首页 > 最新文献

Transactions on Emerging Telecommunications Technologies最新文献

英文 中文
ResA-D2PySepCo: Cyber-Attack Detection in Fog Based IoT Network Using Pyramidal Dilated Separable Residual Convolutional With Effective Optimization Algorithm ResA-D2PySepCo:基于雾的物联网网络中网络攻击检测的金字塔扩张可分离残差卷积有效优化算法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-06 DOI: 10.1002/ett.70268
Kotari Suresh, M. Humera Khanam

Cyberattack detection systems are critical in protecting the Internet of Things (IoT) network from attacks. Cyber-attack detection is critical in fog-based IoT systems to protect against a wide range of threats, such as illegal access, data breaches, and service disruptions. Present cyber-attack detection models have limitations, such as a high false alarm rate (FAR) and limited detection accuracy. Therefore, it is essential to create reliable cyberattack detection systems that can raise the accuracy of detection and lower the rate of false alarms. This paper presents a deep learning (DL)-based classifier model with an effective feature extraction mechanism for detecting cyber-attacks in a fog-based IoT system. Before initiating the process, data augmentation has been done to balance the dataset. Initially, the input data are collected from the public source dataset; the collected data are passed into the pre-processing stage to rescale the data properly, which is performed by Z-Score normalization. The optimal set of features from the pre-processed data is extracted by a meta-heuristic technique, namely the Hybrid white shark sea lion optimization algorithm (Hy-WS2LO). After selecting optimal features, the data is fed into a classifier model to detect cyber-attacks in a fog-based IoT environment. An effective Residual attention-based dilated pyramidal depth-wise separable convolution (ResA-D2PySepCo) is used for identifying cyber-attacks in fog-based IoT networks. The proposed model can obtain an accuracy of 98.87% and 99.74% for ToN IoT and CICIDS 2018 datasets.

网络攻击检测系统对于保护物联网(IoT)网络免受攻击至关重要。网络攻击检测在基于雾的物联网系统中至关重要,可以防止各种威胁,如非法访问、数据泄露和服务中断。现有的网络攻击检测模型存在虚警率高、检测精度低等缺陷。因此,必须创建可靠的网络攻击检测系统,以提高检测的准确性并降低误报率。本文提出了一种基于深度学习(DL)的分类器模型,该模型具有有效的特征提取机制,用于检测基于雾的物联网系统中的网络攻击。在启动该流程之前,已经完成了数据扩充以平衡数据集。最初,从公共源数据集收集输入数据;将收集到的数据传递到预处理阶段,以适当地重新缩放数据,这是通过Z-Score归一化执行的。通过一种元启发式技术,即混合白鲨海狮优化算法(Hy-WS2LO),从预处理数据中提取最优特征集。在选择最佳特征后,将数据输入分类器模型,以检测基于雾的物联网环境中的网络攻击。一种有效的基于剩余注意力的扩展金字塔深度可分离卷积(ResA-D2PySepCo)用于识别基于雾的物联网网络中的网络攻击。该模型在ToN IoT和CICIDS 2018数据集上的准确率分别为98.87%和99.74%。
{"title":"ResA-D2PySepCo: Cyber-Attack Detection in Fog Based IoT Network Using Pyramidal Dilated Separable Residual Convolutional With Effective Optimization Algorithm","authors":"Kotari Suresh,&nbsp;M. Humera Khanam","doi":"10.1002/ett.70268","DOIUrl":"https://doi.org/10.1002/ett.70268","url":null,"abstract":"<div>\u0000 \u0000 <p>Cyberattack detection systems are critical in protecting the Internet of Things (IoT) network from attacks. Cyber-attack detection is critical in fog-based IoT systems to protect against a wide range of threats, such as illegal access, data breaches, and service disruptions. Present cyber-attack detection models have limitations, such as a high false alarm rate (FAR) and limited detection accuracy. Therefore, it is essential to create reliable cyberattack detection systems that can raise the accuracy of detection and lower the rate of false alarms. This paper presents a deep learning (DL)-based classifier model with an effective feature extraction mechanism for detecting cyber-attacks in a fog-based IoT system. Before initiating the process, data augmentation has been done to balance the dataset. Initially, the input data are collected from the public source dataset; the collected data are passed into the pre-processing stage to rescale the data properly, which is performed by <i>Z</i>-Score normalization. The optimal set of features from the pre-processed data is extracted by a meta-heuristic technique, namely the Hybrid white shark sea lion optimization algorithm (Hy-WS<sup>2</sup>LO). After selecting optimal features, the data is fed into a classifier model to detect cyber-attacks in a fog-based IoT environment. An effective Residual attention-based dilated pyramidal depth-wise separable convolution (ResA-D<sup>2</sup>PySepCo) is used for identifying cyber-attacks in fog-based IoT networks. The proposed model can obtain an accuracy of 98.87% and 99.74% for ToN IoT and CICIDS 2018 datasets.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145271780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Hybrid Explainable Artificial Intelligence With Swin Vision Transformer Intrusion Detection for Securing VANETs From Attacks 用于保护vanet免受攻击的混合可解释人工智能与Swin视觉变压器入侵检测的发展
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-06 DOI: 10.1002/ett.70280
Bharathiraja N, M. S. Minu, Richa Vijay, M. Rajalakshmi, Pellakuri Vidyullatha, K. Balamurugan

Vehicular Ad-hoc Networks (VANETs) are a cornerstone of Intelligent Transportation Systems (ITS), enabling efficient vehicle-to-vehicle and vehicle-to-infrastructure communication. However, their open and dynamic nature makes them highly susceptible to security threats such as Distributed Denial of Service (DDoS) attacks and the injection of false data by malicious nodes. Existing security mechanisms often fall short in addressing these challenges due to the real-time and mobile characteristics of VANETs. This paper proposes a Hybrid Explainable Artificial Intelligence (XAI) framework integrated with a Swin Vision Transformer for robust intrusion detection in VANET environments. The proposed model leverages the Swin Transformer's hierarchical feature extraction capabilities and the interpretability of XAI to accurately classify network nodes based on behavioral and transmission characteristics. Key features such as packet transmission duration, communication regularity, and node status are analyzed to detect anomalies and differentiate between benign and malicious nodes. The inclusion of explainability allows for transparent decision-making, facilitating trust and understanding in critical automotive applications. Simulation results validate the model's effectiveness in detecting a wide range of attack vectors while maintaining high accuracy and low false-positive rates. This study contributes to the development of adaptive, intelligent, and trustworthy security solutions for next-generation vehicular networks operating in complex urban traffic scenarios.

车辆自组织网络(VANETs)是智能交通系统(ITS)的基石,可实现高效的车对车和车对基础设施通信。然而,它们的开放和动态特性使它们极易受到安全威胁的影响,例如分布式拒绝服务(DDoS)攻击和恶意节点注入虚假数据。由于vanet的实时性和移动性,现有的安全机制往往无法应对这些挑战。本文提出了一种混合可解释人工智能(XAI)框架,结合Swin视觉变压器,用于VANET环境下的鲁棒入侵检测。该模型利用Swin Transformer的分层特征提取能力和XAI的可解释性,根据行为和传输特征对网络节点进行准确分类。通过分析报文传输时间、通信规则、节点状态等关键特征,发现异常,区分良性和恶意节点。包含可解释性允许透明的决策,促进关键汽车应用中的信任和理解。仿真结果验证了该模型在检测大范围攻击向量的同时保持较高的准确率和较低的误报率的有效性。本研究有助于开发在复杂城市交通场景下运行的下一代车辆网络的自适应、智能和可信赖的安全解决方案。
{"title":"Development of Hybrid Explainable Artificial Intelligence With Swin Vision Transformer Intrusion Detection for Securing VANETs From Attacks","authors":"Bharathiraja N,&nbsp;M. S. Minu,&nbsp;Richa Vijay,&nbsp;M. Rajalakshmi,&nbsp;Pellakuri Vidyullatha,&nbsp;K. Balamurugan","doi":"10.1002/ett.70280","DOIUrl":"https://doi.org/10.1002/ett.70280","url":null,"abstract":"<div>\u0000 \u0000 <p>Vehicular Ad-hoc Networks (VANETs) are a cornerstone of Intelligent Transportation Systems (ITS), enabling efficient vehicle-to-vehicle and vehicle-to-infrastructure communication. However, their open and dynamic nature makes them highly susceptible to security threats such as Distributed Denial of Service (DDoS) attacks and the injection of false data by malicious nodes. Existing security mechanisms often fall short in addressing these challenges due to the real-time and mobile characteristics of VANETs. This paper proposes a Hybrid Explainable Artificial Intelligence (XAI) framework integrated with a Swin Vision Transformer for robust intrusion detection in VANET environments. The proposed model leverages the Swin Transformer's hierarchical feature extraction capabilities and the interpretability of XAI to accurately classify network nodes based on behavioral and transmission characteristics. Key features such as packet transmission duration, communication regularity, and node status are analyzed to detect anomalies and differentiate between benign and malicious nodes. The inclusion of explainability allows for transparent decision-making, facilitating trust and understanding in critical automotive applications. Simulation results validate the model's effectiveness in detecting a wide range of attack vectors while maintaining high accuracy and low false-positive rates. This study contributes to the development of adaptive, intelligent, and trustworthy security solutions for next-generation vehicular networks operating in complex urban traffic scenarios.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145271779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EKMRS: Elliptic Key Modified Rivest Shamir Adleman Scheme for Secure Data Sharing and Authentication in Smart City Applications EKMRS:椭圆密钥改进的智慧城市应用中安全数据共享和认证的Rivest Shamir Adleman方案
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-05 DOI: 10.1002/ett.70265
Sheenam Naaz, Suraiya Parveen, Safdar Tanweer, Ihtiram Raza Khan

In the modern era, blockchain technology integrated with the Internet of Things (IoT) has emerged as a powerful segment for secured and translucent smart city applications. Initially, authentication forms the stepping stone for defense in different types of information systems; earlier approaches used in the context of single-side centralization were found faint and uncertain, with the enlarged single-point failure owing to external vulnerabilities. With the incorporation of an advanced authentication scheme, this research proposes the Elliptic Key-modified Rivest Shamir Adleman (EKMRS) scheme to overcome the tackles in existing techniques, thereby improving the security of applications. Moreover, the risks involved in identity fraud can be effectively minimized by blockchain technology that assures that public keys are verified using a decentralized consensus technique and stored securely. This combination not only secures communication channels but also includes a decentralized ledger for identity verification with tamper-proof evidence. The EKMRS utilizes the Elliptic Curve Digital Signature Algorithm that enhances the scalability enlargement and robust solution for a smart city environment, ensuring strong authentication. The experimental results demonstrate the effectiveness of the EKMRS scheme by offering significant improvements in terms of metrics, achieving 0.029 ms for decryption time, an encryption time of 0.39 ms, and an information loss of 0.13 with the students mark sheet dataset over the other recognized approaches.

在当今时代,区块链技术与物联网(IoT)相结合,已成为安全透明智慧城市应用的强大细分市场。最初,在不同类型的信息系统中,认证是防御的垫脚石;在单面集中化背景下使用的早期方法被发现模糊和不确定,由于外部脆弱性而扩大了单点故障。结合一种先进的认证方案,本文提出了改进椭圆密钥的Rivest Shamir Adleman (EKMRS)方案,克服了现有技术中的漏洞,从而提高了应用程序的安全性。此外,区块链技术可以有效地降低身份欺诈所涉及的风险,该技术确保使用分散的共识技术验证公钥并安全存储。这种组合不仅保护了通信渠道,而且还包括一个分散的分类账,用于身份验证和防篡改证据。EKMRS采用椭圆曲线数字签名算法,增强了智慧城市环境下的可扩展性和鲁棒性,确保了强认证。实验结果证明了EKMRS方案的有效性,在指标方面提供了显着的改进,与其他识别方法相比,解密时间为0.029 ms,加密时间为0.39 ms,学生标记表数据集的信息损失为0.13。
{"title":"EKMRS: Elliptic Key Modified Rivest Shamir Adleman Scheme for Secure Data Sharing and Authentication in Smart City Applications","authors":"Sheenam Naaz,&nbsp;Suraiya Parveen,&nbsp;Safdar Tanweer,&nbsp;Ihtiram Raza Khan","doi":"10.1002/ett.70265","DOIUrl":"https://doi.org/10.1002/ett.70265","url":null,"abstract":"<div>\u0000 \u0000 <p>In the modern era, blockchain technology integrated with the Internet of Things (IoT) has emerged as a powerful segment for secured and translucent smart city applications. Initially, authentication forms the stepping stone for defense in different types of information systems; earlier approaches used in the context of single-side centralization were found faint and uncertain, with the enlarged single-point failure owing to external vulnerabilities. With the incorporation of an advanced authentication scheme, this research proposes the Elliptic Key-modified Rivest Shamir Adleman (EKMRS) scheme to overcome the tackles in existing techniques, thereby improving the security of applications. Moreover, the risks involved in identity fraud can be effectively minimized by blockchain technology that assures that public keys are verified using a decentralized consensus technique and stored securely. This combination not only secures communication channels but also includes a decentralized ledger for identity verification with tamper-proof evidence. The EKMRS utilizes the Elliptic Curve Digital Signature Algorithm that enhances the scalability enlargement and robust solution for a smart city environment, ensuring strong authentication. The experimental results demonstrate the effectiveness of the EKMRS scheme by offering significant improvements in terms of metrics, achieving 0.029 ms for decryption time, an encryption time of 0.39 ms, and an information loss of 0.13 with the students mark sheet dataset over the other recognized approaches.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145271917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Misbehavior Detection With Collective Perception in V2X Networks: A Survey 基于V2X网络集体感知的不当行为检测研究
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-05 DOI: 10.1002/ett.70267
Mehmet Fatih Yuce, Mehmet Ali Erturk, Muhammed Ali Aydin

Recent years have seen tremendous progress in Autonomous Vehicle (AV) technology. Today, certain locations provide various levels of autonomy. Constrained environments, such as airports and golf clubs, may allow fully autonomous driving (AD). Meanwhile, many public roads have started providing Vehicle-to-Everything (V2X) capabilities, enabling AVs with driver intervention (DI). Yet, for future scenarios without DI, low-latency technologies, robust protocols, and secure communication mechanisms will be essential. However, dependence on computer algorithms introduces security concerns. A breach in an AV can result in serious injuries or even death. This issue requires next-generation vehicles to implement robust security solutions to prevent malicious attacks. This study discusses state-of-the-art security technologies, protocols, and organizations relevant to autonomous driving (AD) and autonomous vehicles (AVs). First, the paper explores concepts like V2X, Intrusion Detection Systems (IDS), and collaborative security measures. Then, it will discuss the state-of-the-art security studies from the perspective of misbehavior detection and collective perception. This survey fills a void in the literature (at the time of the writing). It is also a comprehensive V2X security guide on misbehavior detection, collective perception, and related technologies.

近年来,自动驾驶汽车(AV)技术取得了巨大进展。如今,某些地方提供了不同程度的自主权。机场和高尔夫俱乐部等受限环境可能允许完全自动驾驶(AD)。与此同时,许多公共道路已经开始提供车联网(V2X)功能,使自动驾驶汽车具备驾驶员干预(DI)功能。然而,对于没有DI的未来场景,低延迟技术、健壮的协议和安全的通信机制将是必不可少的。然而,对计算机算法的依赖会带来安全问题。AV的裂口可能导致严重的伤害甚至死亡。这个问题需要下一代车辆实现强大的安全解决方案来防止恶意攻击。本研究讨论了与自动驾驶(AD)和自动驾驶汽车(AVs)相关的最新安全技术、协议和组织。首先,本文探讨了V2X、入侵检测系统(IDS)和协作安全措施等概念。然后,它将从不当行为检测和集体感知的角度讨论最新的安全研究。这一调查填补了文献(写作时)的空白。它也是关于错误行为检测、集体感知和相关技术的综合V2X安全指南。
{"title":"Misbehavior Detection With Collective Perception in V2X Networks: A Survey","authors":"Mehmet Fatih Yuce,&nbsp;Mehmet Ali Erturk,&nbsp;Muhammed Ali Aydin","doi":"10.1002/ett.70267","DOIUrl":"https://doi.org/10.1002/ett.70267","url":null,"abstract":"<div>\u0000 \u0000 <p>Recent years have seen tremendous progress in Autonomous Vehicle (AV) technology. Today, certain locations provide various levels of autonomy. Constrained environments, such as airports and golf clubs, may allow fully autonomous driving (AD). Meanwhile, many public roads have started providing Vehicle-to-Everything (V2X) capabilities, enabling AVs with driver intervention (DI). Yet, for future scenarios without DI, low-latency technologies, robust protocols, and secure communication mechanisms will be essential. However, dependence on computer algorithms introduces security concerns. A breach in an AV can result in serious injuries or even death. This issue requires next-generation vehicles to implement robust security solutions to prevent malicious attacks. This study discusses state-of-the-art security technologies, protocols, and organizations relevant to autonomous driving (AD) and autonomous vehicles (AVs). First, the paper explores concepts like V2X, Intrusion Detection Systems (IDS), and collaborative security measures. Then, it will discuss the state-of-the-art security studies from the perspective of misbehavior detection and collective perception. This survey fills a void in the literature (at the time of the writing). It is also a comprehensive V2X security guide on misbehavior detection, collective perception, and related technologies.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145271918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Adaptive Extreme Learning Machine for Traffic Prediction and Multipath Routing Framework in Software Defined Networks With Hybrid Optimization Approach for Smart Hotel Applications 基于混合优化方法的智能酒店软件定义网络流量预测和多路径路由框架的自适应极限学习机
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-04 DOI: 10.1002/ett.70272
Illuru Rajasekhar, M. Monisha

Problem Statement

The revolutionary growth of software-defined networking (SDN) has provided a flexible framework to design and improve network management. In a wide range of networks, traffic congestion remains a major challenge. When handling massive amounts of data, it can easily lead to scalability issues due to the rapid network growth, which negatively impacts network performance. Therefore, traffic prediction becomes a quite challenging task. In addition, SDN has proven successful in various applications within wireless communication systems. For enabling better data transmission, efficient routing is essential. During the routing process, energy consumption and link breakage often increase, which limits overall network performance.

Methodology

A new traffic prediction and multipath routing model in SDN is developed based on machine learning techniques. The machine learning approach is utilized to develop an effective traffic prediction and multipath routing framework in the SDN system, considering flow rule space and Quality-of-Service constraints. Initially, the traffic present in the network is predicted using an Adaptive Extreme Learning Machine (A-ELM), whose parameters are tuned using the proposed Hybrid Position of Sheep Flock and Tunicate Swarm (HP-SFTS) algorithm. Here, routing performance is improved through the HP-SFTS, which effectively minimizes both the volume of routed traffic and the cost of communication path routing. In performance validation, the developed model accurately traces network traffic and also demonstrates resilience to noise in the training data.

Results

From the comparative analysis, the developed HP-SFTS-A-ELM model achieved scores of 37.25, 10.979, and 1387.6 in terms of root mean square error, mean absolute error, and mean squared error, respectively.

Implications of the Study

Considering the use of SDN in traffic prediction and multipath routing, this approach is primarily applicable in areas such as data center management, traffic engineering, and network slicing. SDN helps to enhance network performance by transmitting data through less congested routes, and it offers a better computational efficiency rate compared to classical techniques in different experimental analyses.

软件定义网络(SDN)的革命性发展为设计和改进网络管理提供了一个灵活的框架。在广泛的网络中,交通拥堵仍然是一个主要挑战。在处理大量数据时,由于网络的快速增长,很容易导致可伸缩性问题,从而对网络性能产生负面影响。因此,流量预测成为一项非常具有挑战性的任务。此外,SDN在无线通信系统的各种应用中已被证明是成功的。为了实现更好的数据传输,有效的路由是必不可少的。在路由过程中,能量消耗和链路中断往往会增加,从而限制了网络的整体性能。基于机器学习技术,提出了一种新的SDN流量预测和多径路由模型。在考虑流规则空间和服务质量约束的情况下,利用机器学习方法在SDN系统中开发有效的流量预测和多路径路由框架。首先,使用自适应极限学习机(A-ELM)预测网络中存在的流量,其参数使用提出的羊群和被膜群的混合位置(HP-SFTS)算法进行调整。在这里,通过HP-SFTS提高了路由性能,有效地减少了路由流量和通信路径路由的成本。在性能验证中,所开发的模型准确地跟踪了网络流量,并且在训练数据中显示了对噪声的弹性。结果HP-SFTS-A-ELM模型的均方根误差、平均绝对误差和均方误差分别为37.25分、10.979分和1387.6分。考虑到SDN在流量预测和多径路由中的应用,该方法主要适用于数据中心管理、流量工程和网络切片等领域。SDN通过较少拥塞的路由传输数据,有助于提高网络性能,并且在不同的实验分析中,与传统技术相比,它提供了更好的计算效率。
{"title":"A Novel Adaptive Extreme Learning Machine for Traffic Prediction and Multipath Routing Framework in Software Defined Networks With Hybrid Optimization Approach for Smart Hotel Applications","authors":"Illuru Rajasekhar,&nbsp;M. Monisha","doi":"10.1002/ett.70272","DOIUrl":"https://doi.org/10.1002/ett.70272","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Problem Statement</h3>\u0000 \u0000 <p>The revolutionary growth of software-defined networking (SDN) has provided a flexible framework to design and improve network management. In a wide range of networks, traffic congestion remains a major challenge. When handling massive amounts of data, it can easily lead to scalability issues due to the rapid network growth, which negatively impacts network performance. Therefore, traffic prediction becomes a quite challenging task. In addition, SDN has proven successful in various applications within wireless communication systems. For enabling better data transmission, efficient routing is essential. During the routing process, energy consumption and link breakage often increase, which limits overall network performance.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Methodology</h3>\u0000 \u0000 <p>A new traffic prediction and multipath routing model in SDN is developed based on machine learning techniques. The machine learning approach is utilized to develop an effective traffic prediction and multipath routing framework in the SDN system, considering flow rule space and Quality-of-Service constraints. Initially, the traffic present in the network is predicted using an Adaptive Extreme Learning Machine (A-ELM), whose parameters are tuned using the proposed Hybrid Position of Sheep Flock and Tunicate Swarm (HP-SFTS) algorithm. Here, routing performance is improved through the HP-SFTS, which effectively minimizes both the volume of routed traffic and the cost of communication path routing. In performance validation, the developed model accurately traces network traffic and also demonstrates resilience to noise in the training data.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Results</h3>\u0000 \u0000 <p>From the comparative analysis, the developed HP-SFTS-A-ELM model achieved scores of 37.25, 10.979, and 1387.6 in terms of root mean square error, mean absolute error, and mean squared error, respectively.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Implications of the Study</h3>\u0000 \u0000 <p>Considering the use of SDN in traffic prediction and multipath routing, this approach is primarily applicable in areas such as data center management, traffic engineering, and network slicing. SDN helps to enhance network performance by transmitting data through less congested routes, and it offers a better computational efficiency rate compared to classical techniques in different experimental analyses.</p>\u0000 </section>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145224368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MobStream: A Reinforcement-Driven Mobile Streaming Methodology Over Multipath QUIC MobStream:一种基于多路径QUIC的强化驱动移动流方法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-04 DOI: 10.1002/ett.70264
Yan Cui, Zongzheng Liang, Zicong Huang, Peng Guo, Shijie Jia

With the rapid growth of mobile communications, using mobile devices such as smartphones has become a trend. However, the limited uplink of the cellular network constrains the uploading quality. By integrating the link capacity of both cellular networks and WiFi, concurrent multipath transmission, such as multipath QUIC (MP-QUIC), becomes a promising solution for alleviating the uplink bottleneck issue. This paper proposes MobStream, a novel reinforcement learning-driven solution based on MP-QUIC. MobStream maximizes streaming capacity by fully utilizing the bandwidth of both WiFi and cellular networks through MP-QUIC. To address the issue of reduced performance caused by the differences in path quality between WiFi and cellular networks, MobStream incorporates partial reliability and a layered coding scheme, paving the way to adapt to varied network conditions without harming the bandwidth utilization. We formulate the concurrent transmission problem as a stochastic optimization task and demonstrate its solution using reinforcement learning methods. Furthermore, to ensure fairness in transmission among other single-path protocols, we further introduced a fairness factor to the reinforcement learning method. Extensive experiments demonstrate that MobStream outperforms state-of-the-art solutions in terms of bitrate, packet loss, and delay.

随着移动通信的快速发展,使用智能手机等移动设备已成为一种趋势。然而,蜂窝网络的上行链路有限,限制了上传质量。通过集成蜂窝网络和WiFi的链路容量,多路径QUIC (MP-QUIC)等并发多径传输成为缓解上行瓶颈问题的一种很有前景的解决方案。本文提出了一种基于MP-QUIC的新型强化学习驱动解决方案MobStream。MobStream通过MP-QUIC充分利用WiFi和蜂窝网络的带宽,最大限度地提高了流媒体容量。为了解决WiFi和蜂窝网络之间路径质量差异导致的性能下降问题,MobStream结合了部分可靠性和分层编码方案,为适应各种网络条件铺平了道路,同时又不损害带宽利用率。我们将并发传输问题表述为一个随机优化任务,并使用强化学习方法演示其解决方案。此外,为了确保其他单路径协议之间传输的公平性,我们进一步在强化学习方法中引入了公平性因子。大量的实验表明,MobStream在比特率、数据包丢失和延迟方面优于最先进的解决方案。
{"title":"MobStream: A Reinforcement-Driven Mobile Streaming Methodology Over Multipath QUIC","authors":"Yan Cui,&nbsp;Zongzheng Liang,&nbsp;Zicong Huang,&nbsp;Peng Guo,&nbsp;Shijie Jia","doi":"10.1002/ett.70264","DOIUrl":"https://doi.org/10.1002/ett.70264","url":null,"abstract":"<p>With the rapid growth of mobile communications, using mobile devices such as smartphones has become a trend. However, the limited uplink of the cellular network constrains the uploading quality. By integrating the link capacity of both cellular networks and WiFi, concurrent multipath transmission, such as multipath QUIC (MP-QUIC), becomes a promising solution for alleviating the uplink bottleneck issue. This paper proposes MobStream, a novel reinforcement learning-driven solution based on MP-QUIC. MobStream maximizes streaming capacity by fully utilizing the bandwidth of both WiFi and cellular networks through MP-QUIC. To address the issue of reduced performance caused by the differences in path quality between WiFi and cellular networks, MobStream incorporates partial reliability and a layered coding scheme, paving the way to adapt to varied network conditions without harming the bandwidth utilization. We formulate the concurrent transmission problem as a stochastic optimization task and demonstrate its solution using reinforcement learning methods. Furthermore, to ensure fairness in transmission among other single-path protocols, we further introduced a fairness factor to the reinforcement learning method. Extensive experiments demonstrate that MobStream outperforms state-of-the-art solutions in terms of bitrate, packet loss, and delay.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.70264","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145224031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
V2X Fusion Communication Framework Based on VANETS Collaborative Autonomous Driving 基于VANETS协同自动驾驶的V2X融合通信框架
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-04 DOI: 10.1002/ett.70263
Jinhua Yu, Guang Mei

The advancement of collaborative autonomous driving relies on robust and efficient data exchange between vehicles and surrounding infrastructure. Vehicle-to-everything (V2X) fusion communication frameworks, built upon vehicular ad hoc networks (VANETs), enable the integration of heterogeneous data sources to enhance environmental perception and decision-making. However, practical implementation faces significant challenges due to communication interruptions inherent in dynamic VANET environments, leading to incomplete cooperative perception and increased safety risks. To address these challenges, this research proposes a V2X fusion communication framework, incorporating communication-interruption-aware cooperative perception, to ensure reliable information exchange for autonomous vehicles operating in collaborative scenarios. The framework leverages historical cooperation information to compensate for missing data caused by communication disruptions. Furthermore, a communication stochastic temporal convolutional networks (STCN) prediction model is introduced to extract critical features under varying network conditions, enhancing predictive accuracy for lost information. The data were collected from an open-source platform, which includes multi-agent sensor data (LiDAR, radar, and camera), global positioning system (GPS), and timestamped V2X messages simulating realistic vehicular traffic and environmental conditions under varying communication qualities. Packet drop rates were emulated to reflect real-world VANET communication inconsistencies. Additionally, knowledge distillation techniques provide targeted supervision to the predictive model, while curriculum learning strategies stabilize the training process under complex VANET scenarios. The results of the experiments prove that the proposed framework enhanced the perception reliability, and collaborative performance, communication reliability, decreased latency, enhanced obstacle detection accuracy, and decreased error results, including MAE (0.11) and MSE (0.12). This VANET communication architecture is a fusion-based framework that provides reliable, efficient, and safe data-driven collaboration within a group of autonomous vehicles.

协作式自动驾驶的进步依赖于车辆与周围基础设施之间强大而高效的数据交换。建立在车辆自组织网络(vanet)基础上的车对一切(V2X)融合通信框架,使异构数据源能够集成,以增强环境感知和决策。然而,由于动态VANET环境固有的通信中断,实际实施面临着重大挑战,导致不完整的合作感知和增加的安全风险。为了应对这些挑战,本研究提出了一种V2X融合通信框架,结合通信中断感知协同感知,以确保在协作场景中运行的自动驾驶汽车的可靠信息交换。该框架利用历史合作信息来补偿由于通信中断而导致的数据丢失。此外,引入通信随机时间卷积网络(STCN)预测模型,提取不同网络条件下的关键特征,提高对丢失信息的预测精度。数据是从一个开源平台收集的,其中包括多智能体传感器数据(激光雷达、雷达和摄像头)、全球定位系统(GPS)和时间戳V2X消息,模拟了不同通信质量下的真实车辆交通和环境条件。数据包丢失率被模拟以反映真实世界VANET通信的不一致性。此外,知识蒸馏技术为预测模型提供了有针对性的监督,而课程学习策略则稳定了复杂VANET场景下的训练过程。实验结果表明,该框架提高了感知可靠性、协同性能、通信可靠性,降低了延迟,提高了障碍物检测精度,降低了误差结果,包括MAE(0.11)和MSE(0.12)。这种VANET通信架构是一种基于融合的框架,可在一组自动驾驶汽车中提供可靠、高效和安全的数据驱动协作。
{"title":"V2X Fusion Communication Framework Based on VANETS Collaborative Autonomous Driving","authors":"Jinhua Yu,&nbsp;Guang Mei","doi":"10.1002/ett.70263","DOIUrl":"https://doi.org/10.1002/ett.70263","url":null,"abstract":"<div>\u0000 \u0000 <p>The advancement of collaborative autonomous driving relies on robust and efficient data exchange between vehicles and surrounding infrastructure. Vehicle-to-everything (V2X) fusion communication frameworks, built upon vehicular ad hoc networks (VANETs), enable the integration of heterogeneous data sources to enhance environmental perception and decision-making. However, practical implementation faces significant challenges due to communication interruptions inherent in dynamic VANET environments, leading to incomplete cooperative perception and increased safety risks. To address these challenges, this research proposes a V2X fusion communication framework, incorporating communication-interruption-aware cooperative perception, to ensure reliable information exchange for autonomous vehicles operating in collaborative scenarios. The framework leverages historical cooperation information to compensate for missing data caused by communication disruptions. Furthermore, a communication stochastic temporal convolutional networks (STCN) prediction model is introduced to extract critical features under varying network conditions, enhancing predictive accuracy for lost information. The data were collected from an open-source platform, which includes multi-agent sensor data (LiDAR, radar, and camera), global positioning system (GPS), and timestamped V2X messages simulating realistic vehicular traffic and environmental conditions under varying communication qualities. Packet drop rates were emulated to reflect real-world VANET communication inconsistencies. Additionally, knowledge distillation techniques provide targeted supervision to the predictive model, while curriculum learning strategies stabilize the training process under complex VANET scenarios. The results of the experiments prove that the proposed framework enhanced the perception reliability, and collaborative performance, communication reliability, decreased latency, enhanced obstacle detection accuracy, and decreased error results, including MAE (0.11) and MSE (0.12). This VANET communication architecture is a fusion-based framework that provides reliable, efficient, and safe data-driven collaboration within a group of autonomous vehicles.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145224369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning-Enhanced DDoS Attack Detection and Mitigation in VANET Infrastructure VANET基础设施中机器学习增强的DDoS攻击检测和缓解
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-04 DOI: 10.1002/ett.70262
T. Gayathri, S. Uma Maheswari, S. Ponni Alias Sathya, T. Satyanarayana Murthy, Pramoda Patro

Vehicular ad-hoc networks (VANETs) are crucial for road safety, traffic management, and intelligent transportation systems, but they are vulnerable to Distributed Denial of Service (DDoS) attacks, which can severely disrupt communication between vehicles and Roadside Units (RSUs). Traditional DDoS detection methods in VANETs are often inefficient due to reliance on centralized architectures and handcrafted features. To address these challenges, we propose the Hybrid Deep Learning with Federated Learning (HDL-FL) framework, which leverages Convolutional Neural Networks (CNNs) to capture spatial and temporal traffic patterns. By utilizing Federated Learning, HDL-FL enables distributed, privacy-preserving training across RSUs and vehicles while reducing communication overhead. Experimental evaluations in simulated VANET environments show that HDL-FL achieves a 94% improvement in accuracy, a 30% reduction in false positives, and a 99% increase in attack detection rate while also reducing communication overhead by 6.5 s and latency by 160 ms. The framework offers a scalable, robust, and privacy-preserving solution for securing next-generation Vehicle-to-Everything (V2X) infrastructures, outperforming traditional models in terms of spatio-temporal accuracy and scalability. For performance validation, the HDL-FL framework is compared with baseline models, including traditional machine learning approaches such as Support Vector Machine, AI, and IoT.

车辆自组织网络(vanet)对于道路安全、交通管理和智能交通系统至关重要,但它们容易受到分布式拒绝服务(DDoS)攻击的攻击,这会严重破坏车辆与路边单元(rsu)之间的通信。由于依赖于集中式架构和手工制作的功能,vanet中传统的DDoS检测方法往往效率低下。为了应对这些挑战,我们提出了混合深度学习与联邦学习(HDL-FL)框架,该框架利用卷积神经网络(cnn)来捕获空间和时间流量模式。通过使用联邦学习,HDL-FL可以在rsu和车辆之间进行分布式、保护隐私的培训,同时减少通信开销。在模拟VANET环境中的实验评估表明,HDL-FL的准确率提高了94%,误报率降低了30%,攻击检测率提高了99%,同时还将通信开销降低了6.5 s,延迟降低了160 ms。该框架为下一代车联网(V2X)基础设施提供了可扩展、健壮且保护隐私的解决方案,在时空精度和可扩展性方面优于传统模型。为了进行性能验证,将HDL-FL框架与基线模型进行比较,包括传统的机器学习方法,如支持向量机、人工智能和物联网。
{"title":"Machine Learning-Enhanced DDoS Attack Detection and Mitigation in VANET Infrastructure","authors":"T. Gayathri,&nbsp;S. Uma Maheswari,&nbsp;S. Ponni Alias Sathya,&nbsp;T. Satyanarayana Murthy,&nbsp;Pramoda Patro","doi":"10.1002/ett.70262","DOIUrl":"https://doi.org/10.1002/ett.70262","url":null,"abstract":"<div>\u0000 \u0000 <p>Vehicular ad-hoc networks (VANETs) are crucial for road safety, traffic management, and intelligent transportation systems, but they are vulnerable to Distributed Denial of Service (DDoS) attacks, which can severely disrupt communication between vehicles and Roadside Units (RSUs). Traditional DDoS detection methods in VANETs are often inefficient due to reliance on centralized architectures and handcrafted features. To address these challenges, we propose the Hybrid Deep Learning with Federated Learning (HDL-FL) framework, which leverages Convolutional Neural Networks (CNNs) to capture spatial and temporal traffic patterns. By utilizing Federated Learning, HDL-FL enables distributed, privacy-preserving training across RSUs and vehicles while reducing communication overhead. Experimental evaluations in simulated VANET environments show that HDL-FL achieves a 94% improvement in accuracy, a 30% reduction in false positives, and a 99% increase in attack detection rate while also reducing communication overhead by 6.5 s and latency by 160 ms. The framework offers a scalable, robust, and privacy-preserving solution for securing next-generation Vehicle-to-Everything (V2X) infrastructures, outperforming traditional models in terms of spatio-temporal accuracy and scalability. For performance validation, the HDL-FL framework is compared with baseline models, including traditional machine learning approaches such as Support Vector Machine, AI, and IoT.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145224322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient and Secure WBAN Based on Optimal Privacy Preservation Scheme With Deep Learning and Blockchain Technology 基于深度学习和区块链技术的高效安全WBAN最优隐私保护方案
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-02 DOI: 10.1002/ett.70266
Balasubramanian Chandra, Subramanian Kanaga Suba Raja, Suresh Sudha

Securing the trustworthiness, privacy, and legitimacy of shared medical data in Wireless Body Area Network (WBAN) is a primary concern. Hence, a blockchain technology-based secure medical data storage scheme is developed in this paper. This developed model includes four primary phases. Before initializing, the WBAN data are collected. In the first phase, the user authentication is verified. For this purpose, the user's iris images are aggregated. These iris images are subjected to the Residual Attention Network (RAN). From the RAN, the user is authorized, and then security keys are given to the authorized user. Only after verifying the authentication of the user, the healthcare data is allowed to be stored in the blockchain. In the second phase, data sanitization takes place. The obtained WBAN medical data are sanitized using a data sanitization process with the optimal keys obtained from the Fusion of Golden Eagle and Eurasian Oystercatcher Optimization Algorithm (FGE-EOOA). Here, the data are encrypted by employing the Rivest-Shamir-Adleman (RSA) approach, and then encrypted medical data are stored in the blockchain. This ensures multi-step data security, which allows secure storage of WBAN healthcare data in the blockchain. While retrieving the stored data, the user authentication is verified on the user side, as well as in the same RAN model. This is the third phase of the developed model. When the user is proven to be an authorized one, the stored data in the blockchain corresponding to that particular user is retrieved. Using the data restoration process, which is the fourth phase of the developed model, the actual medical data is retrieved. If the user is unauthorized, then no access is provided to them. This ensures a multi-level of security for storing and retrieving data from the blockchain. The security offered by this model is evaluated and validated by contrasting and comparing it with other conventional data transfer methods.

确保无线体域网络(WBAN)中共享医疗数据的可信度、隐私性和合法性是一个主要问题。为此,本文提出了一种基于区块链技术的医疗数据安全存储方案。这个发展的模型包括四个主要阶段。在初始化之前,收集WBAN数据。在第一阶段,验证用户身份验证。为此,用户的虹膜图像被聚合。这些虹膜图像经过剩余注意网络(RAN)处理。从RAN中对用户进行授权,然后向授权用户提供安全密钥。只有在验证用户身份验证后,才允许将医疗保健数据存储在区块链中。在第二阶段,进行数据清理。利用金鹰与欧亚捕牡蛎优化算法(FGE-EOOA)融合得到的最优密钥对获取的WBAN医疗数据进行数据消毒。在这里,通过使用RSA (Rivest-Shamir-Adleman)方法对数据进行加密,然后将加密的医疗数据存储在区块链中。这可确保多步骤数据安全性,从而允许在区块链中安全地存储WBAN医疗保健数据。在检索存储的数据时,在用户端以及在相同的RAN模型中验证用户身份验证。这是已开发模型的第三阶段。当证明该用户是经过授权的用户时,将检索与该特定用户对应的区块链中存储的数据。使用数据恢复过程(这是所开发模型的第四个阶段)检索实际的医疗数据。如果用户未经授权,则不向他们提供访问权限。这确保了从区块链存储和检索数据的多级安全性。通过与其他传统数据传输方法的对比,对该模型的安全性进行了评价和验证。
{"title":"An Efficient and Secure WBAN Based on Optimal Privacy Preservation Scheme With Deep Learning and Blockchain Technology","authors":"Balasubramanian Chandra,&nbsp;Subramanian Kanaga Suba Raja,&nbsp;Suresh Sudha","doi":"10.1002/ett.70266","DOIUrl":"https://doi.org/10.1002/ett.70266","url":null,"abstract":"<div>\u0000 \u0000 <p>Securing the trustworthiness, privacy, and legitimacy of shared medical data in Wireless Body Area Network (WBAN) is a primary concern. Hence, a blockchain technology-based secure medical data storage scheme is developed in this paper. This developed model includes four primary phases. Before initializing, the WBAN data are collected. In the first phase, the user authentication is verified. For this purpose, the user's iris images are aggregated. These iris images are subjected to the Residual Attention Network (RAN). From the RAN, the user is authorized, and then security keys are given to the authorized user. Only after verifying the authentication of the user, the healthcare data is allowed to be stored in the blockchain. In the second phase, data sanitization takes place. The obtained WBAN medical data are sanitized using a data sanitization process with the optimal keys obtained from the Fusion of Golden Eagle and Eurasian Oystercatcher Optimization Algorithm (FGE-EOOA). Here, the data are encrypted by employing the Rivest-Shamir-Adleman (RSA) approach, and then encrypted medical data are stored in the blockchain. This ensures multi-step data security, which allows secure storage of WBAN healthcare data in the blockchain. While retrieving the stored data, the user authentication is verified on the user side, as well as in the same RAN model. This is the third phase of the developed model. When the user is proven to be an authorized one, the stored data in the blockchain corresponding to that particular user is retrieved. Using the data restoration process, which is the fourth phase of the developed model, the actual medical data is retrieved. If the user is unauthorized, then no access is provided to them. This ensures a multi-level of security for storing and retrieving data from the blockchain. The security offered by this model is evaluated and validated by contrasting and comparing it with other conventional data transfer methods.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145224064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensive Decision-Making for Picking and Replenishment in a DQN-Based Hybrid “Parts-To-Picker” Order Picking System 基于dqn的混合“零件到拣货人”拣货系统的拣货和补货综合决策
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-02 DOI: 10.1002/ett.70277
Xin Wang, Yaohua Wu

Some large distribution centers have introduced a hybrid “parts-to-picker” order picking system consisting of a pallet warehouse and a tote warehouse to meet diverse order requirements. This system enables collaborative operations between two warehouses during picking and centralized replenishment processes. Additionally, it innovatively allows surplus goods remaining on pallets after picking to be replenished into the tote warehouse. Therefore, making informed decisions during operations such as picking, centralized replenishment, and picking replenishment will significantly enhance overall warehouse operational efficiency. However, to the best of our knowledge, such research has not yet been conducted. This paper addresses the comprehensive decision-making problem of replenishment and picking in a hybrid “parts-to-picker” order picking system. To solve it, we propose an intelligent decision-making framework based on deep reinforcement learning (DQN). We design a state space that incorporates predictive orders, composite warehouse inventory, and warehouse unit status. Furthermore, we design an action space that includes centralized replenishment, picking replenishment, and picking actions. This approach ultimately achieves three objectives: the allocation of quantities for pallet and tote picking, the allocation of quantities for centralized replenishment, and decisions on whether to replenish after picking. The DQN model also combines a reward function that includes penalty factors with an -greedy decay strategy, effectively improving the goal of order processing efficiency. The experimental results show that, compared with traditional scheduling strategies and intelligent algorithms, the decision-making model trained by the DQN architecture proposed in this paper can respond quickly in the comprehensive decision-making of picking and replenishment in a hybrid “parts-to-picker” order picking system, and can significantly improve system efficiency. The DQN model improves efficiency by approximately 44% and 17% compared to empirical decision-making and meta-heuristic algorithms, respectively. This study provides a solution that combines theoretical innovation and engineering feasibility for the multi-functional collaborative optimization of smart warehouse logistics systems, demonstrating significant practical value.

一些大型配送中心引入了由托盘仓库和手提袋仓库组成的混合“零件到拾取者”订单拾取系统,以满足不同的订单需求。该系统使两个仓库之间的协作操作在拣选和集中补充过程中。此外,它创新地允许剩余货物在挑选后留在托盘上被补充到手提袋仓库。因此,在拣货、集中补货、拣货补货等操作过程中做出明智的决策,将显著提高仓库的整体运营效率。然而,据我们所知,还没有进行过这样的研究。研究了混合“零件到拣货人”拣货系统中补货和拣货的综合决策问题。为了解决这个问题,我们提出了一个基于深度强化学习(DQN)的智能决策框架。我们设计了一个包含预测订单、复合仓库库存和仓库单元状态的状态空间。此外,我们设计了一个行动空间,包括集中补货、拣货补货和拣货动作。这种方法最终实现了三个目标:托盘和手提袋拣货的数量分配,集中补货的数量分配,拣货后是否补货的决定。DQN模型还将包含惩罚因子的奖励函数与贪心衰减策略相结合,有效地提高了订单处理效率的目标。实验结果表明,与传统的调度策略和智能算法相比,本文提出的DQN架构训练的决策模型能够快速响应混合“零件到拣货人”订单拣货系统的拣货和补货综合决策,显著提高系统效率。与经验决策和元启发式算法相比,DQN模型分别提高了约44%和17%的效率。本研究为智能仓储物流系统的多功能协同优化提供了理论创新与工程可行性相结合的解决方案,具有重要的实用价值。
{"title":"Comprehensive Decision-Making for Picking and Replenishment in a DQN-Based Hybrid “Parts-To-Picker” Order Picking System","authors":"Xin Wang,&nbsp;Yaohua Wu","doi":"10.1002/ett.70277","DOIUrl":"https://doi.org/10.1002/ett.70277","url":null,"abstract":"<div>\u0000 \u0000 <p>Some large distribution centers have introduced a hybrid “parts-to-picker” order picking system consisting of a pallet warehouse and a tote warehouse to meet diverse order requirements. This system enables collaborative operations between two warehouses during picking and centralized replenishment processes. Additionally, it innovatively allows surplus goods remaining on pallets after picking to be replenished into the tote warehouse. Therefore, making informed decisions during operations such as picking, centralized replenishment, and picking replenishment will significantly enhance overall warehouse operational efficiency. However, to the best of our knowledge, such research has not yet been conducted. This paper addresses the comprehensive decision-making problem of replenishment and picking in a hybrid “parts-to-picker” order picking system. To solve it, we propose an intelligent decision-making framework based on deep reinforcement learning (DQN). We design a state space that incorporates predictive orders, composite warehouse inventory, and warehouse unit status. Furthermore, we design an action space that includes centralized replenishment, picking replenishment, and picking actions. This approach ultimately achieves three objectives: the allocation of quantities for pallet and tote picking, the allocation of quantities for centralized replenishment, and decisions on whether to replenish after picking. The DQN model also combines a reward function that includes penalty factors with an <span></span><math></math>-greedy decay strategy, effectively improving the goal of order processing efficiency. The experimental results show that, compared with traditional scheduling strategies and intelligent algorithms, the decision-making model trained by the DQN architecture proposed in this paper can respond quickly in the comprehensive decision-making of picking and replenishment in a hybrid “parts-to-picker” order picking system, and can significantly improve system efficiency. The DQN model improves efficiency by approximately 44% and 17% compared to empirical decision-making and meta-heuristic algorithms, respectively. This study provides a solution that combines theoretical innovation and engineering feasibility for the multi-functional collaborative optimization of smart warehouse logistics systems, demonstrating significant practical value.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145224039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Transactions on Emerging Telecommunications Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1