Pub Date : 2024-08-02DOI: 10.1007/s11277-024-11481-w
Pradeep Bedi, Sanjoy Das, S. B. Goyal, Anand Singh Rajawat, Manoj Kumar
For remote health monitoring, activity tracking, and other applications in healthcare such as sports, Wireless Body Area Networks (WBANs) have become a feasible technology. However, the limited resources and dynamic nature of WBANs pose significant challenges to designing efficient and reliable routing protocols. To address these challenges, the proposed work suggests a thermal-aware, energy-efficient, and congestion-aware routing protocol (TECRP) for WBAN. TECRP focuses on improving transmission in both inter-WBAN and intra-WBAN scenarios. It addresses three key Quality of Service (QoS) parameters: energy efficiency, node temperature, and congestion, aiming to enhance overall WBAN communication efficiency. To achieve all these parameters, the algorithm is considered a multi-objective problem. The analysis shows that the temperature rises and delay increases with the number of data transmission, but the multi-objective approach helps to mitigate such effects. The result analysis shows that the path loss values fluctuate with increasing data transmission and network traffic. But the temperature rise increases with more data transmission and larger packets. On the other hand, the Packet Delivery Ratio (PDR) decreases with an increase in data transmission and with larger packet sizes. This shows that with higher congestion ratios, a higher likelihood of packet loss is seen. But in overall performance, the proposed TECRP shows better efficiency and congestion management as compared to other existing state-of-art-models and achieves high PDR, and minimizes packet loss. The proposed approach shows 0.42% improvement in energy efficiency as compared to existing approaches.
{"title":"Energy-Efficient and Congestion-Thermal Aware Routing Protocol for WBAN","authors":"Pradeep Bedi, Sanjoy Das, S. B. Goyal, Anand Singh Rajawat, Manoj Kumar","doi":"10.1007/s11277-024-11481-w","DOIUrl":"https://doi.org/10.1007/s11277-024-11481-w","url":null,"abstract":"<p>For remote health monitoring, activity tracking, and other applications in healthcare such as sports, Wireless Body Area Networks (WBANs) have become a feasible technology. However, the limited resources and dynamic nature of WBANs pose significant challenges to designing efficient and reliable routing protocols. To address these challenges, the proposed work suggests a thermal-aware, energy-efficient, and congestion-aware routing protocol (TECRP) for WBAN. TECRP focuses on improving transmission in both inter-WBAN and intra-WBAN scenarios. It addresses three key Quality of Service (QoS) parameters: energy efficiency, node temperature, and congestion, aiming to enhance overall WBAN communication efficiency. To achieve all these parameters, the algorithm is considered a multi-objective problem. The analysis shows that the temperature rises and delay increases with the number of data transmission, but the multi-objective approach helps to mitigate such effects. The result analysis shows that the path loss values fluctuate with increasing data transmission and network traffic. But the temperature rise increases with more data transmission and larger packets. On the other hand, the Packet Delivery Ratio (PDR) decreases with an increase in data transmission and with larger packet sizes. This shows that with higher congestion ratios, a higher likelihood of packet loss is seen. But in overall performance, the proposed TECRP shows better efficiency and congestion management as compared to other existing state-of-art-models and achieves high PDR, and minimizes packet loss. The proposed approach shows 0.42% improvement in energy efficiency as compared to existing approaches.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-02DOI: 10.1007/s11277-024-11513-5
Son Xuat Ta, Thanh Tung Phung
A low-profile multi-port dual-band antenna with pattern and polarization diversity is presented for 2.45 and 5.8 GHz bands. The antenna consists of a monopolar patch for vertically polarized (VP) omnidirectional radiation and four combining printed-dipole and tapered-slot elements arranged in a circular shape for horizontally polarized (HP) multibeam radiation, and consequently, both pattern and polarization diversities are achieved in the full azimuth plane. The monopolar patch employs four vias and a square-ring slot to excite (TM_{01}) and (TM_{02}) modes at 2.45 and 5.8 GHz, respectively. Each HP element utilizes printed-dipole and tapered-slot modes for the lower and upper bands, respectively. The VP and HP elements are collocated with a common ground plane, which not only allows a low profile but also broadens the lower band of the monopolar mode. The final design with 0.03(lambda _{2.45-GHz}) height yields a measured 10-dB return loss bandwidth of 8.6% and 6.7% at 2.45 and 5.8 GHz, respectively, and an isolation (ge) 20 dB among all the ports. Its pattern and polarization diversities are validated by far-field measurements.
{"title":"A Low-Profile Pattern and Polarization Diversity Dual-Band MIMO Antenna with Full Azimuth Coverage for Indoor Access Points","authors":"Son Xuat Ta, Thanh Tung Phung","doi":"10.1007/s11277-024-11513-5","DOIUrl":"https://doi.org/10.1007/s11277-024-11513-5","url":null,"abstract":"<p>A low-profile multi-port dual-band antenna with pattern and polarization diversity is presented for 2.45 and 5.8 GHz bands. The antenna consists of a monopolar patch for vertically polarized (VP) omnidirectional radiation and four combining printed-dipole and tapered-slot elements arranged in a circular shape for horizontally polarized (HP) multibeam radiation, and consequently, both pattern and polarization diversities are achieved in the full azimuth plane. The monopolar patch employs four vias and a square-ring slot to excite <span>(TM_{01})</span> and <span>(TM_{02})</span> modes at 2.45 and 5.8 GHz, respectively. Each HP element utilizes printed-dipole and tapered-slot modes for the lower and upper bands, respectively. The VP and HP elements are collocated with a common ground plane, which not only allows a low profile but also broadens the lower band of the monopolar mode. The final design with 0.03<span>(lambda _{2.45-GHz})</span> height yields a measured 10-dB return loss bandwidth of 8.6% and 6.7% at 2.45 and 5.8 GHz, respectively, and an isolation <span>(ge)</span> 20 dB among all the ports. Its pattern and polarization diversities are validated by far-field measurements.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-02DOI: 10.1007/s11277-024-11484-7
E. Suganya, T. Anita Jones Mary Pushpa, T. Prabhu
The increasing need for swift, low-latency, and reliable wireless transmission in the age of 5G has led to rapid advancements in 5G technology. MIMO systems, originally implemented in 4G applications, remain an integral part of 5G networks. The sub-6-GHz frequency band holds promise for 5G applications, such as improved link and reduced transmission losses. This comprehensive review explores advancements in patch antenna (PA) structure for sub-6 GHz 5G smartphone utilization, addressing the challenges posed by space constraints in mobile devices and the need for efficient integration of antennas. The paper discusses the significance of MIMO antennas in modern cellular communication, particularly in the context of 5G technology, which utilizes sub-6 GHz. Reconfigurable antennas (RAs) and Microstrip Patch Antennas (MPAs) are introduced as solutions, highlighting their compact, cost-effective, and flexible nature. The review delves into critical factors such as geometry, substrate selection, and feed design in optimizing patch antenna performance. It also covers the importance of addressing both sub-6 GHz and mm-wave bands within a single antenna system.
{"title":"Advancements in Patch Antenna Design for Sub-6 GHz 5G Smartphone Application: A Comprehensive Review","authors":"E. Suganya, T. Anita Jones Mary Pushpa, T. Prabhu","doi":"10.1007/s11277-024-11484-7","DOIUrl":"https://doi.org/10.1007/s11277-024-11484-7","url":null,"abstract":"<p>The increasing need for swift, low-latency, and reliable wireless transmission in the age of 5G has led to rapid advancements in 5G technology. MIMO systems, originally implemented in 4G applications, remain an integral part of 5G networks. The sub-6-GHz frequency band holds promise for 5G applications, such as improved link and reduced transmission losses. This comprehensive review explores advancements in patch antenna (PA) structure for sub-6 GHz 5G smartphone utilization, addressing the challenges posed by space constraints in mobile devices and the need for efficient integration of antennas. The paper discusses the significance of MIMO antennas in modern cellular communication, particularly in the context of 5G technology, which utilizes sub-6 GHz. Reconfigurable antennas (RAs) and Microstrip Patch Antennas (MPAs) are introduced as solutions, highlighting their compact, cost-effective, and flexible nature. The review delves into critical factors such as geometry, substrate selection, and feed design in optimizing patch antenna performance. It also covers the importance of addressing both sub-6 GHz and mm-wave bands within a single antenna system.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-02DOI: 10.1007/s11277-024-11504-6
A. B. Feroz Khan
High-level security is crucial for protecting sensitive information transmitted across wireless sensor networks (WSNs). Secure routing plays a key role in preventing impersonation attacks within the network. Although numerous state-of-the-art routing models based on trusted metrics aim to enhance WSN security, challenges remain due to the network's dynamic nature. This paper introduces an enhanced multi-attribute-based trusted attack resistance (EMBTR) algorithm designed to securely manage routing using nodes' trust values. The proposed approach leverages Quality of Service (QoS) parameters such as stability rate (SR), reliability rate (RR), and elapsed time (ET) to improve network performance and combat trust-related attacks. By isolating misbehaving nodes based on their trust metrics, the algorithm establishes a reliable communication route. Comparisons with existing routing algorithms like TSRM (Trust-based Secure Routing Model) and TARF (Trust-aware Routing Framework for WSNs) demonstrate that the EMBTR algorithm effectively detects and eliminates malicious nodes, providing secure routing with higher detection rates and limited energy consumption compared to current solutions.
{"title":"An Enhanced Multi Attribute Based Trusted Attack Resistance (EMBTR) for the Secure Routing of Sensor Nodes in Wireless Sensor Network","authors":"A. B. Feroz Khan","doi":"10.1007/s11277-024-11504-6","DOIUrl":"https://doi.org/10.1007/s11277-024-11504-6","url":null,"abstract":"<p>High-level security is crucial for protecting sensitive information transmitted across wireless sensor networks (WSNs). Secure routing plays a key role in preventing impersonation attacks within the network. Although numerous state-of-the-art routing models based on trusted metrics aim to enhance WSN security, challenges remain due to the network's dynamic nature. This paper introduces an enhanced multi-attribute-based trusted attack resistance (EMBTR) algorithm designed to securely manage routing using nodes' trust values. The proposed approach leverages Quality of Service (QoS) parameters such as stability rate (SR), reliability rate (RR), and elapsed time (ET) to improve network performance and combat trust-related attacks. By isolating misbehaving nodes based on their trust metrics, the algorithm establishes a reliable communication route. Comparisons with existing routing algorithms like TSRM (Trust-based Secure Routing Model) and TARF (Trust-aware Routing Framework for WSNs) demonstrate that the EMBTR algorithm effectively detects and eliminates malicious nodes, providing secure routing with higher detection rates and limited energy consumption compared to current solutions.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the rapidly evolving domain of edge computing, efficient task scheduling emerges as a pivotal challenge due to the increasing complexity and volume of tasks. This study introduces a sophisticated dual-layer hybrid scheduling model that harnesses the strengths of Graph Neural Networks and Deep Reinforcement Learning to enhance the scheduling process. By simplifying task dependencies with Graph Neural Network at the upper layer and integrating Deep Reinforcement Learning with heuristic algorithms at the lower layer, this model optimally allocates tasks, significantly improving scheduling efficiency and reducing response times, particularly beneficial for logistics cloud robots operating in edge computing contexts. We validated the effectiveness of this innovative model through rigorous simulation experiments on the EdgeCloudSim platform, comparing its performance against traditional heuristic methods such as Shortest Job First, First Come First Serve and Heterogeneous Earliest Finish Time. The results confirm that our model consistently achieves superior task scheduling performance across various task volumes, effectively meeting the scheduling demands. This study demonstrates the effectiveness of integrating advanced machine learning techniques with heuristic algorithms to enhance task scheduling processes, making it particularly suitable for scenarios with high demands on response times. This approach not only facilitates more efficient task management but also aligns with the needs of modern edge computing applications, streamlining operations and boosting overall system performance.
{"title":"Task Scheduling Strategy of Logistics Cloud Robot Based on Edge Computing","authors":"Hengliang Tang, Rongxin Jiao, Fei Xue, Yang Cao, Yongli Yang, Shiqiang Zhang","doi":"10.1007/s11277-024-11498-1","DOIUrl":"https://doi.org/10.1007/s11277-024-11498-1","url":null,"abstract":"<p>In the rapidly evolving domain of edge computing, efficient task scheduling emerges as a pivotal challenge due to the increasing complexity and volume of tasks. This study introduces a sophisticated dual-layer hybrid scheduling model that harnesses the strengths of Graph Neural Networks and Deep Reinforcement Learning to enhance the scheduling process. By simplifying task dependencies with Graph Neural Network at the upper layer and integrating Deep Reinforcement Learning with heuristic algorithms at the lower layer, this model optimally allocates tasks, significantly improving scheduling efficiency and reducing response times, particularly beneficial for logistics cloud robots operating in edge computing contexts. We validated the effectiveness of this innovative model through rigorous simulation experiments on the EdgeCloudSim platform, comparing its performance against traditional heuristic methods such as Shortest Job First, First Come First Serve and Heterogeneous Earliest Finish Time. The results confirm that our model consistently achieves superior task scheduling performance across various task volumes, effectively meeting the scheduling demands. This study demonstrates the effectiveness of integrating advanced machine learning techniques with heuristic algorithms to enhance task scheduling processes, making it particularly suitable for scenarios with high demands on response times. This approach not only facilitates more efficient task management but also aligns with the needs of modern edge computing applications, streamlining operations and boosting overall system performance.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141887080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper deals with the characterization of mobility models for unmanned aerial vehicles (UAVs) cellular network regarding handovers. The UAVs act as base stations to serve terrestrial users using service models, namely user dependent model and user independent model. The state-of-the-art mobility models, such as straight line, random waypoint (RWP) and modified random direction (M-RD) are employed under two different mobility scenarios for UBSs: same speed model and different speed model. The RWP mobility model achieves lower bound in handover probability followed by M-RD mobility model with an infinitesimal change. The M-RD mobility model exhibiting lowest handover rate has greatly increased its usability in UAVs cellular network.
{"title":"Evaluation of Handover Probability and Handover Rate of UAVs Cellular Network","authors":"Rajdeep Singh Sohal, Jaipreet Kaur, Manbir Kaur, Vinit Grewal, Jaspreet Kaur","doi":"10.1007/s11277-024-11316-8","DOIUrl":"https://doi.org/10.1007/s11277-024-11316-8","url":null,"abstract":"<p>This paper deals with the characterization of mobility models for unmanned aerial vehicles (UAVs) cellular network regarding handovers. The UAVs act as base stations to serve terrestrial users using service models, namely user dependent model and user independent model. The state-of-the-art mobility models, such as straight line, random waypoint (RWP) and modified random direction (M-RD) are employed under two different mobility scenarios for UBSs: same speed model and different speed model. The RWP mobility model achieves lower bound in handover probability followed by M-RD mobility model with an infinitesimal change. The M-RD mobility model exhibiting lowest handover rate has greatly increased its usability in UAVs cellular network.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-01DOI: 10.1007/s11277-024-11511-7
Minghua Wang, Hengshun Chen, Yan Wang, Wenbo Chen
Energy is still one of the most important problems in wireless sensor network (WSN). With the application of wireless charging vehicle (WCV), wireless charging technology can be used to solve the energy problem of WSN. In the wireless rechargeable sensor network (WRSN), how to reasonably deploy the WCV has become a problem in planning. The existing studies only consider the impact of independent coverage contribution of a single node on the charging path planning, but do not consider the redundant coverage area that may occur when a single node works independently, resulting in a small or even zero coverage contribution of some nodes. This paper propose Improved Soft-k-Means Clustering Charging Based on Node Collaborative Scheduling (ISKCC-NCS) to keep the coverage quality of WSN. At first, this algorithm uses Improved Soft-k-Means to cluster WRSN, and realizes confident information coverage through collaborative sensing between adjacent nodes. The second, we evaluate the coverage contribution of each node to be charged and calculate the priority of the node. The third, we form new charging path by inserting and deleting tasks. At last, a carrier charging vehicle (CCV) is used to carry several micro charging vehicle (MCV) to each cluster to charge the sensor node. Through a large number of simulation experiments, it is found that compared with other algorithms, ISKCC-NCS can significantly enhance the coverage rate and monitoring stability of the WSN.
{"title":"Improved Soft-k-Means Clustering Charging Based on Node Collaborative Scheduling in Wireless Sensor Networks","authors":"Minghua Wang, Hengshun Chen, Yan Wang, Wenbo Chen","doi":"10.1007/s11277-024-11511-7","DOIUrl":"https://doi.org/10.1007/s11277-024-11511-7","url":null,"abstract":"<p>Energy is still one of the most important problems in wireless sensor network (WSN). With the application of wireless charging vehicle (WCV), wireless charging technology can be used to solve the energy problem of WSN. In the wireless rechargeable sensor network (WRSN), how to reasonably deploy the WCV has become a problem in planning. The existing studies only consider the impact of independent coverage contribution of a single node on the charging path planning, but do not consider the redundant coverage area that may occur when a single node works independently, resulting in a small or even zero coverage contribution of some nodes. This paper propose Improved Soft-k-Means Clustering Charging Based on Node Collaborative Scheduling (ISKCC-NCS) to keep the coverage quality of WSN. At first, this algorithm uses Improved Soft-k-Means to cluster WRSN, and realizes confident information coverage through collaborative sensing between adjacent nodes. The second, we evaluate the coverage contribution of each node to be charged and calculate the priority of the node. The third, we form new charging path by inserting and deleting tasks. At last, a carrier charging vehicle (CCV) is used to carry several micro charging vehicle (MCV) to each cluster to charge the sensor node. Through a large number of simulation experiments, it is found that compared with other algorithms, ISKCC-NCS can significantly enhance the coverage rate and monitoring stability of the WSN.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-31DOI: 10.1007/s11277-024-11485-6
Zongrui He, Kaijun Song, Jia Yao, Yedi Zhou
Nowadays, MIMO technology is one of the hot issues in the development of communication technology. The power dividers have a large role in microwave circuits and it is very important in antenna array systems. This letter presents a broadband eight-way power divider based on the Wilkinson power divider for MIMO communication systems. The power divider is composed of a radial cavity equipped with coaxial probes serving as the power divider circuits, along with microstrip lines loaded with resistors that function as the isolation network. By combining these two parts, the power divider achieves more than 25% operating bandwidth with a theoretical 22.5 dB port isolation. Experimental verification for a C-band (5.8–7.3 GHz) broadband eight-way power divider is presented. Measured results show that the output return loss is better than 18 dB, the isolation is better than 20 dB, and the insertion loss is within 9.03±0.25 dB.
如今,多输入多输出(MIMO)技术是通信技术发展的热点问题之一。功率分配器在微波电路中发挥着重要作用,在天线阵列系统中也非常重要。本文介绍了一种基于威尔金森功率分配器的宽带八路功率分配器,适用于 MIMO 通信系统。该功率分配器由一个径向腔体和作为功率分配器电路的同轴探针,以及作为隔离网络的装有电阻器的微带线组成。通过将这两部分结合在一起,功率分配器可实现超过 25% 的工作带宽和 22.5 dB 的理论端口隔离度。本文介绍了 C 波段(5.8-7.3 GHz)宽带八路功率分配器的实验验证。测量结果表明,输出回波损耗优于 18 dB,隔离度优于 20 dB,插入损耗在 9.03±0.25 dB 范围内。
{"title":"Broadband Eight-Way High-Isolation Cavity Power Divider with Low Insertion Loss for MIMO Communication Systems","authors":"Zongrui He, Kaijun Song, Jia Yao, Yedi Zhou","doi":"10.1007/s11277-024-11485-6","DOIUrl":"https://doi.org/10.1007/s11277-024-11485-6","url":null,"abstract":"<p>Nowadays, MIMO technology is one of the hot issues in the development of communication technology. The power dividers have a large role in microwave circuits and it is very important in antenna array systems. This letter presents a broadband eight-way power divider based on the Wilkinson power divider for MIMO communication systems. The power divider is composed of a radial cavity equipped with coaxial probes serving as the power divider circuits, along with microstrip lines loaded with resistors that function as the isolation network. By combining these two parts, the power divider achieves more than 25% operating bandwidth with a theoretical 22.5 dB port isolation. Experimental verification for a C-band (5.8–7.3 GHz) broadband eight-way power divider is presented. Measured results show that the output return loss is better than 18 dB, the isolation is better than 20 dB, and the insertion loss is within 9.03±0.25 dB.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141864735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-31DOI: 10.1007/s11277-024-11507-3
K. Ashwini, V. K. Jagadeesh
The article examined the physical layer security of cooperative non-orthogonal multiple access (NOMA) network over Rayleigh fading channels by considering one eavesdropper. Relaying techniques like decode-and-forward (DF) and amplify–and–forward (AF) protocols are analyzed. The secrecy rate and secrecy outage probability of the system considering NOMA-AF and NOMA-DF systems were derived. Two cases were considered for the analysis, one system model where a near user operates as relay, forwarding the signal to far user; another where a relay is used in forwarding the signal to both users. Simulation results were obtained for different values of power allocation coefficients. These results show that the system model proposed in case 2 provides a better secrecy performance result than NOMA based models proposed in case 1 under both relaying techniques.
{"title":"Secrecy Performance Analysis of Cooperative NOMA with AF and DF Protocol over Rayleigh Channel","authors":"K. Ashwini, V. K. Jagadeesh","doi":"10.1007/s11277-024-11507-3","DOIUrl":"https://doi.org/10.1007/s11277-024-11507-3","url":null,"abstract":"<p>The article examined the physical layer security of cooperative non-orthogonal multiple access (NOMA) network over Rayleigh fading channels by considering one eavesdropper. Relaying techniques like decode-and-forward (DF) and amplify–and–forward (AF) protocols are analyzed. The secrecy rate and secrecy outage probability of the system considering NOMA-AF and NOMA-DF systems were derived. Two cases were considered for the analysis, one system model where a near user operates as relay, forwarding the signal to far user; another where a relay is used in forwarding the signal to both users. Simulation results were obtained for different values of power allocation coefficients. These results show that the system model proposed in case 2 provides a better secrecy performance result than NOMA based models proposed in case 1 under both relaying techniques.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141864869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-31DOI: 10.1007/s11277-024-11391-x
Mohd Anas Khan, Shalu, Quadri Noorulhasan Naveed, Ayodele Lasisi, Sheetal Kaushik, Sunil Kumar
The decision-making process in Industrial Wireless Sensor Networks heavily relies on the information provided by smart sensors. Ensuring the trustworthiness of these sensors is essential to prolong the lifetime of the network. Additionally, dependable data transmission by sensor nodes is crucial for effective decision-making. Trust management approaches play a vital role in safeguarding industrial sensor networks from internal threats, enhancing security, dependability, and network resilience. However, existing trust management schemes often focus solely on communication behaviour to calculate trust values, potentially leading to incorrect decisions amidst prevalent malicious attacks. Moreover, these schemes often fail to meet the resource and dependability requirements of IWSNs. To address these limitations, this paper proposes a novel hybrid Trust Management Scheme called the Multi-layered Assessment System for Trustworthiness Enhancement and Reliability (MASTER). The MASTER scheme employs a clustering approach within a hybrid architecture to reduce communication overhead, effectively detecting and mitigating various adversarial attacks such as Sybil, Blackhole, Ballot stuffing, and On–off attacks with minimal overheads. This multifactor trust scheme integrates both communication-based trust and data-based trust during trust estimation, aiming to improve the lifetime of industrial sensor networks. Furthermore, the proposed MASTER scheme utilizes a flexible weighting scheme that assigns more weight to recent interactions during both direct and recommendation (indirect) trust evaluation. This approach ensures robust and precise trust values tailored to the specific network scenario. To efficiently process and glean insights from dispersed data, machine learning algorithms are employed, offering a suitable solution. Experimental results demonstrate the superior performance of the MASTER scheme in several key metrics compared to recent trust models. For instance, when 30% of malicious Sensor Nodes (SNs) exist in a network comprising 500 sensor nodes, the MASTER scheme achieves a malicious behaviour detection rate of 97%, surpassing the rates of other models. Even after the occurrence of malicious SNs exceeding 30%, the False Negative Rate (FNR) in the MASTER scheme remains lower than other models due to adaptive trust functions employed at each level. With 50% malicious SNs in the network, the MASTER scheme achieves a malicious behaviour detection accuracy of 91%, outperforming alternative models. Moreover, the average energy consumption of SNs in the MASTER scheme is significantly lower compared to other schemes, owing to its elimination of unnecessary transactions through clustered topology utilization. Specifically, with 30% and 50% malicious SNs in the network, the MASTER scheme achieves throughput rates of 150 kbps and 108 kbps, respectively, demonstrating its efficiency in challenging network scenarios. Overall, the proposed MASTER scheme
{"title":"A Multi-Layered Assessment System for Trustworthiness Enhancement and Reliability for Industrial Wireless Sensor Networks","authors":"Mohd Anas Khan, Shalu, Quadri Noorulhasan Naveed, Ayodele Lasisi, Sheetal Kaushik, Sunil Kumar","doi":"10.1007/s11277-024-11391-x","DOIUrl":"https://doi.org/10.1007/s11277-024-11391-x","url":null,"abstract":"<p>The decision-making process in Industrial Wireless Sensor Networks heavily relies on the information provided by smart sensors. Ensuring the trustworthiness of these sensors is essential to prolong the lifetime of the network. Additionally, dependable data transmission by sensor nodes is crucial for effective decision-making. Trust management approaches play a vital role in safeguarding industrial sensor networks from internal threats, enhancing security, dependability, and network resilience. However, existing trust management schemes often focus solely on communication behaviour to calculate trust values, potentially leading to incorrect decisions amidst prevalent malicious attacks. Moreover, these schemes often fail to meet the resource and dependability requirements of IWSNs. To address these limitations, this paper proposes a novel hybrid Trust Management Scheme called the Multi-layered Assessment System for Trustworthiness Enhancement and Reliability (MASTER). The MASTER scheme employs a clustering approach within a hybrid architecture to reduce communication overhead, effectively detecting and mitigating various adversarial attacks such as Sybil, Blackhole, Ballot stuffing, and On–off attacks with minimal overheads. This multifactor trust scheme integrates both communication-based trust and data-based trust during trust estimation, aiming to improve the lifetime of industrial sensor networks. Furthermore, the proposed MASTER scheme utilizes a flexible weighting scheme that assigns more weight to recent interactions during both direct and recommendation (indirect) trust evaluation. This approach ensures robust and precise trust values tailored to the specific network scenario. To efficiently process and glean insights from dispersed data, machine learning algorithms are employed, offering a suitable solution. Experimental results demonstrate the superior performance of the MASTER scheme in several key metrics compared to recent trust models. For instance, when 30% of malicious Sensor Nodes (SNs) exist in a network comprising 500 sensor nodes, the MASTER scheme achieves a malicious behaviour detection rate of 97%, surpassing the rates of other models. Even after the occurrence of malicious SNs exceeding 30%, the False Negative Rate (FNR) in the MASTER scheme remains lower than other models due to adaptive trust functions employed at each level. With 50% malicious SNs in the network, the MASTER scheme achieves a malicious behaviour detection accuracy of 91%, outperforming alternative models. Moreover, the average energy consumption of SNs in the MASTER scheme is significantly lower compared to other schemes, owing to its elimination of unnecessary transactions through clustered topology utilization. Specifically, with 30% and 50% malicious SNs in the network, the MASTER scheme achieves throughput rates of 150 kbps and 108 kbps, respectively, demonstrating its efficiency in challenging network scenarios. Overall, the proposed MASTER scheme ","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141864867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}