首页 > 最新文献

International Journal of Communication Systems最新文献

英文 中文
Attack Chains Construction for Vehicular Networks Based on a Two-Dimensional Vulnerability Combination Strategy 基于二维漏洞组合策略的车联网攻击链构建
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-16 DOI: 10.1002/dac.70405
Xiyu Fang, Xueqing Yao, Waleed Younas, Dongyang Bao

Vehicular networks are central to intelligent transportation systems, yet their expanding attack surface yields complex multivulnerability paths that exceed traditional detection capabilities. This article presents a high-coverage attack-chain generation framework that models, clusters, and composes vulnerabilities with reduced redundancy. A five-tuple schema, Conditions, Tech, Tool, Target, and Results, unifies heterogeneous sources to expose underlying correlations. A semantically enhanced K-Modes method integrates semantic similarity with Hamming distance to improve categorization. A two-dimensional combinatorial engine then generates attack paths using a coverage matrix and greedy selection to balance tractability and coverage. Experiments on communication, system, and control-layer vulnerabilities achieve over 70% coverage and 85% accuracy, outperforming baselines. The framework supports vulnerability assessment and proactive defense planning, strengthening vehicular network resilience against complex attack chains.

车辆网络是智能交通系统的核心,但其不断扩大的攻击面产生了复杂的多漏洞路径,超出了传统的检测能力。本文介绍了一个高覆盖率的攻击链生成框架,该框架对冗余度降低的漏洞进行建模、集群和组合。一个五元组模式,条件、技术、工具、目标和结果,统一了异构源,以暴露潜在的相关性。一种语义增强的K-Modes方法将语义相似度与汉明距离相结合,提高了分类效率。然后使用覆盖矩阵和贪婪选择来平衡可跟踪性和覆盖,二维组合引擎生成攻击路径。对通信、系统和控制层漏洞的实验实现了超过70%的覆盖率和85%的准确率,优于基线。该框架支持脆弱性评估和主动防御规划,加强车辆网络抵御复杂攻击链的能力。
{"title":"Attack Chains Construction for Vehicular Networks Based on a Two-Dimensional Vulnerability Combination Strategy","authors":"Xiyu Fang,&nbsp;Xueqing Yao,&nbsp;Waleed Younas,&nbsp;Dongyang Bao","doi":"10.1002/dac.70405","DOIUrl":"https://doi.org/10.1002/dac.70405","url":null,"abstract":"<div>\u0000 \u0000 <p>Vehicular networks are central to intelligent transportation systems, yet their expanding attack surface yields complex multivulnerability paths that exceed traditional detection capabilities. This article presents a high-coverage attack-chain generation framework that models, clusters, and composes vulnerabilities with reduced redundancy. A five-tuple schema, Conditions, Tech, Tool, Target, and Results, unifies heterogeneous sources to expose underlying correlations. A semantically enhanced K-Modes method integrates semantic similarity with Hamming distance to improve categorization. A two-dimensional combinatorial engine then generates attack paths using a coverage matrix and greedy selection to balance tractability and coverage. Experiments on communication, system, and control-layer vulnerabilities achieve over 70% coverage and 85% accuracy, outperforming baselines. The framework supports vulnerability assessment and proactive defense planning, strengthening vehicular network resilience against complex attack chains.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146002364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion Detection in Wireless Sensor Networks Using Multitask Residual Shrinkage CNN Optimized by Fennec Fox Algorithm 基于Fennec Fox算法优化的多任务残差收缩CNN的无线传感器网络入侵检测
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-16 DOI: 10.1002/dac.70396
D. Satheesh Kumar, V. Niranjani, K. Pushpalatha, S. Gokila

Wireless sensor networks (WSNs) are generally used in environmental monitoring, data transfer, and object detection but are susceptible to intrusion attacks based on their integration with the Internet of things (IoT). Most conventional intrusion detection systems experience high false alarm rates and excessive computational overhead. For better performance in overcoming these limitations, a new intrusion detection framework called Multitask Multiattention Residual Shrinkage Convolutional Neural Network with optimization through the Fennec Fox Optimization Algorithm (MMRSCNN-FFOA-ID-WSN) is proposed. The framework combines preprocessing using an Ultrawideband Nanoplasmonic Bandpass Filter (UWNPBF) to eliminate redundant and biased entries, followed by feature selection through the Binary Waterwheel Plant Optimization Algorithm (BWWPOA). The MMRSCNN combines multitask learning with channel-wise attention and residual shrinkage operations to detect attack types from input data. To further improve detection accuracy, the weight parameters are optimized using the FFOA, chosen for its faster convergence in high-dimensional search spaces compared to other algorithms. Experiments were performed on the WSN-DS dataset having normal traffic and various attack types such as flooding, black hole, gray hole, and time division multiple access attacks (TDMA). The proposed method achieved an accuracy of 99.46%, specificity of 98.83%, and a false alarm rate of 1.12%, which correspond to relative improvements of up to 22.37%, 25.32%, and 32.40%, respectively, over the baseline model. These results show that MMRSCNN-FFOA-ID-WSN is an efficient and energy-saving solution for WSNs intrusion detection.

无线传感器网络(WSNs)通常用于环境监测、数据传输和目标检测,但由于与物联网(IoT)的集成,容易受到入侵攻击。大多数传统的入侵检测系统存在高误报率和过高的计算开销。为了更好地克服这些限制,提出了一种新的入侵检测框架——多任务多注意剩余收缩卷积神经网络,并通过Fennec Fox优化算法(MMRSCNN-FFOA-ID-WSN)进行优化。该框架结合了使用超宽带纳米等离子体带通滤波器(UWNPBF)进行预处理以消除冗余和偏置条目,然后通过二进制水轮厂优化算法(BWWPOA)进行特征选择。MMRSCNN将多任务学习与通道智能注意和剩余收缩操作结合起来,从输入数据中检测攻击类型。为了进一步提高检测精度,使用FFOA对权重参数进行优化,选择FFOA的原因是与其他算法相比,它在高维搜索空间中的收敛速度更快。在流量正常的WSN-DS数据集上进行实验,并对洪水攻击、黑洞攻击、灰洞攻击、时分多址攻击(TDMA)等攻击类型进行实验。该方法的准确率为99.46%,特异性为98.83%,虚警率为1.12%,相对于基线模型分别提高了22.37%,25.32%和32.40%。结果表明,MMRSCNN-FFOA-ID-WSN是一种高效节能的wsn入侵检测方案。
{"title":"Intrusion Detection in Wireless Sensor Networks Using Multitask Residual Shrinkage CNN Optimized by Fennec Fox Algorithm","authors":"D. Satheesh Kumar,&nbsp;V. Niranjani,&nbsp;K. Pushpalatha,&nbsp;S. Gokila","doi":"10.1002/dac.70396","DOIUrl":"https://doi.org/10.1002/dac.70396","url":null,"abstract":"<div>\u0000 \u0000 <p>Wireless sensor networks (WSNs) are generally used in environmental monitoring, data transfer, and object detection but are susceptible to intrusion attacks based on their integration with the Internet of things (IoT). Most conventional intrusion detection systems experience high false alarm rates and excessive computational overhead. For better performance in overcoming these limitations, a new intrusion detection framework called Multitask Multiattention Residual Shrinkage Convolutional Neural Network with optimization through the Fennec Fox Optimization Algorithm (MMRSCNN-FFOA-ID-WSN) is proposed. The framework combines preprocessing using an Ultrawideband Nanoplasmonic Bandpass Filter (UWNPBF) to eliminate redundant and biased entries, followed by feature selection through the Binary Waterwheel Plant Optimization Algorithm (BWWPOA). The MMRSCNN combines multitask learning with channel-wise attention and residual shrinkage operations to detect attack types from input data. To further improve detection accuracy, the weight parameters are optimized using the FFOA, chosen for its faster convergence in high-dimensional search spaces compared to other algorithms. Experiments were performed on the WSN-DS dataset having normal traffic and various attack types such as flooding, black hole, gray hole, and time division multiple access attacks (TDMA). The proposed method achieved an accuracy of 99.46%, specificity of 98.83%, and a false alarm rate of 1.12%, which correspond to relative improvements of up to 22.37%, 25.32%, and 32.40%, respectively, over the baseline model. These results show that MMRSCNN-FFOA-ID-WSN is an efficient and energy-saving solution for WSNs intrusion detection.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146007477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Secure Routing in CR-VANETs Through Neural Circle-Driven Finite Element Fusion With Eel Electro-Dynamic Optimization and Encryption 基于神经圈驱动有限元融合的电动力优化与加密增强CR-VANETs的安全路由
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-16 DOI: 10.1002/dac.70381
Deepika Arunachalavel, N. Pandeeswari

Cognitive radio vehicular ad hoc networks (CR-VANETs) demand secure and efficient routing to cope with high mobility, spectrum variability, and adversarial threats. To address these challenges, this paper introduces neural circle-driven finite element fusion with eel electro-dynamic optimization (NCir-FeF-E2dO). This integrated framework combines pre-processing, feature extraction, intelligent routing, and encryption. Smooth-Gauss histogram normalization (SGHNN) reduces noise and normalizes inputs, while the scale-calibrated transformer (SCT) extracts multi-scale features for robust representation. Routing predictions are achieved using a finite element neural fusion network (FE-NFN) enhanced by circle-driven optimization (CDO), and path selection is refined through eel electro-dynamic optimization (E2dO). For secure communication, the hyperchaotic system–Fibonacci Q-matrix encryption ensures confidentiality and resistance against statistical and differential attacks. Simulation results demonstrate significant performance gains: routing efficiency of 99.05%, packet delivery ratio of 97.22%, 30% lower end-to-end delay, 15% higher throughput, 10% better energy efficiency, 15% lower communication overhead, encryption speed of 142 Mbps, and system recovery time of 4.7 ms. Compared with OPBRP, OCSR, UGAVs-MDVF, DTE-RR, LSTM, UER, and RL-IoT, the proposed method consistently outperforms across all evaluated metrics. These findings establish NCir-FeF-E2dO as a reliable and scalable solution for enhancing secure routing in CR-VANETs.

认知无线电车载自组织网络(cr - vanet)需要安全有效的路由来应对高移动性、频谱可变性和对抗性威胁。为了解决这些问题,本文引入了神经圈驱动的有限元融合鳗鱼电动力学优化(ncirf - fef - e2do)。这个集成框架结合了预处理、特征提取、智能路由和加密。平滑高斯直方图归一化(SGHNN)降低噪声并对输入进行归一化,而尺度校准变压器(SCT)提取多尺度特征以实现鲁棒表示。路径预测采用循环驱动优化(CDO)增强的有限元神经融合网络(FE-NFN)实现,路径选择采用鳗鱼电动力优化(E2dO)优化。对于安全通信,超混沌系统-斐波那契q矩阵加密确保保密性和抵抗统计和差分攻击。仿真结果显示了显著的性能提升:路由效率99.05%,数据包传送率97.22%,端到端延迟降低30%,吞吐量提高15%,能源效率提高10%,通信开销降低15%,加密速度142 Mbps,系统恢复时间4.7 ms。与OPBRP、OCSR、ugav - mdvf、DTE-RR、LSTM、UER和RL-IoT相比,该方法在所有评估指标上都表现优异。这些发现确立了nir - fef - e2do作为增强cr - vanet安全路由的可靠且可扩展的解决方案。
{"title":"Enhancing Secure Routing in CR-VANETs Through Neural Circle-Driven Finite Element Fusion With Eel Electro-Dynamic Optimization and Encryption","authors":"Deepika Arunachalavel,&nbsp;N. Pandeeswari","doi":"10.1002/dac.70381","DOIUrl":"https://doi.org/10.1002/dac.70381","url":null,"abstract":"<div>\u0000 \u0000 <p>Cognitive radio vehicular ad hoc networks (CR-VANETs) demand secure and efficient routing to cope with high mobility, spectrum variability, and adversarial threats. To address these challenges, this paper introduces neural circle-driven finite element fusion with eel electro-dynamic optimization (NCir-FeF-E2dO). This integrated framework combines pre-processing, feature extraction, intelligent routing, and encryption. Smooth-Gauss histogram normalization (SGHNN) reduces noise and normalizes inputs, while the scale-calibrated transformer (SCT) extracts multi-scale features for robust representation. Routing predictions are achieved using a finite element neural fusion network (FE-NFN) enhanced by circle-driven optimization (CDO), and path selection is refined through eel electro-dynamic optimization (E2dO). For secure communication, the hyperchaotic system–Fibonacci Q-matrix encryption ensures confidentiality and resistance against statistical and differential attacks. Simulation results demonstrate significant performance gains: routing efficiency of 99.05%, packet delivery ratio of 97.22%, 30% lower end-to-end delay, 15% higher throughput, 10% better energy efficiency, 15% lower communication overhead, encryption speed of 142 Mbps, and system recovery time of 4.7 ms. Compared with OPBRP, OCSR, UGAVs-MDVF, DTE-RR, LSTM, UER, and RL-IoT, the proposed method consistently outperforms across all evaluated metrics. These findings establish NCir-FeF-E2dO as a reliable and scalable solution for enhancing secure routing in CR-VANETs.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146002365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Puma and Arctic Puffin-Inspired Multiobjective Energy-Efficient Clustering and Mobile Sink Path Optimization Algorithm for Extending Network Lifetime in WSNs 基于混合美洲狮和北极海雀的WSNs多目标高效聚类和移动汇聚路径优化算法
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-16 DOI: 10.1002/dac.70371
B. Gracelin Sheena, P. Jayalakshmi, V. K. Gnanavel, A. Sheryl Oliver, G. Kavitha, R. S. Amshavalli

Energy consumption is the most significant factor in Wireless Sensor Networks (WSNs) because it is completely impractical to recharge the sensor nodes' energy when they are deployed for monitoring in hostile environments. This energy utilization factor is highly indispensable as it has a direct influence on energy stability and network lifetime. The main intent of this research is to concentrate on energy-efficient CHs selection and sink node mobility, which helps in establishing single-hop communication amid chosen CHs and sink based on merits of meta-heuristic algorithms that are more ideal for determining optimal solutions to NP-hard problems. In this paper, Hybrid Puma and Arctic Puffin Multiobjective energy-efficient optimization clustering and sink node mobility routing (HPAPCSMP) Protocol is propounded for achieving better energy stability and network lifespan. This HPAPCSMP mechanism specifically used the Puma Optimization Algorithm (PUOA) for efficient selection of CHs using the fitness function depending on factors of network coverage, node degree, intracluster and intercluster distance and residual energy (RE). It used the Arctic Puffin Optimization Algorithm (APOA) to support sink node mobility that guarantees single-hop communication between chosen CHs and sink such that significant energy is sustained to obtain improved network lifetime. This APOA-based mobile sink path planning algorithm is a significant signal collection method for alleviating the limitations of the mobile sink path optimization process with the objective of shortening the trajectory of movement. The results of the HPAPCSMP mechanism confirmed maximized throughput of 21.38%, reduced energy consumptions of 25.42%, and extended network lifetime of 21.94% better than standard clustering approaches taken for comparison.

能量消耗是无线传感器网络(WSNs)中最重要的因素,因为当传感器节点部署在恶劣环境中进行监测时,给它们充电是完全不切实际的。该能量利用系数直接影响到电网的能量稳定性和寿命,是电网不可缺少的重要因素。本研究的主要目的是集中在节能CHs选择和汇聚节点移动上,这有助于在选择的CHs和汇聚节点之间建立单跳通信,这是基于元启发式算法的优点,更理想地确定np困难问题的最优解。为了获得更好的能量稳定性和网络寿命,提出了混合美洲狮和北极海雀多目标节能优化聚类和汇聚节点移动路由(HPAPCSMP)协议。该HPAPCSMP机制具体采用Puma Optimization Algorithm (PUOA),利用适应度函数根据网络覆盖、节点度、簇内和簇间距离以及剩余能量(RE)等因素高效选择CHs。它使用北极海雀优化算法(Arctic Puffin Optimization Algorithm, APOA)来支持汇聚节点移动性,保证所选CHs和汇聚节点之间的单跳通信,从而维持大量能量以获得改进的网络生命周期。该算法以缩短移动轨迹为目标,缓解了移动汇聚路径优化过程的局限性,是一种重要的信号采集方法。HPAPCSMP机制的结果证实,与进行比较的标准聚类方法相比,该机制的吞吐量提高了21.38%,能耗降低了25.42%,网络寿命延长了21.94%。
{"title":"Hybrid Puma and Arctic Puffin-Inspired Multiobjective Energy-Efficient Clustering and Mobile Sink Path Optimization Algorithm for Extending Network Lifetime in WSNs","authors":"B. Gracelin Sheena,&nbsp;P. Jayalakshmi,&nbsp;V. K. Gnanavel,&nbsp;A. Sheryl Oliver,&nbsp;G. Kavitha,&nbsp;R. S. Amshavalli","doi":"10.1002/dac.70371","DOIUrl":"https://doi.org/10.1002/dac.70371","url":null,"abstract":"<div>\u0000 \u0000 <p>Energy consumption is the most significant factor in Wireless Sensor Networks (WSNs) because it is completely impractical to recharge the sensor nodes' energy when they are deployed for monitoring in hostile environments. This energy utilization factor is highly indispensable as it has a direct influence on energy stability and network lifetime. The main intent of this research is to concentrate on energy-efficient CHs selection and sink node mobility, which helps in establishing single-hop communication amid chosen CHs and sink based on merits of meta-heuristic algorithms that are more ideal for determining optimal solutions to NP-hard problems. In this paper, Hybrid Puma and Arctic Puffin Multiobjective energy-efficient optimization clustering and sink node mobility routing (HPAPCSMP) Protocol is propounded for achieving better energy stability and network lifespan. This HPAPCSMP mechanism specifically used the Puma Optimization Algorithm (PUOA) for efficient selection of CHs using the fitness function depending on factors of network coverage, node degree, intracluster and intercluster distance and residual energy (RE). It used the Arctic Puffin Optimization Algorithm (APOA) to support sink node mobility that guarantees single-hop communication between chosen CHs and sink such that significant energy is sustained to obtain improved network lifetime. This APOA-based mobile sink path planning algorithm is a significant signal collection method for alleviating the limitations of the mobile sink path optimization process with the objective of shortening the trajectory of movement. The results of the HPAPCSMP mechanism confirmed maximized throughput of 21.38%, reduced energy consumptions of 25.42%, and extended network lifetime of 21.94% better than standard clustering approaches taken for comparison.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146007476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Analytics and Fuzzy Call Admission Control With Adaptive Scheduling for Enhanced Quality of Service in 6G IoT for Multimedia Streaming 基于自适应调度的高效分析和模糊呼叫接纳控制提高6G物联网多媒体流的服务质量
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-15 DOI: 10.1002/dac.70392
G. Nanthakumar, J. Chandra Priya, K. Karthika, A. Jyothi Babu

The increasing demand for stringent quality of service (QoS) guarantees and low latency in mission and time-critical 6G internet of things (IoT) applications necessitates advanced call admission control (CAC) mechanisms. Although 6G networks offer enhanced capabilities, resource limitations like bandwidth and processing power persist. Consequently, efficient resource allocation strategies are crucial to balancing the needs of diverse services, particularly for real-time streaming applications. This paper introduces a novel Analytics & Fuzzy Call Admission Control (AF-CAC) algorithm combined with an Adaptive Leaky Bucket (ALB) scheduling mechanism. The AF-CAC algorithm integrates predictive analytics and fuzzy logic to make informed, intelligent admission decisions, ensuring reliable communication and optimal resource utilization. It prioritizes critical data transmission and prevents network overloading by controlling the number of admitted calls. Concurrently, the ALB mechanism dynamically adapts to changing network conditions, user mobility, and traffic patterns, efficiently allocating resources to meet diverse QoS requirements. The proactive resource allocation is enhanced with a convolutional neural network (CNN) and reinforcement learning (RL) agents, enabling dynamic and efficient resource management to ensure high-quality multimedia streaming, support mission-critical applications, and maintain uninterrupted service during mobility. The average throughput for the AF-CAC technique is 1350 packets/slot, and the average delay over the range of 300 simulated devices is 840 ms. Hence, it exhibits significant enhancements in admitting connections and overall QoS compared to existing approaches for managing multimedia traffic in 6G networks.

在任务和时间关键型6G物联网(IoT)应用中,对严格的服务质量(QoS)保证和低延迟的需求日益增长,需要先进的呼叫接纳控制(CAC)机制。尽管6G网络提供了增强的功能,但带宽和处理能力等资源限制仍然存在。因此,有效的资源分配策略对于平衡各种服务的需求至关重要,特别是对于实时流应用程序。本文介绍了一种结合自适应漏桶调度机制的分析模糊呼叫接纳控制(AF-CAC)算法。AF-CAC算法集成了预测分析和模糊逻辑,以做出明智的录取决策,确保可靠的通信和最佳的资源利用。它可以优先传输关键数据,并通过控制允许的呼叫数量来防止网络过载。同时,ALB机制能够动态适应不断变化的网络状况、用户移动性和流量模式,有效地分配资源,满足不同的QoS需求。通过卷积神经网络(CNN)和强化学习(RL)代理增强了主动资源分配,实现了动态高效的资源管理,以确保高质量的多媒体流,支持关键任务应用程序,并在移动期间保持不间断的服务。AF-CAC技术的平均吞吐量为1350个数据包/插槽,在300个模拟设备范围内的平均延迟为840 ms。因此,与6G网络中管理多媒体流量的现有方法相比,它在允许连接和总体QoS方面表现出显著的增强。
{"title":"Efficient Analytics and Fuzzy Call Admission Control With Adaptive Scheduling for Enhanced Quality of Service in 6G IoT for Multimedia Streaming","authors":"G. Nanthakumar,&nbsp;J. Chandra Priya,&nbsp;K. Karthika,&nbsp;A. Jyothi Babu","doi":"10.1002/dac.70392","DOIUrl":"https://doi.org/10.1002/dac.70392","url":null,"abstract":"<div>\u0000 \u0000 <p>The increasing demand for stringent quality of service (QoS) guarantees and low latency in mission and time-critical 6G internet of things (IoT) applications necessitates advanced call admission control (CAC) mechanisms. Although 6G networks offer enhanced capabilities, resource limitations like bandwidth and processing power persist. Consequently, efficient resource allocation strategies are crucial to balancing the needs of diverse services, particularly for real-time streaming applications. This paper introduces a novel Analytics &amp; Fuzzy Call Admission Control (AF-CAC) algorithm combined with an Adaptive Leaky Bucket (ALB) scheduling mechanism. The AF-CAC algorithm integrates predictive analytics and fuzzy logic to make informed, intelligent admission decisions, ensuring reliable communication and optimal resource utilization. It prioritizes critical data transmission and prevents network overloading by controlling the number of admitted calls. Concurrently, the ALB mechanism dynamically adapts to changing network conditions, user mobility, and traffic patterns, efficiently allocating resources to meet diverse QoS requirements. The proactive resource allocation is enhanced with a convolutional neural network (CNN) and reinforcement learning (RL) agents, enabling dynamic and efficient resource management to ensure high-quality multimedia streaming, support mission-critical applications, and maintain uninterrupted service during mobility. The average throughput for the AF-CAC technique is 1350 packets/slot, and the average delay over the range of 300 simulated devices is 840 ms. Hence, it exhibits significant enhancements in admitting connections and overall QoS compared to existing approaches for managing multimedia traffic in 6G networks.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145987150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized Resource Allocation and Caching for Integrated Satellite–Terrestrial Networks Using Multiagent Deep Learning 基于多智能体深度学习的星地集成网络资源优化分配与缓存
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-15 DOI: 10.1002/dac.70366
Kalyan Kumar G, Sankar P

The amalgamation of terrestrial and satellite networks for nonorthogonal multiple access services presents a viable approach to improve the energy effectiveness and decrease the latency in communication systems. However, existing approaches face drawbacks such as high computational complexity, limited scalability, and difficulties in handling multiagent coordination, especially in large-scale satellite–terrestrial networks. This research presents a hybrid optimization scheme that maximizes energy efficiency and minimizes delays based on vital considerations like base station (BS) satellite placement, caching strategy, user association, and transmission power control. A three-phase approach is suggested to tackle these issues, relying on collaboration Q-learning with convolutional neural network (C-QCNN) and binary meerkat–hippopotamus optimization for power-control enhancement, cache architecture, and user association. It is observed that the proposed C-QCNN achieves the highest resource utilization of 99.23% when compared with existing techniques. This indicates that C-QCNN effectively allocates and utilizes resources to the enhancement of overall network performance. Significant improvements in energy efficiency are found in integrated satellite–terrestrial networks, thereby enabling more reliable and efficient nonorthogonal multiple access services. The significance of the proposed approach lies in its emphasis on advanced techniques in resource allocation and network optimization for next-generation communication systems.

非正交多址业务中地面网与卫星网的融合是提高通信系统能量利用率和降低通信系统时延的可行途径。然而,现有的方法面临着计算复杂度高、可扩展性有限以及处理多智能体协调困难等缺点,特别是在大规模卫星-地面网络中。本研究提出了一种混合优化方案,该方案基于基站(BS)卫星放置、缓存策略、用户关联和传输功率控制等重要考虑因素,最大限度地提高了能源效率并最小化了延迟。建议采用三阶段方法来解决这些问题,依靠卷积神经网络(C-QCNN)协同q学习和二元猫鼬-河马优化来增强功率控制、缓存架构和用户关联。与现有技术相比,所提出的C-QCNN的资源利用率最高,达到99.23%。这表明C-QCNN有效地分配和利用资源,以提高整体网络性能。卫星-地面综合网络的能源效率显著提高,从而实现更可靠和高效的非正交多址服务。该方法的意义在于强调下一代通信系统的资源分配和网络优化的先进技术。
{"title":"Optimized Resource Allocation and Caching for Integrated Satellite–Terrestrial Networks Using Multiagent Deep Learning","authors":"Kalyan Kumar G,&nbsp;Sankar P","doi":"10.1002/dac.70366","DOIUrl":"https://doi.org/10.1002/dac.70366","url":null,"abstract":"<div>\u0000 \u0000 <p>The amalgamation of terrestrial and satellite networks for nonorthogonal multiple access services presents a viable approach to improve the energy effectiveness and decrease the latency in communication systems. However, existing approaches face drawbacks such as high computational complexity, limited scalability, and difficulties in handling multiagent coordination, especially in large-scale satellite–terrestrial networks. This research presents a hybrid optimization scheme that maximizes energy efficiency and minimizes delays based on vital considerations like base station (BS) satellite placement, caching strategy, user association, and transmission power control. A three-phase approach is suggested to tackle these issues, relying on collaboration Q-learning with convolutional neural network (C-QCNN) and binary meerkat–hippopotamus optimization for power-control enhancement, cache architecture, and user association. It is observed that the proposed C-QCNN achieves the highest resource utilization of 99.23% when compared with existing techniques. This indicates that C-QCNN effectively allocates and utilizes resources to the enhancement of overall network performance. Significant improvements in energy efficiency are found in integrated satellite–terrestrial networks, thereby enabling more reliable and efficient nonorthogonal multiple access services. The significance of the proposed approach lies in its emphasis on advanced techniques in resource allocation and network optimization for next-generation communication systems.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145983809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differential Spatial Modulation Detection in Uplink Multiuser Massive MIMO Systems Using Optimized Shuffle Attention Convolutional Neural Network With MobileNet V1 基于MobileNet V1优化Shuffle注意卷积神经网络的上行多用户大规模MIMO系统差分空间调制检测
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-15 DOI: 10.1002/dac.70373
Poornima R., Sampoornam K.P., Allwyn Clarence A., Madhumathi R.

A significant interference challenge is presented by the upcoming sixth generation (6G) and beyond of wireless communication due to the increasing presence of ultra-scale intelligent factors, such as smart vehicles and mobile robots. Managing this interference can be difficult for detection algorithms in uplink massive multiple-input and multiple-output (MIMO) systems, particularly when dealing with higher-order quadrature amplitude modulation (QAM) signals. Differential spatial modulation (DSM) detection using deep learning (DL) has been a fundamental solution for effectively managing interference in 6G and enhancing the uplink performance of the MIMO system. In this paper, DSM detection in uplink multiuser massive MIMO systems using optimized shuffle attention convolutional neural network with MobileNet V1 (SMD-MIMO-SACNN-MNV1) is proposed. The proposed SACNN-MNV1 technique is used to detect the DSM in uplink multiuser massive multiple-input multiple-output (M-MIMO) systems. Artificial lizard search optimization algorithm (ALSOA) is utilized to enhance the SACNN-MNV1 detector that detects the DSM precisely. The proposed SMD-MIMO-SACNN-MNV1 method is executed in Python. The proposed method achieves 23.54%, 22.65%, and 23.18% higher spectral efficiency when compared with existing techniques respectively.

由于超规模智能因素(如智能车辆和移动机器人)的日益存在,即将到来的第六代(6G)及以上无线通信提出了重大的干扰挑战。在上行链路大规模多输入多输出(MIMO)系统中,管理这种干扰对于检测算法来说是困难的,特别是在处理高阶正交调幅(QAM)信号时。使用深度学习(DL)的差分空间调制(DSM)检测已经成为有效管理6G干扰和增强MIMO系统上行性能的基本解决方案。本文提出了基于MobileNet V1优化洗牌注意卷积神经网络(SMD-MIMO-SACNN-MNV1)的上行多用户大规模MIMO系统DSM检测方法。提出的SACNN-MNV1技术用于上行多用户海量多输入多输出(M-MIMO)系统的DSM检测。利用人工蜥蜴搜索优化算法(Artificial lizard search optimization algorithm, ALSOA)对SACNN-MNV1探测器进行了改进,使其能够准确地检测到DSM。提出的SMD-MIMO-SACNN-MNV1方法在Python中执行。与现有方法相比,该方法的光谱效率分别提高了23.54%、22.65%和23.18%。
{"title":"Differential Spatial Modulation Detection in Uplink Multiuser Massive MIMO Systems Using Optimized Shuffle Attention Convolutional Neural Network With MobileNet V1","authors":"Poornima R.,&nbsp;Sampoornam K.P.,&nbsp;Allwyn Clarence A.,&nbsp;Madhumathi R.","doi":"10.1002/dac.70373","DOIUrl":"https://doi.org/10.1002/dac.70373","url":null,"abstract":"<div>\u0000 \u0000 <p>A significant interference challenge is presented by the upcoming sixth generation (6G) and beyond of wireless communication due to the increasing presence of ultra-scale intelligent factors, such as smart vehicles and mobile robots. Managing this interference can be difficult for detection algorithms in uplink massive multiple-input and multiple-output (MIMO) systems, particularly when dealing with higher-order quadrature amplitude modulation (QAM) signals. Differential spatial modulation (DSM) detection using deep learning (DL) has been a fundamental solution for effectively managing interference in 6G and enhancing the uplink performance of the MIMO system. In this paper, DSM detection in uplink multiuser massive MIMO systems using optimized shuffle attention convolutional neural network with MobileNet V1 (SMD-MIMO-SACNN-MNV1) is proposed. The proposed SACNN-MNV1 technique is used to detect the DSM in uplink multiuser massive multiple-input multiple-output (M-MIMO) systems. Artificial lizard search optimization algorithm (ALSOA) is utilized to enhance the SACNN-MNV1 detector that detects the DSM precisely. The proposed SMD-MIMO-SACNN-MNV1 method is executed in Python. The proposed method achieves 23.54%, 22.65%, and 23.18% higher spectral efficiency when compared with existing techniques respectively.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145970016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recent Development in Integrated Sensing and Communication Antenna Architectures for Cognitive Radios: Opportunities and Challenges 认知无线电集成传感和通信天线体系结构的最新发展:机遇与挑战
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-15 DOI: 10.1002/dac.70406
Jayant Kumar Rai, Pinku Ranjan, Rakesh Chowdhury, Nipun Kumar Mishara

Integrated sensing and communication (ISAC) is a key technology for next-generation cognitive radio (CR) systems that allows for the smooth coexistence of several wireless services and effective spectrum utilization. A comprehensive review of current developments in ISAC antenna configurations specifically designed for CR applications is provided in this article. The significant representations of CR architecture are dielectric resonator antenna (DRA)-based CR systems and microstrip patch antenna (MPA)-based CR systems. A communication and sensing antenna enables CR antennas to perform multiple purposes. The communication antenna, which is combined with a reconfigurable filter, offers narrowband operation for dependable data transmission, while the sensing antenna, which is usually constructed as an ultrawideband (UWB) structure, allows spectrum awareness by collecting a wide range of frequencies. The study covers key design approaches, reconfigurability strategies, and trade-offs related to ISAC antennas in CR systems, focusing on their use in adaptive wireless communication and dynamic spectrum access. The review paper also addresses the design, challenges, and performance parameters of CR.

集成传感与通信(ISAC)是下一代认知无线电(CR)系统的关键技术,可实现多种无线业务的平稳共存和有效的频谱利用。本文全面回顾了专为CR应用而设计的ISAC天线配置的最新发展。CR体系结构的重要代表是基于介质谐振器天线(DRA)的CR系统和基于微带贴片天线(MPA)的CR系统。通信和传感天线使CR天线具有多种用途。通信天线与可重构滤波器相结合,为可靠的数据传输提供窄带操作,而传感天线通常采用超宽带(UWB)结构,通过收集广泛的频率范围来实现频谱感知。该研究涵盖了CR系统中ISAC天线的关键设计方法、可重构策略和权衡,重点研究了它们在自适应无线通信和动态频谱接入中的应用。本文还讨论了CR的设计、挑战和性能参数。
{"title":"Recent Development in Integrated Sensing and Communication Antenna Architectures for Cognitive Radios: Opportunities and Challenges","authors":"Jayant Kumar Rai,&nbsp;Pinku Ranjan,&nbsp;Rakesh Chowdhury,&nbsp;Nipun Kumar Mishara","doi":"10.1002/dac.70406","DOIUrl":"https://doi.org/10.1002/dac.70406","url":null,"abstract":"<div>\u0000 \u0000 <p>Integrated sensing and communication (ISAC) is a key technology for next-generation cognitive radio (CR) systems that allows for the smooth coexistence of several wireless services and effective spectrum utilization. A comprehensive review of current developments in ISAC antenna configurations specifically designed for CR applications is provided in this article. The significant representations of CR architecture are dielectric resonator antenna (DRA)-based CR systems and microstrip patch antenna (MPA)-based CR systems. A communication and sensing antenna enables CR antennas to perform multiple purposes. The communication antenna, which is combined with a reconfigurable filter, offers narrowband operation for dependable data transmission, while the sensing antenna, which is usually constructed as an ultrawideband (UWB) structure, allows spectrum awareness by collecting a wide range of frequencies. The study covers key design approaches, reconfigurability strategies, and trade-offs related to ISAC antennas in CR systems, focusing on their use in adaptive wireless communication and dynamic spectrum access. The review paper also addresses the design, challenges, and performance parameters of CR.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145993959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Malicious Node Detection in Wireless Sensor Networks Using Multimodal Contrastive Domain Sharing Generative Adversarial Networks and Blockchain-Based Distributed Storage 基于多模态对比域共享生成对抗网络和区块链分布式存储的无线传感器网络中增强恶意节点检测
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-15 DOI: 10.1002/dac.70398
Mohanapriya R, B. Suganthi, S. Rajeswari, R. Dharani

Wireless sensor networks (WSNs) suffer from the risk of security breaches because of limited node resources, dynamic topologies, and lack of security mechanisms. These limitations affect the integrity of the data and the reliability of the network. Therefore, this paper proposes an enhanced malicious node detection in wireless sensor networks using multimodal contrastive domain sharing generative adversarial networks and blockchain based distributed storage (MND-MCDSGAN-WSN). Firstly, the sensor data gathered from the wireless sensor networks dataset are used. The collected data are cleaned with the Multi-Observation Fusion Kalman Filter (MOFKF) to remove the noise and to make the data more consistent. The Multimodal Contrastive Domain Sharing Generative Adversarial Networks (MCDSGAN) framework gets preprocessed data as input and classifies the malicious activities as Normal, Grayhole, Blackhole, TDMA, and Flooding. Meanwhile, the Adaptive Marine Predator Optimization Algorithm (AMPOA) selects the MCDSGAN model parameters to improve the stability and the generalization of the model. The Interplanetary File System (IPFS) is used to keep the verified node data safe, and a fair proof-of-reputation (FPoR) consensus mechanism is employed to ensure trustful nodes' participation and updates that are resistant to tampering in the blockchain. The combined architecture enhances detection reliability, thus helping trust management and giving a scalable security solution to WSNs that are underresourced. The proposed MND-MCDSGAN-WSN method achieves higher accuracy of 99.07% when evaluated with other existing methods.

无线传感器网络由于节点资源有限、拓扑结构动态、缺乏安全机制等原因,存在安全漏洞的风险。这些限制影响了数据的完整性和网络的可靠性。因此,本文提出了一种基于多模态对比域共享生成对抗网络和基于区块链的分布式存储(MND-MCDSGAN-WSN)的无线传感器网络中增强的恶意节点检测方法。首先,使用从无线传感器网络数据集收集的传感器数据。采用多观测融合卡尔曼滤波(MOFKF)对采集到的数据进行清洗,去除噪声,使数据更加一致。多模态对比域共享生成对抗网络(MCDSGAN)框架将预处理数据作为输入,并将恶意活动分类为Normal、Grayhole、Blackhole、TDMA和Flooding。同时,采用自适应海洋捕食者优化算法(AMPOA)选择MCDSGAN模型参数,提高模型的稳定性和泛化能力。星际文件系统(IPFS)用于保证已验证节点数据的安全,并采用公平的声誉证明(FPoR)共识机制来确保可信节点的参与和更新,从而抵抗区块链中的篡改。这种组合架构增强了检测可靠性,从而有助于信任管理,并为资源不足的wsn提供可扩展的安全解决方案。与现有方法比较,MND-MCDSGAN-WSN方法的准确率达到99.07%。
{"title":"Enhanced Malicious Node Detection in Wireless Sensor Networks Using Multimodal Contrastive Domain Sharing Generative Adversarial Networks and Blockchain-Based Distributed Storage","authors":"Mohanapriya R,&nbsp;B. Suganthi,&nbsp;S. Rajeswari,&nbsp;R. Dharani","doi":"10.1002/dac.70398","DOIUrl":"https://doi.org/10.1002/dac.70398","url":null,"abstract":"<div>\u0000 \u0000 <p>Wireless sensor networks (WSNs) suffer from the risk of security breaches because of limited node resources, dynamic topologies, and lack of security mechanisms. These limitations affect the integrity of the data and the reliability of the network. Therefore, this paper proposes an enhanced malicious node detection in wireless sensor networks using multimodal contrastive domain sharing generative adversarial networks and blockchain based distributed storage (MND-MCDSGAN-WSN). Firstly, the sensor data gathered from the wireless sensor networks dataset are used. The collected data are cleaned with the Multi-Observation Fusion Kalman Filter (MOFKF) to remove the noise and to make the data more consistent. The Multimodal Contrastive Domain Sharing Generative Adversarial Networks (MCDSGAN) framework gets preprocessed data as input and classifies the malicious activities as Normal, Grayhole, Blackhole, TDMA, and Flooding. Meanwhile, the Adaptive Marine Predator Optimization Algorithm (AMPOA) selects the MCDSGAN model parameters to improve the stability and the generalization of the model. The Interplanetary File System (IPFS) is used to keep the verified node data safe, and a fair proof-of-reputation (FPoR) consensus mechanism is employed to ensure trustful nodes' participation and updates that are resistant to tampering in the blockchain. The combined architecture enhances detection reliability, thus helping trust management and giving a scalable security solution to WSNs that are underresourced. The proposed MND-MCDSGAN-WSN method achieves higher accuracy of 99.07% when evaluated with other existing methods.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145970015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Lightweight Image Encryption Algorithm for Ensuring Confidentiality and Privacy in Internet of Things Devices 面向物联网设备保密性和隐私性的轻量级图像加密算法的开发
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-15 DOI: 10.1002/dac.70389
B. Maheswari, S. Ambika, T. P. Dayana Peter, R. Siva Subramanian

Lightweight image encryption for the Internet of Things (IoT) enables secure image data transmission between connected devices while accommodating the limited processing memory and power of IoT systems. A general drawback of lightweight image encryption is that it often sacrifices security strength for efficiency, making it more vulnerable to attacks compared to more robust encryption methods. In this manuscript, the development of a lightweight image encryption algorithm for ensuring confidentiality and privacy in Internet of Things devices (DLWIE-ECP-IoTD) is proposed. Firstly, the input image is gathered from the Caltech-101 dataset. Then, a chaotic pattern generation using a one-dimensional discrete chaos mapping system is applied to generate unpredictable patterns to secure image encryption, followed by a chaotic model of information encryption used for securing the image through unpredictable transformations. Then, a Uniform Physics Informed Neural Network (UPINN) is adapted to produce pseudo-random encryption keys from chaotic parameters, providing an efficient and secure key-generation mechanism. Finally, Fully Dynamic Advanced Encryption Standard (FDAES) is utilized for lightweight encryption of image data. The proposed DLWIE-ECP-IoTD approach is implemented in Python. The proposed DLWIE-ECP-IoTD approach achieves 1.120 s of computational time and 0.03% mean squared error (MSE) with existing methods, such as a lightweight multichaos-based image encryption scheme for IoT networks (LWMC-IES-IoTN), a lightweight image encryption scheme for IoT environments and machine learning-driven robust S-box selection (LWIE-IoTE-ML-DRSBS), and a lightweight image encryption scheme for the safe Internet of Things using a novel chaotic technique (LWIE-NCT-SIoT).

物联网(IoT)的轻量级图像加密能够在连接设备之间安全传输图像数据,同时适应物联网系统有限的处理内存和功率。轻量级图像加密的一个普遍缺点是,它经常为了效率而牺牲安全强度,与更健壮的加密方法相比,它更容易受到攻击。在本文中,提出了一种轻量级图像加密算法的开发,以确保物联网设备的机密性和隐私性(dlwie - epc - iotd)。首先,从Caltech-101数据集中收集输入图像。然后,使用一维离散混沌映射系统生成混沌模式以生成不可预测的模式以保护图像加密,然后使用混沌信息加密模型通过不可预测的转换来保护图像。然后,采用统一物理信息神经网络(UPINN)从混沌参数生成伪随机加密密钥,提供了一种高效、安全的密钥生成机制。最后,采用全动态高级加密标准(FDAES)对图像数据进行轻量加密。提出的dlwie - epc - iotd方法是在Python中实现的。与现有方法相比,所提出的dlwie - epc - iotd方法的计算时间为1.120秒,均方误差(MSE)为0.03%。现有方法包括:用于物联网网络的基于多混沌的轻量级图像加密方案(lwmc - ie - iotn),用于物联网环境和机器学习驱动的鲁强s盒选择的轻量级图像加密方案(LWIE-IoTE-ML-DRSBS),以及使用新型混沌技术的安全物联网的轻量级图像加密方案(LWIE-NCT-SIoT)。
{"title":"Development of Lightweight Image Encryption Algorithm for Ensuring Confidentiality and Privacy in Internet of Things Devices","authors":"B. Maheswari,&nbsp;S. Ambika,&nbsp;T. P. Dayana Peter,&nbsp;R. Siva Subramanian","doi":"10.1002/dac.70389","DOIUrl":"https://doi.org/10.1002/dac.70389","url":null,"abstract":"<div>\u0000 \u0000 <p>Lightweight image encryption for the Internet of Things (IoT) enables secure image data transmission between connected devices while accommodating the limited processing memory and power of IoT systems. A general drawback of lightweight image encryption is that it often sacrifices security strength for efficiency, making it more vulnerable to attacks compared to more robust encryption methods. In this manuscript, the development of a lightweight image encryption algorithm for ensuring confidentiality and privacy in Internet of Things devices (DLWIE-ECP-IoTD) is proposed. Firstly, the input image is gathered from the Caltech-101 dataset. Then, a chaotic pattern generation using a one-dimensional discrete chaos mapping system is applied to generate unpredictable patterns to secure image encryption, followed by a chaotic model of information encryption used for securing the image through unpredictable transformations. Then, a Uniform Physics Informed Neural Network (UPINN) is adapted to produce pseudo-random encryption keys from chaotic parameters, providing an efficient and secure key-generation mechanism. Finally, Fully Dynamic Advanced Encryption Standard (FDAES) is utilized for lightweight encryption of image data. The proposed DLWIE-ECP-IoTD approach is implemented in Python. The proposed DLWIE-ECP-IoTD approach achieves 1.120 s of computational time and 0.03% mean squared error (MSE) with existing methods, such as a lightweight multichaos-based image encryption scheme for IoT networks (LWMC-IES-IoTN), a lightweight image encryption scheme for IoT environments and machine learning-driven robust S-box selection (LWIE-IoTE-ML-DRSBS), and a lightweight image encryption scheme for the safe Internet of Things using a novel chaotic technique (LWIE-NCT-SIoT).</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145987083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Communication Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1