首页 > 最新文献

2021 28th International Conference on Telecommunications (ICT)最新文献

英文 中文
A Meta Learner Autoencoder for Channel State Information Feedback in Massive MIMO Systems 大规模MIMO系统中信道状态信息反馈的元学习自编码器
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511541
Bassant Tolba, A. El-Malek, M. Abo-Zahhad, M. Elsabrouty
In massive multiple-input multiple-output frequency division duplexing systems, the user equipment should independently estimate the massive downlink channels state information and then feed them back to the base station. This process results in a large signaling overhead. Deep learning approaches tried to overcome this challenge using neural networks as an autoencoder to learn the mapping between the input and corresponding output. However, this type of learning consumes massive training datasets to learn. Also, it can not make use of the learning through the internal information within the tasks and thus, it can not reach the convergence quickly as its parameters are randomly initialized. In this paper, we introduce a meta learner-based autoencoder for tackling the feedback overhead. The proposed approach is mainly based on finding a good initialization of the parameters of the autoencoder to adapt rapidly to new tasks with a few number of samples. The results show that the proposed autoencoder based on the meta-learner method outperforms the state of the art with a margin.
在海量多输入多输出分频双工系统中,用户设备需要独立估计海量下行信道状态信息并反馈给基站。这个过程导致很大的信号开销。深度学习方法试图克服这一挑战,使用神经网络作为自动编码器来学习输入和相应输出之间的映射。然而,这种类型的学习需要大量的训练数据集来学习。同时,由于它的参数是随机初始化的,不能利用任务内部的信息进行学习,不能快速达到收敛。在本文中,我们引入了一个基于元学习器的自编码器来解决反馈开销。所提出的方法主要基于寻找一个良好的自编码器参数初始化,以快速适应少量样本的新任务。结果表明,基于元学习器方法的自编码器在一定程度上优于现有的自编码器。
{"title":"A Meta Learner Autoencoder for Channel State Information Feedback in Massive MIMO Systems","authors":"Bassant Tolba, A. El-Malek, M. Abo-Zahhad, M. Elsabrouty","doi":"10.1109/ICT52184.2021.9511541","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511541","url":null,"abstract":"In massive multiple-input multiple-output frequency division duplexing systems, the user equipment should independently estimate the massive downlink channels state information and then feed them back to the base station. This process results in a large signaling overhead. Deep learning approaches tried to overcome this challenge using neural networks as an autoencoder to learn the mapping between the input and corresponding output. However, this type of learning consumes massive training datasets to learn. Also, it can not make use of the learning through the internal information within the tasks and thus, it can not reach the convergence quickly as its parameters are randomly initialized. In this paper, we introduce a meta learner-based autoencoder for tackling the feedback overhead. The proposed approach is mainly based on finding a good initialization of the parameters of the autoencoder to adapt rapidly to new tasks with a few number of samples. The results show that the proposed autoencoder based on the meta-learner method outperforms the state of the art with a margin.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"2000 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125729000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimization of non-binary LDPC coded massive MIMO systems with partial mapping and EP detection 具有部分映射和EP检测的非二进制LDPC编码大规模MIMO系统优化
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511526
Zhi-Yuan Feng, Qingqing Liu, Jin Xu, Weihua Liu, Zhe Zhang, Xueyan Chen, Hanqing Ding
In this work, a non-binary low density parity check (LDPC) coded high dimensional multiple input multiple output (MIMO) scheme with partial mapping for high order modulation is proposed. For the proposed scheme, when $M$ -ary quadrature amplitude modulation (QAM) is employed, then non-binary LDPC code constructed over Galois field with order $sqrt{M}$ is used for partial mapping, where $sqrt{M}$ is an integer. At the receiver side, a real-valued expectation propagation (REP) based detection algorithm is used. Furthermore, symbol-wise extrinsic information transfer (SEXIT) chart based iterative optimization algorithm is used to optimize the concatenated non-binary LDPC code. A simplified method is proposed to calculate the component EXIT chart of the massive MIMO detector, which can avoid a large amount of simulations. Numerical simulation results demonstrate the validity of the above idea.
本文提出了一种非二进制低密度奇偶校验(LDPC)编码的高阶调制高维多输入多输出(MIMO)部分映射方案。对于所提出的方案,当采用$M$一元正交调幅(QAM)时,部分映射使用在伽罗瓦域上构造阶为$sqrt{M}$的非二进制LDPC码,其中$sqrt{M}$为整数。在接收端,采用了基于实值期望传播(REP)的检测算法。在此基础上,采用基于符号外信息传递(SEXIT)图的迭代优化算法对非二进制LDPC码进行了优化。提出了一种简化的大规模MIMO探测器组件出口图的计算方法,避免了大量的仿真。数值仿真结果验证了上述思想的有效性。
{"title":"Optimization of non-binary LDPC coded massive MIMO systems with partial mapping and EP detection","authors":"Zhi-Yuan Feng, Qingqing Liu, Jin Xu, Weihua Liu, Zhe Zhang, Xueyan Chen, Hanqing Ding","doi":"10.1109/ICT52184.2021.9511526","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511526","url":null,"abstract":"In this work, a non-binary low density parity check (LDPC) coded high dimensional multiple input multiple output (MIMO) scheme with partial mapping for high order modulation is proposed. For the proposed scheme, when $M$ -ary quadrature amplitude modulation (QAM) is employed, then non-binary LDPC code constructed over Galois field with order $sqrt{M}$ is used for partial mapping, where $sqrt{M}$ is an integer. At the receiver side, a real-valued expectation propagation (REP) based detection algorithm is used. Furthermore, symbol-wise extrinsic information transfer (SEXIT) chart based iterative optimization algorithm is used to optimize the concatenated non-binary LDPC code. A simplified method is proposed to calculate the component EXIT chart of the massive MIMO detector, which can avoid a large amount of simulations. Numerical simulation results demonstrate the validity of the above idea.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114452185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey on Jamming Techniques in Physical Layer Security and Anti-Jamming Strategies for 6G 6G网络物理层安全干扰技术及抗干扰策略研究
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511465
K. Vaishnavi, Shubham Dashrath Khorvi, Rajalekshmi Kishore, Sanjeev Gurugopinath
In this paper, we present a comprehensive survey on jamming techniques for physical layer security (PLS) and anti-jamming strategies in beyond fifth generation (B5G) and towards the sixth generation (6G) communication systems. A combined study on jamming and anti-jamming methods is important for PLS, and is helpful to study and design PLS algorithms in the presence of jamming, eavesdropping and spoofing. First, we present various approaches for PLS in 6G. Next, we discuss techniques that use jammers for PLS, followed by a detailed study on recently proposed anti-jamming solutions. Further, we discuss the use of machine learning and artificial intelligence for anti-jamming. Moreover, we present a study on the challenges for PLS in 6G, and discuss some future research directions.
在本文中,我们对第五代(B5G)以上和第六代(6G)通信系统中物理层安全(PLS)的干扰技术和抗干扰策略进行了全面的调查。将干扰和抗干扰方法相结合的研究对PLS具有重要意义,有助于研究和设计存在干扰、窃听和欺骗的PLS算法。首先,我们提出了6G中PLS的各种方法。接下来,我们将讨论使用干扰器进行PLS的技术,然后对最近提出的抗干扰解决方案进行详细研究。此外,我们讨论了机器学习和人工智能在抗干扰方面的应用。此外,我们对6G下PLS面临的挑战进行了研究,并讨论了未来的研究方向。
{"title":"A Survey on Jamming Techniques in Physical Layer Security and Anti-Jamming Strategies for 6G","authors":"K. Vaishnavi, Shubham Dashrath Khorvi, Rajalekshmi Kishore, Sanjeev Gurugopinath","doi":"10.1109/ICT52184.2021.9511465","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511465","url":null,"abstract":"In this paper, we present a comprehensive survey on jamming techniques for physical layer security (PLS) and anti-jamming strategies in beyond fifth generation (B5G) and towards the sixth generation (6G) communication systems. A combined study on jamming and anti-jamming methods is important for PLS, and is helpful to study and design PLS algorithms in the presence of jamming, eavesdropping and spoofing. First, we present various approaches for PLS in 6G. Next, we discuss techniques that use jammers for PLS, followed by a detailed study on recently proposed anti-jamming solutions. Further, we discuss the use of machine learning and artificial intelligence for anti-jamming. Moreover, we present a study on the challenges for PLS in 6G, and discuss some future research directions.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134337882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
CAAE: A Novel Wireless Spectrum Anomaly Detection Method with Multiple Scoring Criterion CAAE:一种新的多评分准则无线频谱异常检测方法
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511462
Degang Sun, Sixue Lu, Wen Wang
To sense and understand how to use the wireless spectrum, people have proposed various anomaly spectrum detection methods. We judge it as anomaly behavior if the received signal is unauthorized or the radiation of an expected signal is changed. We propose CAAE, a novel wireless spectrum anomaly detection method, to detect the two kinds of anomaly behaviors. CAAE is a complex adversarial autoencoder that can realize feature extraction and image reconstruction of input data through convolution and deconvolution networks. We train CAAE in a semi-supervised learning fashion and various values in the calculation process would change if the anomaly spectrum is input after the model training is completed. Therefore, we propose the multiple scoring criterion to help improve the detection accuracy of our model. The time-frequency waterfall graphs are input and we do two sets of experiments to prove the validity of our model. The experimental results show that the comprehensive detection capability of CAAE model is superior to the comparison algorithms for our dataset.
为了感知和理解如何使用无线频谱,人们提出了各种异常频谱检测方法。如果接收到的信号是未经授权的,或者预期信号的辐射发生了变化,我们将其判断为异常行为。我们提出了一种新的无线频谱异常检测方法CAAE来检测这两种异常行为。CAAE是一种复杂的对抗性自编码器,可以通过卷积和反卷积网络实现输入数据的特征提取和图像重建。我们以半监督学习的方式训练CAAE,在模型训练完成后,如果输入异常谱,计算过程中的各个值都会发生变化。因此,我们提出了多重评分标准来帮助提高我们模型的检测精度。输入时频瀑布图,并通过两组实验验证了模型的有效性。实验结果表明,对于我们的数据集,CAAE模型的综合检测能力优于比较算法。
{"title":"CAAE: A Novel Wireless Spectrum Anomaly Detection Method with Multiple Scoring Criterion","authors":"Degang Sun, Sixue Lu, Wen Wang","doi":"10.1109/ICT52184.2021.9511462","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511462","url":null,"abstract":"To sense and understand how to use the wireless spectrum, people have proposed various anomaly spectrum detection methods. We judge it as anomaly behavior if the received signal is unauthorized or the radiation of an expected signal is changed. We propose CAAE, a novel wireless spectrum anomaly detection method, to detect the two kinds of anomaly behaviors. CAAE is a complex adversarial autoencoder that can realize feature extraction and image reconstruction of input data through convolution and deconvolution networks. We train CAAE in a semi-supervised learning fashion and various values in the calculation process would change if the anomaly spectrum is input after the model training is completed. Therefore, we propose the multiple scoring criterion to help improve the detection accuracy of our model. The time-frequency waterfall graphs are input and we do two sets of experiments to prove the validity of our model. The experimental results show that the comprehensive detection capability of CAAE model is superior to the comparison algorithms for our dataset.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131232790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Railways Communications Propagation Prediction over Irregular Terrain using Longley-Rice Model 基于Longley-Rice模型的不规则地形下铁路通信传播预测
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511515
P. Prior, Nuno Cota
This paper presents the evaluation results of the radio signal propagation prediction using Longley-Rice model in railways installed in rural areas with significant variation of propagation path and terrain profiles. The prediction results were compared with measurement acquired by installing several CW emitters along the railway and reception equipment installed on a rolling stock. In addition, the results were also compared with the prediction based on Okumura-Hata model. The obtained results prove Longley-Rice suitability for railways communication prediction on irregular terrain, achieving better results than the Okumura-Hata model.
本文介绍了基于朗利-赖斯模型的农村铁路信号传播预测的评估结果,该模型具有显著的传播路径和地形变化。并将预测结果与在铁路沿线安装多个连续波发射机和安装在机车上的接收设备所获得的测量结果进行了比较。并与基于Okumura-Hata模型的预测结果进行了比较。结果表明,Longley-Rice模型适用于不规则地形条件下的铁路通信预测,效果优于Okumura-Hata模型。
{"title":"Railways Communications Propagation Prediction over Irregular Terrain using Longley-Rice Model","authors":"P. Prior, Nuno Cota","doi":"10.1109/ICT52184.2021.9511515","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511515","url":null,"abstract":"This paper presents the evaluation results of the radio signal propagation prediction using Longley-Rice model in railways installed in rural areas with significant variation of propagation path and terrain profiles. The prediction results were compared with measurement acquired by installing several CW emitters along the railway and reception equipment installed on a rolling stock. In addition, the results were also compared with the prediction based on Okumura-Hata model. The obtained results prove Longley-Rice suitability for railways communication prediction on irregular terrain, achieving better results than the Okumura-Hata model.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124885697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SDN-enabled terahertz x-haul network 支持sdn的太赫兹x-haul网络
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511544
J. Costa-Requena, C. Konstantinos, D. Kritharidis, Abraham Afriyie, N. Carapellese, Eduardo Yusta Padilla
With the explosive data growth of user traffic in wireless communications, Terahertz (THz) frequency band is envisioned as a promising candidate to support ultra-broadband communications for beyond fifth generation (5G) networks. Software-based networking is being adopted in mobile communications to improve efficiency and reduce operational costs. This paper presents the design of a comprehensive SDN management architecture for joint optimization of radio and network resources. The proposed architecture obtains the most added value out of the use of THz technology integrated with software managed networking for mobile network beyond 5G. In this paper, leveraging optical concepts and photonic integration techniques for an ultra-broadband and ultra-wideband wireless system is presented.
随着无线通信中用户流量数据的爆炸式增长,太赫兹(THz)频段被设想为支持第五代(5G)以上网络的超宽带通信的有希望的候选频段。移动通信正在采用基于软件的网络,以提高效率和降低运营成本。本文设计了一种综合的SDN管理体系结构,用于无线和网络资源的联合优化。该架构通过将太赫兹技术与5G以上移动网络的软件管理网络相结合,获得了最大的附加价值。本文介绍了利用光学概念和光子集成技术实现超宽带和超宽带无线系统。
{"title":"SDN-enabled terahertz x-haul network","authors":"J. Costa-Requena, C. Konstantinos, D. Kritharidis, Abraham Afriyie, N. Carapellese, Eduardo Yusta Padilla","doi":"10.1109/ICT52184.2021.9511544","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511544","url":null,"abstract":"With the explosive data growth of user traffic in wireless communications, Terahertz (THz) frequency band is envisioned as a promising candidate to support ultra-broadband communications for beyond fifth generation (5G) networks. Software-based networking is being adopted in mobile communications to improve efficiency and reduce operational costs. This paper presents the design of a comprehensive SDN management architecture for joint optimization of radio and network resources. The proposed architecture obtains the most added value out of the use of THz technology integrated with software managed networking for mobile network beyond 5G. In this paper, leveraging optical concepts and photonic integration techniques for an ultra-broadband and ultra-wideband wireless system is presented.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130301296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fast Identification Method of Shortwave Radio Stations Based on Sparse Component Analysis 基于稀疏分量分析的短波无线电台快速识别方法
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511543
Yuankun Wang, Wei-qing Huang, Qiaoyu Zhang, Dong Wei
Aiming at the problem of identification of a large number of radio stations in the high frequency (HF) band, a fast identification method based on sparse component analysis, in which high-speed spectrum scanning data are used to separate and identify multiple stations on each channel, is proposed. Taking into account the adverse effects of the shortwave time-varying channel fading on the radio signals, utilizing the periodicity of the radio signals, a sparse component analysis algorithm based on time feature clustering (TFC-SCA) is proposed. The algorithm combines the time features with the amplitude features for clustering and realizes the accurate estimation of the mixing matrix under fading channel conditions. In addition, based on the clustering results, the algorithm projects the signals to the vectors from the origin to the clustering centers to remove the noise introduced by the time-varying channel fading. In simulation experiments with different duty cycles and different periods, the correlation coefficients of TFC-SCA are closer to 1 than clustering based sparse component analysis (C-SCA) and fast independent component analysis (FastICA), providing a good solution to the problem of separation and identification of shortwave radio stations.
针对高频波段大量无线电台的识别问题,提出了一种基于稀疏分量分析的快速识别方法,利用高速频谱扫描数据对每个信道上的多个电台进行分离和识别。针对短波时变信道衰落对无线电信号的不利影响,利用无线电信号的周期性,提出了一种基于时间特征聚类的稀疏分量分析算法(TFC-SCA)。该算法结合时间特征和幅度特征进行聚类,实现了信道衰落条件下混合矩阵的准确估计。此外,该算法根据聚类结果,将信号从原点投影到聚类中心的矢量上,以去除时变信道衰落带来的噪声。在不同占空比和不同周期的仿真实验中,TFC-SCA的相关系数比基于聚类的稀疏分量分析(C-SCA)和快速独立分量分析(FastICA)更接近于1,较好地解决了短波无线电台的分离与识别问题。
{"title":"A Fast Identification Method of Shortwave Radio Stations Based on Sparse Component Analysis","authors":"Yuankun Wang, Wei-qing Huang, Qiaoyu Zhang, Dong Wei","doi":"10.1109/ICT52184.2021.9511543","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511543","url":null,"abstract":"Aiming at the problem of identification of a large number of radio stations in the high frequency (HF) band, a fast identification method based on sparse component analysis, in which high-speed spectrum scanning data are used to separate and identify multiple stations on each channel, is proposed. Taking into account the adverse effects of the shortwave time-varying channel fading on the radio signals, utilizing the periodicity of the radio signals, a sparse component analysis algorithm based on time feature clustering (TFC-SCA) is proposed. The algorithm combines the time features with the amplitude features for clustering and realizes the accurate estimation of the mixing matrix under fading channel conditions. In addition, based on the clustering results, the algorithm projects the signals to the vectors from the origin to the clustering centers to remove the noise introduced by the time-varying channel fading. In simulation experiments with different duty cycles and different periods, the correlation coefficients of TFC-SCA are closer to 1 than clustering based sparse component analysis (C-SCA) and fast independent component analysis (FastICA), providing a good solution to the problem of separation and identification of shortwave radio stations.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117011440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EACA: An Energy Aware Clustering Algorithm for Wireless IoT Sensors EACA:无线物联网传感器的能量感知聚类算法
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511518
A. Faid, M. Sadik, Essaid Sabir
The role of Wireless Sensor Networks in the ongoing industrial development is becoming crucial on daily basis. It is undoubtedly the skeleton of the current global digital transformation and the fourth industrial revolution. WSN has grown into an emerging field of research due to its tremendous opportunities and several challenges. Machine to Machine (M2M), energy consumption, and wireless transmission are the most challenging areas of research with a plethora of solid papers that have been published in the last decade. Unquestionably, Low-Energy Adaptive Clustering Hierarchy (LEACH) is the most famous clustering protocol in the literature that allows the creation of self-organizing networks. However, the protocol presents several drawbacks in terms of cluster balancing, random CH selection, and single-hop communication. In this paper, we propose a hybrid energy-aware multi-hop clustering algorithm for WSN's self-organization and energy efficiency. The approach is based on the combination of K-medoids and LEACH clustering approach with a trade-off philosophy for the network clustering and eventual energy enhancement. The technique applies different energy ranges for a self-aware gateways' selection, along with the application of K-medoids, and LEACH for the building of dynamic clusters. The results are compared to the LEACH and K-medoids algorithms. Extensive simulation runs have shown a very good improvement in the network's performance based on the first dead node, the network lifetime, and the energy dissipation metrics. The algorithm's results show an improvement of 158% comparing to LEACH and 834% comparing to K-medoids in terms of the first dead node, while the network performance is enhanced by 151% comparing to LEACH and 33% comparing to K-medoids.
无线传感器网络在当前工业发展中的作用日益重要。它无疑是当前全球数字化转型和第四次工业革命的骨架。无线传感器网络面临着巨大的机遇和挑战,已经发展成为一个新兴的研究领域。机器对机器(M2M)、能源消耗和无线传输是最具挑战性的研究领域,在过去十年中发表了大量可靠的论文。毫无疑问,低能量自适应聚类层次(LEACH)是文献中最著名的聚类协议,它允许创建自组织网络。然而,该协议在集群平衡、随机CH选择和单跳通信方面存在一些缺点。针对无线传感器网络的自组织和能效问题,提出了一种能量感知的混合多跳聚类算法。该方法基于k -介质和LEACH聚类方法的结合,并采用了网络聚类和最终能量增强的权衡哲学。该技术采用不同的能量范围进行自我感知网关的选择,同时应用k -介质和LEACH来构建动态簇。结果与LEACH和K-medoids算法进行了比较。大量的模拟运行表明,基于第一个死节点、网络生命周期和能量消耗指标,网络性能得到了非常好的改善。该算法的结果表明,在第一个死节点方面,该算法比LEACH提高了158%,比K-medoids提高了834%,网络性能比LEACH提高了151%,比K-medoids提高了33%。
{"title":"EACA: An Energy Aware Clustering Algorithm for Wireless IoT Sensors","authors":"A. Faid, M. Sadik, Essaid Sabir","doi":"10.1109/ICT52184.2021.9511518","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511518","url":null,"abstract":"The role of Wireless Sensor Networks in the ongoing industrial development is becoming crucial on daily basis. It is undoubtedly the skeleton of the current global digital transformation and the fourth industrial revolution. WSN has grown into an emerging field of research due to its tremendous opportunities and several challenges. Machine to Machine (M2M), energy consumption, and wireless transmission are the most challenging areas of research with a plethora of solid papers that have been published in the last decade. Unquestionably, Low-Energy Adaptive Clustering Hierarchy (LEACH) is the most famous clustering protocol in the literature that allows the creation of self-organizing networks. However, the protocol presents several drawbacks in terms of cluster balancing, random CH selection, and single-hop communication. In this paper, we propose a hybrid energy-aware multi-hop clustering algorithm for WSN's self-organization and energy efficiency. The approach is based on the combination of K-medoids and LEACH clustering approach with a trade-off philosophy for the network clustering and eventual energy enhancement. The technique applies different energy ranges for a self-aware gateways' selection, along with the application of K-medoids, and LEACH for the building of dynamic clusters. The results are compared to the LEACH and K-medoids algorithms. Extensive simulation runs have shown a very good improvement in the network's performance based on the first dead node, the network lifetime, and the energy dissipation metrics. The algorithm's results show an improvement of 158% comparing to LEACH and 834% comparing to K-medoids in terms of the first dead node, while the network performance is enhanced by 151% comparing to LEACH and 33% comparing to K-medoids.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122902428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Physical Layer Security Framework for Optical Non-Terrestrial Networks 光非地面网络物理层安全框架
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511459
Olfa Ben Yahia, Eylem Erdogan, Günes Karabulut-Kurt, I. Altunbas, H. Yanikomeroglu
In this work, we propose a new physical layer security framework for optical space networks. More precisely, we consider two practical eavesdropping scenarios: free-space optical (FSO) eavesdropping in the space and FSO eavesdropping in the air. In the former, we assume that a high altitude platform station (HAPS) is trying to capture the confidential information from the low earth orbit (LEO) satellite, whereas in the latter, an unmanned aerial vehicle (UAV) eavesdropper is trying to intercept the confidential information from the HAPS node. To quantify the overall performance of both scenarios, we obtain closed-form secrecy outage probability (SOP) and probability of positive secrecy capacity (PPSC) expressions and validate with Monte Carlo simulations. Furthermore, we provide important design guidelines that can be helpful in the design of secure non-terrestrial networks.
在这项工作中,我们提出了一个新的光空间网络物理层安全框架。更准确地说,我们考虑了两种实际的窃听场景:自由空间光学(FSO)在空间中的窃听和自由空间光学(FSO)在空中的窃听。在前者中,我们假设高空平台站(HAPS)试图从低地球轨道(LEO)卫星捕获机密信息,而在后者中,无人机(UAV)窃听者试图拦截来自HAPS节点的机密信息。为了量化这两种场景的总体性能,我们获得了封闭形式的保密中断概率(SOP)和正保密容量概率(PPSC)表达式,并通过蒙特卡罗模拟进行了验证。此外,我们还提供了重要的设计指南,可以帮助设计安全的非地面网络。
{"title":"Physical Layer Security Framework for Optical Non-Terrestrial Networks","authors":"Olfa Ben Yahia, Eylem Erdogan, Günes Karabulut-Kurt, I. Altunbas, H. Yanikomeroglu","doi":"10.1109/ICT52184.2021.9511459","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511459","url":null,"abstract":"In this work, we propose a new physical layer security framework for optical space networks. More precisely, we consider two practical eavesdropping scenarios: free-space optical (FSO) eavesdropping in the space and FSO eavesdropping in the air. In the former, we assume that a high altitude platform station (HAPS) is trying to capture the confidential information from the low earth orbit (LEO) satellite, whereas in the latter, an unmanned aerial vehicle (UAV) eavesdropper is trying to intercept the confidential information from the HAPS node. To quantify the overall performance of both scenarios, we obtain closed-form secrecy outage probability (SOP) and probability of positive secrecy capacity (PPSC) expressions and validate with Monte Carlo simulations. Furthermore, we provide important design guidelines that can be helpful in the design of secure non-terrestrial networks.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125482814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Aware Resource Allocation for D2D Communications with cooperative Jamming 协同干扰下D2D通信的安全感知资源分配
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511539
Hao Wang, Shunliang Zhang, Qian Cheng
Securing communications for D2D underlaying cellular networks by physical layer mechanisms has become an important issue for 5G and beyond. The preference of D2D users and the role of D2D users as cooperative jammers are rarely investigated together in previous works. In this paper, we investigate spectrum resource allocation to maximize system secrecy sum rate and leverage D2D users to cooperatively protect cellular users at high risks of being eavesdropped. The resource allocation problem is formulated as a Mixed-Integer Non-Linear Programming (MINLP) model. We propose a preference-based matching algorithm (PBMA) to tackle the spectrum resource allocation problem. Then, cooperative jamming-based algorithms by D2D users assisted are proposed to further improve the secrecy rate of cellular users. Extensive simulation results demonstrate the effectiveness of proposed schemes in terms of the secrecy sum rate of D2D links and cellular links.
通过物理层机制保护D2D底层蜂窝网络的通信已成为5G及以后的重要问题。在以往的研究中,很少将D2D用户的偏好和D2D用户作为合作干扰者的角色放在一起进行研究。在本文中,我们研究频谱资源分配以最大化系统保密和速率,并利用D2D用户协同保护处于窃听高风险的蜂窝用户。将资源分配问题表述为一个混合整数非线性规划(MINLP)模型。提出了一种基于偏好的匹配算法(PBMA)来解决频谱资源分配问题。在此基础上,提出了基于D2D用户辅助的协同干扰算法,进一步提高蜂窝用户的保密率。大量的仿真结果证明了所提方案在D2D链路和蜂窝链路的保密和速率方面的有效性。
{"title":"Security Aware Resource Allocation for D2D Communications with cooperative Jamming","authors":"Hao Wang, Shunliang Zhang, Qian Cheng","doi":"10.1109/ICT52184.2021.9511539","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511539","url":null,"abstract":"Securing communications for D2D underlaying cellular networks by physical layer mechanisms has become an important issue for 5G and beyond. The preference of D2D users and the role of D2D users as cooperative jammers are rarely investigated together in previous works. In this paper, we investigate spectrum resource allocation to maximize system secrecy sum rate and leverage D2D users to cooperatively protect cellular users at high risks of being eavesdropped. The resource allocation problem is formulated as a Mixed-Integer Non-Linear Programming (MINLP) model. We propose a preference-based matching algorithm (PBMA) to tackle the spectrum resource allocation problem. Then, cooperative jamming-based algorithms by D2D users assisted are proposed to further improve the secrecy rate of cellular users. Extensive simulation results demonstrate the effectiveness of proposed schemes in terms of the secrecy sum rate of D2D links and cellular links.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130247831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2021 28th International Conference on Telecommunications (ICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1