首页 > 最新文献

International Journal of Communication Systems最新文献

英文 中文
Enhancing Network Lifetime and Communication Efficiency in Wireless Sensor Networks Using a Hybrid Lévy–Starfish Clustering Optimization Algorithm 基于lsamv - starfish混合聚类优化算法提高无线传感器网络的生存期和通信效率
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-30 DOI: 10.1002/dac.70417
Navin Dhinnesh Ariputhran Duraisamy Chandramohan

In the wireless sensor network, different spatially distributed sensors are used to sense, integrate, and transfer data for further evaluations. Several traditional approaches struggle with a few major difficulties like inefficient data routing and static cluster head selection. Therefore, this paper proposes a novel optimization approach termed the Lévy flight–boosted starfish optimization model for an improved low-energy adaptive clustering protocol. This model integrated the Lévy flight mechanism and the starfish optimization algorithm for effective global search ability and cluster head selection. The output of experiments conducted revealed that the proposed model attained robust performance compared to existing models with a throughput of 4 Mbps and a packet delivery rate of 98.6%. Overall, the proposed model exhibits significant efficiency in enhancing the performance of wireless sensor networks, making a model optimal for long-term and large-scale applications.

在无线传感器网络中,使用不同空间分布的传感器来感知、整合和传输数据,以便进一步评估。一些传统的方法会遇到一些主要的困难,比如低效的数据路由和静态簇头选择。因此,本文提出了一种改进的低能量自适应聚类协议的新的优化方法,称为lsamvy飞行推进海星优化模型。该模型将lsamvy飞行机制与海星优化算法相结合,具有有效的全局搜索能力和簇头选择能力。实验结果表明,与现有模型相比,所提出的模型具有稳健的性能,吞吐量为4 Mbps,分组传输率为98.6%。总体而言,所提出的模型在提高无线传感器网络性能方面表现出显著的效率,使该模型最适合长期和大规模应用。
{"title":"Enhancing Network Lifetime and Communication Efficiency in Wireless Sensor Networks Using a Hybrid Lévy–Starfish Clustering Optimization Algorithm","authors":"Navin Dhinnesh Ariputhran Duraisamy Chandramohan","doi":"10.1002/dac.70417","DOIUrl":"https://doi.org/10.1002/dac.70417","url":null,"abstract":"<div>\u0000 \u0000 <p>In the wireless sensor network, different spatially distributed sensors are used to sense, integrate, and transfer data for further evaluations. Several traditional approaches struggle with a few major difficulties like inefficient data routing and static cluster head selection. Therefore, this paper proposes a novel optimization approach termed the Lévy flight–boosted starfish optimization model for an improved low-energy adaptive clustering protocol. This model integrated the Lévy flight mechanism and the starfish optimization algorithm for effective global search ability and cluster head selection. The output of experiments conducted revealed that the proposed model attained robust performance compared to existing models with a throughput of 4 Mbps and a packet delivery rate of 98.6%. Overall, the proposed model exhibits significant efficiency in enhancing the performance of wireless sensor networks, making a model optimal for long-term and large-scale applications.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146206046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Post-Quantum Secure Proof-of-Trust Blockchain Framework for Scalable and Trusted EHR Communication Systems 可扩展可信EHR通信系统的后量子安全信任证明区块链框架
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-29 DOI: 10.1002/dac.70420
Arun Shunmugam D, Ruba Soundar K

The lack of unified medical health record systems necessitates the development of large-scale electronic health record (EHR) systems. Blockchain-based frameworks are efficient when it comes to processing massive sensitive data and reliable data-sharing mechanisms. This paper presents a novel proof-of-trust (PoT) consensus algorithm for a blockchain-based healthcare framework (Health Chain) to offer secure and trustworthy data sharing. The consensus mechanism is formulated with fine-grained access control and different encryption techniques (post-quantum verifiable random function (PQVRF) algorithm and walrus-based sidechaining model). The distributed data storage from blockchain utilizes the consortium chain-based Hyperledger framework integrated with the interplanetary file system. The paper presents a PQVRF algorithm that can withstand quantum attacks and modify the consensus algorithm based on random functions to result in rapid and reliable consensus. The access and writing delays for the consensus algorithm associated with different EHRs are controlled via the walrus-based sidechaining algorithm. The proposed framework validates the EHRs and blocks with minimal computational time. The proposed consensus algorithm is designed based on different objectives. The first objective is to offer scalability to support millions of users. The second objective is to overcome collusions and adversary attacks by designing Byzantine and unfaithful fault tolerance. The third objective is to offer comprehensive control to the user over their health data to ensure that the user's access is maintained as per their preferences. When compared with the existing techniques such as PoTE, IB, HBZKP, and MrBlock, the proposed model offers an improvement of up to 35% in data access times, 42% in interoperability, and 2% in data breaches; as per the results, we can infer that the proposed model offers authorized access to the user data, improved data scalability, data integrity, and data privacy. Data security is achieved by storing encrypted hashes of the EHR while sharing and retrieving them among different end-users in the healthcare network. Although the proposed framework adopts post-quantum cryptographic primitives for consensus formation, trust evaluation, and leader election, SHA-2 is retained exclusively for lightweight EHR data hashing and integrity verification. This design choice does not compromise post-quantum security, as SHA-2 remains resilient under known quantum attack models when used for hashing.

由于缺乏统一的医疗健康记录系统,需要开发大规模的电子健康记录系统。在处理大量敏感数据和可靠的数据共享机制方面,基于区块链的框架是高效的。本文提出了一种基于区块链的医疗保健框架(Health Chain)的新型信任证明(PoT)共识算法,以提供安全可靠的数据共享。共识机制由细粒度访问控制和不同的加密技术(后量子可验证随机函数(PQVRF)算法和基于海象的侧链模型)组成。区块链的分布式数据存储利用基于联盟链的超级账本框架与星际文件系统集成。本文提出了一种抗量子攻击的PQVRF算法,并对基于随机函数的共识算法进行了修改,从而实现了快速可靠的共识。通过基于海象的侧链算法控制与不同电子病历相关的一致性算法的访问和写入延迟。提出的框架以最小的计算时间验证电子病历和区块。所提出的共识算法是基于不同的目标设计的。第一个目标是提供可伸缩性以支持数百万用户。第二个目标是通过设计拜占庭式和不忠实容错来克服共谋和对手攻击。第三个目标是向用户提供对其健康数据的全面控制,以确保按照用户的偏好保持对数据的访问。与现有技术(如PoTE、IB、HBZKP和MrBlock)相比,所提出的模型在数据访问时间方面提高了35%,在互操作性方面提高了42%,在数据泄露方面提高了2%;根据结果,我们可以推断,所提出的模型提供了对用户数据的授权访问、改进的数据可伸缩性、数据完整性和数据隐私。数据安全性是通过存储EHR的加密散列,同时在医疗保健网络中的不同最终用户之间共享和检索它们来实现的。尽管提出的框架采用后量子加密原语进行共识形成、信任评估和领导者选举,但SHA-2仅用于轻量级EHR数据散列和完整性验证。这种设计选择不会损害后量子安全,因为SHA-2在用于散列时,在已知的量子攻击模型下仍然具有弹性。
{"title":"A Post-Quantum Secure Proof-of-Trust Blockchain Framework for Scalable and Trusted EHR Communication Systems","authors":"Arun Shunmugam D,&nbsp;Ruba Soundar K","doi":"10.1002/dac.70420","DOIUrl":"https://doi.org/10.1002/dac.70420","url":null,"abstract":"<div>\u0000 \u0000 <p>The lack of unified medical health record systems necessitates the development of large-scale electronic health record (EHR) systems. Blockchain-based frameworks are efficient when it comes to processing massive sensitive data and reliable data-sharing mechanisms. This paper presents a novel proof-of-trust (PoT) consensus algorithm for a blockchain-based healthcare framework (Health Chain) to offer secure and trustworthy data sharing. The consensus mechanism is formulated with fine-grained access control and different encryption techniques (post-quantum verifiable random function (PQVRF) algorithm and walrus-based sidechaining model). The distributed data storage from blockchain utilizes the consortium chain-based Hyperledger framework integrated with the interplanetary file system. The paper presents a PQVRF algorithm that can withstand quantum attacks and modify the consensus algorithm based on random functions to result in rapid and reliable consensus. The access and writing delays for the consensus algorithm associated with different EHRs are controlled via the walrus-based sidechaining algorithm. The proposed framework validates the EHRs and blocks with minimal computational time. The proposed consensus algorithm is designed based on different objectives. The first objective is to offer scalability to support millions of users. The second objective is to overcome collusions and adversary attacks by designing Byzantine and unfaithful fault tolerance. The third objective is to offer comprehensive control to the user over their health data to ensure that the user's access is maintained as per their preferences. When compared with the existing techniques such as PoTE, IB, HBZKP, and MrBlock, the proposed model offers an improvement of up to 35% in data access times, 42% in interoperability, and 2% in data breaches; as per the results, we can infer that the proposed model offers authorized access to the user data, improved data scalability, data integrity, and data privacy. Data security is achieved by storing encrypted hashes of the EHR while sharing and retrieving them among different end-users in the healthcare network. Although the proposed framework adopts post-quantum cryptographic primitives for consensus formation, trust evaluation, and leader election, SHA-2 is retained exclusively for lightweight EHR data hashing and integrity verification. This design choice does not compromise post-quantum security, as SHA-2 remains resilient under known quantum attack models when used for hashing.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146199414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tour Path Scheduling Using Optimized Deep Reinforcement Learning for IoT Mobile Data Collectors 基于优化深度强化学习的物联网移动数据采集器巡回路径调度
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-28 DOI: 10.1002/dac.70402
P. Kalyana Sundari, R. Vadivel

In Internet of Things (IoT)–based wireless sensor network (WSN), mobile data collectors (MDCs), which move over various geographic regions to transport data from sensors to access points, are thought to be a more effective way than the traditional data collection techniques employing static sinks. The direct transfer of data from all sensors to the base station would be inefficient given the energy constraints on the sensor node. This is a result of the data redundancy brought about by nearby sensors' relatively strong correlation. Moreover, base stations are unable to handle the enormous volumes of data produced by a larger sensor network. In order to integrate data and generate meaningful information at sensors or intermediate nodes, specific networks are therefore needed. In this paper, tour path scheduling using optimized deep reinforcement learning (DRL) for MDCs in IoT-WSN. The DRL algorithm schedules the visiting pattern of the MDCs based on the type of IoT sensors and their data generation rates. To accelerate the convergence speed of DRL, sunflower optimization (SFO) algorithm is used. Then, optimum tour paths are determined using Capuchin Search Algorithm (CapSA) based on path stability and data collection latency. Simulation results have shown that DRL–SFO–CapSA minimizes the data collection delay and packet drop while maximizing the packet delivery ratio and residual energy.

在基于物联网(IoT)的无线传感器网络(WSN)中,移动数据采集器(mdc)在不同的地理区域移动,将数据从传感器传输到接入点,被认为是比使用静态接收器的传统数据收集技术更有效的方法。考虑到传感器节点的能量限制,将所有传感器的数据直接传输到基站是低效的。这是由于附近传感器相关性较强,导致数据冗余的结果。此外,基站无法处理由更大的传感器网络产生的海量数据。因此,为了在传感器或中间节点上集成数据并生成有意义的信息,需要特定的网络。在本文中,使用优化的深度强化学习(DRL)对物联网wsn中的mdc进行巡回路径调度。DRL算法根据物联网传感器的类型和数据生成速率来调度mdc的访问模式。为了加快DRL的收敛速度,采用了向日葵优化算法(SFO)。然后,基于路径稳定性和数据采集延迟,采用卷尾猴搜索算法(CapSA)确定最优路径。仿真结果表明,DRL-SFO-CapSA可以最大限度地减少数据采集延迟和丢包,同时最大限度地提高包的投递率和剩余能量。
{"title":"Tour Path Scheduling Using Optimized Deep Reinforcement Learning for IoT Mobile Data Collectors","authors":"P. Kalyana Sundari,&nbsp;R. Vadivel","doi":"10.1002/dac.70402","DOIUrl":"https://doi.org/10.1002/dac.70402","url":null,"abstract":"<div>\u0000 \u0000 <p>In Internet of Things (IoT)–based wireless sensor network (WSN), mobile data collectors (MDCs), which move over various geographic regions to transport data from sensors to access points, are thought to be a more effective way than the traditional data collection techniques employing static sinks. The direct transfer of data from all sensors to the base station would be inefficient given the energy constraints on the sensor node. This is a result of the data redundancy brought about by nearby sensors' relatively strong correlation. Moreover, base stations are unable to handle the enormous volumes of data produced by a larger sensor network. In order to integrate data and generate meaningful information at sensors or intermediate nodes, specific networks are therefore needed. In this paper, tour path scheduling using optimized deep reinforcement learning (DRL) for MDCs in IoT-WSN. The DRL algorithm schedules the visiting pattern of the MDCs based on the type of IoT sensors and their data generation rates. To accelerate the convergence speed of DRL, sunflower optimization (SFO) algorithm is used. Then, optimum tour paths are determined using Capuchin Search Algorithm (CapSA) based on path stability and data collection latency. Simulation results have shown that DRL–SFO–CapSA minimizes the data collection delay and packet drop while maximizing the packet delivery ratio and residual energy.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146196989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Energy Efficient Adaptive Switching Spectrum Sensing (ASSS) Technique With Optimal PU Node Detection for CR-WSN 基于最优PU节点检测的CR-WSN节能自适应开关频谱传感技术
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-27 DOI: 10.1002/dac.70400
G. D. Vignesh, A. M. Balamurugan

Cognitive Radio—Wireless Sensor Network (CR-WSN) plays a vital role in spectrum utilization by allowing secondary users (SUs) to utilize the under-used licensed bands in an opportunistic manner. However, spectrum sensing accuracy is often affected by various channel perturbations such as multipath fading channel, noise, and interference. In this paper, we propose an Adaptive Spectrum Sensing Switching (ASSS) technique where the SU Cluster Head (SU-CH) in each cluster adaptively switches between Energy Detection (ED) and Matched Filter (MF) sensing methods to improve the detection accuracy of SU nodes. The proposed ASSS method uses Received Signal Strength Indicator (RSSI) as a metric where the SU nodes report their sensing results to their cluster heads, and then the SU-CHs take an appropriate decision based on the channel conditions. During poor channel conditions, the SU-CH nodes employ MF-based detection for its robustness against fading and noise, leading to optimal PU node detection. On the other hand, during good channel conditions, ED is employed, resulting in reduced energy consumption and computational complexity. The simulation results prove that at low SNR, the proposed ASSS method without Bayesian threshold significantly improves detection probability on average by about 78% for ED and inferior by slightly about 14.28% for MF and 40% for the proposed ASSS method with Bayesian threshold, thereby overcoming the trade-off in energy consumption by achieving an energy efficiency of 60.79% lesser than ED, 35.95%, and 18.87% more energy efficient on average compared to MF and proposed ASSS method with Bayesian threshold based approaches.

认知无线电-无线传感器网络(CR-WSN)通过允许辅助用户(su)以机会主义的方式利用未充分利用的许可频段,在频谱利用中起着至关重要的作用。然而,频谱感知精度经常受到各种信道扰动的影响,如多径衰落信道、噪声和干扰。在本文中,我们提出了一种自适应频谱感知切换(ASSS)技术,该技术在每个簇中的SU簇头(SU- ch)自适应地在能量检测(ED)和匹配滤波(MF)感知方法之间切换,以提高SU节点的检测精度。提出的ASSS方法使用接收信号强度指标(RSSI)作为度量,SU节点将其感知结果报告给簇头,然后SU- ch根据信道条件做出适当的决策。在较差的信道条件下,SU-CH节点采用基于mf的检测,以提高其对衰落和噪声的鲁棒性,从而实现最佳的PU节点检测。另一方面,在良好的信道条件下,采用ED,从而降低了能耗和计算复杂度。仿真结果表明,在低信噪比下,无贝叶斯阈值的ASSS方法对ED的检测概率平均提高了78%左右,对MF的检测概率平均提高了14.28%左右,对具有贝叶斯阈值的ASSS方法的检测概率平均提高了40%左右,从而克服了能耗的权衡,实现了比ED低60.79%的能效,比ED低35.95%;与基于贝叶斯阈值方法的MF和提出的ASSS方法相比,平均节能18.87%。
{"title":"An Energy Efficient Adaptive Switching Spectrum Sensing (ASSS) Technique With Optimal PU Node Detection for CR-WSN","authors":"G. D. Vignesh,&nbsp;A. M. Balamurugan","doi":"10.1002/dac.70400","DOIUrl":"https://doi.org/10.1002/dac.70400","url":null,"abstract":"<div>\u0000 \u0000 <p>Cognitive Radio—Wireless Sensor Network (CR-WSN) plays a vital role in spectrum utilization by allowing secondary users (SUs) to utilize the under-used licensed bands in an opportunistic manner. However, spectrum sensing accuracy is often affected by various channel perturbations such as multipath fading channel, noise, and interference. In this paper, we propose an Adaptive Spectrum Sensing Switching (ASSS) technique where the SU Cluster Head (SU-CH) in each cluster adaptively switches between Energy Detection (ED) and Matched Filter (MF) sensing methods to improve the detection accuracy of SU nodes. The proposed ASSS method uses Received Signal Strength Indicator (RSSI) as a metric where the SU nodes report their sensing results to their cluster heads, and then the SU-CHs take an appropriate decision based on the channel conditions. During poor channel conditions, the SU-CH nodes employ MF-based detection for its robustness against fading and noise, leading to optimal PU node detection. On the other hand, during good channel conditions, ED is employed, resulting in reduced energy consumption and computational complexity. The simulation results prove that at low SNR, the proposed ASSS method without Bayesian threshold significantly improves detection probability on average by about 78% for ED and inferior by slightly about 14.28% for MF and 40% for the proposed ASSS method with Bayesian threshold, thereby overcoming the trade-off in energy consumption by achieving an energy efficiency of 60.79% lesser than ED, 35.95%, and 18.87% more energy efficient on average compared to MF and proposed ASSS method with Bayesian threshold based approaches.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146196978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fortifying Internet of Things Security: Employing Deep Learning for Privacy-Preserving Data Transmission in Clustered Environments 加强物联网安全:在集群环境中使用深度学习保护隐私的数据传输
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-25 DOI: 10.1002/dac.70411
P. R. Therasa, Tapas Bapu B R, P. J. Sathish Kumar, D. M. Kalai Selvi

In the past few years, due to the massive growth of IoT-related devices in an interconnected ecosystem, serious attacks like distributed denial of service (DDoS), spoofing, sinkhole, and ransomware attacks have been observed. These extend from data breaches and privacy violations to several other types of cyber-attacks. Therefore, this paper proposed a novel type of clustering-based Tree Hierarchical Deep Convolutional Neural Network (TH-DCNN) model with Upgraded Human Evolutionary Optimization Algorithm (UHEOA) as an additional dimension for safeguarding the IoT from such attacks. It utilizes an Improved Soft-K-Means (IS-K-Means) algorithm to effectively cluster the IoT nodes in order to optimize resource utilization. The TH-DCNN guarantees efficient security by way of effective malicious attack recognition, whereas UHEOA adapts model parameters to operate at its best. The proposed TH-DCNN-UHEOA framework is tested in a simulation environment implemented using Python with 500 IoT nodes on a 4000 × 3600 m terrain area for 7 h under random mobility, with broadcast transmission and node restriction. The proposed framework achieves outstanding improvements compared with the state-of-the-art progress, including DNN-CL-IoT, Co-FitDNN-IoT, and CNN-TSODE-IoT. The proposed TH-DCNN-UHEOA achieves a packet delivery ratio (PDR) of up to 25.04%, a network lifetime (NLT) of up to 19.56%, and a detection accuracy of up to 26.76% higher compared with these baselines. All the parameters such as energy consumption, communication cost, throughput, PDR, NLT, energy consumption (EC), number of alive sensor nodes (NAN), accuracy, and number of dead sensor nodes (NDN) determine its efficiency, certifying the framework can repel malicious attacks like DDoS, spoofing, and sinkhole attacks, providing strong security to IoT systems.

在过去的几年中,由于物联网相关设备在互联生态系统中的大量增长,已经观察到分布式拒绝服务(DDoS),欺骗,天坑和勒索软件攻击等严重攻击。这些攻击从数据泄露和侵犯隐私延伸到其他几种类型的网络攻击。因此,本文提出了一种新型的基于聚类的树状层次深度卷积神经网络(TH-DCNN)模型,并将升级的人类进化优化算法(UHEOA)作为保护物联网免受此类攻击的额外维度。它利用改进的Soft-K-Means (IS-K-Means)算法有效地对物联网节点进行聚类,以优化资源利用率。TH-DCNN通过有效的恶意攻击识别来保证高效的安全性,而UHEOA通过调整模型参数来达到最佳运行状态。提出的TH-DCNN-UHEOA框架在使用Python实现的模拟环境中进行了测试,该环境在4000 × 3600 m地形区域上具有500个物联网节点,随机移动7小时,具有广播传输和节点限制。与最先进的进展(包括DNN-CL-IoT, Co-FitDNN-IoT和CNN-TSODE-IoT)相比,所提出的框架取得了显著的改进。与这些基线相比,所提出的th - dcn - uheoa实现了高达25.04%的分组投递率(PDR),高达19.56%的网络生存期(NLT)和高达26.76%的检测准确率。能耗、通信成本、吞吐量、PDR、NLT、能耗(EC)、活传感器节点数(NAN)、精度、死传感器节点数(NDN)等参数决定了该框架的效率,证明该框架能够抵御DDoS、spoofing、sinkhole攻击等恶意攻击,为物联网系统提供强大的安全性。
{"title":"Fortifying Internet of Things Security: Employing Deep Learning for Privacy-Preserving Data Transmission in Clustered Environments","authors":"P. R. Therasa,&nbsp;Tapas Bapu B R,&nbsp;P. J. Sathish Kumar,&nbsp;D. M. Kalai Selvi","doi":"10.1002/dac.70411","DOIUrl":"https://doi.org/10.1002/dac.70411","url":null,"abstract":"<div>\u0000 \u0000 <p>In the past few years, due to the massive growth of IoT-related devices in an interconnected ecosystem, serious attacks like distributed denial of service (DDoS), spoofing, sinkhole, and ransomware attacks have been observed. These extend from data breaches and privacy violations to several other types of cyber-attacks. Therefore, this paper proposed a novel type of clustering-based Tree Hierarchical Deep Convolutional Neural Network (TH-DCNN) model with Upgraded Human Evolutionary Optimization Algorithm (UHEOA) as an additional dimension for safeguarding the IoT from such attacks. It utilizes an Improved Soft-K-Means (IS-K-Means) algorithm to effectively cluster the IoT nodes in order to optimize resource utilization. The TH-DCNN guarantees efficient security by way of effective malicious attack recognition, whereas UHEOA adapts model parameters to operate at its best. The proposed TH-DCNN-UHEOA framework is tested in a simulation environment implemented using Python with 500 IoT nodes on a 4000 × 3600 m terrain area for 7 h under random mobility, with broadcast transmission and node restriction. The proposed framework achieves outstanding improvements compared with the state-of-the-art progress, including DNN-CL-IoT, Co-FitDNN-IoT, and CNN-TSODE-IoT. The proposed TH-DCNN-UHEOA achieves a packet delivery ratio (PDR) of up to 25.04%, a network lifetime (NLT) of up to 19.56%, and a detection accuracy of up to 26.76% higher compared with these baselines. All the parameters such as energy consumption, communication cost, throughput, PDR, NLT, energy consumption (EC), number of alive sensor nodes (NAN), accuracy, and number of dead sensor nodes (NDN) determine its efficiency, certifying the framework can repel malicious attacks like DDoS, spoofing, and sinkhole attacks, providing strong security to IoT systems.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146058059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Broadband Dual-Beam Dual-Polarized Antenna Array With Controllable Beam Pointing 具有可控波束指向的宽带双波束双极化天线阵列
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-23 DOI: 10.1002/dac.70413
Jing Yi Ouyang, Wang Peng Zhang, Jing Ming He, Liang Hua Ye, Xinxin Tian

A broadband dual-beam dual-polarized antenna array having low sidelobe and controllable beam pointing is proposed. A crossed-dipole antenna element with link lines is introduced to achieve excellent impedance matching, symmetrical and stable radiation pattern, low cross-polarization level, as well as very steady gain at 1.7–2.7 GHz. Based on the element, a new staggered 2 × 2 subarray is proposed to achieve excellent sidelobe suppression over the wide operating band. Then a dual-beam subarray, which consists of two staggered 2 × 2 subarrays and controllable metal fixtures, is designed to introduce dual-beam performance with low sidelobe. The dual-beam pointing can be easily controlled by tuning the metal fixtures. Finally, a dual-beam dual-polarized array is proposed to obtain high gain for practical application. It obtains a wide bandwidth of 45.5% (1.7–2.7 GHz) for reflection coefficient < −14 dB, and good isolation between all the ports larger than 21 dB. The array also has good dual-beam performance, with sidelobe levels below −20 dB and beam-pointing angles that can be varied to ±18°, ±28°, and ±38°.

提出了一种低旁瓣、波束指向可控的宽带双波束双极化天线阵列。介绍了一种带链路的交叉偶极子天线元件,该元件具有良好的阻抗匹配、对称稳定的辐射方向图、低交叉极化电平以及在1.7-2.7 GHz频段非常稳定的增益。在此基础上,提出了一种新的交错2 × 2子阵,在较宽的工作频带内实现了良好的副瓣抑制。然后设计了由两个交错的2 × 2子阵和可控金属夹具组成的双波束子阵,引入了低旁瓣的双波束性能。双光束指向可以很容易地通过调整金属夹具来控制。最后,提出了一种双波束双极化阵列,以获得实际应用中的高增益。在反射系数<;−14 dB的情况下,获得45.5% (1.7-2.7 GHz)的宽带带宽,并且所有大于21 dB的端口之间具有良好的隔离性。该阵列还具有良好的双波束性能,副瓣电平低于- 20 dB,波束指向角可变化为±18°,±28°和±38°。
{"title":"Broadband Dual-Beam Dual-Polarized Antenna Array With Controllable Beam Pointing","authors":"Jing Yi Ouyang,&nbsp;Wang Peng Zhang,&nbsp;Jing Ming He,&nbsp;Liang Hua Ye,&nbsp;Xinxin Tian","doi":"10.1002/dac.70413","DOIUrl":"https://doi.org/10.1002/dac.70413","url":null,"abstract":"<div>\u0000 \u0000 <p>A broadband dual-beam dual-polarized antenna array having low sidelobe and controllable beam pointing is proposed. A crossed-dipole antenna element with link lines is introduced to achieve excellent impedance matching, symmetrical and stable radiation pattern, low cross-polarization level, as well as very steady gain at 1.7–2.7 GHz. Based on the element, a new staggered 2 × 2 subarray is proposed to achieve excellent sidelobe suppression over the wide operating band. Then a dual-beam subarray, which consists of two staggered 2 × 2 subarrays and controllable metal fixtures, is designed to introduce dual-beam performance with low sidelobe. The dual-beam pointing can be easily controlled by tuning the metal fixtures. Finally, a dual-beam dual-polarized array is proposed to obtain high gain for practical application. It obtains a wide bandwidth of 45.5% (1.7–2.7 GHz) for reflection coefficient &lt; −14 dB, and good isolation between all the ports larger than 21 dB. The array also has good dual-beam performance, with sidelobe levels below −20 dB and beam-pointing angles that can be varied to ±18°, ±28°, and ±38°.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146058045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Deep Learning Technique With Deep Feature Extraction for Accurate Path Loss Estimation in Millimeter-Wave Wireless Communication Environments 基于深度特征提取的自适应深度学习技术在毫米波无线通信环境中精确估计路径损耗
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-23 DOI: 10.1002/dac.70394
B. M. R. Manasa, Vijayakumar Kondepogu, Ch V Ravi Sankar, P. Sankara Rao, A. Lakshmi Narayana

Millimeter-wave (mmWave) communication plays a crucial role in wireless systems due to its high data rate capabilities and suitability for 5th generation (5G) networks. However, mmWave signals confront significant propagation issues, which include greater path loss, major attenuation from blockages, and sparse multipath propagation, constraining coverage and consistency. Accurate path loss validation is a serious and composite task for successful network planning, optimization, and resource allocations. To overcome these limitations, effective deep learning–based path loss estimation in mmWave communication systems is developed in this research work. Initially, the required data are collected from the standard datasets and given to the preprocessing phase. Once the data are preprocessed, they are given into the deep feature extraction phase, and it is done by applying the Pyramid Multihead Convolutional Cross Attention Network (PMC-CANet). The ability to ensure the efficiency of next-generation wireless networks is what makes it effective in feature extraction tasks. Finally, the path loss estimation process is performed on the extracted deep features through Adaptive Residual Bidirectional Gated Recurrent Unit (AR-BiGRU), where several parameters are tuned using the Updated Random Attribute–based Sculptor Optimization (URA-SO). One of the primary advantages of using AR-BiGRU with USOA for path loss estimation is its ability to process large, high-dimensional datasets, which can include not only geographical and environmental information but also temporal data, such as time-of-day or seasonal variations in path loss. The optimal solution outcome can be achieved by using the developed model. Then, its effectiveness is validated by comparing it with other existing models. This proposed system provides a consistent and best solution for tackling the problems of mmWave signal attenuation, thus enhancing the effectiveness and performance of next-generation wireless networks. The outcomes reveal that the proposed URA-SO-AR-BiGRU obtained an accuracy of 97.12% when taking the batch size as 15, leading to highly reliable and precise path loss estimations.

毫米波(mmWave)通信由于其高数据速率能力和对第五代(5G)网络的适用性,在无线系统中起着至关重要的作用。然而,毫米波信号面临着严重的传播问题,包括更大的路径损耗、阻塞造成的主要衰减以及稀疏的多路径传播,限制了覆盖范围和一致性。准确的路径损失验证对于成功的网络规划、优化和资源分配是一项严肃而复杂的任务。为了克服这些限制,本研究开发了毫米波通信系统中有效的基于深度学习的路径损耗估计。最初,从标准数据集中收集所需的数据并将其提供给预处理阶段。数据经过预处理后进入深度特征提取阶段,采用金字塔多头卷积交叉注意网络(PMC-CANet)进行深度特征提取。确保下一代无线网络效率的能力使其在特征提取任务中有效。最后,通过自适应残差双向门控循环单元(AR-BiGRU)对提取的深度特征进行路径损失估计,其中使用基于更新随机属性的雕刻家优化(URA-SO)对几个参数进行调整。使用AR-BiGRU和USOA进行路径损失估计的主要优势之一是它能够处理大型高维数据集,这些数据集不仅可以包括地理和环境信息,还可以包括时间数据,例如路径损失的时间或季节变化。利用所建立的模型可以得到最优解。然后,通过与已有模型的比较,验证了该模型的有效性。该系统为解决毫米波信号衰减问题提供了一致的最佳解决方案,从而提高了下一代无线网络的有效性和性能。结果表明,当批大小为15时,所提出的URA-SO-AR-BiGRU的准确率为97.12%,具有较高的可靠性和精度。
{"title":"Adaptive Deep Learning Technique With Deep Feature Extraction for Accurate Path Loss Estimation in Millimeter-Wave Wireless Communication Environments","authors":"B. M. R. Manasa,&nbsp;Vijayakumar Kondepogu,&nbsp;Ch V Ravi Sankar,&nbsp;P. Sankara Rao,&nbsp;A. Lakshmi Narayana","doi":"10.1002/dac.70394","DOIUrl":"https://doi.org/10.1002/dac.70394","url":null,"abstract":"<div>\u0000 \u0000 <p>Millimeter-wave (mmWave) communication plays a crucial role in wireless systems due to its high data rate capabilities and suitability for 5th generation (5G) networks. However, mmWave signals confront significant propagation issues, which include greater path loss, major attenuation from blockages, and sparse multipath propagation, constraining coverage and consistency. Accurate path loss validation is a serious and composite task for successful network planning, optimization, and resource allocations. To overcome these limitations, effective deep learning–based path loss estimation in mmWave communication systems is developed in this research work. Initially, the required data are collected from the standard datasets and given to the preprocessing phase. Once the data are preprocessed, they are given into the deep feature extraction phase, and it is done by applying the Pyramid Multihead Convolutional Cross Attention Network (PMC-CANet). The ability to ensure the efficiency of next-generation wireless networks is what makes it effective in feature extraction tasks. Finally, the path loss estimation process is performed on the extracted deep features through Adaptive Residual Bidirectional Gated Recurrent Unit (AR-BiGRU), where several parameters are tuned using the Updated Random Attribute–based Sculptor Optimization (URA-SO). One of the primary advantages of using AR-BiGRU with USOA for path loss estimation is its ability to process large, high-dimensional datasets, which can include not only geographical and environmental information but also temporal data, such as time-of-day or seasonal variations in path loss. The optimal solution outcome can be achieved by using the developed model. Then, its effectiveness is validated by comparing it with other existing models. This proposed system provides a consistent and best solution for tackling the problems of mmWave signal attenuation, thus enhancing the effectiveness and performance of next-generation wireless networks. The outcomes reveal that the proposed URA-SO-AR-BiGRU obtained an accuracy of 97.12% when taking the batch size as 15, leading to highly reliable and precise path loss estimations.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146058046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Analysis of Future Internet Architectures Interoperability With the Current Web Browser Application 未来互联网架构互操作性与当前Web浏览器应用程序的比较分析
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-22 DOI: 10.1002/dac.70419
William Silva Mamede, Marcelo Antônio Marotta, Cristiano B. Both, Antônio Marcos Alberti, José Marcos C. Brito

Redesigning the Internet to overcome the limitations of the current one has been a topic of discussion for some years. These discussions aim to provide solutions for optimizing resource consumption and providing more flexibility, which are key features in the modern world of interconnected devices and applications. Today, the applications created adhere to the norms of the current Internet, which is based on well-established protocols and tools. However, it is also restricted by its limitations, which are expected to be addressed in content-oriented future Internet architecture (FIA) solutions. These approaches aim to provide a network environment in which the data itself is the key in the communication, opposite to the current solution, which relies on hosts' address and location. The transition between different architectures in FIAs is anticipated to be challenging, as existing solutions must be modified to meet FIA protocols and patterns. Therefore, to ensure a seamless evolution of the network, regardless of the environment in which it is used, it is essential to provide a means of enabling this transition. For instance, solutions like NDN.JS and COIN, which were developed for NDN, are intended to facilitate communication across different architectures. This survey aims to provide a comprehensive overview of the potential benefits of interoperability between the current Internet/web and FIAs, as well as how existing applications can benefit from it.

重新设计互联网以克服当前互联网的局限性已经成为讨论多年的话题。这些讨论旨在提供优化资源消耗和提供更大灵活性的解决方案,这是现代互联设备和应用程序世界中的关键特征。今天,创建的应用程序遵循当前互联网的规范,它基于完善的协议和工具。然而,它也受到其局限性的限制,这些局限性预计将在面向内容的未来Internet架构(FIA)解决方案中得到解决。这些方法旨在提供一个网络环境,其中数据本身是通信的关键,而不是目前的解决方案,它依赖于主机的地址和位置。FIA中不同架构之间的转换预计将具有挑战性,因为必须修改现有解决方案以满足FIA协议和模式。因此,无论在何种环境下使用,为了确保网络的无缝演进,提供一种实现这种过渡的手段至关重要。例如,为NDN开发的NDN. js和COIN等解决方案旨在促进不同架构之间的通信。本调查旨在全面概述当前Internet/web和FIAs之间互操作性的潜在好处,以及现有应用程序如何从中受益。
{"title":"A Comparative Analysis of Future Internet Architectures Interoperability With the Current Web Browser Application","authors":"William Silva Mamede,&nbsp;Marcelo Antônio Marotta,&nbsp;Cristiano B. Both,&nbsp;Antônio Marcos Alberti,&nbsp;José Marcos C. Brito","doi":"10.1002/dac.70419","DOIUrl":"https://doi.org/10.1002/dac.70419","url":null,"abstract":"<div>\u0000 \u0000 <p>Redesigning the Internet to overcome the limitations of the current one has been a topic of discussion for some years. These discussions aim to provide solutions for optimizing resource consumption and providing more flexibility, which are key features in the modern world of interconnected devices and applications. Today, the applications created adhere to the norms of the current Internet, which is based on well-established protocols and tools. However, it is also restricted by its limitations, which are expected to be addressed in content-oriented future Internet architecture (FIA) solutions. These approaches aim to provide a network environment in which the data itself is the key in the communication, opposite to the current solution, which relies on hosts' address and location. The transition between different architectures in FIAs is anticipated to be challenging, as existing solutions must be modified to meet FIA protocols and patterns. Therefore, to ensure a seamless evolution of the network, regardless of the environment in which it is used, it is essential to provide a means of enabling this transition. For instance, solutions like NDN.JS and COIN, which were developed for NDN, are intended to facilitate communication across different architectures. This survey aims to provide a comprehensive overview of the potential benefits of interoperability between the current Internet/web and FIAs, as well as how existing applications can benefit from it.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146096434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Density-Based Congestion Control Protocol With GPR-GRNN Congestion Prediction and Enhanced Security Using the LFSRE Algorithm for Active Distribution Networks 基于GPR-GRNN拥塞预测和LFSRE算法的有源配电网拥塞控制协议
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-20 DOI: 10.1002/dac.70383
Shalini Puri, Anil Kumar Sharma, Shweta Sharma, Samta Suman Lodhi, Kanchan Singh

Active distribution network (ADN) plays a vital role in the smart power grid implementation process. Congestion prediction and avoidance are essential in ADN to prevent overloads, improve efficiency, and ensure system stability. Various existing approaches are developed to alleviate congestion in ADN, but they are unable to predict the accurate congestion and require more time to generate appropriate control commands for power dispatch. Therefore, more advanced and adaptive methods are needed for accurate congestion management in modern power systems. This work implements a deep learning algorithm combined with an efficient cryptography model to ensure secure data transmission in ADN. Initially, network characteristics are collected during data transmission from the distributed network for attack detection and preprocessed using Two-Step Sparse Switchable Normalization (TSSN-Net) to normalize the data and Self-Attention-based Imputation for Time Series (SAITS) based missing value imputation to improve quality by filling in the blanks. The preprocessed data were used to select the features using redundancy analysis and interaction weight (RAIW). The Gaussian Process Reference-based General Regression Neural Network (GPR-GRNN) is then used to anticipate congestion using the selected features. Once the congestion is predicted, it is avoided using the Density-Based Congestion Control Protocol (DBCCP), which reduces the loss of packets to avoid the network congestion. After that, the gathered data are securely stored in the cloud server through linear feedback shift register encryption (LFSRE) based encryption algorithm. The proposed approach achieves an accuracy of 97.60%, PPV of 96.70%, selectivity of 97.20%, and NPV of 96.10%. The proposed approach enables significant advancement in modern power systems focusing on intelligent forecasting and uncertainty-aware congestion management for long-term success.

主动配电网在智能电网的实施过程中起着至关重要的作用。拥塞预测和避免是ADN中防止过载、提高效率和保证系统稳定性的关键。现有的各种缓解ADN拥塞的方法都无法准确预测拥塞情况,并且需要花费更多的时间来生成合适的控制命令进行电力调度。因此,现代电力系统需要更先进的自适应方法来实现准确的拥塞管理。本文将深度学习算法与高效的加密模型相结合,实现了ADN中数据的安全传输。首先,从分布式网络中采集数据传输过程中的网络特征进行攻击检测,并使用两步稀疏可切换归一化(TSSN-Net)对数据进行归一化预处理,并使用基于自注意的时间序列补全(SAITS)缺失值补全来提高质量。预处理后的数据通过冗余分析和交互权值(RAIW)选择特征。然后使用基于高斯过程参考的广义回归神经网络(GPR-GRNN)来使用选定的特征预测拥塞。一旦预测到拥塞,就可以使用基于密度的拥塞控制协议(DBCCP)来避免拥塞,该协议减少了数据包的丢失,从而避免了网络拥塞。然后,通过基于线性反馈移位寄存器加密(LFSRE)的加密算法,将采集到的数据安全地存储在云服务器中。该方法的准确率为97.60%,PPV为96.70%,选择性为97.20%,NPV为96.10%。所提出的方法能够在现代电力系统中取得重大进展,重点是智能预测和不确定性感知的拥塞管理,以取得长期成功。
{"title":"Density-Based Congestion Control Protocol With GPR-GRNN Congestion Prediction and Enhanced Security Using the LFSRE Algorithm for Active Distribution Networks","authors":"Shalini Puri,&nbsp;Anil Kumar Sharma,&nbsp;Shweta Sharma,&nbsp;Samta Suman Lodhi,&nbsp;Kanchan Singh","doi":"10.1002/dac.70383","DOIUrl":"https://doi.org/10.1002/dac.70383","url":null,"abstract":"<div>\u0000 \u0000 <p>Active distribution network (ADN) plays a vital role in the smart power grid implementation process. Congestion prediction and avoidance are essential in ADN to prevent overloads, improve efficiency, and ensure system stability. Various existing approaches are developed to alleviate congestion in ADN, but they are unable to predict the accurate congestion and require more time to generate appropriate control commands for power dispatch. Therefore, more advanced and adaptive methods are needed for accurate congestion management in modern power systems. This work implements a deep learning algorithm combined with an efficient cryptography model to ensure secure data transmission in ADN. Initially, network characteristics are collected during data transmission from the distributed network for attack detection and preprocessed using Two-Step Sparse Switchable Normalization (TSSN-Net) to normalize the data and Self-Attention-based Imputation for Time Series (SAITS) based missing value imputation to improve quality by filling in the blanks. The preprocessed data were used to select the features using redundancy analysis and interaction weight (RAIW). The Gaussian Process Reference-based General Regression Neural Network (GPR-GRNN) is then used to anticipate congestion using the selected features. Once the congestion is predicted, it is avoided using the Density-Based Congestion Control Protocol (DBCCP), which reduces the loss of packets to avoid the network congestion. After that, the gathered data are securely stored in the cloud server through linear feedback shift register encryption (LFSRE) based encryption algorithm. The proposed approach achieves an accuracy of 97.60%, PPV of 96.70%, selectivity of 97.20%, and NPV of 96.10%. The proposed approach enables significant advancement in modern power systems focusing on intelligent forecasting and uncertainty-aware congestion management for long-term success.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146099225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Wireless Spectrum Sharing Framework for LAA-LTE/WiFi Coexistence Systems LAA-LTE/WiFi共存系统的智能无线频谱共享框架
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-20 DOI: 10.1002/dac.70407
Sungwook Kim

Utilizing licensed assisted access (LAA) for cellular long-term evolution (LTE) presents a viable solution to address the growing issue of limited wireless spectrum. Nevertheless, realizing the advantages of LTE-LAA requires a fair coexistence framework to ensure harmonious operation alongside existing WiFi networks. This study explores how collaborative and coexistent strategies between WiFi and cellular technologies in unlicensed bands can enhance the capacity of heterogeneous wireless networks. To this end, we focus on optimizing spectrum allocation to boost the performance of systems where LAA-LTE and WiFi networks operate together. By using the carrier aggregation technology, the unlicensed bands can be appropriately distributed to individual mobile devices. Our approach integrates a distributional reinforcement learning algorithm and three distinct one-to-many bargaining solutions, enabling adaptive responses to various wireless environments. Based on the learning and bargaining methodologies, cellular and WiFi access points act cooperatively with each other to enhance conflicting performance criteria. The core innovation of our method lies in leveraging hybrid optimization strategies to their fullest potential while simultaneously achieving mutual agreement among different network entities through collaborative mechanisms. The simulation results confirm the efficiency of the proposed hybrid control strategy and validate its overall effectiveness.

利用许可辅助接入(LAA)进行蜂窝长期演进(LTE)是解决日益严重的无线频谱有限问题的可行解决方案。然而,实现LTE-LAA的优势需要一个公平的共存框架,确保与现有WiFi网络和谐运行。本研究探讨了WiFi和蜂窝技术之间的协作和共存策略如何在未经许可的频带中增强异构无线网络的容量。为此,我们专注于优化频谱分配,以提高LAA-LTE和WiFi网络一起运行的系统的性能。通过载波聚合技术,可以将未授权的频段适当地分配到单个移动设备上。我们的方法集成了分布式强化学习算法和三种不同的一对多议价解决方案,实现了对各种无线环境的自适应响应。基于学习和讨价还价的方法,蜂窝和WiFi接入点相互合作,以增强相互冲突的性能标准。该方法的核心创新在于充分发挥混合优化策略的潜力,同时通过协作机制实现不同网络实体之间的相互一致。仿真结果证实了所提混合控制策略的有效性,并验证了其总体有效性。
{"title":"Intelligent Wireless Spectrum Sharing Framework for LAA-LTE/WiFi Coexistence Systems","authors":"Sungwook Kim","doi":"10.1002/dac.70407","DOIUrl":"https://doi.org/10.1002/dac.70407","url":null,"abstract":"<div>\u0000 \u0000 <p>Utilizing licensed assisted access (LAA) for cellular long-term evolution (LTE) presents a viable solution to address the growing issue of limited wireless spectrum. Nevertheless, realizing the advantages of LTE-LAA requires a fair coexistence framework to ensure harmonious operation alongside existing WiFi networks. This study explores how collaborative and coexistent strategies between WiFi and cellular technologies in unlicensed bands can enhance the capacity of heterogeneous wireless networks. To this end, we focus on optimizing spectrum allocation to boost the performance of systems where LAA-LTE and WiFi networks operate together. By using the carrier aggregation technology, the unlicensed bands can be appropriately distributed to individual mobile devices. Our approach integrates a distributional reinforcement learning algorithm and three distinct one-to-many bargaining solutions, enabling adaptive responses to various wireless environments. Based on the learning and bargaining methodologies, cellular and WiFi access points act cooperatively with each other to enhance conflicting performance criteria. The core innovation of our method lies in leveraging hybrid optimization strategies to their fullest potential while simultaneously achieving mutual agreement among different network entities through collaborative mechanisms. The simulation results confirm the efficiency of the proposed hybrid control strategy and validate its overall effectiveness.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146099223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Communication Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1