Pub Date : 2024-04-01DOI: 10.1016/j.dcan.2022.09.016
Qingxia Liu , Bang Wang , Jiming Qi , Xianjun Deng
Nearly all real-world networks are complex networks and usually are in danger of collapse. Therefore, it is crucial to exploit and understand the mechanisms of network attacks and provide better protection for network functionalities. Network dismantling aims to find the smallest set of nodes such that after their removal the network is broken into connected components of sub-extensive size. To overcome the limitations and drawbacks of existing network dismantling methods, this paper focuses on network dismantling problem and proposes a neighbor-loop structure based centrality metric, NL, which achieves a balance between computational efficiency and evaluation accuracy. In addition, we design a novel method combining NL-based nodes-removing, greedy tree-breaking and reinsertion. Moreover, we compare five baseline methods with our algorithm on ten widely used real-world networks and three types of model networks including Erdös-Rényi random networks, Watts-Strogatz small-world networks and Barabási-Albert scale-free networks with different network generation parameters. Experimental results demonstrate that our proposed method outperforms most peer methods by obtaining a minimal set of targeted attack nodes. Furthermore, the insights gained from this study may be of assistance to future practical research into real-world networks.
{"title":"A new centrality measure based on neighbor loop structure for network dismantling","authors":"Qingxia Liu , Bang Wang , Jiming Qi , Xianjun Deng","doi":"10.1016/j.dcan.2022.09.016","DOIUrl":"10.1016/j.dcan.2022.09.016","url":null,"abstract":"<div><p>Nearly all real-world networks are complex networks and usually are in danger of collapse. Therefore, it is crucial to exploit and understand the mechanisms of network attacks and provide better protection for network functionalities. Network dismantling aims to find the smallest set of nodes such that after their removal the network is broken into connected components of sub-extensive size. To overcome the limitations and drawbacks of existing network dismantling methods, this paper focuses on network dismantling problem and proposes a neighbor-loop structure based centrality metric, NL, which achieves a balance between computational efficiency and evaluation accuracy. In addition, we design a novel method combining NL-based nodes-removing, greedy tree-breaking and reinsertion. Moreover, we compare five baseline methods with our algorithm on ten widely used real-world networks and three types of model networks including Erdös-Rényi random networks, Watts-Strogatz small-world networks and Barabási-Albert scale-free networks with different network generation parameters. Experimental results demonstrate that our proposed method outperforms most peer methods by obtaining a minimal set of targeted attack nodes. Furthermore, the insights gained from this study may be of assistance to future practical research into real-world networks.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822001912/pdfft?md5=9b3045bde73e9d3f8278960f267b5e51&pid=1-s2.0-S2352864822001912-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43424660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-01DOI: 10.1016/j.dcan.2023.02.009
Zhenkun Jin , Yixuan Geng , Chenlu Zhu , Yunzhi Xia , Xianjun Deng , Lingzhi Yi , Xianlan Wang
Energy limitation of traditional Wireless Sensor Networks (WSNs) greatly confines the network lifetime due to generating and processing massive sensing data with a limited battery. The energy harvesting WSN is a novel network architecture to address the limitation of traditional WSN. However, existing coverage and deployment schemes neglect the environmental correlation of sensor nodes and external energy with respect to physical space. Comprehensively considering the spatial correlation of the environment and the uneven distribution of energy in energy harvesting WSN, we investigate how to deploy a collection of sensor nodes to save the deployment cost while ensuring the target perpetual coverage. The Confident Information Coverage (CIC) model is adopted to formulate the CIC Minimum Deployment Cost Target Perpetual Coverage (CICMTP) problem to minimize the deployed sensor nodes. As the CICMTP is NP-hard, we devise two approximation algorithms named Local Greedy Threshold Algorithm based on CIC (LGTA-CIC) and Overall Greedy Search Algorithm based on CIC (OGSA-CIC). The LGTA-CIC has a low time complexity and the OGSA-CIC has a better approximation rate. Extensive simulation results demonstrate that the OGSA-CIC is able to achieve lower deployment cost and the performance of the proposed algorithms outperforms GRNP, TPNP and EENP algorithms.
{"title":"Deployment optimization for target perpetual coverage in energy harvesting wireless sensor network","authors":"Zhenkun Jin , Yixuan Geng , Chenlu Zhu , Yunzhi Xia , Xianjun Deng , Lingzhi Yi , Xianlan Wang","doi":"10.1016/j.dcan.2023.02.009","DOIUrl":"10.1016/j.dcan.2023.02.009","url":null,"abstract":"<div><p>Energy limitation of traditional Wireless Sensor Networks (WSNs) greatly confines the network lifetime due to generating and processing massive sensing data with a limited battery. The energy harvesting WSN is a novel network architecture to address the limitation of traditional WSN. However, existing coverage and deployment schemes neglect the environmental correlation of sensor nodes and external energy with respect to physical space. Comprehensively considering the spatial correlation of the environment and the uneven distribution of energy in energy harvesting WSN, we investigate how to deploy a collection of sensor nodes to save the deployment cost while ensuring the target perpetual coverage. The Confident Information Coverage (CIC) model is adopted to formulate the CIC Minimum Deployment Cost Target Perpetual Coverage (CICMTP) problem to minimize the deployed sensor nodes. As the CICMTP is NP-hard, we devise two approximation algorithms named Local Greedy Threshold Algorithm based on CIC (LGTA-CIC) and Overall Greedy Search Algorithm based on CIC (OGSA-CIC). The LGTA-CIC has a low time complexity and the OGSA-CIC has a better approximation rate. Extensive simulation results demonstrate that the OGSA-CIC is able to achieve lower deployment cost and the performance of the proposed algorithms outperforms GRNP, TPNP and EENP algorithms.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864823000445/pdfft?md5=77d790869eceee0f4258a4afc2cddfc5&pid=1-s2.0-S2352864823000445-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45002793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-01DOI: 10.1016/j.dcan.2022.09.013
Sherzod Elamanov , Hyeonseo Son , Bob Flynn , Seong Ki Yoo , Naqqash Dilshad , JaeSeung Song
In the era of rapid development of Internet of Things (IoT), numerous machine-to-machine technologies have been applied to the industrial domain. Due to the divergence of IoT solutions, the industry is faced with a need to apply various technologies for automation and control. This fact leads to a demand for an establishing interworking mechanism which would allow smooth interoperability between heterogeneous devices. One of the major protocols widely used today in industrial electronic devices is Modbus. However, data generated by Modbus devices cannot be understood by IoT applications using different protocols, so it should be applied in a couple with an IoT service layer platform. oneM2M, a global IoT standard, can play the role of interconnecting various protocols, as it provides flexible tools suitable for building an interworking framework for industrial services. Therefore, in this paper, we propose an interworking architecture between devices working on the Modbus protocol and an IoT platform implemented based on oneM2M standards. In the proposed architecture, we introduce the way to model Modbus data as oneM2M resources, rules to map them to each other, procedures required to establish interoperable communication, and optimization methods for this architecture. We analyze our solution and provide an evaluation by implementing it based on a solar power management use case. The results demonstrate that our model is feasible and can be applied to real case scenarios.
{"title":"Interworking between Modbus and internet of things platform for industrial services","authors":"Sherzod Elamanov , Hyeonseo Son , Bob Flynn , Seong Ki Yoo , Naqqash Dilshad , JaeSeung Song","doi":"10.1016/j.dcan.2022.09.013","DOIUrl":"10.1016/j.dcan.2022.09.013","url":null,"abstract":"<div><p>In the era of rapid development of Internet of Things (IoT), numerous machine-to-machine technologies have been applied to the industrial domain. Due to the divergence of IoT solutions, the industry is faced with a need to apply various technologies for automation and control. This fact leads to a demand for an establishing interworking mechanism which would allow smooth interoperability between heterogeneous devices. One of the major protocols widely used today in industrial electronic devices is Modbus. However, data generated by Modbus devices cannot be understood by IoT applications using different protocols, so it should be applied in a couple with an IoT service layer platform. oneM2M, a global IoT standard, can play the role of interconnecting various protocols, as it provides flexible tools suitable for building an interworking framework for industrial services. Therefore, in this paper, we propose an interworking architecture between devices working on the Modbus protocol and an IoT platform implemented based on oneM2M standards. In the proposed architecture, we introduce the way to model Modbus data as oneM2M resources, rules to map them to each other, procedures required to establish interoperable communication, and optimization methods for this architecture. We analyze our solution and provide an evaluation by implementing it based on a solar power management use case. The results demonstrate that our model is feasible and can be applied to real case scenarios.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822001882/pdfft?md5=7b7bc845989426f1fb38bc11af73c0a8&pid=1-s2.0-S2352864822001882-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47474133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-01DOI: 10.1016/j.dcan.2022.12.001
Silv Wang , Kai Fan , Kuan Zhang , Hui Li , Yintang Yang
The security of Federated Learning (FL)/Distributed Machine Learning (DML) is gravely threatened by data poisoning attacks, which destroy the usability of the model by contaminating training samples, so such attacks are called causative availability indiscriminate attacks. Facing the problem that existing data sanitization methods are hard to apply to real-time applications due to their tedious process and heavy computations, we propose a new supervised batch detection method for poison, which can fleetly sanitize the training dataset before the local model training. We design a training dataset generation method that helps to enhance accuracy and uses data complexity features to train a detection model, which will be used in an efficient batch hierarchical detection process. Our model stockpiles knowledge about poison, which can be expanded by retraining to adapt to new attacks. Being neither attack-specific nor scenario-specific, our method is applicable to FL/DML or other online or offline scenarios.
{"title":"Data complexity-based batch sanitization method against poison in distributed learning","authors":"Silv Wang , Kai Fan , Kuan Zhang , Hui Li , Yintang Yang","doi":"10.1016/j.dcan.2022.12.001","DOIUrl":"10.1016/j.dcan.2022.12.001","url":null,"abstract":"<div><p>The security of Federated Learning (FL)/Distributed Machine Learning (DML) is gravely threatened by data poisoning attacks, which destroy the usability of the model by contaminating training samples, so such attacks are called causative availability indiscriminate attacks. Facing the problem that existing data sanitization methods are hard to apply to real-time applications due to their tedious process and heavy computations, we propose a new supervised batch detection method for poison, which can fleetly sanitize the training dataset before the local model training. We design a training dataset generation method that helps to enhance accuracy and uses data complexity features to train a detection model, which will be used in an efficient batch hierarchical detection process. Our model stockpiles knowledge about poison, which can be expanded by retraining to adapt to new attacks. Being neither attack-specific nor scenario-specific, our method is applicable to FL/DML or other online or offline scenarios.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822002607/pdfft?md5=b0b1a2d02d1b0851d0a0b9f510f11541&pid=1-s2.0-S2352864822002607-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45039010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-01DOI: 10.1016/j.dcan.2023.05.008
Hikmat Adhami , Mohammad Alja'afreh , Mohamed Hoda , Jiaqi Zhao , Yong Zhou , Abdulmotaleb El Saddik
Haptic is the modality that complements traditional multimedia, i.e., audiovisual, to evolve the next wave of innovation at which the Internet data stream can be exchanged to enable remote skills and control applications. This will require ultra-low latency and ultra-high reliability to evolve the mobile experience into the era of Digital Twin and Tactile Internet. While the 5th generation of mobile networks is not yet widely deployed, Long-Term Evolution (LTE-A) latency remains much higher than the 1 ms requirement for the Tactile Internet and therefore the Digital Twin. This work investigates an interesting solution based on the incorporation of Software-defined networking (SDN) and Multi-access Mobile Edge Computing (MEC) technologies in an LTE-A network, to deliver future multimedia applications over the Tactile Internet while overcoming the QoS challenges. Several network scenarios were designed and simulated using Riverbed modeler and the performance was evaluated using several time-related Key Performance Indicators (KPIs) such as throughput, End-2-End (E2E) delay, and jitter. The best scenario possible is clearly the one integrating MEC and SDN approaches, where the overall delay, jitter, and throughput for haptics- attained 2 ms, 0.01 ms, and 1000 packets per second. The results obtained give clear evidence that the integration of, both SDN and MEC, in LTE-A indicates performance improvement, and fulfills the standard requirements in terms of the above KPIs, for realizing a Digital Twin/Tactile Internet-based system.
{"title":"Suitability of SDN and MEC to facilitate digital twin communication over LTE-A","authors":"Hikmat Adhami , Mohammad Alja'afreh , Mohamed Hoda , Jiaqi Zhao , Yong Zhou , Abdulmotaleb El Saddik","doi":"10.1016/j.dcan.2023.05.008","DOIUrl":"10.1016/j.dcan.2023.05.008","url":null,"abstract":"<div><p>Haptic is the modality that complements traditional multimedia, i.e., audiovisual, to evolve the next wave of innovation at which the Internet data stream can be exchanged to enable remote skills and control applications. This will require ultra-low latency and ultra-high reliability to evolve the mobile experience into the era of Digital Twin and Tactile Internet. While the 5th generation of mobile networks is not yet widely deployed, Long-Term Evolution (LTE-A) latency remains much higher than the 1 ms requirement for the Tactile Internet and therefore the Digital Twin. This work investigates an interesting solution based on the incorporation of Software-defined networking (SDN) and Multi-access Mobile Edge Computing (MEC) technologies in an LTE-A network, to deliver future multimedia applications over the Tactile Internet while overcoming the QoS challenges. Several network scenarios were designed and simulated using Riverbed modeler and the performance was evaluated using several time-related Key Performance Indicators (KPIs) such as throughput, End-2-End (E2E) delay, and jitter. The best scenario possible is clearly the one integrating MEC and SDN approaches, where the overall delay, jitter, and throughput for haptics- attained 2 ms, 0.01 ms, and 1000 packets per second. The results obtained give clear evidence that the integration of, both SDN and MEC, in LTE-A indicates performance improvement, and fulfills the standard requirements in terms of the above KPIs, for realizing a Digital Twin/Tactile Internet-based system.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864823000901/pdfft?md5=f6a361c56c1093f348b397bad032df15&pid=1-s2.0-S2352864823000901-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45726812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-01DOI: 10.1016/j.dcan.2022.09.019
Sheng Hao , Huyin Zhang , Fei Yang , Chenghao Li , Jing Wang
Hybrid Power-line/Visible-light Communication (HPVC) network has been one of the most promising Cooperative Communication (CC) technologies for constructing Smart Home due to its superior communication reliability and hardware efficiency. Current research on HPVC networks focuses on the performance analysis and optimization of the Physical (PHY) layer, where the Power Line Communication (PLC) component only serves as the backbone to provide power to light Emitting Diode (LED) devices. So designing a Media Access Control(MAC) protocol remains a great challenge because it allows both PLC and Visible Light Communication (VLC) components to operate data transmission, i.e., to achieve a true HPVC network CC. To solve this problem, we propose a new HPC network MAC protocol (HPVC MAC) based on Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) by combining IEEE 802.15.7 and IEEE 1901 standards. Firstly, we add an Additional Assistance (AA) layer to provide the channel selection strategies for sensor stations, so that they can complete data transmission on the selected channel via the specified CSMA/CA mechanism, respectively. Based on this, we give a detailed working principle of the HPVC MAC, followed by the construction of a joint analytical model for mathematical-mathematical validation of the HPVC MAC. In the modeling process, the impacts of PHY layer settings (including channel fading types and additive noise feature), CSMA/CA mechanisms of 802.15.7 and 1901, and practical configurations (such as traffic rate, transit buffer size) are comprehensively taken into consideration. Moreover, we prove the proposed analytical model has the solvability. Finally, through extensive simulations, we characterize the HPVC MAC performance under different system parameters and verify the correctness of the corresponding analytical model with an average error rate of 4.62% between the simulation and analytical results.
电力线/可视光混合通信(HPVC)网络因其卓越的通信可靠性和硬件效率,已成为构建智能家居最有前途的合作通信(CC)技术之一。目前对HPVC网络的研究主要集中在物理层(PHY)的性能分析和优化上,其中电力线通信(PLC)组件仅作为骨干网为发光二极管(LED)设备供电。因此,设计一个媒体访问控制(MAC)协议仍然是一个巨大的挑战,因为它允许PLC和可见光通信(VLC)组件同时进行数据传输,即实现真正的HPVC网络CC。为解决这一问题,我们结合 IEEE 802.15.7 和 IEEE 1901 标准,提出了一种基于载波侦测多路访问/碰撞避免(CSMA/CA)的新型 HPC 网络 MAC 协议(HPVC MAC)。首先,我们增加了一个附加辅助层(AA),为传感器站提供信道选择策略,使它们能分别通过指定的 CSMA/CA 机制在选定的信道上完成数据传输。在此基础上,我们给出了 HPVC MAC 的详细工作原理,随后构建了一个联合分析模型,对 HPVC MAC 进行数学计算验证。在建模过程中,我们综合考虑了 PHY 层设置(包括信道衰落类型和加性噪声特征)、802.15.7 和 1901 的 CSMA/CA 机制以及实际配置(如流量速率、传输缓冲区大小)的影响。此外,我们还证明了所提出的分析模型具有可解性。最后,通过大量仿真,我们描述了不同系统参数下 HPVC MAC 的性能,并验证了相应分析模型的正确性,仿真结果与分析结果之间的平均误差率为 4.62%。
{"title":"A CSMA/CA based MAC protocol for hybrid Power-line/Visible-light communication networks: Design and analysis","authors":"Sheng Hao , Huyin Zhang , Fei Yang , Chenghao Li , Jing Wang","doi":"10.1016/j.dcan.2022.09.019","DOIUrl":"10.1016/j.dcan.2022.09.019","url":null,"abstract":"<div><p>Hybrid Power-line/Visible-light Communication (HPVC) network has been one of the most promising Cooperative Communication (CC) technologies for constructing Smart Home due to its superior communication reliability and hardware efficiency. Current research on HPVC networks focuses on the performance analysis and optimization of the Physical (PHY) layer, where the Power Line Communication (PLC) component only serves as the backbone to provide power to light Emitting Diode (LED) devices. So designing a Media Access Control(MAC) protocol remains a great challenge because it allows both PLC and Visible Light Communication (VLC) components to operate data transmission, i.e., to achieve a true HPVC network CC. To solve this problem, we propose a new HPC network MAC protocol (HPVC MAC) based on Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) by combining IEEE 802.15.7 and IEEE 1901 standards. Firstly, we add an Additional Assistance (AA) layer to provide the channel selection strategies for sensor stations, so that they can complete data transmission on the selected channel via the specified CSMA/CA mechanism, respectively. Based on this, we give a detailed working principle of the HPVC MAC, followed by the construction of a joint analytical model for mathematical-mathematical validation of the HPVC MAC. In the modeling process, the impacts of PHY layer settings (including channel fading types and additive noise feature), CSMA/CA mechanisms of 802.15.7 and 1901, and practical configurations (such as traffic rate, transit buffer size) are comprehensively taken into consideration. Moreover, we prove the proposed analytical model has the solvability. Finally, through extensive simulations, we characterize the HPVC MAC performance under different system parameters and verify the correctness of the corresponding analytical model with an average error rate of 4.62% between the simulation and analytical results.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822001948/pdfft?md5=f1275ccd9e7ba1464988da36bec591da&pid=1-s2.0-S2352864822001948-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41659590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-01DOI: 10.1016/j.dcan.2022.05.005
Jiachen Yang , Meng Xi , Jiabao Wen , Yang Li , Houbing Herbert Song
The Autonomous Underwater Glider (AUG) is a kind of prevailing underwater intelligent internet vehicle and occupies a dominant position in industrial applications, in which path planning is an essential problem. Due to the complexity and variability of the ocean, accurate environment modeling and flexible path planning algorithms are pivotal challenges. The traditional models mainly utilize mathematical functions, which are not complete and reliable. Most existing path planning algorithms depend on the environment and lack flexibility. To overcome these challenges, we propose a path planning system for underwater intelligent internet vehicles. It applies digital twins and sensor data to map the real ocean environment to a virtual digital space, which provides a comprehensive and reliable environment for path simulation. We design a value-based reinforcement learning path planning algorithm and explore the optimal network structure parameters. The path simulation is controlled by a closed-loop model integrated into the terminal vehicle through edge computing. The integration of state input enriches the learning of neural networks and helps to improve generalization and flexibility. The task-related reward function promotes the rapid convergence of the training. The experimental results prove that our reinforcement learning based path planning algorithm has great flexibility and can effectively adapt to a variety of different ocean conditions.
{"title":"A digital twins enabled underwater intelligent internet vehicle path planning system via reinforcement learning and edge computing","authors":"Jiachen Yang , Meng Xi , Jiabao Wen , Yang Li , Houbing Herbert Song","doi":"10.1016/j.dcan.2022.05.005","DOIUrl":"10.1016/j.dcan.2022.05.005","url":null,"abstract":"<div><p>The Autonomous Underwater Glider (AUG) is a kind of prevailing underwater intelligent internet vehicle and occupies a dominant position in industrial applications, in which path planning is an essential problem. Due to the complexity and variability of the ocean, accurate environment modeling and flexible path planning algorithms are pivotal challenges. The traditional models mainly utilize mathematical functions, which are not complete and reliable. Most existing path planning algorithms depend on the environment and lack flexibility. To overcome these challenges, we propose a path planning system for underwater intelligent internet vehicles. It applies digital twins and sensor data to map the real ocean environment to a virtual digital space, which provides a comprehensive and reliable environment for path simulation. We design a value-based reinforcement learning path planning algorithm and explore the optimal network structure parameters. The path simulation is controlled by a closed-loop model integrated into the terminal vehicle through edge computing. The integration of state input enriches the learning of neural networks and helps to improve generalization and flexibility. The task-related reward function promotes the rapid convergence of the training. The experimental results prove that our reinforcement learning based path planning algorithm has great flexibility and can effectively adapt to a variety of different ocean conditions.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822000967/pdfft?md5=6d47224900e557afd8fc3eeadffa37f3&pid=1-s2.0-S2352864822000967-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41779848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-01DOI: 10.1016/j.dcan.2022.04.007
Yuling Chen , Xiong Yang , Tao Li , Yi Ren , Yangyang Long
Wireless Sensor Network (WSN) is a distributed sensor network composed a large number of nodes with low cost, low performance and self-management. The special structure of WSN brings both convenience and vulnerability. For example, a malicious participant can launch attacks by capturing a physical device. Therefore, node authentication that can resist malicious attacks is very important to network security. Recently, blockchain technology has shown the potential to enhance the security of the Internet of Things (IoT). In this paper, we propose a Blockchain-empowered Authentication Scheme (BAS) for WSN. In our scheme, all nodes are managed by utilizing the identity information stored on the blockchain. Besides, the simulation experiment about worm detection is executed on BAS, and the security is evaluated from detection and infection rate. The experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network.
无线传感器网络(WSN)是一种由大量节点组成的分布式传感器网络,具有成本低、性能好、可自我管理等特点。WSN 的特殊结构既带来了便利,也带来了脆弱性。例如,恶意参与者可以通过捕获物理设备发动攻击。因此,能够抵御恶意攻击的节点认证对网络安全非常重要。最近,区块链技术显示出增强物联网安全性的潜力。在本文中,我们提出了一种针对 WSN 的区块链授权认证方案(BAS)。在我们的方案中,所有节点都利用区块链上存储的身份信息进行管理。此外,我们还对 BAS 进行了蠕虫检测仿真实验,并从检测率和感染率方面对其安全性进行了评估。实验结果表明,所提出的方案能有效抑制蠕虫在网络中的传播和感染。
{"title":"A blockchain-empowered authentication scheme for worm detection in wireless sensor network","authors":"Yuling Chen , Xiong Yang , Tao Li , Yi Ren , Yangyang Long","doi":"10.1016/j.dcan.2022.04.007","DOIUrl":"10.1016/j.dcan.2022.04.007","url":null,"abstract":"<div><p>Wireless Sensor Network (WSN) is a distributed sensor network composed a large number of nodes with low cost, low performance and self-management. The special structure of WSN brings both convenience and vulnerability. For example, a malicious participant can launch attacks by capturing a physical device. Therefore, node authentication that can resist malicious attacks is very important to network security. Recently, blockchain technology has shown the potential to enhance the security of the Internet of Things (IoT). In this paper, we propose a Blockchain-empowered Authentication Scheme (BAS) for WSN. In our scheme, all nodes are managed by utilizing the identity information stored on the blockchain. Besides, the simulation experiment about worm detection is executed on BAS, and the security is evaluated from detection and infection rate. The experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822000566/pdfft?md5=28e73bd63494e299c157ed8bd24509fa&pid=1-s2.0-S2352864822000566-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45530999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-01DOI: 10.1016/j.dcan.2022.09.006
Chaopeng Guo, Zhaojin Zhong, Zexin Zhang, Jie Song
A significant demand rises for energy-efficient deep neural networks to support power-limited embedding devices with successful deep learning applications in IoT and edge computing fields. An accurate energy prediction approach is critical to provide measurement and lead optimization direction. However, the current energy prediction approaches lack accuracy and generalization ability due to the lack of research on the neural network structure and the excessive reliance on customized training dataset. This paper presents a novel energy prediction model, NeurstrucEnergy. NeurstrucEnergy treats neural networks as directed graphs and applies a bi-directional graph neural network training on a randomly generated dataset to extract structural features for energy prediction. NeurstrucEnergy has advantages over linear approaches because the bi-directional graph neural network collects structural features from each layer's parents and children. Experimental results show that NeurstrucEnergy establishes state-of-the-art results with mean absolute percentage error of 2.60%. We also evaluate NeurstrucEnergy in a randomly generated dataset, achieving the mean absolute percentage error of 4.83% over 10 typical convolutional neural networks in recent years and 7 efficient convolutional neural networks created by neural architecture search. Our code is available at https://github.com/NEUSoftGreenAI/NeurstrucEnergy.git.
{"title":"NeurstrucEnergy: A bi-directional GNN model for energy prediction of neural networks in IoT","authors":"Chaopeng Guo, Zhaojin Zhong, Zexin Zhang, Jie Song","doi":"10.1016/j.dcan.2022.09.006","DOIUrl":"10.1016/j.dcan.2022.09.006","url":null,"abstract":"<div><p>A significant demand rises for energy-efficient deep neural networks to support power-limited embedding devices with successful deep learning applications in IoT and edge computing fields. An accurate energy prediction approach is critical to provide measurement and lead optimization direction. However, the current energy prediction approaches lack accuracy and generalization ability due to the lack of research on the neural network structure and the excessive reliance on customized training dataset. This paper presents a novel energy prediction model, NeurstrucEnergy. NeurstrucEnergy treats neural networks as directed graphs and applies a bi-directional graph neural network training on a randomly generated dataset to extract structural features for energy prediction. NeurstrucEnergy has advantages over linear approaches because the bi-directional graph neural network collects structural features from each layer's parents and children. Experimental results show that NeurstrucEnergy establishes state-of-the-art results with mean absolute percentage error of 2.60%. We also evaluate NeurstrucEnergy in a randomly generated dataset, achieving the mean absolute percentage error of 4.83% over 10 typical convolutional neural networks in recent years and 7 efficient convolutional neural networks created by neural architecture search. Our code is available at <span>https://github.com/NEUSoftGreenAI/NeurstrucEnergy.git</span><svg><path></path></svg>.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S235286482200181X/pdfft?md5=3742bd63184b9ce0f6c4437253770f62&pid=1-s2.0-S235286482200181X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46170782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-01DOI: 10.1016/j.dcan.2022.09.001
Zhao Li , Xiujuan Liang , Yinghou Liu , Jia Liu , Zheng Yan
In wireless communication networks, mobile users in overlapping areas may experience severe interference, therefore, designing effective Interference Management (IM) methods is crucial to improving network performance. However, when managing multiple disturbances from the same source, it may not be feasible to use existing IM methods such as Interference Alignment (IA) and Interference Steering (IS) exclusively. It is because with IA, the aligned interference becomes indistinguishable at its desired Receiver (Rx) under the cost constraint of Degrees-of-Freedom (DoF), while with IS, more transmit power will be consumed in the direct and repeated application of IS to each interference. To remedy these deficiencies, Interference Alignment Steering (IAS) is proposed by incorporating IA and IS and exploiting their advantages in IM. With IAS, the interfering Transmitter (Tx) first aligns one interference incurred by the transmission of one data stream to a one-dimensional subspace orthogonal to the desired transmission at the interfered Rx, and then the remaining interferences are treated as a whole and steered to the same subspace as the aligned interference. Moreover, two improved versions of IAS, i.e., IAS with Full Adjustment at the Interfering Tx (IAS-FAIT) and Interference Steering and Alignment (ISA), are presented. The former considers the influence of IA on the interfering user-pair's performance. The orthogonality between the desired signals at the interfered Rx can be maintained by adjusting the spatial characteristics of all interferences and the aligned interference components, thus ensuring the Spectral Efficiency (SE) of the interfering communication pairs. Under ISA, the power cost for IS at the interfered Tx is minimized, hence improving SE performance of the interfered communication-pairs. Since the proposed methods are realized at the interfering and interfered Txs cooperatively, the expenses of IM are shared by both communication-pairs. Our in-depth simulation results show that joint use of IA and IS can effectively manage multiple disturbances from the same source and improve the system's SE.
在无线通信网络中,重叠区域的移动用户可能会受到严重干扰,因此,设计有效的干扰管理(IM)方法对于提高网络性能至关重要。然而,在管理来自同一干扰源的多个干扰时,完全使用干扰对齐(IA)和干扰转向(IS)等现有 IM 方法可能并不可行。这是因为使用 IA 时,在自由度(DoF)的成本约束下,对齐的干扰在其所需的接收器(Rx)处变得无法区分,而使用 IS 时,在对每个干扰直接和重复应用 IS 时将消耗更多的发射功率。为了弥补这些不足,我们提出了干扰对齐转向(IAS),它结合了 IA 和 IS,并利用了它们在 IM 中的优势。使用 IAS 时,干扰发射机(Tx)首先将一个数据流传输产生的干扰对齐到与受干扰 Rx 的预期传输正交的一维子空间,然后将其余干扰作为一个整体处理,并引导到与对齐干扰相同的子空间。此外,还提出了 IAS 的两个改进版本,即在干扰发射机上进行全面调整的 IAS(IAS-FAIT)和干扰引导与对齐(ISA)。前者考虑了 IA 对干扰用户对性能的影响。通过调整所有干扰和对齐干扰分量的空间特性,可保持受干扰 Rx 上所需信号之间的正交性,从而确保干扰通信对的频谱效率(SE)。在 ISA 下,受干扰 Tx 的 IS 功率成本最小,从而提高了受干扰通信对的 SE 性能。由于所提出的方法是在干扰和被干扰的 Tx 上合作实现的,因此 IM 的费用由两个通信对分担。我们的深入仿真结果表明,联合使用 IA 和 IS 可以有效管理来自同一干扰源的多个干扰,并改善系统的 SE。
{"title":"Joint alignment and steering to manage interference","authors":"Zhao Li , Xiujuan Liang , Yinghou Liu , Jia Liu , Zheng Yan","doi":"10.1016/j.dcan.2022.09.001","DOIUrl":"10.1016/j.dcan.2022.09.001","url":null,"abstract":"<div><p>In wireless communication networks, mobile users in overlapping areas may experience severe interference, therefore, designing effective Interference Management (IM) methods is crucial to improving network performance. However, when managing multiple disturbances from the same source, it may not be feasible to use existing IM methods such as Interference Alignment (IA) and Interference Steering (IS) exclusively. It is because with IA, the aligned interference becomes indistinguishable at its desired Receiver (Rx) under the cost constraint of Degrees-of-Freedom (DoF), while with IS, more transmit power will be consumed in the direct and repeated application of IS to each interference. To remedy these deficiencies, Interference Alignment Steering (IAS) is proposed by incorporating IA and IS and exploiting their advantages in IM. With IAS, the interfering Transmitter (Tx) first aligns one interference incurred by the transmission of one data stream to a one-dimensional subspace orthogonal to the desired transmission at the interfered Rx, and then the remaining interferences are treated as a whole and steered to the same subspace as the aligned interference. Moreover, two improved versions of IAS, i.e., IAS with Full Adjustment at the Interfering Tx (IAS-FAIT) and Interference Steering and Alignment (ISA), are presented. The former considers the influence of IA on the interfering user-pair's performance. The orthogonality between the desired signals at the interfered Rx can be maintained by adjusting the spatial characteristics of all interferences and the aligned interference components, thus ensuring the Spectral Efficiency (SE) of the interfering communication pairs. Under ISA, the power cost for IS at the interfered Tx is minimized, hence improving SE performance of the interfered communication-pairs. Since the proposed methods are realized at the interfering and interfered Txs cooperatively, the expenses of IM are shared by both communication-pairs. Our in-depth simulation results show that joint use of IA and IS can effectively manage multiple disturbances from the same source and improve the system's SE.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.9,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822001766/pdfft?md5=725d2780101cbfb5e12a28ed5691338a&pid=1-s2.0-S2352864822001766-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47070183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}