SummaryIn this paper, a non‐orthogonal multiple access (NOMA)‐based precoded quadrature spatial modulation (PQSM) technique (NOMA‐PQSM) has been proposed for the downlink scenario. In NOMA‐PQSM, two intended receiving antennas are activated at any time instant. One antenna is activated for the in‐phase component of the transmitted signal, and another one is activated for the quadrature phase component, on the basis of data bits. NOMA‐PQSM provides benefits like improved spatial diversity and spectral efficiency in comparison with spatial modulation. This work uses zero forcing (ZF) precoding over downlink flat fading Rayleigh multiple input multiple output (MIMO) channels, to limit the channel's deteriorating effect on transmitted signal, assuming perfect channel state information (CSI) at the transmitter. A low complexity receiver based on the successive interference cancellation is used. An expression for the upper bound of average bit error probability is derived. Moreover, the expressions for the sum mutual information of users and its lower bound are also derived. The proposed scheme is compared with the preprocessing aided spatial modulation (PSM)‐based counterpart. Monte Carlo simulations reveal that the NOMA‐PQSM scheme outperforms its orthogonal counterpart and the PSM scheme.
{"title":"NOMA‐based precoded quadrature spatial modulation in multiuser MIMO downlink transmission over correlated channel","authors":"Shekhar Pratap Singh, Pyari Mohan Pradhan","doi":"10.1002/dac.5931","DOIUrl":"https://doi.org/10.1002/dac.5931","url":null,"abstract":"SummaryIn this paper, a non‐orthogonal multiple access (NOMA)‐based precoded quadrature spatial modulation (PQSM) technique (NOMA‐PQSM) has been proposed for the downlink scenario. In NOMA‐PQSM, two intended receiving antennas are activated at any time instant. One antenna is activated for the in‐phase component of the transmitted signal, and another one is activated for the quadrature phase component, on the basis of data bits. NOMA‐PQSM provides benefits like improved spatial diversity and spectral efficiency in comparison with spatial modulation. This work uses zero forcing (ZF) precoding over downlink flat fading Rayleigh multiple input multiple output (MIMO) channels, to limit the channel's deteriorating effect on transmitted signal, assuming perfect channel state information (CSI) at the transmitter. A low complexity receiver based on the successive interference cancellation is used. An expression for the upper bound of average bit error probability is derived. Moreover, the expressions for the sum mutual information of users and its lower bound are also derived. The proposed scheme is compared with the preprocessing aided spatial modulation (PSM)‐based counterpart. Monte Carlo simulations reveal that the NOMA‐PQSM scheme outperforms its orthogonal counterpart and the PSM scheme.","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141886995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Umar Farooq, Anjaneyulu Lokam, Sandhya Mallavarapu
SummaryThis work presents a compact two‐element multi‐input‐multi‐output (MIMO) antenna for 5G‐enabled IoT devices. The antenna operates over a wide frequency range of 24.6 to 31.4 GHz (28‐GHz band) and 57.6 to 60.2 GHz (60‐GHz band). Each MIMO element consists of an inverted L‐shaped slotted radiator with a partial ground plane. The antenna offers a peak gain of 5.45 and 5.56 dBi across two operating bands. The minimum isolation between the two ports is −26.5 dB, reaching a maximum value of over −45 dB. The investigation of MIMO metrics like “envelope correlation coefficient (ECC),” “diversity gain (DG),” “mean effective gain (MEG),” “channel capacity loss (CCL),” and “total active reflection coefficient (TARC)” also show favorable characteristics. The antenna is fabricated on a 10 × 22 × 0.503 mm3 Rogers 5880 substrate. The experimental results are in close agreement with that of the simulation results. The distinguishing features of the proposed antenna such as its compact design, simple geometrical configuration, wide operating bandwidth, low ECC, and high isolation make it a strong candidate for 5G‐enabled IoT devices.
{"title":"Compact planar 28/60‐GHz wideband MIMO antenna for 5G‐enabled IoT devices","authors":"Umar Farooq, Anjaneyulu Lokam, Sandhya Mallavarapu","doi":"10.1002/dac.5932","DOIUrl":"https://doi.org/10.1002/dac.5932","url":null,"abstract":"SummaryThis work presents a compact two‐element multi‐input‐multi‐output (MIMO) antenna for 5G‐enabled IoT devices. The antenna operates over a wide frequency range of 24.6 to 31.4 GHz (28‐GHz band) and 57.6 to 60.2 GHz (60‐GHz band). Each MIMO element consists of an inverted L‐shaped slotted radiator with a partial ground plane. The antenna offers a peak gain of 5.45 and 5.56 dBi across two operating bands. The minimum isolation between the two ports is −26.5 dB, reaching a maximum value of over −45 dB. The investigation of MIMO metrics like “envelope correlation coefficient (ECC),” “diversity gain (DG),” “mean effective gain (MEG),” “channel capacity loss (CCL),” and “total active reflection coefficient (TARC)” also show favorable characteristics. The antenna is fabricated on a 10 × 22 × 0.503 mm<jats:sup>3</jats:sup> Rogers 5880 substrate. The experimental results are in close agreement with that of the simulation results. The distinguishing features of the proposed antenna such as its compact design, simple geometrical configuration, wide operating bandwidth, low ECC, and high isolation make it a strong candidate for 5G‐enabled IoT devices.","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141881012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
SummaryBy controlling the network, the Internet of Things (IoT)‐connected software‐defined network (SDN) limits the scalability of IoT devices. Since SDN depends on a centralized controller that attackers can easily affect, it is incredibly susceptible to attacks. Secure access control to the SDN controller was the focus of the prior methods for controller scalability and restricted trust management. A framework called Safeguard Authentication Dynamic Access Control (SANDMAC) is suggested to safeguard and offer useful services to enterprises. Authentication confirms legitimacy after all users and applications have been registered. To improve network security, policies let users grant access to account attributes, legal activities, and temporal components. The administrator lessens conflicts between the methods by validating and saving the policies in the database. The services are provided to dependable customers using the forensic‐based investigation algorithm, depending on the quality of service and software level agreements requirements, decreasing reaction times and maximizing resource usage. Performance comparisons between the new and previous efforts are validated using a variety of parameters, and the proposed work is validated using the iFogSim application. According to the findings, SANDMAC significantly raises key performance indicators. SANDMAC specifically keeps false positives at 3.5% and accomplishes a low response time of 60 ms for roughly 800 authorized accesses. SANDMAC is a better option because of these enhancements, which result in longer network lifetimes and more dependable data transmission.
摘要 通过控制网络,与物联网(IoT)相连的软件定义网络(SDN)限制了物联网设备的可扩展性。由于 SDN 依赖于攻击者可以轻易影响的集中式控制器,因此极易受到攻击。对 SDN 控制器的安全访问控制是先前控制器可扩展性和受限信任管理方法的重点。建议采用一种名为 "安全认证动态访问控制"(SANDMAC)的框架,以保障安全并为企业提供有用的服务。所有用户和应用程序注册后,身份验证会确认其合法性。为提高网络安全性,策略允许用户授予账户属性、合法活动和时间组件的访问权限。管理员通过在数据库中验证和保存策略来减少方法之间的冲突。根据服务质量和软件级别协议的要求,使用基于取证的调查算法向可靠的客户提供服务,缩短反应时间,最大限度地提高资源利用率。使用各种参数对新的工作和以前的工作进行了性能比较,并使用 iFogSim 应用程序对拟议的工作进行了验证。根据研究结果,SANDMAC 显著提高了关键性能指标。具体而言,SANDMAC 将误报率控制在 3.5%,并在大约 800 次授权访问中实现了 60 毫秒的低响应时间。由于这些改进,SANDMAC 成为更好的选择,从而延长了网络寿命,提高了数据传输的可靠性。
{"title":"Bilevel access control and constraint‐aware response provisioning in edge‐enabled software defined network‐internet of things network using the safeguard authentication dynamic access control model","authors":"Sahana D S, Brahmananda S H","doi":"10.1002/dac.5946","DOIUrl":"https://doi.org/10.1002/dac.5946","url":null,"abstract":"SummaryBy controlling the network, the Internet of Things (IoT)‐connected software‐defined network (SDN) limits the scalability of IoT devices. Since SDN depends on a centralized controller that attackers can easily affect, it is incredibly susceptible to attacks. Secure access control to the SDN controller was the focus of the prior methods for controller scalability and restricted trust management. A framework called Safeguard Authentication Dynamic Access Control (SANDMAC) is suggested to safeguard and offer useful services to enterprises. Authentication confirms legitimacy after all users and applications have been registered. To improve network security, policies let users grant access to account attributes, legal activities, and temporal components. The administrator lessens conflicts between the methods by validating and saving the policies in the database. The services are provided to dependable customers using the forensic‐based investigation algorithm, depending on the quality of service and software level agreements requirements, decreasing reaction times and maximizing resource usage. Performance comparisons between the new and previous efforts are validated using a variety of parameters, and the proposed work is validated using the iFogSim application. According to the findings, SANDMAC significantly raises key performance indicators. SANDMAC specifically keeps false positives at 3.5% and accomplishes a low response time of 60 ms for roughly 800 authorized accesses. SANDMAC is a better option because of these enhancements, which result in longer network lifetimes and more dependable data transmission.","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141881090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Thiyagarajan, N. Nagabhooshanam, K.D.V. Prasad, P. Poojitha
SummaryEnsuring data integrity in wireless sensor networks (WSNs) is crucial for accurate monitoring, yet missing data due to sensor faults present a significant challenge. This research introduces an innovative approach that integrates advanced data recovery techniques with leading‐edge methods to address this issue. The system begins by identifying and isolating fault nodes using a specialized algorithm that analyzes network behavior. By applying fuzzy density‐based spatial clustering of applications with noise (FDBSCAN), potential fault nodes are precisely located based on deviations from expected patterns. Subsequently, an intelligent missing data recovery mechanism powered by bidirectional long short‐term memory (Bi‐LSTM) networks takes action. The Bi‐LSTM model is trained on existing sensor data to capture intricate patterns and dependencies, enabling accurate prediction and reconstruction of missing values caused by identified faults. The synergy between Bi‐LSTM for missing data recovery and FDBSCAN for fault node detection comprehensively addresses the missing data problem in WSNs. In missing data recovery, it demonstrates low mean absolute deviation (MAD) ranging from 0.021 to 0.13 and mean squared deviation (MSD) ranging from 0.0025 to 0.05 across various missing data ratios. Data reliability remains consistently high at 96% to 98%, even with up to 80% missing data. For fault node detection, the approach achieves precision of 95.7%, recall of 96.3%, F1‐score of 96.1%, and accuracy of 97.4%, outperforming existing techniques. The computational cost during training is noted at 5.79 h, presenting a limitation compared to other methods. This research highlights the importance of integrating fault node detection into missing data recovery mechanisms, presenting an innovative solution for the advancement of WSNs.
{"title":"A novel approach for missing data recovery and fault nodes detection in wireless sensor networks","authors":"R. Thiyagarajan, N. Nagabhooshanam, K.D.V. Prasad, P. Poojitha","doi":"10.1002/dac.5924","DOIUrl":"https://doi.org/10.1002/dac.5924","url":null,"abstract":"SummaryEnsuring data integrity in wireless sensor networks (WSNs) is crucial for accurate monitoring, yet missing data due to sensor faults present a significant challenge. This research introduces an innovative approach that integrates advanced data recovery techniques with leading‐edge methods to address this issue. The system begins by identifying and isolating fault nodes using a specialized algorithm that analyzes network behavior. By applying fuzzy density‐based spatial clustering of applications with noise (FDBSCAN), potential fault nodes are precisely located based on deviations from expected patterns. Subsequently, an intelligent missing data recovery mechanism powered by bidirectional long short‐term memory (Bi‐LSTM) networks takes action. The Bi‐LSTM model is trained on existing sensor data to capture intricate patterns and dependencies, enabling accurate prediction and reconstruction of missing values caused by identified faults. The synergy between Bi‐LSTM for missing data recovery and FDBSCAN for fault node detection comprehensively addresses the missing data problem in WSNs. In missing data recovery, it demonstrates low mean absolute deviation (MAD) ranging from 0.021 to 0.13 and mean squared deviation (MSD) ranging from 0.0025 to 0.05 across various missing data ratios. Data reliability remains consistently high at 96% to 98%, even with up to 80% missing data. For fault node detection, the approach achieves precision of 95.7%, recall of 96.3%, F1‐score of 96.1%, and accuracy of 97.4%, outperforming existing techniques. The computational cost during training is noted at 5.79 h, presenting a limitation compared to other methods. This research highlights the importance of integrating fault node detection into missing data recovery mechanisms, presenting an innovative solution for the advancement of WSNs.","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141881092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
SummaryIn recent years, the use of wireless sensor devices in several applications, for example, monitoring in dangerous geographical spaces and the Internet of Things, has dramatically increased. Though sensor nodes (SNs) have limited power, battery replacement is not feasible in most cases. Therefore, energy saving in wireless sensor networks (WSN) is the major concern in the design of effective transmission protocol. Clustering might lower energy usage and increase network lifetime. Routing protocol for WSN represents an engineering area that has gained considerable interest among researchers due to its rapid evolution and development. Among them, the clustering routing protocol corresponds to the most effective technique to manage the energy consumption of each SN. In this manuscript, we focus on the design of a new metaheuristic optimization‐based energy‐aware clustering with routing protocol for lifetime maximization (MOEACR‐LM) method in WSN. The purpose of the MOEACR‐LM method is to improve network efficiency via proper selection of cluster heads (CHs) and effective data transmission. Initially, a hunter–prey optimization (HPO) method‐based clustering technique is used for cluster construction and the CH selection process. Next, the clouded leopard optimization (CLO) model is used for the route selection process in WSN. The HPO and CLO models derive a fitness function involving multiple parameters for clustering and routing processes. A comprehensive experimental analysis is carried out to demonstrate the enhanced performance of the MOEACR‐LM technique. The overall comparison study pointed out the improved energy efficiency results of the MOEACR‐LM technique over other existing approaches.
{"title":"Metaheuristic optimization‐based clustering with routing protocol in wireless sensor networks","authors":"Chinnarao Kurangi, Kiran Kumar Paidipati, A. Siva Krishna Reddy, Jayasankar Uthayakumar, Ganesan Kadiravan, Shabana Parveen","doi":"10.1002/dac.5914","DOIUrl":"https://doi.org/10.1002/dac.5914","url":null,"abstract":"SummaryIn recent years, the use of wireless sensor devices in several applications, for example, monitoring in dangerous geographical spaces and the Internet of Things, has dramatically increased. Though sensor nodes (SNs) have limited power, battery replacement is not feasible in most cases. Therefore, energy saving in wireless sensor networks (WSN) is the major concern in the design of effective transmission protocol. Clustering might lower energy usage and increase network lifetime. Routing protocol for WSN represents an engineering area that has gained considerable interest among researchers due to its rapid evolution and development. Among them, the clustering routing protocol corresponds to the most effective technique to manage the energy consumption of each SN. In this manuscript, we focus on the design of a new metaheuristic optimization‐based energy‐aware clustering with routing protocol for lifetime maximization (MOEACR‐LM) method in WSN. The purpose of the MOEACR‐LM method is to improve network efficiency via proper selection of cluster heads (CHs) and effective data transmission. Initially, a hunter–prey optimization (HPO) method‐based clustering technique is used for cluster construction and the CH selection process. Next, the clouded leopard optimization (CLO) model is used for the route selection process in WSN. The HPO and CLO models derive a fitness function involving multiple parameters for clustering and routing processes. A comprehensive experimental analysis is carried out to demonstrate the enhanced performance of the MOEACR‐LM technique. The overall comparison study pointed out the improved energy efficiency results of the MOEACR‐LM technique over other existing approaches.","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141866888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
SummaryThe rapid evolution of user equipment (UE) and 5G networks drives significant transformations, bringing technology closer to end‐users. Managing resources in densely crowded areas such as airports, train stations, and bus terminals poses challenges due to diverse user demands. Integrating mobile edge computing (MEC) and network function virtualization (NFV) becomes vital when the service provider's (SP) primary goal is maximizing profitability while maintaining service level agreement (SLA). Considering these challenges, our study addresses an online resource allocation problem in an MEC network where computing resources are limited, and the SP aims to boost profit by securely admitting more UE requests at each time slot. Each UE request arrival rate is unknown, and the requirement is specific resources with minimum cost and delay. The optimization problem objective is achieved by allocating resources to requests at the MEC network in appropriate cloudlets, utilizing abandoned instances, reutilizing idle and soft slice instances to shorten delay and reduce costs, and immediately scaling inappropriate instances, thus minimizing the instantiation of new instances. This paper proposes a deep reinforcement learning (DRL) method for request prediction and resource allocation to mitigate unnecessary resource waste. Simulation results demonstrate that the proposed approach effectively accepts network slice requests to maximize profit by leveraging resource availability, reutilizing instantiated resources, and upholding goodwill and SLA. Through extensive simulations, we show that our proposed DRL‐based approach outperforms other state‐of‐the‐art techniques, namely, MaxSR, DQN, and DDPG, by 76%, 33%, and 23%, respectively.
{"title":"Dynamic and efficient resource allocation for 5G end‐to‐end network slicing: A multi‐agent deep reinforcement learning approach","authors":"Muhammad Asim Ejaz, Guowei Wu, Tahir Iqbal","doi":"10.1002/dac.5916","DOIUrl":"https://doi.org/10.1002/dac.5916","url":null,"abstract":"SummaryThe rapid evolution of user equipment (UE) and 5G networks drives significant transformations, bringing technology closer to end‐users. Managing resources in densely crowded areas such as airports, train stations, and bus terminals poses challenges due to diverse user demands. Integrating mobile edge computing (MEC) and network function virtualization (NFV) becomes vital when the service provider's (SP) primary goal is maximizing profitability while maintaining service level agreement (SLA). Considering these challenges, our study addresses an online resource allocation problem in an MEC network where computing resources are limited, and the SP aims to boost profit by securely admitting more UE requests at each time slot. Each UE request arrival rate is unknown, and the requirement is specific resources with minimum cost and delay. The optimization problem objective is achieved by allocating resources to requests at the MEC network in appropriate cloudlets, utilizing abandoned instances, reutilizing idle and soft slice instances to shorten delay and reduce costs, and immediately scaling inappropriate instances, thus minimizing the instantiation of new instances. This paper proposes a deep reinforcement learning (DRL) method for request prediction and resource allocation to mitigate unnecessary resource waste. Simulation results demonstrate that the proposed approach effectively accepts network slice requests to maximize profit by leveraging resource availability, reutilizing instantiated resources, and upholding goodwill and SLA. Through extensive simulations, we show that our proposed DRL‐based approach outperforms other state‐of‐the‐art techniques, namely, MaxSR, DQN, and DDPG, by 76<jats:italic>%</jats:italic>, 33<jats:italic>%</jats:italic>, and 23<jats:italic>%</jats:italic>, respectively.","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141866807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}