首页 > 最新文献

International Journal of Communication Systems最新文献

英文 中文
Graph Learning–Based Spatial–Temporal Graph Convolutional Neural Network for Overlap Detection and Optimal Link-State Routing for Effective Data Transmission in Visual Sensor Network 基于图学习的时空图卷积神经网络重叠检测和最优链路状态路由在视觉传感器网络中的有效传输
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-02-20 DOI: 10.1002/dac.70439
K. Rajkumar, V. Sivakumar, B. Shunmugapriya, A. Shenbagharaman

Visual sensor network (VSN) captures and transmits the visual data from various locations in real-time monitoring for context aware decision making. Visual sensors have characteristics that make them interesting as sources of information for any process. However, sensors are endowed with low-power cameras for visual monitoring, and it may also impact the outcome that a visual application delivers to the user, such as spatial coverage, lifetime, and dependability. Additionally, due to the restricted resources available to sensor nodes, meeting both coverage and network lifespan criteria may be impossible. In order to address these drawbacks, we developed a hole detection based on grid-based triangle approach and optimal link state routing algorithm for efficient data transfer in VSN. Initially, the node is deployed and captures the visual information across the environmental area. After node deployment, the network undergoes hole detection using grid-based triangle approach–starfish optimization algorithm (GT-SFOA) to identify the uncovered regions. Then, graph learning–based spatial–temporal graph convolutional neural network (GLSTGCN) is used to overlap detection of sensor nodes based on the similarity calculation. Subsequently, the hole recovery mechanism using optimal localizable k-coverage (OLKC) algorithm for reroute similar sensing nodes to cover the holes. Next, low latency optimal link-state routing (LL-OLSR) algorithm is used to transmit the sensor data to the base station effectively. The proposed approach achieves a hole discovery time of 3.3 ms for 100 nodes, an average coverage degree of 81.8%, a packet loss of 2% for 100 nodes, and a routing overhead of 96.49%. The proposed approach improves the coverage accuracy in dynamic environments to enhance the reliability of the visual sensor network.

视觉传感器网络(VSN)捕获并传输来自不同位置的视觉数据,进行实时监控,以实现上下文感知决策。视觉传感器的特性使它们作为任何过程的信息源都很有趣。然而,传感器被赋予了用于视觉监控的低功耗摄像头,它也可能影响视觉应用程序向用户提供的结果,例如空间覆盖、使用寿命和可靠性。此外,由于传感器节点可用的资源有限,同时满足覆盖范围和网络寿命标准可能是不可能的。为了解决这些问题,我们开发了一种基于网格三角形方法的漏洞检测和最优链路状态路由算法,以实现VSN中有效的数据传输。最初,部署节点并捕获整个环境区域的可视信息。节点部署完成后,采用基于网格的三角法-海星优化算法(GT-SFOA)对网络进行孔检测,识别未覆盖区域。然后,利用基于图学习的时空图卷积神经网络(GLSTGCN)基于相似度计算对传感器节点进行重叠检测;随后,利用最优可定位k-覆盖(OLKC)算法重新路由相似的感知节点来覆盖孔洞。其次,采用低延迟最优链路状态路由(LL-OLSR)算法将传感器数据有效地传输到基站。该方法实现了100个节点的漏洞发现时间为3.3 ms,平均覆盖率为81.8%,100个节点的丢包率为2%,路由开销为96.49%。该方法提高了动态环境下的覆盖精度,提高了视觉传感器网络的可靠性。
{"title":"Graph Learning–Based Spatial–Temporal Graph Convolutional Neural Network for Overlap Detection and Optimal Link-State Routing for Effective Data Transmission in Visual Sensor Network","authors":"K. Rajkumar,&nbsp;V. Sivakumar,&nbsp;B. Shunmugapriya,&nbsp;A. Shenbagharaman","doi":"10.1002/dac.70439","DOIUrl":"https://doi.org/10.1002/dac.70439","url":null,"abstract":"<div>\u0000 \u0000 <p>Visual sensor network (VSN) captures and transmits the visual data from various locations in real-time monitoring for context aware decision making. Visual sensors have characteristics that make them interesting as sources of information for any process. However, sensors are endowed with low-power cameras for visual monitoring, and it may also impact the outcome that a visual application delivers to the user, such as spatial coverage, lifetime, and dependability. Additionally, due to the restricted resources available to sensor nodes, meeting both coverage and network lifespan criteria may be impossible. In order to address these drawbacks, we developed a hole detection based on grid-based triangle approach and optimal link state routing algorithm for efficient data transfer in VSN. Initially, the node is deployed and captures the visual information across the environmental area. After node deployment, the network undergoes hole detection using grid-based triangle approach–starfish optimization algorithm (GT-SFOA) to identify the uncovered regions. Then, graph learning–based spatial–temporal graph convolutional neural network (GLSTGCN) is used to overlap detection of sensor nodes based on the similarity calculation. Subsequently, the hole recovery mechanism using optimal localizable <i>k</i>-coverage (OLKC) algorithm for reroute similar sensing nodes to cover the holes. Next, low latency optimal link-state routing (LL-OLSR) algorithm is used to transmit the sensor data to the base station effectively. The proposed approach achieves a hole discovery time of 3.3 ms for 100 nodes, an average coverage degree of 81.8%, a packet loss of 2% for 100 nodes, and a routing overhead of 96.49%. The proposed approach improves the coverage accuracy in dynamic environments to enhance the reliability of the visual sensor network.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 5","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147320834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced Heuristic Approach for Minimizing Maximum Link Utilization in SDN Using Flow Splitting and Path Cost-Based OSPF Weight Adjustment 基于流量分割和基于路径成本的OSPF权值调整的SDN中最小化最大链路利用率的增强启发式方法
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-02-19 DOI: 10.1002/dac.70450
Prabu. U, Harika Nayudu, Tharuni Keerthi Pasumarthi, Geetha. V

Software-defined networking (SDN) is revolutionizing network architecture by offering incredible scalability, flexibility, and programmability. SDN's applications have expanded into various domains, including cloud computing, edge computing, enterprise networks, data centers, and the Internet of Things. One of its standout features is its ability to enhance traffic engineering. Traffic engineering involves optimizing and dynamically controlling traffic flows to reduce congestion and minimize the maximum link utilization, all while managing network traffic from a centralized point. SDN boosts overall network performance, improves user experience, and ensures that resources are used effectively. Minimizing maximum link utilization means distributing network traffic across different links or paths to make use of the most available resources and avoid congestion. This process is often referred to as load balancing or congestion minimization within the network. The primary aim is to prevent any single link from becoming overloaded. Over the years, various algorithms have been proposed to tackle this issue, but still such algorithms struggle with effectively minimizing the maximum link utilization. The proposed work achieves approximately 24% and 16% improvement in load balancing; it reduces congestion by 94% and 60% when compared to tabu search and enhanced tabu search.

软件定义网络(SDN)通过提供令人难以置信的可伸缩性、灵活性和可编程性,正在彻底改变网络架构。SDN的应用已经扩展到云计算、边缘计算、企业网络、数据中心、物联网等多个领域。它的一个突出特点是能够增强交通工程。流量工程涉及优化和动态控制流量,以减少拥塞和最小化最大链路利用率,同时从一个集中点管理网络流量。SDN提升了整体网络性能,改善了用户体验,保证了资源的有效利用。最小化最大链路利用率是指将网络流量分配到不同的链路或路径上,以充分利用可用的资源,避免拥塞。这个过程通常被称为网络中的负载平衡或拥塞最小化。其主要目的是防止任何单个链接过载。多年来,已经提出了各种算法来解决这个问题,但这些算法仍然难以有效地最小化最大链路利用率。提出的工作在负载平衡方面实现了大约24%和16%的改进;与禁忌搜索和增强禁忌搜索相比,它分别减少了94%和60%的拥塞。
{"title":"An Enhanced Heuristic Approach for Minimizing Maximum Link Utilization in SDN Using Flow Splitting and Path Cost-Based OSPF Weight Adjustment","authors":"Prabu. U,&nbsp;Harika Nayudu,&nbsp;Tharuni Keerthi Pasumarthi,&nbsp;Geetha. V","doi":"10.1002/dac.70450","DOIUrl":"https://doi.org/10.1002/dac.70450","url":null,"abstract":"<div>\u0000 \u0000 <p>Software-defined networking (SDN) is revolutionizing network architecture by offering incredible scalability, flexibility, and programmability. SDN's applications have expanded into various domains, including cloud computing, edge computing, enterprise networks, data centers, and the Internet of Things. One of its standout features is its ability to enhance traffic engineering. Traffic engineering involves optimizing and dynamically controlling traffic flows to reduce congestion and minimize the maximum link utilization, all while managing network traffic from a centralized point. SDN boosts overall network performance, improves user experience, and ensures that resources are used effectively. Minimizing maximum link utilization means distributing network traffic across different links or paths to make use of the most available resources and avoid congestion. This process is often referred to as load balancing or congestion minimization within the network. The primary aim is to prevent any single link from becoming overloaded. Over the years, various algorithms have been proposed to tackle this issue, but still such algorithms struggle with effectively minimizing the maximum link utilization. The proposed work achieves approximately 24% and 16% improvement in load balancing; it reduces congestion by 94% and 60% when compared to tabu search and enhanced tabu search.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 5","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147315612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Anomalies in Social Multimedia Domain With AI Integrated Software-Defined Networking 基于AI集成软件定义网络的社交多媒体领域异常检测
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-02-19 DOI: 10.1002/dac.70445
D. Ganesh, Harshal Shah, Arun Kumar Marandi, Shweta Loonkar,  Aarju, Jayant Jagtap

Social multimedia (SM) platforms such as Instagram, LinkedIn, YouTube, Facebook, and Twitter enable users to communicate, share ideas, and exchange information within virtual networks. The widespread use of multimedia-based applications has led to a substantial increase in social media traffic, often containing sensitive personal and interaction data. These data are vulnerable to security threats, including identity theft and information misuse, highlighting the need for effective anomaly detection mechanisms. This research proposes an enhanced binary spotted hyena optimized dependent linear regression (EBSHO-DLR) method to detect anomalies in SM networks, ensuring secure data transmission. The framework begins with collecting a Twitter dataset from India, followed by pre-processing using Gaussian blur (GB) to filter anomalies and histogram of oriented gradients (HOG) for feature extraction, removing irrelevant information. The proposed method integrates software-defined networking (SDN) to provide dynamic, programmatically efficient network management, improving performance and monitoring compared to conventional approaches. Experimental evaluation demonstrates the effectiveness of the method in detecting fraudulent activities such as identity theft, profile cloning, and unauthorized data collection. Key performance metrics include precision (96.7%) and accuracy (97.8%), confirming the robustness and reliability of the EBSHO-DLR approach for securing social multimedia communication systems.

社交多媒体(Social multimedia, SM)平台,如Instagram、LinkedIn、YouTube、Facebook和Twitter,使用户能够在虚拟网络中进行沟通、分享想法和交换信息。基于多媒体的应用程序的广泛使用导致了社交媒体流量的大幅增加,这些流量通常包含敏感的个人和交互数据。这些数据容易受到安全威胁,包括身份盗窃和信息滥用,因此需要有效的异常检测机制。本研究提出了一种增强的二元斑点鬣狗优化相关线性回归(EBSHO-DLR)方法来检测SM网络中的异常,确保数据的安全传输。该框架首先收集来自印度的Twitter数据集,然后使用高斯模糊(GB)进行预处理以过滤异常,并使用定向梯度直方图(HOG)进行特征提取,去除无关信息。与传统方法相比,该方法集成了软件定义网络(SDN),提供动态、编程高效的网络管理,提高了性能和监控。实验评估证明了该方法在检测身份盗窃、个人资料克隆和未经授权的数据收集等欺诈活动方面的有效性。关键性能指标包括精密度(96.7%)和准确度(97.8%),证实了EBSHO-DLR方法用于保护社交多媒体通信系统的鲁棒性和可靠性。
{"title":"Detection of Anomalies in Social Multimedia Domain With AI Integrated Software-Defined Networking","authors":"D. Ganesh,&nbsp;Harshal Shah,&nbsp;Arun Kumar Marandi,&nbsp;Shweta Loonkar,&nbsp; Aarju,&nbsp;Jayant Jagtap","doi":"10.1002/dac.70445","DOIUrl":"https://doi.org/10.1002/dac.70445","url":null,"abstract":"<div>\u0000 \u0000 <p>Social multimedia (SM) platforms such as Instagram, LinkedIn, YouTube, Facebook, and Twitter enable users to communicate, share ideas, and exchange information within virtual networks. The widespread use of multimedia-based applications has led to a substantial increase in social media traffic, often containing sensitive personal and interaction data. These data are vulnerable to security threats, including identity theft and information misuse, highlighting the need for effective anomaly detection mechanisms. This research proposes an enhanced binary spotted hyena optimized dependent linear regression (EBSHO-DLR) method to detect anomalies in SM networks, ensuring secure data transmission. The framework begins with collecting a Twitter dataset from India, followed by pre-processing using Gaussian blur (GB) to filter anomalies and histogram of oriented gradients (HOG) for feature extraction, removing irrelevant information. The proposed method integrates software-defined networking (SDN) to provide dynamic, programmatically efficient network management, improving performance and monitoring compared to conventional approaches. Experimental evaluation demonstrates the effectiveness of the method in detecting fraudulent activities such as identity theft, profile cloning, and unauthorized data collection. Key performance metrics include precision (96.7%) and accuracy (97.8%), confirming the robustness and reliability of the EBSHO-DLR approach for securing social multimedia communication systems.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 5","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146217454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Innovative Ladybug Beetle Optimized Multi-Granularity Gated Temporal Convolutional Network for Resource Allocation in 5G Wireless Networks 面向5G无线网络资源分配的创新型瓢虫甲虫优化多粒度门控时间卷积网络
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-02-19 DOI: 10.1002/dac.70426
T. Senthil Kumaran, N. Kanimozhi, V. Sangeetha, S. Lavanya

The rapid development of 5G communication systems has further increased the popularity of wireless personal communication. However, for improving existing wireless personal communication networks, meeting rigorous broadcast rapidity and QoS requirements is an obstacle. Non-orthogonal multiple access and massive multiple-input multiple-output are two emerging technologies with enormous potential. RA at the BS is crucial to ensure fair distribution of services among users. Increasingly, as the number of users goes up, it becomes indispensable for WNs to elevate their capacity to address increasing demands. One of the significant ways to do this is by the integration of MIMO-NOMA. This manuscript proposes a novel deep learning-based resource allocation approach to maximize RA efficiency in MIMO-NOMA. First of all, the users are grouped. For that purpose, a highly correlated K-means clustering technique has been introduced, which helps control interference across and within clusters. Further, the aim is to improve the spectral efficiency, maximize the system capacity, and ensure fairness in resource allocation using a Multi-Granularity Gated Temporal Convolutional Neural Network. Also, the LBO technique has been proposed to optimize the weight parameter of MG-TCNN to improve the SE performance. A decay-based movement adjustment was also incorporated into the LBO to maintain exploration and exploitation in better terms for improved convergence behavior. The proposed framework has been administered and simulated via the Python platform. Several assessment metrics, such as ASR, SE, and EE have been computed and associated with other frameworks. A comprehensive ASR of 88.76 Mbps, SE of 119.40 bits/s/Hz, and EE of 19.43 bits/joules/Hz is obtained by the proposed framework for allocating the resources to the 5G WNs.

5G通信系统的快速发展,进一步提高了无线个人通信的普及程度。然而,对于现有无线个人通信网络的改进,满足严格的广播速度和QoS要求是一个障碍。非正交多址和海量多输入多输出是两项具有巨大潜力的新兴技术。电讯管理局的注册登记制度对确保服务公平分配给用户至关重要。随着用户数量的增加,无线网络必须提高其能力以满足日益增长的需求。实现这一目标的一个重要方法是整合MIMO-NOMA。本文提出了一种新的基于深度学习的资源分配方法,以最大化MIMO-NOMA中的RA效率。首先,对用户进行分组。为此,引入了高度相关的k -均值聚类技术,这有助于控制聚类之间和内部的干扰。此外,利用多粒度门控时间卷积神经网络提高频谱效率,最大化系统容量,并确保资源分配的公平性。此外,还提出了LBO技术来优化MG-TCNN的权值参数,以提高SE性能。基于衰减的运动调整也被纳入到杠杆收购中,以更好地维持勘探和开采,改善收敛行为。提出的框架已通过Python平台进行管理和模拟。一些评估指标,如ASR、SE和EE已经被计算并与其他框架相关联。提出的5G无线网络资源分配框架的综合ASR为88.76 Mbps, SE为119.40 bits/s/Hz, EE为19.43 bits/joules/Hz。
{"title":"An Innovative Ladybug Beetle Optimized Multi-Granularity Gated Temporal Convolutional Network for Resource Allocation in 5G Wireless Networks","authors":"T. Senthil Kumaran,&nbsp;N. Kanimozhi,&nbsp;V. Sangeetha,&nbsp;S. Lavanya","doi":"10.1002/dac.70426","DOIUrl":"https://doi.org/10.1002/dac.70426","url":null,"abstract":"<div>\u0000 \u0000 <p>The rapid development of 5G communication systems has further increased the popularity of wireless personal communication. However, for improving existing wireless personal communication networks, meeting rigorous broadcast rapidity and QoS requirements is an obstacle. Non-orthogonal multiple access and massive multiple-input multiple-output are two emerging technologies with enormous potential. RA at the BS is crucial to ensure fair distribution of services among users. Increasingly, as the number of users goes up, it becomes indispensable for WNs to elevate their capacity to address increasing demands. One of the significant ways to do this is by the integration of MIMO-NOMA. This manuscript proposes a novel deep learning-based resource allocation approach to maximize RA efficiency in MIMO-NOMA. First of all, the users are grouped. For that purpose, a highly correlated K-means clustering technique has been introduced, which helps control interference across and within clusters. Further, the aim is to improve the spectral efficiency, maximize the system capacity, and ensure fairness in resource allocation using a Multi-Granularity Gated Temporal Convolutional Neural Network. Also, the LBO technique has been proposed to optimize the weight parameter of MG-TCNN to improve the SE performance. A decay-based movement adjustment was also incorporated into the LBO to maintain exploration and exploitation in better terms for improved convergence behavior. The proposed framework has been administered and simulated via the Python platform. Several assessment metrics, such as ASR, SE, and EE have been computed and associated with other frameworks. A comprehensive ASR of 88.76 Mbps, SE of 119.40 bits/s/Hz, and EE of 19.43 bits/joules/Hz is obtained by the proposed framework for allocating the resources to the 5G WNs.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 5","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146224462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved ECC-Based Authenticated Key Exchange Protocol for Industrial IoT Environments 工业物联网环境下基于ecc的改进认证密钥交换协议
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-02-19 DOI: 10.1002/dac.70438
K. Somasena Reddy, Ponnuru Sowjanya

The Industrial Internet of Things (IIoT) represents a transformative force in modern industries, enabling unparalleled levels of automation, efficiency, and data-driven decision-making. However, the pervasive connectivity and heterogeneity of IIoT devices introduce significant security challenges, with authentication and access control emerging as critical concerns. This paper proposes a comprehensive authentication scheme specifically tailored for IIoT environments, encompassing system initialization, device registration, mutual authentication, and dynamic device addition phases. At the heart of this scheme lies an innovative approach to key exchange, leveraging an improved elliptic curve cryptography (ECC) model enhanced by a novel self-improved white shark optimization (SI-WSO) algorithm. This inspiration from the acute sensory capabilities of great white sharks, the SIWSO algorithm optimizes key generation efficiency, strengthening the security and reliability of IIoT authentication processes. Through a seamless integration of cryptographic principles and nature-inspired optimization techniques, the proposed scheme aims to fortify IIoT infrastructures, mitigating security threats and fostering trust in industrial deployments. This paper presents a rigorous exploration of the proposed authentication scheme, highlighting its efficacy in enhancing IIoT security and resilience. As IIoT continues to evolve, robust authentication mechanisms play a pivotal role in safeguarding critical assets and sustaining the momentum of digital transformation in industrial settings.

工业物联网(IIoT)代表了现代工业的变革力量,实现了无与伦比的自动化、效率和数据驱动决策水平。然而,工业物联网设备的普遍连接和异构性带来了重大的安全挑战,身份验证和访问控制成为关键问题。本文提出了一个专门为工业物联网环境量身定制的综合认证方案,包括系统初始化,设备注册,相互认证和动态设备添加阶段。该方案的核心是一种创新的密钥交换方法,利用改进的椭圆曲线加密(ECC)模型,该模型由一种新的自改进白鲨优化(SI-WSO)算法增强。这种灵感来自大白鲨的敏锐感官能力,SIWSO算法优化了密钥生成效率,加强了IIoT认证过程的安全性和可靠性。通过加密原理和自然优化技术的无缝集成,拟议的方案旨在加强工业物联网基础设施,减轻安全威胁并促进对工业部署的信任。本文对所提出的认证方案进行了严格的探索,强调了其在增强工业物联网安全性和弹性方面的有效性。随着工业物联网的不断发展,强大的身份验证机制在保护关键资产和维持工业环境中数字化转型的势头方面发挥着关键作用。
{"title":"An Improved ECC-Based Authenticated Key Exchange Protocol for Industrial IoT Environments","authors":"K. Somasena Reddy,&nbsp;Ponnuru Sowjanya","doi":"10.1002/dac.70438","DOIUrl":"https://doi.org/10.1002/dac.70438","url":null,"abstract":"<div>\u0000 \u0000 <p>The Industrial Internet of Things (IIoT) represents a transformative force in modern industries, enabling unparalleled levels of automation, efficiency, and data-driven decision-making. However, the pervasive connectivity and heterogeneity of IIoT devices introduce significant security challenges, with authentication and access control emerging as critical concerns. This paper proposes a comprehensive authentication scheme specifically tailored for IIoT environments, encompassing system initialization, device registration, mutual authentication, and dynamic device addition phases. At the heart of this scheme lies an innovative approach to key exchange, leveraging an improved elliptic curve cryptography (ECC) model enhanced by a novel self-improved white shark optimization (SI-WSO) algorithm. This inspiration from the acute sensory capabilities of great white sharks, the SIWSO algorithm optimizes key generation efficiency, strengthening the security and reliability of IIoT authentication processes. Through a seamless integration of cryptographic principles and nature-inspired optimization techniques, the proposed scheme aims to fortify IIoT infrastructures, mitigating security threats and fostering trust in industrial deployments. This paper presents a rigorous exploration of the proposed authentication scheme, highlighting its efficacy in enhancing IIoT security and resilience. As IIoT continues to evolve, robust authentication mechanisms play a pivotal role in safeguarding critical assets and sustaining the momentum of digital transformation in industrial settings.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 5","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146256569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GPrUO-TD2NN: Optimized Drift-Enabled Deep Learning Framework for Intrusion Detection in Wireless Sensor Networks GPrUO-TD2NN:基于漂移优化的无线传感器网络入侵检测深度学习框架
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-02-18 DOI: 10.1002/dac.70440
Deepali Mahesh Gohil

Intrusion detection holds a significant application in identifying malicious packets and maintaining cybersecurity. The multiplex distribution of network traffic and the evolving nature of threats impact the effectiveness of the detection methods. Moreover, the prevailing approaches faced complexities due to the excessive false alarms and feature losses. The research proposes grouped probabilistic update optimized transfer learning with drift-enabled distributed neural network (GPrUO-TD2NN) to address the challenges and to exhibit effective outcomes for diverse network threats. The internal covariance of the data distributions is identified using the drift mechanism, and the generalization of targeted data is enhanced by including transfer learning. In addition, the grouped probabilistic update optimized synthetic minority oversampling (GPrUS2M) approach refines the data by minimizing the imbalances, and neighbor sets are chosen with a definiteness over the attributes of each instance. The grouped probabilistic update optimization (GPrUO) algorithm enhances the selection of better neighbor sets and also assists in parameter tuning of the detection model. Moreover, the effectiveness of the GPrUO-TD2NN in intrusion detection is computed using various metrics that exhibit superior outcomes with higher 96.92% precision, 97.29% recall, 97.16% accuracy, and 97.10% F1 score using 90% training.

入侵检测在识别恶意数据包和维护网络安全方面有着重要的应用。网络流量的多重分布和威胁的不断演变影响着检测方法的有效性。此外,由于存在过多的虚警和特征损失,现有的方法面临着复杂性。该研究提出了基于漂移支持的分布式神经网络(GPrUO-TD2NN)的分组概率更新优化迁移学习方法,以应对各种网络威胁,并展示有效的结果。利用漂移机制识别数据分布的内部协方差,并通过迁移学习增强目标数据的泛化。此外,分组概率更新优化的合成少数派过采样(GPrUS2M)方法通过最小化不平衡来改进数据,并在每个实例的属性上确定地选择邻居集。分组概率更新优化(gprouo)算法增强了更好邻居集的选择,也有助于检测模型的参数调整。此外,使用各种指标计算gproo - td2nn在入侵检测中的有效性,结果显示,使用90%的训练,gproo - td2nn具有更高的96.92%的精度,97.29%的召回率,97.16%的准确率和97.10%的F1分数。
{"title":"GPrUO-TD2NN: Optimized Drift-Enabled Deep Learning Framework for Intrusion Detection in Wireless Sensor Networks","authors":"Deepali Mahesh Gohil","doi":"10.1002/dac.70440","DOIUrl":"https://doi.org/10.1002/dac.70440","url":null,"abstract":"<div>\u0000 \u0000 <p>Intrusion detection holds a significant application in identifying malicious packets and maintaining cybersecurity. The multiplex distribution of network traffic and the evolving nature of threats impact the effectiveness of the detection methods. Moreover, the prevailing approaches faced complexities due to the excessive false alarms and feature losses. The research proposes grouped probabilistic update optimized transfer learning with drift-enabled distributed neural network (GPrUO-TD2NN) to address the challenges and to exhibit effective outcomes for diverse network threats. The internal covariance of the data distributions is identified using the drift mechanism, and the generalization of targeted data is enhanced by including transfer learning. In addition, the grouped probabilistic update optimized synthetic minority oversampling (GPrUS2M) approach refines the data by minimizing the imbalances, and neighbor sets are chosen with a definiteness over the attributes of each instance. The grouped probabilistic update optimization (GPrUO) algorithm enhances the selection of better neighbor sets and also assists in parameter tuning of the detection model. Moreover, the effectiveness of the GPrUO-TD2NN in intrusion detection is computed using various metrics that exhibit superior outcomes with higher 96.92% precision, 97.29% recall, 97.16% accuracy, and 97.10% F1 score using 90% training.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 5","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146217567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Reflector Metasurface Design for 6G Adaptive Beamforming Using Model-Level Multi-Scale Edge Guided Attention Graph Neural Network With Biruni Earth Radius Optimization 基于Biruni地球半径优化模型级多尺度边缘引导注意图神经网络的6G自适应波束形成智能反射面设计
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-02-17 DOI: 10.1002/dac.70351
Jyoti Atul Dhanke, R. Krishnamoorthy, G.S.N. Murthy, Lakshmana Phaneendra Maguluri, Jnaneshwar Pai Maroor, Mangal Singh

The advancement of sixth-generation (6G) wireless communication demands intelligent, adaptive solutions to meet the increasing requirements of ultra-reliable low-latency communication (URLLC), massive connectivity, and terahertz (THz) data rates. Intelligent Reflecting Metasurfaces (IRMs) have emerged as a revolutionary paradigm that reconfigures the wireless propagation environment by intelligently controlling the behavior of electromagnetic waves. However, traditional beamforming methods face significant challenges in dynamically adapting to complex, time-varying wireless environments, especially in the presence of high user mobility and signal obstructions. These limitations hinder the efficiency of signal directionality and energy focusing, resulting in sub-optimal communication performance. To overcome these issues, a novel framework, the Model-Level Multi-Scale Edge-Guided Attention graph neural Network (M-LMSedGAN), is introduced, enabling efficient learning from complex spatial relationships and heterogeneous signal interactions. Optimization of the reflective phase shifts is achieved using the Biruni Earth Radius Optimization (BERO) algorithm, which enhances the global search capability and convergence efficiency of the system. The proposed method enables real-time and context-aware beamforming adjustments, achieving superior signal quality and improved network performance. Experimental evaluations demonstrate a peak beamforming accuracy of 99.9%, indicating robust generalization across dynamic environments and diverse user distributions. This intelligent approach establishes a foundation for deploying energy-efficient, high-performance IRM-assisted 6G communication infrastructures.

第六代(6G)无线通信的发展需要智能、自适应的解决方案,以满足日益增长的超可靠低延迟通信(URLLC)、海量连接和太赫兹(THz)数据速率的需求。智能反射元表面(irm)已经成为一种革命性的范例,它通过智能控制电磁波的行为来重新配置无线传播环境。然而,传统的波束形成方法在动态适应复杂的时变无线环境方面面临重大挑战,特别是在存在高用户移动性和信号障碍物的情况下。这些限制阻碍了信号方向性和能量聚焦的效率,导致通信性能次优。为了克服这些问题,引入了一种新的框架,即模型级多尺度边缘引导注意图神经网络(M-LMSedGAN),能够从复杂的空间关系和异构信号相互作用中高效学习。采用Biruni地球半径优化(BERO)算法对反射相移进行优化,提高了系统的全局搜索能力和收敛效率。所提出的方法能够实现实时和上下文感知的波束形成调整,实现卓越的信号质量和改进的网络性能。实验评估表明,峰值波束形成精度为99.9%,表明了动态环境和不同用户分布的鲁棒泛化。这种智能方法为部署节能、高性能irm辅助的6G通信基础设施奠定了基础。
{"title":"Intelligent Reflector Metasurface Design for 6G Adaptive Beamforming Using Model-Level Multi-Scale Edge Guided Attention Graph Neural Network With Biruni Earth Radius Optimization","authors":"Jyoti Atul Dhanke,&nbsp;R. Krishnamoorthy,&nbsp;G.S.N. Murthy,&nbsp;Lakshmana Phaneendra Maguluri,&nbsp;Jnaneshwar Pai Maroor,&nbsp;Mangal Singh","doi":"10.1002/dac.70351","DOIUrl":"https://doi.org/10.1002/dac.70351","url":null,"abstract":"<div>\u0000 \u0000 <p>The advancement of sixth-generation (6G) wireless communication demands intelligent, adaptive solutions to meet the increasing requirements of ultra-reliable low-latency communication (URLLC), massive connectivity, and terahertz (THz) data rates. Intelligent Reflecting Metasurfaces (IRMs) have emerged as a revolutionary paradigm that reconfigures the wireless propagation environment by intelligently controlling the behavior of electromagnetic waves. However, traditional beamforming methods face significant challenges in dynamically adapting to complex, time-varying wireless environments, especially in the presence of high user mobility and signal obstructions. These limitations hinder the efficiency of signal directionality and energy focusing, resulting in sub-optimal communication performance. To overcome these issues, a novel framework, the Model-Level Multi-Scale Edge-Guided Attention graph neural Network (M-LMSedGAN), is introduced, enabling efficient learning from complex spatial relationships and heterogeneous signal interactions. Optimization of the reflective phase shifts is achieved using the Biruni Earth Radius Optimization (BERO) algorithm, which enhances the global search capability and convergence efficiency of the system. The proposed method enables real-time and context-aware beamforming adjustments, achieving superior signal quality and improved network performance. Experimental evaluations demonstrate a peak beamforming accuracy of 99.9%, indicating robust generalization across dynamic environments and diverse user distributions. This intelligent approach establishes a foundation for deploying energy-efficient, high-performance IRM-assisted 6G communication infrastructures.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 5","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146217605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Precise Anomaly Recognition Using Advanced Federated Learning in Resource-Restricted WSN With Unreliable Connections 基于高级联邦学习的不可靠连接资源受限WSN精确异常识别
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-02-16 DOI: 10.1002/dac.70424
L. Bhagyalakshmi, K. Krishnamoorthy, Saiyed Faiayaz Waris, M. Karthiga

This work presents an advanced federated learning (FL) framework that integrates a CNN–GRU + FedTrust model for precise anomaly recognition in resource-constrained wireless sensor networks (WSNs) with unreliable connections. Unlike traditional centralized and heterogeneous FL approaches, the proposed system achieves higher accuracy, efficiency, and robustness by combining lightweight CNN–GRU feature extraction with trust-weighted aggregation through the FedTrust mechanism. The model leverages top-k gradient sparsification to reduce communication overhead and energy-aware client selection (EAC) to optimize energy use, ensuring sustainable network performance. Evaluations on real-world datasets—WUSTL Wireless Sensor Data and Intel Lab Data—demonstrate the model's superiority, achieving 98.4% accuracy, 0.98 F1 score, and faster convergence than Autoencoder-FL, GNN-FL, and hierarchical FL methods. It also exhibits enhanced robustness under client dropout (96.1%) and noise (92.7%) conditions, significantly outperforming existing FL techniques. By efficiently capturing both spatial and temporal patterns while maintaining privacy and energy balance, the CNN–GRU + FedTrust framework delivers reliable and scalable anomaly detection across diverse IoT and smart-industry environments. This hybrid design establishes a new benchmark for energy-efficient, trustworthy, and high-precision FL-based anomaly detection in next-generation WSNs.

这项工作提出了一个先进的联邦学习(FL)框架,该框架集成了CNN-GRU + FedTrust模型,用于在连接不可靠的资源受限无线传感器网络(wsn)中进行精确的异常识别。与传统的集中式和异构FL方法不同,该系统通过FedTrust机制将轻量级CNN-GRU特征提取与信任加权聚合相结合,实现了更高的准确性、效率和鲁棒性。该模型利用top-k梯度稀疏化来减少通信开销,并利用能源感知客户端选择(EAC)来优化能源使用,确保可持续的网络性能。对真实数据集(wustl无线传感器数据和英特尔实验室数据)的评估证明了该模型的优越性,与Autoencoder-FL、GNN-FL和分层FL方法相比,该模型的准确率达到98.4%,F1得分为0.98,收敛速度更快。它在客户端丢失(96.1%)和噪声(92.7%)条件下也表现出增强的鲁棒性,显著优于现有的FL技术。通过有效捕获空间和时间模式,同时保持隐私和能量平衡,CNN-GRU + FedTrust框架在各种物联网和智能工业环境中提供可靠和可扩展的异常检测。这种混合设计为下一代无线传感器网络中节能、可靠和高精度的基于fl的异常检测建立了新的基准。
{"title":"Precise Anomaly Recognition Using Advanced Federated Learning in Resource-Restricted WSN With Unreliable Connections","authors":"L. Bhagyalakshmi,&nbsp;K. Krishnamoorthy,&nbsp;Saiyed Faiayaz Waris,&nbsp;M. Karthiga","doi":"10.1002/dac.70424","DOIUrl":"https://doi.org/10.1002/dac.70424","url":null,"abstract":"<div>\u0000 \u0000 <p>This work presents an advanced federated learning (FL) framework that integrates a CNN–GRU + FedTrust model for precise anomaly recognition in resource-constrained wireless sensor networks (WSNs) with unreliable connections. Unlike traditional centralized and heterogeneous FL approaches, the proposed system achieves higher accuracy, efficiency, and robustness by combining lightweight CNN–GRU feature extraction with trust-weighted aggregation through the FedTrust mechanism. The model leverages top-k gradient sparsification to reduce communication overhead and energy-aware client selection (EAC) to optimize energy use, ensuring sustainable network performance. Evaluations on real-world datasets—WUSTL Wireless Sensor Data and Intel Lab Data—demonstrate the model's superiority, achieving 98.4% accuracy, 0.98 F1 score, and faster convergence than Autoencoder-FL, GNN-FL, and hierarchical FL methods. It also exhibits enhanced robustness under client dropout (96.1%) and noise (92.7%) conditions, significantly outperforming existing FL techniques. By efficiently capturing both spatial and temporal patterns while maintaining privacy and energy balance, the CNN–GRU + FedTrust framework delivers reliable and scalable anomaly detection across diverse IoT and smart-industry environments. This hybrid design establishes a new benchmark for energy-efficient, trustworthy, and high-precision FL-based anomaly detection in next-generation WSNs.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 5","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146217350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Elk Skill Optimizer Enabled Joint Channel Access and Energy Management Algorithm for Dynamic Channel Allocation in WSN 基于Elk技能优化器的无线传感器网络联合信道接入与能量管理算法
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-02-15 DOI: 10.1002/dac.70421
Vijayan P, Mani S.V.J, Michael Mahesh K, Ramachandran A

Wireless sensor networks (WSNs) are widely used for data collection in environments with limited infrastructure and resource-constrained sensor nodes (SNs). To meet these demands, utilizing multiple wireless channels has emerged as a promising solution to increase network capacity and reduce interference. However, exploiting multiple channels in energy-constrained WSNs introduces significant challenges. Thus, this research introduces an elk skill optimizer (ESO) for dynamic channel allocation (DCA) in WSN. Initially, the CA system model is simulated, and channel assignment is accomplished. The channel assignment with joint power allocation, sampling rate, and transmission rate is performed employing ESO. Finally, channel assignment is conducted utilizing a deep Kronecker network (DKN) to determine the allocated channel at the next time interval. In addition, ESO obtained high performance results compared to existing schemes with maximum values of achievable rate, energy efficiency, network utility, and sum rate about 6.013 Mbits/s, 0.242 Mbits/J, 282.172, and 121.022 Mbits/s as well as minimum value of bit error rate (BER) about 0.776. Moreover, the performance gained by the proposed scheme when considering the metrics achievable rate is 30.191%, 17.354%, 28.032%, 16.520%, 14.215%, and 1.317% higher than the existing schemes used for comparison.

无线传感器网络(WSNs)广泛应用于基础设施有限和传感器节点资源受限的环境中进行数据采集。为了满足这些需求,利用多个无线信道已成为增加网络容量和减少干扰的一种有前途的解决方案。然而,在能量受限的无线传感器网络中利用多个通道会带来重大挑战。为此,本研究引入了一种用于无线传感器网络动态信道分配的麋鹿技能优化器(ESO)。首先,对CA系统模型进行了仿真,完成了信道分配。采用ESO实现联合功率分配、采样率和传输率的信道分配。最后,利用深度Kronecker网络(DKN)进行信道分配,以确定在下一个时间间隔分配的信道。此外,与现有方案相比,ESO获得了较高的性能,可达速率、能源效率、网络效用和总和速率的最大值分别为6.013 Mbits/s、0.242 Mbits/J、282.172和121.022 Mbits/s,误码率(BER)的最小值为0.776。在考虑指标可达率的情况下,所提方案的性能比现有方案分别提高30.191%、17.354%、28.032%、16.520%、14.215%和1.317%。
{"title":"Elk Skill Optimizer Enabled Joint Channel Access and Energy Management Algorithm for Dynamic Channel Allocation in WSN","authors":"Vijayan P,&nbsp;Mani S.V.J,&nbsp;Michael Mahesh K,&nbsp;Ramachandran A","doi":"10.1002/dac.70421","DOIUrl":"https://doi.org/10.1002/dac.70421","url":null,"abstract":"<div>\u0000 \u0000 <p>Wireless sensor networks (WSNs) are widely used for data collection in environments with limited infrastructure and resource-constrained sensor nodes (SNs). To meet these demands, utilizing multiple wireless channels has emerged as a promising solution to increase network capacity and reduce interference. However, exploiting multiple channels in energy-constrained WSNs introduces significant challenges. Thus, this research introduces an elk skill optimizer (ESO) for dynamic channel allocation (DCA) in WSN. Initially, the CA system model is simulated, and channel assignment is accomplished. The channel assignment with joint power allocation, sampling rate, and transmission rate is performed employing ESO. Finally, channel assignment is conducted utilizing a deep Kronecker network (DKN) to determine the allocated channel at the next time interval. In addition, ESO obtained high performance results compared to existing schemes with maximum values of achievable rate, energy efficiency, network utility, and sum rate about 6.013 Mbits/s, 0.242 Mbits/J, 282.172, and 121.022 Mbits/s as well as minimum value of bit error rate (BER) about 0.776. Moreover, the performance gained by the proposed scheme when considering the metrics achievable rate is 30.191%, 17.354%, 28.032%, 16.520%, 14.215%, and 1.317% higher than the existing schemes used for comparison.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 5","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146217310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Development of a Multi-Functional Antenna With Reactive Impedance Surface for Smart Helmets/Caps 智能头盔/帽用无功阻抗面多功能天线的设计与研制
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-02-15 DOI: 10.1002/dac.70448
Maksud Alam, Sachin Kumar,  Mainuddin, Om Prakash Kumar, Bhawna Goyal, Samah Alshathri, Walid El-Shafai

This paper presents an antenna consisting of a bent monopole and a reactive impedance surface (RIS) reflector for smart helmets that can be used by rescue personnel for disaster management. The bent monopole and RIS concepts are introduced to achieve multiband performance with improved radiation characteristics. The bent monopole's resonant modes and the RIS reflector, which operates in its inductive region, are combined to produce hepta-band behavior. Unlike perfect electrical conductors (PECs) and perfect magnetic conductors (PMCs), RIS can operate over a wide frequency range with reflection phases ranging from 0° to 180°. Therefore, the challenges associated with PEC/PMC, such as focused image contribution and low efficiency, can be mitigated using RIS. The phase distribution can be controlled by varying the array size of the RIS. To achieve multiband performance, a RIS of array size of 18 × 21, with periodic square patches, is placed underneath the bent monopole. The designed antenna functions at the GPS L5 (1.176 GHz), GSM (1.8 GHz), LTE (2.6/3.7 GHz), WLAN (5.5/5.8 GHz), and MBAN (7.2 GHz) bands. The addition of the metasurface layer increases the gain of the antenna significantly over all resonant bands. With the RIS layer, the antenna achieves a peak gain of 8.7 dBi. The total efficiency values obtained at the seven resonating bands are 97.21%, 97.35%, 97.49%, 97.7%, 98.12%, 98.33%, and 98.81%, respectively. The monopole and RIS reflector are fabricated separately on the RT/duroid 5880 substrate with permittivity of 2.2. Also, a thick foam (λ0/8) is sandwiched between the antenna and the RIS reflector to simulate (outer and inner surfaces) a realistic helmet scenario.

提出了一种由弯曲单极子和无反应阻抗表面(RIS)反射器组成的智能头盔天线,可用于救援人员的灾害管理。引入弯曲单极子和RIS概念来实现多波段性能,并改善辐射特性。弯曲单极子的谐振模式和在其感应区工作的RIS反射器相结合,产生七波段行为。与完美电导体(PECs)和完美磁导体(pmc)不同,RIS可以在宽频率范围内工作,反射相位从0°到180°。因此,与PEC/PMC相关的挑战,如集中图像贡献和低效率,可以使用RIS来缓解。相位分布可以通过改变RIS的阵列大小来控制。为了实现多波段性能,在弯曲的单极子下放置了一个18 × 21的阵列,具有周期性的方形补丁。设计的天线工作在GPS L5 (1.176 GHz)、GSM (1.8 GHz)、LTE (2.6/3.7 GHz)、WLAN (5.5/5.8 GHz)和MBAN (7.2 GHz)频段。超表面层的加入大大增加了天线在所有谐振波段的增益。有了RIS层,天线的峰值增益达到8.7 dBi。7个共振波段的总效率值分别为97.21%、97.35%、97.49%、97.7%、98.12%、98.33%和98.81%。单极子和RIS反射器分别制作在介电常数为2.2的RT/duroid 5880衬底上。此外,厚厚的泡沫(λ0/8)夹在天线和RIS反射器之间,以模拟(外部和内部表面)现实的头盔场景。
{"title":"Design and Development of a Multi-Functional Antenna With Reactive Impedance Surface for Smart Helmets/Caps","authors":"Maksud Alam,&nbsp;Sachin Kumar,&nbsp; Mainuddin,&nbsp;Om Prakash Kumar,&nbsp;Bhawna Goyal,&nbsp;Samah Alshathri,&nbsp;Walid El-Shafai","doi":"10.1002/dac.70448","DOIUrl":"https://doi.org/10.1002/dac.70448","url":null,"abstract":"<div>\u0000 \u0000 <p>This paper presents an antenna consisting of a bent monopole and a reactive impedance surface (RIS) reflector for smart helmets that can be used by rescue personnel for disaster management. The bent monopole and RIS concepts are introduced to achieve multiband performance with improved radiation characteristics. The bent monopole's resonant modes and the RIS reflector, which operates in its inductive region, are combined to produce hepta-band behavior. Unlike perfect electrical conductors (PECs) and perfect magnetic conductors (PMCs), RIS can operate over a wide frequency range with reflection phases ranging from 0° to 180°. Therefore, the challenges associated with PEC/PMC, such as focused image contribution and low efficiency, can be mitigated using RIS. The phase distribution can be controlled by varying the array size of the RIS. To achieve multiband performance, a RIS of array size of 18 × 21, with periodic square patches, is placed underneath the bent monopole. The designed antenna functions at the GPS L5 (1.176 GHz), GSM (1.8 GHz), LTE (2.6/3.7 GHz), WLAN (5.5/5.8 GHz), and MBAN (7.2 GHz) bands. The addition of the metasurface layer increases the gain of the antenna significantly over all resonant bands. With the RIS layer, the antenna achieves a peak gain of 8.7 dBi. The total efficiency values obtained at the seven resonating bands are 97.21%, 97.35%, 97.49%, 97.7%, 98.12%, 98.33%, and 98.81%, respectively. The monopole and RIS reflector are fabricated separately on the RT/duroid 5880 substrate with permittivity of 2.2. Also, a thick foam (<i>λ</i><sub>0</sub>/8) is sandwiched between the antenna and the RIS reflector to simulate (outer and inner surfaces) a realistic helmet scenario.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 5","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146217312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Communication Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1