首页 > 最新文献

International Journal of Communication Systems最新文献

英文 中文
Development of Lightweight Image Encryption Algorithm for Ensuring Confidentiality and Privacy in Internet of Things Devices 面向物联网设备保密性和隐私性的轻量级图像加密算法的开发
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-15 DOI: 10.1002/dac.70389
B. Maheswari, S. Ambika, T. P. Dayana Peter, R. Siva Subramanian

Lightweight image encryption for the Internet of Things (IoT) enables secure image data transmission between connected devices while accommodating the limited processing memory and power of IoT systems. A general drawback of lightweight image encryption is that it often sacrifices security strength for efficiency, making it more vulnerable to attacks compared to more robust encryption methods. In this manuscript, the development of a lightweight image encryption algorithm for ensuring confidentiality and privacy in Internet of Things devices (DLWIE-ECP-IoTD) is proposed. Firstly, the input image is gathered from the Caltech-101 dataset. Then, a chaotic pattern generation using a one-dimensional discrete chaos mapping system is applied to generate unpredictable patterns to secure image encryption, followed by a chaotic model of information encryption used for securing the image through unpredictable transformations. Then, a Uniform Physics Informed Neural Network (UPINN) is adapted to produce pseudo-random encryption keys from chaotic parameters, providing an efficient and secure key-generation mechanism. Finally, Fully Dynamic Advanced Encryption Standard (FDAES) is utilized for lightweight encryption of image data. The proposed DLWIE-ECP-IoTD approach is implemented in Python. The proposed DLWIE-ECP-IoTD approach achieves 1.120 s of computational time and 0.03% mean squared error (MSE) with existing methods, such as a lightweight multichaos-based image encryption scheme for IoT networks (LWMC-IES-IoTN), a lightweight image encryption scheme for IoT environments and machine learning-driven robust S-box selection (LWIE-IoTE-ML-DRSBS), and a lightweight image encryption scheme for the safe Internet of Things using a novel chaotic technique (LWIE-NCT-SIoT).

物联网(IoT)的轻量级图像加密能够在连接设备之间安全传输图像数据,同时适应物联网系统有限的处理内存和功率。轻量级图像加密的一个普遍缺点是,它经常为了效率而牺牲安全强度,与更健壮的加密方法相比,它更容易受到攻击。在本文中,提出了一种轻量级图像加密算法的开发,以确保物联网设备的机密性和隐私性(dlwie - epc - iotd)。首先,从Caltech-101数据集中收集输入图像。然后,使用一维离散混沌映射系统生成混沌模式以生成不可预测的模式以保护图像加密,然后使用混沌信息加密模型通过不可预测的转换来保护图像。然后,采用统一物理信息神经网络(UPINN)从混沌参数生成伪随机加密密钥,提供了一种高效、安全的密钥生成机制。最后,采用全动态高级加密标准(FDAES)对图像数据进行轻量加密。提出的dlwie - epc - iotd方法是在Python中实现的。与现有方法相比,所提出的dlwie - epc - iotd方法的计算时间为1.120秒,均方误差(MSE)为0.03%。现有方法包括:用于物联网网络的基于多混沌的轻量级图像加密方案(lwmc - ie - iotn),用于物联网环境和机器学习驱动的鲁强s盒选择的轻量级图像加密方案(LWIE-IoTE-ML-DRSBS),以及使用新型混沌技术的安全物联网的轻量级图像加密方案(LWIE-NCT-SIoT)。
{"title":"Development of Lightweight Image Encryption Algorithm for Ensuring Confidentiality and Privacy in Internet of Things Devices","authors":"B. Maheswari,&nbsp;S. Ambika,&nbsp;T. P. Dayana Peter,&nbsp;R. Siva Subramanian","doi":"10.1002/dac.70389","DOIUrl":"https://doi.org/10.1002/dac.70389","url":null,"abstract":"<div>\u0000 \u0000 <p>Lightweight image encryption for the Internet of Things (IoT) enables secure image data transmission between connected devices while accommodating the limited processing memory and power of IoT systems. A general drawback of lightweight image encryption is that it often sacrifices security strength for efficiency, making it more vulnerable to attacks compared to more robust encryption methods. In this manuscript, the development of a lightweight image encryption algorithm for ensuring confidentiality and privacy in Internet of Things devices (DLWIE-ECP-IoTD) is proposed. Firstly, the input image is gathered from the Caltech-101 dataset. Then, a chaotic pattern generation using a one-dimensional discrete chaos mapping system is applied to generate unpredictable patterns to secure image encryption, followed by a chaotic model of information encryption used for securing the image through unpredictable transformations. Then, a Uniform Physics Informed Neural Network (UPINN) is adapted to produce pseudo-random encryption keys from chaotic parameters, providing an efficient and secure key-generation mechanism. Finally, Fully Dynamic Advanced Encryption Standard (FDAES) is utilized for lightweight encryption of image data. The proposed DLWIE-ECP-IoTD approach is implemented in Python. The proposed DLWIE-ECP-IoTD approach achieves 1.120 s of computational time and 0.03% mean squared error (MSE) with existing methods, such as a lightweight multichaos-based image encryption scheme for IoT networks (LWMC-IES-IoTN), a lightweight image encryption scheme for IoT environments and machine learning-driven robust S-box selection (LWIE-IoTE-ML-DRSBS), and a lightweight image encryption scheme for the safe Internet of Things using a novel chaotic technique (LWIE-NCT-SIoT).</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145987083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Adaptive and Resilient Trust Management Model for Social IoT: A Reinforcement Approach 社会物联网的适应性和弹性信任管理模型:一种强化方法
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-15 DOI: 10.1002/dac.70391
Santhosh Kumari, Dilip Kumar S M

The Social Internet of Things (SIoT) allows smart devices to form social relationships for efficient service discovery and resource sharing. However, trust management is challenged by attacks like ballot stuffing and bad mouthing, which manipulate trust scores through biased recommendations. Existing approaches often evaluate recommenders based on their service provider role, overlooking their behavior as recommenders due to data sparsity. This paper presents a resilient trust management model using reinforcement learning. It combines multiple trust features—direct trust, service reliability, social ties, recommendation benevolence, and referred trust—to compute trust-based rewards. A filtering mechanism is also introduced to detect dishonest recommenders and reduce the impact of biased feedback. Experimental results demonstrate strong resilience against Bad mouthing attack (BMA), ballot stuffing attack (BSA), and Sybil attacks compared to state-of-the-art models, along with faster convergence on both SIoT/IoT network and Epinions datasets. These findings confirm the model's effectiveness in preserving trust and resisting attacks in SIoT environments.

社交物联网(Social Internet of Things, SIoT)允许智能设备之间形成社交关系,实现高效的服务发现和资源共享。然而,信任管理受到诸如选票填塞和诽谤等攻击的挑战,这些攻击通过有偏见的推荐来操纵信任分数。现有的方法通常基于推荐人的服务提供者角色来评估推荐人,由于数据稀疏性而忽略了推荐人作为推荐人的行为。本文提出了一种基于强化学习的弹性信任管理模型。它结合了直接信任、服务可靠性、社会联系、推荐仁慈和推荐信任等多种信任特征,计算基于信任的奖励。还引入了过滤机制来检测不诚实的推荐人,并减少偏见反馈的影响。实验结果表明,与最先进的模型相比,对Bad mouth攻击(BMA),选票填充攻击(BSA)和Sybil攻击具有较强的弹性,并且在SIoT/IoT网络和Epinions数据集上具有更快的收敛速度。这些发现证实了该模型在SIoT环境中保持信任和抵抗攻击方面的有效性。
{"title":"An Adaptive and Resilient Trust Management Model for Social IoT: A Reinforcement Approach","authors":"Santhosh Kumari,&nbsp;Dilip Kumar S M","doi":"10.1002/dac.70391","DOIUrl":"https://doi.org/10.1002/dac.70391","url":null,"abstract":"<div>\u0000 \u0000 <p>The Social Internet of Things (SIoT) allows smart devices to form social relationships for efficient service discovery and resource sharing. However, trust management is challenged by attacks like ballot stuffing and bad mouthing, which manipulate trust scores through biased recommendations. Existing approaches often evaluate recommenders based on their service provider role, overlooking their behavior as recommenders due to data sparsity. This paper presents a resilient trust management model using reinforcement learning. It combines multiple trust features—direct trust, service reliability, social ties, recommendation benevolence, and referred trust—to compute trust-based rewards. A filtering mechanism is also introduced to detect dishonest recommenders and reduce the impact of biased feedback. Experimental results demonstrate strong resilience against Bad mouthing attack (BMA), ballot stuffing attack (BSA), and Sybil attacks compared to state-of-the-art models, along with faster convergence on both SIoT/IoT network and Epinions datasets. These findings confirm the model's effectiveness in preserving trust and resisting attacks in SIoT environments.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145987149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tunable Terahertz MIMO/Self-Diplexing Dielectric Resonator Antenna 可调谐太赫兹MIMO/自双工介质谐振器天线
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-15 DOI: 10.1002/dac.70414
Ravikanti Vinay kumar, Pinku Ranjan, Gaurav Kaushal

A tunable terahertz (THz) multi-input, multi-output (MIMO) dielectric resonator (DR) antenna (DRA) with the self-diplexing ability is implemented. Two separated annular disc DRs with the top coated graphene material connected with two individual ports. And, these graphene coating can be connected to the separate DC power supplies to find the tunable response through individual port. The narrow-intensified resonance spectrum of annular disc DRs operating with the HEM40δ$$ HE{M}_{40delta } $$ mode can provide the highly sensitive tunable MIMO response. This can also help in offering the tunable self-diplexing capability to antenna. The usage of DRs can provide the antenna with the high gain and efficiency in the THz frequency range. The antenna operation is validated using the circuit theory approach. Moreover, antenna operation is validated to work with the four ports and radiators, which can provide the operation with four port MIMO or self-multiplexing capability. The usage of array of the four radiators enhances the directivity significantly by reducing the minor lobe and confining the radiated power as in pencil beam. The multiport antenna operation is validated by calculating envelop correlation coefficient and diversity gain which remain around 0.06 and 10 dB in the passband, respectively. These prove the proposed antenna suitable for working in the multiport systems.

实现了一种具有自双工能力的可调谐太赫兹(THz)多输入多输出(MIMO)介质谐振器(DR)天线。两个分离的环形圆盘DRs,顶部涂覆石墨烯材料,连接两个单独的端口。并且,这些石墨烯涂层可以连接到单独的直流电源,通过单独的端口找到可调谐的响应。在HE m40 δ $$ HE{M}_{40delta } $$模式下工作的环形圆盘dr窄增强共振谱可以提供高灵敏度的可调谐MIMO响应。这也有助于为天线提供可调谐的自双工能力。在太赫兹频率范围内,DRs的使用可以为天线提供高增益和高效率。利用电路理论方法对天线的工作进行了验证。此外,验证了天线操作与四个端口和散热器一起工作,可以提供四端口MIMO或自复用能力。四个辐射体阵列的使用通过减少小瓣和限制铅笔波束的辐射功率,显著提高了指向性。通过计算包络相关系数和分集增益分别在0.06和10 dB左右,验证了多端口天线的工作性能。结果表明,该天线适用于多端口系统。
{"title":"Tunable Terahertz MIMO/Self-Diplexing Dielectric Resonator Antenna","authors":"Ravikanti Vinay kumar,&nbsp;Pinku Ranjan,&nbsp;Gaurav Kaushal","doi":"10.1002/dac.70414","DOIUrl":"https://doi.org/10.1002/dac.70414","url":null,"abstract":"<div>\u0000 \u0000 <p>A tunable terahertz (THz) multi-input, multi-output (MIMO) dielectric resonator (DR) antenna (DRA) with the self-diplexing ability is implemented. Two separated annular disc DRs with the top coated graphene material connected with two individual ports. And, these graphene coating can be connected to the separate DC power supplies to find the tunable response through individual port. The narrow-intensified resonance spectrum of annular disc DRs operating with the <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>HE</mi>\u0000 <msub>\u0000 <mi>M</mi>\u0000 <mrow>\u0000 <mn>40</mn>\u0000 <mi>δ</mi>\u0000 </mrow>\u0000 </msub>\u0000 </mrow>\u0000 <annotation>$$ HE{M}_{40delta } $$</annotation>\u0000 </semantics></math> mode can provide the highly sensitive tunable MIMO response. This can also help in offering the tunable self-diplexing capability to antenna. The usage of DRs can provide the antenna with the high gain and efficiency in the THz frequency range. The antenna operation is validated using the circuit theory approach. Moreover, antenna operation is validated to work with the four ports and radiators, which can provide the operation with four port MIMO or self-multiplexing capability. The usage of array of the four radiators enhances the directivity significantly by reducing the minor lobe and confining the radiated power as in pencil beam. The multiport antenna operation is validated by calculating envelop correlation coefficient and diversity gain which remain around 0.06 and 10 dB in the passband, respectively. These prove the proposed antenna suitable for working in the multiport systems.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145983810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Traffic Prediction Using Integrated Deep Graph Neural Network Based on Big Data 基于大数据的集成深度图神经网络网络流量预测
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-15 DOI: 10.1002/dac.70390
Gangadhar Yalaga, S. Lokesh

Big data are difficult to process because of its volume and frequent updates. Big data are used to predict network traffic, which allows for further analysis at the application level. Network traffic prediction is essential for effective network planning and management. Deep learning (DL) has emerged as an effective way of capturing complex spatiotemporal relationships, with graph neural network (GNN) models being especially popular in this area. Nonetheless, conventional GNN techniques have inefficiencies in long-term forecasting in network traffic prediction, resulting in suboptimal predictive performance. To overcome the difficulties in forecasting network traffic, an integrated deep graph neural network (DeepGNN) model is presented in this work. First, create an integrated learning module that takes advantage of spatial correlation. Furthermore, sequence convolutional neural networks (sequence convolutional neural network [CNN]) are used for nonlinear dependencies, whereas attention mechanism incorporation is designed for heterogeneous features. In this study, integrated DeepGNN is evaluated on two network traffic datasets, Milan and Trentino. Three services, SMS, call, and internet, are also included for evaluation services in the first dataset and cumulative services in the second. Integrated DeepGNN is compared with the various existing models considering mean square error (MSE), root mean square error (RMSE), and mean absolute error (MAE). The proposed technique achieves a 4.923 MAE rate, which is lower than other techniques. The performance of the proposed technique is analyzed and compared with some related techniques to describe the superiority of the proposed model.

由于数据量大且更新频繁,大数据很难处理。大数据用于预测网络流量,从而允许在应用程序级别进行进一步分析。网络流量预测是有效的网络规划和管理的基础。深度学习(DL)已成为捕获复杂时空关系的有效方法,其中图神经网络(GNN)模型在该领域尤为流行。然而,在网络流量预测中,传统的GNN技术在长期预测方面效率较低,导致预测性能不理想。为了克服网络流量预测的困难,本文提出了一种集成深度图神经网络(DeepGNN)模型。首先,创建一个利用空间相关性的集成学习模块。此外,序列卷积神经网络(sequence convolutional neural network [CNN])用于处理非线性依赖关系,而注意力机制的整合则是针对异构特征设计的。在本研究中,集成DeepGNN在米兰和特伦蒂诺两个网络流量数据集上进行了评估。短信、电话和互联网这三种服务也被包括在第一个数据集中用于评估服务,第二个数据集中用于累积服务。考虑均方误差(MSE)、均方根误差(RMSE)和平均绝对误差(MAE),将集成DeepGNN与现有的各种模型进行比较。该技术的MAE率为4.923,低于其他技术。通过对该方法的性能分析,并与一些相关技术进行了比较,说明了该模型的优越性。
{"title":"Network Traffic Prediction Using Integrated Deep Graph Neural Network Based on Big Data","authors":"Gangadhar Yalaga,&nbsp;S. Lokesh","doi":"10.1002/dac.70390","DOIUrl":"https://doi.org/10.1002/dac.70390","url":null,"abstract":"<div>\u0000 \u0000 <p>Big data are difficult to process because of its volume and frequent updates. Big data are used to predict network traffic, which allows for further analysis at the application level. Network traffic prediction is essential for effective network planning and management. Deep learning (DL) has emerged as an effective way of capturing complex spatiotemporal relationships, with graph neural network (GNN) models being especially popular in this area. Nonetheless, conventional GNN techniques have inefficiencies in long-term forecasting in network traffic prediction, resulting in suboptimal predictive performance. To overcome the difficulties in forecasting network traffic, an integrated deep graph neural network (DeepGNN) model is presented in this work. First, create an integrated learning module that takes advantage of spatial correlation. Furthermore, sequence convolutional neural networks (sequence convolutional neural network [CNN]) are used for nonlinear dependencies, whereas attention mechanism incorporation is designed for heterogeneous features. In this study, integrated DeepGNN is evaluated on two network traffic datasets, Milan and Trentino. Three services, SMS, call, and internet, are also included for evaluation services in the first dataset and cumulative services in the second. Integrated DeepGNN is compared with the various existing models considering mean square error (MSE), root mean square error (RMSE), and mean absolute error (MAE). The proposed technique achieves a 4.923 MAE rate, which is lower than other techniques. The performance of the proposed technique is analyzed and compared with some related techniques to describe the superiority of the proposed model.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145987148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Energy-Efficient and Delay-Sensitive Routing for Mobile Wireless Sensor Networks Using an Optimized Deep-Learning Network 基于优化深度学习网络的移动无线传感器网络节能和延迟敏感路由
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-15 DOI: 10.1002/dac.70374
R. Shilpa, D. J. Chaithanya, M. N. Geetha, S. Rajini, C. Lokesh

Traditional Mobile Wireless Sensor Networks (MWSNs) often use mobile sinks to mitigate issues like energy holes. However, mobile sinks introduce new challenges, such as significant delays and buffer overflows due to fixed trajectories and variable moving speeds. These issues are particularly problematic for delay-sensitive applications, as most existing researches either focus on delay-tolerant scenarios or rely on energy-intensive greedy data collection methods. This research proposes an improved deep learning model with STGRN for delay-sensitive, energy-efficient routing and mobile sink prediction in MWSNs. STGRN-HRFO addresses mobility challenges in MWSNs through optimized routing, energy-efficient transmission, adaptive resource allocation, predictive mobility models, dynamic topology adjustments, and machine learning, enhancing stability, reducing energy consumption, and improving performance. Based on the projections from STGRN, an effective cluster-based routing system is implemented. A Hybrid Red-billed Frilled lizard magpie Optimizer (HRFO) is introduced to optimize the selection of cluster heads and improve routing efficiency. Significant gains are made using the STGRN-HRFO framework, which reduces the end-to-end path's hop count to 0.2 s, minimizes network energy usage to 3.6 J, and boosts throughput to 90%. Additionally, the energy consumed per packet is minimized to 2.2 mJ. Comparative analysis demonstrates that the STGRN-HRFO protocol effectively enhances network performance, ensuring low latency, high packet delivery ratios, and efficient energy use, particularly in real-world scenarios with complex optimization needs.

传统的移动无线传感器网络(mwsn)通常使用移动接收器来缓解能量空洞等问题。然而,移动汇带来了新的挑战,例如由于固定的轨迹和可变的移动速度而导致的显著延迟和缓冲区溢出。这些问题对于延迟敏感的应用来说尤其严重,因为大多数现有的研究要么集中在延迟容忍的场景上,要么依赖于能量密集的贪婪数据收集方法。本研究提出了一种改进的STGRN深度学习模型,用于MWSNs中延迟敏感、节能路由和移动sink预测。STGRN-HRFO通过优化路由、节能传输、自适应资源分配、预测移动模型、动态拓扑调整和机器学习等方法解决了mwsn的移动性挑战,增强了稳定性,降低了能耗,提高了性能。基于STGRN的投影,实现了一种有效的基于集群的路由系统。为了优化簇头选择,提高路由效率,提出了一种混合红嘴壁虎喜鹊优化器(HRFO)。使用STGRN-HRFO框架可以获得显著的收益,它将端到端路径的跳数减少到0.2 s,将网络能耗减少到3.6 J,并将吞吐量提高到90%。此外,每包消耗的能量被最小化到2.2兆焦耳。对比分析表明,STGRN-HRFO协议有效地提高了网络性能,确保了低延迟、高分组分发率和高效的能源利用,特别是在具有复杂优化需求的现实场景中。
{"title":"An Energy-Efficient and Delay-Sensitive Routing for Mobile Wireless Sensor Networks Using an Optimized Deep-Learning Network","authors":"R. Shilpa,&nbsp;D. J. Chaithanya,&nbsp;M. N. Geetha,&nbsp;S. Rajini,&nbsp;C. Lokesh","doi":"10.1002/dac.70374","DOIUrl":"https://doi.org/10.1002/dac.70374","url":null,"abstract":"<div>\u0000 \u0000 <p>Traditional Mobile Wireless Sensor Networks (MWSNs) often use mobile sinks to mitigate issues like energy holes. However, mobile sinks introduce new challenges, such as significant delays and buffer overflows due to fixed trajectories and variable moving speeds. These issues are particularly problematic for delay-sensitive applications, as most existing researches either focus on delay-tolerant scenarios or rely on energy-intensive greedy data collection methods. This research proposes an improved deep learning model with STGRN for delay-sensitive, energy-efficient routing and mobile sink prediction in MWSNs. STGRN-HRFO addresses mobility challenges in MWSNs through optimized routing, energy-efficient transmission, adaptive resource allocation, predictive mobility models, dynamic topology adjustments, and machine learning, enhancing stability, reducing energy consumption, and improving performance. Based on the projections from STGRN, an effective cluster-based routing system is implemented. A Hybrid Red-billed Frilled lizard magpie Optimizer (HRFO) is introduced to optimize the selection of cluster heads and improve routing efficiency. Significant gains are made using the STGRN-HRFO framework, which reduces the end-to-end path's hop count to 0.2 s, minimizes network energy usage to 3.6 J, and boosts throughput to 90%. Additionally, the energy consumed per packet is minimized to 2.2 mJ. Comparative analysis demonstrates that the STGRN-HRFO protocol effectively enhances network performance, ensuring low latency, high packet delivery ratios, and efficient energy use, particularly in real-world scenarios with complex optimization needs.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145987151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Wideband and High Gain Cross-Slot Antenna Using Partially Reflecting Surface 部分反射面交叉槽宽带高增益天线
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-14 DOI: 10.1002/dac.70410
Venkataswamy Suryapaga, Vikas V. Khairnar
<div> <p>This paper presents a wideband, high gain Fabry-Perot cavity antenna operating at 3.5 GHz. The antenna utilizes a cross-slot as the main radiating element, along with an artificial magnetic conductor (AMC) layer and a partially reflecting surface (PRS) layer. The integration of a <span></span><math> <semantics> <mrow> <mn>9</mn> <mo>×</mo> <mn>9</mn> </mrow> <annotation>$$ 9times 9 $$</annotation> </semantics></math> AMC layer beneath the cross-slot antenna facilitates high gain and unidirectional radiation characteristics. Additionally, a <span></span><math> <semantics> <mrow> <mn>4</mn> <mo>×</mo> <mn>4</mn> </mrow> <annotation>$$ 4times 4 $$</annotation> </semantics></math> PRS layer is positioned in front of the antenna to further enhance both bandwidth and gain. The proposed antenna design achieves a <span></span><math> <semantics> <mrow> <mo>−</mo> </mrow> <annotation>$$ - $$</annotation> </semantics></math>10 dB impedance bandwidth ranging from 3.02 to 3.89 GHz (25.43%) with a peak gain of 9.56 dBi. Overall size of the antenna is <span></span><math> <semantics> <mrow> <mn>0</mn> <mo>.</mo> <mn>81</mn> <msub> <mrow> <mi>λ</mi> </mrow> <mrow> <mn>0</mn> </mrow> </msub> <mo>×</mo> <mn>0</mn> <mo>.</mo> <mn>81</mn> <msub> <mrow> <mi>λ</mi> </mrow> <mrow> <mn>0</mn> </mrow> </msub> <mo>×</mo> <mn>0</mn> <mo>.</mo> <mn>55</mn> <msub> <mrow> <mi>λ</mi> </mrow> <mrow> <mn>0</mn> </mrow> </msub> </mrow> <annotation>$$ 0.81{lambda}_0times 0.81{lambda}_0times 0.55{lambda}_0 $$</annotation> </semantics></math>, where <span></span><math> <semantics> <mrow> <msub> <mrow> <mi>λ</mi> </mrow> <mrow> <mn>0</mn> </mrow> </msub> </mrow>
本文提出了一种工作频率为3.5 GHz的宽带高增益法布里-珀罗腔天线。该天线采用交叉槽作为主要辐射元件,以及人工磁导体(AMC)层和部分反射表面(PRS)层。交叉槽天线下方集成了9 × 9 $$ 9times 9 $$ AMC层,实现了高增益和单向辐射特性。此外,4 × 4 $$ 4times 4 $$ PRS层位于天线前面,以进一步提高带宽和增益。所提出的天线设计实现了−$$ - $$ 10 dB阻抗带宽范围为3.02 ~ 3.89 GHz (25.43%) with a peak gain of 9.56 dBi. Overall size of the antenna is 0 . 81 λ 0 × 0 . 81 λ 0 × 0 . 55 λ 0 $$ 0.81{lambda}_0times 0.81{lambda}_0times 0.55{lambda}_0 $$ , where λ 0 $$ {lambda}_0 $$ represents free space wavelength at an operating frequency of 3.5 GHz. The simulated and measured results are found to be in good agreement.
{"title":"A Wideband and High Gain Cross-Slot Antenna Using Partially Reflecting Surface","authors":"Venkataswamy Suryapaga,&nbsp;Vikas V. Khairnar","doi":"10.1002/dac.70410","DOIUrl":"https://doi.org/10.1002/dac.70410","url":null,"abstract":"&lt;div&gt;\u0000 \u0000 &lt;p&gt;This paper presents a wideband, high gain Fabry-Perot cavity antenna operating at 3.5 GHz. The antenna utilizes a cross-slot as the main radiating element, along with an artificial magnetic conductor (AMC) layer and a partially reflecting surface (PRS) layer. The integration of a &lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mn&gt;9&lt;/mn&gt;\u0000 &lt;mo&gt;×&lt;/mo&gt;\u0000 &lt;mn&gt;9&lt;/mn&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ 9times 9 $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt; AMC layer beneath the cross-slot antenna facilitates high gain and unidirectional radiation characteristics. Additionally, a &lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mn&gt;4&lt;/mn&gt;\u0000 &lt;mo&gt;×&lt;/mo&gt;\u0000 &lt;mn&gt;4&lt;/mn&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ 4times 4 $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt; PRS layer is positioned in front of the antenna to further enhance both bandwidth and gain. The proposed antenna design achieves a &lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mo&gt;−&lt;/mo&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ - $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt;10 dB impedance bandwidth ranging from 3.02 to 3.89 GHz (25.43%) with a peak gain of 9.56 dBi. Overall size of the antenna is &lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mn&gt;0&lt;/mn&gt;\u0000 &lt;mo&gt;.&lt;/mo&gt;\u0000 &lt;mn&gt;81&lt;/mn&gt;\u0000 &lt;msub&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;λ&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mn&gt;0&lt;/mn&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;/msub&gt;\u0000 &lt;mo&gt;×&lt;/mo&gt;\u0000 &lt;mn&gt;0&lt;/mn&gt;\u0000 &lt;mo&gt;.&lt;/mo&gt;\u0000 &lt;mn&gt;81&lt;/mn&gt;\u0000 &lt;msub&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;λ&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mn&gt;0&lt;/mn&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;/msub&gt;\u0000 &lt;mo&gt;×&lt;/mo&gt;\u0000 &lt;mn&gt;0&lt;/mn&gt;\u0000 &lt;mo&gt;.&lt;/mo&gt;\u0000 &lt;mn&gt;55&lt;/mn&gt;\u0000 &lt;msub&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;λ&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mn&gt;0&lt;/mn&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;/msub&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ 0.81{lambda}_0times 0.81{lambda}_0times 0.55{lambda}_0 $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt;, where &lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;msub&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;λ&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mn&gt;0&lt;/mn&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;/msub&gt;\u0000 &lt;/mrow&gt;\u0000 ","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145987082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Xception Convolutional Scaling Wide Residual Network: A Robust Anonymization Framework for Location Privacy in Peer-to-Peer Systems 异常卷积扩展宽残差网络:点对点系统中位置隐私的鲁棒匿名化框架
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-13 DOI: 10.1002/dac.70372
Jeya Rathinam Jeasiah, Rathna R

Location-based services (LBS) offer useful information based on a user's location, but they raise privacy risks since sensitive data can be misused by third parties. Traditional peer-to-peer (P2P) systems try to protect privacy but struggle to balance anonymization with service accuracy, and the problem worsens as the number of users and queries increases. These issues are overcome by introducing a novel Xception Convolutional Scaling Wide Residual Network (XCovSWideR-Net) model to improve location privacy in P2P systems through anonymization. The anonymization process involves the user, an anonymization server, and the LBS server. The anonymizer first hides the user's personal and location details and then adds dummy locations to mask the real query. Privacy is further improved using the XCovSWideR-Net model, which combines Xception Convolutional Network (XCovNet) and Scaling Wide Residual Network (SwideRes-Net). The anonymized query is sent to the LBS server, which returns the requested information to the anonymization server, and finally to the user without revealing their actual location. The XCovWideR-Net model achieved maximum location privacy of 0.967, location preservation of 0.974, anonymous entropy of 8.268, and a minimum computation time of 2.480 s for 800 users in Scenario 3. These findings highlight the ability of the proposed method to effectively balance privacy, accuracy, and efficiency, providing a promising solution for secure and scalable LBS applications.

基于位置的服务(LBS)根据用户的位置提供有用的信息,但它们增加了隐私风险,因为敏感数据可能被第三方滥用。传统的点对点(P2P)系统试图保护隐私,但难以平衡匿名化和服务准确性,随着用户和查询数量的增加,问题变得更糟。通过引入一种新的异常卷积扩展宽剩余网络(xcovspider - net)模型来克服这些问题,通过匿名化来改善P2P系统中的位置隐私。匿名化过程包括用户、匿名化服务器和LBS服务器。匿名器首先隐藏用户的个人和位置详细信息,然后添加虚拟位置来掩盖真实的查询。xcovwide - net模型结合了异常卷积网络(XCovNet)和扩展宽残差网络(SwideRes-Net),进一步提高了隐私性。匿名查询被发送到LBS服务器,后者将请求的信息返回给匿名服务器,并最终返回给用户,而不会泄露用户的实际位置。在场景3中,对于800个用户,xcoverwide - net模型的最大位置隐私性为0.967,位置保存性为0.974,匿名熵为8.268,最小计算时间为2.480 s。这些发现强调了所提出的方法有效平衡隐私、准确性和效率的能力,为安全和可扩展的LBS应用提供了一个有前途的解决方案。
{"title":"Xception Convolutional Scaling Wide Residual Network: A Robust Anonymization Framework for Location Privacy in Peer-to-Peer Systems","authors":"Jeya Rathinam Jeasiah,&nbsp;Rathna R","doi":"10.1002/dac.70372","DOIUrl":"https://doi.org/10.1002/dac.70372","url":null,"abstract":"<div>\u0000 \u0000 <p>Location-based services (LBS) offer useful information based on a user's location, but they raise privacy risks since sensitive data can be misused by third parties. Traditional peer-to-peer (P2P) systems try to protect privacy but struggle to balance anonymization with service accuracy, and the problem worsens as the number of users and queries increases. These issues are overcome by introducing a novel Xception Convolutional Scaling Wide Residual Network (XCovSWideR-Net) model to improve location privacy in P2P systems through anonymization. The anonymization process involves the user, an anonymization server, and the LBS server. The anonymizer first hides the user's personal and location details and then adds dummy locations to mask the real query. Privacy is further improved using the XCovSWideR-Net model, which combines Xception Convolutional Network (XCovNet) and Scaling Wide Residual Network (SwideRes-Net). The anonymized query is sent to the LBS server, which returns the requested information to the anonymization server, and finally to the user without revealing their actual location. The XCovWideR-Net model achieved maximum location privacy of 0.967, location preservation of 0.974, anonymous entropy of 8.268, and a minimum computation time of 2.480 s for 800 users in Scenario 3. These findings highlight the ability of the proposed method to effectively balance privacy, accuracy, and efficiency, providing a promising solution for secure and scalable LBS applications.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 3","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146002153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge AI and TinyML for Enhancing MAC Protocols: A New Paradigm for Wireless Sensor Networks in IIoT 边缘AI和TinyML用于增强MAC协议:工业物联网中无线传感器网络的新范式
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-11 DOI: 10.1002/dac.70403
Amine Zila, Youssef Mouzouna, Abderrahmane Ouchatti, Ikram Daanoune

The industrial Internet of Things (IIoT) depends on wireless sensor networks (WSNs) to enable low-power, low-data-rate communication in resource-limited settings. While the IEEE 802.15.4 standard provides the communication foundation, its medium access control (MAC) protocols face challenges including energy consumption, latency, scalability, and adaptability. Traditional MAC protocols cannot keep up with the demands of IIoT networks as the number of connected devices continues to increase. Therefore, edge artificial intelligence (Edge AI) and tiny machine learning (TinyML) represent emerging approaches that show potential for improving the performance of traditional MAC protocols directly on IIoT devices. Edge AI and TinyML allow intelligent decision-making at the edge, which enables efficient data processing and adaptability to the environment without the need for cloud infrastructure, which may reduce latency and energy consumption. This paper systematically examines the emerging paradigm of combining Edge AI and TinyML to improve MAC protocols for WSNs in IIoT networks. We explore advanced machine learning (ML) methods applicable to resource-limited devices, and we investigate how these methods can improve key performance metrics for MAC protocols, including energy efficiency, throughput, and network lifetime. We also discuss the challenges and limitations of applying AI solutions in WSNs, including computational constraints, data scarcity, and model scalability. Finally, we propose potential future research directions to improve the application of AI and ML techniques to develop more efficient, adaptive, and intelligent MAC protocols for future IIoT networks.

工业物联网(IIoT)依靠无线传感器网络(wsn)在资源有限的环境中实现低功耗、低数据速率的通信。虽然IEEE 802.15.4标准提供了通信基础,但其介质访问控制(MAC)协议面临着能耗、延迟、可伸缩性和适应性等挑战。随着连接设备数量的不断增加,传统的MAC协议已经无法满足工业物联网的需求。因此,边缘人工智能(edge AI)和微型机器学习(TinyML)代表了新兴的方法,显示出直接在工业物联网设备上提高传统MAC协议性能的潜力。边缘AI和TinyML允许在边缘进行智能决策,从而实现高效的数据处理和对环境的适应性,而不需要云基础设施,这可能会减少延迟和能耗。本文系统地研究了结合Edge AI和TinyML的新兴范例,以改进IIoT网络中wsn的MAC协议。我们探索了适用于资源有限设备的先进机器学习(ML)方法,并研究了这些方法如何改善MAC协议的关键性能指标,包括能源效率、吞吐量和网络寿命。我们还讨论了在wsn中应用AI解决方案的挑战和限制,包括计算约束、数据稀缺性和模型可扩展性。最后,我们提出了未来潜在的研究方向,以改进AI和ML技术的应用,为未来的IIoT网络开发更高效、自适应和智能的MAC协议。
{"title":"Edge AI and TinyML for Enhancing MAC Protocols: A New Paradigm for Wireless Sensor Networks in IIoT","authors":"Amine Zila,&nbsp;Youssef Mouzouna,&nbsp;Abderrahmane Ouchatti,&nbsp;Ikram Daanoune","doi":"10.1002/dac.70403","DOIUrl":"https://doi.org/10.1002/dac.70403","url":null,"abstract":"<div>\u0000 \u0000 <p>The industrial Internet of Things (IIoT) depends on wireless sensor networks (WSNs) to enable low-power, low-data-rate communication in resource-limited settings. While the IEEE 802.15.4 standard provides the communication foundation, its medium access control (MAC) protocols face challenges including energy consumption, latency, scalability, and adaptability. Traditional MAC protocols cannot keep up with the demands of IIoT networks as the number of connected devices continues to increase. Therefore, edge artificial intelligence (Edge AI) and tiny machine learning (TinyML) represent emerging approaches that show potential for improving the performance of traditional MAC protocols directly on IIoT devices. Edge AI and TinyML allow intelligent decision-making at the edge, which enables efficient data processing and adaptability to the environment without the need for cloud infrastructure, which may reduce latency and energy consumption. This paper systematically examines the emerging paradigm of combining Edge AI and TinyML to improve MAC protocols for WSNs in IIoT networks. We explore advanced machine learning (ML) methods applicable to resource-limited devices, and we investigate how these methods can improve key performance metrics for MAC protocols, including energy efficiency, throughput, and network lifetime. We also discuss the challenges and limitations of applying AI solutions in WSNs, including computational constraints, data scarcity, and model scalability. Finally, we propose potential future research directions to improve the application of AI and ML techniques to develop more efficient, adaptive, and intelligent MAC protocols for future IIoT networks.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 3","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145964064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Authentication and Task Offloading Model Using Blockchain-Assisted Hybrid Serial Learning in Multiaccess Edge Computing for Vehicular Ad Hoc Networks Sector 基于区块链辅助混合串行学习的多访问边缘计算安全认证和任务卸载模型
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-11 DOI: 10.1002/dac.70382
Jafar A. Alzubi, Nageswara Rao Lavuri, Krishna Dharavath, Nagarjuna Nallameti, Sumanth Venugopal, Preethi Palanisamy

The intelligent transportation system (ITS) is enabled by the vehicular ad hoc networks (VANETs), but the security threats, such as node impersonation, node tampering, and eavesdropping, are the greatest challenges and cause security concerns within the system. The large-scale vehicular environment is not effectively handled by the previous static and centralized security approaches, which can greatly increase the latency and data integrity problems within the network. Thus, this research proposes a deep learning–assisted blockchain approach for enabling the decentralized, reliable, and secure communication in the VANET. The main contribution of the research is to perform secure authentication and task offloading to enable secure task offloading within the VANET and to guarantee communication performance with minimum energy consumption and delays. First, the data confidentiality, privacy of the task offloading, authentication, and integrity are achieved by introducing blockchain technology. Second, the node authentication is performed using adaptive and attention-based hybrid serial learning (AAHSL), which is developed with the combination of a deep belief network (DBN) and temporal convolution network (TCN). After authenticating the data within the nodes, the adaptive deep reinforcement learning (ADRL)–based task offloading is proposed for reducing the task completion time within the network. In both models, the parameters are tuned using the pattern improvement parameter–based poor and rich optimization algorithm (PIP-PROA). The experimental results demonstrate that the proposed approach achieves an FNR of about 3.46% during the authentication process, and the reward score achieved by the designed model during the task offloading process is 9.22. Thus, the effectiveness of the suggested model is confirmed by the experimental analysis.

智能交通系统(ITS)是由车辆自组织网络(vanet)实现的,但安全威胁,如节点模拟、节点篡改和窃听,是最大的挑战,并引起系统内的安全问题。以往的静态和集中式安全方法无法有效处理大规模的车辆环境,从而大大增加了网络内的延迟和数据完整性问题。因此,本研究提出了一种深度学习辅助区块链方法,以实现VANET中分散、可靠和安全的通信。该研究的主要贡献是执行安全认证和任务卸载,以实现VANET内的安全任务卸载,并以最小的能耗和延迟保证通信性能。首先,通过引入区块链技术实现了数据机密性、任务卸载的私密性、身份验证和完整性。其次,采用深度信念网络(DBN)和时间卷积网络(TCN)相结合的自适应和基于注意力的混合串行学习(AAHSL)进行节点认证。在对节点内的数据进行认证后,提出了基于自适应深度强化学习(ADRL)的任务卸载方法,以缩短网络内的任务完成时间。在这两个模型中,使用基于模式改进参数的贫和富优化算法(PIP-PROA)对参数进行调优。实验结果表明,该方法在认证过程中的FNR约为3.46%,在任务卸载过程中所设计的模型获得的奖励分数为9.22。实验分析验证了该模型的有效性。
{"title":"A Secure Authentication and Task Offloading Model Using Blockchain-Assisted Hybrid Serial Learning in Multiaccess Edge Computing for Vehicular Ad Hoc Networks Sector","authors":"Jafar A. Alzubi,&nbsp;Nageswara Rao Lavuri,&nbsp;Krishna Dharavath,&nbsp;Nagarjuna Nallameti,&nbsp;Sumanth Venugopal,&nbsp;Preethi Palanisamy","doi":"10.1002/dac.70382","DOIUrl":"https://doi.org/10.1002/dac.70382","url":null,"abstract":"<div>\u0000 \u0000 <p>The intelligent transportation system (ITS) is enabled by the vehicular ad hoc networks (VANETs), but the security threats, such as node impersonation, node tampering, and eavesdropping, are the greatest challenges and cause security concerns within the system. The large-scale vehicular environment is not effectively handled by the previous static and centralized security approaches, which can greatly increase the latency and data integrity problems within the network. Thus, this research proposes a deep learning–assisted blockchain approach for enabling the decentralized, reliable, and secure communication in the VANET. The main contribution of the research is to perform secure authentication and task offloading to enable secure task offloading within the VANET and to guarantee communication performance with minimum energy consumption and delays. First, the data confidentiality, privacy of the task offloading, authentication, and integrity are achieved by introducing blockchain technology. Second, the node authentication is performed using adaptive and attention-based hybrid serial learning (AAHSL), which is developed with the combination of a deep belief network (DBN) and temporal convolution network (TCN). After authenticating the data within the nodes, the adaptive deep reinforcement learning (ADRL)–based task offloading is proposed for reducing the task completion time within the network. In both models, the parameters are tuned using the pattern improvement parameter–based poor and rich optimization algorithm (PIP-PROA). The experimental results demonstrate that the proposed approach achieves an FNR of about 3.46% during the authentication process, and the reward score achieved by the designed model during the task offloading process is 9.22. Thus, the effectiveness of the suggested model is confirmed by the experimental analysis.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 3","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145969961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Directional Data Routing Strategies Toward Energy Conservation in Diverse Sensor Networks 面向不同传感器网络节能的定向数据路由策略
IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2026-01-09 DOI: 10.1002/dac.70387
Usha Bala Varanasi, K. P. Rama Prabha, T. Manoj Kumar, Beulah Jackson

Energy efficiency is one of the main factors that determine the durability and dependability of WSNs. The performance and lifespan of a network are usually limited by the small battery capacity of the sensor nodes. Traditional cluster–based routing protocols enhance energy efficiency by creating clusters and sending data to the base station (BS) through the group-head nodes. Nevertheless, if a node that is between the BS and its cluster head sends data through the cluster head instead of directly to the BS, redundant reverse transmission can happen, which results in unnecessary energy dissipation. Hence, a Path Direction-Sensitive Routing Protocol (PDSRP) is introduced to resolve this problem. It uses signal strength indicators to locate the best transmission paths dynamically. The new protocol is instrumental in equalizing energy consumption, cutting down on reverse communication, and improving the general routing efficiency level. According to simulation results, PDSRP is able to considerably reduce power wastage and increase the longevity of the network; thus, it is a viable solution for IoT-based WSN applications that is scalable and energy-efficient.

能源效率是决定无线传感器网络耐久性和可靠性的主要因素之一。网络的性能和寿命通常受到传感器节点电池容量小的限制。传统的基于集群的路由协议通过创建集群并通过组头节点向基站(BS)发送数据来提高能源效率。但是,如果在BS和簇头之间的节点不直接向BS发送数据,而是通过簇头发送数据,就会产生冗余的反向传输,造成不必要的能量损耗。因此,引入了路径方向敏感路由协议(PDSRP)来解决这个问题。利用信号强度指标动态定位最佳传输路径。新协议在均衡能耗、减少反向通信和提高总体路由效率水平方面具有重要意义。仿真结果表明,PDSRP能够显著降低功耗,延长网络寿命;因此,它是基于物联网的WSN应用的可行解决方案,具有可扩展性和高能效。
{"title":"Directional Data Routing Strategies Toward Energy Conservation in Diverse Sensor Networks","authors":"Usha Bala Varanasi,&nbsp;K. P. Rama Prabha,&nbsp;T. Manoj Kumar,&nbsp;Beulah Jackson","doi":"10.1002/dac.70387","DOIUrl":"https://doi.org/10.1002/dac.70387","url":null,"abstract":"<div>\u0000 \u0000 <p>Energy efficiency is one of the main factors that determine the durability and dependability of WSNs. The performance and lifespan of a network are usually limited by the small battery capacity of the sensor nodes. Traditional cluster–based routing protocols enhance energy efficiency by creating clusters and sending data to the base station (BS) through the group-head nodes. Nevertheless, if a node that is between the BS and its cluster head sends data through the cluster head instead of directly to the BS, redundant reverse transmission can happen, which results in unnecessary energy dissipation. Hence, a Path Direction-Sensitive Routing Protocol (PDSRP) is introduced to resolve this problem. It uses signal strength indicators to locate the best transmission paths dynamically. The new protocol is instrumental in equalizing energy consumption, cutting down on reverse communication, and improving the general routing efficiency level. According to simulation results, PDSRP is able to considerably reduce power wastage and increase the longevity of the network; thus, it is a viable solution for IoT-based WSN applications that is scalable and energy-efficient.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"39 3","pages":""},"PeriodicalIF":1.8,"publicationDate":"2026-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145986879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Communication Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1