首页 > 最新文献

IEEE Open Journal of the Communications Society最新文献

英文 中文
Data-Driven Inter-Cell Interference Coordination for Mobile Cellular Networks 移动蜂窝网络数据驱动的小区间干扰协调
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-12-18 DOI: 10.1109/OJCOMS.2025.3645857
Hong Liang;Boyang Guo;Youjia Chen;Yuchuan Ye;Xi Wang;Jinsong Hu;Haifeng Zheng
Compared with traditional fixed frequency reuse patterns or optimization relying on channel information, artificial intelligence (AI)-based approaches using mobile big data provide another effective and efficient way for interference management. This paper proposes a data-driven interference coordination framework. First, Graphormer is adopted to model the inter-cell interference, where the node features capture the cell’s parameters, like power and allocated spectrum, and the edge features capture the interference relationships between neighboring cells. Second, a performance evaluation module is designed to establish a comprehensive understanding between network performance and wireless resource allocation, traffic requirement, interference, and so on. Then, proximal policy optimization (PPO) is utilized to dynamically optimize the spectrum allocation to enhance network performance while meeting dynamic traffic demands. Experimental results demonstrate that: i) the Graphormer-based interference modeling outperforms other algorithms in estimation accuracy; ii) the proposed approach effectively reduces inter-cell interference and improves network performance compared to other benchmark algorithms.
与传统的固定频率复用模式或依赖信道信息的优化相比,基于人工智能(AI)的方法利用移动大数据为干扰管理提供了另一种有效和高效的方式。提出了一种数据驱动的干扰协调框架。首先,采用graphhormer对小区间干扰进行建模,其中节点特征捕获小区的功率、分配频谱等参数,边缘特征捕获相邻小区之间的干扰关系。其次,设计了性能评估模块,全面了解网络性能与无线资源分配、流量需求、干扰等之间的关系。然后,利用近端策略优化(PPO)对频谱分配进行动态优化,在满足动态流量需求的同时提高网络性能。实验结果表明:1)基于graphhormer的干扰建模在估计精度上优于其他算法;Ii)与其他基准算法相比,该方法有效地减少了小区间干扰,提高了网络性能。
{"title":"Data-Driven Inter-Cell Interference Coordination for Mobile Cellular Networks","authors":"Hong Liang;Boyang Guo;Youjia Chen;Yuchuan Ye;Xi Wang;Jinsong Hu;Haifeng Zheng","doi":"10.1109/OJCOMS.2025.3645857","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3645857","url":null,"abstract":"Compared with traditional fixed frequency reuse patterns or optimization relying on channel information, artificial intelligence (AI)-based approaches using mobile big data provide another effective and efficient way for interference management. This paper proposes a data-driven interference coordination framework. First, Graphormer is adopted to model the inter-cell interference, where the node features capture the cell’s parameters, like power and allocated spectrum, and the edge features capture the interference relationships between neighboring cells. Second, a performance evaluation module is designed to establish a comprehensive understanding between network performance and wireless resource allocation, traffic requirement, interference, and so on. Then, proximal policy optimization (PPO) is utilized to dynamically optimize the spectrum allocation to enhance network performance while meeting dynamic traffic demands. Experimental results demonstrate that: i) the Graphormer-based interference modeling outperforms other algorithms in estimation accuracy; ii) the proposed approach effectively reduces inter-cell interference and improves network performance compared to other benchmark algorithms.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"7 ","pages":"169-181"},"PeriodicalIF":6.3,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11303575","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum-Enhanced Massive MIMO Beamforming for 6G IoT Networks: A QAOA-Based Optimization Framework 6G物联网量子增强大规模MIMO波束形成:基于qaoa的优化框架
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-12-17 DOI: 10.1109/OJCOMS.2025.3645207
Iqra Batool;Mostafa M. Fouda;Muhammad Ismail;Mohamed I. Ibrahem;Zubair Md Fadlullah;Nei Kato
Massive MIMO beamforming for 6G networks faces a fundamental tradeoff between solution quality and computational complexity. Exhaustive search guarantees optimal antenna selection; however, this becomes prohibitively expensive for arrays exceeding 16 elements, while polynomial-time classical heuristics sacrifice 15–25% performance to achieve practical scalability. This paper introduces a quantum-enhanced optimization framework using the Quantum Approximate Optimization Algorithm (QAOA) to address this challenge for IoT-integrated 6G massive MIMO systems. Our approach combines quantum solution exploration with classical parameter optimization, integrating realistic 3GPP TR 38.901 channel models across 28–60 GHz bands and heterogeneous IoT device characteristics (mMTC, URLLC, eMBB). The framework incorporates an adaptive penalty mechanism that achieves constraint satisfaction within five iterations while maintaining polynomial complexity. Statistical validation across 50 independent channel realizations demonstrates significant advantages: 10–20% spectral efficiency improvement over classical heuristics ( $p lt 0.001$ , Cohen’s $d = 1.24$ ), 35–42% IoT energy reduction, and 90–95% near-optimal solution quality compared to 65–85% for polynomial-time classical methods. Hardware validation on IBM quantum platforms (127–133 qubits) confirms practical feasibility for medium-scale systems with $M leq 16$ antennas, achieving 89.3% of ideal performance with 22% measurement success rate. Current hardware limitations restrict deployment to proof-of-concept demonstrations, with full-scale 6G implementations requiring quantum error correction projected for 2030 +.
6G网络的大规模MIMO波束形成面临着解决方案质量和计算复杂性之间的基本权衡。穷举搜索保证最佳天线选择;然而,对于超过16个元素的数组,这将变得非常昂贵,而多项式时间的经典启发式算法将牺牲15-25个元素% performance to achieve practical scalability. This paper introduces a quantum-enhanced optimization framework using the Quantum Approximate Optimization Algorithm (QAOA) to address this challenge for IoT-integrated 6G massive MIMO systems. Our approach combines quantum solution exploration with classical parameter optimization, integrating realistic 3GPP TR 38.901 channel models across 28–60 GHz bands and heterogeneous IoT device characteristics (mMTC, URLLC, eMBB). The framework incorporates an adaptive penalty mechanism that achieves constraint satisfaction within five iterations while maintaining polynomial complexity. Statistical validation across 50 independent channel realizations demonstrates significant advantages: 10–20% spectral efficiency improvement over classical heuristics ( $p lt 0.001$ , Cohen’s $d = 1.24$ ), 35–42% IoT energy reduction, and 90–95% near-optimal solution quality compared to 65–85% for polynomial-time classical methods. Hardware validation on IBM quantum platforms (127–133 qubits) confirms practical feasibility for medium-scale systems with $M leq 16$ antennas, achieving 89.3% of ideal performance with 22% measurement success rate. Current hardware limitations restrict deployment to proof-of-concept demonstrations, with full-scale 6G implementations requiring quantum error correction projected for 2030 +.
{"title":"Quantum-Enhanced Massive MIMO Beamforming for 6G IoT Networks: A QAOA-Based Optimization Framework","authors":"Iqra Batool;Mostafa M. Fouda;Muhammad Ismail;Mohamed I. Ibrahem;Zubair Md Fadlullah;Nei Kato","doi":"10.1109/OJCOMS.2025.3645207","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3645207","url":null,"abstract":"Massive MIMO beamforming for 6G networks faces a fundamental tradeoff between solution quality and computational complexity. Exhaustive search guarantees optimal antenna selection; however, this becomes prohibitively expensive for arrays exceeding 16 elements, while polynomial-time classical heuristics sacrifice 15–25% performance to achieve practical scalability. This paper introduces a quantum-enhanced optimization framework using the Quantum Approximate Optimization Algorithm (QAOA) to address this challenge for IoT-integrated 6G massive MIMO systems. Our approach combines quantum solution exploration with classical parameter optimization, integrating realistic 3GPP TR 38.901 channel models across 28–60 GHz bands and heterogeneous IoT device characteristics (mMTC, URLLC, eMBB). The framework incorporates an adaptive penalty mechanism that achieves constraint satisfaction within five iterations while maintaining polynomial complexity. Statistical validation across 50 independent channel realizations demonstrates significant advantages: 10–20% spectral efficiency improvement over classical heuristics (<inline-formula> <tex-math>$p lt 0.001$ </tex-math></inline-formula>, Cohen’s <inline-formula> <tex-math>$d = 1.24$ </tex-math></inline-formula>), 35–42% IoT energy reduction, and 90–95% near-optimal solution quality compared to 65–85% for polynomial-time classical methods. Hardware validation on IBM quantum platforms (127–133 qubits) confirms practical feasibility for medium-scale systems with <inline-formula> <tex-math>$M leq 16$ </tex-math></inline-formula> antennas, achieving 89.3% of ideal performance with 22% measurement success rate. Current hardware limitations restrict deployment to proof-of-concept demonstrations, with full-scale 6G implementations requiring quantum error correction projected for 2030 +.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"7 ","pages":"222-238"},"PeriodicalIF":6.3,"publicationDate":"2025-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11303130","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Enhancement of MIMO-NOMA-Based V2V-VLC Systems Under Realistic Channel Conditions and Environmental Influences 基于mimo - nomo的V2V-VLC系统在真实信道条件和环境影响下的性能增强
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-12-15 DOI: 10.1109/OJCOMS.2025.3643949
Aicha Meghraoui;Mohamed L. Tayebi;Mokhtar Besseghier;Hossien B. Eldeeb;Tu Dac Ho;Van Nhan Vo;Iman Tavakkolnia;Harald Haas
This paper introduces a novel vehicle-to-vehicle (V2V) visible light communication (VLC) system leveraging the multiple-input multiple-output (MIMO) non-orthogonal multiple access (NOMA) framework to improve communication reliability and ensure user fairness under realistic outdoor conditions. The proposed system employs commercial headlamps as dual transmitters and two rear-mounted photodetectors (PDs) as receivers. To enable intensity modulation, we adopt direct-current-biased optical orthogonal frequency division multiplexing (DCO-OFDM) technique, while a zero-force (ZF) detector separates spatial streams at the receiver. Power domain multiplexing utilizes normalized gain difference power allocation (NGDPA), and both perfect and imperfect successive interference cancellation (SIC) scenarios are investigated. For realistic modeling, a non-sequential ray-tracing channel model captures headlamp radiation patterns and environmental effects. A comprehensive evaluation of the system is conducted through the metrics of received power, achievable rate, bit error ratio (BER), and user fairness, considering the effect of key parameters including the size of the PD aperture, weather-induced attenuation, the bandwidth of the system, and artificial light interference. Results indicate that larger PD apertures significantly enhance BER performance, whereas increasing bandwidth tends to raise error rates. Moreover, the proposed system achieves up to 20% higher achievable rates compared to conventional OFDMA, particularly at high transmit power levels. Fairness indices of 0.99 and 0.94 are observed for perfect and imperfect SIC, respectively, confirming the framework’s ability to balance performance and fairness. These findings highlight the potential of the proposed NOMA-based techniques for next-generation intelligent vehicular networks.
本文介绍了一种新型的车对车(V2V)可见光通信(VLC)系统,该系统利用多输入多输出(MIMO)非正交多址(NOMA)框架来提高通信可靠性,并确保现实室外条件下的用户公平性。该系统采用商用前照灯作为双发射器,两个后置光电探测器(pd)作为接收器。为了实现强度调制,我们采用直流偏置光正交频分复用(DCO-OFDM)技术,而零力(ZF)检测器在接收器处分离空间流。功率域复用采用归一化增益差功率分配(NGDPA),并研究了完美和不完美连续干扰消除(SIC)场景。对于现实的建模,一个非顺序的光线跟踪通道模型捕获前照灯辐射模式和环境影响。通过接收功率、可达速率、误码率(BER)和用户公平性等指标,综合考虑PD孔径大小、天气衰减、系统带宽和人工光干扰等关键参数的影响,对系统进行综合评估。结果表明,较大的PD孔径可以显著提高误码率,而增大的带宽则会增加误码率。此外,与传统的OFDMA相比,所提出的系统实现了高达20%的可实现速率,特别是在高发射功率水平下。完美和不完美SIC的公平性指数分别为0.99和0.94,证实了框架平衡性能和公平性的能力。这些发现突出了提出的基于noma技术在下一代智能车辆网络中的潜力。
{"title":"Performance Enhancement of MIMO-NOMA-Based V2V-VLC Systems Under Realistic Channel Conditions and Environmental Influences","authors":"Aicha Meghraoui;Mohamed L. Tayebi;Mokhtar Besseghier;Hossien B. Eldeeb;Tu Dac Ho;Van Nhan Vo;Iman Tavakkolnia;Harald Haas","doi":"10.1109/OJCOMS.2025.3643949","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3643949","url":null,"abstract":"This paper introduces a novel vehicle-to-vehicle (V2V) visible light communication (VLC) system leveraging the multiple-input multiple-output (MIMO) non-orthogonal multiple access (NOMA) framework to improve communication reliability and ensure user fairness under realistic outdoor conditions. The proposed system employs commercial headlamps as dual transmitters and two rear-mounted photodetectors (PDs) as receivers. To enable intensity modulation, we adopt direct-current-biased optical orthogonal frequency division multiplexing (DCO-OFDM) technique, while a zero-force (ZF) detector separates spatial streams at the receiver. Power domain multiplexing utilizes normalized gain difference power allocation (NGDPA), and both perfect and imperfect successive interference cancellation (SIC) scenarios are investigated. For realistic modeling, a non-sequential ray-tracing channel model captures headlamp radiation patterns and environmental effects. A comprehensive evaluation of the system is conducted through the metrics of received power, achievable rate, bit error ratio (BER), and user fairness, considering the effect of key parameters including the size of the PD aperture, weather-induced attenuation, the bandwidth of the system, and artificial light interference. Results indicate that larger PD apertures significantly enhance BER performance, whereas increasing bandwidth tends to raise error rates. Moreover, the proposed system achieves up to 20% higher achievable rates compared to conventional OFDMA, particularly at high transmit power levels. Fairness indices of 0.99 and 0.94 are observed for perfect and imperfect SIC, respectively, confirming the framework’s ability to balance performance and fairness. These findings highlight the potential of the proposed NOMA-based techniques for next-generation intelligent vehicular networks.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"10403-10418"},"PeriodicalIF":6.3,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11299596","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reverse Convolutional Precoding of Polar Codes: Design, Analysis, and Decoding Algorithms 极性码的反向卷积预编码:设计、分析和解码算法
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-12-15 DOI: 10.1109/OJCOMS.2025.3644338
Xinyi Gu;Mohammad Rowshan;Jinhong Yuan
Convolutionally precoded polar codes known as polarization-adjusted convolutional (PAC) codes are a promising variant of polar codes for short block lengths. The precoding in PAC codes has demonstrated an effective reduction in the number of minimum weight codewords (a.k.a error coefficient) of polar codes. This reduction potentially improves the error correction performance significantly. From a codeword formation perspective, this reduction has limitations. Capitalizing on the understanding of the decomposition of minimum-weight codewords, this paper proposes a new coding scheme called reverse PAC (RPAC) codes that can effectively reduce minimum-weight codewords more than in PAC codes. Additionally, we propose a look-ahead list decoding for the RPAC codes, which maintains the same order of complexity as list decoding in PAC codes. Numerical results demonstrate that RPAC codes achieve significant improvements in block error rate over polar and PAC codes, especially in high-rate short-code scenarios where existing schemes are less effective.
卷积预编码的极性码被称为极化调整卷积码(PAC),是一种很有前途的短块长度极性码的变体。PAC码的预编码有效地减少了极坐标码的最小权码字数(即误差系数)。这种减少可能会显著提高纠错性能。从码字形成的角度来看,这种简化有局限性。基于对最小权码字分解的理解,本文提出了一种新的编码方案,称为反向PAC (reverse PAC)码,它比PAC码更有效地减少了最小权码字。此外,我们提出了一种RPAC码的前向链解码,它与PAC码中的链解码保持相同的复杂度顺序。数值结果表明,相对于极性码和PAC码,RPAC码在分组错误率方面有显著提高,特别是在现有方案效率较低的高速率短码场景下。
{"title":"Reverse Convolutional Precoding of Polar Codes: Design, Analysis, and Decoding Algorithms","authors":"Xinyi Gu;Mohammad Rowshan;Jinhong Yuan","doi":"10.1109/OJCOMS.2025.3644338","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3644338","url":null,"abstract":"Convolutionally precoded polar codes known as polarization-adjusted convolutional (PAC) codes are a promising variant of polar codes for short block lengths. The precoding in PAC codes has demonstrated an effective reduction in the number of minimum weight codewords (a.k.a error coefficient) of polar codes. This reduction potentially improves the error correction performance significantly. From a codeword formation perspective, this reduction has limitations. Capitalizing on the understanding of the decomposition of minimum-weight codewords, this paper proposes a new coding scheme called reverse PAC (RPAC) codes that can effectively reduce minimum-weight codewords more than in PAC codes. Additionally, we propose a look-ahead list decoding for the RPAC codes, which maintains the same order of complexity as list decoding in PAC codes. Numerical results demonstrate that RPAC codes achieve significant improvements in block error rate over polar and PAC codes, especially in high-rate short-code scenarios where existing schemes are less effective.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"10567-10581"},"PeriodicalIF":6.3,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11300829","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cell-Free Macro-Diversity Schemes in LEO Non-Terrestrial Networks With OTFS and OFDM Modulations 具有OTFS和OFDM调制的LEO非地面网络中的无小区宏分集方案
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-12-15 DOI: 10.1109/OJCOMS.2025.3644171
Carmen D’Andrea;Tommaso Foggi;Amina Piemontese;Alessandro Ugolini;Stefano Buzzi;Giulio Colavolpe
Satellite-based Non-Terrestrial Networks, particularly those using large constellations of Low Earth Orbit (LEO) satellites, are expected to play a critical role in enabling global 6G connectivity. While offering promising coverage and capacity, LEO systems face challenges such as intermittent link blockages and high Doppler shifts, especially in mobile or obstructed environments. To mitigate these issues, this paper investigates advanced macro-diversity techniques tailored for LEO satellite systems. Inspired by user-centric cell-free massive MIMO architectures in terrestrial networks, we propose a comprehensive end-to-end transceiver model that captures the complete signal chain, from symbol generation and continuous-time waveform transmission to receiver-side sampling and data detection. Crucially, we account for satellite-specific Doppler shifts and phase offsets, often overlooked in simplified models. We analyze and compare two modulation schemes: traditional OFDM and OTFS, the latter offering enhanced resilience to time-varying channels. Furthermore, we consider the case of multi-antenna user terminals (UTs) and demonstrate how receive beamforming can effectively mitigate inter-satellite phase misalignment, significantly improving system robustness and performance. The obtained numerical results show the effectiveness of the proposed schemes, confirm the superiority of the OTFS modulation w.r.t. OFDM, and provide evidence that multiple antennas at the UT can be exploited to overcome the phase misalignment effects of downlink signals coming from different serving LEO satellites. Finally, results also show that satellite-UT association schemes may have a considerable impact on system performance.
基于卫星的非地面网络,特别是那些使用大型低地球轨道(LEO)卫星星座的网络,预计将在实现全球6G连接方面发挥关键作用。虽然低轨道通信系统提供了良好的覆盖范围和容量,但也面临着间歇性链路阻塞和高多普勒频移等挑战,尤其是在移动或受阻的环境中。为了解决这些问题,本文研究了为低轨道卫星系统量身定制的先进宏观分集技术。受地面网络中以用户为中心的无蜂窝大规模MIMO架构的启发,我们提出了一个全面的端到端收发器模型,可以捕获完整的信号链,从符号生成和连续时间波形传输到接收端采样和数据检测。至关重要的是,我们考虑了卫星特有的多普勒频移和相位偏移,这些在简化模型中经常被忽略。我们分析和比较了两种调制方案:传统的OFDM和OTFS,后者对时变信道具有增强的弹性。此外,我们考虑了多天线用户终端(ut)的情况,并演示了接收波束成形如何有效地缓解星间相位失调,显著提高系统的鲁棒性和性能。数值计算结果表明了所提方案的有效性,证实了OTFS调制w.r.t OFDM的优越性,并证明了可利用uts多天线克服来自不同LEO卫星服务的下行信号的相位失调效应。最后,结果还表明,卫星- ut关联方案可能对系统性能产生相当大的影响。
{"title":"Cell-Free Macro-Diversity Schemes in LEO Non-Terrestrial Networks With OTFS and OFDM Modulations","authors":"Carmen D’Andrea;Tommaso Foggi;Amina Piemontese;Alessandro Ugolini;Stefano Buzzi;Giulio Colavolpe","doi":"10.1109/OJCOMS.2025.3644171","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3644171","url":null,"abstract":"Satellite-based Non-Terrestrial Networks, particularly those using large constellations of Low Earth Orbit (LEO) satellites, are expected to play a critical role in enabling global 6G connectivity. While offering promising coverage and capacity, LEO systems face challenges such as intermittent link blockages and high Doppler shifts, especially in mobile or obstructed environments. To mitigate these issues, this paper investigates advanced macro-diversity techniques tailored for LEO satellite systems. Inspired by user-centric cell-free massive MIMO architectures in terrestrial networks, we propose a comprehensive end-to-end transceiver model that captures the complete signal chain, from symbol generation and continuous-time waveform transmission to receiver-side sampling and data detection. Crucially, we account for satellite-specific Doppler shifts and phase offsets, often overlooked in simplified models. We analyze and compare two modulation schemes: traditional OFDM and OTFS, the latter offering enhanced resilience to time-varying channels. Furthermore, we consider the case of multi-antenna user terminals (UTs) and demonstrate how receive beamforming can effectively mitigate inter-satellite phase misalignment, significantly improving system robustness and performance. The obtained numerical results show the effectiveness of the proposed schemes, confirm the superiority of the OTFS modulation w.r.t. OFDM, and provide evidence that multiple antennas at the UT can be exploited to overcome the phase misalignment effects of downlink signals coming from different serving LEO satellites. Finally, results also show that satellite-UT association schemes may have a considerable impact on system performance.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"10432-10448"},"PeriodicalIF":6.3,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11299592","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Security and Privacy in Federated Learning-Based Intrusion Detection Systems for 5G and Beyond Networks 5G及以后网络中基于联邦学习的入侵检测系统的安全性和隐私性研究
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-12-15 DOI: 10.1109/OJCOMS.2025.3644477
Hadiseh Rezaei;Rahim Taheri;Ehsan Nowroozi;Mehrdad Hajizadeh;Stavros Shiaeles;Thomas Bauschert
The rapid growth of Internet of Things (IoT) devices and the introduction of 5G networks have created new opportunities for enhancing network services, while also introducing significant security concerns. Intrusion Detection Systems (IDS) are crucial for identifying malicious activities and unauthorized access in these environments. However, current IDS solutions face challenges such as sharing sensitive data and managing large-scale networks. Federated Learning (FL) presents a promising solution by enabling models to be trained on decentralized devices without sharing private data. This paper examines how FL can enhance IDS for IoT and 5G networks, with an emphasis on privacy and security concerns. We analyze various privacy, homomorphic encryption, and security mechanisms in FL, including Differential Privacy (DP) and secure aggregation, and their potential applications in strengthening IDS solutions. Additionally, we explore how FL contributes to the development of more secure and efficient IDS systems while addressing challenges such as data heterogeneity and security risks. Finally, we identify gaps in the existing research and propose directions for future work to enhance the robustness and practicality of FL-based IDS for IoT and 5G environments.
物联网(IoT)设备的快速增长和5G网络的引入为增强网络服务创造了新的机遇,同时也带来了重大的安全问题。入侵检测系统(IDS)对于识别这些环境中的恶意活动和未经授权的访问至关重要。然而,目前的IDS解决方案面临着诸如共享敏感数据和管理大规模网络等挑战。联邦学习(FL)提供了一个很有前途的解决方案,它使模型能够在分散的设备上进行训练,而不需要共享私有数据。本文探讨了FL如何增强物联网和5G网络的IDS,重点是隐私和安全问题。我们分析了FL中的各种隐私、同态加密和安全机制,包括差分隐私(DP)和安全聚合,以及它们在增强IDS解决方案中的潜在应用。此外,我们还探讨了FL如何有助于开发更安全、更高效的IDS系统,同时解决数据异构和安全风险等挑战。最后,我们确定了现有研究中的差距,并提出了未来工作的方向,以增强物联网和5G环境下基于fl的IDS的鲁棒性和实用性。
{"title":"A Survey on Security and Privacy in Federated Learning-Based Intrusion Detection Systems for 5G and Beyond Networks","authors":"Hadiseh Rezaei;Rahim Taheri;Ehsan Nowroozi;Mehrdad Hajizadeh;Stavros Shiaeles;Thomas Bauschert","doi":"10.1109/OJCOMS.2025.3644477","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3644477","url":null,"abstract":"The rapid growth of Internet of Things (IoT) devices and the introduction of 5G networks have created new opportunities for enhancing network services, while also introducing significant security concerns. Intrusion Detection Systems (IDS) are crucial for identifying malicious activities and unauthorized access in these environments. However, current IDS solutions face challenges such as sharing sensitive data and managing large-scale networks. Federated Learning (FL) presents a promising solution by enabling models to be trained on decentralized devices without sharing private data. This paper examines how FL can enhance IDS for IoT and 5G networks, with an emphasis on privacy and security concerns. We analyze various privacy, homomorphic encryption, and security mechanisms in FL, including Differential Privacy (DP) and secure aggregation, and their potential applications in strengthening IDS solutions. Additionally, we explore how FL contributes to the development of more secure and efficient IDS systems while addressing challenges such as data heterogeneity and security risks. Finally, we identify gaps in the existing research and propose directions for future work to enhance the robustness and practicality of FL-based IDS for IoT and 5G environments.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"7 ","pages":"253-300"},"PeriodicalIF":6.3,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11300785","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lightweight, Secure and Resource-Efficient Mechanism for Device Authentication and Session Key Generation in Industrial Internet of Things (IIoT) Environments 一种轻量级、安全、资源高效的工业物联网(IIoT)环境中设备认证和会话密钥生成机制
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-12-15 DOI: 10.1109/OJCOMS.2025.3644586
Usha Jain;Muzzammil Hussain;Brij B. Gupta
With the advent of the Internet of Things (IoT)- a ground-breaking communication technology, it is now possible to link devices with homogenous activities to the Internet. To remotely monitor and operate industrial applications, these devices are incorporated into a variety of industrial control systems known as Industrial Internet of Things (IIoT) or Industry 4.0. However, security of these systems remains a major concern when the devices are connected to the public Internet that is inherently susceptible to hostile attacks. A lightweight and efficient mechanism for session key generation and authentication of devices in IIoT environment is put forward as a solution to this problem. Using lightweight mathematical and encryption operations, our proposed mechanism efficiently authenticates devices in securely generates a session key between them offering a comprehensive security solution that includes data integrity, secrecy, and authentication. The proposed mechanism creates a secure channel between servers and devices in an Industrial Internet of Things network that is necessary for reliable and secure data communications. The security analysis of the proposed mechanism validates its resilience, and performance analysis shows that its operational costs and communication overhead are 2% lower than existing schemes. Our proposed mechanism facilitates reliable and secure authentication between devices in an Industrial Internet of Things networks while securely generating a session key between devices for securing communications ensuring confidentiality and integrity of data. The proposed mechanism is secure and works at 2% lower energy and communication costs compared to existing schemes. Further, work may be done to reduce its storage overhead especially during expansion of network and making it more energy efficient. ta shared in the context of IIoT, while being resource efficient.
随着物联网(IoT)——一种突破性的通信技术的出现,现在有可能将具有同质活动的设备连接到互联网。为了远程监控和操作工业应用,这些设备被整合到各种工业控制系统中,称为工业物联网(IIoT)或工业4.0。然而,当设备连接到公共互联网时,这些系统的安全性仍然是一个主要问题,而公共互联网本身就容易受到恶意攻击。针对这一问题,提出了一种轻量级、高效的IIoT环境下设备会话密钥生成与认证机制。使用轻量级的数学和加密操作,我们提出的机制有效地安全地对设备进行身份验证,在它们之间生成会话密钥,提供包括数据完整性、保密性和身份验证在内的全面安全解决方案。提出的机制在工业物联网网络中的服务器和设备之间创建了一个安全通道,这是可靠和安全的数据通信所必需的。安全性分析验证了该机制的弹性,性能分析表明其运行成本和通信开销比现有方案低2%。我们提出的机制促进了工业物联网网络中设备之间可靠和安全的身份验证,同时在设备之间安全地生成会话密钥,以保护通信,确保数据的机密性和完整性。拟议的机制是安全的,与现有方案相比,其能源和通信成本降低了2%。此外,可以做一些工作来减少其存储开销,特别是在网络扩展期间,使其更节能。在工业物联网的背景下共享,同时提高资源效率。
{"title":"A Lightweight, Secure and Resource-Efficient Mechanism for Device Authentication and Session Key Generation in Industrial Internet of Things (IIoT) Environments","authors":"Usha Jain;Muzzammil Hussain;Brij B. Gupta","doi":"10.1109/OJCOMS.2025.3644586","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3644586","url":null,"abstract":"With the advent of the Internet of Things (IoT)- a ground-breaking communication technology, it is now possible to link devices with homogenous activities to the Internet. To remotely monitor and operate industrial applications, these devices are incorporated into a variety of industrial control systems known as Industrial Internet of Things (IIoT) or Industry 4.0. However, security of these systems remains a major concern when the devices are connected to the public Internet that is inherently susceptible to hostile attacks. A lightweight and efficient mechanism for session key generation and authentication of devices in IIoT environment is put forward as a solution to this problem. Using lightweight mathematical and encryption operations, our proposed mechanism efficiently authenticates devices in securely generates a session key between them offering a comprehensive security solution that includes data integrity, secrecy, and authentication. The proposed mechanism creates a secure channel between servers and devices in an Industrial Internet of Things network that is necessary for reliable and secure data communications. The security analysis of the proposed mechanism validates its resilience, and performance analysis shows that its operational costs and communication overhead are 2% lower than existing schemes. Our proposed mechanism facilitates reliable and secure authentication between devices in an Industrial Internet of Things networks while securely generating a session key between devices for securing communications ensuring confidentiality and integrity of data. The proposed mechanism is secure and works at 2% lower energy and communication costs compared to existing schemes. Further, work may be done to reduce its storage overhead especially during expansion of network and making it more energy efficient. ta shared in the context of IIoT, while being resource efficient.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"10419-10431"},"PeriodicalIF":6.3,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11300831","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Semantic-Bit Communications for NTN Downlinks: A Hierarchical Multi-Agent DRL Approach NTN下行链路的混合语义位通信:一种分层多代理DRL方法
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-12-15 DOI: 10.1109/OJCOMS.2025.3644376
Frodouard Minani;Makoto Kobayashi;Takuya Fujihashi;Md. Abdul Alim;Shunsuke Saruwatari;Masahiro Nishi;Takashi Watanabe
Sixth-generation (6G) networks target intelligent, context-aware communications, with Non-Terrestrial Networks (NTNs) essential for ubiquitous global coverage. However, limited bandwidth, severe path loss, massive data traffic, and dynamic, harsh channel conditions challenge both reliability and efficiency. This paper proposes a two-hop NTN downlink framework that synergistically integrates Semantic Communication (SemCom) and Bit-based Communication (BitCom) for efficient image delivery from a Low Earth Orbit (LEO) satellite to ground users via High-Altitude Platforms (HAPs). A deep learning-enabled architecture is developed, featuring a semantic-aware encoder at the LEO satellite and a hybrid semantic–bit processing unit at the HAP. Exploiting full channel state information (CSI), semantic relevance, and computational capability, the HAP dynamically categorizes users into Semantic-Aware Users (SAUs) and Bit-Based Users (BBUs), forwarding semantic features to SAUs or reconstructing bit-level data for BBUs. To holistically evaluate performance, we introduce a novel Universal Performance Metric for Hybrid Semantic and Bit-based Communication (UPM-HSBC), termed Hybrid Communication Effectiveness (HCE), which jointly captures semantic relevance, spectral efficiency, and channel dynamics. Building on this, we formulate a long-term HCE maximization problem and design a Hierarchical Multi-Agent Twin Delayed Deep Deterministic Policy Gradient for Semantic–Bit Resource Allocation (HMATD3-SBRA) algorithm. The framework jointly optimizes transmit power, bandwidth, computational resources, and mode selection across LEO satellite–HAP–ground links, while explicitly capturing inter-agent dependencies. Extensive simulations reveal that our approach achieves up to 18% higher spectral efficiency and 22% reduction in latency, while effectively reducing mode-switching overhead by 15%. It further sustains 10–25% HCE gains across diverse signal-to-noise ratio (SNR) regimes and resource constraints, validating the framework’s effectiveness for semantic-aware NTN downlinks in 6G.
第六代(6G)网络的目标是智能、情境感知通信,而非地面网络(ntn)对于无处不在的全球覆盖至关重要。然而,有限的带宽、严重的路径丢失、大量的数据流量以及动态、恶劣的信道条件都对可靠性和效率提出了挑战。本文提出了一种两跳NTN下行链路框架,该框架协同集成了语义通信(SemCom)和基于比特的通信(BitCom),以便通过高空平台(HAPs)从低地球轨道(LEO)卫星向地面用户有效地传输图像。开发了一种支持深度学习的架构,具有LEO卫星上的语义感知编码器和HAP上的混合语义位处理单元。HAP利用全通道状态信息(CSI)、语义相关性和计算能力,动态地将用户分为语义感知用户(semantic - aware user)和比特用户(Bit-Based user),并将语义特征转发给语义感知用户(semantic - aware user)或为比特用户重构比特级数据。为了全面评估性能,我们引入了一种新的用于混合语义和基于位的通信(UPM-HSBC)的通用性能度量,称为混合通信有效性(HCE),它可以联合捕获语义相关性、频谱效率和信道动态。在此基础上,我们提出了一个长期的HCE最大化问题,并设计了一种分层多智能体双延迟深度确定性策略梯度语义位资源分配(HMATD3-SBRA)算法。该框架在LEO卫星- haps -地面链路上共同优化发射功率、带宽、计算资源和模式选择,同时明确捕获代理间依赖关系。大量的模拟表明,我们的方法实现了高达18%的频谱效率和22%的延迟减少,同时有效地减少了15%的模式切换开销。它进一步在不同的信噪比(SNR)制度和资源限制下保持10-25%的HCE增益,验证了该框架在6G中语义感知NTN下行链路的有效性。
{"title":"Hybrid Semantic-Bit Communications for NTN Downlinks: A Hierarchical Multi-Agent DRL Approach","authors":"Frodouard Minani;Makoto Kobayashi;Takuya Fujihashi;Md. Abdul Alim;Shunsuke Saruwatari;Masahiro Nishi;Takashi Watanabe","doi":"10.1109/OJCOMS.2025.3644376","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3644376","url":null,"abstract":"Sixth-generation (6G) networks target intelligent, context-aware communications, with Non-Terrestrial Networks (NTNs) essential for ubiquitous global coverage. However, limited bandwidth, severe path loss, massive data traffic, and dynamic, harsh channel conditions challenge both reliability and efficiency. This paper proposes a two-hop NTN downlink framework that synergistically integrates Semantic Communication (SemCom) and Bit-based Communication (BitCom) for efficient image delivery from a Low Earth Orbit (LEO) satellite to ground users via High-Altitude Platforms (HAPs). A deep learning-enabled architecture is developed, featuring a semantic-aware encoder at the LEO satellite and a hybrid semantic–bit processing unit at the HAP. Exploiting full channel state information (CSI), semantic relevance, and computational capability, the HAP dynamically categorizes users into Semantic-Aware Users (SAUs) and Bit-Based Users (BBUs), forwarding semantic features to SAUs or reconstructing bit-level data for BBUs. To holistically evaluate performance, we introduce a novel Universal Performance Metric for Hybrid Semantic and Bit-based Communication (UPM-HSBC), termed Hybrid Communication Effectiveness (HCE), which jointly captures semantic relevance, spectral efficiency, and channel dynamics. Building on this, we formulate a long-term HCE maximization problem and design a Hierarchical Multi-Agent Twin Delayed Deep Deterministic Policy Gradient for Semantic–Bit Resource Allocation (HMATD3-SBRA) algorithm. The framework jointly optimizes transmit power, bandwidth, computational resources, and mode selection across LEO satellite–HAP–ground links, while explicitly capturing inter-agent dependencies. Extensive simulations reveal that our approach achieves up to 18% higher spectral efficiency and 22% reduction in latency, while effectively reducing mode-switching overhead by 15%. It further sustains 10–25% HCE gains across diverse signal-to-noise ratio (SNR) regimes and resource constraints, validating the framework’s effectiveness for semantic-aware NTN downlinks in 6G.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"10599-10630"},"PeriodicalIF":6.3,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11300832","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconfigurable Intelligent Surface-Enabled Vehicular Networks: A Physical Layer Security Perspective 可重构智能地面车辆网络:物理层安全视角
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-12-11 DOI: 10.1109/OJCOMS.2025.3642889
Abubakar Makarfi;Khaled M. Rabie;Asim Ihsan;Omprakash Kaiwartya;Kabita Adhikari;Xingwang Li;Marcela Quiroz-Castellanos;Rupak Kharel
This study focuses on the physical layer security (PLS) performance of a reconfigurable intelligent surface (RIS)-aided vehicular communication network. Motivated by the great potential of RIS-based transmission, we analyze the PLS performance of two scenarios of vehicular networks (both of which have an eavesdropper present): i) vehicle-to-vehicle (V2V) communication when the source employs a RIS-based access point and ii) vehicular adhoc network (VANET) where a RIS-based relay mounted on a building. The performance of the proposed systems are evaluated in terms of the average secrecy capacity (ASC) and the secrecy outage probability (SOP). We present accurate analytical expressions for the two performance metrics and study the impact of various system parameters on the overall performance of the two considered system configurations. In order to validate the analysis, we provide Monte-Carlo simulations throughout the paper. The results demonstrate that the system performance is impacted by various parameters such as the number of RIS elements as well as the location of the RIS-relay. Moreover, up to an order magnitude gain could be achieved within certain regions when the number of RIS cells are doubled, clearly indicating the benefit of employing a RIS configuration.
本研究的重点是可重构智能表面(RIS)辅助车辆通信网络的物理层安全(PLS)性能。由于基于ris传输的巨大潜力,我们分析了两种车载网络场景的PLS性能(两者都有窃听器存在):i)当源采用基于ris的接入点时,车辆对车辆(V2V)通信;ii)车辆自组网(VANET),其中基于ris的中继安装在建筑物上。根据平均保密容量(ASC)和保密中断概率(SOP)对所提出系统的性能进行了评估。我们给出了这两个性能指标的精确解析表达式,并研究了各种系统参数对两种考虑的系统配置的总体性能的影响。为了验证分析,我们在整个论文中提供了蒙特卡罗模拟。结果表明,RIS元件数量和RIS继电器位置等参数对系统性能有较大影响。此外,当RIS单元的数量增加一倍时,在某些区域内可以获得高达一个数量级的增益,这清楚地表明采用RIS配置的好处。
{"title":"Reconfigurable Intelligent Surface-Enabled Vehicular Networks: A Physical Layer Security Perspective","authors":"Abubakar Makarfi;Khaled M. Rabie;Asim Ihsan;Omprakash Kaiwartya;Kabita Adhikari;Xingwang Li;Marcela Quiroz-Castellanos;Rupak Kharel","doi":"10.1109/OJCOMS.2025.3642889","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3642889","url":null,"abstract":"This study focuses on the physical layer security (PLS) performance of a reconfigurable intelligent surface (RIS)-aided vehicular communication network. Motivated by the great potential of RIS-based transmission, we analyze the PLS performance of two scenarios of vehicular networks (both of which have an eavesdropper present): i) vehicle-to-vehicle (V2V) communication when the source employs a RIS-based access point and ii) vehicular adhoc network (VANET) where a RIS-based relay mounted on a building. The performance of the proposed systems are evaluated in terms of the average secrecy capacity (ASC) and the secrecy outage probability (SOP). We present accurate analytical expressions for the two performance metrics and study the impact of various system parameters on the overall performance of the two considered system configurations. In order to validate the analysis, we provide Monte-Carlo simulations throughout the paper. The results demonstrate that the system performance is impacted by various parameters such as the number of RIS elements as well as the location of the RIS-relay. Moreover, up to an order magnitude gain could be achieved within certain regions when the number of RIS cells are doubled, clearly indicating the benefit of employing a RIS configuration.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"7 ","pages":"239-252"},"PeriodicalIF":6.3,"publicationDate":"2025-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11297798","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical Layer Secrecy in Multi-Eavesdropper Wiretap Channels With Transmitter-Side Information Over Correlated Log-Normal Shadowing 基于相关对数正态阴影传输端信息的多窃听窃听信道的物理层保密
IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-12-11 DOI: 10.1109/OJCOMS.2025.3643395
Ali Mohammad Khodadoust;Mario Eduardo Rivero-Ángeles;Víctor Barrera-Figueroa;Javad Khodadoust
In this paper, under correlated shadowing channels—a propagation model that accurately reflects real-world wireless environments—we consider a multi-eavesdropper wiretap channel, in which several passive eavesdroppers independently try to intercept the legitimate transmission over the primary communication path from the transmitter (Tx) to the authorized receiver (Rx), constituting a realistic threat model, and analyze the achievable physical layer security (PLS) of wireless systems, where, motivated by the proven positive impact of side information (SI) at the Tx on PLS performance, SI is assumed to be available at the Tx. Unlike previous studies that either considered (i) a single eavesdropper under correlated fading channels, with SI present or absent, or (ii) multiple eavesdroppers under independent fading channels, in the absence of SI, this work jointly incorporates SI at the Tx and multiple eavesdroppers under correlated shadowing conditions, yielding a more realistic and effective system model for secure wireless communication. There is no intercorrelation among the eavesdroppers, and the probability of information leakage is zero if none of them can successfully eavesdrop on the transmission. The shadowing experienced over the Tx–authorized Rx channel and the eavesdropper channels (the link between the Tx and each eavesdropper) is modeled using a log-normal (LN) probability model, which is widely used in communication platforms that rely on wireless transmission to characterize shadowing caused by obstacles and environmental inhomogeneities, based on which we derive fast and accurate approximate closed-form expressions using the Holtzman method (HM) for the average secrecy capacity (ASC), secrecy outage probability (SOP), and the probability of non-zero secrecy capacity (PNSC).The resulting analytical expressions are mathematically tractable, and their validity is confirmed by benchmarking them against Monte Carlo (MC) simulations, and they offer reduced computational complexity and faster execution compared to simulation-based outcomes.
本文在相关阴影信道(一种准确反映真实无线环境的传播模型)下,考虑了一个多窃听者窃听信道,其中多个无源窃听者独立尝试拦截从发送者(Tx)到授权接收者(Rx)的主要通信路径上的合法传输,构成了一个现实的威胁模型,并分析了无线系统可实现的物理层安全(PLS),其中:由于已证实的端部侧信息(SI)对PLS性能的积极影响,假定端部侧信息在端部可用。与之前的研究(i)在相关衰落信道下考虑单个窃听者,无论SI存在或不存在,或(ii)在独立衰落信道下考虑多个窃听者不同,在没有SI的情况下,本研究在相关阴影条件下联合考虑了端部侧信息和多个窃听者。为安全无线通信提供了一个更现实有效的系统模型。窃听者之间没有相互关系,如果没有人能够成功窃听传输信息,则信息泄露的概率为零。通过Tx授权的Rx通道和窃听者通道(Tx和每个窃听者之间的链路)经历的阴影使用对数正态(LN)概率模型建模,该模型广泛用于依赖无线传输的通信平台,以表征障碍物和环境不均匀性引起的阴影。在此基础上,利用Holtzman方法(HM)导出了平均保密容量(ASC)、保密中断概率(SOP)和保密容量非零概率(PNSC)的快速准确近似封闭表达式。所得到的解析表达式在数学上是可处理的,其有效性通过对蒙特卡罗(MC)模拟进行基准测试得到证实,与基于模拟的结果相比,它们提供了更低的计算复杂性和更快的执行速度。
{"title":"Physical Layer Secrecy in Multi-Eavesdropper Wiretap Channels With Transmitter-Side Information Over Correlated Log-Normal Shadowing","authors":"Ali Mohammad Khodadoust;Mario Eduardo Rivero-Ángeles;Víctor Barrera-Figueroa;Javad Khodadoust","doi":"10.1109/OJCOMS.2025.3643395","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3643395","url":null,"abstract":"In this paper, under correlated shadowing channels—a propagation model that accurately reflects real-world wireless environments—we consider a multi-eavesdropper wiretap channel, in which several passive eavesdroppers independently try to intercept the legitimate transmission over the primary communication path from the transmitter (Tx) to the authorized receiver (Rx), constituting a realistic threat model, and analyze the achievable physical layer security (PLS) of wireless systems, where, motivated by the proven positive impact of side information (SI) at the Tx on PLS performance, SI is assumed to be available at the Tx. Unlike previous studies that either considered (i) a single eavesdropper under correlated fading channels, with SI present or absent, or (ii) multiple eavesdroppers under independent fading channels, in the absence of SI, this work jointly incorporates SI at the Tx and multiple eavesdroppers under correlated shadowing conditions, yielding a more realistic and effective system model for secure wireless communication. There is no intercorrelation among the eavesdroppers, and the probability of information leakage is zero if none of them can successfully eavesdrop on the transmission. The shadowing experienced over the Tx–authorized Rx channel and the eavesdropper channels (the link between the Tx and each eavesdropper) is modeled using a log-normal (LN) probability model, which is widely used in communication platforms that rely on wireless transmission to characterize shadowing caused by obstacles and environmental inhomogeneities, based on which we derive fast and accurate approximate closed-form expressions using the Holtzman method (HM) for the average secrecy capacity (ASC), secrecy outage probability (SOP), and the probability of non-zero secrecy capacity (PNSC).The resulting analytical expressions are mathematically tractable, and their validity is confirmed by benchmarking them against Monte Carlo (MC) simulations, and they offer reduced computational complexity and faster execution compared to simulation-based outcomes.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"10338-10350"},"PeriodicalIF":6.3,"publicationDate":"2025-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11298473","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145778127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Open Journal of the Communications Society
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1