Pub Date : 2025-12-18DOI: 10.1109/OJCOMS.2025.3645857
Hong Liang;Boyang Guo;Youjia Chen;Yuchuan Ye;Xi Wang;Jinsong Hu;Haifeng Zheng
Compared with traditional fixed frequency reuse patterns or optimization relying on channel information, artificial intelligence (AI)-based approaches using mobile big data provide another effective and efficient way for interference management. This paper proposes a data-driven interference coordination framework. First, Graphormer is adopted to model the inter-cell interference, where the node features capture the cell’s parameters, like power and allocated spectrum, and the edge features capture the interference relationships between neighboring cells. Second, a performance evaluation module is designed to establish a comprehensive understanding between network performance and wireless resource allocation, traffic requirement, interference, and so on. Then, proximal policy optimization (PPO) is utilized to dynamically optimize the spectrum allocation to enhance network performance while meeting dynamic traffic demands. Experimental results demonstrate that: i) the Graphormer-based interference modeling outperforms other algorithms in estimation accuracy; ii) the proposed approach effectively reduces inter-cell interference and improves network performance compared to other benchmark algorithms.
{"title":"Data-Driven Inter-Cell Interference Coordination for Mobile Cellular Networks","authors":"Hong Liang;Boyang Guo;Youjia Chen;Yuchuan Ye;Xi Wang;Jinsong Hu;Haifeng Zheng","doi":"10.1109/OJCOMS.2025.3645857","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3645857","url":null,"abstract":"Compared with traditional fixed frequency reuse patterns or optimization relying on channel information, artificial intelligence (AI)-based approaches using mobile big data provide another effective and efficient way for interference management. This paper proposes a data-driven interference coordination framework. First, Graphormer is adopted to model the inter-cell interference, where the node features capture the cell’s parameters, like power and allocated spectrum, and the edge features capture the interference relationships between neighboring cells. Second, a performance evaluation module is designed to establish a comprehensive understanding between network performance and wireless resource allocation, traffic requirement, interference, and so on. Then, proximal policy optimization (PPO) is utilized to dynamically optimize the spectrum allocation to enhance network performance while meeting dynamic traffic demands. Experimental results demonstrate that: i) the Graphormer-based interference modeling outperforms other algorithms in estimation accuracy; ii) the proposed approach effectively reduces inter-cell interference and improves network performance compared to other benchmark algorithms.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"7 ","pages":"169-181"},"PeriodicalIF":6.3,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11303575","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-17DOI: 10.1109/OJCOMS.2025.3645207
Iqra Batool;Mostafa M. Fouda;Muhammad Ismail;Mohamed I. Ibrahem;Zubair Md Fadlullah;Nei Kato
Massive MIMO beamforming for 6G networks faces a fundamental tradeoff between solution quality and computational complexity. Exhaustive search guarantees optimal antenna selection; however, this becomes prohibitively expensive for arrays exceeding 16 elements, while polynomial-time classical heuristics sacrifice 15–25% performance to achieve practical scalability. This paper introduces a quantum-enhanced optimization framework using the Quantum Approximate Optimization Algorithm (QAOA) to address this challenge for IoT-integrated 6G massive MIMO systems. Our approach combines quantum solution exploration with classical parameter optimization, integrating realistic 3GPP TR 38.901 channel models across 28–60 GHz bands and heterogeneous IoT device characteristics (mMTC, URLLC, eMBB). The framework incorporates an adaptive penalty mechanism that achieves constraint satisfaction within five iterations while maintaining polynomial complexity. Statistical validation across 50 independent channel realizations demonstrates significant advantages: 10–20% spectral efficiency improvement over classical heuristics ($p lt 0.001$ , Cohen’s $d = 1.24$ ), 35–42% IoT energy reduction, and 90–95% near-optimal solution quality compared to 65–85% for polynomial-time classical methods. Hardware validation on IBM quantum platforms (127–133 qubits) confirms practical feasibility for medium-scale systems with $M leq 16$ antennas, achieving 89.3% of ideal performance with 22% measurement success rate. Current hardware limitations restrict deployment to proof-of-concept demonstrations, with full-scale 6G implementations requiring quantum error correction projected for 2030 +.
6G网络的大规模MIMO波束形成面临着解决方案质量和计算复杂性之间的基本权衡。穷举搜索保证最佳天线选择;然而,对于超过16个元素的数组,这将变得非常昂贵,而多项式时间的经典启发式算法将牺牲15-25个元素% performance to achieve practical scalability. This paper introduces a quantum-enhanced optimization framework using the Quantum Approximate Optimization Algorithm (QAOA) to address this challenge for IoT-integrated 6G massive MIMO systems. Our approach combines quantum solution exploration with classical parameter optimization, integrating realistic 3GPP TR 38.901 channel models across 28–60 GHz bands and heterogeneous IoT device characteristics (mMTC, URLLC, eMBB). The framework incorporates an adaptive penalty mechanism that achieves constraint satisfaction within five iterations while maintaining polynomial complexity. Statistical validation across 50 independent channel realizations demonstrates significant advantages: 10–20% spectral efficiency improvement over classical heuristics ( $p lt 0.001$ , Cohen’s $d = 1.24$ ), 35–42% IoT energy reduction, and 90–95% near-optimal solution quality compared to 65–85% for polynomial-time classical methods. Hardware validation on IBM quantum platforms (127–133 qubits) confirms practical feasibility for medium-scale systems with $M leq 16$ antennas, achieving 89.3% of ideal performance with 22% measurement success rate. Current hardware limitations restrict deployment to proof-of-concept demonstrations, with full-scale 6G implementations requiring quantum error correction projected for 2030 +.
{"title":"Quantum-Enhanced Massive MIMO Beamforming for 6G IoT Networks: A QAOA-Based Optimization Framework","authors":"Iqra Batool;Mostafa M. Fouda;Muhammad Ismail;Mohamed I. Ibrahem;Zubair Md Fadlullah;Nei Kato","doi":"10.1109/OJCOMS.2025.3645207","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3645207","url":null,"abstract":"Massive MIMO beamforming for 6G networks faces a fundamental tradeoff between solution quality and computational complexity. Exhaustive search guarantees optimal antenna selection; however, this becomes prohibitively expensive for arrays exceeding 16 elements, while polynomial-time classical heuristics sacrifice 15–25% performance to achieve practical scalability. This paper introduces a quantum-enhanced optimization framework using the Quantum Approximate Optimization Algorithm (QAOA) to address this challenge for IoT-integrated 6G massive MIMO systems. Our approach combines quantum solution exploration with classical parameter optimization, integrating realistic 3GPP TR 38.901 channel models across 28–60 GHz bands and heterogeneous IoT device characteristics (mMTC, URLLC, eMBB). The framework incorporates an adaptive penalty mechanism that achieves constraint satisfaction within five iterations while maintaining polynomial complexity. Statistical validation across 50 independent channel realizations demonstrates significant advantages: 10–20% spectral efficiency improvement over classical heuristics (<inline-formula> <tex-math>$p lt 0.001$ </tex-math></inline-formula>, Cohen’s <inline-formula> <tex-math>$d = 1.24$ </tex-math></inline-formula>), 35–42% IoT energy reduction, and 90–95% near-optimal solution quality compared to 65–85% for polynomial-time classical methods. Hardware validation on IBM quantum platforms (127–133 qubits) confirms practical feasibility for medium-scale systems with <inline-formula> <tex-math>$M leq 16$ </tex-math></inline-formula> antennas, achieving 89.3% of ideal performance with 22% measurement success rate. Current hardware limitations restrict deployment to proof-of-concept demonstrations, with full-scale 6G implementations requiring quantum error correction projected for 2030 +.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"7 ","pages":"222-238"},"PeriodicalIF":6.3,"publicationDate":"2025-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11303130","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-15DOI: 10.1109/OJCOMS.2025.3643949
Aicha Meghraoui;Mohamed L. Tayebi;Mokhtar Besseghier;Hossien B. Eldeeb;Tu Dac Ho;Van Nhan Vo;Iman Tavakkolnia;Harald Haas
This paper introduces a novel vehicle-to-vehicle (V2V) visible light communication (VLC) system leveraging the multiple-input multiple-output (MIMO) non-orthogonal multiple access (NOMA) framework to improve communication reliability and ensure user fairness under realistic outdoor conditions. The proposed system employs commercial headlamps as dual transmitters and two rear-mounted photodetectors (PDs) as receivers. To enable intensity modulation, we adopt direct-current-biased optical orthogonal frequency division multiplexing (DCO-OFDM) technique, while a zero-force (ZF) detector separates spatial streams at the receiver. Power domain multiplexing utilizes normalized gain difference power allocation (NGDPA), and both perfect and imperfect successive interference cancellation (SIC) scenarios are investigated. For realistic modeling, a non-sequential ray-tracing channel model captures headlamp radiation patterns and environmental effects. A comprehensive evaluation of the system is conducted through the metrics of received power, achievable rate, bit error ratio (BER), and user fairness, considering the effect of key parameters including the size of the PD aperture, weather-induced attenuation, the bandwidth of the system, and artificial light interference. Results indicate that larger PD apertures significantly enhance BER performance, whereas increasing bandwidth tends to raise error rates. Moreover, the proposed system achieves up to 20% higher achievable rates compared to conventional OFDMA, particularly at high transmit power levels. Fairness indices of 0.99 and 0.94 are observed for perfect and imperfect SIC, respectively, confirming the framework’s ability to balance performance and fairness. These findings highlight the potential of the proposed NOMA-based techniques for next-generation intelligent vehicular networks.
{"title":"Performance Enhancement of MIMO-NOMA-Based V2V-VLC Systems Under Realistic Channel Conditions and Environmental Influences","authors":"Aicha Meghraoui;Mohamed L. Tayebi;Mokhtar Besseghier;Hossien B. Eldeeb;Tu Dac Ho;Van Nhan Vo;Iman Tavakkolnia;Harald Haas","doi":"10.1109/OJCOMS.2025.3643949","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3643949","url":null,"abstract":"This paper introduces a novel vehicle-to-vehicle (V2V) visible light communication (VLC) system leveraging the multiple-input multiple-output (MIMO) non-orthogonal multiple access (NOMA) framework to improve communication reliability and ensure user fairness under realistic outdoor conditions. The proposed system employs commercial headlamps as dual transmitters and two rear-mounted photodetectors (PDs) as receivers. To enable intensity modulation, we adopt direct-current-biased optical orthogonal frequency division multiplexing (DCO-OFDM) technique, while a zero-force (ZF) detector separates spatial streams at the receiver. Power domain multiplexing utilizes normalized gain difference power allocation (NGDPA), and both perfect and imperfect successive interference cancellation (SIC) scenarios are investigated. For realistic modeling, a non-sequential ray-tracing channel model captures headlamp radiation patterns and environmental effects. A comprehensive evaluation of the system is conducted through the metrics of received power, achievable rate, bit error ratio (BER), and user fairness, considering the effect of key parameters including the size of the PD aperture, weather-induced attenuation, the bandwidth of the system, and artificial light interference. Results indicate that larger PD apertures significantly enhance BER performance, whereas increasing bandwidth tends to raise error rates. Moreover, the proposed system achieves up to 20% higher achievable rates compared to conventional OFDMA, particularly at high transmit power levels. Fairness indices of 0.99 and 0.94 are observed for perfect and imperfect SIC, respectively, confirming the framework’s ability to balance performance and fairness. These findings highlight the potential of the proposed NOMA-based techniques for next-generation intelligent vehicular networks.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"10403-10418"},"PeriodicalIF":6.3,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11299596","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-15DOI: 10.1109/OJCOMS.2025.3644338
Xinyi Gu;Mohammad Rowshan;Jinhong Yuan
Convolutionally precoded polar codes known as polarization-adjusted convolutional (PAC) codes are a promising variant of polar codes for short block lengths. The precoding in PAC codes has demonstrated an effective reduction in the number of minimum weight codewords (a.k.a error coefficient) of polar codes. This reduction potentially improves the error correction performance significantly. From a codeword formation perspective, this reduction has limitations. Capitalizing on the understanding of the decomposition of minimum-weight codewords, this paper proposes a new coding scheme called reverse PAC (RPAC) codes that can effectively reduce minimum-weight codewords more than in PAC codes. Additionally, we propose a look-ahead list decoding for the RPAC codes, which maintains the same order of complexity as list decoding in PAC codes. Numerical results demonstrate that RPAC codes achieve significant improvements in block error rate over polar and PAC codes, especially in high-rate short-code scenarios where existing schemes are less effective.
{"title":"Reverse Convolutional Precoding of Polar Codes: Design, Analysis, and Decoding Algorithms","authors":"Xinyi Gu;Mohammad Rowshan;Jinhong Yuan","doi":"10.1109/OJCOMS.2025.3644338","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3644338","url":null,"abstract":"Convolutionally precoded polar codes known as polarization-adjusted convolutional (PAC) codes are a promising variant of polar codes for short block lengths. The precoding in PAC codes has demonstrated an effective reduction in the number of minimum weight codewords (a.k.a error coefficient) of polar codes. This reduction potentially improves the error correction performance significantly. From a codeword formation perspective, this reduction has limitations. Capitalizing on the understanding of the decomposition of minimum-weight codewords, this paper proposes a new coding scheme called reverse PAC (RPAC) codes that can effectively reduce minimum-weight codewords more than in PAC codes. Additionally, we propose a look-ahead list decoding for the RPAC codes, which maintains the same order of complexity as list decoding in PAC codes. Numerical results demonstrate that RPAC codes achieve significant improvements in block error rate over polar and PAC codes, especially in high-rate short-code scenarios where existing schemes are less effective.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"10567-10581"},"PeriodicalIF":6.3,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11300829","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-15DOI: 10.1109/OJCOMS.2025.3644171
Carmen D’Andrea;Tommaso Foggi;Amina Piemontese;Alessandro Ugolini;Stefano Buzzi;Giulio Colavolpe
Satellite-based Non-Terrestrial Networks, particularly those using large constellations of Low Earth Orbit (LEO) satellites, are expected to play a critical role in enabling global 6G connectivity. While offering promising coverage and capacity, LEO systems face challenges such as intermittent link blockages and high Doppler shifts, especially in mobile or obstructed environments. To mitigate these issues, this paper investigates advanced macro-diversity techniques tailored for LEO satellite systems. Inspired by user-centric cell-free massive MIMO architectures in terrestrial networks, we propose a comprehensive end-to-end transceiver model that captures the complete signal chain, from symbol generation and continuous-time waveform transmission to receiver-side sampling and data detection. Crucially, we account for satellite-specific Doppler shifts and phase offsets, often overlooked in simplified models. We analyze and compare two modulation schemes: traditional OFDM and OTFS, the latter offering enhanced resilience to time-varying channels. Furthermore, we consider the case of multi-antenna user terminals (UTs) and demonstrate how receive beamforming can effectively mitigate inter-satellite phase misalignment, significantly improving system robustness and performance. The obtained numerical results show the effectiveness of the proposed schemes, confirm the superiority of the OTFS modulation w.r.t. OFDM, and provide evidence that multiple antennas at the UT can be exploited to overcome the phase misalignment effects of downlink signals coming from different serving LEO satellites. Finally, results also show that satellite-UT association schemes may have a considerable impact on system performance.
{"title":"Cell-Free Macro-Diversity Schemes in LEO Non-Terrestrial Networks With OTFS and OFDM Modulations","authors":"Carmen D’Andrea;Tommaso Foggi;Amina Piemontese;Alessandro Ugolini;Stefano Buzzi;Giulio Colavolpe","doi":"10.1109/OJCOMS.2025.3644171","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3644171","url":null,"abstract":"Satellite-based Non-Terrestrial Networks, particularly those using large constellations of Low Earth Orbit (LEO) satellites, are expected to play a critical role in enabling global 6G connectivity. While offering promising coverage and capacity, LEO systems face challenges such as intermittent link blockages and high Doppler shifts, especially in mobile or obstructed environments. To mitigate these issues, this paper investigates advanced macro-diversity techniques tailored for LEO satellite systems. Inspired by user-centric cell-free massive MIMO architectures in terrestrial networks, we propose a comprehensive end-to-end transceiver model that captures the complete signal chain, from symbol generation and continuous-time waveform transmission to receiver-side sampling and data detection. Crucially, we account for satellite-specific Doppler shifts and phase offsets, often overlooked in simplified models. We analyze and compare two modulation schemes: traditional OFDM and OTFS, the latter offering enhanced resilience to time-varying channels. Furthermore, we consider the case of multi-antenna user terminals (UTs) and demonstrate how receive beamforming can effectively mitigate inter-satellite phase misalignment, significantly improving system robustness and performance. The obtained numerical results show the effectiveness of the proposed schemes, confirm the superiority of the OTFS modulation w.r.t. OFDM, and provide evidence that multiple antennas at the UT can be exploited to overcome the phase misalignment effects of downlink signals coming from different serving LEO satellites. Finally, results also show that satellite-UT association schemes may have a considerable impact on system performance.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"10432-10448"},"PeriodicalIF":6.3,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11299592","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The rapid growth of Internet of Things (IoT) devices and the introduction of 5G networks have created new opportunities for enhancing network services, while also introducing significant security concerns. Intrusion Detection Systems (IDS) are crucial for identifying malicious activities and unauthorized access in these environments. However, current IDS solutions face challenges such as sharing sensitive data and managing large-scale networks. Federated Learning (FL) presents a promising solution by enabling models to be trained on decentralized devices without sharing private data. This paper examines how FL can enhance IDS for IoT and 5G networks, with an emphasis on privacy and security concerns. We analyze various privacy, homomorphic encryption, and security mechanisms in FL, including Differential Privacy (DP) and secure aggregation, and their potential applications in strengthening IDS solutions. Additionally, we explore how FL contributes to the development of more secure and efficient IDS systems while addressing challenges such as data heterogeneity and security risks. Finally, we identify gaps in the existing research and propose directions for future work to enhance the robustness and practicality of FL-based IDS for IoT and 5G environments.
{"title":"A Survey on Security and Privacy in Federated Learning-Based Intrusion Detection Systems for 5G and Beyond Networks","authors":"Hadiseh Rezaei;Rahim Taheri;Ehsan Nowroozi;Mehrdad Hajizadeh;Stavros Shiaeles;Thomas Bauschert","doi":"10.1109/OJCOMS.2025.3644477","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3644477","url":null,"abstract":"The rapid growth of Internet of Things (IoT) devices and the introduction of 5G networks have created new opportunities for enhancing network services, while also introducing significant security concerns. Intrusion Detection Systems (IDS) are crucial for identifying malicious activities and unauthorized access in these environments. However, current IDS solutions face challenges such as sharing sensitive data and managing large-scale networks. Federated Learning (FL) presents a promising solution by enabling models to be trained on decentralized devices without sharing private data. This paper examines how FL can enhance IDS for IoT and 5G networks, with an emphasis on privacy and security concerns. We analyze various privacy, homomorphic encryption, and security mechanisms in FL, including Differential Privacy (DP) and secure aggregation, and their potential applications in strengthening IDS solutions. Additionally, we explore how FL contributes to the development of more secure and efficient IDS systems while addressing challenges such as data heterogeneity and security risks. Finally, we identify gaps in the existing research and propose directions for future work to enhance the robustness and practicality of FL-based IDS for IoT and 5G environments.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"7 ","pages":"253-300"},"PeriodicalIF":6.3,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11300785","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-15DOI: 10.1109/OJCOMS.2025.3644586
Usha Jain;Muzzammil Hussain;Brij B. Gupta
With the advent of the Internet of Things (IoT)- a ground-breaking communication technology, it is now possible to link devices with homogenous activities to the Internet. To remotely monitor and operate industrial applications, these devices are incorporated into a variety of industrial control systems known as Industrial Internet of Things (IIoT) or Industry 4.0. However, security of these systems remains a major concern when the devices are connected to the public Internet that is inherently susceptible to hostile attacks. A lightweight and efficient mechanism for session key generation and authentication of devices in IIoT environment is put forward as a solution to this problem. Using lightweight mathematical and encryption operations, our proposed mechanism efficiently authenticates devices in securely generates a session key between them offering a comprehensive security solution that includes data integrity, secrecy, and authentication. The proposed mechanism creates a secure channel between servers and devices in an Industrial Internet of Things network that is necessary for reliable and secure data communications. The security analysis of the proposed mechanism validates its resilience, and performance analysis shows that its operational costs and communication overhead are 2% lower than existing schemes. Our proposed mechanism facilitates reliable and secure authentication between devices in an Industrial Internet of Things networks while securely generating a session key between devices for securing communications ensuring confidentiality and integrity of data. The proposed mechanism is secure and works at 2% lower energy and communication costs compared to existing schemes. Further, work may be done to reduce its storage overhead especially during expansion of network and making it more energy efficient. ta shared in the context of IIoT, while being resource efficient.
{"title":"A Lightweight, Secure and Resource-Efficient Mechanism for Device Authentication and Session Key Generation in Industrial Internet of Things (IIoT) Environments","authors":"Usha Jain;Muzzammil Hussain;Brij B. Gupta","doi":"10.1109/OJCOMS.2025.3644586","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3644586","url":null,"abstract":"With the advent of the Internet of Things (IoT)- a ground-breaking communication technology, it is now possible to link devices with homogenous activities to the Internet. To remotely monitor and operate industrial applications, these devices are incorporated into a variety of industrial control systems known as Industrial Internet of Things (IIoT) or Industry 4.0. However, security of these systems remains a major concern when the devices are connected to the public Internet that is inherently susceptible to hostile attacks. A lightweight and efficient mechanism for session key generation and authentication of devices in IIoT environment is put forward as a solution to this problem. Using lightweight mathematical and encryption operations, our proposed mechanism efficiently authenticates devices in securely generates a session key between them offering a comprehensive security solution that includes data integrity, secrecy, and authentication. The proposed mechanism creates a secure channel between servers and devices in an Industrial Internet of Things network that is necessary for reliable and secure data communications. The security analysis of the proposed mechanism validates its resilience, and performance analysis shows that its operational costs and communication overhead are 2% lower than existing schemes. Our proposed mechanism facilitates reliable and secure authentication between devices in an Industrial Internet of Things networks while securely generating a session key between devices for securing communications ensuring confidentiality and integrity of data. The proposed mechanism is secure and works at 2% lower energy and communication costs compared to existing schemes. Further, work may be done to reduce its storage overhead especially during expansion of network and making it more energy efficient. ta shared in the context of IIoT, while being resource efficient.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"10419-10431"},"PeriodicalIF":6.3,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11300831","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-15DOI: 10.1109/OJCOMS.2025.3644376
Frodouard Minani;Makoto Kobayashi;Takuya Fujihashi;Md. Abdul Alim;Shunsuke Saruwatari;Masahiro Nishi;Takashi Watanabe
Sixth-generation (6G) networks target intelligent, context-aware communications, with Non-Terrestrial Networks (NTNs) essential for ubiquitous global coverage. However, limited bandwidth, severe path loss, massive data traffic, and dynamic, harsh channel conditions challenge both reliability and efficiency. This paper proposes a two-hop NTN downlink framework that synergistically integrates Semantic Communication (SemCom) and Bit-based Communication (BitCom) for efficient image delivery from a Low Earth Orbit (LEO) satellite to ground users via High-Altitude Platforms (HAPs). A deep learning-enabled architecture is developed, featuring a semantic-aware encoder at the LEO satellite and a hybrid semantic–bit processing unit at the HAP. Exploiting full channel state information (CSI), semantic relevance, and computational capability, the HAP dynamically categorizes users into Semantic-Aware Users (SAUs) and Bit-Based Users (BBUs), forwarding semantic features to SAUs or reconstructing bit-level data for BBUs. To holistically evaluate performance, we introduce a novel Universal Performance Metric for Hybrid Semantic and Bit-based Communication (UPM-HSBC), termed Hybrid Communication Effectiveness (HCE), which jointly captures semantic relevance, spectral efficiency, and channel dynamics. Building on this, we formulate a long-term HCE maximization problem and design a Hierarchical Multi-Agent Twin Delayed Deep Deterministic Policy Gradient for Semantic–Bit Resource Allocation (HMATD3-SBRA) algorithm. The framework jointly optimizes transmit power, bandwidth, computational resources, and mode selection across LEO satellite–HAP–ground links, while explicitly capturing inter-agent dependencies. Extensive simulations reveal that our approach achieves up to 18% higher spectral efficiency and 22% reduction in latency, while effectively reducing mode-switching overhead by 15%. It further sustains 10–25% HCE gains across diverse signal-to-noise ratio (SNR) regimes and resource constraints, validating the framework’s effectiveness for semantic-aware NTN downlinks in 6G.
{"title":"Hybrid Semantic-Bit Communications for NTN Downlinks: A Hierarchical Multi-Agent DRL Approach","authors":"Frodouard Minani;Makoto Kobayashi;Takuya Fujihashi;Md. Abdul Alim;Shunsuke Saruwatari;Masahiro Nishi;Takashi Watanabe","doi":"10.1109/OJCOMS.2025.3644376","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3644376","url":null,"abstract":"Sixth-generation (6G) networks target intelligent, context-aware communications, with Non-Terrestrial Networks (NTNs) essential for ubiquitous global coverage. However, limited bandwidth, severe path loss, massive data traffic, and dynamic, harsh channel conditions challenge both reliability and efficiency. This paper proposes a two-hop NTN downlink framework that synergistically integrates Semantic Communication (SemCom) and Bit-based Communication (BitCom) for efficient image delivery from a Low Earth Orbit (LEO) satellite to ground users via High-Altitude Platforms (HAPs). A deep learning-enabled architecture is developed, featuring a semantic-aware encoder at the LEO satellite and a hybrid semantic–bit processing unit at the HAP. Exploiting full channel state information (CSI), semantic relevance, and computational capability, the HAP dynamically categorizes users into Semantic-Aware Users (SAUs) and Bit-Based Users (BBUs), forwarding semantic features to SAUs or reconstructing bit-level data for BBUs. To holistically evaluate performance, we introduce a novel Universal Performance Metric for Hybrid Semantic and Bit-based Communication (UPM-HSBC), termed Hybrid Communication Effectiveness (HCE), which jointly captures semantic relevance, spectral efficiency, and channel dynamics. Building on this, we formulate a long-term HCE maximization problem and design a Hierarchical Multi-Agent Twin Delayed Deep Deterministic Policy Gradient for Semantic–Bit Resource Allocation (HMATD3-SBRA) algorithm. The framework jointly optimizes transmit power, bandwidth, computational resources, and mode selection across LEO satellite–HAP–ground links, while explicitly capturing inter-agent dependencies. Extensive simulations reveal that our approach achieves up to 18% higher spectral efficiency and 22% reduction in latency, while effectively reducing mode-switching overhead by 15%. It further sustains 10–25% HCE gains across diverse signal-to-noise ratio (SNR) regimes and resource constraints, validating the framework’s effectiveness for semantic-aware NTN downlinks in 6G.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"10599-10630"},"PeriodicalIF":6.3,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11300832","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-11DOI: 10.1109/OJCOMS.2025.3642889
Abubakar Makarfi;Khaled M. Rabie;Asim Ihsan;Omprakash Kaiwartya;Kabita Adhikari;Xingwang Li;Marcela Quiroz-Castellanos;Rupak Kharel
This study focuses on the physical layer security (PLS) performance of a reconfigurable intelligent surface (RIS)-aided vehicular communication network. Motivated by the great potential of RIS-based transmission, we analyze the PLS performance of two scenarios of vehicular networks (both of which have an eavesdropper present): i) vehicle-to-vehicle (V2V) communication when the source employs a RIS-based access point and ii) vehicular adhoc network (VANET) where a RIS-based relay mounted on a building. The performance of the proposed systems are evaluated in terms of the average secrecy capacity (ASC) and the secrecy outage probability (SOP). We present accurate analytical expressions for the two performance metrics and study the impact of various system parameters on the overall performance of the two considered system configurations. In order to validate the analysis, we provide Monte-Carlo simulations throughout the paper. The results demonstrate that the system performance is impacted by various parameters such as the number of RIS elements as well as the location of the RIS-relay. Moreover, up to an order magnitude gain could be achieved within certain regions when the number of RIS cells are doubled, clearly indicating the benefit of employing a RIS configuration.
{"title":"Reconfigurable Intelligent Surface-Enabled Vehicular Networks: A Physical Layer Security Perspective","authors":"Abubakar Makarfi;Khaled M. Rabie;Asim Ihsan;Omprakash Kaiwartya;Kabita Adhikari;Xingwang Li;Marcela Quiroz-Castellanos;Rupak Kharel","doi":"10.1109/OJCOMS.2025.3642889","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3642889","url":null,"abstract":"This study focuses on the physical layer security (PLS) performance of a reconfigurable intelligent surface (RIS)-aided vehicular communication network. Motivated by the great potential of RIS-based transmission, we analyze the PLS performance of two scenarios of vehicular networks (both of which have an eavesdropper present): i) vehicle-to-vehicle (V2V) communication when the source employs a RIS-based access point and ii) vehicular adhoc network (VANET) where a RIS-based relay mounted on a building. The performance of the proposed systems are evaluated in terms of the average secrecy capacity (ASC) and the secrecy outage probability (SOP). We present accurate analytical expressions for the two performance metrics and study the impact of various system parameters on the overall performance of the two considered system configurations. In order to validate the analysis, we provide Monte-Carlo simulations throughout the paper. The results demonstrate that the system performance is impacted by various parameters such as the number of RIS elements as well as the location of the RIS-relay. Moreover, up to an order magnitude gain could be achieved within certain regions when the number of RIS cells are doubled, clearly indicating the benefit of employing a RIS configuration.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"7 ","pages":"239-252"},"PeriodicalIF":6.3,"publicationDate":"2025-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11297798","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-11DOI: 10.1109/OJCOMS.2025.3643395
Ali Mohammad Khodadoust;Mario Eduardo Rivero-Ángeles;Víctor Barrera-Figueroa;Javad Khodadoust
In this paper, under correlated shadowing channels—a propagation model that accurately reflects real-world wireless environments—we consider a multi-eavesdropper wiretap channel, in which several passive eavesdroppers independently try to intercept the legitimate transmission over the primary communication path from the transmitter (Tx) to the authorized receiver (Rx), constituting a realistic threat model, and analyze the achievable physical layer security (PLS) of wireless systems, where, motivated by the proven positive impact of side information (SI) at the Tx on PLS performance, SI is assumed to be available at the Tx. Unlike previous studies that either considered (i) a single eavesdropper under correlated fading channels, with SI present or absent, or (ii) multiple eavesdroppers under independent fading channels, in the absence of SI, this work jointly incorporates SI at the Tx and multiple eavesdroppers under correlated shadowing conditions, yielding a more realistic and effective system model for secure wireless communication. There is no intercorrelation among the eavesdroppers, and the probability of information leakage is zero if none of them can successfully eavesdrop on the transmission. The shadowing experienced over the Tx–authorized Rx channel and the eavesdropper channels (the link between the Tx and each eavesdropper) is modeled using a log-normal (LN) probability model, which is widely used in communication platforms that rely on wireless transmission to characterize shadowing caused by obstacles and environmental inhomogeneities, based on which we derive fast and accurate approximate closed-form expressions using the Holtzman method (HM) for the average secrecy capacity (ASC), secrecy outage probability (SOP), and the probability of non-zero secrecy capacity (PNSC).The resulting analytical expressions are mathematically tractable, and their validity is confirmed by benchmarking them against Monte Carlo (MC) simulations, and they offer reduced computational complexity and faster execution compared to simulation-based outcomes.
{"title":"Physical Layer Secrecy in Multi-Eavesdropper Wiretap Channels With Transmitter-Side Information Over Correlated Log-Normal Shadowing","authors":"Ali Mohammad Khodadoust;Mario Eduardo Rivero-Ángeles;Víctor Barrera-Figueroa;Javad Khodadoust","doi":"10.1109/OJCOMS.2025.3643395","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3643395","url":null,"abstract":"In this paper, under correlated shadowing channels—a propagation model that accurately reflects real-world wireless environments—we consider a multi-eavesdropper wiretap channel, in which several passive eavesdroppers independently try to intercept the legitimate transmission over the primary communication path from the transmitter (Tx) to the authorized receiver (Rx), constituting a realistic threat model, and analyze the achievable physical layer security (PLS) of wireless systems, where, motivated by the proven positive impact of side information (SI) at the Tx on PLS performance, SI is assumed to be available at the Tx. Unlike previous studies that either considered (i) a single eavesdropper under correlated fading channels, with SI present or absent, or (ii) multiple eavesdroppers under independent fading channels, in the absence of SI, this work jointly incorporates SI at the Tx and multiple eavesdroppers under correlated shadowing conditions, yielding a more realistic and effective system model for secure wireless communication. There is no intercorrelation among the eavesdroppers, and the probability of information leakage is zero if none of them can successfully eavesdrop on the transmission. The shadowing experienced over the Tx–authorized Rx channel and the eavesdropper channels (the link between the Tx and each eavesdropper) is modeled using a log-normal (LN) probability model, which is widely used in communication platforms that rely on wireless transmission to characterize shadowing caused by obstacles and environmental inhomogeneities, based on which we derive fast and accurate approximate closed-form expressions using the Holtzman method (HM) for the average secrecy capacity (ASC), secrecy outage probability (SOP), and the probability of non-zero secrecy capacity (PNSC).The resulting analytical expressions are mathematically tractable, and their validity is confirmed by benchmarking them against Monte Carlo (MC) simulations, and they offer reduced computational complexity and faster execution compared to simulation-based outcomes.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"10338-10350"},"PeriodicalIF":6.3,"publicationDate":"2025-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11298473","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145778127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}