Pub Date : 2024-08-01DOI: 10.1016/j.icte.2024.06.001
This paper offers an in-depth exploration of semantic communications, focusing on its integral role in wireless networks. We dissect its foundational architecture and the key elements that enable seamless AI integration. Our research categorizes semantic communications into various multimedia and task types, evaluating their applicability in both single and multitasking environments. We also investigate resource allocation and goal-oriented strategies, supported by empirical case studies. The paper concludes by spotlighting emerging trends, including AI, IoT, and 5G beyond. It identifies pressing challenges such as standardization, security, and efficiency. Our work provides a holistic understanding of contemporary semantic communications paradigms.
{"title":"Navigating the future of wireless networks: A multidimensional survey on semantic communications","authors":"","doi":"10.1016/j.icte.2024.06.001","DOIUrl":"10.1016/j.icte.2024.06.001","url":null,"abstract":"<div><p>This paper offers an in-depth exploration of semantic communications, focusing on its integral role in wireless networks. We dissect its foundational architecture and the key elements that enable seamless AI integration. Our research categorizes semantic communications into various multimedia and task types, evaluating their applicability in both single and multitasking environments. We also investigate resource allocation and goal-oriented strategies, supported by empirical case studies. The paper concludes by spotlighting emerging trends, including AI, IoT, and 5G beyond. It identifies pressing challenges such as standardization, security, and efficiency. Our work provides a holistic understanding of contemporary semantic communications paradigms.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 747-773"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000663/pdfft?md5=d8180959e946c2a5050dbb213ce6b98b&pid=1-s2.0-S2405959524000663-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141414210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-01DOI: 10.1016/j.icte.2024.05.008
Recent developments in the fields of communications, smart transportation systems and computer systems have significantly expanded the potential for intelligent solutions in the domains of traffic safety, convenience and efficiency. The utilization of Artificial Intelligence (AI) is presently prevalent across diverse sectors of application due to its significant capacity to augment conventional data-driven methodologies. In the domain of Vehicular Ad hoc NETworks (VANETs), data is regularly gathered from several sources. The collected data serves multiple goals, such as facilitating efficient routing, enhancing driver awareness, forecasting mobility patterns to prevent potential risks, and ultimately enhancing passenger comfort, safety and overall road experience. Internet of thing (IoT) can be a good solution fro many issues that of VANETs. In order to make a complete system of VANETs communications are very essential like 5G and 6G. This study provides a detailed examination of AI, IoT and 5G/6G methodologies currently being investigated by multiple research endeavors in the field of VANETs. The merits and demerits of the AI-based methodologies suggested for the VANET domain have been analyzed with the using of IoT and 5G/6G. In conclusion, forthcoming research prospects in the field of VANETs are ascertained.
{"title":"Artificial Intelligence, Internet of things and 6G methodologies in the context of Vehicular Ad-hoc Networks (VANETs): Survey","authors":"","doi":"10.1016/j.icte.2024.05.008","DOIUrl":"10.1016/j.icte.2024.05.008","url":null,"abstract":"<div><p>Recent developments in the fields of communications, smart transportation systems and computer systems have significantly expanded the potential for intelligent solutions in the domains of traffic safety, convenience and efficiency. The utilization of Artificial Intelligence (AI) is presently prevalent across diverse sectors of application due to its significant capacity to augment conventional data-driven methodologies. In the domain of Vehicular Ad hoc NETworks (VANETs), data is regularly gathered from several sources. The collected data serves multiple goals, such as facilitating efficient routing, enhancing driver awareness, forecasting mobility patterns to prevent potential risks, and ultimately enhancing passenger comfort, safety and overall road experience. Internet of thing (IoT) can be a good solution fro many issues that of VANETs. In order to make a complete system of VANETs communications are very essential like 5G and 6G. This study provides a detailed examination of AI, IoT and 5G/6G methodologies currently being investigated by multiple research endeavors in the field of VANETs. The merits and demerits of the AI-based methodologies suggested for the VANET domain have been analyzed with the using of IoT and 5G/6G. In conclusion, forthcoming research prospects in the field of VANETs are ascertained.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 959-980"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000584/pdfft?md5=9498981f6a175f79dec6a8259f894c25&pid=1-s2.0-S2405959524000584-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141140184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-01DOI: 10.1016/j.icte.2024.05.007
Digital twins (DTs) are an emerging digitalization technology with a huge impact on today’s innovations in both industry and research. DTs can significantly enhance our society and quality of life through the virtualization of a real-world physical system, providing greater insights about their operations and assets, as well as enhancing their resilience through real-time monitoring and proactive maintenance. DTs also pose significant security risks, as intellectual property is encoded and more accessible, as well as their continued synchronization to their physical counterparts. The rapid proliferation and dynamism of cyber threats in today’s digital environments motivate the development of automated and intelligent cyber solutions. Today’s industrial transformation relies heavily on artificial intelligence (AI), including machine learning (ML) and data-driven technologies that allow machines to perform tasks such as self-monitoring, investigation, diagnosis, future prediction, and decision-making intelligently. However, to effectively employ AI-based models in the context of cybersecurity, human-understandable explanations, and their trustworthiness, are significant factors when making decisions in real-world scenarios. This article provides an extensive study of explainable AI (XAI) based cybersecurity modeling through a taxonomy of AI and XAI methods that can assist security analysts and professionals in comprehending system functions, identifying potential threats and anomalies, and ultimately addressing them in DT environments in an intelligent manner. We discuss how these methods can play a key role in solving contemporary cybersecurity issues in various real-world applications. We conclude this paper by identifying crucial challenges and avenues for further research, as well as directions on how professionals and researchers might approach and model future-generation cybersecurity in this emerging field.
{"title":"Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects","authors":"","doi":"10.1016/j.icte.2024.05.007","DOIUrl":"10.1016/j.icte.2024.05.007","url":null,"abstract":"<div><p>Digital twins (DTs) are an emerging digitalization technology with a huge impact on today’s innovations in both industry and research. DTs can significantly enhance our society and quality of life through the virtualization of a real-world physical system, providing greater insights about their operations and assets, as well as enhancing their resilience through real-time monitoring and proactive maintenance. DTs also pose significant security risks, as intellectual property is encoded and more accessible, as well as their continued synchronization to their physical counterparts. The rapid proliferation and dynamism of cyber threats in today’s digital environments motivate the development of automated and intelligent cyber solutions. Today’s industrial transformation relies heavily on artificial intelligence (AI), including machine learning (ML) and data-driven technologies that allow machines to perform tasks such as self-monitoring, investigation, diagnosis, future prediction, and decision-making intelligently. However, to effectively employ AI-based models in the context of cybersecurity, human-understandable explanations, and their trustworthiness, are significant factors when making decisions in real-world scenarios. This article provides an extensive study of explainable AI (XAI) based cybersecurity modeling through a taxonomy of AI and XAI methods that can assist security analysts and professionals in comprehending system functions, identifying potential threats and anomalies, and ultimately addressing them in DT environments in an intelligent manner. We discuss how these methods can play a key role in solving contemporary cybersecurity issues in various real-world applications. We conclude this paper by identifying crucial challenges and avenues for further research, as well as directions on how professionals and researchers might approach and model future-generation cybersecurity in this emerging field.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 935-958"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000572/pdfft?md5=0ba1659d944758ac3a820436b838f534&pid=1-s2.0-S2405959524000572-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141144273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-01DOI: 10.1016/j.icte.2024.05.012
Minseok Choi, Tiange Xiang, Hyelee Lim, Yunoh Kim, Minkyun Ahn, Sunghun Oh, Hyeonsu Kim
Online video services are responsible for a large amount of global data traffic, which is why wireless video caching has become a major focus in order to deal with the increasing amount of data. While conventional caching methods have been successful in reducing file transmission latency and data traffic on the core network, there is still a lot of potential to improve wireless caching for streaming users’ satisfaction, especially as video streaming technology continues to improve. To improve caching, it is important to consider the distinct characteristics of a video file, video encoding, dynamic video streaming, and even 3D video services such as virtual reality (VR) and augmented reality (AR). This paper investigates the distinct video features that can be used to design video caching policies. Additionally, recent studies on wireless video caching and delivery are surveyed, with a focus on four key characteristics: (1) partitioning a video file, (2) encoding a video file into multiple quality versions, (3) recognizing that video file popularity is dynamic and heterogeneous, and (4) understanding that video recommendation affects a series of user requests.
{"title":"Caching, transcoding, delivery and learning for advanced video streaming services","authors":"Minseok Choi, Tiange Xiang, Hyelee Lim, Yunoh Kim, Minkyun Ahn, Sunghun Oh, Hyeonsu Kim","doi":"10.1016/j.icte.2024.05.012","DOIUrl":"10.1016/j.icte.2024.05.012","url":null,"abstract":"<div><p>Online video services are responsible for a large amount of global data traffic, which is why wireless video caching has become a major focus in order to deal with the increasing amount of data. While conventional caching methods have been successful in reducing file transmission latency and data traffic on the core network, there is still a lot of potential to improve wireless caching for streaming users’ satisfaction, especially as video streaming technology continues to improve. To improve caching, it is important to consider the distinct characteristics of a video file, video encoding, dynamic video streaming, and even 3D video services such as virtual reality (VR) and augmented reality (AR). This paper investigates the distinct video features that can be used to design video caching policies. Additionally, recent studies on wireless video caching and delivery are surveyed, with a focus on four key characteristics: (1) partitioning a video file, (2) encoding a video file into multiple quality versions, (3) recognizing that video file popularity is dynamic and heterogeneous, and (4) understanding that video recommendation affects a series of user requests.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 774-785"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000626/pdfft?md5=aa79da443d8dcc961380ae6917912748&pid=1-s2.0-S2405959524000626-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142020435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-01DOI: 10.1016/j.icte.2024.05.010
Junseung Lee , Seung-Chan Lim , Hyungsub Kim , JeeHyeon Na , Howon Lee
To effectively manage the escalating traffic, attention is drawn to the coexistence mechanism of cellular and Wi-Fi networks which offload the cellular traffic from the licensed band to the unlicensed band. For the coexistence of 5G new radio-unlicensed and Wi-Fi, we tackle the energy efficiency maximization problem by sequentially determining the duty cycle and transmit power through the use of distributed deep Q-network (DQN) techniques. When utilizing the existing unlicensed band, the proposed method minimizes the impact on Wi-Fi networks while achieving optimal energy efficiency. Simulations validate the superior energy efficiency of the proposed coexistence mechanism over various benchmark methods.
{"title":"Distributed DQN-based network-wide energy efficiency maximization for 5G NR-U and Wi-Fi coexistence environments","authors":"Junseung Lee , Seung-Chan Lim , Hyungsub Kim , JeeHyeon Na , Howon Lee","doi":"10.1016/j.icte.2024.05.010","DOIUrl":"10.1016/j.icte.2024.05.010","url":null,"abstract":"<div><p>To effectively manage the escalating traffic, attention is drawn to the coexistence mechanism of cellular and Wi-Fi networks which offload the cellular traffic from the licensed band to the unlicensed band. For the coexistence of 5G new radio-unlicensed and Wi-Fi, we tackle the energy efficiency maximization problem by sequentially determining the duty cycle and transmit power through the use of distributed deep Q-network (DQN) techniques. When utilizing the existing unlicensed band, the proposed method minimizes the impact on Wi-Fi networks while achieving optimal energy efficiency. Simulations validate the superior energy efficiency of the proposed coexistence mechanism over various benchmark methods.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 845-850"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000602/pdfft?md5=e3791833fc223e43684bde66963942f4&pid=1-s2.0-S2405959524000602-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142021020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-01DOI: 10.1016/j.icte.2024.04.011
Juneseok Bang , Sungpil Woo , Joohyung Lee
To address the accuracy degradation as well as prolonged convergence time due to the inherent data heterogeneity among end-devices in federated learning (FL), we introduce the joint batch size and weighted aggregation adjustment problem, which is non-convex problem. To adjust optimal hyperparameters, we develop deep reinforcement learning (DRL) to empower a mechanism known as Batch size and Weighted aggregation Adjustment (BWA). Experimental evaluation demonstrates that BWA not only outperforms methods optimized solely from either a local training or server perspective but also achieves higher accuracy, with an increase of up to 5.53% compared to FedAvg, and additionally accelerates convergence speeds.
{"title":"DRL-empowered joint batch size and weighted aggregation adjustment mechanism for federated learning on non-IID data","authors":"Juneseok Bang , Sungpil Woo , Joohyung Lee","doi":"10.1016/j.icte.2024.04.011","DOIUrl":"10.1016/j.icte.2024.04.011","url":null,"abstract":"<div><p>To address the accuracy degradation as well as prolonged convergence time due to the inherent data heterogeneity among end-devices in federated learning (FL), we introduce the joint batch size and weighted aggregation adjustment problem, which is non-convex problem. To adjust optimal hyperparameters, we develop deep reinforcement learning (DRL) to empower a mechanism known as Batch size and Weighted aggregation Adjustment (BWA). Experimental evaluation demonstrates that BWA not only outperforms methods optimized solely from either a local training or server perspective but also achieves higher accuracy, with an increase of up to 5.53% compared to FedAvg, and additionally accelerates convergence speeds.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 863-870"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000481/pdfft?md5=cbc73fea8316b49de9d580f917417c6c&pid=1-s2.0-S2405959524000481-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142021022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-01DOI: 10.1016/j.icte.2024.05.003
In this paper, we introduce new codes for the private information retrieval (PIR). The conventional Tian-Sun-Chen (TSC) scheme achieves PIR capacity under the perfect privacy conditions with the minimum message length. Based on the TSC scheme, weakly PIR (WPIR) schemes have been developed to benefit download costs by relaxing privacy. We show that the proposed scheme has lower download cost than the TSC scheme in the weak privacy setting. While our scheme is not capacity-achieving under perfect privacy, it has smaller message sizes compared with the TSC scheme.
本文介绍了用于私人信息检索(PIR)的新编码。传统的田舜臣(TSC)方案在完美隐私条件下以最小的信息长度实现了 PIR 容量。在 TSC 方案的基础上,开发了弱 PIR(WPIR)方案,通过放宽隐私条件来降低下载成本。我们的研究表明,在弱隐私设置下,我们提出的方案比 TSC 方案的下载成本更低。虽然我们的方案在完美隐私条件下无法实现容量,但与 TSC 方案相比,它的信息量更小。
{"title":"New private information retrieval codes for imperfect privacy","authors":"","doi":"10.1016/j.icte.2024.05.003","DOIUrl":"10.1016/j.icte.2024.05.003","url":null,"abstract":"<div><p>In this paper, we introduce new codes for the private information retrieval (PIR). The conventional Tian-Sun-Chen (TSC) scheme achieves PIR capacity under the perfect privacy conditions with the minimum message length. Based on the TSC scheme, weakly PIR (WPIR) schemes have been developed to benefit download costs by relaxing privacy. We show that the proposed scheme has lower download cost than the TSC scheme in the weak privacy setting. While our scheme is not capacity-achieving under perfect privacy, it has smaller message sizes compared with the TSC scheme.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 891-894"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000535/pdfft?md5=0e9729459e20853996a14bd00c099286&pid=1-s2.0-S2405959524000535-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141057335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-01DOI: 10.1016/j.icte.2024.04.006
Mobile learning allows for an interactive way of learning through devices like smartphones. However, current methods usually rely on pre-set situations and struggle to recognize new contexts when they come up during testing. To solve this, we suggest the Open-set Learning Context Recognition Model (OLCRM). This model uses data extracted from smartphone sensors to identify whether a learning context is known or unknown. It also uses a Dual Discriminator Generative Adversarial Network (DDGAN) to create high-quality fake examples, which helps improve the accuracy of recognizing contexts. Experimental results demonstrate the effectiveness of OLCRM in open-set learning context recognition problems.
{"title":"Open-set learning context recognizing in mobile learning: Problem and methodology","authors":"","doi":"10.1016/j.icte.2024.04.006","DOIUrl":"10.1016/j.icte.2024.04.006","url":null,"abstract":"<div><p>Mobile learning allows for an interactive way of learning through devices like smartphones. However, current methods usually rely on pre-set situations and struggle to recognize new contexts when they come up during testing. To solve this, we suggest the Open-set Learning Context Recognition Model (OLCRM). This model uses data extracted from smartphone sensors to identify whether a learning context is known or unknown. It also uses a Dual Discriminator Generative Adversarial Network (DDGAN) to create high-quality fake examples, which helps improve the accuracy of recognizing contexts. Experimental results demonstrate the effectiveness of OLCRM in open-set learning context recognition problems.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 909-915"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000432/pdfft?md5=eeb8e163c28d0144789f643d5b84cbd8&pid=1-s2.0-S2405959524000432-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140770935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-01DOI: 10.1016/j.icte.2024.06.002
This paper presents field experiment results that illustrate the impact of cross-link interference on the cell search procedure in a 5G time division duplex system. We initially show how cross-link interference affects to the cell search procedure from an analytic aspect. An example of an experimental result provided in this paper shows how the user equipment wrongly estimates the symbol timing offset due to cross-link interference. Furthermore, we propose a modified cell search algorithm which is robust against the strong influence of cross-link interference. The proposed modification efficiently suppresses the effects of cross-link interference by applying selective energy normalization to the correlation process. The experimental results show that the modified algorithm can accurately estimate the symbol timing offset with a negligible increment in computation time.
{"title":"Cross-link interference in the 5G cell search procedure: Observation and field experiments for mitigation","authors":"","doi":"10.1016/j.icte.2024.06.002","DOIUrl":"10.1016/j.icte.2024.06.002","url":null,"abstract":"<div><p>This paper presents field experiment results that illustrate the impact of cross-link interference on the cell search procedure in a 5G time division duplex system. We initially show how cross-link interference affects to the cell search procedure from an analytic aspect. An example of an experimental result provided in this paper shows how the user equipment wrongly estimates the symbol timing offset due to cross-link interference. Furthermore, we propose a modified cell search algorithm which is robust against the strong influence of cross-link interference. The proposed modification efficiently suppresses the effects of cross-link interference by applying selective energy normalization to the correlation process. The experimental results show that the modified algorithm can accurately estimate the symbol timing offset with a negligible increment in computation time.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 810-816"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000675/pdfft?md5=781bb14e0a8863a44606f0b4af10514f&pid=1-s2.0-S2405959524000675-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141402835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-01DOI: 10.1016/j.icte.2024.04.009
Donghyun Yu , Sinwoong Yun , Jemin Lee
As UWSN have received attention, a need for an efficient and secure communication protocol has arisen to overcome the low device performance, node failure, and high propagation latency. However, existing works are either specialized for one-to-one communication or cannot satisfy low latency constraints. Therefore, this work proposes a secure communication protocol with fine-grained access control for UWSN that support secure and efficient one-to-many communication and considers potential internal attackers for high security level. Specifically, we adopt lightweight ABE to achieve fine-grained access control at low cost, and introduce outsourced decryption to further alleviate the computational load of underwater sensors.
{"title":"Secure and efficient communications with fine-grained access control in underwater wireless sensor networks","authors":"Donghyun Yu , Sinwoong Yun , Jemin Lee","doi":"10.1016/j.icte.2024.04.009","DOIUrl":"10.1016/j.icte.2024.04.009","url":null,"abstract":"<div><p>As UWSN have received attention, a need for an efficient and secure communication protocol has arisen to overcome the low device performance, node failure, and high propagation latency. However, existing works are either specialized for one-to-one communication or cannot satisfy low latency constraints. Therefore, this work proposes a secure communication protocol with fine-grained access control for UWSN that support secure and efficient one-to-many communication and considers potential internal attackers for high security level. Specifically, we adopt lightweight ABE to achieve fine-grained access control at low cost, and introduce outsourced decryption to further alleviate the computational load of underwater sensors.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 851-856"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000468/pdfft?md5=c8e9226fb46ab40851b0785438cbd4a0&pid=1-s2.0-S2405959524000468-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142021021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}