Pub Date : 2024-10-01DOI: 10.1016/j.icte.2024.03.006
Most studies on symbol-level (SL) precoding have assumed that channel estimation is perfect. However, because interference signals or additive white Gaussian noise exist in the received signal for channel estimation, channel estimation errors always exist. In this paper, we propose an SL precoding scheme that is robust to channel estimation errors. First, using the characteristics of the channel estimation errors, we derive an equation for the worst-case mean squared error (MSE) which is the maximum of the MSE. Then by designing the SL precoding to minimize the worst-case MSE, it has robust characteristics against channel estimation errors.
{"title":"Symbol-level precoding scheme robust to channel estimation errors in wireless fading channels","authors":"","doi":"10.1016/j.icte.2024.03.006","DOIUrl":"10.1016/j.icte.2024.03.006","url":null,"abstract":"<div><div>Most studies on symbol-level (SL) precoding have assumed that channel estimation is perfect. However, because interference signals or additive white Gaussian noise exist in the received signal for channel estimation, channel estimation errors always exist. In this paper, we propose an SL precoding scheme that is robust to channel estimation errors. First, using the characteristics of the channel estimation errors, we derive an equation for the worst-case mean squared error (MSE) which is the maximum of the MSE. Then by designing the SL precoding to minimize the worst-case MSE, it has robust characteristics against channel estimation errors.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1066-1072"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140406462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-01DOI: 10.1016/j.icte.2024.04.008
Unmanned aerial vehicles (UAVs) and reconfigurable intelligent surfaces (RISs) have garnered considerable research interest in the fields of 5G and 6G wireless communication due to their remarkable flexibility and cost-effectiveness. However, the inherent openness of wireless communication environments renders these technologies vulnerable to eavesdropping. This paper presents a penalty-based successive convex approximation algorithm and a minorize–maximization algorithm to optimize the transmission beamforming vector, RIS beamforming vector, and UAV–RIS trajectory. The objective of this study was to enhance the physical layer security performance of wireless communication systems using UAVs and RISs. Our simulation results demonstrate that the proposed technique achieves a higher security transmission rate compared to existing techniques.
{"title":"Integrated beamforming and trajectory optimization algorithm for RIS-assisted UAV system","authors":"","doi":"10.1016/j.icte.2024.04.008","DOIUrl":"10.1016/j.icte.2024.04.008","url":null,"abstract":"<div><div>Unmanned aerial vehicles (UAVs) and reconfigurable intelligent surfaces (RISs) have garnered considerable research interest in the fields of 5G and 6G wireless communication due to their remarkable flexibility and cost-effectiveness. However, the inherent openness of wireless communication environments renders these technologies vulnerable to eavesdropping. This paper presents a penalty-based successive convex approximation algorithm and a minorize–maximization algorithm to optimize the transmission beamforming vector, RIS beamforming vector, and UAV–RIS trajectory. The objective of this study was to enhance the physical layer security performance of wireless communication systems using UAVs and RISs. Our simulation results demonstrate that the proposed technique achieves a higher security transmission rate compared to existing techniques.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1080-1086"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140762996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-01DOI: 10.1016/j.icte.2024.08.005
Han Seung Jang , Munseop Yun , Taehoon Kim , Inkyu Bang
In this article, we propose a non-orthogonal resource scheduling (NORS) scheme with an enhanced preamble detection (PD) method for cellular random access (RA) systems. The enhanced PD method is designed based on a deep learning technique that can classify three PD statuses: idle, collision-free, and collision. Because of this collision resolution capability, the base station (BS) can exploit radio resources non-orthogonally in contention-based RA protocols. In addition, we mathematically analyze the performance of our proposed NORS scheme in terms of RA success probability and resource utilization efficiency and conduct a comparison with the baseline orthogonal resource scheduling (ORS) scheme. Through simulations, we verify the validity of our mathematical analysis. As a result, our results will be a useful guideline for resource scheduling and provide support for massive connectivity.
在本文中,我们为蜂窝随机接入(RA)系统提出了一种具有增强型前导码检测(PD)方法的非正交资源调度(NORS)方案。增强型前导码检测方法是基于深度学习技术设计的,可对三种前导码状态进行分类:空闲、无碰撞和碰撞。由于这种碰撞解决能力,基站(BS)可以在基于竞争的 RA 协议中非正交地利用无线电资源。此外,我们还从 RA 成功概率和资源利用效率的角度对我们提出的 NORS 方案的性能进行了数学分析,并与基线正交资源调度(ORS)方案进行了比较。通过仿真,我们验证了数学分析的有效性。因此,我们的结果将为资源调度提供有用的指导,并为大规模连接提供支持。
{"title":"Non-orthogonal resource scheduling with enhanced preamble detection method for cellular random access networks","authors":"Han Seung Jang , Munseop Yun , Taehoon Kim , Inkyu Bang","doi":"10.1016/j.icte.2024.08.005","DOIUrl":"10.1016/j.icte.2024.08.005","url":null,"abstract":"<div><div>In this article, we propose a non-orthogonal resource scheduling (NORS) scheme with an enhanced preamble detection (PD) method for cellular random access (RA) systems. The enhanced PD method is designed based on a deep learning technique that can classify three PD statuses: idle, collision-free, and collision. Because of this collision resolution capability, the base station (BS) can exploit radio resources non-orthogonally in contention-based RA protocols. In addition, we mathematically analyze the performance of our proposed NORS scheme in terms of RA success probability and resource utilization efficiency and conduct a comparison with the baseline orthogonal resource scheduling (ORS) scheme. Through simulations, we verify the validity of our mathematical analysis. As a result, our results will be a useful guideline for resource scheduling and provide support for massive connectivity.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1117-1123"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-01DOI: 10.1016/j.icte.2024.03.004
Low earth orbit satellite (LEOS) communication has emerged as a promising technology to achieve global coverage, while further reducing the end-to-end latency by establishing communication link between LEOSs. In this paper, we analyze the performance of multi-hop LEOS network in terms of bit error rate (BER) and outage probability over mixed radio frequency (RF)/free space optical (FSO) links where RF link is used for the link between ground terminal and LEOS and FSO link is used for establishing inter-satellite links (ISLs). The derived closed-form results are confirmed via Monte Carlo simulations and we show the effect of the number of satellite hops on outage probability and average BER performance by comparing scenarios both with and without ISLs.
{"title":"Performance analysis of multi-hop low earth orbit satellite network over mixed RF/FSO links","authors":"","doi":"10.1016/j.icte.2024.03.004","DOIUrl":"10.1016/j.icte.2024.03.004","url":null,"abstract":"<div><div>Low earth orbit satellite (LEOS) communication has emerged as a promising technology to achieve global coverage, while further reducing the end-to-end latency by establishing communication link between LEOSs. In this paper, we analyze the performance of multi-hop LEOS network in terms of bit error rate (BER) and outage probability over mixed radio frequency (RF)/free space optical (FSO) links where RF link is used for the link between ground terminal and LEOS and FSO link is used for establishing inter-satellite links (ISLs). The derived closed-form results are confirmed via Monte Carlo simulations and we show the effect of the number of satellite hops on outage probability and average BER performance by comparing scenarios both with and without ISLs.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1051-1058"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140270121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-01DOI: 10.1016/j.icte.2024.04.003
The high-frequency band, crucial for supporting the 5G/6G system, faces challenges of signal obstruction by obstacles. This is attributed to significant path loss resulting from radio straightness and short radio distance. To address these challenges, there is a growing interest in leveraging non-terrestrial networks (NTNs) and reconfigurable intelligent surfaces (RISs), utilizing high-altitude satellites as base stations or terminals. Within a three-dimensional NTN system, the vulnerability of wireless signals to eavesdropping due to the open nature of the environment is a notable drawback. To mitigate this vulnerability, this paper introduces an algorithm designed to maximize the secrecy rate. The proposed algorithm optimizes security performance by fine-tuning the base station and RIS beamforming vectors. This optimization is achieved through successive convex approximation and minorization–maximization algorithms. Simulation results affirm the superiority of the proposed algorithm in terms of secrecy rate over existing techniques.
{"title":"RIS-aided double beamforming optimization algorithm for improving secrecy rate in space–ground integrated networks","authors":"","doi":"10.1016/j.icte.2024.04.003","DOIUrl":"10.1016/j.icte.2024.04.003","url":null,"abstract":"<div><div>The high-frequency band, crucial for supporting the 5G/6G system, faces challenges of signal obstruction by obstacles. This is attributed to significant path loss resulting from radio straightness and short radio distance. To address these challenges, there is a growing interest in leveraging non-terrestrial networks (NTNs) and reconfigurable intelligent surfaces (RISs), utilizing high-altitude satellites as base stations or terminals. Within a three-dimensional NTN system, the vulnerability of wireless signals to eavesdropping due to the open nature of the environment is a notable drawback. To mitigate this vulnerability, this paper introduces an algorithm designed to maximize the secrecy rate. The proposed algorithm optimizes security performance by fine-tuning the base station and RIS beamforming vectors. This optimization is achieved through successive convex approximation and minorization–maximization algorithms. Simulation results affirm the superiority of the proposed algorithm in terms of secrecy rate over existing techniques.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1073-1079"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140763047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-01DOI: 10.1016/j.icte.2024.08.008
Qi Chen, Ming Huang , JingJing Yang
The Radio Map (RM) stands as a powerful tool in wireless communication and radio regulation. Currently, several RM construction models based on Convolutional Neural Networks (CNNs) have been proposed. However, due to the inherent limitations of vanilla convolutions, capturing distant-range information of the radio propagation environment becomes challenge. Therefore, this letter introduces a novel RM construction model called Distant-range Content interaction Network (DC-Net) and validates its effectiveness using the RadioMapSeer dataset. Experiment results reveal that DC-Net achieves state-of-the-art performance in mapping accuracy for both known and unknown transmitter locations in RM construction.
{"title":"DC-Net: A Distant-range Content Interaction Network for Radio Map construction","authors":"Qi Chen, Ming Huang , JingJing Yang","doi":"10.1016/j.icte.2024.08.008","DOIUrl":"10.1016/j.icte.2024.08.008","url":null,"abstract":"<div><div>The Radio Map (RM) stands as a powerful tool in wireless communication and radio regulation. Currently, several RM construction models based on Convolutional Neural Networks (CNNs) have been proposed. However, due to the inherent limitations of vanilla convolutions, capturing distant-range information of the radio propagation environment becomes challenge. Therefore, this letter introduces a novel RM construction model called Distant-range Content interaction Network (DC-Net) and validates its effectiveness using the RadioMapSeer dataset. Experiment results reveal that DC-Net achieves state-of-the-art performance in mapping accuracy for both known and unknown transmitter locations in RM construction.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1145-1150"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-01DOI: 10.1016/j.icte.2024.07.005
Jihoon Moon , Maryam Bukhari , Chomyong Kim , Yunyoung Nam , Muazzam Maqsood , Seungmin Rho
This paper presents critical surveillance system functions and considers advances and challenges for privacy and ethical implications. We examine privacy protection strategies and responsible data management practices reflecting the critical problems of cybersecurity and data management to address concerns, ensuring that surveillance technology evolves ethically and sustainably. We highlight state-of-the-art deep learning-based techniques in object detection, addressing the complex difficulties of surveillance systems. Finally, we provide a research framework, including ethical and long-term implications and broad applications in privacy preservation and ethical responsibility. This study advances knowledge to ensure the long-term sustainability, security, and viability of information and communication technology applications.
{"title":"Object detection under the lens of privacy: A critical survey of methods, challenges, and future directions","authors":"Jihoon Moon , Maryam Bukhari , Chomyong Kim , Yunyoung Nam , Muazzam Maqsood , Seungmin Rho","doi":"10.1016/j.icte.2024.07.005","DOIUrl":"10.1016/j.icte.2024.07.005","url":null,"abstract":"<div><div>This paper presents critical surveillance system functions and considers advances and challenges for privacy and ethical implications. We examine privacy protection strategies and responsible data management practices reflecting the critical problems of cybersecurity and data management to address concerns, ensuring that surveillance technology evolves ethically and sustainably. We highlight state-of-the-art deep learning-based techniques in object detection, addressing the complex difficulties of surveillance systems. Finally, we provide a research framework, including ethical and long-term implications and broad applications in privacy preservation and ethical responsibility. This study advances knowledge to ensure the long-term sustainability, security, and viability of information and communication technology applications.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1124-1144"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-01DOI: 10.1016/j.icte.2024.07.009
Ahmad Akmal Aminuddin Mohd Kamal, Masaya Fujisawa
Herein, we present a secure multiplication method that uses secret sharing to solve the security problems presented by Watanabe et al. We implemented the characteristics of the exponent operation in which the product of two numbers with the same base (in this case, the primitive element) involves only the addition of their exponents. In contrast to typical secret sharing schemes, our proposed model requires two shares to be sent to each server simultaneously to achieve multiplication without increasing the number of servers required, thereby resulting in a lower cost of establishing a physical server. In addition, Shannon’s entropy function was used to describe the security of the proposed method. Finally, we evaluated our proposed method in terms of computational and communication costs.
{"title":"Improved protocols for secure multiplication using secret sharing scheme","authors":"Ahmad Akmal Aminuddin Mohd Kamal, Masaya Fujisawa","doi":"10.1016/j.icte.2024.07.009","DOIUrl":"10.1016/j.icte.2024.07.009","url":null,"abstract":"<div><div>Herein, we present a secure multiplication method that uses secret sharing to solve the security problems presented by Watanabe et al. We implemented the characteristics of the exponent operation in which the product of two numbers with the same base (in this case, the primitive element) involves only the addition of their exponents. In contrast to typical secret sharing schemes, our proposed model requires two shares to be sent to each server simultaneously to achieve multiplication without increasing the number of servers required, thereby resulting in a lower cost of establishing a physical server. In addition, Shannon’s entropy function was used to describe the security of the proposed method. Finally, we evaluated our proposed method in terms of computational and communication costs.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1019-1025"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-01DOI: 10.1016/j.icte.2024.07.006
Yeongho Park, Hyojin Lim, Yujae Song
We implement a prototype of the underwater optical wireless communication (UOWC) system, incorporating an adaptive optical beam alignment mechanism to ensure the seamless alignment of the optical beam between the transmitter and receiver. In this system, the transmitter, utilizing a laser diode as an optical source, leverages the camera’s object recognition capability to ascertain the position of the receiver, which may experience movement and shaking due to various external factors. However, the underwater condition poses challenges to camera visibility. To address this issue, a green light-emitting diode (LED) is installed on the receiver to make it easier for the transmitter to locate the position of the receiver within the camera image. The detected LED position is converted into angular data, enabling the operation of a servo motor to adjust the transmitter’s beam pointing, via a 2-axis servo motor pan–tilt system. Moreover, in the proposed UOWC prototype system, we employ the timer interrupt algorithm integrated with a real-time operating system and the direct register access method for general-purpose input/output on the NVIDIA Jetson Nano. This strategic combination facilitates the reduction of errors within the timer interval cycle between the transmitter and receiver, optimizing communication reliability through precise control of timer interrupts. To assess the system’s performance, extensive experimental tests are conducted in a large water tank.
{"title":"Design and implementation of underwater optical wireless communication prototype system supporting automatic beam alignment","authors":"Yeongho Park, Hyojin Lim, Yujae Song","doi":"10.1016/j.icte.2024.07.006","DOIUrl":"10.1016/j.icte.2024.07.006","url":null,"abstract":"<div><div>We implement a prototype of the underwater optical wireless communication (UOWC) system, incorporating an adaptive optical beam alignment mechanism to ensure the seamless alignment of the optical beam between the transmitter and receiver. In this system, the transmitter, utilizing a laser diode as an optical source, leverages the camera’s object recognition capability to ascertain the position of the receiver, which may experience movement and shaking due to various external factors. However, the underwater condition poses challenges to camera visibility. To address this issue, a green light-emitting diode (LED) is installed on the receiver to make it easier for the transmitter to locate the position of the receiver within the camera image. The detected LED position is converted into angular data, enabling the operation of a servo motor to adjust the transmitter’s beam pointing, via a 2-axis servo motor pan–tilt system. Moreover, in the proposed UOWC prototype system, we employ the timer interrupt algorithm integrated with a real-time operating system and the direct register access method for general-purpose input/output on the NVIDIA Jetson Nano. This strategic combination facilitates the reduction of errors within the timer interval cycle between the transmitter and receiver, optimizing communication reliability through precise control of timer interrupts. To assess the system’s performance, extensive experimental tests are conducted in a large water tank.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1034-1042"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-01DOI: 10.1016/j.icte.2024.06.005
Chathuranga M. Wijerathna Basnayaka, Dushantha Nalin K. Jayakody, Marko Beko
The Age-of-Information (AoI) metric has emerged as a performance measurement metric for evaluating time-sensitive wireless communications systems. Maintaining the freshness and reliability of data is critical in time-critical wireless networks, where outdated information can have significant consequences. Moreover, short packet transmissions are used in wireless sensor networks (WSNs) to maintain energy efficiency and low latency. This paper proposes a theoretical model that utilizes the AoI metric and finite block length information theory to estimate information freshness in an unmanned aerial vehicle (UAV)-assisted WSN. This network includes multiple sensing nodes and relies on short-packet communication for transmission. In this paper, closed-form expressions for average AoI (AAoI) and the block error rate are derived. Furthermore, the optimal altitude and block length that ensures the freshness of received information at the destination is determined. The results of the analysis provide valuable insights into the performance characteristics of UAV-assisted WSNs and have important implications for the design and optimization of such systems.
{"title":"Freshness-in-air: An AoI-inspired UAV-assisted wireless sensor networks","authors":"Chathuranga M. Wijerathna Basnayaka, Dushantha Nalin K. Jayakody, Marko Beko","doi":"10.1016/j.icte.2024.06.005","DOIUrl":"10.1016/j.icte.2024.06.005","url":null,"abstract":"<div><div>The Age-of-Information (AoI) metric has emerged as a performance measurement metric for evaluating time-sensitive wireless communications systems. Maintaining the freshness and reliability of data is critical in time-critical wireless networks, where outdated information can have significant consequences. Moreover, short packet transmissions are used in wireless sensor networks (WSNs) to maintain energy efficiency and low latency. This paper proposes a theoretical model that utilizes the AoI metric and finite block length information theory to estimate information freshness in an unmanned aerial vehicle (UAV)-assisted WSN. This network includes multiple sensing nodes and relies on short-packet communication for transmission. In this paper, closed-form expressions for average AoI (AAoI) and the block error rate are derived. Furthermore, the optimal altitude and block length that ensures the freshness of received information at the destination is determined. The results of the analysis provide valuable insights into the performance characteristics of UAV-assisted WSNs and have important implications for the design and optimization of such systems.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1103-1109"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141691213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}