEC 服务器定位算法,以及用于选择和资源分配的 Q-learning 算法。实验结果表明,与基线算法相比,该算法能显著节约能源。
{"title":"Joint Data Offloading and Energy-Efficient Secure MEC Resource Allocation Method for IoT Device Data in RAN Communication","authors":"Qiang He;Ji Li;Xiaogang Zhu;Alireza Jolfaei;Zheng Feng;Amr Tolba;Keping Yu;Yukai Fu","doi":"10.1109/TGCN.2024.3379960","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3379960","url":null,"abstract":"As information technology rapidly advances, 5G technology, Radio Access Networks (RAN), and the Internet of Things (IoT) have emerged as the core elements of next-generation communication technology. There is an increasing demand for real-time communication and reduced latency in various applications. Therefore, this paper proposes a four-layer Mobile Edge Computing (MEC) architecture that connects user devices to the core network using RAN. Blockchain verification is used for data storage and access permission separation. The architecture aims to address the high latency, low flexibility, and security issues in cloud computing communication. We also propose a MEC server location algorithm to optimize communication distance, and a Q-learning algorithm for selection and resource allocation. Experimental results demonstrate significant energy savings compared to baseline algorithms.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-20DOI: 10.1109/TGCN.2024.3394071
{"title":"IEEE Transactions on Green Communications and Networking","authors":"","doi":"10.1109/TGCN.2024.3394071","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3394071","url":null,"abstract":"","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10535361","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141078735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-11DOI: 10.1109/tgcn.2024.3368657
N. Garg, Haifeng Luo, T. Ratnarajah
In this paper, we consider a two-way wiretap Multi-Input Multi-Output Multi-antenna Eve (MIMOME) channel, where both nodes (Alice and Bob) transmit and receive in an in-band full-duplex (IBFD) manner. For this system with keyless security, we provide a novel artificial noise (AN) based signal design, where the AN is injected in both signal and null spaces. We present an ergodic secrecy rate approximation to derive the power allocation algorithm. We consider scenarios where AN is known and unknown to legitimate users and include imperfect channel information effects. To maximize secrecy rates subject to the transmit power constraint, a two-step power allocation solution is proposed, where the first step is known at Eve, and the second step helps to improve the secrecy further. We also consider scenarios where partial information is known by Eve and the effects of non-ideal self-interference cancellation. The usefulness and limitations of the resulting power allocation solution are analyzed and verified via simulations. Results show that secrecy rates are less when AN is unknown to receivers or Eve has more information about legitimate users. Since the ergodic approximation only considers Eves distance, the resulting power allocation provides secrecy rates close to the actual ones.
在本文中,我们考虑了一种双向窃听多输入多输出多天线夏娃(MIMOME)信道,其中两个节点(Alice 和 Bob)都以带内全双工(IBFD)方式进行发射和接收。对于这种无密钥安全系统,我们提供了一种新颖的基于人工噪声(AN)的信号设计,其中人工噪声被注入信号空间和空空间。我们提出了一种遍历保密率近似方法来推导功率分配算法。我们考虑了合法用户已知和未知 AN 的情况,并包括不完美信道信息效应。为了在发射功率约束下最大限度地提高保密率,我们提出了一种两步功率分配方案,其中第一步在前夜已知,第二步有助于进一步提高保密率。我们还考虑了夏娃已知部分信息的情况以及非理想自干扰消除的影响。我们通过仿真分析和验证了由此产生的功率分配方案的实用性和局限性。结果表明,当接收者不知道 AN 或夏娃掌握更多合法用户信息时,保密率较低。由于遍历近似只考虑了夏娃的距离,因此得出的功率分配提供了接近实际的保密率。
{"title":"On the Secrecy Rate of In-Band Full-Duplex Two-Way Wiretap Channel","authors":"N. Garg, Haifeng Luo, T. Ratnarajah","doi":"10.1109/tgcn.2024.3368657","DOIUrl":"https://doi.org/10.1109/tgcn.2024.3368657","url":null,"abstract":"In this paper, we consider a two-way wiretap Multi-Input Multi-Output Multi-antenna Eve (MIMOME) channel, where both nodes (Alice and Bob) transmit and receive in an in-band full-duplex (IBFD) manner. For this system with keyless security, we provide a novel artificial noise (AN) based signal design, where the AN is injected in both signal and null spaces. We present an ergodic secrecy rate approximation to derive the power allocation algorithm. We consider scenarios where AN is known and unknown to legitimate users and include imperfect channel information effects. To maximize secrecy rates subject to the transmit power constraint, a two-step power allocation solution is proposed, where the first step is known at Eve, and the second step helps to improve the secrecy further. We also consider scenarios where partial information is known by Eve and the effects of non-ideal self-interference cancellation. The usefulness and limitations of the resulting power allocation solution are analyzed and verified via simulations. Results show that secrecy rates are less when AN is unknown to receivers or Eve has more information about legitimate users. Since the ergodic approximation only considers Eves distance, the resulting power allocation provides secrecy rates close to the actual ones.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140251999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-08DOI: 10.1109/TGCN.2024.3398362
Zhengyu Zhu;Jiaxue Li;Jing Yang;Bo Ai
Inspired by the cutting-edge technique simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) in helping construct a cost-effective, programmable, green, invulnerable, and self-optimized Open Access Radio Network (O-RAN), in this paper, a STAR-RIS-assisted secure simultaneous wireless information and power transfer (SWIPT) system is investigated. Limited by the channel estimation technology, the robust design of this system with bounded channel estimation error is taken into consideration. By jointly designing the transmit beamforming at the access point and the transmission and reflection coefficients of STAR-RIS, a transmit power minimization problem subject to the secrecy rate constraints, energy harvesting constraint and amplitude constraints is formulated. Blocked by the coupled optimization variables and semi-infinite channel estimation errors, an alternating optimization framework along with Shur complement and S-Procedure is proposed to deal with this non-convex problem. The simulation results have proved the effectiveness of the deployment of STAR-RIS and robustness of the proposed algorithm, meanwhile, STAR-RIS can be a promising candidate to complement the construction of O-RAN.
{"title":"Robust Beamforming Design for STAR-RIS-Aided Secure SWIPT System With Bounded CSI Error","authors":"Zhengyu Zhu;Jiaxue Li;Jing Yang;Bo Ai","doi":"10.1109/TGCN.2024.3398362","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3398362","url":null,"abstract":"Inspired by the cutting-edge technique simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) in helping construct a cost-effective, programmable, green, invulnerable, and self-optimized Open Access Radio Network (O-RAN), in this paper, a STAR-RIS-assisted secure simultaneous wireless information and power transfer (SWIPT) system is investigated. Limited by the channel estimation technology, the robust design of this system with bounded channel estimation error is taken into consideration. By jointly designing the transmit beamforming at the access point and the transmission and reflection coefficients of STAR-RIS, a transmit power minimization problem subject to the secrecy rate constraints, energy harvesting constraint and amplitude constraints is formulated. Blocked by the coupled optimization variables and semi-infinite channel estimation errors, an alternating optimization framework along with Shur complement and S-Procedure is proposed to deal with this non-convex problem. The simulation results have proved the effectiveness of the deployment of STAR-RIS and robustness of the proposed algorithm, meanwhile, STAR-RIS can be a promising candidate to complement the construction of O-RAN.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-06DOI: 10.1109/TGCN.2024.3397459
Bishmita Hazarika;Prajwalita Saikia;Keshav Singh;Chih-Peng Li
With 5G technology evolving, Open Radio Access Network (O-RAN) solutions are becoming crucial, especially for handling the diverse Quality of Service (QoS) needs in vehicular networks. These networks are dynamic and have many different applications, calling for effective O-RAN strategies. This paper examines a three-tier hierarchical O-RAN slicing model, created to address the unique challenges of vehicular networks. The top-level follow 3GPP standards like ultra-reliable and low-latency communications (URLLC), enhanced mobile broadband (eMBB), and massive machine-type communications (mMTC). The middle level is organized by vehicle types, and the lowest level is designed for specific vehicle applications. This approach leads to better network resource management. Additionally, this study explores the advantages of a federated deep reinforcement learning (DRL) approach for efficient learning while maintaining privacy. It introduces a federated DRL approach incorporating federated averaging and deep deterministic policy gradient (DDPG) techniques, to enhance inter-slice operations and resource allocation in vehicular networks. Lastly, the effectiveness of this algorithm is demonstrated through a small simulation in a vehicular framework.
{"title":"Enhancing Vehicular Networks With Hierarchical O-RAN Slicing and Federated DRL","authors":"Bishmita Hazarika;Prajwalita Saikia;Keshav Singh;Chih-Peng Li","doi":"10.1109/TGCN.2024.3397459","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3397459","url":null,"abstract":"With 5G technology evolving, Open Radio Access Network (O-RAN) solutions are becoming crucial, especially for handling the diverse Quality of Service (QoS) needs in vehicular networks. These networks are dynamic and have many different applications, calling for effective O-RAN strategies. This paper examines a three-tier hierarchical O-RAN slicing model, created to address the unique challenges of vehicular networks. The top-level follow 3GPP standards like ultra-reliable and low-latency communications (URLLC), enhanced mobile broadband (eMBB), and massive machine-type communications (mMTC). The middle level is organized by vehicle types, and the lowest level is designed for specific vehicle applications. This approach leads to better network resource management. Additionally, this study explores the advantages of a federated deep reinforcement learning (DRL) approach for efficient learning while maintaining privacy. It introduces a federated DRL approach incorporating federated averaging and deep deterministic policy gradient (DDPG) techniques, to enhance inter-slice operations and resource allocation in vehicular networks. Lastly, the effectiveness of this algorithm is demonstrated through a small simulation in a vehicular framework.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-06DOI: 10.1109/TGCN.2024.3396454
Abdullah Ayub Khan;Asif Ali Laghari;Abdullah M. Baqasah;Roobaea Alroobaea;Thippa Reddy Gadekallu;Gabriel Avelino Sampedro;Yaodong Zhu
Autonomous decision-making is considered an intercommunication use case that needs to be addressed when integrating open radio access networks with mobile-based 5G communication. The robustness of innovations is diminished by the conventional method of designing an end-to-end radio access network solution. Through an analysis of these possibilities, this paper presents a machine learning-based intelligent system whose primary goal is load balancing using Artificial Neural Networks with Particle Swam Optimization-enabled metaheuristic optimization mechanisms for telecommunication industry requests, like product compatibility. We increase the proposed system’s reliability by using third-generation partnership project standards to automate the distribution of transactional load among various connected units. This intelligent system encloses the hierarchy of automation enabled by artificial intelligence. Conversely, AI-enabled open radio access control explores the barriers to next-generation intercommunication, including those after 5G. It covers deterministic latency and capabilities, physical layer-based dynamic controls, privacy and security, and testing applications for AI-based controller designs.
{"title":"ORAN-B5G: A Next-Generation Open Radio Access Network Architecture With Machine Learning for Beyond 5G in Industrial 5.0","authors":"Abdullah Ayub Khan;Asif Ali Laghari;Abdullah M. Baqasah;Roobaea Alroobaea;Thippa Reddy Gadekallu;Gabriel Avelino Sampedro;Yaodong Zhu","doi":"10.1109/TGCN.2024.3396454","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3396454","url":null,"abstract":"Autonomous decision-making is considered an intercommunication use case that needs to be addressed when integrating open radio access networks with mobile-based 5G communication. The robustness of innovations is diminished by the conventional method of designing an end-to-end radio access network solution. Through an analysis of these possibilities, this paper presents a machine learning-based intelligent system whose primary goal is load balancing using Artificial Neural Networks with Particle Swam Optimization-enabled metaheuristic optimization mechanisms for telecommunication industry requests, like product compatibility. We increase the proposed system’s reliability by using third-generation partnership project standards to automate the distribution of transactional load among various connected units. This intelligent system encloses the hierarchy of automation enabled by artificial intelligence. Conversely, AI-enabled open radio access control explores the barriers to next-generation intercommunication, including those after 5G. It covers deterministic latency and capabilities, physical layer-based dynamic controls, privacy and security, and testing applications for AI-based controller designs.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-14DOI: 10.1109/TGCN.2024.3362790
Hanyang Shi;Xuefen Chi;Yan Zhao;Linlin Zhao;Feng Shu;Jiangzhou Wang
Indoor visible light communications (VLCs) are not supported in lighting restricted scenarios such as theater, cinema, dim sickroom or bedroom. Thus, different from radio frequency (RF) based communication technologies, such as WiFi, VLC is not “always on”. The “always on” VLC named imperceptible VLC (iVLC) has been proposed, where human cannot perceive glaring nor flicker during the communications. The flicker problem can be solved by increasing the light pulse frequency. In this paper, we propose a two-dimensional characteristic channel analysis structure by considering the different features of communication and light perception channels in iVLC system. The modified just imperceptible difference (JID) has been derived. Based on the modified JID, the upper bounds of average optical power are derived in both direct and reflected light perception scenarios. To reduce the impacts of indoor multiple reflection channel interference and light-emitting diodes (LEDs) transient behaviour in iVLC system where communication signals are modulated in ultra-short pulses, we propose the multi-quadric kernel and deep neural network (DNN) based hard-max pulse position classifier (MQK-DNN-HPPC). Numerical results show that the bit error rate (BER) and synchronization performances of iVLC system are improved by applying MQK-DNN-HPPC compared with the soft-max based DNN algorithm and traditional detection algorithm.
{"title":"Imperceptible Visible Light Communications Based on Modified Just Imperceptible Difference and Aided by Deep Neural Network","authors":"Hanyang Shi;Xuefen Chi;Yan Zhao;Linlin Zhao;Feng Shu;Jiangzhou Wang","doi":"10.1109/TGCN.2024.3362790","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3362790","url":null,"abstract":"Indoor visible light communications (VLCs) are not supported in lighting restricted scenarios such as theater, cinema, dim sickroom or bedroom. Thus, different from radio frequency (RF) based communication technologies, such as WiFi, VLC is not “always on”. The “always on” VLC named imperceptible VLC (iVLC) has been proposed, where human cannot perceive glaring nor flicker during the communications. The flicker problem can be solved by increasing the light pulse frequency. In this paper, we propose a two-dimensional characteristic channel analysis structure by considering the different features of communication and light perception channels in iVLC system. The modified just imperceptible difference (JID) has been derived. Based on the modified JID, the upper bounds of average optical power are derived in both direct and reflected light perception scenarios. To reduce the impacts of indoor multiple reflection channel interference and light-emitting diodes (LEDs) transient behaviour in iVLC system where communication signals are modulated in ultra-short pulses, we propose the multi-quadric kernel and deep neural network (DNN) based hard-max pulse position classifier (MQK-DNN-HPPC). Numerical results show that the bit error rate (BER) and synchronization performances of iVLC system are improved by applying MQK-DNN-HPPC compared with the soft-max based DNN algorithm and traditional detection algorithm.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142123061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-13DOI: 10.1109/TGCN.2024.3365692
Yingjie Pei;Xinwei Yue;Chongwen Huang;Zhiping Lu
Reconfigurable intelligent surface (RIS) and ambient backscatter communication (AmBC) have been envisioned as two promising technologies due to their high transmission reliability as well as energy-efficiency. This paper investigates the secrecy performance of RIS assisted AmBC networks. New closed-form and asymptotic expressions of secrecy outage probability for RIS-AmBC networks are derived by taking into account both imperfect successive interference cancellation (ipSIC) and perfect SIC (pSIC) cases. On top of these, the secrecy diversity order of legitimate user is obtained in high signal-to-noise ratio region, which equals zero and is proportional to the number of RIS elements for ipSIC and pSIC, respectively. The secrecy throughput and energy efficiency are further surveyed to evaluate the secure effectiveness of RIS-AmBC networks. Numerical results are provided to verify the accuracy of theoretical analyses and manifest that: i) The secrecy outage behavior of RIS-AmBC networks exceeds that of conventional AmBC networks; ii) Due to the mutual interference between direct and backscattering links, the number of RIS elements has an optimal value to minimise the secrecy system outage probability; and iii) Secrecy throughput and energy efficiency are strongly influenced by the reflecting coefficient and eavesdropper’s wiretapping ability.
{"title":"Secrecy Performance Analysis of RIS Assisted Ambient Backscatter Communication Networks","authors":"Yingjie Pei;Xinwei Yue;Chongwen Huang;Zhiping Lu","doi":"10.1109/TGCN.2024.3365692","DOIUrl":"10.1109/TGCN.2024.3365692","url":null,"abstract":"Reconfigurable intelligent surface (RIS) and ambient backscatter communication (AmBC) have been envisioned as two promising technologies due to their high transmission reliability as well as energy-efficiency. This paper investigates the secrecy performance of RIS assisted AmBC networks. New closed-form and asymptotic expressions of secrecy outage probability for RIS-AmBC networks are derived by taking into account both imperfect successive interference cancellation (ipSIC) and perfect SIC (pSIC) cases. On top of these, the secrecy diversity order of legitimate user is obtained in high signal-to-noise ratio region, which equals zero and is proportional to the number of RIS elements for ipSIC and pSIC, respectively. The secrecy throughput and energy efficiency are further surveyed to evaluate the secure effectiveness of RIS-AmBC networks. Numerical results are provided to verify the accuracy of theoretical analyses and manifest that: i) The secrecy outage behavior of RIS-AmBC networks exceeds that of conventional AmBC networks; ii) Due to the mutual interference between direct and backscattering links, the number of RIS elements has an optimal value to minimise the secrecy system outage probability; and iii) Secrecy throughput and energy efficiency are strongly influenced by the reflecting coefficient and eavesdropper’s wiretapping ability.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140235132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-12DOI: 10.1109/TGCN.2024.3364776
A. S. Ismail;Ammar Hawbani;Xingfu Wang;Samah Abdel Aziz;Saeed Hamood Alsamhi;Liang Zhao;Ahmed Fathalla
Recently, underwater wireless sensor networks (UWSNs) have seen increasing popularity owing to their extensive applications in aquatic environments, including monitoring underwater pipelines, detecting pollution and disasters, researching marine life, underwater surveillance, and facilitating military surveillance. In fact, the task of devising an adequate routing algorithm is particularly challenging because of the unique underwater environmental conditions. These challenges include energy constraints, dynamic topology, long propagation delays, bandwidth limitations, mobility, and 3-D deployments. Therefore, this study addresses the aforementioned challenges and proposes RBEER, a rule-based energy-efficient routing protocol for large-scale UWSNs. RBEER works in three steps: the first is the network initialization and network clustering, in which a Fuzzy C-means is utilized to perform the clustering and determine the cluster centers. The second step is using the RISE rule-based classifier to select the optimal cluster head (CH) based on five input parameters to generate the set of rules. The last step is data forwarding, in which data is forwarded through a single-hop intra-cluster path from member nodes to CH nodes, then through a multi-hop inter-cluster path from CH nodes to sink nodes. Extensive simulations and experiments have been conducted to evaluate the performance of the RBEER protocol. The results demonstrate that the RBEER protocol outperforms benchmarks regarding packet delivery ratio, end-to-end delay, and energy consumption.
{"title":"RBEER: Rule-Based Energy-Efficient Routing Protocol for Large-Scale UWSNs","authors":"A. S. Ismail;Ammar Hawbani;Xingfu Wang;Samah Abdel Aziz;Saeed Hamood Alsamhi;Liang Zhao;Ahmed Fathalla","doi":"10.1109/TGCN.2024.3364776","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3364776","url":null,"abstract":"Recently, underwater wireless sensor networks (UWSNs) have seen increasing popularity owing to their extensive applications in aquatic environments, including monitoring underwater pipelines, detecting pollution and disasters, researching marine life, underwater surveillance, and facilitating military surveillance. In fact, the task of devising an adequate routing algorithm is particularly challenging because of the unique underwater environmental conditions. These challenges include energy constraints, dynamic topology, long propagation delays, bandwidth limitations, mobility, and 3-D deployments. Therefore, this study addresses the aforementioned challenges and proposes RBEER, a rule-based energy-efficient routing protocol for large-scale UWSNs. RBEER works in three steps: the first is the network initialization and network clustering, in which a Fuzzy C-means is utilized to perform the clustering and determine the cluster centers. The second step is using the RISE rule-based classifier to select the optimal cluster head (CH) based on five input parameters to generate the set of rules. The last step is data forwarding, in which data is forwarded through a single-hop intra-cluster path from member nodes to CH nodes, then through a multi-hop inter-cluster path from CH nodes to sink nodes. Extensive simulations and experiments have been conducted to evaluate the performance of the RBEER protocol. The results demonstrate that the RBEER protocol outperforms benchmarks regarding packet delivery ratio, end-to-end delay, and energy consumption.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}