In recent years, wireless charging technology is widely used for sensor charging. Though carts equipped with wireless charging tools were able to reach sensor nodes and continuously recharge them, their applications are limited and could not be used in many territories such as rugged mountainous terrain and severely damaged disaster areas. With the significant cost reduction of UAVs due to the mature technology, using UAVs to replace charging carts for wireless sensor networks is a future trend. In this study, the problem of energy replenishment and path planning for large-scale wireless sensor networks by multiple UAVs is considered. First, sensor nodes are distributed evenly by using an improved k-means clustering algorithm, modelling the problem of the UAV traversal over a certain range of sensors as a travelling salesman problem. Then, a heuristic algorithm is proposed to solve the path planning of UAVs and the hovering time at each sensor. The simulations show the effect of different charging ratios r on the number of non-functional nodes and the loss of the UAV. The experimental results show that the proposed algorithm is able to plan a sensible path for the UAV, which leads to a smaller UAV energy loss and a smaller number of non-functional nodes.
近年来,无线充电技术被广泛应用于传感器充电。虽然配备无线充电工具的小车能够到达传感器节点并持续为其充电,但其应用范围有限,无法在崎岖的山区和严重受损的灾区等很多地方使用。随着无人机技术的成熟,成本大幅降低,使用无人机取代无线传感器网络的充电车是未来的发展趋势。本研究考虑了由多架无人机组成的大规模无线传感器网络的能量补充和路径规划问题。首先,使用改进的 k-means 聚类算法均匀分布传感器节点,将无人机穿越一定范围传感器的问题模拟为旅行推销员问题。然后,提出了一种启发式算法来解决无人机的路径规划和在每个传感器的悬停时间问题。仿真显示了不同的充电比 r 对无功能节点数量和无人机损失的影响。实验结果表明,所提出的算法能够为无人飞行器规划出合理的路径,从而使无人飞行器的能量损耗更小,非功能节点的数量更少。
{"title":"Wireless sensing charging based on multi-drone cooperation","authors":"Guoxin Xu, Jiawen Zhao, Xuehe Wang","doi":"10.1049/ntw2.12107","DOIUrl":"10.1049/ntw2.12107","url":null,"abstract":"<p>In recent years, wireless charging technology is widely used for sensor charging. Though carts equipped with wireless charging tools were able to reach sensor nodes and continuously recharge them, their applications are limited and could not be used in many territories such as rugged mountainous terrain and severely damaged disaster areas. With the significant cost reduction of UAVs due to the mature technology, using UAVs to replace charging carts for wireless sensor networks is a future trend. In this study, the problem of energy replenishment and path planning for large-scale wireless sensor networks by multiple UAVs is considered. First, sensor nodes are distributed evenly by using an improved <i>k</i>-means clustering algorithm, modelling the problem of the UAV traversal over a certain range of sensors as a travelling salesman problem. Then, a heuristic algorithm is proposed to solve the path planning of UAVs and the hovering time at each sensor. The simulations show the effect of different charging ratios <i>r</i> on the number of non-functional nodes and the loss of the UAV. The experimental results show that the proposed algorithm is able to plan a sensible path for the UAV, which leads to a smaller UAV energy loss and a smaller number of non-functional nodes.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 3","pages":"199-207"},"PeriodicalIF":1.4,"publicationDate":"2023-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12107","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135043841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samson Arun Raj A, Basil Xavier S, Jaspher Wilisie Kathrine G, Salaja Silas, Andrew J
Conventional Mobile Communication Systems (MCS) reliably transfer critical messages from authorised remote information sources like military bases and ground control stations in the war field. As tactical advancement grows rapidly, the challenges of transmitting tactical messages via conventional satellite methods increase the processing overhead related to cost, Line of Sight (LOS) communication, packet loss, delay, and retransmission requests. Modern mobile communication systems use Airborne Node Networks (ANN) between satellites and Mobile Ground Nodes (MGNs) as they provide many advantages in mobile communication systems. Hence airborne network reduces the burden of satellites as they are only used as relay stations. The mobility problem caused by ANN and MGNs is solved by proposing a novel constructive airborne-ground matrix algorithm known as the Who-To-Whom (WTW) matrix. With the help of this matrix acting as a reference index, it determines which nodes relate to whom at every time interval T in the tactical environment. This WTW matrix holds precise status/information about connectivity among all stakeholders in the operating environment by carefully and effectively accounting for frequent location changes. The methodology of the proposed matrix is that it contains the physical parameters of the nodes and their behaviour in the tactical environment. The WTW matrix construction algorithm discusses how the reference matrix is constructed in every aerial node to monitor the mobile ground nodes by leading them to safety and providing aerial guidance as they move along the tactical environment. The performance metrics are measured with other existing schemes, and the merits and demerits of the proposed WTW matrix are identified and discussed in detail.
传统的移动通信系统(MCS)能够可靠地从授权的远程信息源(如战场上的军事基地和地面控制站)传输关键信息。随着战术的快速发展,通过传统卫星方法传输战术信息所面临的挑战增加了与成本、视线(LOS)通信、数据包丢失、延迟和重传请求有关的处理开销。现代移动通信系统在卫星和移动地面节点(MGN)之间使用机载节点网络(ANN),因为它们在移动通信系统中具有许多优势。因此,机载网络减轻了卫星的负担,因为卫星只用作中继站。通过提出一种称为 "谁对谁"(WTW)矩阵的新型建设性机载-地面矩阵算法,解决了 ANN 和 MGN 带来的移动性问题。在该矩阵作为参考索引的帮助下,它能确定战术环境中每个时间间隔 T 内哪些节点与谁有关。该 WTW 矩阵通过仔细、有效地考虑频繁的位置变化,掌握了作战环境中所有利益相关者之间连接的精确状态/信息。拟议矩阵的方法是,它包含节点的物理参数及其在战术环境中的行为。WTW 矩阵构建算法讨论了如何在每个空中节点构建参考矩阵,以便在移动地面节点沿战术环境移动时将其引向安全地带并提供空中引导,从而对其进行监控。与其他现有方案一起对性能指标进行了测量,并详细确定和讨论了拟议 WTW 矩阵的优缺点。
{"title":"A constructive airborne-ground matrix algorithm for modern telecommunication systems","authors":"Samson Arun Raj A, Basil Xavier S, Jaspher Wilisie Kathrine G, Salaja Silas, Andrew J","doi":"10.1049/ntw2.12103","DOIUrl":"10.1049/ntw2.12103","url":null,"abstract":"<p>Conventional Mobile Communication Systems (MCS) reliably transfer critical messages from authorised remote information sources like military bases and ground control stations in the war field. As tactical advancement grows rapidly, the challenges of transmitting tactical messages via conventional satellite methods increase the processing overhead related to cost, Line of Sight (LOS) communication, packet loss, delay, and retransmission requests. Modern mobile communication systems use Airborne Node Networks (ANN) between satellites and Mobile Ground Nodes (MGNs) as they provide many advantages in mobile communication systems. Hence airborne network reduces the burden of satellites as they are only used as relay stations. The mobility problem caused by ANN and MGNs is solved by proposing a novel constructive airborne-ground matrix algorithm known as the Who-To-Whom (WTW) matrix. With the help of this matrix acting as a reference index, it determines which nodes relate to whom at every time interval T in the tactical environment. This WTW matrix holds precise status/information about connectivity among all stakeholders in the operating environment by carefully and effectively accounting for frequent location changes. The methodology of the proposed matrix is that it contains the physical parameters of the nodes and their behaviour in the tactical environment. The WTW matrix construction algorithm discusses how the reference matrix is constructed in every aerial node to monitor the mobile ground nodes by leading them to safety and providing aerial guidance as they move along the tactical environment. The performance metrics are measured with other existing schemes, and the merits and demerits of the proposed WTW matrix are identified and discussed in detail.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 2","pages":"147-164"},"PeriodicalIF":1.4,"publicationDate":"2023-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12103","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134960332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
According to the urgent low latency and the heavy computation tasks demands required for sixth-generation (6G) wireless networks, the authors introduce the conventional resource allocation algorithms, including the game theory, artificial-intelligence (AI) methods, and matching theory enabled framework, in which the multi-access edge computing (MEC) scheme collaborative with the cloud platform to serve the primary users (PUs) and cognitive users (CUs) for next generation multiple access (NGMA). The proposed framework allows both the PUs and CUs to offload their computation tasks in a 6G-enabled cognitive radio (CR) networks, so called cloud-assisted CR-MEC networks. In particular, the fundamentals of this conceived networks based on NGMA are first introduced. Hence, a number of methods based on the resource allocation algorithms are proposed in order to improve the quality of service for the mobile users, and reduce their transmission latency as well as the energy consumptions. Moreover, the motivations, challenges, and representative models for these conventional algorithms are described for integrated-intelligent communication and computing aided NGMA networks. Furthermore, the open issues and future research directions for this conceived networks are summarised.
根据第六代(6G)无线网络对低延迟和繁重计算任务的迫切需求,作者引入了传统的资源分配算法,包括博弈论、人工智能(AI)方法和支持匹配理论的框架,其中多接入边缘计算(MEC)方案与云平台协作,为下一代多接入(NGMA)的主用户(PUs)和认知用户(CUs)提供服务。所提出的框架允许 PU 和 CU 在支持 6G 的认知无线电(CR)网络(即云辅助 CR-MEC 网络)中卸载其计算任务。其中,首先介绍了这种基于 NGMA 的构想网络的基本原理。因此,提出了一些基于资源分配算法的方法,以提高移动用户的服务质量,减少传输延迟和能源消耗。此外,针对集成智能通信和计算辅助 NGMA 网络,介绍了这些传统算法的动机、挑战和代表模型。此外,还总结了这种构想网络的开放性问题和未来研究方向。
{"title":"NGMA-based intergrated communication and computing for 6G-enabled cognitive radio networks","authors":"Wei Liang, Jiankang Zhang, Dawei Wang, Lixin Li, Soon Xin Ng","doi":"10.1049/ntw2.12102","DOIUrl":"10.1049/ntw2.12102","url":null,"abstract":"<p>According to the urgent low latency and the heavy computation tasks demands required for sixth-generation (6G) wireless networks, the authors introduce the conventional resource allocation algorithms, including the game theory, artificial-intelligence (AI) methods, and matching theory enabled framework, in which the multi-access edge computing (MEC) scheme collaborative with the cloud platform to serve the primary users (PUs) and cognitive users (CUs) for next generation multiple access (NGMA). The proposed framework allows both the PUs and CUs to offload their computation tasks in a 6G-enabled cognitive radio (CR) networks, so called cloud-assisted CR-MEC networks. In particular, the fundamentals of this conceived networks based on NGMA are first introduced. Hence, a number of methods based on the resource allocation algorithms are proposed in order to improve the quality of service for the mobile users, and reduce their transmission latency as well as the energy consumptions. Moreover, the motivations, challenges, and representative models for these conventional algorithms are described for integrated-intelligent communication and computing aided NGMA networks. Furthermore, the open issues and future research directions for this conceived networks are summarised.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 3","pages":"262-269"},"PeriodicalIF":1.4,"publicationDate":"2023-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135885435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the support of the sixth-generation mobile networks (6G) technology, the Internet-of-Vehicle (IoV) can realize the perception and monitoring of vehicle road information. However, due to the change of network topology and various environment, the reliable performance of the communication link is facing challenges. For the sake of improving communication quality, a cooperative vehicular network (CVN) system is established, which adopts cooperative communication and multiple input multiple output (MIMO) technology. According to the signal-to-noise ratio (SNR) threshold of relay vehicles, using hybrid decode-amplify-forward (HDAF) protocol and combining with antenna selection, the analytical expression of outage probability (OP) with Meijer-G function is obtained. For predicting the OP accurately, the sparrow search algorithm based on back-propagation neural network (SSA-BPNN) is put forward. The simulation results show that the cascade order of the channels has a negative effect on the OP. Meanwhile, the prediction accuracy of SSA-BPNN is 64.8% higher than that of BPNN, and 98.96% greater than that of general regression neural network, and the convergence rate is faster than ICS-BPNN.
{"title":"Outage performance prediction of cooperative vehicle network based on sparrow search algorithm based on back-propagation neural network","authors":"Ya Li, Yu Zhang, Xinji Tian, Ruipeng Liu","doi":"10.1049/ntw2.12100","DOIUrl":"10.1049/ntw2.12100","url":null,"abstract":"<p>With the support of the sixth-generation mobile networks (6G) technology, the Internet-of-Vehicle (IoV) can realize the perception and monitoring of vehicle road information. However, due to the change of network topology and various environment, the reliable performance of the communication link is facing challenges. For the sake of improving communication quality, a cooperative vehicular network (CVN) system is established, which adopts cooperative communication and multiple input multiple output (MIMO) technology. According to the signal-to-noise ratio (SNR) threshold of relay vehicles, using hybrid decode-amplify-forward (HDAF) protocol and combining with antenna selection, the analytical expression of outage probability (OP) with Meijer-G function is obtained. For predicting the OP accurately, the sparrow search algorithm based on back-propagation neural network (SSA-BPNN) is put forward. The simulation results show that the cascade order of the channels has a negative effect on the OP. Meanwhile, the prediction accuracy of SSA-BPNN is 64.8% higher than that of BPNN, and 98.96% greater than that of general regression neural network, and the convergence rate is faster than ICS-BPNN.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 1","pages":"45-57"},"PeriodicalIF":1.4,"publicationDate":"2023-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12100","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43322135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the increasing rate and types of cyber attacks against information systems and communication infrastructures, many tools are needed to detect and mitigate against such attacks, for example, Intrusion Detection Systems (IDSs). Unfortunately, traditional Signature-based IDSs (SIDSs) perform poorly against previously unseen adversarial attacks. Anomaly-based IDSs (AIDSs) use Machine Learning (ML) and Deep Learning (DL) approaches to overcome these limitations. However, AIDS performance can be poor when trained on imbalanced datasets. To address the challenge of AIDS performance caused by these unbalanced training datasets, generative adversarial models are proposed to obtain adversarial attacks from one side and analyse their quality from another. According to extensive usage and reliability criteria for generative adversarial models in different disciplines, Generative Adversarial Networks (GANs), Bidirectional GAN (BiGAN), and Wasserstein GAN (WGAN) are employed to serve AIDS. The authors have extensively assessed their abilities and robustness to deliver high-quality attacks for AIDS. AIDSs are constructed, trained, and tuned based on these models to measure their impacts. The authors have employed two datasets: NSL-KDD and CICIDS-2017 for generalisation purposes, where ML and DL approaches are utilised to implement AIDSs. Their results show that the WGAN model outperformed GANs and BiGAN models in binary and multiclass classifications for both datasets.
{"title":"Evaluating the impact of generative adversarial models on the performance of anomaly intrusion detection","authors":"Mohammad Arafah, Iain Phillips, Asma Adnane","doi":"10.1049/ntw2.12098","DOIUrl":"10.1049/ntw2.12098","url":null,"abstract":"<p>With the increasing rate and types of cyber attacks against information systems and communication infrastructures, many tools are needed to detect and mitigate against such attacks, for example, Intrusion Detection Systems (IDSs). Unfortunately, traditional Signature-based IDSs (SIDSs) perform poorly against previously unseen adversarial attacks. Anomaly-based IDSs (AIDSs) use <i>Machine Learning (ML)</i> and <i>Deep Learning (DL)</i> approaches to overcome these limitations. However, AIDS performance can be poor when trained on imbalanced datasets. To address the challenge of AIDS performance caused by these unbalanced training datasets, generative adversarial models are proposed to obtain adversarial attacks from one side and analyse their quality from another. According to extensive usage and reliability criteria for generative adversarial models in different disciplines, <i>Generative Adversarial Networks (GANs)</i>, <i>Bidirectional GAN (BiGAN)</i>, and <i>Wasserstein GAN (WGAN)</i> are employed to serve AIDS. The authors have extensively assessed their abilities and robustness to deliver high-quality attacks for AIDS. AIDSs are constructed, trained, and tuned based on these models to measure their impacts. The authors have employed two datasets: <i>NSL-KDD</i> and <i>CICIDS-2017</i> for generalisation purposes, where <i>ML</i> and <i>DL</i> approaches are utilised to implement AIDSs. Their results show that the <i>WGAN</i> model outperformed <i>GANs</i> and <i>BiGAN</i> models in binary and multiclass classifications for both datasets.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 1","pages":"28-44"},"PeriodicalIF":1.4,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12098","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45852265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Sri Uma Suseela, Korlapati Satyanarayana Murthy, Hima Bindu Valiveti, Mohammad Akhtaruzzaman
New cell phone services and apps consume more spectrum. Wireless spectrum allows services and apps to communicate with one another. Wi-Fi quality is improved via smart spectrum usage and new CRT services. The use of spectrum is beneficial. Cross-layer architecture improves the energy efficiency of wireless networks. System performance is improved by connecting protocol layers. Cross-layer configuration does not introduce layer functionality into a network. By protecting networks, cross-layer design increases communication. C-LNRD uses self-determined time slots to promote communication. Agents that collect information. At each level, the monitoring agent monitors traffic, time, and topology. Each layer of agents has its own database. Data is received by the network, MAC, and physical layers. Based on its measurements, each node grants trust. Routes were altered. PR ATTACK does not have RTS, CTS, or RREQ to reduce false positives. Spectrum allocation is improved via cognitive radio and learning technologies. Adaptive Cognitive Radio Networks are created using AI, GA, Fuzzy Logic, and Game Theory (ACRN). DSA creates high-bandwidth MCRNs. This research looks at MCRNs in order to optimise spectrum usage, throughput, routing delay, and overhead. Multihop, the proposed approach by CRN takes into account spectrum awareness, quality route establishment, and route maintenance in the event that a connection fails due to spectrum or a node transfer. New strategies improve the cross-layer network protocols of MCRN. Learners gain from spectrum models. Sensors and routers are linked by layers. The proposed routing improves both performance and spectrum use.
{"title":"Cross layer protocol architecture for spectrum-based routing in cognitive radio networks","authors":"R. Sri Uma Suseela, Korlapati Satyanarayana Murthy, Hima Bindu Valiveti, Mohammad Akhtaruzzaman","doi":"10.1049/ntw2.12101","DOIUrl":"10.1049/ntw2.12101","url":null,"abstract":"<p>New cell phone services and apps consume more spectrum. Wireless spectrum allows services and apps to communicate with one another. Wi-Fi quality is improved via smart spectrum usage and new CRT services. The use of spectrum is beneficial. Cross-layer architecture improves the energy efficiency of wireless networks. System performance is improved by connecting protocol layers. Cross-layer configuration does not introduce layer functionality into a network. By protecting networks, cross-layer design increases communication. C-LNRD uses self-determined time slots to promote communication. Agents that collect information. At each level, the monitoring agent monitors traffic, time, and topology. Each layer of agents has its own database. Data is received by the network, MAC, and physical layers. Based on its measurements, each node grants trust. Routes were altered. PR ATTACK does not have RTS, CTS, or RREQ to reduce false positives. Spectrum allocation is improved via cognitive radio and learning technologies. Adaptive Cognitive Radio Networks are created using AI, GA, Fuzzy Logic, and Game Theory (ACRN). DSA creates high-bandwidth MCRNs. This research looks at MCRNs in order to optimise spectrum usage, throughput, routing delay, and overhead. Multihop, the proposed approach by CRN takes into account spectrum awareness, quality route establishment, and route maintenance in the event that a connection fails due to spectrum or a node transfer. New strategies improve the cross-layer network protocols of MCRN. Learners gain from spectrum models. Sensors and routers are linked by layers. The proposed routing improves both performance and spectrum use.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 1","pages":"58-65"},"PeriodicalIF":1.4,"publicationDate":"2023-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42560397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An antenna selection followed by a relay selection scheme (ASRS) is proposed for cooperative non-orthogonal multiple access (NOMA)-based network. The proposed work selects an antenna to maximise the instantaneous rate of poor channel condition users while providing good quality of services (QoS). The outage probability performance of the proposed scheme is plotted for different antenna configuration while varying the SNR and distance with variable number of antennas and available relays. The fairness factor of the proposed work is also discussed, considering three different density areas. The proposed scheme is compared with novel schemes in literature for average sum rate and average energy efficiency to show its superiority.
{"title":"Evaluation of antenna and relay scheme for cooperative non-orthogonal multiple access","authors":"Vipin Balyan","doi":"10.1049/ntw2.12099","DOIUrl":"10.1049/ntw2.12099","url":null,"abstract":"<p>An antenna selection followed by a relay selection scheme (ASRS) is proposed for cooperative non-orthogonal multiple access (NOMA)-based network. The proposed work selects an antenna to maximise the instantaneous rate of poor channel condition users while providing good quality of services (QoS). The outage probability performance of the proposed scheme is plotted for different antenna configuration while varying the SNR and distance with variable number of antennas and available relays. The fairness factor of the proposed work is also discussed, considering three different density areas. The proposed scheme is compared with novel schemes in literature for average sum rate and average energy efficiency to show its superiority.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 2","pages":"115-128"},"PeriodicalIF":1.4,"publicationDate":"2023-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12099","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44348643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anna Förster, Jens Dede, Andreas Könsgen, Koojana Kuladinithi, Vishnupriya Kuppusamy, Andreas Timm-Giel, Asanga Udugama, Andreas Willig
Infrastructure-less networks connect communication devices end-to-end by managing links and routes independent of fixed networking facilities, relying on dedicated protocols running on end-user devices. The large variety of infrastructure-less concepts and related aspects can be confusing both for beginning Ph.D. students as well as experienced researchers who wish to get an overview of neighbouring areas to their own research foci. Frequently discussed topics such as different types of sensor-, vehicular-, or opportunistic networks are covered. The authors describe different networking concepts by looking at aspects such as the main properties, common applications, and ongoing research. Furthermore, the concepts by common characteristics such as node mobility, network density, or power consumption are compared. The authors also discuss network performance evaluation by describing commonly used metrics, different evaluation techniques, and software tools for simulation-based evaluation. The references given in each section help obtain in-depth information about the presented topics and give hints about open research questions, which can be a starting point for own investigations.
{"title":"A beginner's guide to infrastructure-less networking concepts","authors":"Anna Förster, Jens Dede, Andreas Könsgen, Koojana Kuladinithi, Vishnupriya Kuppusamy, Andreas Timm-Giel, Asanga Udugama, Andreas Willig","doi":"10.1049/ntw2.12094","DOIUrl":"10.1049/ntw2.12094","url":null,"abstract":"<p>Infrastructure-less networks connect communication devices end-to-end by managing links and routes independent of fixed networking facilities, relying on dedicated protocols running on end-user devices. The large variety of infrastructure-less concepts and related aspects can be confusing both for beginning Ph.D. students as well as experienced researchers who wish to get an overview of neighbouring areas to their own research foci. Frequently discussed topics such as different types of sensor-, vehicular-, or opportunistic networks are covered. The authors describe different networking concepts by looking at aspects such as the main properties, common applications, and ongoing research. Furthermore, the concepts by common characteristics such as node mobility, network density, or power consumption are compared. The authors also discuss network performance evaluation by describing commonly used metrics, different evaluation techniques, and software tools for simulation-based evaluation. The references given in each section help obtain in-depth information about the presented topics and give hints about open research questions, which can be a starting point for own investigations.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 1","pages":"66-110"},"PeriodicalIF":1.4,"publicationDate":"2023-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12094","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42140003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sutapa Sarkar, R. Muralishankar, Sanjeev Gurugopinath
Accurate detection of spectrum holes is a useful requirement for cognitive radios that improves the efficiency of spectrum usage. The authors propose three novel, simple, and entropy-based detectors for spectrum sensing in cognitive radio. The authors evaluate the probability of detection of these three detectors: Vasicek's entropy detector, truncated Vasicek's entropy detector, and Van Es' entropy detector, over a predefined probability of false-alarm. In particular, the authors provide the approximate and asymptotic test statistics for these detectors in the presence and absence of Nakagami-m fading, noise variance uncertainty, and optimised detection threshold. Furthermore, the authors provide a detailed comparison study among all the detectors via Monte Carlo simulations and justify authors results through real-world data. The authors’ experimental results establish a superior performance of truncated Vasicek's entropy detector over Vasicek's entropy detector, energy detector, differential entropy detector and Van Es' entropy detector in practically viable scenarios.
准确检测频谱空洞是认知无线电的一项有用要求,可提高频谱使用效率。作者为认知无线电中的频谱感知提出了三种新颖、简单和基于熵的检测器。作者评估了这三种检测器的检测概率:Vasicek熵检测器、截断 Vasicek熵检测器和 Van Es熵检测器的误报概率。作者特别提供了这些检测器在存在或不存在中上衰减、噪声方差不确定性和优化检测阈值时的近似和渐近检测统计量。此外,作者还通过蒙特卡罗模拟对所有检测器进行了详细的比较研究,并通过实际数据证明了作者的研究结果。作者的实验结果表明,在实际可行的情况下,截断瓦西切克熵检测器的性能优于瓦西切克熵检测器、能量检测器、差分熵检测器和 Van Es熵检测器。
{"title":"Vasicek and Van Es entropy-based spectrum sensing for cognitive radios","authors":"Sutapa Sarkar, R. Muralishankar, Sanjeev Gurugopinath","doi":"10.1049/ntw2.12096","DOIUrl":"10.1049/ntw2.12096","url":null,"abstract":"<p>Accurate detection of spectrum holes is a useful requirement for cognitive radios that improves the efficiency of spectrum usage. The authors propose three novel, simple, and entropy-based detectors for spectrum sensing in cognitive radio. The authors evaluate the probability of detection of these three detectors: Vasicek's entropy detector, truncated Vasicek's entropy detector, and Van Es' entropy detector, over a predefined probability of false-alarm. In particular, the authors provide the approximate and asymptotic test statistics for these detectors in the presence and absence of Nakagami-<i>m</i> fading, noise variance uncertainty, and optimised detection threshold. Furthermore, the authors provide a detailed comparison study among all the detectors via Monte Carlo simulations and justify authors results through real-world data. The authors’ experimental results establish a superior performance of truncated Vasicek's entropy detector over Vasicek's entropy detector, energy detector, differential entropy detector and Van Es' entropy detector in practically viable scenarios.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 1","pages":"1-12"},"PeriodicalIF":1.4,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12096","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46834973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marinos Vlasakis, Ioannis Moscholios, Panagiotis Sarigiannidis, Michael Logothetis
The authors study and evaluate a mobility-aware call admission control algorithm in a mobile hotspot. More specifically, a vehicle which has an access point of a fixed capacity and may alternate between stop and moving phases is considered. In the stop phase, the vehicle services new and handover calls. To prioritise handover calls a probabilistic bandwidth reservation policy is considered where a fraction of the capacity is reserved for handover calls. Based on this policy, new calls may enter the reservation space with a predefined probability. In addition, handover calls have the option to wait in a queue of finite size if there are no available resources at the time of their arrival. In the moving phase, the vehicle services only new calls under the classical complete sharing policy. In both phases, calls arrive in the system according to a quasi-random process, require a single bandwidth unit for their acceptance in the system and have an exponentially distributed service time. To analytically determine the various performance measures, such as time congestion probabilities, call blocking probabilities and link utilisation, an accurate analytical method is presented based on three-dimensional Markov chains.
{"title":"Performance evaluation of a mobile hotspot supporting quasi-random traffic","authors":"Marinos Vlasakis, Ioannis Moscholios, Panagiotis Sarigiannidis, Michael Logothetis","doi":"10.1049/ntw2.12093","DOIUrl":"10.1049/ntw2.12093","url":null,"abstract":"<p>The authors study and evaluate a mobility-aware call admission control algorithm in a mobile hotspot. More specifically, a vehicle which has an access point of a fixed capacity and may alternate between stop and moving phases is considered. In the stop phase, the vehicle services new and handover calls. To prioritise handover calls a probabilistic bandwidth reservation policy is considered where a fraction of the capacity is reserved for handover calls. Based on this policy, new calls may enter the reservation space with a predefined probability. In addition, handover calls have the option to wait in a queue of finite size if there are no available resources at the time of their arrival. In the moving phase, the vehicle services only new calls under the classical complete sharing policy. In both phases, calls arrive in the system according to a quasi-random process, require a single bandwidth unit for their acceptance in the system and have an exponentially distributed service time. To analytically determine the various performance measures, such as time congestion probabilities, call blocking probabilities and link utilisation, an accurate analytical method is presented based on three-dimensional Markov chains.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 6","pages":"295-304"},"PeriodicalIF":1.4,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12093","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46574287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}