首页 > 最新文献

IET Networks最新文献

英文 中文
FUBA: A fuzzy-based unmanned aerial vehicle behaviour analytics for trust management in flying ad-hoc networks FUBA:用于飞行 ad-hoc 网络信任管理的基于模糊的无人驾驶飞行器行为分析法
IF 1.4 Q1 Mathematics Pub Date : 2023-11-22 DOI: 10.1049/ntw2.12108
Sihem Benfriha, Nabila Labraoui, Radjaa Bensaid, Haythem Bany Salameh, Hafida Saidi

Flying Ad-Hoc Network (FANET) is a promising ad hoc networking paradigm that can offer new added value services in military and civilian applications. Typically, it incorporates a group of Unmanned Aerial Vehicles (UAVs), known as drones that collaborate and cooperate to accomplish several missions without human intervention. However, UAV communications are prone to various attacks and detecting malicious nodes is essential for efficient FANET operation. Trust management is an effective method that plays a significant role in the prediction and recognition of intrusions in FANETs. Specifically, evaluating node behaviour remains an important issue in this domain. For this purpose, the authors suggest using fuzzy logic, one of the most commonly used methods for trust computation, which classifies nodes based on multiple criteria to handle complex environments. In addition, the Received Signal Strength Indication (RSSI) is an important parameter that can be used in fuzzy logic to evaluate a drone's behaviour. However, in outdoor flying networks, the RSSI can be seriously influenced by the humidity of the air, which can dramatically impact the accuracy of the trust results. FUBA, a fuzzy-based UAV behaviour analytics is presented for trust management in FANETs. By considering humidity as a new parameter, FUBA can identify insider threats and increase the overall network's trustworthiness under bad weather conditions. It is capable of performing well in outdoor flying networks. The simulation results indicate that the proposed model significantly outperforms FNDN and UNION in terms of the average end-to-end delay and the false positive ratio.

飞行特设网络(FANET)是一种前景广阔的特设网络范例,可为军事和民用应用提供新的增值服务。通常情况下,它包含一组无人驾驶飞行器(UAV),即无人机,它们相互协作,共同完成多项任务,无需人工干预。然而,无人机通信容易受到各种攻击,检测恶意节点对 FANET 的高效运行至关重要。信任管理是一种有效的方法,在预测和识别 FANET 中的入侵方面发挥着重要作用。具体来说,评估节点行为仍是该领域的一个重要问题。为此,作者建议使用模糊逻辑,它是最常用的信任计算方法之一,可根据多个标准对节点进行分类,以处理复杂的环境。此外,接收信号强度指示(RSSI)也是模糊逻辑中可用于评估无人机行为的一个重要参数。然而,在室外飞行网络中,RSSI 会受到空气湿度的严重影响,从而极大地影响信任结果的准确性。FUBA 是一种基于模糊的无人机行为分析方法,用于 FANET 中的信任管理。通过将湿度作为一个新参数,FUBA 可以在恶劣天气条件下识别内部威胁并提高整个网络的可信度。它能够在室外飞行网络中发挥良好作用。仿真结果表明,在平均端到端延迟和误报率方面,所提出的模型明显优于 FNDN 和 UNION。
{"title":"FUBA: A fuzzy-based unmanned aerial vehicle behaviour analytics for trust management in flying ad-hoc networks","authors":"Sihem Benfriha,&nbsp;Nabila Labraoui,&nbsp;Radjaa Bensaid,&nbsp;Haythem Bany Salameh,&nbsp;Hafida Saidi","doi":"10.1049/ntw2.12108","DOIUrl":"10.1049/ntw2.12108","url":null,"abstract":"<p>Flying Ad-Hoc Network (FANET) is a promising ad hoc networking paradigm that can offer new added value services in military and civilian applications. Typically, it incorporates a group of Unmanned Aerial Vehicles (UAVs), known as drones that collaborate and cooperate to accomplish several missions without human intervention. However, UAV communications are prone to various attacks and detecting malicious nodes is essential for efficient FANET operation. Trust management is an effective method that plays a significant role in the prediction and recognition of intrusions in FANETs. Specifically, evaluating node behaviour remains an important issue in this domain. For this purpose, the authors suggest using fuzzy logic, one of the most commonly used methods for trust computation, which classifies nodes based on multiple criteria to handle complex environments. In addition, the Received Signal Strength Indication (RSSI) is an important parameter that can be used in fuzzy logic to evaluate a drone's behaviour. However, in outdoor flying networks, the RSSI can be seriously influenced by the humidity of the air, which can dramatically impact the accuracy of the trust results. FUBA, a fuzzy-based UAV behaviour analytics is presented for trust management in FANETs. By considering humidity as a new parameter, FUBA can identify insider threats and increase the overall network's trustworthiness under bad weather conditions. It is capable of performing well in outdoor flying networks. The simulation results indicate that the proposed model significantly outperforms FNDN and UNION in terms of the average end-to-end delay and the false positive ratio.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12108","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139250458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy efficiency optimisation in massive multiple-input, multiple-output network for 5G applications using new quantum genetic algorithm 利用新型量子遗传算法优化 5G 应用中大规模多输入多输出网络的能效
IF 1.4 Q1 Mathematics Pub Date : 2023-11-14 DOI: 10.1049/ntw2.12104
Abdulbasit M. A. Sabaawi, Mohammed R. Almasaoodi, Sara El Gaily, Sándor Imre

Devising efficient optimisation methods has been a subject of great research attention since current evolving trends in communication networks, machine learning, and other cutting-edge systems that need a fast and accurate optimised computational model. Classical computers became incapable of handling new optimisation problems posed by newly emerging trends. Quantum optimisation algorithms appear as alternative solutions. The existing bottleneck that restricts the use of the newly developed quantum strategies is the limited qubit size of the available quantum computers (the size of the most recent universal quantum computer is 433 qubits). A new quantum genetic algorithm (QGA) is proposed that handles the presented problem. A quantum extreme value searching algorithm and quantum blind computing framework are utilised to extend the search capabilities of the GA. The quantum genetic strategy is exploited to maximise energy efficiency at full spectral efficiency of massive multiple-input, multiple-output (M-MIMO) technology as a toy example for pointing out the efficiency of the presented quantum strategy. The authors run extensive simulations and prove how the presented quantum method outperforms the existing classical genetic algorithm.

由于当前通信网络、机器学习和其他尖端系统的发展趋势需要快速准确的优化计算模型,因此设计高效的优化方法一直是备受关注的研究课题。经典计算机已无法处理新趋势带来的新优化问题。量子优化算法作为替代解决方案出现了。现有量子计算机的量子比特大小有限(最新通用量子计算机的量子比特大小为 433 量子比特),这是限制使用新开发的量子策略的现有瓶颈。我们提出了一种新的量子遗传算法(QGA)来处理所提出的问题。量子极值搜索算法和量子盲计算框架被用来扩展遗传算法的搜索能力。量子遗传策略被用来在大规模多输入多输出(M-MIMO)技术的全频谱效率下实现能效最大化,以此作为一个玩具示例来说明所提出的量子策略的效率。作者进行了大量模拟,证明了所提出的量子方法如何优于现有的经典遗传算法。
{"title":"Energy efficiency optimisation in massive multiple-input, multiple-output network for 5G applications using new quantum genetic algorithm","authors":"Abdulbasit M. A. Sabaawi,&nbsp;Mohammed R. Almasaoodi,&nbsp;Sara El Gaily,&nbsp;Sándor Imre","doi":"10.1049/ntw2.12104","DOIUrl":"10.1049/ntw2.12104","url":null,"abstract":"<p>Devising efficient optimisation methods has been a subject of great research attention since current evolving trends in communication networks, machine learning, and other cutting-edge systems that need a fast and accurate optimised computational model. Classical computers became incapable of handling new optimisation problems posed by newly emerging trends. Quantum optimisation algorithms appear as alternative solutions. The existing bottleneck that restricts the use of the newly developed quantum strategies is the limited qubit size of the available quantum computers (the size of the most recent universal quantum computer is 433 qubits). A new quantum genetic algorithm (QGA) is proposed that handles the presented problem. A quantum extreme value searching algorithm and quantum blind computing framework are utilised to extend the search capabilities of the GA. The quantum genetic strategy is exploited to maximise energy efficiency at full spectral efficiency of massive multiple-input, multiple-output (M-MIMO) technology as a toy example for pointing out the efficiency of the presented quantum strategy. The authors run extensive simulations and prove how the presented quantum method outperforms the existing classical genetic algorithm.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12104","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134954472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless sensing charging based on multi-drone cooperation 基于多架无人机合作的无线传感充电
IF 1.4 Q1 Mathematics Pub Date : 2023-11-11 DOI: 10.1049/ntw2.12107
Guoxin Xu, Jiawen Zhao, Xuehe Wang

In recent years, wireless charging technology is widely used for sensor charging. Though carts equipped with wireless charging tools were able to reach sensor nodes and continuously recharge them, their applications are limited and could not be used in many territories such as rugged mountainous terrain and severely damaged disaster areas. With the significant cost reduction of UAVs due to the mature technology, using UAVs to replace charging carts for wireless sensor networks is a future trend. In this study, the problem of energy replenishment and path planning for large-scale wireless sensor networks by multiple UAVs is considered. First, sensor nodes are distributed evenly by using an improved k-means clustering algorithm, modelling the problem of the UAV traversal over a certain range of sensors as a travelling salesman problem. Then, a heuristic algorithm is proposed to solve the path planning of UAVs and the hovering time at each sensor. The simulations show the effect of different charging ratios r on the number of non-functional nodes and the loss of the UAV. The experimental results show that the proposed algorithm is able to plan a sensible path for the UAV, which leads to a smaller UAV energy loss and a smaller number of non-functional nodes.

近年来,无线充电技术被广泛应用于传感器充电。虽然配备无线充电工具的小车能够到达传感器节点并持续为其充电,但其应用范围有限,无法在崎岖的山区和严重受损的灾区等很多地方使用。随着无人机技术的成熟,成本大幅降低,使用无人机取代无线传感器网络的充电车是未来的发展趋势。本研究考虑了由多架无人机组成的大规模无线传感器网络的能量补充和路径规划问题。首先,使用改进的 k-means 聚类算法均匀分布传感器节点,将无人机穿越一定范围传感器的问题模拟为旅行推销员问题。然后,提出了一种启发式算法来解决无人机的路径规划和在每个传感器的悬停时间问题。仿真显示了不同的充电比 r 对无功能节点数量和无人机损失的影响。实验结果表明,所提出的算法能够为无人飞行器规划出合理的路径,从而使无人飞行器的能量损耗更小,非功能节点的数量更少。
{"title":"Wireless sensing charging based on multi-drone cooperation","authors":"Guoxin Xu,&nbsp;Jiawen Zhao,&nbsp;Xuehe Wang","doi":"10.1049/ntw2.12107","DOIUrl":"10.1049/ntw2.12107","url":null,"abstract":"<p>In recent years, wireless charging technology is widely used for sensor charging. Though carts equipped with wireless charging tools were able to reach sensor nodes and continuously recharge them, their applications are limited and could not be used in many territories such as rugged mountainous terrain and severely damaged disaster areas. With the significant cost reduction of UAVs due to the mature technology, using UAVs to replace charging carts for wireless sensor networks is a future trend. In this study, the problem of energy replenishment and path planning for large-scale wireless sensor networks by multiple UAVs is considered. First, sensor nodes are distributed evenly by using an improved <i>k</i>-means clustering algorithm, modelling the problem of the UAV traversal over a certain range of sensors as a travelling salesman problem. Then, a heuristic algorithm is proposed to solve the path planning of UAVs and the hovering time at each sensor. The simulations show the effect of different charging ratios <i>r</i> on the number of non-functional nodes and the loss of the UAV. The experimental results show that the proposed algorithm is able to plan a sensible path for the UAV, which leads to a smaller UAV energy loss and a smaller number of non-functional nodes.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12107","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135043841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A constructive airborne-ground matrix algorithm for modern telecommunication systems 现代电信系统的建设性空地矩阵算法
IF 1.4 Q1 Mathematics Pub Date : 2023-09-26 DOI: 10.1049/ntw2.12103
Samson Arun Raj A, Basil Xavier S, Jaspher Wilisie Kathrine G, Salaja Silas, Andrew J

Conventional Mobile Communication Systems (MCS) reliably transfer critical messages from authorised remote information sources like military bases and ground control stations in the war field. As tactical advancement grows rapidly, the challenges of transmitting tactical messages via conventional satellite methods increase the processing overhead related to cost, Line of Sight (LOS) communication, packet loss, delay, and retransmission requests. Modern mobile communication systems use Airborne Node Networks (ANN) between satellites and Mobile Ground Nodes (MGNs) as they provide many advantages in mobile communication systems. Hence airborne network reduces the burden of satellites as they are only used as relay stations. The mobility problem caused by ANN and MGNs is solved by proposing a novel constructive airborne-ground matrix algorithm known as the Who-To-Whom (WTW) matrix. With the help of this matrix acting as a reference index, it determines which nodes relate to whom at every time interval T in the tactical environment. This WTW matrix holds precise status/information about connectivity among all stakeholders in the operating environment by carefully and effectively accounting for frequent location changes. The methodology of the proposed matrix is that it contains the physical parameters of the nodes and their behaviour in the tactical environment. The WTW matrix construction algorithm discusses how the reference matrix is constructed in every aerial node to monitor the mobile ground nodes by leading them to safety and providing aerial guidance as they move along the tactical environment. The performance metrics are measured with other existing schemes, and the merits and demerits of the proposed WTW matrix are identified and discussed in detail.

传统的移动通信系统(MCS)能够可靠地从授权的远程信息源(如战场上的军事基地和地面控制站)传输关键信息。随着战术的快速发展,通过传统卫星方法传输战术信息所面临的挑战增加了与成本、视线(LOS)通信、数据包丢失、延迟和重传请求有关的处理开销。现代移动通信系统在卫星和移动地面节点(MGN)之间使用机载节点网络(ANN),因为它们在移动通信系统中具有许多优势。因此,机载网络减轻了卫星的负担,因为卫星只用作中继站。通过提出一种称为 "谁对谁"(WTW)矩阵的新型建设性机载-地面矩阵算法,解决了 ANN 和 MGN 带来的移动性问题。在该矩阵作为参考索引的帮助下,它能确定战术环境中每个时间间隔 T 内哪些节点与谁有关。该 WTW 矩阵通过仔细、有效地考虑频繁的位置变化,掌握了作战环境中所有利益相关者之间连接的精确状态/信息。拟议矩阵的方法是,它包含节点的物理参数及其在战术环境中的行为。WTW 矩阵构建算法讨论了如何在每个空中节点构建参考矩阵,以便在移动地面节点沿战术环境移动时将其引向安全地带并提供空中引导,从而对其进行监控。与其他现有方案一起对性能指标进行了测量,并详细确定和讨论了拟议 WTW 矩阵的优缺点。
{"title":"A constructive airborne-ground matrix algorithm for modern telecommunication systems","authors":"Samson Arun Raj A,&nbsp;Basil Xavier S,&nbsp;Jaspher Wilisie Kathrine G,&nbsp;Salaja Silas,&nbsp;Andrew J","doi":"10.1049/ntw2.12103","DOIUrl":"10.1049/ntw2.12103","url":null,"abstract":"<p>Conventional Mobile Communication Systems (MCS) reliably transfer critical messages from authorised remote information sources like military bases and ground control stations in the war field. As tactical advancement grows rapidly, the challenges of transmitting tactical messages via conventional satellite methods increase the processing overhead related to cost, Line of Sight (LOS) communication, packet loss, delay, and retransmission requests. Modern mobile communication systems use Airborne Node Networks (ANN) between satellites and Mobile Ground Nodes (MGNs) as they provide many advantages in mobile communication systems. Hence airborne network reduces the burden of satellites as they are only used as relay stations. The mobility problem caused by ANN and MGNs is solved by proposing a novel constructive airborne-ground matrix algorithm known as the Who-To-Whom (WTW) matrix. With the help of this matrix acting as a reference index, it determines which nodes relate to whom at every time interval T in the tactical environment. This WTW matrix holds precise status/information about connectivity among all stakeholders in the operating environment by carefully and effectively accounting for frequent location changes. The methodology of the proposed matrix is that it contains the physical parameters of the nodes and their behaviour in the tactical environment. The WTW matrix construction algorithm discusses how the reference matrix is constructed in every aerial node to monitor the mobile ground nodes by leading them to safety and providing aerial guidance as they move along the tactical environment. The performance metrics are measured with other existing schemes, and the merits and demerits of the proposed WTW matrix are identified and discussed in detail.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12103","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134960332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NGMA-based intergrated communication and computing for 6G-enabled cognitive radio networks 基于 NGMA 的集成通信和计算,用于支持 6G 的认知无线电网络
IF 1.4 Q1 Mathematics Pub Date : 2023-09-12 DOI: 10.1049/ntw2.12102
Wei Liang, Jiankang Zhang, Dawei Wang, Lixin Li, Soon Xin Ng

According to the urgent low latency and the heavy computation tasks demands required for sixth-generation (6G) wireless networks, the authors introduce the conventional resource allocation algorithms, including the game theory, artificial-intelligence (AI) methods, and matching theory enabled framework, in which the multi-access edge computing (MEC) scheme collaborative with the cloud platform to serve the primary users (PUs) and cognitive users (CUs) for next generation multiple access (NGMA). The proposed framework allows both the PUs and CUs to offload their computation tasks in a 6G-enabled cognitive radio (CR) networks, so called cloud-assisted CR-MEC networks. In particular, the fundamentals of this conceived networks based on NGMA are first introduced. Hence, a number of methods based on the resource allocation algorithms are proposed in order to improve the quality of service for the mobile users, and reduce their transmission latency as well as the energy consumptions. Moreover, the motivations, challenges, and representative models for these conventional algorithms are described for integrated-intelligent communication and computing aided NGMA networks. Furthermore, the open issues and future research directions for this conceived networks are summarised.

根据第六代(6G)无线网络对低延迟和繁重计算任务的迫切需求,作者引入了传统的资源分配算法,包括博弈论、人工智能(AI)方法和支持匹配理论的框架,其中多接入边缘计算(MEC)方案与云平台协作,为下一代多接入(NGMA)的主用户(PUs)和认知用户(CUs)提供服务。所提出的框架允许 PU 和 CU 在支持 6G 的认知无线电(CR)网络(即云辅助 CR-MEC 网络)中卸载其计算任务。其中,首先介绍了这种基于 NGMA 的构想网络的基本原理。因此,提出了一些基于资源分配算法的方法,以提高移动用户的服务质量,减少传输延迟和能源消耗。此外,针对集成智能通信和计算辅助 NGMA 网络,介绍了这些传统算法的动机、挑战和代表模型。此外,还总结了这种构想网络的开放性问题和未来研究方向。
{"title":"NGMA-based intergrated communication and computing for 6G-enabled cognitive radio networks","authors":"Wei Liang,&nbsp;Jiankang Zhang,&nbsp;Dawei Wang,&nbsp;Lixin Li,&nbsp;Soon Xin Ng","doi":"10.1049/ntw2.12102","DOIUrl":"10.1049/ntw2.12102","url":null,"abstract":"<p>According to the urgent low latency and the heavy computation tasks demands required for sixth-generation (6G) wireless networks, the authors introduce the conventional resource allocation algorithms, including the game theory, artificial-intelligence (AI) methods, and matching theory enabled framework, in which the multi-access edge computing (MEC) scheme collaborative with the cloud platform to serve the primary users (PUs) and cognitive users (CUs) for next generation multiple access (NGMA). The proposed framework allows both the PUs and CUs to offload their computation tasks in a 6G-enabled cognitive radio (CR) networks, so called cloud-assisted CR-MEC networks. In particular, the fundamentals of this conceived networks based on NGMA are first introduced. Hence, a number of methods based on the resource allocation algorithms are proposed in order to improve the quality of service for the mobile users, and reduce their transmission latency as well as the energy consumptions. Moreover, the motivations, challenges, and representative models for these conventional algorithms are described for integrated-intelligent communication and computing aided NGMA networks. Furthermore, the open issues and future research directions for this conceived networks are summarised.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135885435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Outage performance prediction of cooperative vehicle network based on sparrow search algorithm based on back-propagation neural network 基于反向传播神经网络麻雀搜索算法的协同车辆网络停机性能预测
IF 1.4 Q1 Mathematics Pub Date : 2023-09-02 DOI: 10.1049/ntw2.12100
Ya Li, Yu Zhang, Xinji Tian, Ruipeng Liu

With the support of the sixth-generation mobile networks (6G) technology, the Internet-of-Vehicle (IoV) can realize the perception and monitoring of vehicle road information. However, due to the change of network topology and various environment, the reliable performance of the communication link is facing challenges. For the sake of improving communication quality, a cooperative vehicular network (CVN) system is established, which adopts cooperative communication and multiple input multiple output (MIMO) technology. According to the signal-to-noise ratio (SNR) threshold of relay vehicles, using hybrid decode-amplify-forward (HDAF) protocol and combining with antenna selection, the analytical expression of outage probability (OP) with Meijer-G function is obtained. For predicting the OP accurately, the sparrow search algorithm based on back-propagation neural network (SSA-BPNN) is put forward. The simulation results show that the cascade order of the channels has a negative effect on the OP. Meanwhile, the prediction accuracy of SSA-BPNN is 64.8% higher than that of BPNN, and 98.96% greater than that of general regression neural network, and the convergence rate is faster than ICS-BPNN.

在第六代移动网络(6G)技术的支持下,车联网(IoV)可以实现对车辆道路信息的感知和监控。然而,由于网络拓扑结构和各种环境的变化,通信链路的可靠性能面临着挑战。为了提高通信质量,采用协同通信和多输入多输出(MIMO)技术,建立了协同车载网络(CVN)系统。根据中继车辆信噪比(SNR)阈值,采用混合解码-放大-前向(HDAF)协议,结合天线选择,得到了中断概率(OP)的Meijer - G函数解析表达式。为了准确预测OP,提出了基于反向传播神经网络(SSA - BPNN)的麻雀搜索算法。仿真结果表明,通道级联顺序对op有负面影响,同时,SSA‐BPNN的预测精度比BPNN高64.8%,比一般回归神经网络高98.96%,收敛速度比ICS‐BPNN快。
{"title":"Outage performance prediction of cooperative vehicle network based on sparrow search algorithm based on back-propagation neural network","authors":"Ya Li,&nbsp;Yu Zhang,&nbsp;Xinji Tian,&nbsp;Ruipeng Liu","doi":"10.1049/ntw2.12100","DOIUrl":"10.1049/ntw2.12100","url":null,"abstract":"<p>With the support of the sixth-generation mobile networks (6G) technology, the Internet-of-Vehicle (IoV) can realize the perception and monitoring of vehicle road information. However, due to the change of network topology and various environment, the reliable performance of the communication link is facing challenges. For the sake of improving communication quality, a cooperative vehicular network (CVN) system is established, which adopts cooperative communication and multiple input multiple output (MIMO) technology. According to the signal-to-noise ratio (SNR) threshold of relay vehicles, using hybrid decode-amplify-forward (HDAF) protocol and combining with antenna selection, the analytical expression of outage probability (OP) with Meijer-G function is obtained. For predicting the OP accurately, the sparrow search algorithm based on back-propagation neural network (SSA-BPNN) is put forward. The simulation results show that the cascade order of the channels has a negative effect on the OP. Meanwhile, the prediction accuracy of SSA-BPNN is 64.8% higher than that of BPNN, and 98.96% greater than that of general regression neural network, and the convergence rate is faster than ICS-BPNN.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12100","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43322135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the impact of generative adversarial models on the performance of anomaly intrusion detection 评估生成对抗模型对异常入侵检测性能的影响
IF 1.4 Q1 Mathematics Pub Date : 2023-08-28 DOI: 10.1049/ntw2.12098
Mohammad Arafah, Iain Phillips, Asma Adnane

With the increasing rate and types of cyber attacks against information systems and communication infrastructures, many tools are needed to detect and mitigate against such attacks, for example, Intrusion Detection Systems (IDSs). Unfortunately, traditional Signature-based IDSs (SIDSs) perform poorly against previously unseen adversarial attacks. Anomaly-based IDSs (AIDSs) use Machine Learning (ML) and Deep Learning (DL) approaches to overcome these limitations. However, AIDS performance can be poor when trained on imbalanced datasets. To address the challenge of AIDS performance caused by these unbalanced training datasets, generative adversarial models are proposed to obtain adversarial attacks from one side and analyse their quality from another. According to extensive usage and reliability criteria for generative adversarial models in different disciplines, Generative Adversarial Networks (GANs), Bidirectional GAN (BiGAN), and Wasserstein GAN (WGAN) are employed to serve AIDS. The authors have extensively assessed their abilities and robustness to deliver high-quality attacks for AIDS. AIDSs are constructed, trained, and tuned based on these models to measure their impacts. The authors have employed two datasets: NSL-KDD and CICIDS-2017 for generalisation purposes, where ML and DL approaches are utilised to implement AIDSs. Their results show that the WGAN model outperformed GANs and BiGAN models in binary and multiclass classifications for both datasets.

随着针对信息系统和通信基础设施的网络攻击的速度和类型的增加,需要许多工具来检测和减轻此类攻击,例如入侵检测系统(IDS)。不幸的是,传统的基于签名的IDS(SID)在对抗以前看不见的对抗性攻击时表现不佳。基于异常的IDS(AIDSs)使用机器学习(ML)和深度学习(DL)方法来克服这些限制。然而,当在不平衡的数据集上训练时,艾滋病的表现可能很差。为了应对这些不平衡的训练数据集对艾滋病表现的挑战,提出了生成对抗性模型,从一方获取对抗性攻击,并从另一方分析其质量。根据生成对抗性模型在不同学科中的广泛使用和可靠性标准,采用生成对抗性网络(GAN)、双向GAN(BiGAN)和Wasserstein GAN(WGAN)为艾滋病服务。作者广泛评估了他们为艾滋病提供高质量治疗的能力和稳健性。AIDS是基于这些模型构建、训练和调整的,以衡量其影响。作者使用了两个数据集:NSL‐KDD和CICIDS‐2017,用于概括目的,其中ML和DL方法用于实现AIDS。他们的结果表明,对于这两个数据集,WGAN模型在二进制和多类分类方面都优于GAN和BiGAN模型。
{"title":"Evaluating the impact of generative adversarial models on the performance of anomaly intrusion detection","authors":"Mohammad Arafah,&nbsp;Iain Phillips,&nbsp;Asma Adnane","doi":"10.1049/ntw2.12098","DOIUrl":"10.1049/ntw2.12098","url":null,"abstract":"<p>With the increasing rate and types of cyber attacks against information systems and communication infrastructures, many tools are needed to detect and mitigate against such attacks, for example, Intrusion Detection Systems (IDSs). Unfortunately, traditional Signature-based IDSs (SIDSs) perform poorly against previously unseen adversarial attacks. Anomaly-based IDSs (AIDSs) use <i>Machine Learning (ML)</i> and <i>Deep Learning (DL)</i> approaches to overcome these limitations. However, AIDS performance can be poor when trained on imbalanced datasets. To address the challenge of AIDS performance caused by these unbalanced training datasets, generative adversarial models are proposed to obtain adversarial attacks from one side and analyse their quality from another. According to extensive usage and reliability criteria for generative adversarial models in different disciplines, <i>Generative Adversarial Networks (GANs)</i>, <i>Bidirectional GAN (BiGAN)</i>, and <i>Wasserstein GAN (WGAN)</i> are employed to serve AIDS. The authors have extensively assessed their abilities and robustness to deliver high-quality attacks for AIDS. AIDSs are constructed, trained, and tuned based on these models to measure their impacts. The authors have employed two datasets: <i>NSL-KDD</i> and <i>CICIDS-2017</i> for generalisation purposes, where <i>ML</i> and <i>DL</i> approaches are utilised to implement AIDSs. Their results show that the <i>WGAN</i> model outperformed <i>GANs</i> and <i>BiGAN</i> models in binary and multiclass classifications for both datasets.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12098","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45852265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross layer protocol architecture for spectrum-based routing in cognitive radio networks 认知无线电网络中基于频谱路由的跨层协议架构
IF 1.4 Q1 Mathematics Pub Date : 2023-08-25 DOI: 10.1049/ntw2.12101
R. Sri Uma Suseela, Korlapati Satyanarayana Murthy, Hima Bindu Valiveti, Mohammad Akhtaruzzaman

New cell phone services and apps consume more spectrum. Wireless spectrum allows services and apps to communicate with one another. Wi-Fi quality is improved via smart spectrum usage and new CRT services. The use of spectrum is beneficial. Cross-layer architecture improves the energy efficiency of wireless networks. System performance is improved by connecting protocol layers. Cross-layer configuration does not introduce layer functionality into a network. By protecting networks, cross-layer design increases communication. C-LNRD uses self-determined time slots to promote communication. Agents that collect information. At each level, the monitoring agent monitors traffic, time, and topology. Each layer of agents has its own database. Data is received by the network, MAC, and physical layers. Based on its measurements, each node grants trust. Routes were altered. PR ATTACK does not have RTS, CTS, or RREQ to reduce false positives. Spectrum allocation is improved via cognitive radio and learning technologies. Adaptive Cognitive Radio Networks are created using AI, GA, Fuzzy Logic, and Game Theory (ACRN). DSA creates high-bandwidth MCRNs. This research looks at MCRNs in order to optimise spectrum usage, throughput, routing delay, and overhead. Multihop, the proposed approach by CRN takes into account spectrum awareness, quality route establishment, and route maintenance in the event that a connection fails due to spectrum or a node transfer. New strategies improve the cross-layer network protocols of MCRN. Learners gain from spectrum models. Sensors and routers are linked by layers. The proposed routing improves both performance and spectrum use.

新的手机服务和应用程序消耗更多的频谱。无线频谱允许服务和应用程序相互通信。通过智能频谱使用和新的CRT服务,Wi - Fi质量得到改善。频谱的使用是有益的。跨层架构提高了无线网络的能源效率。通过连接协议层来提高系统性能。跨层配置不会在网络中引入层功能。通过保护网络,跨层设计增加了通信。C - LNRD使用自定时隙来促进通信。收集信息的代理。在每个级别上,监控代理监控流量、时间和拓扑。每一层代理都有自己的数据库。数据由网络层、MAC层和物理层接收。基于其度量,每个节点授予信任。路线被改变了。PR ATTACK没有RTS, CTS或RREQ来减少误报。通过认知无线电和学习技术改进频谱分配。自适应认知无线电网络是使用人工智能、遗传算法、模糊逻辑和博弈论(ACRN)创建的。DSA创建高带宽mcrn。本研究着眼于mcrn,以优化频谱使用、吞吐量、路由延迟和开销。多跳,CRN提出的方法考虑了频谱感知、质量路由的建立以及由于频谱或节点转移导致连接失败时的路由维护。新的策略改进了MCRN的跨层网络协议。学习者从谱模型中获益。传感器和路由器是分层连接的。提出的路由既提高了性能,又提高了频谱利用率。
{"title":"Cross layer protocol architecture for spectrum-based routing in cognitive radio networks","authors":"R. Sri Uma Suseela,&nbsp;Korlapati Satyanarayana Murthy,&nbsp;Hima Bindu Valiveti,&nbsp;Mohammad Akhtaruzzaman","doi":"10.1049/ntw2.12101","DOIUrl":"10.1049/ntw2.12101","url":null,"abstract":"<p>New cell phone services and apps consume more spectrum. Wireless spectrum allows services and apps to communicate with one another. Wi-Fi quality is improved via smart spectrum usage and new CRT services. The use of spectrum is beneficial. Cross-layer architecture improves the energy efficiency of wireless networks. System performance is improved by connecting protocol layers. Cross-layer configuration does not introduce layer functionality into a network. By protecting networks, cross-layer design increases communication. C-LNRD uses self-determined time slots to promote communication. Agents that collect information. At each level, the monitoring agent monitors traffic, time, and topology. Each layer of agents has its own database. Data is received by the network, MAC, and physical layers. Based on its measurements, each node grants trust. Routes were altered. PR ATTACK does not have RTS, CTS, or RREQ to reduce false positives. Spectrum allocation is improved via cognitive radio and learning technologies. Adaptive Cognitive Radio Networks are created using AI, GA, Fuzzy Logic, and Game Theory (ACRN). DSA creates high-bandwidth MCRNs. This research looks at MCRNs in order to optimise spectrum usage, throughput, routing delay, and overhead. Multihop, the proposed approach by CRN takes into account spectrum awareness, quality route establishment, and route maintenance in the event that a connection fails due to spectrum or a node transfer. New strategies improve the cross-layer network protocols of MCRN. Learners gain from spectrum models. Sensors and routers are linked by layers. The proposed routing improves both performance and spectrum use.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42560397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of antenna and relay scheme for cooperative non-orthogonal multiple access 协作非正交多址天线和中继方案的评估
IF 1.4 Q1 Mathematics Pub Date : 2023-08-25 DOI: 10.1049/ntw2.12099
Vipin Balyan

An antenna selection followed by a relay selection scheme (ASRS) is proposed for cooperative non-orthogonal multiple access (NOMA)-based network. The proposed work selects an antenna to maximise the instantaneous rate of poor channel condition users while providing good quality of services (QoS). The outage probability performance of the proposed scheme is plotted for different antenna configuration while varying the SNR and distance with variable number of antennas and available relays. The fairness factor of the proposed work is also discussed, considering three different density areas. The proposed scheme is compared with novel schemes in literature for average sum rate and average energy efficiency to show its superiority.

针对基于合作非正交多址(NOMA)的网络,提出了一种先选择天线后选择中继的方案(ASRS)。所提出的工作选择天线以最大化较差信道条件用户的瞬时速率,同时提供良好的服务质量(QoS)。针对不同的天线配置,绘制了所提出方案的中断概率性能,同时随着天线数量和可用中继的变化,SNR和距离也会发生变化。考虑到三个不同的密度区域,还讨论了拟议工作的公平因素。将所提出的方案与文献中的新方案在平均和速率和平均能量效率方面进行了比较,以表明其优越性。
{"title":"Evaluation of antenna and relay scheme for cooperative non-orthogonal multiple access","authors":"Vipin Balyan","doi":"10.1049/ntw2.12099","DOIUrl":"10.1049/ntw2.12099","url":null,"abstract":"<p>An antenna selection followed by a relay selection scheme (ASRS) is proposed for cooperative non-orthogonal multiple access (NOMA)-based network. The proposed work selects an antenna to maximise the instantaneous rate of poor channel condition users while providing good quality of services (QoS). The outage probability performance of the proposed scheme is plotted for different antenna configuration while varying the SNR and distance with variable number of antennas and available relays. The fairness factor of the proposed work is also discussed, considering three different density areas. The proposed scheme is compared with novel schemes in literature for average sum rate and average energy efficiency to show its superiority.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12099","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44348643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A beginner's guide to infrastructure-less networking concepts 无基础设施网络概念的初学者指南
IF 1.4 Q1 Mathematics Pub Date : 2023-08-25 DOI: 10.1049/ntw2.12094
Anna Förster, Jens Dede, Andreas Könsgen, Koojana Kuladinithi, Vishnupriya Kuppusamy, Andreas Timm-Giel, Asanga Udugama, Andreas Willig

Infrastructure-less networks connect communication devices end-to-end by managing links and routes independent of fixed networking facilities, relying on dedicated protocols running on end-user devices. The large variety of infrastructure-less concepts and related aspects can be confusing both for beginning Ph.D. students as well as experienced researchers who wish to get an overview of neighbouring areas to their own research foci. Frequently discussed topics such as different types of sensor-, vehicular-, or opportunistic networks are covered. The authors describe different networking concepts by looking at aspects such as the main properties, common applications, and ongoing research. Furthermore, the concepts by common characteristics such as node mobility, network density, or power consumption are compared. The authors also discuss network performance evaluation by describing commonly used metrics, different evaluation techniques, and software tools for simulation-based evaluation. The references given in each section help obtain in-depth information about the presented topics and give hints about open research questions, which can be a starting point for own investigations.

无基础设施网络通过管理独立于固定网络设施的链路和路由,依赖于终端用户设备上运行的专用协议,将通信设备端到端连接起来。各种各样的无基础设施概念和相关方面可能会让刚开始攻读博士学位的学生和有经验的研究人员感到困惑,他们希望对自己的研究重点了解邻近地区的概况。经常讨论的主题,如不同类型的传感器-,车辆-或机会网络被覆盖。作者从主要特性、常用应用和正在进行的研究等方面描述了不同的网络概念。此外,还比较了节点移动性、网络密度或功耗等共同特征的概念。作者还通过描述常用的指标,不同的评估技术和基于模拟的评估软件工具来讨论网络性能评估。每个部分给出的参考文献有助于获得有关所提出主题的深入信息,并给出有关开放研究问题的提示,这可以成为自己调查的起点。
{"title":"A beginner's guide to infrastructure-less networking concepts","authors":"Anna Förster,&nbsp;Jens Dede,&nbsp;Andreas Könsgen,&nbsp;Koojana Kuladinithi,&nbsp;Vishnupriya Kuppusamy,&nbsp;Andreas Timm-Giel,&nbsp;Asanga Udugama,&nbsp;Andreas Willig","doi":"10.1049/ntw2.12094","DOIUrl":"10.1049/ntw2.12094","url":null,"abstract":"<p>Infrastructure-less networks connect communication devices end-to-end by managing links and routes independent of fixed networking facilities, relying on dedicated protocols running on end-user devices. The large variety of infrastructure-less concepts and related aspects can be confusing both for beginning Ph.D. students as well as experienced researchers who wish to get an overview of neighbouring areas to their own research foci. Frequently discussed topics such as different types of sensor-, vehicular-, or opportunistic networks are covered. The authors describe different networking concepts by looking at aspects such as the main properties, common applications, and ongoing research. Furthermore, the concepts by common characteristics such as node mobility, network density, or power consumption are compared. The authors also discuss network performance evaluation by describing commonly used metrics, different evaluation techniques, and software tools for simulation-based evaluation. The references given in each section help obtain in-depth information about the presented topics and give hints about open research questions, which can be a starting point for own investigations.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12094","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42140003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1