首页 > 最新文献

IEEE Transactions on Green Communications and Networking最新文献

英文 中文
IEEE Communications Society Information IEEE 通信学会信息
IF 4.8 2区 计算机科学 Q1 Computer Science Pub Date : 2024-03-20 DOI: 10.1109/TGCN.2024.3394073
{"title":"IEEE Communications Society Information","authors":"","doi":"10.1109/TGCN.2024.3394073","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3394073","url":null,"abstract":"","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10535377","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141073604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Data Offloading and Energy-Efficient Secure MEC Resource Allocation Method for IoT Device Data in RAN Communication 针对 RAN 通信中物联网设备数据的联合数据卸载和高能效安全 MEC 资源分配方法
IF 5.3 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-03-20 DOI: 10.1109/TGCN.2024.3379960
Qiang He;Ji Li;Xiaogang Zhu;Alireza Jolfaei;Zheng Feng;Amr Tolba;Keping Yu;Yukai Fu
As information technology rapidly advances, 5G technology, Radio Access Networks (RAN), and the Internet of Things (IoT) have emerged as the core elements of next-generation communication technology. There is an increasing demand for real-time communication and reduced latency in various applications. Therefore, this paper proposes a four-layer Mobile Edge Computing (MEC) architecture that connects user devices to the core network using RAN. Blockchain verification is used for data storage and access permission separation. The architecture aims to address the high latency, low flexibility, and security issues in cloud computing communication. We also propose a MEC server location algorithm to optimize communication distance, and a Q-learning algorithm for selection and resource allocation. Experimental results demonstrate significant energy savings compared to baseline algorithms.
随着信息技术的快速发展,5G 技术、无线接入网(RAN)和物联网(IoT)已成为下一代通信技术的核心要素。各种应用对实时通信和减少延迟的需求日益增长。因此,本文提出了一种四层移动边缘计算(MEC)架构,利用 RAN 将用户设备连接到核心网络。区块链验证用于数据存储和访问权限分离。该架构旨在解决云计算通信中的高延迟、低灵活性和安全问题。我们还提出了优化通信距离的 MEC 服务器定位算法,以及用于选择和资源分配的 Q-learning 算法。实验结果表明,与基线算法相比,该算法能显著节约能源。
{"title":"Joint Data Offloading and Energy-Efficient Secure MEC Resource Allocation Method for IoT Device Data in RAN Communication","authors":"Qiang He;Ji Li;Xiaogang Zhu;Alireza Jolfaei;Zheng Feng;Amr Tolba;Keping Yu;Yukai Fu","doi":"10.1109/TGCN.2024.3379960","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3379960","url":null,"abstract":"As information technology rapidly advances, 5G technology, Radio Access Networks (RAN), and the Internet of Things (IoT) have emerged as the core elements of next-generation communication technology. There is an increasing demand for real-time communication and reduced latency in various applications. Therefore, this paper proposes a four-layer Mobile Edge Computing (MEC) architecture that connects user devices to the core network using RAN. Blockchain verification is used for data storage and access permission separation. The architecture aims to address the high latency, low flexibility, and security issues in cloud computing communication. We also propose a MEC server location algorithm to optimize communication distance, and a Q-learning algorithm for selection and resource allocation. Experimental results demonstrate significant energy savings compared to baseline algorithms.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Transactions on Green Communications and Networking 电气和电子工程师学会绿色通信与网络论文集
IF 4.8 2区 计算机科学 Q1 Computer Science Pub Date : 2024-03-20 DOI: 10.1109/TGCN.2024.3394071
{"title":"IEEE Transactions on Green Communications and Networking","authors":"","doi":"10.1109/TGCN.2024.3394071","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3394071","url":null,"abstract":"","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10535361","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141078735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Secrecy Rate of In-Band Full-Duplex Two-Way Wiretap Channel 关于带内全双工双向窃听信道的保密率
IF 4.8 2区 计算机科学 Q1 Computer Science Pub Date : 2024-03-11 DOI: 10.1109/tgcn.2024.3368657
N. Garg, Haifeng Luo, T. Ratnarajah
In this paper, we consider a two-way wiretap Multi-Input Multi-Output Multi-antenna Eve (MIMOME) channel, where both nodes (Alice and Bob) transmit and receive in an in-band full-duplex (IBFD) manner. For this system with keyless security, we provide a novel artificial noise (AN) based signal design, where the AN is injected in both signal and null spaces. We present an ergodic secrecy rate approximation to derive the power allocation algorithm. We consider scenarios where AN is known and unknown to legitimate users and include imperfect channel information effects. To maximize secrecy rates subject to the transmit power constraint, a two-step power allocation solution is proposed, where the first step is known at Eve, and the second step helps to improve the secrecy further. We also consider scenarios where partial information is known by Eve and the effects of non-ideal self-interference cancellation. The usefulness and limitations of the resulting power allocation solution are analyzed and verified via simulations. Results show that secrecy rates are less when AN is unknown to receivers or Eve has more information about legitimate users. Since the ergodic approximation only considers Eves distance, the resulting power allocation provides secrecy rates close to the actual ones.
在本文中,我们考虑了一种双向窃听多输入多输出多天线夏娃(MIMOME)信道,其中两个节点(Alice 和 Bob)都以带内全双工(IBFD)方式进行发射和接收。对于这种无密钥安全系统,我们提供了一种新颖的基于人工噪声(AN)的信号设计,其中人工噪声被注入信号空间和空空间。我们提出了一种遍历保密率近似方法来推导功率分配算法。我们考虑了合法用户已知和未知 AN 的情况,并包括不完美信道信息效应。为了在发射功率约束下最大限度地提高保密率,我们提出了一种两步功率分配方案,其中第一步在前夜已知,第二步有助于进一步提高保密率。我们还考虑了夏娃已知部分信息的情况以及非理想自干扰消除的影响。我们通过仿真分析和验证了由此产生的功率分配方案的实用性和局限性。结果表明,当接收者不知道 AN 或夏娃掌握更多合法用户信息时,保密率较低。由于遍历近似只考虑了夏娃的距离,因此得出的功率分配提供了接近实际的保密率。
{"title":"On the Secrecy Rate of In-Band Full-Duplex Two-Way Wiretap Channel","authors":"N. Garg, Haifeng Luo, T. Ratnarajah","doi":"10.1109/tgcn.2024.3368657","DOIUrl":"https://doi.org/10.1109/tgcn.2024.3368657","url":null,"abstract":"In this paper, we consider a two-way wiretap Multi-Input Multi-Output Multi-antenna Eve (MIMOME) channel, where both nodes (Alice and Bob) transmit and receive in an in-band full-duplex (IBFD) manner. For this system with keyless security, we provide a novel artificial noise (AN) based signal design, where the AN is injected in both signal and null spaces. We present an ergodic secrecy rate approximation to derive the power allocation algorithm. We consider scenarios where AN is known and unknown to legitimate users and include imperfect channel information effects. To maximize secrecy rates subject to the transmit power constraint, a two-step power allocation solution is proposed, where the first step is known at Eve, and the second step helps to improve the secrecy further. We also consider scenarios where partial information is known by Eve and the effects of non-ideal self-interference cancellation. The usefulness and limitations of the resulting power allocation solution are analyzed and verified via simulations. Results show that secrecy rates are less when AN is unknown to receivers or Eve has more information about legitimate users. Since the ergodic approximation only considers Eves distance, the resulting power allocation provides secrecy rates close to the actual ones.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140251999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Beamforming Design for STAR-RIS-Aided Secure SWIPT System With Bounded CSI Error 具有受限 CSI 误差的 STAR-RIS 辅助安全 SWIPT 系统的稳健波束成形设计
IF 5.3 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-03-08 DOI: 10.1109/TGCN.2024.3398362
Zhengyu Zhu;Jiaxue Li;Jing Yang;Bo Ai
Inspired by the cutting-edge technique simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) in helping construct a cost-effective, programmable, green, invulnerable, and self-optimized Open Access Radio Network (O-RAN), in this paper, a STAR-RIS-assisted secure simultaneous wireless information and power transfer (SWIPT) system is investigated. Limited by the channel estimation technology, the robust design of this system with bounded channel estimation error is taken into consideration. By jointly designing the transmit beamforming at the access point and the transmission and reflection coefficients of STAR-RIS, a transmit power minimization problem subject to the secrecy rate constraints, energy harvesting constraint and amplitude constraints is formulated. Blocked by the coupled optimization variables and semi-infinite channel estimation errors, an alternating optimization framework along with Shur complement and S-Procedure is proposed to deal with this non-convex problem. The simulation results have proved the effectiveness of the deployment of STAR-RIS and robustness of the proposed algorithm, meanwhile, STAR-RIS can be a promising candidate to complement the construction of O-RAN.
受同时发射和反射可重构智能表面(STAR-RIS)这一前沿技术的启发,本文研究了一种 STAR-RIS 辅助安全同步无线信息和功率传输(SWIPT)系统,该系统有助于构建一个具有成本效益、可编程、绿色、无懈可击和自优化的开放接入无线网络(O-RAN)。受信道估计技术的限制,该系统的鲁棒性设计考虑了有界信道估计误差。通过联合设计接入点的发射波束成形以及 STAR-RIS 的发射和反射系数,提出了一个受保密率约束、能量收集约束和振幅约束的发射功率最小化问题。受耦合优化变量和半无限信道估计误差的限制,提出了一个交替优化框架,并结合舒尔补码和 S-程序来处理这个非凸问题。仿真结果证明了 STAR-RIS 部署的有效性和所提算法的鲁棒性,同时,STAR-RIS 有希望成为 O-RAN 建设的补充。
{"title":"Robust Beamforming Design for STAR-RIS-Aided Secure SWIPT System With Bounded CSI Error","authors":"Zhengyu Zhu;Jiaxue Li;Jing Yang;Bo Ai","doi":"10.1109/TGCN.2024.3398362","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3398362","url":null,"abstract":"Inspired by the cutting-edge technique simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) in helping construct a cost-effective, programmable, green, invulnerable, and self-optimized Open Access Radio Network (O-RAN), in this paper, a STAR-RIS-assisted secure simultaneous wireless information and power transfer (SWIPT) system is investigated. Limited by the channel estimation technology, the robust design of this system with bounded channel estimation error is taken into consideration. By jointly designing the transmit beamforming at the access point and the transmission and reflection coefficients of STAR-RIS, a transmit power minimization problem subject to the secrecy rate constraints, energy harvesting constraint and amplitude constraints is formulated. Blocked by the coupled optimization variables and semi-infinite channel estimation errors, an alternating optimization framework along with Shur complement and S-Procedure is proposed to deal with this non-convex problem. The simulation results have proved the effectiveness of the deployment of STAR-RIS and robustness of the proposed algorithm, meanwhile, STAR-RIS can be a promising candidate to complement the construction of O-RAN.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Vehicular Networks With Hierarchical O-RAN Slicing and Federated DRL 利用分层 O-RAN 切片和联合 DRL 增强车载网络
IF 5.3 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-03-06 DOI: 10.1109/TGCN.2024.3397459
Bishmita Hazarika;Prajwalita Saikia;Keshav Singh;Chih-Peng Li
With 5G technology evolving, Open Radio Access Network (O-RAN) solutions are becoming crucial, especially for handling the diverse Quality of Service (QoS) needs in vehicular networks. These networks are dynamic and have many different applications, calling for effective O-RAN strategies. This paper examines a three-tier hierarchical O-RAN slicing model, created to address the unique challenges of vehicular networks. The top-level follow 3GPP standards like ultra-reliable and low-latency communications (URLLC), enhanced mobile broadband (eMBB), and massive machine-type communications (mMTC). The middle level is organized by vehicle types, and the lowest level is designed for specific vehicle applications. This approach leads to better network resource management. Additionally, this study explores the advantages of a federated deep reinforcement learning (DRL) approach for efficient learning while maintaining privacy. It introduces a federated DRL approach incorporating federated averaging and deep deterministic policy gradient (DDPG) techniques, to enhance inter-slice operations and resource allocation in vehicular networks. Lastly, the effectiveness of this algorithm is demonstrated through a small simulation in a vehicular framework.
随着 5G 技术的不断发展,开放式无线接入网(O-RAN)解决方案正变得越来越重要,尤其是在处理车载网络的各种服务质量(QoS)需求时。这些网络是动态的,有许多不同的应用,需要有效的 O-RAN 策略。本文研究了一种三层分级 O-RAN 切片模型,该模型是为应对车载网络的独特挑战而创建的。顶层遵循 3GPP 标准,如超可靠和低延迟通信 (URLLC)、增强型移动宽带 (eMBB) 和大规模机器型通信 (mMTC)。中间层按车辆类型划分,最底层则为特定车辆应用而设计。这种方法能更好地管理网络资源。此外,本研究还探讨了联合深度强化学习(DRL)方法在保持隐私的同时实现高效学习的优势。该研究介绍了一种结合了联合平均和深度确定性策略梯度(DDPG)技术的联合 DRL 方法,以增强车辆网络中的片间操作和资源分配。最后,通过在车辆框架中进行小型模拟,展示了该算法的有效性。
{"title":"Enhancing Vehicular Networks With Hierarchical O-RAN Slicing and Federated DRL","authors":"Bishmita Hazarika;Prajwalita Saikia;Keshav Singh;Chih-Peng Li","doi":"10.1109/TGCN.2024.3397459","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3397459","url":null,"abstract":"With 5G technology evolving, Open Radio Access Network (O-RAN) solutions are becoming crucial, especially for handling the diverse Quality of Service (QoS) needs in vehicular networks. These networks are dynamic and have many different applications, calling for effective O-RAN strategies. This paper examines a three-tier hierarchical O-RAN slicing model, created to address the unique challenges of vehicular networks. The top-level follow 3GPP standards like ultra-reliable and low-latency communications (URLLC), enhanced mobile broadband (eMBB), and massive machine-type communications (mMTC). The middle level is organized by vehicle types, and the lowest level is designed for specific vehicle applications. This approach leads to better network resource management. Additionally, this study explores the advantages of a federated deep reinforcement learning (DRL) approach for efficient learning while maintaining privacy. It introduces a federated DRL approach incorporating federated averaging and deep deterministic policy gradient (DDPG) techniques, to enhance inter-slice operations and resource allocation in vehicular networks. Lastly, the effectiveness of this algorithm is demonstrated through a small simulation in a vehicular framework.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ORAN-B5G: A Next-Generation Open Radio Access Network Architecture With Machine Learning for Beyond 5G in Industrial 5.0 ORAN-B5G:面向工业 5.0 中的超越 5G 的机器学习下一代开放式无线接入网络架构
IF 5.3 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-03-06 DOI: 10.1109/TGCN.2024.3396454
Abdullah Ayub Khan;Asif Ali Laghari;Abdullah M. Baqasah;Roobaea Alroobaea;Thippa Reddy Gadekallu;Gabriel Avelino Sampedro;Yaodong Zhu
Autonomous decision-making is considered an intercommunication use case that needs to be addressed when integrating open radio access networks with mobile-based 5G communication. The robustness of innovations is diminished by the conventional method of designing an end-to-end radio access network solution. Through an analysis of these possibilities, this paper presents a machine learning-based intelligent system whose primary goal is load balancing using Artificial Neural Networks with Particle Swam Optimization-enabled metaheuristic optimization mechanisms for telecommunication industry requests, like product compatibility. We increase the proposed system’s reliability by using third-generation partnership project standards to automate the distribution of transactional load among various connected units. This intelligent system encloses the hierarchy of automation enabled by artificial intelligence. Conversely, AI-enabled open radio access control explores the barriers to next-generation intercommunication, including those after 5G. It covers deterministic latency and capabilities, physical layer-based dynamic controls, privacy and security, and testing applications for AI-based controller designs.
在将开放式无线接入网络与基于移动的 5G 通信集成时,自主决策被认为是需要解决的一个互通用例。传统的端到端无线接入网络解决方案设计方法削弱了创新的稳健性。通过对这些可能性的分析,本文提出了一种基于机器学习的智能系统,其主要目标是利用人工神经网络和支持粒子搜索优化(Particle Swam Optimization)的元搜索优化机制来平衡负载,以满足电信行业的要求,如产品兼容性。我们通过使用第三代合作项目标准来自动分配各连接单元之间的事务负载,从而提高了拟议系统的可靠性。这一智能系统包含了人工智能实现的自动化层次。相反,人工智能支持的开放式无线电接入控制探索了下一代互通的障碍,包括 5G 之后的障碍。它涵盖了确定性延迟和能力、基于物理层的动态控制、隐私和安全,以及基于人工智能的控制器设计的测试应用。
{"title":"ORAN-B5G: A Next-Generation Open Radio Access Network Architecture With Machine Learning for Beyond 5G in Industrial 5.0","authors":"Abdullah Ayub Khan;Asif Ali Laghari;Abdullah M. Baqasah;Roobaea Alroobaea;Thippa Reddy Gadekallu;Gabriel Avelino Sampedro;Yaodong Zhu","doi":"10.1109/TGCN.2024.3396454","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3396454","url":null,"abstract":"Autonomous decision-making is considered an intercommunication use case that needs to be addressed when integrating open radio access networks with mobile-based 5G communication. The robustness of innovations is diminished by the conventional method of designing an end-to-end radio access network solution. Through an analysis of these possibilities, this paper presents a machine learning-based intelligent system whose primary goal is load balancing using Artificial Neural Networks with Particle Swam Optimization-enabled metaheuristic optimization mechanisms for telecommunication industry requests, like product compatibility. We increase the proposed system’s reliability by using third-generation partnership project standards to automate the distribution of transactional load among various connected units. This intelligent system encloses the hierarchy of automation enabled by artificial intelligence. Conversely, AI-enabled open radio access control explores the barriers to next-generation intercommunication, including those after 5G. It covers deterministic latency and capabilities, physical layer-based dynamic controls, privacy and security, and testing applications for AI-based controller designs.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Imperceptible Visible Light Communications Based on Modified Just Imperceptible Difference and Aided by Deep Neural Network 基于修正的公正可感知差分和深度神经网络辅助的可感知可见光通信
IF 5.3 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-02-14 DOI: 10.1109/TGCN.2024.3362790
Hanyang Shi;Xuefen Chi;Yan Zhao;Linlin Zhao;Feng Shu;Jiangzhou Wang
Indoor visible light communications (VLCs) are not supported in lighting restricted scenarios such as theater, cinema, dim sickroom or bedroom. Thus, different from radio frequency (RF) based communication technologies, such as WiFi, VLC is not “always on”. The “always on” VLC named imperceptible VLC (iVLC) has been proposed, where human cannot perceive glaring nor flicker during the communications. The flicker problem can be solved by increasing the light pulse frequency. In this paper, we propose a two-dimensional characteristic channel analysis structure by considering the different features of communication and light perception channels in iVLC system. The modified just imperceptible difference (JID) has been derived. Based on the modified JID, the upper bounds of average optical power are derived in both direct and reflected light perception scenarios. To reduce the impacts of indoor multiple reflection channel interference and light-emitting diodes (LEDs) transient behaviour in iVLC system where communication signals are modulated in ultra-short pulses, we propose the multi-quadric kernel and deep neural network (DNN) based hard-max pulse position classifier (MQK-DNN-HPPC). Numerical results show that the bit error rate (BER) and synchronization performances of iVLC system are improved by applying MQK-DNN-HPPC compared with the soft-max based DNN algorithm and traditional detection algorithm.
在剧院、电影院、昏暗的病房或卧室等照明受限的场景中,不支持室内可见光通信(VLC)。因此,与基于射频(RF)的通信技术(如 WiFi)不同,VLC 并非 "始终开启"。已提出的 "始终开启 "的 VLC 被命名为不易察觉的 VLC(iVLC),在通信过程中,人类无法察觉到闪烁。闪烁问题可以通过增加光脉冲频率来解决。本文通过考虑 iVLC 系统中通信和光感知信道的不同特征,提出了一种二维特征信道分析结构。得出了修正的不可感知差值(JID)。根据修正的 JID,得出了直射和反射光感知情况下的平均光功率上限。在通信信号以超短脉冲调制的 iVLC 系统中,为了减少室内多重反射信道干扰和发光二极管(LED)瞬态行为的影响,我们提出了基于多四元核和深度神经网络(DNN)的硬最大脉冲位置分类器(MQK-DNN-HPPC)。数值结果表明,与基于软最大值的 DNN 算法和传统检测算法相比,应用 MQK-DNN-HPPC 提高了 iVLC 系统的误码率(BER)和同步性能。
{"title":"Imperceptible Visible Light Communications Based on Modified Just Imperceptible Difference and Aided by Deep Neural Network","authors":"Hanyang Shi;Xuefen Chi;Yan Zhao;Linlin Zhao;Feng Shu;Jiangzhou Wang","doi":"10.1109/TGCN.2024.3362790","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3362790","url":null,"abstract":"Indoor visible light communications (VLCs) are not supported in lighting restricted scenarios such as theater, cinema, dim sickroom or bedroom. Thus, different from radio frequency (RF) based communication technologies, such as WiFi, VLC is not “always on”. The “always on” VLC named imperceptible VLC (iVLC) has been proposed, where human cannot perceive glaring nor flicker during the communications. The flicker problem can be solved by increasing the light pulse frequency. In this paper, we propose a two-dimensional characteristic channel analysis structure by considering the different features of communication and light perception channels in iVLC system. The modified just imperceptible difference (JID) has been derived. Based on the modified JID, the upper bounds of average optical power are derived in both direct and reflected light perception scenarios. To reduce the impacts of indoor multiple reflection channel interference and light-emitting diodes (LEDs) transient behaviour in iVLC system where communication signals are modulated in ultra-short pulses, we propose the multi-quadric kernel and deep neural network (DNN) based hard-max pulse position classifier (MQK-DNN-HPPC). Numerical results show that the bit error rate (BER) and synchronization performances of iVLC system are improved by applying MQK-DNN-HPPC compared with the soft-max based DNN algorithm and traditional detection algorithm.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142123061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secrecy Performance Analysis of RIS Assisted Ambient Backscatter Communication Networks RIS 辅助环境反向散射通信网络的保密性能分析
IF 5.3 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-02-13 DOI: 10.1109/TGCN.2024.3365692
Yingjie Pei;Xinwei Yue;Chongwen Huang;Zhiping Lu
Reconfigurable intelligent surface (RIS) and ambient backscatter communication (AmBC) have been envisioned as two promising technologies due to their high transmission reliability as well as energy-efficiency. This paper investigates the secrecy performance of RIS assisted AmBC networks. New closed-form and asymptotic expressions of secrecy outage probability for RIS-AmBC networks are derived by taking into account both imperfect successive interference cancellation (ipSIC) and perfect SIC (pSIC) cases. On top of these, the secrecy diversity order of legitimate user is obtained in high signal-to-noise ratio region, which equals zero and is proportional to the number of RIS elements for ipSIC and pSIC, respectively. The secrecy throughput and energy efficiency are further surveyed to evaluate the secure effectiveness of RIS-AmBC networks. Numerical results are provided to verify the accuracy of theoretical analyses and manifest that: i) The secrecy outage behavior of RIS-AmBC networks exceeds that of conventional AmBC networks; ii) Due to the mutual interference between direct and backscattering links, the number of RIS elements has an optimal value to minimise the secrecy system outage probability; and iii) Secrecy throughput and energy efficiency are strongly influenced by the reflecting coefficient and eavesdropper’s wiretapping ability.
可重构智能表面(RIS)和环境反向散射通信(AmBC)因其高传输可靠性和高能效而被视为两种前景广阔的技术。本文研究了 RIS 辅助 AmBC 网络的保密性能。通过考虑不完美连续干扰消除(ipSIC)和完美连续干扰消除(pSIC)两种情况,推导出 RIS-AmBC 网络保密性中断概率的新闭式和渐近表达式。在此基础上,得到了高信噪比区域内合法用户的保密分集阶,在 ipSIC 和 pSIC 时,合法用户的保密分集阶分别等于 emph{zero} 和与 RIS 元素数量成正比。为评估 RIS-AmBC 网络的安全有效性,还进一步调查了保密吞吐量和能效。提供的数值结果验证了理论分析的准确性,并表明:i) RIS-AmBC 网络的保密中断行为超过了传统 AmBC 网络;ii) 由于直接链路和反向散射链路之间的相互干扰,RIS 元素的数量有一个最佳值,以使保密系统中断概率最小;iii) 保密吞吐量和能效受反射系数和窃听者窃听能力的影响很大。
{"title":"Secrecy Performance Analysis of RIS Assisted Ambient Backscatter Communication Networks","authors":"Yingjie Pei;Xinwei Yue;Chongwen Huang;Zhiping Lu","doi":"10.1109/TGCN.2024.3365692","DOIUrl":"10.1109/TGCN.2024.3365692","url":null,"abstract":"Reconfigurable intelligent surface (RIS) and ambient backscatter communication (AmBC) have been envisioned as two promising technologies due to their high transmission reliability as well as energy-efficiency. This paper investigates the secrecy performance of RIS assisted AmBC networks. New closed-form and asymptotic expressions of secrecy outage probability for RIS-AmBC networks are derived by taking into account both imperfect successive interference cancellation (ipSIC) and perfect SIC (pSIC) cases. On top of these, the secrecy diversity order of legitimate user is obtained in high signal-to-noise ratio region, which equals zero and is proportional to the number of RIS elements for ipSIC and pSIC, respectively. The secrecy throughput and energy efficiency are further surveyed to evaluate the secure effectiveness of RIS-AmBC networks. Numerical results are provided to verify the accuracy of theoretical analyses and manifest that: i) The secrecy outage behavior of RIS-AmBC networks exceeds that of conventional AmBC networks; ii) Due to the mutual interference between direct and backscattering links, the number of RIS elements has an optimal value to minimise the secrecy system outage probability; and iii) Secrecy throughput and energy efficiency are strongly influenced by the reflecting coefficient and eavesdropper’s wiretapping ability.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140235132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RBEER: Rule-Based Energy-Efficient Routing Protocol for Large-Scale UWSNs RBEER:基于规则的大型 UWSN 节能路由协议
IF 5.3 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-02-12 DOI: 10.1109/TGCN.2024.3364776
A. S. Ismail;Ammar Hawbani;Xingfu Wang;Samah Abdel Aziz;Saeed Hamood Alsamhi;Liang Zhao;Ahmed Fathalla
Recently, underwater wireless sensor networks (UWSNs) have seen increasing popularity owing to their extensive applications in aquatic environments, including monitoring underwater pipelines, detecting pollution and disasters, researching marine life, underwater surveillance, and facilitating military surveillance. In fact, the task of devising an adequate routing algorithm is particularly challenging because of the unique underwater environmental conditions. These challenges include energy constraints, dynamic topology, long propagation delays, bandwidth limitations, mobility, and 3-D deployments. Therefore, this study addresses the aforementioned challenges and proposes RBEER, a rule-based energy-efficient routing protocol for large-scale UWSNs. RBEER works in three steps: the first is the network initialization and network clustering, in which a Fuzzy C-means is utilized to perform the clustering and determine the cluster centers. The second step is using the RISE rule-based classifier to select the optimal cluster head (CH) based on five input parameters to generate the set of rules. The last step is data forwarding, in which data is forwarded through a single-hop intra-cluster path from member nodes to CH nodes, then through a multi-hop inter-cluster path from CH nodes to sink nodes. Extensive simulations and experiments have been conducted to evaluate the performance of the RBEER protocol. The results demonstrate that the RBEER protocol outperforms benchmarks regarding packet delivery ratio, end-to-end delay, and energy consumption.
最近,水下无线传感器网络(UWSN)越来越受欢迎,因为它在水下环境中有着广泛的应用,包括监控水下管道、检测污染和灾害、研究海洋生物、水下监视以及促进军事监视。事实上,由于独特的水下环境条件,设计适当的路由算法尤其具有挑战性。这些挑战包括能源限制、动态拓扑、长传播延迟、带宽限制、移动性和三维部署。因此,本研究针对上述挑战,为大规模 UWSNs 提出了基于规则的高能效路由协议 RBEER。RBEER 分三步工作:第一步是网络初始化和网络聚类,利用模糊 C-means 进行聚类并确定聚类中心。第二步是使用基于规则的 RISE 分类器,根据五个输入参数生成规则集,选择最佳簇头(CH)。最后一步是数据转发,即通过从成员节点到 CH 节点的单跳簇内路径转发数据,然后通过从 CH 节点到 sink 节点的多跳簇间路径转发数据。为了评估 RBEER 协议的性能,我们进行了大量的模拟和实验。结果表明,RBEER 协议在数据包传送率、端到端延迟和能耗方面均优于基准。
{"title":"RBEER: Rule-Based Energy-Efficient Routing Protocol for Large-Scale UWSNs","authors":"A. S. Ismail;Ammar Hawbani;Xingfu Wang;Samah Abdel Aziz;Saeed Hamood Alsamhi;Liang Zhao;Ahmed Fathalla","doi":"10.1109/TGCN.2024.3364776","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3364776","url":null,"abstract":"Recently, underwater wireless sensor networks (UWSNs) have seen increasing popularity owing to their extensive applications in aquatic environments, including monitoring underwater pipelines, detecting pollution and disasters, researching marine life, underwater surveillance, and facilitating military surveillance. In fact, the task of devising an adequate routing algorithm is particularly challenging because of the unique underwater environmental conditions. These challenges include energy constraints, dynamic topology, long propagation delays, bandwidth limitations, mobility, and 3-D deployments. Therefore, this study addresses the aforementioned challenges and proposes RBEER, a rule-based energy-efficient routing protocol for large-scale UWSNs. RBEER works in three steps: the first is the network initialization and network clustering, in which a Fuzzy C-means is utilized to perform the clustering and determine the cluster centers. The second step is using the RISE rule-based classifier to select the optimal cluster head (CH) based on five input parameters to generate the set of rules. The last step is data forwarding, in which data is forwarded through a single-hop intra-cluster path from member nodes to CH nodes, then through a multi-hop inter-cluster path from CH nodes to sink nodes. Extensive simulations and experiments have been conducted to evaluate the performance of the RBEER protocol. The results demonstrate that the RBEER protocol outperforms benchmarks regarding packet delivery ratio, end-to-end delay, and energy consumption.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Green Communications and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1