Pub Date : 2026-01-05DOI: 10.1109/OJCOMS.2025.3646206
Jang-Geun Yoo;Jong-Moon Chung
This study investigates the joint optimization of camera control, target acquisition, trajectory planning, and transmission scheduling for surveillance uncrewed aerial vehicles (UAVs) that provide various imaging and delivery services, such as traffic monitoring and security. The objective of the proposed UAV flight and trajectory control for surveillance camera imaging and communication (UTSCC) scheme is to capture images of designated ground targets and deliver the image data to requesting user equipment (UE) within specified deadlines. The UTSCC scheme attempts to maximize the total amount of successfully delivered target data considering realistic characteristics of the camera, UAV trajectory, transmission schedule, and selected targets. The developed framework makes decisions of the target acquisition and transmission scheduling using the exact penalty method (EPM) and applies non-convex optimization of the camera tilt angle and UAV trajectory using successive convex approximation (SCA) considering deadlines for UE delivery. The UTSCC scheme is designed to be practical for real-world UAV surveillance operations, where the simulation results demonstrate that the proposed method outperforms existing schemes in terms of delivery performance and overall system efficiency.
{"title":"UAV Flight and Trajectory Control for Surveillance Camera Imaging and Wireless Communication Joint Optimization","authors":"Jang-Geun Yoo;Jong-Moon Chung","doi":"10.1109/OJCOMS.2025.3646206","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3646206","url":null,"abstract":"This study investigates the joint optimization of camera control, target acquisition, trajectory planning, and transmission scheduling for surveillance uncrewed aerial vehicles (UAVs) that provide various imaging and delivery services, such as traffic monitoring and security. The objective of the proposed UAV flight and trajectory control for surveillance camera imaging and communication (UTSCC) scheme is to capture images of designated ground targets and deliver the image data to requesting user equipment (UE) within specified deadlines. The UTSCC scheme attempts to maximize the total amount of successfully delivered target data considering realistic characteristics of the camera, UAV trajectory, transmission schedule, and selected targets. The developed framework makes decisions of the target acquisition and transmission scheduling using the exact penalty method (EPM) and applies non-convex optimization of the camera tilt angle and UAV trajectory using successive convex approximation (SCA) considering deadlines for UE delivery. The UTSCC scheme is designed to be practical for real-world UAV surveillance operations, where the simulation results demonstrate that the proposed method outperforms existing schemes in terms of delivery performance and overall system efficiency.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"7 ","pages":"182-195"},"PeriodicalIF":6.3,"publicationDate":"2026-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11327452","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-05DOI: 10.1109/OJCOMS.2026.3650906
Faisal Al-Kamali;Francois Chan;James H. Bayes;Claude D’Amours
Wireless communications in military and civilian applications demand robust security and energy efficiency against evolving threats. This paper presents a novel strategy for optimizing UAV placement via spatial threat exclusion to achieve secure and energy-efficient links without relying on threat channel state information or complex signal processing techniques like beamforming or artificial noise. Our approach is motivated by the inherent alignment between covertness and interference mitigation; it is therefore equally applicable to interference scenarios, enhancing security by lowering detection risk and improving energy efficiency by reducing the communication distance between the UAV and the base station (BS). To ensure robustness, the model is developed for a conservative coverage-edge scenario, which represents the worst-case condition for both signal quality and secrecy, thereby serving as a lower-bound performance benchmark. The proposed method combines closed-form solutions for initial placement with iterative refinements, enabling real-time adaptation to dynamic threat mobility without extra hardware or computational burden. Two algorithms are developed: first for a single-threat, single-user scenario and then extended to multi-threat, multi-user settings. Algorithm 1 is a computationally efficient, quadratic difference-based method for rapid deployment, while Algorithm 2 is an inverse quadratic penalty-based technique for threat avoidance in dynamic environments. Simulation results for both scenarios confirm that the proposed algorithms consistently achieve positive secrecy rates across diverse propagation environments while yielding significant energy and time savings compared to an optimal-placement baseline. A comparative evaluation with a particle swarm optimization (PSO) baseline further demonstrates that our algorithms match optimal performance with substantially lower computational overhead.
{"title":"Optimizing UAV Placement With Spatial Threat Exclusion for Secure and Energy-Efficient Wireless Communications","authors":"Faisal Al-Kamali;Francois Chan;James H. Bayes;Claude D’Amours","doi":"10.1109/OJCOMS.2026.3650906","DOIUrl":"https://doi.org/10.1109/OJCOMS.2026.3650906","url":null,"abstract":"Wireless communications in military and civilian applications demand robust security and energy efficiency against evolving threats. This paper presents a novel strategy for optimizing UAV placement via spatial threat exclusion to achieve secure and energy-efficient links without relying on threat channel state information or complex signal processing techniques like beamforming or artificial noise. Our approach is motivated by the inherent alignment between covertness and interference mitigation; it is therefore equally applicable to interference scenarios, enhancing security by lowering detection risk and improving energy efficiency by reducing the communication distance between the UAV and the base station (BS). To ensure robustness, the model is developed for a conservative coverage-edge scenario, which represents the worst-case condition for both signal quality and secrecy, thereby serving as a lower-bound performance benchmark. The proposed method combines closed-form solutions for initial placement with iterative refinements, enabling real-time adaptation to dynamic threat mobility without extra hardware or computational burden. Two algorithms are developed: first for a single-threat, single-user scenario and then extended to multi-threat, multi-user settings. <xref>Algorithm 1</xref> is a computationally efficient, quadratic difference-based method for rapid deployment, while <xref>Algorithm 2</xref> is an inverse quadratic penalty-based technique for threat avoidance in dynamic environments. Simulation results for both scenarios confirm that the proposed algorithms consistently achieve positive secrecy rates across diverse propagation environments while yielding significant energy and time savings compared to an optimal-placement baseline. A comparative evaluation with a particle swarm optimization (PSO) baseline further demonstrates that our algorithms match optimal performance with substantially lower computational overhead.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"7 ","pages":"539-558"},"PeriodicalIF":6.3,"publicationDate":"2026-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11329043","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145982369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Securing the near-real-time (near-RT) control operations in Open Radio Access Networks (Open RAN) is increasingly critical, yet remains insufficiently addressed, as new runtime threats target the control loop while the system is operational. In this paper, we propose a multi-layer defence framework designed to enhance the security of near-RT RAN Intelligent Controller (RIC) operations. We classify operational-time threats into three categories—message-level, data-level, and control logic-level—and design and implement a dedicated detection and mitigation component for each: a signature-based E2 message inspection module performing structural and semantic validation of signalling exchanges, a telemetry poisoning detector based on temporal anomaly scoring using an LSTM network, and a runtime xApp attestation mechanism based on an execution-time hash challenge–response. The framework is evaluated on an Open RAN testbed comprising FlexRIC and a commercial RAN emulator, demonstrating effective detection rates, low latency overheads, and practical integration feasibility. Results indicate that the proposed safeguards can operate within near-RT time constraints while significantly improving protection against runtime attacks, introducing less than 80 ms overhead for a network with 500 User Equipment (UEs). Overall, this work lays the foundation for deployable, layered, and policy-driven runtime security architectures for the near-RT RIC control loop in Open RAN, and provides an extensible framework into which future mitigation policies and threat-specific modules can be integrated.
{"title":"Toward a Multi-Layer Defence Framework for Securing Near-Real-Time Operations in Open RAN","authors":"Hamed Alimohammadi;Samara Mayhoub;Sotiris Chatzimiltis;Mohammad Shojafar;Muhammad Nasir Mumtaz Bhutta","doi":"10.1109/OJCOMS.2025.3650736","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3650736","url":null,"abstract":"Securing the near-real-time (near-RT) control operations in Open Radio Access Networks (Open RAN) is increasingly critical, yet remains insufficiently addressed, as new runtime threats target the control loop while the system is operational. In this paper, we propose a multi-layer defence framework designed to enhance the security of near-RT RAN Intelligent Controller (RIC) operations. We classify operational-time threats into three categories—message-level, data-level, and control logic-level—and design and implement a dedicated detection and mitigation component for each: a signature-based E2 message inspection module performing structural and semantic validation of signalling exchanges, a telemetry poisoning detector based on temporal anomaly scoring using an LSTM network, and a runtime xApp attestation mechanism based on an execution-time hash challenge–response. The framework is evaluated on an Open RAN testbed comprising FlexRIC and a commercial RAN emulator, demonstrating effective detection rates, low latency overheads, and practical integration feasibility. Results indicate that the proposed safeguards can operate within near-RT time constraints while significantly improving protection against runtime attacks, introducing less than 80 ms overhead for a network with 500 User Equipment (UEs). Overall, this work lays the foundation for deployable, layered, and policy-driven runtime security architectures for the near-RT RIC control loop in Open RAN, and provides an extensible framework into which future mitigation policies and threat-specific modules can be integrated.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"7 ","pages":"480-497"},"PeriodicalIF":6.3,"publicationDate":"2026-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11322785","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145982353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-29DOI: 10.1109/OJCOMS.2025.3649168
José Manuel Rúa-Estévez;Pablo Fondo-Ferreiro;Felipe Gil-Castiñeira;Francisco Javier González-Castaño
Mobility management remains a key challenge in cellular networks, particularly handover management. The introduction of a wider range of frequencies and radio access technologies in 5G networks further intensifies this challenge. For example, the 5G standard considers the joint deployment of cells using new frequency bands beyond 24 GHz (frequency range 2, FR2), alongside cells operating in the sub-6 GHz bands (frequency range 1, FR1), referred to as millimeter-wave heterogeneous networks (mmWave HetNets). However, the 3GPP-defined handover algorithms do not fully leverage the network capacity of HetNets, as they originate from single-band scenarios and base their decisions on received power levels. We propose two novel strategies for handover management in HetNets and evaluate them using a new, realistic, end-to-end full-stack 5G metasimulator, which is another key contribution of this paper. One of the strategies is based on a heuristic algorithm, while the other relies on a Double Deep Q-Network (DDQN) architecture. The current main 5G full-stack simulators do not support arbitrary handover strategies, so state-of-the-art research in this field has relied on custom simulators with simplified system models. To enable realistic simulations, we propose a novel method that orchestrates multiple 5G simulations to emulate a complex 5G environment with arbitrary handover capabilities. The evaluation of the proposed strategies shows an improvement between 65% and 450% in aggregated throughput compared to the 3GPP Release 15 handover and Conditional Handover algorithm, depending on the scenario.
{"title":"Intelligent Handover Solutions for Heterogeneous B5G Cellular Networks: Proposals and Full-Stack Evaluation","authors":"José Manuel Rúa-Estévez;Pablo Fondo-Ferreiro;Felipe Gil-Castiñeira;Francisco Javier González-Castaño","doi":"10.1109/OJCOMS.2025.3649168","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3649168","url":null,"abstract":"Mobility management remains a key challenge in cellular networks, particularly handover management. The introduction of a wider range of frequencies and radio access technologies in 5G networks further intensifies this challenge. For example, the 5G standard considers the joint deployment of cells using new frequency bands beyond 24 GHz (frequency range 2, FR2), alongside cells operating in the sub-6 GHz bands (frequency range 1, FR1), referred to as millimeter-wave heterogeneous networks (mmWave HetNets). However, the 3GPP-defined handover algorithms do not fully leverage the network capacity of HetNets, as they originate from single-band scenarios and base their decisions on received power levels. We propose two novel strategies for handover management in HetNets and evaluate them using a new, realistic, end-to-end full-stack 5G metasimulator, which is another key contribution of this paper. One of the strategies is based on a heuristic algorithm, while the other relies on a Double Deep Q-Network (DDQN) architecture. The current main 5G full-stack simulators do not support arbitrary handover strategies, so state-of-the-art research in this field has relied on custom simulators with simplified system models. To enable realistic simulations, we propose a novel method that orchestrates multiple 5G simulations to emulate a complex 5G environment with arbitrary handover capabilities. The evaluation of the proposed strategies shows an improvement between 65% and 450% in aggregated throughput compared to the 3GPP Release 15 handover and Conditional Handover algorithm, depending on the scenario.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"7 ","pages":"1-19"},"PeriodicalIF":6.3,"publicationDate":"2025-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11316620","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Integrated sensing and communication (ISAC) has gained significant traction in recent years, primarily because it allows existing communication infrastructure to support sensing applications with minimal additional costs. In particular, millimeter-wave (mmWave) ISAC has the potential to offer improved sensing performance in applications such as pose estimation and gesture recognition. For complex sensing tasks and environments, data-driven sensing, which relies on deep learning, is becoming increasingly popular and has shown promising results. However, deep learning models for these tasks require large labeled datasets to achieve high accuracy. Dataset collection and labeling are labor-intensive and time-consuming. Consequently, there is growing interest in leveraging unlabeled data to overcome these challenges. To address this, we propose mmGAN, a semi-supervised method for ISAC-based gesture recognition. We propose a novel loss function for mmGAN based on softplus, feature matching, and manifold regularization to significantly improve gesture recognition performance. We evaluate mmGAN on a 5G Orthogonal Frequency Division Multiplexing (OFDM) mmWave dataset comprising power per beam pair measurements. When training both mmGAN and the supervised baseline with only 0.6% of the labeled data, mmGAN demonstrates up to 25 percentage points higher accuracy than the supervised baseline. Our method serves as a strong foundation for cross-subject transfer learning, demonstrating the significant value of leveraging unlabeled data to enhance cross-domain sensing performance in ISAC systems. Our results demonstrate that the proposed loss function achieves superior performance across diverse subjects. Further, mmGAN significantly narrows the performance gap between semi-supervised and fully supervised models on the publicly available Widar dataset. Moreover, we provide an interpretable analysis of mmGAN performance through saliency maps and ablation studies, revealing key insights into the model’s behavior and generalization. This work is the first to evaluate gesture recognition performance in 5G OFDM mmWave ISAC systems using a semi-supervised learning approach, covering the entire pipeline from testbed implementation to model evaluation.
{"title":"mmGAN: Semi-Supervised GAN for Improved Gesture Recognition in mmWave ISAC Systems","authors":"Nabeel Nisar Bhat;Siddhartha Kumar;Mohammad Hossein Moghaddam;Jakob Struye;Jesus Omar Lacruz;Jacopo Pegoraro;Joerg Widmer;Rafael Berkvens;Jeroen Famaey","doi":"10.1109/OJCOMS.2025.3649235","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3649235","url":null,"abstract":"Integrated sensing and communication (ISAC) has gained significant traction in recent years, primarily because it allows existing communication infrastructure to support sensing applications with minimal additional costs. In particular, millimeter-wave (mmWave) ISAC has the potential to offer improved sensing performance in applications such as pose estimation and gesture recognition. For complex sensing tasks and environments, data-driven sensing, which relies on deep learning, is becoming increasingly popular and has shown promising results. However, deep learning models for these tasks require large labeled datasets to achieve high accuracy. Dataset collection and labeling are labor-intensive and time-consuming. Consequently, there is growing interest in leveraging unlabeled data to overcome these challenges. To address this, we propose mmGAN, a semi-supervised method for ISAC-based gesture recognition. We propose a novel loss function for mmGAN based on softplus, feature matching, and manifold regularization to significantly improve gesture recognition performance. We evaluate mmGAN on a 5G Orthogonal Frequency Division Multiplexing (OFDM) mmWave dataset comprising power per beam pair measurements. When training both mmGAN and the supervised baseline with only 0.6% of the labeled data, mmGAN demonstrates up to 25 percentage points higher accuracy than the supervised baseline. Our method serves as a strong foundation for cross-subject transfer learning, demonstrating the significant value of leveraging unlabeled data to enhance cross-domain sensing performance in ISAC systems. Our results demonstrate that the proposed loss function achieves superior performance across diverse subjects. Further, mmGAN significantly narrows the performance gap between semi-supervised and fully supervised models on the publicly available Widar dataset. Moreover, we provide an interpretable analysis of mmGAN performance through saliency maps and ablation studies, revealing key insights into the model’s behavior and generalization. This work is the first to evaluate gesture recognition performance in 5G OFDM mmWave ISAC systems using a semi-supervised learning approach, covering the entire pipeline from testbed implementation to model evaluation.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"7 ","pages":"95-117"},"PeriodicalIF":6.3,"publicationDate":"2025-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11317966","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This survey provides a comprehensive overview of Cooperative non orthogonal multiple access (C-NOMA) systems, where cooperative relaying enhances reliability, extends coverage, and strengthens system robustness. The study begins by classifying the fundamental structures of C-NOMA into two key categories: user-assisted relaying, where end-user devices forward information to other users, and dedicated relaying, where separate relay nodes assist transmission. Beyond its basic principles, the survey explores the integration of C-NOMA with advanced technologies such as cognitive radio (CR), full-duplex (FD) transmission, simultaneous wireless information and power transfer (SWIPT), power line communication (PLC), multiple-input multiple-output (MIMO), heterogeneous networks (HetNets), rate-splitting multiple access (RSMA), visible light communication (VLC), and intelligent reflecting surfaces (IRS). These integrations significantly improve energy efficiency, spectral utilization, and coverage reliability. Moreover, artificial intelligence (AI), including deep reinforcement learning (DRL) and federated learning (FL), is identified as a vital enabler for intelligent power allocation, relay selection, and user clustering, addressing the limitations of traditional optimization approaches. This survey elaborates in detail the integration of C-NOMA with blockchain, edge computing, quantum computing, extended reality (XR), i.e., virtual reality/augmented reality (VR/AR), and unmanned aerial vehicles (UAV). Furthermore, this survey identifies quantum-enabled C-NOMA as a transformative paradigm, where quantum key distribution (QKD) ensures physical layer security (PLS), and quantum machine learning (QML) enhances interference mitigation and large-scale optimization. Performance evaluation in terms of spectral efficiency (SE), energy efficiency, and quality-of-service (QoS) requirements is critically analyzed, with special emphasis on challenges such as accurate channel state information (CSI) acquisition, robust successive interference cancellation (SIC), scalable relay selection, and security in heterogeneous environments. In summary, this survey consolidates the state-of-the-art developments in C-NOMA and outlines future research directions, including AI-driven optimization, quantum-assisted communication, UAV and satellite integration, reconfigurable intelligent surface (RIS)-enabled designs, and hybrid OMA-NOMA switching. By addressing these open challenges, C-NOMA is expected to serve as a cornerstone for secure, energy-efficient, and ultra-reliable connectivity in 6G and beyond, enabling massive IoT, autonomous systems, and next-generation smart city infrastructures.
{"title":"Survey of Cooperative NOMA for Beyond 5G: State-of-the-Art, Applications and Research Directions","authors":"Swathi Priya Indraganti;Suseela Vappangi;Anoop Kumar Mishra;Sudha Ellison Mathe;Ali Arshad Nasir;T. Deepa;Neha Gupta","doi":"10.1109/OJCOMS.2025.3648469","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3648469","url":null,"abstract":"This survey provides a comprehensive overview of Cooperative non orthogonal multiple access (C-NOMA) systems, where cooperative relaying enhances reliability, extends coverage, and strengthens system robustness. The study begins by classifying the fundamental structures of C-NOMA into two key categories: user-assisted relaying, where end-user devices forward information to other users, and dedicated relaying, where separate relay nodes assist transmission. Beyond its basic principles, the survey explores the integration of C-NOMA with advanced technologies such as cognitive radio (CR), full-duplex (FD) transmission, simultaneous wireless information and power transfer (SWIPT), power line communication (PLC), multiple-input multiple-output (MIMO), heterogeneous networks (HetNets), rate-splitting multiple access (RSMA), visible light communication (VLC), and intelligent reflecting surfaces (IRS). These integrations significantly improve energy efficiency, spectral utilization, and coverage reliability. Moreover, artificial intelligence (AI), including deep reinforcement learning (DRL) and federated learning (FL), is identified as a vital enabler for intelligent power allocation, relay selection, and user clustering, addressing the limitations of traditional optimization approaches. This survey elaborates in detail the integration of C-NOMA with blockchain, edge computing, quantum computing, extended reality (XR), i.e., virtual reality/augmented reality (VR/AR), and unmanned aerial vehicles (UAV). Furthermore, this survey identifies quantum-enabled C-NOMA as a transformative paradigm, where quantum key distribution (QKD) ensures physical layer security (PLS), and quantum machine learning (QML) enhances interference mitigation and large-scale optimization. Performance evaluation in terms of spectral efficiency (SE), energy efficiency, and quality-of-service (QoS) requirements is critically analyzed, with special emphasis on challenges such as accurate channel state information (CSI) acquisition, robust successive interference cancellation (SIC), scalable relay selection, and security in heterogeneous environments. In summary, this survey consolidates the state-of-the-art developments in C-NOMA and outlines future research directions, including AI-driven optimization, quantum-assisted communication, UAV and satellite integration, reconfigurable intelligent surface (RIS)-enabled designs, and hybrid OMA-NOMA switching. By addressing these open challenges, C-NOMA is expected to serve as a cornerstone for secure, energy-efficient, and ultra-reliable connectivity in 6G and beyond, enabling massive IoT, autonomous systems, and next-generation smart city infrastructures.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"7 ","pages":"40-94"},"PeriodicalIF":6.3,"publicationDate":"2025-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11315150","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-26DOI: 10.1109/OJCOMS.2025.3648840
Balqis Yafis;Jane-Hwa Huang;Chih-Min Yu;Li-Chun Wang
Reconfigurable Intelligent Surface (RIS) technology enables programmable wireless propagation through passive beamforming. However, large-scale implementations often incur excessive control overhead and computational complexity. This paper proposes a Spirograph-based (SG) discrete beamforming framework that constructs a scalable RIS codebook using non-uniform quantization points derived from parametric Spirograph geometry. The proposed approach quantizes beam directions rather than individual phase shifts, thereby minimizing signaling requirements while maintaining near-optimal phase alignment between reflected and direct paths. A reduced-codebook mechanism is further developed to eliminate redundant beams in irregular coverage regions, significantly lowering complexity without compromising performance. Simulation results demonstrate that the SG scheme achieves over 95% of the average data rate of the ideal continuous phase-shift method while reducing control overhead by more than 98% compared with the discrete phase-shift (DPS) approach. Notably, SG outperforms DPS by up to 2.5 Mbit/s in average data rate. Moreover, the Beam-Angle Region (BAR) selection algorithm achieves a favorable trade-off between data rate and complexity, providing near–exhaustive-search performance with approximately 20% fewer beam evaluations. These results confirm that the proposed SG framework offers an efficient, scalable, and geometrically robust solution for large-scale RIS-assisted wireless communication systems.
{"title":"Spirograph-Based Discrete Beamforming and Scalable Codebook Design for Reconfigurable Intelligent Surface Systems","authors":"Balqis Yafis;Jane-Hwa Huang;Chih-Min Yu;Li-Chun Wang","doi":"10.1109/OJCOMS.2025.3648840","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3648840","url":null,"abstract":"Reconfigurable Intelligent Surface (RIS) technology enables programmable wireless propagation through passive beamforming. However, large-scale implementations often incur excessive control overhead and computational complexity. This paper proposes a Spirograph-based (SG) discrete beamforming framework that constructs a scalable RIS codebook using non-uniform quantization points derived from parametric Spirograph geometry. The proposed approach quantizes beam directions rather than individual phase shifts, thereby minimizing signaling requirements while maintaining near-optimal phase alignment between reflected and direct paths. A reduced-codebook mechanism is further developed to eliminate redundant beams in irregular coverage regions, significantly lowering complexity without compromising performance. Simulation results demonstrate that the SG scheme achieves over 95% of the average data rate of the ideal continuous phase-shift method while reducing control overhead by more than 98% compared with the discrete phase-shift (DPS) approach. Notably, SG outperforms DPS by up to 2.5 Mbit/s in average data rate. Moreover, the Beam-Angle Region (BAR) selection algorithm achieves a favorable trade-off between data rate and complexity, providing near–exhaustive-search performance with approximately 20% fewer beam evaluations. These results confirm that the proposed SG framework offers an efficient, scalable, and geometrically robust solution for large-scale RIS-assisted wireless communication systems.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"7 ","pages":"521-538"},"PeriodicalIF":6.3,"publicationDate":"2025-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11316334","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145982354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-25DOI: 10.1109/OJCOMS.2025.3648535
Senanur Demirci;Saira Rafique;Hüseyin Arslan
The evolution from fifth-generation (5G) networks to sixth-generation (6G) networks demands ultra-high data rates, low latency, and robust connectivity. Terahertz (THz) band offers broad bandwidth but suffers from severe path loss and high blockage sensitivity, making non-line-of-sight (NLoS) links challenging. While large antenna arrays mitigate attenuation, performance still depends on environmental surface interactions. In this context, extremely large-scale multiple-input multiple output (XL-MIMO) systems provide a unique advantage by offering enhanced angular resolution for better characterization of surface interactions. Building on these insights, we propose a visibility region (VR)-based framework for surface identification in near field (NF) THz XL-MIMO systems. By incorporating surface scattering characteristics into VR modeling, we derive power-angle profiles (PAPs) that serve as unique signatures to distinguish smooth, medium, and rough surfaces based on their scattering power behavior and angular spread. Our analysis of VR power across antenna indices highlights how both proximity and surface characteristics affect the ability to identify surfaces. The performance of the proposed framework is evaluated through root mean square error, and probability of detection analyses, with results compared against a conventional scattering-agnostic NF channel. The proposed method also achieves significantly reduced computational complexity, enabling real-time execution while maintaining high estimation accuracy. Furthermore, a Gaussian filter is applied to reduce diffuse scattering fluctuations, making the angular broadening from surfaces more obvious. In addition, capacity analysis is performed under single- and multi-surface scenarios, revealing trade-offs between path loss reduction at close distances and multipath richness due to multiple surfaces. The capacity analysis further demonstrate that the scattering-aware framework achieves higher overall throughput and approaches the analytical upper bound. The results confirm the practicality of the proposed approach and highlight surface characteristics as a critical design parameter for establishing robust NLoS connectivity in NF THz XL-MIMO while maintaining lower complexity.
{"title":"Visibility Region-Based Surface Identification for Near-Field XL-MIMO at THz Frequencies","authors":"Senanur Demirci;Saira Rafique;Hüseyin Arslan","doi":"10.1109/OJCOMS.2025.3648535","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3648535","url":null,"abstract":"The evolution from fifth-generation (5G) networks to sixth-generation (6G) networks demands ultra-high data rates, low latency, and robust connectivity. Terahertz (THz) band offers broad bandwidth but suffers from severe path loss and high blockage sensitivity, making non-line-of-sight (NLoS) links challenging. While large antenna arrays mitigate attenuation, performance still depends on environmental surface interactions. In this context, extremely large-scale multiple-input multiple output (XL-MIMO) systems provide a unique advantage by offering enhanced angular resolution for better characterization of surface interactions. Building on these insights, we propose a visibility region (VR)-based framework for surface identification in near field (NF) THz XL-MIMO systems. By incorporating surface scattering characteristics into VR modeling, we derive power-angle profiles (PAPs) that serve as unique signatures to distinguish smooth, medium, and rough surfaces based on their scattering power behavior and angular spread. Our analysis of VR power across antenna indices highlights how both proximity and surface characteristics affect the ability to identify surfaces. The performance of the proposed framework is evaluated through root mean square error, and probability of detection analyses, with results compared against a conventional scattering-agnostic NF channel. The proposed method also achieves significantly reduced computational complexity, enabling real-time execution while maintaining high estimation accuracy. Furthermore, a Gaussian filter is applied to reduce diffuse scattering fluctuations, making the angular broadening from surfaces more obvious. In addition, capacity analysis is performed under single- and multi-surface scenarios, revealing trade-offs between path loss reduction at close distances and multipath richness due to multiple surfaces. The capacity analysis further demonstrate that the scattering-aware framework achieves higher overall throughput and approaches the analytical upper bound. The results confirm the practicality of the proposed approach and highlight surface characteristics as a critical design parameter for establishing robust NLoS connectivity in NF THz XL-MIMO while maintaining lower complexity.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"7 ","pages":"118-137"},"PeriodicalIF":6.3,"publicationDate":"2025-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11315124","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-25DOI: 10.1109/OJCOMS.2025.3648642
J. Ceballos-Gutierrez;E. Aranda-Escolastico;D. Moreno-Salinas
Cooperative surveillance systems used for Air Traffic Management (ATM) rely entirely on air-ground transactions in the 1030/1090 MHz frequency bands to achieve their surveillance objectives. However, these bands are currently experiencing an excessive volume of transactions, causing channel access difficulties and often exceeding the reply capabilities of aircraft transponders. This situation can potentially affect air traffic capacity and pose safety risks. Various mitigation strategies have been studied in recent years, but almost none of these strategies have adequately addressed the issue of minimizing transactions associated with Downlinked Aircraft Parameters (DAP) extracted from aircraft transponder registers. This work presents and evaluates a methodology designed to reduce DAP extractions by utilizing information already available via Automatic Dependent Surveillance–Broadcast (ADS-B) messages, with the aim of reducing unnecessary transactions in the frequency channels while maintaining a similar level of information available at the end of the surveillance chain.
{"title":"Enhancing Spectrum Utilization in Mode S Surveillance Systems via 1090ES ADS-B","authors":"J. Ceballos-Gutierrez;E. Aranda-Escolastico;D. Moreno-Salinas","doi":"10.1109/OJCOMS.2025.3648642","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3648642","url":null,"abstract":"Cooperative surveillance systems used for Air Traffic Management (ATM) rely entirely on air-ground transactions in the 1030/1090 MHz frequency bands to achieve their surveillance objectives. However, these bands are currently experiencing an excessive volume of transactions, causing channel access difficulties and often exceeding the reply capabilities of aircraft transponders. This situation can potentially affect air traffic capacity and pose safety risks. Various mitigation strategies have been studied in recent years, but almost none of these strategies have adequately addressed the issue of minimizing transactions associated with Downlinked Aircraft Parameters (DAP) extracted from aircraft transponder registers. This work presents and evaluates a methodology designed to reduce DAP extractions by utilizing information already available via Automatic Dependent Surveillance–Broadcast (ADS-B) messages, with the aim of reducing unnecessary transactions in the frequency channels while maintaining a similar level of information available at the end of the surveillance chain.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"7 ","pages":"138-152"},"PeriodicalIF":6.3,"publicationDate":"2025-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11315129","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-24DOI: 10.1109/OJCOMS.2025.3647898
Sheng-Zhi Huang;Chin-Lin Hu;Carl K. Chang
Autonomous Aerial Vehicles (AAVs) are increasingly deployed for time-sensitive data gathering applications in infrastructure-less network environments, such as large-scale wireless sensor networks (WSNs) and disaster communication areas. However, limited onboard energy and buffer capacities present critical challenges to AAV-assisted task execution, mission continuity, and service coverage. This paper proposes a two-tier AAV deployment (2T-AAV) mechanism with a cooperative design that assigns two distinct roles: mission-oriented UAVs, which are responsible for collecting prioritized data, and ferry-oriented UAVs, which provide in-air energy charging and buffer offloading services. The 2T-AAV mechanism determines the hovering routes of mission-oriented UAVs using a Weighted Traveling Salesman Problem (W-TSP) method that incorporates an importance factor reflecting data urgency. In addition, the mechanism develops a Nonlinear Least Squares-based Route (NLLSR) method to optimize the recharging routes of ferry-oriented UAVs. Through this cooperative design, the 2T-AAV mechanism minimizes total mission time while adhering to AAV energy and buffer constraints. Extensive simulations are conducted under both synthetic and real-world map scenarios. The results demonstrate that the proposed 2T-AAV scheme significantly reduces mission time, energy consumption, and data drop rate when compared with several geometry-based, TSP-based, and reinforcement learning-based approaches. These findings confirm the feasibility and benefits of dual-role AAV cooperation for efficient data collection in AAV-assisted WSNs.
{"title":"Heterogeneous Multi-AAV Cooperation With Data Gathering, Offloading, and Wireless Charging in Wireless Sensor Networks","authors":"Sheng-Zhi Huang;Chin-Lin Hu;Carl K. Chang","doi":"10.1109/OJCOMS.2025.3647898","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3647898","url":null,"abstract":"Autonomous Aerial Vehicles (AAVs) are increasingly deployed for time-sensitive data gathering applications in infrastructure-less network environments, such as large-scale wireless sensor networks (WSNs) and disaster communication areas. However, limited onboard energy and buffer capacities present critical challenges to AAV-assisted task execution, mission continuity, and service coverage. This paper proposes a two-tier AAV deployment (2T-AAV) mechanism with a cooperative design that assigns two distinct roles: mission-oriented UAVs, which are responsible for collecting prioritized data, and ferry-oriented UAVs, which provide in-air energy charging and buffer offloading services. The 2T-AAV mechanism determines the hovering routes of mission-oriented UAVs using a Weighted Traveling Salesman Problem (W-TSP) method that incorporates an importance factor reflecting data urgency. In addition, the mechanism develops a Nonlinear Least Squares-based Route (NLLSR) method to optimize the recharging routes of ferry-oriented UAVs. Through this cooperative design, the 2T-AAV mechanism minimizes total mission time while adhering to AAV energy and buffer constraints. Extensive simulations are conducted under both synthetic and real-world map scenarios. The results demonstrate that the proposed 2T-AAV scheme significantly reduces mission time, energy consumption, and data drop rate when compared with several geometry-based, TSP-based, and reinforcement learning-based approaches. These findings confirm the feasibility and benefits of dual-role AAV cooperation for efficient data collection in AAV-assisted WSNs.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"7 ","pages":"20-39"},"PeriodicalIF":6.3,"publicationDate":"2025-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11313863","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}