首页 > 最新文献

Digital Communications and Networks最新文献

英文 中文
A new centrality measure based on neighbor loop structure for network dismantling 一种新的基于邻居环结构的网络拆解中心性测度
IF 7.9 2区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.1016/j.dcan.2022.09.016
Qingxia Liu , Bang Wang , Jiming Qi , Xianjun Deng

Nearly all real-world networks are complex networks and usually are in danger of collapse. Therefore, it is crucial to exploit and understand the mechanisms of network attacks and provide better protection for network functionalities. Network dismantling aims to find the smallest set of nodes such that after their removal the network is broken into connected components of sub-extensive size. To overcome the limitations and drawbacks of existing network dismantling methods, this paper focuses on network dismantling problem and proposes a neighbor-loop structure based centrality metric, NL, which achieves a balance between computational efficiency and evaluation accuracy. In addition, we design a novel method combining NL-based nodes-removing, greedy tree-breaking and reinsertion. Moreover, we compare five baseline methods with our algorithm on ten widely used real-world networks and three types of model networks including Erdös-Rényi random networks, Watts-Strogatz small-world networks and Barabási-Albert scale-free networks with different network generation parameters. Experimental results demonstrate that our proposed method outperforms most peer methods by obtaining a minimal set of targeted attack nodes. Furthermore, the insights gained from this study may be of assistance to future practical research into real-world networks.

几乎所有现实世界的网络都是复杂的网络,通常都有崩溃的危险。因此,利用和了解网络攻击机制并为网络功能提供更好的保护至关重要。网络拆解的目的是找到最小的节点集,以便在移除这些节点后,网络被分解成大小近似的连接组件。为了克服现有网络拆解方法的局限性和弊端,本文聚焦于网络拆解问题,提出了一种基于邻环结构的中心度量--NL,在计算效率和评估精度之间实现了平衡。此外,我们还设计了一种新方法,将基于 NL 的节点移除、贪婪破树和重新插入相结合。此外,我们还在十个广泛应用的真实世界网络和三种模型网络(包括 Erdös-Rényi 随机网络、Watts-Strogatz 小世界网络和具有不同网络生成参数的 Barabási-Albert 无标度网络)上比较了五种基准方法和我们的算法。实验结果表明,我们提出的方法能获得最小的目标攻击节点集,因此优于大多数同行方法。此外,从本研究中获得的见解可能有助于未来对真实世界网络的实际研究。
{"title":"A new centrality measure based on neighbor loop structure for network dismantling","authors":"Qingxia Liu ,&nbsp;Bang Wang ,&nbsp;Jiming Qi ,&nbsp;Xianjun Deng","doi":"10.1016/j.dcan.2022.09.016","DOIUrl":"10.1016/j.dcan.2022.09.016","url":null,"abstract":"<div><p>Nearly all real-world networks are complex networks and usually are in danger of collapse. Therefore, it is crucial to exploit and understand the mechanisms of network attacks and provide better protection for network functionalities. Network dismantling aims to find the smallest set of nodes such that after their removal the network is broken into connected components of sub-extensive size. To overcome the limitations and drawbacks of existing network dismantling methods, this paper focuses on network dismantling problem and proposes a neighbor-loop structure based centrality metric, NL, which achieves a balance between computational efficiency and evaluation accuracy. In addition, we design a novel method combining NL-based nodes-removing, greedy tree-breaking and reinsertion. Moreover, we compare five baseline methods with our algorithm on ten widely used real-world networks and three types of model networks including Erdös-Rényi random networks, Watts-Strogatz small-world networks and Barabási-Albert scale-free networks with different network generation parameters. Experimental results demonstrate that our proposed method outperforms most peer methods by obtaining a minimal set of targeted attack nodes. Furthermore, the insights gained from this study may be of assistance to future practical research into real-world networks.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822001912/pdfft?md5=9b3045bde73e9d3f8278960f267b5e51&pid=1-s2.0-S2352864822001912-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43424660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deployment optimization for target perpetual coverage in energy harvesting wireless sensor network 能量采集无线传感器网络中目标永久覆盖的部署优化
IF 7.9 2区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.1016/j.dcan.2023.02.009
Zhenkun Jin , Yixuan Geng , Chenlu Zhu , Yunzhi Xia , Xianjun Deng , Lingzhi Yi , Xianlan Wang

Energy limitation of traditional Wireless Sensor Networks (WSNs) greatly confines the network lifetime due to generating and processing massive sensing data with a limited battery. The energy harvesting WSN is a novel network architecture to address the limitation of traditional WSN. However, existing coverage and deployment schemes neglect the environmental correlation of sensor nodes and external energy with respect to physical space. Comprehensively considering the spatial correlation of the environment and the uneven distribution of energy in energy harvesting WSN, we investigate how to deploy a collection of sensor nodes to save the deployment cost while ensuring the target perpetual coverage. The Confident Information Coverage (CIC) model is adopted to formulate the CIC Minimum Deployment Cost Target Perpetual Coverage (CICMTP) problem to minimize the deployed sensor nodes. As the CICMTP is NP-hard, we devise two approximation algorithms named Local Greedy Threshold Algorithm based on CIC (LGTA-CIC) and Overall Greedy Search Algorithm based on CIC (OGSA-CIC). The LGTA-CIC has a low time complexity and the OGSA-CIC has a better approximation rate. Extensive simulation results demonstrate that the OGSA-CIC is able to achieve lower deployment cost and the performance of the proposed algorithms outperforms GRNP, TPNP and EENP algorithms.

传统无线传感器网络(WSN)的能量限制极大地限制了网络的使用寿命,因为要使用有限的电池生成和处理大量传感数据。能量收集 WSN 是一种新型网络架构,可解决传统 WSN 的局限性。然而,现有的覆盖和部署方案忽视了传感器节点和外部能量与物理空间的环境相关性。综合考虑能量收集 WSN 中环境的空间相关性和能量的不均匀分布,我们研究了如何部署传感器节点集合,以节省部署成本,同时确保目标的永久覆盖。我们采用可信信息覆盖(CIC)模型来提出 CIC 最小部署成本目标永久覆盖(CICMTP)问题,以最小化部署的传感器节点。由于 CICMTP 是 NP 难问题,我们设计了两种近似算法,即基于 CIC 的局部贪婪阈值算法(LGTA-CIC)和基于 CIC 的整体贪婪搜索算法(OGSA-CIC)。LGTA-CIC 的时间复杂度较低,而 OGSA-CIC 的近似率较高。大量仿真结果表明,OGSA-CIC 能够实现更低的部署成本,而且所提算法的性能优于 GRNP、TPNP 和 EENP 算法。
{"title":"Deployment optimization for target perpetual coverage in energy harvesting wireless sensor network","authors":"Zhenkun Jin ,&nbsp;Yixuan Geng ,&nbsp;Chenlu Zhu ,&nbsp;Yunzhi Xia ,&nbsp;Xianjun Deng ,&nbsp;Lingzhi Yi ,&nbsp;Xianlan Wang","doi":"10.1016/j.dcan.2023.02.009","DOIUrl":"10.1016/j.dcan.2023.02.009","url":null,"abstract":"<div><p>Energy limitation of traditional Wireless Sensor Networks (WSNs) greatly confines the network lifetime due to generating and processing massive sensing data with a limited battery. The energy harvesting WSN is a novel network architecture to address the limitation of traditional WSN. However, existing coverage and deployment schemes neglect the environmental correlation of sensor nodes and external energy with respect to physical space. Comprehensively considering the spatial correlation of the environment and the uneven distribution of energy in energy harvesting WSN, we investigate how to deploy a collection of sensor nodes to save the deployment cost while ensuring the target perpetual coverage. The Confident Information Coverage (CIC) model is adopted to formulate the CIC Minimum Deployment Cost Target Perpetual Coverage (CICMTP) problem to minimize the deployed sensor nodes. As the CICMTP is NP-hard, we devise two approximation algorithms named Local Greedy Threshold Algorithm based on CIC (LGTA-CIC) and Overall Greedy Search Algorithm based on CIC (OGSA-CIC). The LGTA-CIC has a low time complexity and the OGSA-CIC has a better approximation rate. Extensive simulation results demonstrate that the OGSA-CIC is able to achieve lower deployment cost and the performance of the proposed algorithms outperforms GRNP, TPNP and EENP algorithms.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864823000445/pdfft?md5=77d790869eceee0f4258a4afc2cddfc5&pid=1-s2.0-S2352864823000445-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45002793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interworking between Modbus and internet of things platform for industrial services Modbus与工业服务物联网平台的互通
IF 7.9 2区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.1016/j.dcan.2022.09.013
Sherzod Elamanov , Hyeonseo Son , Bob Flynn , Seong Ki Yoo , Naqqash Dilshad , JaeSeung Song

In the era of rapid development of Internet of Things (IoT), numerous machine-to-machine technologies have been applied to the industrial domain. Due to the divergence of IoT solutions, the industry is faced with a need to apply various technologies for automation and control. This fact leads to a demand for an establishing interworking mechanism which would allow smooth interoperability between heterogeneous devices. One of the major protocols widely used today in industrial electronic devices is Modbus. However, data generated by Modbus devices cannot be understood by IoT applications using different protocols, so it should be applied in a couple with an IoT service layer platform. oneM2M, a global IoT standard, can play the role of interconnecting various protocols, as it provides flexible tools suitable for building an interworking framework for industrial services. Therefore, in this paper, we propose an interworking architecture between devices working on the Modbus protocol and an IoT platform implemented based on oneM2M standards. In the proposed architecture, we introduce the way to model Modbus data as oneM2M resources, rules to map them to each other, procedures required to establish interoperable communication, and optimization methods for this architecture. We analyze our solution and provide an evaluation by implementing it based on a solar power management use case. The results demonstrate that our model is feasible and can be applied to real case scenarios.

在物联网(IoT)飞速发展的时代,众多机器对机器技术被应用于工业领域。由于物联网解决方案多种多样,工业领域需要应用各种技术来实现自动化和控制。这就需要建立一种互通机制,使异构设备之间能够顺利实现互操作。如今,Modbus 是工业电子设备中广泛使用的主要协议之一。然而,使用不同协议的物联网应用无法理解 Modbus 设备生成的数据,因此应将其与物联网服务层平台结合起来使用。因此,我们在本文中提出了一种基于 Modbus 协议的设备与基于 oneM2M 标准的物联网平台之间的互通架构。在提议的架构中,我们介绍了将 Modbus 数据建模为 oneM2M 资源的方法、将它们相互映射的规则、建立可互操作通信所需的程序以及该架构的优化方法。我们分析了我们的解决方案,并通过基于太阳能电源管理用例的实施进行了评估。结果表明,我们的模型是可行的,并可应用于实际场景。
{"title":"Interworking between Modbus and internet of things platform for industrial services","authors":"Sherzod Elamanov ,&nbsp;Hyeonseo Son ,&nbsp;Bob Flynn ,&nbsp;Seong Ki Yoo ,&nbsp;Naqqash Dilshad ,&nbsp;JaeSeung Song","doi":"10.1016/j.dcan.2022.09.013","DOIUrl":"10.1016/j.dcan.2022.09.013","url":null,"abstract":"<div><p>In the era of rapid development of Internet of Things (IoT), numerous machine-to-machine technologies have been applied to the industrial domain. Due to the divergence of IoT solutions, the industry is faced with a need to apply various technologies for automation and control. This fact leads to a demand for an establishing interworking mechanism which would allow smooth interoperability between heterogeneous devices. One of the major protocols widely used today in industrial electronic devices is Modbus. However, data generated by Modbus devices cannot be understood by IoT applications using different protocols, so it should be applied in a couple with an IoT service layer platform. oneM2M, a global IoT standard, can play the role of interconnecting various protocols, as it provides flexible tools suitable for building an interworking framework for industrial services. Therefore, in this paper, we propose an interworking architecture between devices working on the Modbus protocol and an IoT platform implemented based on oneM2M standards. In the proposed architecture, we introduce the way to model Modbus data as oneM2M resources, rules to map them to each other, procedures required to establish interoperable communication, and optimization methods for this architecture. We analyze our solution and provide an evaluation by implementing it based on a solar power management use case. The results demonstrate that our model is feasible and can be applied to real case scenarios.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822001882/pdfft?md5=7b7bc845989426f1fb38bc11af73c0a8&pid=1-s2.0-S2352864822001882-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47474133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data complexity-based batch sanitization method against poison in distributed learning 分布式学习中基于数据复杂性的批量杀毒方法
IF 7.9 2区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.1016/j.dcan.2022.12.001
Silv Wang , Kai Fan , Kuan Zhang , Hui Li , Yintang Yang

The security of Federated Learning (FL)/Distributed Machine Learning (DML) is gravely threatened by data poisoning attacks, which destroy the usability of the model by contaminating training samples, so such attacks are called causative availability indiscriminate attacks. Facing the problem that existing data sanitization methods are hard to apply to real-time applications due to their tedious process and heavy computations, we propose a new supervised batch detection method for poison, which can fleetly sanitize the training dataset before the local model training. We design a training dataset generation method that helps to enhance accuracy and uses data complexity features to train a detection model, which will be used in an efficient batch hierarchical detection process. Our model stockpiles knowledge about poison, which can be expanded by retraining to adapt to new attacks. Being neither attack-specific nor scenario-specific, our method is applicable to FL/DML or other online or offline scenarios.

联邦学习(FL)/分布式机器学习(DML)的安全性受到数据中毒攻击的严重威胁,这种攻击通过污染训练样本来破坏模型的可用性,因此这种攻击被称为因果可用性无差别攻击。面对现有的数据净化方法由于过程繁琐、计算量大而难以应用于实时应用的问题,我们提出了一种新的监督批量检测中毒方法,它可以在本地模型训练之前对训练数据集进行快速净化。我们设计了一种有助于提高准确性的训练数据集生成方法,并利用数据复杂性特征来训练检测模型,该模型将用于高效的批量分级检测过程。我们的模型储备了有关毒物的知识,可以通过再训练进行扩展,以适应新的攻击。我们的方法既不针对特定攻击,也不针对特定场景,因此适用于 FL/DML 或其他在线或离线场景。
{"title":"Data complexity-based batch sanitization method against poison in distributed learning","authors":"Silv Wang ,&nbsp;Kai Fan ,&nbsp;Kuan Zhang ,&nbsp;Hui Li ,&nbsp;Yintang Yang","doi":"10.1016/j.dcan.2022.12.001","DOIUrl":"10.1016/j.dcan.2022.12.001","url":null,"abstract":"<div><p>The security of Federated Learning (FL)/Distributed Machine Learning (DML) is gravely threatened by data poisoning attacks, which destroy the usability of the model by contaminating training samples, so such attacks are called causative availability indiscriminate attacks. Facing the problem that existing data sanitization methods are hard to apply to real-time applications due to their tedious process and heavy computations, we propose a new supervised batch detection method for poison, which can fleetly sanitize the training dataset before the local model training. We design a training dataset generation method that helps to enhance accuracy and uses data complexity features to train a detection model, which will be used in an efficient batch hierarchical detection process. Our model stockpiles knowledge about poison, which can be expanded by retraining to adapt to new attacks. Being neither attack-specific nor scenario-specific, our method is applicable to FL/DML or other online or offline scenarios.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822002607/pdfft?md5=b0b1a2d02d1b0851d0a0b9f510f11541&pid=1-s2.0-S2352864822002607-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45039010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Suitability of SDN and MEC to facilitate digital twin communication over LTE-A SDN和MEC在LTE-A上促进数字孪生通信的适用性
IF 7.9 2区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.1016/j.dcan.2023.05.008
Hikmat Adhami , Mohammad Alja'afreh , Mohamed Hoda , Jiaqi Zhao , Yong Zhou , Abdulmotaleb El Saddik

Haptic is the modality that complements traditional multimedia, i.e., audiovisual, to evolve the next wave of innovation at which the Internet data stream can be exchanged to enable remote skills and control applications. This will require ultra-low latency and ultra-high reliability to evolve the mobile experience into the era of Digital Twin and Tactile Internet. While the 5th generation of mobile networks is not yet widely deployed, Long-Term Evolution (LTE-A) latency remains much higher than the 1 ms requirement for the Tactile Internet and therefore the Digital Twin. This work investigates an interesting solution based on the incorporation of Software-defined networking (SDN) and Multi-access Mobile Edge Computing (MEC) technologies in an LTE-A network, to deliver future multimedia applications over the Tactile Internet while overcoming the QoS challenges. Several network scenarios were designed and simulated using Riverbed modeler and the performance was evaluated using several time-related Key Performance Indicators (KPIs) such as throughput, End-2-End (E2E) delay, and jitter. The best scenario possible is clearly the one integrating MEC and SDN approaches, where the overall delay, jitter, and throughput for haptics- attained 2 ms, 0.01 ms, and 1000 packets per second. The results obtained give clear evidence that the integration of, both SDN and MEC, in LTE-A indicates performance improvement, and fulfills the standard requirements in terms of the above KPIs, for realizing a Digital Twin/Tactile Internet-based system.

触觉是对传统多媒体(即视听)的一种补充方式,可推动下一波创新浪潮,在这一浪潮中,互联网数据流可进行交换,以实现远程技能和控制应用。这将需要超低延迟和超高可靠性,以便将移动体验发展到数字孪生和触觉互联网时代。虽然第五代移动网络尚未广泛部署,但长期演进(LTE-A)的延迟仍然远远高于触觉互联网和数字孪生的 1 毫秒要求。这项工作研究了一种有趣的解决方案,它将软件定义网络(SDN)和多接入移动边缘计算(MEC)技术结合到 LTE-A 网络中,通过触觉互联网提供未来的多媒体应用,同时克服 QoS 挑战。使用 Riverbed modeler 设计和模拟了几种网络方案,并使用吞吐量、端到端(E2E)延迟和抖动等几个与时间相关的关键性能指标(KPI)对性能进行了评估。最佳方案显然是集成了 MEC 和 SDN 方法的方案,在该方案中,触觉的总体延迟、抖动和吞吐量分别达到了 2 毫秒、0.01 毫秒和每秒 1000 个数据包。所获得的结果清楚地表明,在 LTE-A 中集成 SDN 和 MEC 不仅能提高性能,还能满足上述关键绩效指标的标准要求,从而实现基于数字孪生/触觉互联网的系统。
{"title":"Suitability of SDN and MEC to facilitate digital twin communication over LTE-A","authors":"Hikmat Adhami ,&nbsp;Mohammad Alja'afreh ,&nbsp;Mohamed Hoda ,&nbsp;Jiaqi Zhao ,&nbsp;Yong Zhou ,&nbsp;Abdulmotaleb El Saddik","doi":"10.1016/j.dcan.2023.05.008","DOIUrl":"10.1016/j.dcan.2023.05.008","url":null,"abstract":"<div><p>Haptic is the modality that complements traditional multimedia, i.e., audiovisual, to evolve the next wave of innovation at which the Internet data stream can be exchanged to enable remote skills and control applications. This will require ultra-low latency and ultra-high reliability to evolve the mobile experience into the era of Digital Twin and Tactile Internet. While the 5th generation of mobile networks is not yet widely deployed, Long-Term Evolution (LTE-A) latency remains much higher than the 1 ms requirement for the Tactile Internet and therefore the Digital Twin. This work investigates an interesting solution based on the incorporation of Software-defined networking (SDN) and Multi-access Mobile Edge Computing (MEC) technologies in an LTE-A network, to deliver future multimedia applications over the Tactile Internet while overcoming the QoS challenges. Several network scenarios were designed and simulated using Riverbed modeler and the performance was evaluated using several time-related Key Performance Indicators (KPIs) such as throughput, End-2-End (E2E) delay, and jitter. The best scenario possible is clearly the one integrating MEC and SDN approaches, where the overall delay, jitter, and throughput for haptics- attained 2 ms, 0.01 ms, and 1000 packets per second. The results obtained give clear evidence that the integration of, both SDN and MEC, in LTE-A indicates performance improvement, and fulfills the standard requirements in terms of the above KPIs, for realizing a Digital Twin/Tactile Internet-based system.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864823000901/pdfft?md5=f6a361c56c1093f348b397bad032df15&pid=1-s2.0-S2352864823000901-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45726812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A CSMA/CA based MAC protocol for hybrid Power-line/Visible-light communication networks: Design and analysis 基于CSMA/CA的电力线/可见光通信混合网络MAC协议:设计与分析
IF 7.9 2区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.1016/j.dcan.2022.09.019
Sheng Hao , Huyin Zhang , Fei Yang , Chenghao Li , Jing Wang

Hybrid Power-line/Visible-light Communication (HPVC) network has been one of the most promising Cooperative Communication (CC) technologies for constructing Smart Home due to its superior communication reliability and hardware efficiency. Current research on HPVC networks focuses on the performance analysis and optimization of the Physical (PHY) layer, where the Power Line Communication (PLC) component only serves as the backbone to provide power to light Emitting Diode (LED) devices. So designing a Media Access Control(MAC) protocol remains a great challenge because it allows both PLC and Visible Light Communication (VLC) components to operate data transmission, i.e., to achieve a true HPVC network CC. To solve this problem, we propose a new HPC network MAC protocol (HPVC MAC) based on Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) by combining IEEE 802.15.7 and IEEE 1901 standards. Firstly, we add an Additional Assistance (AA) layer to provide the channel selection strategies for sensor stations, so that they can complete data transmission on the selected channel via the specified CSMA/CA mechanism, respectively. Based on this, we give a detailed working principle of the HPVC MAC, followed by the construction of a joint analytical model for mathematical-mathematical validation of the HPVC MAC. In the modeling process, the impacts of PHY layer settings (including channel fading types and additive noise feature), CSMA/CA mechanisms of 802.15.7 and 1901, and practical configurations (such as traffic rate, transit buffer size) are comprehensively taken into consideration. Moreover, we prove the proposed analytical model has the solvability. Finally, through extensive simulations, we characterize the HPVC MAC performance under different system parameters and verify the correctness of the corresponding analytical model with an average error rate of 4.62% between the simulation and analytical results.

电力线/可视光混合通信(HPVC)网络因其卓越的通信可靠性和硬件效率,已成为构建智能家居最有前途的合作通信(CC)技术之一。目前对HPVC网络的研究主要集中在物理层(PHY)的性能分析和优化上,其中电力线通信(PLC)组件仅作为骨干网为发光二极管(LED)设备供电。因此,设计一个媒体访问控制(MAC)协议仍然是一个巨大的挑战,因为它允许PLC和可见光通信(VLC)组件同时进行数据传输,即实现真正的HPVC网络CC。为解决这一问题,我们结合 IEEE 802.15.7 和 IEEE 1901 标准,提出了一种基于载波侦测多路访问/碰撞避免(CSMA/CA)的新型 HPC 网络 MAC 协议(HPVC MAC)。首先,我们增加了一个附加辅助层(AA),为传感器站提供信道选择策略,使它们能分别通过指定的 CSMA/CA 机制在选定的信道上完成数据传输。在此基础上,我们给出了 HPVC MAC 的详细工作原理,随后构建了一个联合分析模型,对 HPVC MAC 进行数学计算验证。在建模过程中,我们综合考虑了 PHY 层设置(包括信道衰落类型和加性噪声特征)、802.15.7 和 1901 的 CSMA/CA 机制以及实际配置(如流量速率、传输缓冲区大小)的影响。此外,我们还证明了所提出的分析模型具有可解性。最后,通过大量仿真,我们描述了不同系统参数下 HPVC MAC 的性能,并验证了相应分析模型的正确性,仿真结果与分析结果之间的平均误差率为 4.62%。
{"title":"A CSMA/CA based MAC protocol for hybrid Power-line/Visible-light communication networks: Design and analysis","authors":"Sheng Hao ,&nbsp;Huyin Zhang ,&nbsp;Fei Yang ,&nbsp;Chenghao Li ,&nbsp;Jing Wang","doi":"10.1016/j.dcan.2022.09.019","DOIUrl":"10.1016/j.dcan.2022.09.019","url":null,"abstract":"<div><p>Hybrid Power-line/Visible-light Communication (HPVC) network has been one of the most promising Cooperative Communication (CC) technologies for constructing Smart Home due to its superior communication reliability and hardware efficiency. Current research on HPVC networks focuses on the performance analysis and optimization of the Physical (PHY) layer, where the Power Line Communication (PLC) component only serves as the backbone to provide power to light Emitting Diode (LED) devices. So designing a Media Access Control(MAC) protocol remains a great challenge because it allows both PLC and Visible Light Communication (VLC) components to operate data transmission, i.e., to achieve a true HPVC network CC. To solve this problem, we propose a new HPC network MAC protocol (HPVC MAC) based on Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) by combining IEEE 802.15.7 and IEEE 1901 standards. Firstly, we add an Additional Assistance (AA) layer to provide the channel selection strategies for sensor stations, so that they can complete data transmission on the selected channel via the specified CSMA/CA mechanism, respectively. Based on this, we give a detailed working principle of the HPVC MAC, followed by the construction of a joint analytical model for mathematical-mathematical validation of the HPVC MAC. In the modeling process, the impacts of PHY layer settings (including channel fading types and additive noise feature), CSMA/CA mechanisms of 802.15.7 and 1901, and practical configurations (such as traffic rate, transit buffer size) are comprehensively taken into consideration. Moreover, we prove the proposed analytical model has the solvability. Finally, through extensive simulations, we characterize the HPVC MAC performance under different system parameters and verify the correctness of the corresponding analytical model with an average error rate of 4.62% between the simulation and analytical results.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822001948/pdfft?md5=f1275ccd9e7ba1464988da36bec591da&pid=1-s2.0-S2352864822001948-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41659590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A digital twins enabled underwater intelligent internet vehicle path planning system via reinforcement learning and edge computing 基于强化学习和边缘计算的水下智能互联网车辆路径规划系统
IF 7.9 2区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.1016/j.dcan.2022.05.005
Jiachen Yang , Meng Xi , Jiabao Wen , Yang Li , Houbing Herbert Song

The Autonomous Underwater Glider (AUG) is a kind of prevailing underwater intelligent internet vehicle and occupies a dominant position in industrial applications, in which path planning is an essential problem. Due to the complexity and variability of the ocean, accurate environment modeling and flexible path planning algorithms are pivotal challenges. The traditional models mainly utilize mathematical functions, which are not complete and reliable. Most existing path planning algorithms depend on the environment and lack flexibility. To overcome these challenges, we propose a path planning system for underwater intelligent internet vehicles. It applies digital twins and sensor data to map the real ocean environment to a virtual digital space, which provides a comprehensive and reliable environment for path simulation. We design a value-based reinforcement learning path planning algorithm and explore the optimal network structure parameters. The path simulation is controlled by a closed-loop model integrated into the terminal vehicle through edge computing. The integration of state input enriches the learning of neural networks and helps to improve generalization and flexibility. The task-related reward function promotes the rapid convergence of the training. The experimental results prove that our reinforcement learning based path planning algorithm has great flexibility and can effectively adapt to a variety of different ocean conditions.

自主水下滑翔机(AUG)是一种盛行的水下智能网联飞行器,在工业应用中占据主导地位,其中路径规划是一个基本问题。由于海洋的复杂性和多变性,精确的环境建模和灵活的路径规划算法成为关键挑战。传统模型主要利用数学函数,不够完整可靠。现有的路径规划算法大多依赖于环境,缺乏灵活性。为了克服这些挑战,我们提出了水下智能网联汽车路径规划系统。它应用数字孪生和传感器数据,将真实海洋环境映射到虚拟数字空间,为路径模拟提供了全面可靠的环境。我们设计了一种基于价值强化学习的路径规划算法,并探索了最优网络结构参数。通过边缘计算将闭环模型集成到终端飞行器中,对路径模拟进行控制。状态输入的集成丰富了神经网络的学习,有助于提高泛化和灵活性。与任务相关的奖励函数促进了训练的快速收敛。实验结果证明,我们基于强化学习的路径规划算法具有极大的灵活性,能够有效适应各种不同的海洋条件。
{"title":"A digital twins enabled underwater intelligent internet vehicle path planning system via reinforcement learning and edge computing","authors":"Jiachen Yang ,&nbsp;Meng Xi ,&nbsp;Jiabao Wen ,&nbsp;Yang Li ,&nbsp;Houbing Herbert Song","doi":"10.1016/j.dcan.2022.05.005","DOIUrl":"10.1016/j.dcan.2022.05.005","url":null,"abstract":"<div><p>The Autonomous Underwater Glider (AUG) is a kind of prevailing underwater intelligent internet vehicle and occupies a dominant position in industrial applications, in which path planning is an essential problem. Due to the complexity and variability of the ocean, accurate environment modeling and flexible path planning algorithms are pivotal challenges. The traditional models mainly utilize mathematical functions, which are not complete and reliable. Most existing path planning algorithms depend on the environment and lack flexibility. To overcome these challenges, we propose a path planning system for underwater intelligent internet vehicles. It applies digital twins and sensor data to map the real ocean environment to a virtual digital space, which provides a comprehensive and reliable environment for path simulation. We design a value-based reinforcement learning path planning algorithm and explore the optimal network structure parameters. The path simulation is controlled by a closed-loop model integrated into the terminal vehicle through edge computing. The integration of state input enriches the learning of neural networks and helps to improve generalization and flexibility. The task-related reward function promotes the rapid convergence of the training. The experimental results prove that our reinforcement learning based path planning algorithm has great flexibility and can effectively adapt to a variety of different ocean conditions.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822000967/pdfft?md5=6d47224900e557afd8fc3eeadffa37f3&pid=1-s2.0-S2352864822000967-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41779848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blockchain-empowered authentication scheme for worm detection in wireless sensor network 无线传感器网络中基于区块链的蠕虫检测认证方案
IF 7.9 2区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.1016/j.dcan.2022.04.007
Yuling Chen , Xiong Yang , Tao Li , Yi Ren , Yangyang Long

Wireless Sensor Network (WSN) is a distributed sensor network composed a large number of nodes with low cost, low performance and self-management. The special structure of WSN brings both convenience and vulnerability. For example, a malicious participant can launch attacks by capturing a physical device. Therefore, node authentication that can resist malicious attacks is very important to network security. Recently, blockchain technology has shown the potential to enhance the security of the Internet of Things (IoT). In this paper, we propose a Blockchain-empowered Authentication Scheme (BAS) for WSN. In our scheme, all nodes are managed by utilizing the identity information stored on the blockchain. Besides, the simulation experiment about worm detection is executed on BAS, and the security is evaluated from detection and infection rate. The experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network.

无线传感器网络(WSN)是一种由大量节点组成的分布式传感器网络,具有成本低、性能好、可自我管理等特点。WSN 的特殊结构既带来了便利,也带来了脆弱性。例如,恶意参与者可以通过捕获物理设备发动攻击。因此,能够抵御恶意攻击的节点认证对网络安全非常重要。最近,区块链技术显示出增强物联网安全性的潜力。在本文中,我们提出了一种针对 WSN 的区块链授权认证方案(BAS)。在我们的方案中,所有节点都利用区块链上存储的身份信息进行管理。此外,我们还对 BAS 进行了蠕虫检测仿真实验,并从检测率和感染率方面对其安全性进行了评估。实验结果表明,所提出的方案能有效抑制蠕虫在网络中的传播和感染。
{"title":"A blockchain-empowered authentication scheme for worm detection in wireless sensor network","authors":"Yuling Chen ,&nbsp;Xiong Yang ,&nbsp;Tao Li ,&nbsp;Yi Ren ,&nbsp;Yangyang Long","doi":"10.1016/j.dcan.2022.04.007","DOIUrl":"10.1016/j.dcan.2022.04.007","url":null,"abstract":"<div><p>Wireless Sensor Network (WSN) is a distributed sensor network composed a large number of nodes with low cost, low performance and self-management. The special structure of WSN brings both convenience and vulnerability. For example, a malicious participant can launch attacks by capturing a physical device. Therefore, node authentication that can resist malicious attacks is very important to network security. Recently, blockchain technology has shown the potential to enhance the security of the Internet of Things (IoT). In this paper, we propose a Blockchain-empowered Authentication Scheme (BAS) for WSN. In our scheme, all nodes are managed by utilizing the identity information stored on the blockchain. Besides, the simulation experiment about worm detection is executed on BAS, and the security is evaluated from detection and infection rate. The experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822000566/pdfft?md5=28e73bd63494e299c157ed8bd24509fa&pid=1-s2.0-S2352864822000566-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45530999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NeurstrucEnergy: A bi-directional GNN model for energy prediction of neural networks in IoT NeurstrucEnergy:用于物联网中神经网络能量预测的双向GNN模型
IF 7.9 2区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.1016/j.dcan.2022.09.006
Chaopeng Guo, Zhaojin Zhong, Zexin Zhang, Jie Song

A significant demand rises for energy-efficient deep neural networks to support power-limited embedding devices with successful deep learning applications in IoT and edge computing fields. An accurate energy prediction approach is critical to provide measurement and lead optimization direction. However, the current energy prediction approaches lack accuracy and generalization ability due to the lack of research on the neural network structure and the excessive reliance on customized training dataset. This paper presents a novel energy prediction model, NeurstrucEnergy. NeurstrucEnergy treats neural networks as directed graphs and applies a bi-directional graph neural network training on a randomly generated dataset to extract structural features for energy prediction. NeurstrucEnergy has advantages over linear approaches because the bi-directional graph neural network collects structural features from each layer's parents and children. Experimental results show that NeurstrucEnergy establishes state-of-the-art results with mean absolute percentage error of 2.60%. We also evaluate NeurstrucEnergy in a randomly generated dataset, achieving the mean absolute percentage error of 4.83% over 10 typical convolutional neural networks in recent years and 7 efficient convolutional neural networks created by neural architecture search. Our code is available at https://github.com/NEUSoftGreenAI/NeurstrucEnergy.git.

物联网和边缘计算领域对高能效深度神经网络的需求急剧增加,以支持在物联网和边缘计算领域成功应用深度学习的限电嵌入式设备。准确的能量预测方法对于提供测量和引导优化方向至关重要。然而,由于缺乏对神经网络结构的研究以及过度依赖定制的训练数据集,目前的能量预测方法缺乏准确性和泛化能力。本文提出了一种新型能源预测模型 NeurstrucEnergy。NeurstrucEnergy 将神经网络视为有向图,并在随机生成的数据集上应用双向图神经网络训练来提取能源预测的结构特征。与线性方法相比,NeurstrucEnergy 的优势在于双向图神经网络从每一层的父层和子层收集结构特征。实验结果表明,NeurstrucEnergy 的平均绝对百分比误差为 2.60%,达到了最先进的水平。我们还在随机生成的数据集中对 NeurstrucEnergy 进行了评估,结果表明它的平均绝对误差为 4.83%,超过了近年来 10 个典型的卷积神经网络和 7 个通过神经架构搜索创建的高效卷积神经网络。我们的代码见 https://github.com/NEUSoftGreenAI/NeurstrucEnergy.git。
{"title":"NeurstrucEnergy: A bi-directional GNN model for energy prediction of neural networks in IoT","authors":"Chaopeng Guo,&nbsp;Zhaojin Zhong,&nbsp;Zexin Zhang,&nbsp;Jie Song","doi":"10.1016/j.dcan.2022.09.006","DOIUrl":"10.1016/j.dcan.2022.09.006","url":null,"abstract":"<div><p>A significant demand rises for energy-efficient deep neural networks to support power-limited embedding devices with successful deep learning applications in IoT and edge computing fields. An accurate energy prediction approach is critical to provide measurement and lead optimization direction. However, the current energy prediction approaches lack accuracy and generalization ability due to the lack of research on the neural network structure and the excessive reliance on customized training dataset. This paper presents a novel energy prediction model, NeurstrucEnergy. NeurstrucEnergy treats neural networks as directed graphs and applies a bi-directional graph neural network training on a randomly generated dataset to extract structural features for energy prediction. NeurstrucEnergy has advantages over linear approaches because the bi-directional graph neural network collects structural features from each layer's parents and children. Experimental results show that NeurstrucEnergy establishes state-of-the-art results with mean absolute percentage error of 2.60%. We also evaluate NeurstrucEnergy in a randomly generated dataset, achieving the mean absolute percentage error of 4.83% over 10 typical convolutional neural networks in recent years and 7 efficient convolutional neural networks created by neural architecture search. Our code is available at <span>https://github.com/NEUSoftGreenAI/NeurstrucEnergy.git</span><svg><path></path></svg>.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S235286482200181X/pdfft?md5=3742bd63184b9ce0f6c4437253770f62&pid=1-s2.0-S235286482200181X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46170782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint alignment and steering to manage interference 关节对准和转向,以管理干扰
IF 7.9 2区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.1016/j.dcan.2022.09.001
Zhao Li , Xiujuan Liang , Yinghou Liu , Jia Liu , Zheng Yan

In wireless communication networks, mobile users in overlapping areas may experience severe interference, therefore, designing effective Interference Management (IM) methods is crucial to improving network performance. However, when managing multiple disturbances from the same source, it may not be feasible to use existing IM methods such as Interference Alignment (IA) and Interference Steering (IS) exclusively. It is because with IA, the aligned interference becomes indistinguishable at its desired Receiver (Rx) under the cost constraint of Degrees-of-Freedom (DoF), while with IS, more transmit power will be consumed in the direct and repeated application of IS to each interference. To remedy these deficiencies, Interference Alignment Steering (IAS) is proposed by incorporating IA and IS and exploiting their advantages in IM. With IAS, the interfering Transmitter (Tx) first aligns one interference incurred by the transmission of one data stream to a one-dimensional subspace orthogonal to the desired transmission at the interfered Rx, and then the remaining interferences are treated as a whole and steered to the same subspace as the aligned interference. Moreover, two improved versions of IAS, i.e., IAS with Full Adjustment at the Interfering Tx (IAS-FAIT) and Interference Steering and Alignment (ISA), are presented. The former considers the influence of IA on the interfering user-pair's performance. The orthogonality between the desired signals at the interfered Rx can be maintained by adjusting the spatial characteristics of all interferences and the aligned interference components, thus ensuring the Spectral Efficiency (SE) of the interfering communication pairs. Under ISA, the power cost for IS at the interfered Tx is minimized, hence improving SE performance of the interfered communication-pairs. Since the proposed methods are realized at the interfering and interfered Txs cooperatively, the expenses of IM are shared by both communication-pairs. Our in-depth simulation results show that joint use of IA and IS can effectively manage multiple disturbances from the same source and improve the system's SE.

在无线通信网络中,重叠区域的移动用户可能会受到严重干扰,因此,设计有效的干扰管理(IM)方法对于提高网络性能至关重要。然而,在管理来自同一干扰源的多个干扰时,完全使用干扰对齐(IA)和干扰转向(IS)等现有 IM 方法可能并不可行。这是因为使用 IA 时,在自由度(DoF)的成本约束下,对齐的干扰在其所需的接收器(Rx)处变得无法区分,而使用 IS 时,在对每个干扰直接和重复应用 IS 时将消耗更多的发射功率。为了弥补这些不足,我们提出了干扰对齐转向(IAS),它结合了 IA 和 IS,并利用了它们在 IM 中的优势。使用 IAS 时,干扰发射机(Tx)首先将一个数据流传输产生的干扰对齐到与受干扰 Rx 的预期传输正交的一维子空间,然后将其余干扰作为一个整体处理,并引导到与对齐干扰相同的子空间。此外,还提出了 IAS 的两个改进版本,即在干扰发射机上进行全面调整的 IAS(IAS-FAIT)和干扰引导与对齐(ISA)。前者考虑了 IA 对干扰用户对性能的影响。通过调整所有干扰和对齐干扰分量的空间特性,可保持受干扰 Rx 上所需信号之间的正交性,从而确保干扰通信对的频谱效率(SE)。在 ISA 下,受干扰 Tx 的 IS 功率成本最小,从而提高了受干扰通信对的 SE 性能。由于所提出的方法是在干扰和被干扰的 Tx 上合作实现的,因此 IM 的费用由两个通信对分担。我们的深入仿真结果表明,联合使用 IA 和 IS 可以有效管理来自同一干扰源的多个干扰,并改善系统的 SE。
{"title":"Joint alignment and steering to manage interference","authors":"Zhao Li ,&nbsp;Xiujuan Liang ,&nbsp;Yinghou Liu ,&nbsp;Jia Liu ,&nbsp;Zheng Yan","doi":"10.1016/j.dcan.2022.09.001","DOIUrl":"10.1016/j.dcan.2022.09.001","url":null,"abstract":"<div><p>In wireless communication networks, mobile users in overlapping areas may experience severe interference, therefore, designing effective Interference Management (IM) methods is crucial to improving network performance. However, when managing multiple disturbances from the same source, it may not be feasible to use existing IM methods such as Interference Alignment (IA) and Interference Steering (IS) exclusively. It is because with IA, the aligned interference becomes indistinguishable at its desired Receiver (Rx) under the cost constraint of Degrees-of-Freedom (DoF), while with IS, more transmit power will be consumed in the direct and repeated application of IS to each interference. To remedy these deficiencies, Interference Alignment Steering (IAS) is proposed by incorporating IA and IS and exploiting their advantages in IM. With IAS, the interfering Transmitter (Tx) first aligns one interference incurred by the transmission of one data stream to a one-dimensional subspace orthogonal to the desired transmission at the interfered Rx, and then the remaining interferences are treated as a whole and steered to the same subspace as the aligned interference. Moreover, two improved versions of IAS, i.e., IAS with Full Adjustment at the Interfering Tx (IAS-FAIT) and Interference Steering and Alignment (ISA), are presented. The former considers the influence of IA on the interfering user-pair's performance. The orthogonality between the desired signals at the interfered Rx can be maintained by adjusting the spatial characteristics of all interferences and the aligned interference components, thus ensuring the Spectral Efficiency (SE) of the interfering communication pairs. Under ISA, the power cost for IS at the interfered Tx is minimized, hence improving SE performance of the interfered communication-pairs. Since the proposed methods are realized at the interfering and interfered Txs cooperatively, the expenses of IM are shared by both communication-pairs. Our in-depth simulation results show that joint use of IA and IS can effectively manage multiple disturbances from the same source and improve the system's SE.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822001766/pdfft?md5=725d2780101cbfb5e12a28ed5691338a&pid=1-s2.0-S2352864822001766-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47070183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Digital Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1