首页 > 最新文献

IEEE Open Journal of the Communications Society最新文献

英文 中文
Development of Various Stacking Ensemble-Based HIDS Using ADFA Datasets
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-02-03 DOI: 10.1109/OJCOMS.2025.3538101
Hami Satilmiş;Sedat Akleylek;Zaliha Yüce Tok
The rapid increase in the number of cyber attacks and the emergence of various attack variations pose significant threats to the security of computer systems and networks. Various intrusion detection systems (IDS) are developed to defend computer systems and networks in response to these threats. One type of IDS, known as a host-based intrusion detection system (HIDS), focuses on securing a single host. Numerous HIDS have been proposed in the literature, incorporating various detection methods. This study develops multiple machine learning (ML) models and stacking ensemble based HIDS that can be used as detection methods in HIDS. Initially, n-grams, standard bag-of-words (BoW), binary BoW, probability BoW, and term frequency-inverse document frequency (TF-IDF) BoW methods are applied to the ADFA-LD and ADFA-WD datasets. Mutual information and k-means methods are used together for feature selection on the resulting BoW datasets. Individual models are created using either selected features or all features. Subsequently, the outputs of these individual models are used in extreme gradient boosting (XGBoost) and adaptive boosting (AdaBoost) models to develop stacking ensemble based models. The experimental results show that the best accuracy (ACC) among models using ADFA-LD based BoW datasets is achieved by the stacking ensemble based XGBoost model, which has an ACC of 0.9747. This XGBoost model utilizes the standard BoW dataset and selected features. Among models using ADFA-WD based BoW datasets, the stacking ensemble based XGBoost is also the most successful in terms of ACC, with an ACC of 0.9163, using the standard BoW dataset and all features.
{"title":"Development of Various Stacking Ensemble-Based HIDS Using ADFA Datasets","authors":"Hami Satilmiş;Sedat Akleylek;Zaliha Yüce Tok","doi":"10.1109/OJCOMS.2025.3538101","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3538101","url":null,"abstract":"The rapid increase in the number of cyber attacks and the emergence of various attack variations pose significant threats to the security of computer systems and networks. Various intrusion detection systems (IDS) are developed to defend computer systems and networks in response to these threats. One type of IDS, known as a host-based intrusion detection system (HIDS), focuses on securing a single host. Numerous HIDS have been proposed in the literature, incorporating various detection methods. This study develops multiple machine learning (ML) models and stacking ensemble based HIDS that can be used as detection methods in HIDS. Initially, n-grams, standard bag-of-words (BoW), binary BoW, probability BoW, and term frequency-inverse document frequency (TF-IDF) BoW methods are applied to the ADFA-LD and ADFA-WD datasets. Mutual information and k-means methods are used together for feature selection on the resulting BoW datasets. Individual models are created using either selected features or all features. Subsequently, the outputs of these individual models are used in extreme gradient boosting (XGBoost) and adaptive boosting (AdaBoost) models to develop stacking ensemble based models. The experimental results show that the best accuracy (ACC) among models using ADFA-LD based BoW datasets is achieved by the stacking ensemble based XGBoost model, which has an ACC of 0.9747. This XGBoost model utilizes the standard BoW dataset and selected features. Among models using ADFA-WD based BoW datasets, the stacking ensemble based XGBoost is also the most successful in terms of ACC, with an ACC of 0.9163, using the standard BoW dataset and all features.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1170-1189"},"PeriodicalIF":6.3,"publicationDate":"2025-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10870100","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143455294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An In-Depth Comparative Study of Quantum-Classical Encoding Methods for Network Intrusion Detection
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-01-31 DOI: 10.1109/OJCOMS.2025.3537957
Adam Kadi;Aymene Selamnia;Zakaria Abou El Houda;Hajar Moudoud;Bouziane Brik;Lyes Khoukhi
In today’s rapidly evolving cyber landscape, the growing sophistication of attacks, including the rise of zero-day exploits, poses critical challenges for network intrusion detection. Traditional Intrusion Detection Systems (IDSs) often struggle with the complexity and high dimensionality of modern cyber threats. Quantum Machine Learning (QML) seamlessly integrates the computational power of quantum computing with the adaptability of machine learning, offering an innovative approach to solving intricate and high-dimensional challenges. A key factor in QML’s performance is the method used to encode classical data into quantum states, as it defines how data is represented and processed in quantum circuits. QML offers promising advances for IDS, particularly through hybrid quantum-classical models. This study presents an in-depth comparative analysis of quantum-classical data encoding techniques for QML-based IDS. To the best of our knowledge, this is the first study to comprehensively evaluate the performance impact of different quantum encoding methods and provide a thorough evaluation of their impacts on the overall model performances. To achieve this, we first present a comprehensive evaluation of quantum and classical data encoding techniques, focusing on four key encoding techniques namely, Amplitude Embedding, Angle Embedding, Instantaneous Quantum Polynomial (IQP) Encoding, and Quantum Approximate Optimization Algorithm (QAOA) Embedding. Then, we develop a hybrid quantum-classical QML model to analyze how each encoding affects classification performance for malicious traffic. Finally, we conduct extensive experiments using two well-known, real-world network attack datasets to assess the accuracy and efficiency of each encoding approach. Our obtained results show notable differences in classification accuracy, underscoring the importance of encoding choice in optimizing QML-based IDS. This study aims to advance the application of quantum methodologies in network security by identifying effective encoding strategies for intrusion detection.
{"title":"An In-Depth Comparative Study of Quantum-Classical Encoding Methods for Network Intrusion Detection","authors":"Adam Kadi;Aymene Selamnia;Zakaria Abou El Houda;Hajar Moudoud;Bouziane Brik;Lyes Khoukhi","doi":"10.1109/OJCOMS.2025.3537957","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3537957","url":null,"abstract":"In today’s rapidly evolving cyber landscape, the growing sophistication of attacks, including the rise of zero-day exploits, poses critical challenges for network intrusion detection. Traditional Intrusion Detection Systems (IDSs) often struggle with the complexity and high dimensionality of modern cyber threats. Quantum Machine Learning (QML) seamlessly integrates the computational power of quantum computing with the adaptability of machine learning, offering an innovative approach to solving intricate and high-dimensional challenges. A key factor in QML’s performance is the method used to encode classical data into quantum states, as it defines how data is represented and processed in quantum circuits. QML offers promising advances for IDS, particularly through hybrid quantum-classical models. This study presents an in-depth comparative analysis of quantum-classical data encoding techniques for QML-based IDS. To the best of our knowledge, this is the first study to comprehensively evaluate the performance impact of different quantum encoding methods and provide a thorough evaluation of their impacts on the overall model performances. To achieve this, we first present a comprehensive evaluation of quantum and classical data encoding techniques, focusing on four key encoding techniques namely, Amplitude Embedding, Angle Embedding, Instantaneous Quantum Polynomial (IQP) Encoding, and Quantum Approximate Optimization Algorithm (QAOA) Embedding. Then, we develop a hybrid quantum-classical QML model to analyze how each encoding affects classification performance for malicious traffic. Finally, we conduct extensive experiments using two well-known, real-world network attack datasets to assess the accuracy and efficiency of each encoding approach. Our obtained results show notable differences in classification accuracy, underscoring the importance of encoding choice in optimizing QML-based IDS. This study aims to advance the application of quantum methodologies in network security by identifying effective encoding strategies for intrusion detection.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1129-1148"},"PeriodicalIF":6.3,"publicationDate":"2025-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10869381","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143455290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling of Pointing Errors in Terrestrial FSO Links Caused by Building Sway Under Wind Loads
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-01-30 DOI: 10.1109/OJCOMS.2025.3537017
Hasan Tahsin Toplar;Murat Uysal
With their high data rate capacity, free space optical (FSO) communication systems can be used for last mile access, backhauling and fiber optic replacement. Terrestrial FSO links are typically installed on building roofs and are prone to building sways due to dynamic wind loads. In this paper, we provide a realistic modeling of the pointing errors in terrestrial FSO links relating them to the underlying physical phenomena. Towards this end, we use a civil engineering software for multi-story building analysis and design in conjunction with a wind simulator. We conduct extensive simulations to characterize the behaviour of various building sizes under wind loads. Statistical analysis of the building sway motion due to wind demonstrates that the motion is Gaussian in each axis and is in good agreement with current literature. However, it is also observed that the sway motion is dominated by the major axis (horizontal) while the other two are negligible in amplitude when the building is directly facing the wind. This leads to a zero mean single-sided Gaussian distribution. Through non-linear regression, we propose a closed-form expression for the standard deviation as a function of building height, width and wind speed. Afterwards, we present a closed-form expression of the error probability as a function of these environmental parameters and confirm its accuracy through numerical computations.
{"title":"Modeling of Pointing Errors in Terrestrial FSO Links Caused by Building Sway Under Wind Loads","authors":"Hasan Tahsin Toplar;Murat Uysal","doi":"10.1109/OJCOMS.2025.3537017","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3537017","url":null,"abstract":"With their high data rate capacity, free space optical (FSO) communication systems can be used for last mile access, backhauling and fiber optic replacement. Terrestrial FSO links are typically installed on building roofs and are prone to building sways due to dynamic wind loads. In this paper, we provide a realistic modeling of the pointing errors in terrestrial FSO links relating them to the underlying physical phenomena. Towards this end, we use a civil engineering software for multi-story building analysis and design in conjunction with a wind simulator. We conduct extensive simulations to characterize the behaviour of various building sizes under wind loads. Statistical analysis of the building sway motion due to wind demonstrates that the motion is Gaussian in each axis and is in good agreement with current literature. However, it is also observed that the sway motion is dominated by the major axis (horizontal) while the other two are negligible in amplitude when the building is directly facing the wind. This leads to a zero mean single-sided Gaussian distribution. Through non-linear regression, we propose a closed-form expression for the standard deviation as a function of building height, width and wind speed. Afterwards, we present a closed-form expression of the error probability as a function of these environmental parameters and confirm its accuracy through numerical computations.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1161-1169"},"PeriodicalIF":6.3,"publicationDate":"2025-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10858333","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143455221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of M-QAM MIMO PNC Based on MRC and ZR Techniques
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-01-29 DOI: 10.1109/OJCOMS.2025.3535871
Alaa A. Yassin;Ebtihal H. G. Yousif;Rashid A. Saeed;Hashim Elshafie;Abdullah Alenizi;Hesham Alhumyani
Wireless networks have been experiencing a very substantial increase in the delivered amount of data with high speed, due to the expansion of wireless applications. Physical-layer Network Coding (PNC) combined with MIMO techniques is introduced to optimize performance metrics and provide increased data throughput and full diversity gain. This paper investigates the performance of MIMO PNC assuming a Two-Way Relay Network (TWRN) over Rayleigh fading. Maximum Ratio Combining (MRC) and Zero-Forcing (ZF) for the receive/transmit diversity techniques are used at the relay node to reduce multi-user interference. The system model is based on denoise-and-forward (DNF) relaying along with the Latin Square (LS) mapping algorithm at the relay node and square M-ary Quadrature Amplitude Modulation (M-QAM) at all nodes. The targetted performance metrics are the error probability, improvement of uplink capacity gain and downlink achievable sum rate. Furthermore, the mathematical model of end-to-end and uplink average error probability, PNC throughput, capacity, and sum rate are derived for the proposed scheme over the Rayleigh fading channel and verified through Monte-Carlo simulations. The obtained result demonstrates the reduction of symbol error rate in addition to enhancement of the normalized throughput, capacity, and sum rate when increasing the number of antenna at the relay node.
{"title":"Performance of M-QAM MIMO PNC Based on MRC and ZR Techniques","authors":"Alaa A. Yassin;Ebtihal H. G. Yousif;Rashid A. Saeed;Hashim Elshafie;Abdullah Alenizi;Hesham Alhumyani","doi":"10.1109/OJCOMS.2025.3535871","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3535871","url":null,"abstract":"Wireless networks have been experiencing a very substantial increase in the delivered amount of data with high speed, due to the expansion of wireless applications. Physical-layer Network Coding (PNC) combined with MIMO techniques is introduced to optimize performance metrics and provide increased data throughput and full diversity gain. This paper investigates the performance of MIMO PNC assuming a Two-Way Relay Network (TWRN) over Rayleigh fading. Maximum Ratio Combining (MRC) and Zero-Forcing (ZF) for the receive/transmit diversity techniques are used at the relay node to reduce multi-user interference. The system model is based on denoise-and-forward (DNF) relaying along with the Latin Square (LS) mapping algorithm at the relay node and square M-ary Quadrature Amplitude Modulation (M-QAM) at all nodes. The targetted performance metrics are the error probability, improvement of uplink capacity gain and downlink achievable sum rate. Furthermore, the mathematical model of end-to-end and uplink average error probability, PNC throughput, capacity, and sum rate are derived for the proposed scheme over the Rayleigh fading channel and verified through Monte-Carlo simulations. The obtained result demonstrates the reduction of symbol error rate in addition to enhancement of the normalized throughput, capacity, and sum rate when increasing the number of antenna at the relay node.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1004-1015"},"PeriodicalIF":6.3,"publicationDate":"2025-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10856889","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143403966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Compact 12-Port MIMO Dielectric Lens Antenna With Wide-Angle Beam Scanning for Ka-Band Applications
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-01-28 DOI: 10.1109/OJCOMS.2025.3536316
Massinissa Belazzoug;Idris Messaoudene;Yassine Himeur;Boualem Hammache;Salem Titouni;Rida Gadhafi;Raouf Zerrougui;Youcef Braham Chaouche;Shadi Atalla;Wathiq Mansoor
This paper tackles significant challenges in the design of millimeter-wave MIMO (Multi-input Multi-output) antennas for the Ka-band (26-30 GHz) as utilized in 5G applications. Current antenna designs suffer from limitations such as constrained bandwidth, inadequate gain, and restricted beam scanning capabilities, adversely affecting performance, particularly in high-density urban environments. A novel MIMO antenna featuring a 12-port dielectric lens has been proposed to address these issues, introducing several advancements to improve key performance metrics. The antenna demonstrates a peak realized gain of approximately 14 dBi and achieves a bandwidth exceeding 4 GHz. Importantly, it features full 360° beam scanning capabilities and maintains an exceptionally low envelope correlation coefficient (ECC) of less than 0.0014. The design also shows impressive radiation efficiency consistently exceeding 95%, complemented by excellent isolation characteristics with mutual coupling maintained below −30 dB. This research provides a scalable solution that could significantly enhance the performance of next-generation wireless networks, addressing the high demands of urban 5G deployments.
{"title":"A Compact 12-Port MIMO Dielectric Lens Antenna With Wide-Angle Beam Scanning for Ka-Band Applications","authors":"Massinissa Belazzoug;Idris Messaoudene;Yassine Himeur;Boualem Hammache;Salem Titouni;Rida Gadhafi;Raouf Zerrougui;Youcef Braham Chaouche;Shadi Atalla;Wathiq Mansoor","doi":"10.1109/OJCOMS.2025.3536316","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3536316","url":null,"abstract":"This paper tackles significant challenges in the design of millimeter-wave MIMO (Multi-input Multi-output) antennas for the Ka-band (26-30 GHz) as utilized in 5G applications. Current antenna designs suffer from limitations such as constrained bandwidth, inadequate gain, and restricted beam scanning capabilities, adversely affecting performance, particularly in high-density urban environments. A novel MIMO antenna featuring a 12-port dielectric lens has been proposed to address these issues, introducing several advancements to improve key performance metrics. The antenna demonstrates a peak realized gain of approximately 14 dBi and achieves a bandwidth exceeding 4 GHz. Importantly, it features full 360° beam scanning capabilities and maintains an exceptionally low envelope correlation coefficient (ECC) of less than 0.0014. The design also shows impressive radiation efficiency consistently exceeding 95%, complemented by excellent isolation characteristics with mutual coupling maintained below −30 dB. This research provides a scalable solution that could significantly enhance the performance of next-generation wireless networks, addressing the high demands of urban 5G deployments.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1149-1160"},"PeriodicalIF":6.3,"publicationDate":"2025-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10856844","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143455292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bandit-Based Multiple Access Approach for Multi-Link Operation in Heterogeneous Dynamic Networks
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-01-28 DOI: 10.1109/OJCOMS.2025.3535619
Mingqi Han;Zhenyu Chen;Xinghua Sun
The Multi-Link Operation (MLO) is a key technique in the upcoming IEEE 802.11be Extremely High Throughput standard, also known as Wi-Fi 7. MLO enables Multi-Link Devices (MLDs) to utilize multiple communication links simultaneously, thereby enhancing throughput. However, research has shown that MLO performance deteriorates in heterogeneous networks coexisting with Single-Link Devices (SLDs), especially in asymmetric scenarios. In this paper, we address the multiple access problem for MLDs in both homogeneous and heterogeneous dynamic uplink networks. We propose a Multi-Player Combinatorial Upper Confidence Bound (MP-CUCB) algorithm designed for Simultaneous Transmit and Receive (STR) MLDs to better exploit the potential of MLO. The MP-CUCB algorithm enables each MLD to independently make access decisions to improve throughput while guaranteeing the fairness requirements of SLDs. Simulation results demonstrate that the MP-CUCB algorithm can: 1) better utilize the potential of MLO, achieving a 20% improvement compared to the standard CSMA scheme while ensuring fairness requirements for both MLDs and SLDs; 2) address the severe performance degradation issue in asymmetric heterogeneous scenarios, achieving a 33% improvement compared to the standard CSMA; 3) effectively adapt to dynamic networks with new accessing nodes, achieving short convergence times.
{"title":"Bandit-Based Multiple Access Approach for Multi-Link Operation in Heterogeneous Dynamic Networks","authors":"Mingqi Han;Zhenyu Chen;Xinghua Sun","doi":"10.1109/OJCOMS.2025.3535619","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3535619","url":null,"abstract":"The Multi-Link Operation (MLO) is a key technique in the upcoming IEEE 802.11be Extremely High Throughput standard, also known as Wi-Fi 7. MLO enables Multi-Link Devices (MLDs) to utilize multiple communication links simultaneously, thereby enhancing throughput. However, research has shown that MLO performance deteriorates in heterogeneous networks coexisting with Single-Link Devices (SLDs), especially in asymmetric scenarios. In this paper, we address the multiple access problem for MLDs in both homogeneous and heterogeneous dynamic uplink networks. We propose a Multi-Player Combinatorial Upper Confidence Bound (MP-CUCB) algorithm designed for Simultaneous Transmit and Receive (STR) MLDs to better exploit the potential of MLO. The MP-CUCB algorithm enables each MLD to independently make access decisions to improve throughput while guaranteeing the fairness requirements of SLDs. Simulation results demonstrate that the MP-CUCB algorithm can: 1) better utilize the potential of MLO, achieving a 20% improvement compared to the standard CSMA scheme while ensuring fairness requirements for both MLDs and SLDs; 2) address the severe performance degradation issue in asymmetric heterogeneous scenarios, achieving a 33% improvement compared to the standard CSMA; 3) effectively adapt to dynamic networks with new accessing nodes, achieving short convergence times.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1423-1437"},"PeriodicalIF":6.3,"publicationDate":"2025-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10856222","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143496468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Integral of Fox’s H-Functions With Application to the Performance of Hybrid FSO/RF Systems Over Generalized Fading Channels
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-01-27 DOI: 10.1109/OJCOMS.2025.3534317
Wagdy Ameen Alathwary;Essam Saleh Altubaishi
In recent years, Fox’s H-function (FHF) has appeared in the statistical channel models of wireless communication systems. In some cases, the derivation of performance metrics becomes so complicated, particularly for communication systems that operate under two different fading channels, and various conditions. This difficulty pushed the researchers to use approximation methods to derive the performance metrics, such as finite series approximation which is not always computationally effective. Motivated by the need to solve this issue, we evaluate an integral of a product of Fox’s H-functions (FHFs). To verify the validity of the proposed solution, it is utilized to derive performance expressions for a hard switching hybrid free-space optical/radio frequency (FSO/RF) system. The performance analysis is conducted over generalized channel models in the presence of pointing errors (PEs), where the FSO link is characterized by FHF, which involves Málaga $(mathcal {M})$ , Gamma Gamma $(GG)$ , Fisher-Snedecor $mathcal {F}$ distributions, and the RF link is modeled using $alpha -mu $ fading. New expressions for average bit error rate (ABER) and ergodic capacity are obtained in terms of bivariate Fox’s H-function (BFHF) under subcarrier intensity modulation (SIM) and heterodyne detection (HD). Additionally, asymptotic expressions for these metrics are provided for both detection types. Finally, Monte Carlo (MC) simulations are used to confirm the precision of the obtained expressions.
{"title":"An Integral of Fox’s H-Functions With Application to the Performance of Hybrid FSO/RF Systems Over Generalized Fading Channels","authors":"Wagdy Ameen Alathwary;Essam Saleh Altubaishi","doi":"10.1109/OJCOMS.2025.3534317","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3534317","url":null,"abstract":"In recent years, Fox’s H-function (FHF) has appeared in the statistical channel models of wireless communication systems. In some cases, the derivation of performance metrics becomes so complicated, particularly for communication systems that operate under two different fading channels, and various conditions. This difficulty pushed the researchers to use approximation methods to derive the performance metrics, such as finite series approximation which is not always computationally effective. Motivated by the need to solve this issue, we evaluate an integral of a product of Fox’s H-functions (FHFs). To verify the validity of the proposed solution, it is utilized to derive performance expressions for a hard switching hybrid free-space optical/radio frequency (FSO/RF) system. The performance analysis is conducted over generalized channel models in the presence of pointing errors (PEs), where the FSO link is characterized by FHF, which involves Málaga <inline-formula> <tex-math>$(mathcal {M})$ </tex-math></inline-formula>, Gamma Gamma <inline-formula> <tex-math>$(GG)$ </tex-math></inline-formula>, Fisher-Snedecor <inline-formula> <tex-math>$mathcal {F}$ </tex-math></inline-formula> distributions, and the RF link is modeled using <inline-formula> <tex-math>$alpha -mu $ </tex-math></inline-formula> fading. New expressions for average bit error rate (ABER) and ergodic capacity are obtained in terms of bivariate Fox’s H-function (BFHF) under subcarrier intensity modulation (SIM) and heterodyne detection (HD). Additionally, asymptotic expressions for these metrics are provided for both detection types. Finally, Monte Carlo (MC) simulations are used to confirm the precision of the obtained expressions.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1030-1041"},"PeriodicalIF":6.3,"publicationDate":"2025-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10854569","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143403967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Based Security Architecture for Uncrewed Aerial Systems in B5G/6G Services and Beyond: A Comprehensive Approach
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-01-27 DOI: 10.1109/OJCOMS.2025.3528220
Senthil Kumar Jagatheesaperumal;Mohamed Rahouti;Abdellah Chehri;Kaiqi Xiong;Jan Bieniek
Uncrewed aerial systems (UASs) were popularly used by hobbyists in the past, but they have now become critical enablers for managing disasters, handling emergencies, and so on. For example, one of their most critical applications is to provide seamless wireless communication services in remote rural areas. Thus, it is substantial to identify and consider the different security challenges in the research and development associated with advanced UAS-based B5G/6G architectures. Catering to this requirement, this article conducts a comprehensive review of the security aspects of UASs with respect to the 5G/6G system architecture, its enabling technologies, and privacy issues. It exhibits security integration at all the protocol stack layers and analyzes the existing mechanisms to secure UAS-based B5G/6G communications and its energy and power optimization factors. Last, this article also summarizes modern technological trends for establishing security and protecting UAS-based systems, along with the open challenges and strategies for future research work.
{"title":"Blockchain-Based Security Architecture for Uncrewed Aerial Systems in B5G/6G Services and Beyond: A Comprehensive Approach","authors":"Senthil Kumar Jagatheesaperumal;Mohamed Rahouti;Abdellah Chehri;Kaiqi Xiong;Jan Bieniek","doi":"10.1109/OJCOMS.2025.3528220","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3528220","url":null,"abstract":"Uncrewed aerial systems (UASs) were popularly used by hobbyists in the past, but they have now become critical enablers for managing disasters, handling emergencies, and so on. For example, one of their most critical applications is to provide seamless wireless communication services in remote rural areas. Thus, it is substantial to identify and consider the different security challenges in the research and development associated with advanced UAS-based B5G/6G architectures. Catering to this requirement, this article conducts a comprehensive review of the security aspects of UASs with respect to the 5G/6G system architecture, its enabling technologies, and privacy issues. It exhibits security integration at all the protocol stack layers and analyzes the existing mechanisms to secure UAS-based B5G/6G communications and its energy and power optimization factors. Last, this article also summarizes modern technological trends for establishing security and protecting UAS-based systems, along with the open challenges and strategies for future research work.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1042-1069"},"PeriodicalIF":6.3,"publicationDate":"2025-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10855475","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143430479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancing 6G: Survey for Explainable AI on Communications and Network Slicing
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-01-27 DOI: 10.1109/OJCOMS.2025.3534626
Haochen Sun;Yifan Liu;Ahmed Al-Tahmeesschi;Avishek Nag;Mohadeseh Soleimanpour;Berk Canberk;Hüseyin Arslan;Hamed Ahmadi
The unprecedented advancement of Artificial Intelligence (AI) has positioned Explainable AI (XAI) as a critical enabler in addressing the complexities of next-generation wireless communications. With the evolution of the 6G networks, characterized by ultra-low latency, massive data rates, and intricate network structures, the need for transparency, interpretability, and fairness in AI-driven decision-making has become more urgent than ever. This survey provides a comprehensive review of the current state and future potential of XAI in communications, with a focus on network slicing, a fundamental technology for resource management in 6G. By systematically categorizing XAI methodologies–ranging from modelagnostic to model-specific approaches, and from pre-model to post-model strategies–this paper identifies their unique advantages, limitations, and applications in wireless communications. Moreover, the survey emphasizes the role of XAI in network slicing for vehicular network, highlighting its ability to enhance transparency and reliability in scenarios requiring real-time decision-making and high-stakes operational environments. Real-world use cases are examined to illustrate how XAI-driven systems can improve resource allocation, facilitate fault diagnosis, and meet regulatory requirements for ethical AI deployment. By addressing the inherent challenges of applying XAI in complex, dynamic networks, this survey offers critical insights into the convergence of XAI and 6G technologies. Future research directions, including scalability, real-time applicability, and interdisciplinary integration, are discussed, establishing a foundation for advancing transparent and trustworthy AI in 6G communications systems.
{"title":"Advancing 6G: Survey for Explainable AI on Communications and Network Slicing","authors":"Haochen Sun;Yifan Liu;Ahmed Al-Tahmeesschi;Avishek Nag;Mohadeseh Soleimanpour;Berk Canberk;Hüseyin Arslan;Hamed Ahmadi","doi":"10.1109/OJCOMS.2025.3534626","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3534626","url":null,"abstract":"The unprecedented advancement of Artificial Intelligence (AI) has positioned Explainable AI (XAI) as a critical enabler in addressing the complexities of next-generation wireless communications. With the evolution of the 6G networks, characterized by ultra-low latency, massive data rates, and intricate network structures, the need for transparency, interpretability, and fairness in AI-driven decision-making has become more urgent than ever. This survey provides a comprehensive review of the current state and future potential of XAI in communications, with a focus on network slicing, a fundamental technology for resource management in 6G. By systematically categorizing XAI methodologies–ranging from modelagnostic to model-specific approaches, and from pre-model to post-model strategies–this paper identifies their unique advantages, limitations, and applications in wireless communications. Moreover, the survey emphasizes the role of XAI in network slicing for vehicular network, highlighting its ability to enhance transparency and reliability in scenarios requiring real-time decision-making and high-stakes operational environments. Real-world use cases are examined to illustrate how XAI-driven systems can improve resource allocation, facilitate fault diagnosis, and meet regulatory requirements for ethical AI deployment. By addressing the inherent challenges of applying XAI in complex, dynamic networks, this survey offers critical insights into the convergence of XAI and 6G technologies. Future research directions, including scalability, real-time applicability, and interdisciplinary integration, are discussed, establishing a foundation for advancing transparent and trustworthy AI in 6G communications systems.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1372-1412"},"PeriodicalIF":6.3,"publicationDate":"2025-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10854503","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143496439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental Demonstration of Wireless Transmission Using Airy Beams in Sub-THz Band
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-01-27 DOI: 10.1109/OJCOMS.2025.3534788
Doohwan Lee;Yasunori Yagi;Kosuke Suzuoki;Riichi Kudo
The use of sub-THz bands makes it possible to take advantage of physical properties of electromagnetic waves that have not been actively exploited to date. Shortened radio wavelengths in sub-THz bands and large-diameter antennas extend the near-field range to hundreds of meters and enable more precise beam manipulation using electromagnetic near-field phenomena. In this work, we investigated the Airy beam, whose main lobe power distribution follows a curved trajectory along its propagation. We first explain the main physical properties of the Airy beam, which include the curved trajectory of the main lobe power distribution, asymmetric sidelobe distribution, and self-healing. Then, we perform experimental verifications to confirm such physical properties. Specifically, we experimentally demonstrate a method to control the curved trajectories, which has not been explicitly demonstrated using sub-THz bands in the literature so far. In addition, we experimentally perform the transmission of four different streams using four Airy beams, taking advantage of the fact that low-interference transmission of multiple streams is possible thanks to the asymmetric sidelobe distribution properties of Airy beams. Our findings show that the total transmission rate exceeds 400 Gb/s, indicating that Airy beams can be utilized for high-capacity wireless transmission in sub-THz bands. Finally, we experimentally validate the self-healing property of the Airy beam through wireless transmission over a wireless link that is partially blocked by an obstacle. This provides new use cases for sub-THz bands, such as obstacle avoidance. Our theoretical and experimental research on Airy beams will leverage the diverse physical properties of electromagnetic waves to provide expanded and versatile uses in wireless communications.
{"title":"Experimental Demonstration of Wireless Transmission Using Airy Beams in Sub-THz Band","authors":"Doohwan Lee;Yasunori Yagi;Kosuke Suzuoki;Riichi Kudo","doi":"10.1109/OJCOMS.2025.3534788","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3534788","url":null,"abstract":"The use of sub-THz bands makes it possible to take advantage of physical properties of electromagnetic waves that have not been actively exploited to date. Shortened radio wavelengths in sub-THz bands and large-diameter antennas extend the near-field range to hundreds of meters and enable more precise beam manipulation using electromagnetic near-field phenomena. In this work, we investigated the Airy beam, whose main lobe power distribution follows a curved trajectory along its propagation. We first explain the main physical properties of the Airy beam, which include the curved trajectory of the main lobe power distribution, asymmetric sidelobe distribution, and self-healing. Then, we perform experimental verifications to confirm such physical properties. Specifically, we experimentally demonstrate a method to control the curved trajectories, which has not been explicitly demonstrated using sub-THz bands in the literature so far. In addition, we experimentally perform the transmission of four different streams using four Airy beams, taking advantage of the fact that low-interference transmission of multiple streams is possible thanks to the asymmetric sidelobe distribution properties of Airy beams. Our findings show that the total transmission rate exceeds 400 Gb/s, indicating that Airy beams can be utilized for high-capacity wireless transmission in sub-THz bands. Finally, we experimentally validate the self-healing property of the Airy beam through wireless transmission over a wireless link that is partially blocked by an obstacle. This provides new use cases for sub-THz bands, such as obstacle avoidance. Our theoretical and experimental research on Airy beams will leverage the diverse physical properties of electromagnetic waves to provide expanded and versatile uses in wireless communications.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1091-1102"},"PeriodicalIF":6.3,"publicationDate":"2025-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10855494","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143430478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Open Journal of the Communications Society
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1