Pub Date : 2024-07-24DOI: 10.1007/s11276-024-03815-0
L. Madhuridevi, N. V. S. Sree Rathna Lakshmi
The growth of social networks and cloud computing has resulted in the production of enormous amounts of data, which poses significant challenges for intrusion detection systems (IDS). Big data management in the IDS system presents several important issues, such as delayed reaction times, imbalanced datasets, reduced detection rates, and false alarm rates. To overcome those drawbacks, this work introduces a novel Intrusion Detection System from the perspective of big data handling. Here, input data is handled with the Apache Spark. In the first phase (preprocessing), improved min–max normalization is performed. Subsequently, improved correlation and flow features are extracted since the information extraction from the data is more important to determine the appropriate class differences during attack detection. Subsequently, intrusion detection is done by a hybrid model, which fuses the long short term memory and optimized convolutional neural network (CNN). Then, the optimization-assisted training algorithm called elephant adapted cat swarm optimization (EA-CSO) is proposed that tunes the optimal weights of CNN to enhance the performance of detection. Finally, the performance of the adopted model is validated over the traditional models in terms of positive, negative and other metrics, and the proposed work shows its better performance over the other models. The accuracy of detecting the intrusions using the HC + EA-CSO model at 90th LP is high around 95.029 while other conventional models obtain minimal accuracy.
{"title":"Metaheuristic assisted hybrid deep classifiers for intrusion detection: a bigdata perspective","authors":"L. Madhuridevi, N. V. S. Sree Rathna Lakshmi","doi":"10.1007/s11276-024-03815-0","DOIUrl":"https://doi.org/10.1007/s11276-024-03815-0","url":null,"abstract":"<p>The growth of social networks and cloud computing has resulted in the production of enormous amounts of data, which poses significant challenges for intrusion detection systems (IDS). Big data management in the IDS system presents several important issues, such as delayed reaction times, imbalanced datasets, reduced detection rates, and false alarm rates. To overcome those drawbacks, this work introduces a novel Intrusion Detection System from the perspective of big data handling. Here, input data is handled with the Apache Spark. In the first phase (preprocessing), improved min–max normalization is performed. Subsequently, improved correlation and flow features are extracted since the information extraction from the data is more important to determine the appropriate class differences during attack detection. Subsequently, intrusion detection is done by a hybrid model, which fuses the long short term memory and optimized convolutional neural network (CNN). Then, the optimization-assisted training algorithm called elephant adapted cat swarm optimization (EA-CSO) is proposed that tunes the optimal weights of CNN to enhance the performance of detection. Finally, the performance of the adopted model is validated over the traditional models in terms of positive, negative and other metrics, and the proposed work shows its better performance over the other models. The accuracy of detecting the intrusions using the HC + EA-CSO model at 90th LP is high around 95.029 while other conventional models obtain minimal accuracy.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"33 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141772782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-20DOI: 10.1007/s11276-024-03810-5
A. Sandana Karuppan, N. Bhalaji
Load balancing is essential in cloud computing (CC) to manage the increasing load on servers efficiently. This article proposes a load balancing strategy utilizing constraint measures to distribute the load evenly amongst the servers while minimizing power consumption. Firstly, the capacity and load of every Virtual Machine (VM) is evaluated, and tasks are assigned using the African Vultures Algorithm (AVA) when the load exceeds a predefined threshold. This approach aim is to minimize energy consumption, makespan, and data center usage. Additionally, a load balancing method computes critical features for each VM and assesses their load, followed by calculating selection factors for tasks. Tasks with superior selection factors are assigned to VMs. The proposed Efficient Load Balancing in Cloud Computing under African Vultures Algorithm (ELB-CC-AVA) demonstrates better performance in cloud environments, achieving lower makespan by 32.82%, 30.47%, and 25.32%, along with higher resource utilization rates of 38.22%, 40.21%, and 25.46% compared to the existing methods.
{"title":"Efficient load balancing strategy for cloud computing environment with African vultures algorithm","authors":"A. Sandana Karuppan, N. Bhalaji","doi":"10.1007/s11276-024-03810-5","DOIUrl":"https://doi.org/10.1007/s11276-024-03810-5","url":null,"abstract":"<p>Load balancing is essential in cloud computing (CC) to manage the increasing load on servers efficiently. This article proposes a load balancing strategy utilizing constraint measures to distribute the load evenly amongst the servers while minimizing power consumption. Firstly, the capacity and load of every Virtual Machine (VM) is evaluated, and tasks are assigned using the African Vultures Algorithm (AVA) when the load exceeds a predefined threshold. This approach aim is to minimize energy consumption, makespan, and data center usage. Additionally, a load balancing method computes critical features for each VM and assesses their load, followed by calculating selection factors for tasks. Tasks with superior selection factors are assigned to VMs. The proposed Efficient Load Balancing in Cloud Computing under African Vultures Algorithm (ELB-CC-AVA) demonstrates better performance in cloud environments, achieving lower makespan by 32.82%, 30.47%, and 25.32%, along with higher resource utilization rates of 38.22%, 40.21%, and 25.46% compared to the existing methods.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"27 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141737094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In securing wireless communication, radio-frequency (RF) fingerprints, rooted in physical-layer security, are seriously affected by various types of noise. As a result, effective RF fingerprint extraction and identification for device authentication present a significant challenge. To address this, we propose a comprehensive and robust approach using continuous wavelet transform (CWT) for RF feature extraction, along with U-Net for RFF identification. Initially, the received signal undergoes CWT into a stable time-frequency representation, while the U-Net algorithm is employed to denoise in RFF feature extraction and identification. The experiment results show, remarkable accuracies of 95.4% and 89.5% are achieved (SNR@ 10dB and 5dB), respectively, for 11 Wi-Fi devices with the same model. This underscores the potential of the proposed algorithms to enhance wireless communication security, providing a valuable contribution to RFF identification.
{"title":"Efficient feature extraction of radio-frequency fingerprint using continuous wavelet transform","authors":"Mutala Mohammed, Xinyong Peng, Zhi Chai, Mingye Li, Rahel Abayneh, Xuelin Yang","doi":"10.1007/s11276-024-03817-y","DOIUrl":"https://doi.org/10.1007/s11276-024-03817-y","url":null,"abstract":"<p>In securing wireless communication, radio-frequency (RF) fingerprints, rooted in physical-layer security, are seriously affected by various types of noise. As a result, effective RF fingerprint extraction and identification for device authentication present a significant challenge. To address this, we propose a comprehensive and robust approach using continuous wavelet transform (CWT) for RF feature extraction, along with U-Net for RFF identification. Initially, the received signal undergoes CWT into a stable time-frequency representation, while the U-Net algorithm is employed to denoise in RFF feature extraction and identification. The experiment results show, remarkable accuracies of 95.4% and 89.5% are achieved (SNR@ 10dB and 5dB), respectively, for 11 Wi-Fi devices with the same model. This underscores the potential of the proposed algorithms to enhance wireless communication security, providing a valuable contribution to RFF identification.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"14 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141737092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-17DOI: 10.1007/s11276-024-03814-1
Saeed Jamshidiha, Vahid Pourahmadi, Abbas Mohammadi, Mehdi Bennis
This research investigates power allocation in wireless device-to-device (D2D) networks using spatio-temporal graph neural networks (STGNNs). Specifically, we address the challenge of sum-rate maximization in D2D networks by formulating it as a reinforcement learning problem. In our approach, STGNNs act as agents, generating optimal power allocations to maximize the reward function, which is the overall sum-rate of the network. Our study operates under the realistic assumption of delayed, local channel state information (CSI). Various user mobility patterns, including constant positions, velocities, and accelerations are simulated. The robustness of our proposed method is evaluated against delayed and noisy CSI, which are crucial factors in real-world scenarios. Furthermore, the fairness of our approach is compared to the well-established load-spillage algorithm, which is guaranteed to converge to the globally optimal solution of the alpha-fair utility maximization problem. Finally, the convergence behavior of our method is analyzed in comparison to the policy gradient approach. Our empirical results demonstrate that the proposed STGNN significantly outperforms both the WMMSE benchmark and memoryless graph neural networks (GNNs) across all simulated scenarios, and converges to the globally optimal solution of the load-spillage algorithm, with lower computational complexity. Specifically, it achieves a remarkable performance gap of over 400% compared to the WMMSE algorithm and approximately 10% improvement over the memoryless GNN. These findings underscore the efficacy of STGNNs in addressing power allocation challenges in wireless D2D networks.
{"title":"Power allocation using spatio-temporal graph neural networks and reinforcement learning","authors":"Saeed Jamshidiha, Vahid Pourahmadi, Abbas Mohammadi, Mehdi Bennis","doi":"10.1007/s11276-024-03814-1","DOIUrl":"https://doi.org/10.1007/s11276-024-03814-1","url":null,"abstract":"<p>This research investigates power allocation in wireless device-to-device (D2D) networks using spatio-temporal graph neural networks (STGNNs). Specifically, we address the challenge of sum-rate maximization in D2D networks by formulating it as a reinforcement learning problem. In our approach, STGNNs act as agents, generating optimal power allocations to maximize the reward function, which is the overall sum-rate of the network. Our study operates under the realistic assumption of delayed, local channel state information (CSI). Various user mobility patterns, including constant positions, velocities, and accelerations are simulated. The robustness of our proposed method is evaluated against delayed and noisy CSI, which are crucial factors in real-world scenarios. Furthermore, the fairness of our approach is compared to the well-established load-spillage algorithm, which is guaranteed to converge to the globally optimal solution of the alpha-fair utility maximization problem. Finally, the convergence behavior of our method is analyzed in comparison to the policy gradient approach. Our empirical results demonstrate that the proposed STGNN significantly outperforms both the WMMSE benchmark and memoryless graph neural networks (GNNs) across all simulated scenarios, and converges to the globally optimal solution of the load-spillage algorithm, with lower computational complexity. Specifically, it achieves a remarkable performance gap of over 400% compared to the WMMSE algorithm and approximately 10% improvement over the memoryless GNN. These findings underscore the efficacy of STGNNs in addressing power allocation challenges in wireless D2D networks.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"50 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141721451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Energy efficiency (EE) is a key enabler for sustainable green millimeter wave (mmWave) communication. However, conventional hybrid beamforming methods suffer from energy efficiency performance loss due to hardware limitations and the connected structure. To overcome these limitations, this work investigates a novel adaptive connected (AC) hybrid beamforming (HBF) design for multi-user mmWave systems. We formulate the problem as an EE maximization problem subject to the constraints of the adaptive connected structure, constant modulus, and power budget. Addressing this complicated non-convex problem, we harness the characteristics of the AC structure and introduce an iterative HBF design algorithm grounded in fractional programming. Numerical results demonstrate the effectiveness and flexibility of the proposed AC-based HBF design in terms of EE enhancement.
能效(EE)是实现可持续绿色毫米波(mmWave)通信的关键因素。然而,由于硬件限制和连接结构,传统的混合波束成形方法存在能效性能损失。为了克服这些局限性,这项工作研究了一种适用于多用户毫米波系统的新型自适应连接(AC)混合波束成形(HBF)设计。我们将该问题表述为一个 EE 最大化问题,该问题受到自适应连接结构、恒定模数和功率预算的约束。针对这一复杂的非凸问题,我们利用交流结构的特点,引入了一种基于分数编程的迭代 HBF 设计算法。数值结果表明了所提出的基于交流的 HBF 设计在增强 EE 方面的有效性和灵活性。
{"title":"Adaptive connected hybrid beamforming for energy efficiency maximization in multi-user millimeter wave systems","authors":"Guangyi Chen, Ruoyu Zhang, Chen Miao, Yue Ma, Wen Wu","doi":"10.1007/s11276-024-03809-y","DOIUrl":"https://doi.org/10.1007/s11276-024-03809-y","url":null,"abstract":"<p>Energy efficiency (EE) is a key enabler for sustainable green millimeter wave (mmWave) communication. However, conventional hybrid beamforming methods suffer from energy efficiency performance loss due to hardware limitations and the connected structure. To overcome these limitations, this work investigates a novel adaptive connected (AC) hybrid beamforming (HBF) design for multi-user mmWave systems. We formulate the problem as an EE maximization problem subject to the constraints of the adaptive connected structure, constant modulus, and power budget. Addressing this complicated non-convex problem, we harness the characteristics of the AC structure and introduce an iterative HBF design algorithm grounded in fractional programming. Numerical results demonstrate the effectiveness and flexibility of the proposed AC-based HBF design in terms of EE enhancement.\u0000</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"2 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141574556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-10DOI: 10.1007/s11276-024-03806-1
B. Vijaya Nirmala, K. Selvaraj
The most crucial thing about the Wireless Sensor Network (WSN) application is the validation of dangerous as well as remote sensing fields, which are expensive to perform by human insights. Further, these features may lead to the self-managed networking model, in which it faces numerous confronts in the network lifetime, fault tolerance, and energy consumption depending upon the non-renewable energy resources. The major advantages of the WSNs are regarded as the monitoring process as well as the nodes used in this network model are positioned commonly in harsh environments. Network management and its efficiency are considered as the most significant factor in network operation. Then, the faults in the WSN have been categorized in terms of persistence, behavior, and underlying causes according to the observation time. Due to its underlying causes in the WSN, the faults are categorized as incorrect computation fault, timing, omission, crash, and fail and stop. Consequently, due to the persistence, the faults are then categorized as a transient fault, intermittent, and permanent, and due to the behaviors, the fault is categorized as a soft and hard fault. As the recent conventional fault detection models failed to provide significant applications in WSN, this work suggests a new way of performing fault tolerance in WSN. In this research, a newly derived technique is implemented by using two functions like energy level checker and a routing manager for fault tolerance to detect malicious nodes in WSN. Here, the Energy level checker checks the residual energy for each communication. If the energy dissipation for a particular communication is less or higher than the threshold it does not send the packet, instead, it forwards the warning messages of the transmitted node that is further sent to the energy level checker. Next, the routing manager sends the path verification packets to the path, if acknowledgment is received, then, the packet is transmitted, and also Certificate Authority is issued to the trusted node based upon the amount of data packets transmitted and the amount of data packets that are successfully obtained. Finally, the prevention of fault nodes is done by selecting the trusted node using a new optimization algorithm known as the Modified Sandpiper Optimization Algorithm derived from the Sandpiper Optimization Algorithm. Another contribution of this WSN network for routing is the Cluster Head selection, which is carried out by solving the multi-objective function regarding constraints like trust, residual energy, distance, and delay. Moreover, the simulations have shown comparatively more success over others.
{"title":"Malicious node detection in wireless sensor network using modified sandpiper optimization algorithm","authors":"B. Vijaya Nirmala, K. Selvaraj","doi":"10.1007/s11276-024-03806-1","DOIUrl":"https://doi.org/10.1007/s11276-024-03806-1","url":null,"abstract":"<p>The most crucial thing about the Wireless Sensor Network (WSN) application is the validation of dangerous as well as remote sensing fields, which are expensive to perform by human insights. Further, these features may lead to the self-managed networking model, in which it faces numerous confronts in the network lifetime, fault tolerance, and energy consumption depending upon the non-renewable energy resources. The major advantages of the WSNs are regarded as the monitoring process as well as the nodes used in this network model are positioned commonly in harsh environments. Network management and its efficiency are considered as the most significant factor in network operation. Then, the faults in the WSN have been categorized in terms of persistence, behavior, and underlying causes according to the observation time. Due to its underlying causes in the WSN, the faults are categorized as incorrect computation fault, timing, omission, crash, and fail and stop. Consequently, due to the persistence, the faults are then categorized as a transient fault, intermittent, and permanent, and due to the behaviors, the fault is categorized as a soft and hard fault. As the recent conventional fault detection models failed to provide significant applications in WSN, this work suggests a new way of performing fault tolerance in WSN. In this research, a newly derived technique is implemented by using two functions like energy level checker and a routing manager for fault tolerance to detect malicious nodes in WSN. Here, the Energy level checker checks the residual energy for each communication. If the energy dissipation for a particular communication is less or higher than the threshold it does not send the packet, instead, it forwards the warning messages of the transmitted node that is further sent to the energy level checker. Next, the routing manager sends the path verification packets to the path, if acknowledgment is received, then, the packet is transmitted, and also Certificate Authority is issued to the trusted node based upon the amount of data packets transmitted and the amount of data packets that are successfully obtained. Finally, the prevention of fault nodes is done by selecting the trusted node using a new optimization algorithm known as the Modified Sandpiper Optimization Algorithm derived from the Sandpiper Optimization Algorithm. Another contribution of this WSN network for routing is the Cluster Head selection, which is carried out by solving the multi-objective function regarding constraints like trust, residual energy, distance, and delay. Moreover, the simulations have shown comparatively more success over others.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"3 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141574557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-09DOI: 10.1007/s11276-024-03808-z
Xintong Zhou, Zhimin Huang, Kun Xiao
In the energy harvesting self-sustaining distributed base-station system (SS-DBS), the problem of optimal resource allocation for secure transmission at the downlink physical layer is studied, including the energy sharing mode, the power allocation, and the remote radio frequency unit (RRFU) selection. First, considering the existence of the eavesdropping user, an SS-DBS model, consisting of a baseband processing subsystem, an energy subsystem, and a radio frequency subsystem, is established for downlink secure transmission at the physical layer. Among the model, the remote radio frequency units are divided into secure remote radio frequency units that transmit secure information to the legitimate user and friendly cooperative remote radio frequency units that transmit artificial noise to interfere with the eavesdropping user. On this basis, a joint optimization problem of energy sharing, power allocation, and RRFU selection with the objective of maximizing the secure information rate of system is formulated. To solve this optimization problem, the problem is decomposed into an energy scheduling optimization subproblem and a RRFU selection optimization subproblem to solve separately. Through mathematical analysis and solution, the condition for the SS-DBS to adopt the partial energy sharing mode or the full energy sharing mode, the optimal power allocation of the RRFUs, and the RRFU selection algorithm for secure transmission at the physical layer of the SS-DBS downlink are obtained. Finally, Monte Carlo simulation is carried out and the simulation results verify the validity of the model and also show that the proposed algorithm has superior performance in terms of secure information rate and secure energy efficiency.
{"title":"Remote radio frequency unit selection of self-sustaining distributed base-station system based on downlink physical layer secure transmission","authors":"Xintong Zhou, Zhimin Huang, Kun Xiao","doi":"10.1007/s11276-024-03808-z","DOIUrl":"https://doi.org/10.1007/s11276-024-03808-z","url":null,"abstract":"<p>In the energy harvesting self-sustaining distributed base-station system (SS-DBS), the problem of optimal resource allocation for secure transmission at the downlink physical layer is studied, including the energy sharing mode, the power allocation, and the remote radio frequency unit (RRFU) selection. First, considering the existence of the eavesdropping user, an SS-DBS model, consisting of a baseband processing subsystem, an energy subsystem, and a radio frequency subsystem, is established for downlink secure transmission at the physical layer. Among the model, the remote radio frequency units are divided into secure remote radio frequency units that transmit secure information to the legitimate user and friendly cooperative remote radio frequency units that transmit artificial noise to interfere with the eavesdropping user. On this basis, a joint optimization problem of energy sharing, power allocation, and RRFU selection with the objective of maximizing the secure information rate of system is formulated. To solve this optimization problem, the problem is decomposed into an energy scheduling optimization subproblem and a RRFU selection optimization subproblem to solve separately. Through mathematical analysis and solution, the condition for the SS-DBS to adopt the partial energy sharing mode or the full energy sharing mode, the optimal power allocation of the RRFUs, and the RRFU selection algorithm for secure transmission at the physical layer of the SS-DBS downlink are obtained. Finally, Monte Carlo simulation is carried out and the simulation results verify the validity of the model and also show that the proposed algorithm has superior performance in terms of secure information rate and secure energy efficiency.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"71 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141574497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-08DOI: 10.1007/s11276-024-03812-3
Nan Hu
With the rapid development of science and technology, there are many derivatives of Artificial Intelligence (AI) technology based on wireless networks in the field of education, including intelligent learning systems. The learning strategy of English listening and speaking ability based on the intelligent learning system is studied to improve students’ English listening and speaking ability effectively. Firstly, the literature analysis method is used to analyze the problems that need attention in cultivating English listening and speaking abilities. Then, the current situation of students’ English listening and speaking learning is investigated through questionnaire surveys. Also, the problems existing in the learning process are sorted out and analyzed. Next, the feasibility of applying the intelligent learning system based on the AI wireless network to learning English listening and speaking ability is studied. A feasible strategy based on the intelligent learning system is proposed. Finally, based on the proposed strategy, the class with relatively poor English listening and speaking ability is used as the experimental object for experimental teaching. In addition, the data in the experimental process and the test before and after the experiment are analyzed to verify the effectiveness of the intelligent learning system in improving English listening and speaking ability. The results show that the learning strategy of an intelligent learning system based on an AI wireless network can effectively improve English listening and speaking ability and enhance students’ interest in learning English listening and speaking. The average listening ability of the students after the experiment is higher than that of 4.65 points before the experiment, the significance is 0.406 > 0.05, and the significant value in the homogeneous variance test is F = 0.045 < 0.05. The results indicate that there is a significant difference in the listening and speaking ability of the students before and after the experiment, and the listening and speaking ability of the students in the experimental group is significantly improved. Students have a high degree of recognition of the English listening and speaking learning system. This paper provides new ideas for applying and expanding AI technology in English teaching.
{"title":"English listening and speaking ability improvement strategy from Artificial Intelligence wireless network","authors":"Nan Hu","doi":"10.1007/s11276-024-03812-3","DOIUrl":"https://doi.org/10.1007/s11276-024-03812-3","url":null,"abstract":"<p>With the rapid development of science and technology, there are many derivatives of Artificial Intelligence (AI) technology based on wireless networks in the field of education, including intelligent learning systems. The learning strategy of English listening and speaking ability based on the intelligent learning system is studied to improve students’ English listening and speaking ability effectively. Firstly, the literature analysis method is used to analyze the problems that need attention in cultivating English listening and speaking abilities. Then, the current situation of students’ English listening and speaking learning is investigated through questionnaire surveys. Also, the problems existing in the learning process are sorted out and analyzed. Next, the feasibility of applying the intelligent learning system based on the AI wireless network to learning English listening and speaking ability is studied. A feasible strategy based on the intelligent learning system is proposed. Finally, based on the proposed strategy, the class with relatively poor English listening and speaking ability is used as the experimental object for experimental teaching. In addition, the data in the experimental process and the test before and after the experiment are analyzed to verify the effectiveness of the intelligent learning system in improving English listening and speaking ability. The results show that the learning strategy of an intelligent learning system based on an AI wireless network can effectively improve English listening and speaking ability and enhance students’ interest in learning English listening and speaking. The average listening ability of the students after the experiment is higher than that of 4.65 points before the experiment, the significance is 0.406 > 0.05, and the significant value in the homogeneous variance test is F = 0.045 < 0.05. The results indicate that there is a significant difference in the listening and speaking ability of the students before and after the experiment, and the listening and speaking ability of the students in the experimental group is significantly improved. Students have a high degree of recognition of the English listening and speaking learning system. This paper provides new ideas for applying and expanding AI technology in English teaching.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"10 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141574485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-07DOI: 10.1007/s11276-024-03790-6
S. Selvakumar, A. Ahilan, B. Ben Sujitha, N. Muthukumaran
Device-to-Device (D2D) communication stands as a pivotal technology revolutionizing conventional base station-to-device (B2D) communication paradigms. It facilitates direct data exchange among Internet of Things (IoT) devices without intermediaries such as servers or cloud services. However, the direct link between devices poses significant security risks, such as data leaks and unauthorized access. In this paper, a novel Secure data Transmission using Crystals Kyber (STUCK) technique has been proposed to secure device-to-device communication efficiently. STUCK encompasses four pivotal phases: token generation, device discovery, link configuration, and secure data transmission, ensuring robust protection against potential security breaches. Leveraging the Crystals Kyber cryptographic technique, STUCK adeptly manages key operations, encrypts and decrypts data, thus ensuring the integrity of data transmission across devices. Experimental validation conducted in MATLAB validates the efficacy of the proposed system, revealing noteworthy performance metrics encompassing processing time, communication overhead, and encryption duration. Comparative analysis demonstrates superior performance of STUCK, showcasing processing time increases of 23.07%, 44.23%, and 65.38% compared to existing techniques such as B-IoMV, LMECC, and QSAP, respectively.
{"title":"Crystals kyber cryptographic algorithm for efficient IoT D2d communication","authors":"S. Selvakumar, A. Ahilan, B. Ben Sujitha, N. Muthukumaran","doi":"10.1007/s11276-024-03790-6","DOIUrl":"https://doi.org/10.1007/s11276-024-03790-6","url":null,"abstract":"<p>Device-to-Device (D2D) communication stands as a pivotal technology revolutionizing conventional base station-to-device (B2D) communication paradigms. It facilitates direct data exchange among Internet of Things (IoT) devices without intermediaries such as servers or cloud services. However, the direct link between devices poses significant security risks, such as data leaks and unauthorized access. In this paper, a novel Secure data Transmission using Crystals Kyber (STUCK) technique has been proposed to secure device-to-device communication efficiently. STUCK encompasses four pivotal phases: token generation, device discovery, link configuration, and secure data transmission, ensuring robust protection against potential security breaches. Leveraging the Crystals Kyber cryptographic technique, STUCK adeptly manages key operations, encrypts and decrypts data, thus ensuring the integrity of data transmission across devices. Experimental validation conducted in MATLAB validates the efficacy of the proposed system, revealing noteworthy performance metrics encompassing processing time, communication overhead, and encryption duration. Comparative analysis demonstrates superior performance of STUCK, showcasing processing time increases of 23.07%, 44.23%, and 65.38% compared to existing techniques such as B-IoMV, LMECC, and QSAP, respectively.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"40 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141574486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-05DOI: 10.1007/s11276-024-03805-2
Mojtaba Shojaei, Ali Hosseini, Alireza Shafieinejad
In this paper, we investigate the joint placement of aerial Base Stations (BSs) and power control of BSs and users’ association to maximize the sum of the receive rates of end users. We formulate this problem as a mixed integer nonlinear optimization problem and propose a heuristic algorithm based on clustering. The algorithm focuses on a set of users with the lowest rates and clusters them into k groups. The centroid of each group is considered as a candidate for the initial placement of an aerial BS. The optimization loop starts by locating an aerial BS and then proceeds to three subalgorithms: updating power control, users’ association update, and aerial BS location. The results show that adding a single aerial BS improves the average user rate by approximately 18%, while reducing the total transmission power by 44%. Moreover, our proposed algorithm outperforms baseline PSO (Particle Swarm Optimization) schemes in terms of average user rate.
在本文中,我们研究了空中基站(BS)的联合布置、BS 的功率控制以及用户关联,以最大化终端用户的接收率之和。我们将这一问题表述为一个混合整数非线性优化问题,并提出了一种基于聚类的启发式算法。该算法侧重于一组速率最低的用户,并将其聚类为 k 组。每个组的中心点被视为空中基站初始位置的候选者。优化循环从定位空中基站开始,然后进行三个子算法:更新功率控制、用户关联更新和空中基站定位。结果表明,增加一个空中基站可将平均用户速率提高约 18%,同时将总传输功率降低 44%。此外,就平均用户速率而言,我们提出的算法优于基线 PSO(粒子群优化)方案。
{"title":"Fairness-aware placement of multiple aerial base stations in wireless networks","authors":"Mojtaba Shojaei, Ali Hosseini, Alireza Shafieinejad","doi":"10.1007/s11276-024-03805-2","DOIUrl":"https://doi.org/10.1007/s11276-024-03805-2","url":null,"abstract":"<p>In this paper, we investigate the joint placement of aerial Base Stations (BSs) and power control of BSs and users’ association to maximize the sum of the receive rates of end users. We formulate this problem as a mixed integer nonlinear optimization problem and propose a heuristic algorithm based on clustering. The algorithm focuses on a set of users with the lowest rates and clusters them into k groups. The centroid of each group is considered as a candidate for the initial placement of an aerial BS. The optimization loop starts by locating an aerial BS and then proceeds to three subalgorithms: updating power control, users’ association update, and aerial BS location. The results show that adding a single aerial BS improves the average user rate by approximately 18%, while reducing the total transmission power by 44%. Moreover, our proposed algorithm outperforms baseline PSO (Particle Swarm Optimization) schemes in terms of average user rate.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"16 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141574488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}