首页 > 最新文献

International Journal of Distributed Sensor Networks最新文献

英文 中文
Dynamic incentive mechanism in mobile crowdsourcing networks by combining reputation and contract theory 基于声誉与契约理论的移动众包网络动态激励机制研究
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-06-01 DOI: 10.1177/15501329221104352
Nan Zhao, Qixuan Wan, Jinlian Chen, Minghu Wu
By utilizing the mobile terminals’ sensing and computing capabilities, mobile crowdsourcing network is considered to be a promising technology to support the various large-scale sensing applications. However, considering the limited resources and security issue, mobile users may be unwilling to participate in crowdsourcing without any incentive. In this work, by combining reputation and contract theory, a dynamic long-term incentive mechanism is proposed to attract the mobile users to participate in mobile crowdsourcing networks. A two-period dynamic contract is first investigated to deal with the asymmetric information problem in the crowdsourcing tasks. Reputation strategy is then introduced to further attract the mobile users to complete the long-term crowdsourcing tasks. The optimal contracts are designed to obtain the maximum expected utility of service provider with reputation strategy and without reputation strategy, respectively. Simulation results demonstrate that the long-term crowdsourcing tasks can be guaranteed by combining the contract’s explicit incentive with the reputation’s implicit incentive. The incentive mechanism can gain a higher expected utility, the more implicit reputation effect factor.
通过利用移动终端的传感和计算能力,移动众包网络被认为是一种很有前途的技术,可以支持各种大规模的传感应用。然而,考虑到有限的资源和安全问题,移动用户可能不愿意在没有任何激励的情况下参与众包。本文将声誉和契约理论相结合,提出了一种动态的长期激励机制,以吸引移动用户参与移动众包网络。针对众包任务中的信息不对称问题,首先研究了一个两阶段动态契约。然后引入信誉策略,进一步吸引移动用户完成长期众包任务。最优契约分别设计为在有信誉策略和无信誉策略的情况下获得服务提供商的最大期望效用。仿真结果表明,将合同的显性激励与声誉的隐性激励相结合,可以保证长期的众包任务。激励机制可以获得更高的预期效用,更隐含的声誉效应因素。
{"title":"Dynamic incentive mechanism in mobile crowdsourcing networks by combining reputation and contract theory","authors":"Nan Zhao, Qixuan Wan, Jinlian Chen, Minghu Wu","doi":"10.1177/15501329221104352","DOIUrl":"https://doi.org/10.1177/15501329221104352","url":null,"abstract":"By utilizing the mobile terminals’ sensing and computing capabilities, mobile crowdsourcing network is considered to be a promising technology to support the various large-scale sensing applications. However, considering the limited resources and security issue, mobile users may be unwilling to participate in crowdsourcing without any incentive. In this work, by combining reputation and contract theory, a dynamic long-term incentive mechanism is proposed to attract the mobile users to participate in mobile crowdsourcing networks. A two-period dynamic contract is first investigated to deal with the asymmetric information problem in the crowdsourcing tasks. Reputation strategy is then introduced to further attract the mobile users to complete the long-term crowdsourcing tasks. The optimal contracts are designed to obtain the maximum expected utility of service provider with reputation strategy and without reputation strategy, respectively. Simulation results demonstrate that the long-term crowdsourcing tasks can be guaranteed by combining the contract’s explicit incentive with the reputation’s implicit incentive. The incentive mechanism can gain a higher expected utility, the more implicit reputation effect factor.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46188061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust security transmission design for multi-user peer-to-peer wireless relay networks 多用户点对点无线中继网络鲁棒安全传输设计
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-06-01 DOI: 10.1177/15501329221107582
Dongmei Yang, Hongjun Li, Baoquan Ren, Xudong Zhong
In this article, we studied the robust security transmission design for multi-user peer-to-peer relay networks, where all users demand secure communication and the eavesdropper is passive. Although the previous researches have designed the physical-layer security schemes under perfect channel state information, this study focuses on investigating the robust transmission design in the presence of a passive eavesdropper. Our goal is to maximize the artificial noise power to confuse the passive eavesdropper and subject to the worst-case signal-to-interference-noise-ratio constraints for all users under a bounded spherical region for the norm of the channel state information error vector from the relays to the destinations and the individual power constraints of all relay nodes. Mathematically, the original robust problem is difficult to solve due to its non-linearity and non-convexity. We propose to adopt S-Procedure and rank relaxation techniques to convert it to a semidefinite programming convex problem. The numerical results show the advantage of the proposed robust method.
在本文中,我们研究了多用户对等中继网络的鲁棒安全传输设计,在该网络中,所有用户都要求安全通信,而窃听者是被动的。尽管先前的研究已经设计了在完美信道状态信息下的物理层安全方案,但本研究侧重于研究在存在被动窃听器的情况下的鲁棒传输设计。我们的目标是最大限度地提高人工噪声功率,以迷惑被动窃听者,并在有界球面区域下,对所有用户进行最坏情况的信干噪比约束,以确定从中继站到目的地的信道状态信息误差向量的范数和所有中继节点的单个功率约束。在数学上,原有的鲁棒问题由于其非线性和非凸性而难以求解。我们建议采用S-过程和秩松弛技术将其转化为半定规划凸问题。数值结果表明了该方法的优越性。
{"title":"Robust security transmission design for multi-user peer-to-peer wireless relay networks","authors":"Dongmei Yang, Hongjun Li, Baoquan Ren, Xudong Zhong","doi":"10.1177/15501329221107582","DOIUrl":"https://doi.org/10.1177/15501329221107582","url":null,"abstract":"In this article, we studied the robust security transmission design for multi-user peer-to-peer relay networks, where all users demand secure communication and the eavesdropper is passive. Although the previous researches have designed the physical-layer security schemes under perfect channel state information, this study focuses on investigating the robust transmission design in the presence of a passive eavesdropper. Our goal is to maximize the artificial noise power to confuse the passive eavesdropper and subject to the worst-case signal-to-interference-noise-ratio constraints for all users under a bounded spherical region for the norm of the channel state information error vector from the relays to the destinations and the individual power constraints of all relay nodes. Mathematically, the original robust problem is difficult to solve due to its non-linearity and non-convexity. We propose to adopt S-Procedure and rank relaxation techniques to convert it to a semidefinite programming convex problem. The numerical results show the advantage of the proposed robust method.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48831047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wet aggregate stability modeling based on support vector machine in multiuse soils 基于支持向量机的多用途土湿集料稳定性建模
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-06-01 DOI: 10.1177/15501329221107573
Ruizhi Zhai, Jianping Wang, Deshun Yin, Ziheng Shangguan
Accurate assessment of wet aggregate stability is critical in evaluating soil quality. However, a few general models are used to assess it. In this work, we use the support vector machine to evaluate wet aggregate stability and compare it with a benchmark model based on artificial neural networks. One hundred thirty-four soil samples from various land uses, such as crops, grasslands, and bare land are adopted to verify the effectiveness of the proposed method and confirm the valid input parameters. We select 107 samples for calibrating the prediction model and the rest for evaluation. Experiments show that organic carbon is the main control parameter of wet aggregate stability, although the most influential factors for different land use are various. Comparing the determination coefficient and the root mean square error, it proves that the support vector machine method is superior to the artificial neural network method. In addition, the relative importance analysis shows that contents of organic carbon, silt, and clay are the primary input parameters. Finally, the impact of land use and management types is evaluated.
准确评估湿骨料的稳定性对于评估土壤质量至关重要。然而,一些通用模型被用来评估它。在这项工作中,我们使用支持向量机来评估湿骨料的稳定性,并将其与基于人工神经网络的基准模型进行比较。采用来自作物、草地和裸地等各种土地利用的134个土壤样本来验证所提出方法的有效性,并确认有效的输入参数。我们选择107个样本用于校准预测模型,其余样本用于评估。实验表明,有机碳是湿集料稳定性的主要控制参数,但对不同土地利用影响最大的因素是多方面的。通过对判定系数和均方根误差的比较,证明了支持向量机方法优于人工神经网络方法。此外,相对重要性分析表明,有机碳、淤泥和粘土的含量是主要的输入参数。最后,对土地利用和管理类型的影响进行了评价。
{"title":"Wet aggregate stability modeling based on support vector machine in multiuse soils","authors":"Ruizhi Zhai, Jianping Wang, Deshun Yin, Ziheng Shangguan","doi":"10.1177/15501329221107573","DOIUrl":"https://doi.org/10.1177/15501329221107573","url":null,"abstract":"Accurate assessment of wet aggregate stability is critical in evaluating soil quality. However, a few general models are used to assess it. In this work, we use the support vector machine to evaluate wet aggregate stability and compare it with a benchmark model based on artificial neural networks. One hundred thirty-four soil samples from various land uses, such as crops, grasslands, and bare land are adopted to verify the effectiveness of the proposed method and confirm the valid input parameters. We select 107 samples for calibrating the prediction model and the rest for evaluation. Experiments show that organic carbon is the main control parameter of wet aggregate stability, although the most influential factors for different land use are various. Comparing the determination coefficient and the root mean square error, it proves that the support vector machine method is superior to the artificial neural network method. In addition, the relative importance analysis shows that contents of organic carbon, silt, and clay are the primary input parameters. Finally, the impact of land use and management types is evaluated.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44522315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of a general complex problem-solving architecture based on task management and predictive optimization 基于任务管理和预测优化的通用复杂问题解决架构的设计
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-06-01 DOI: 10.1177/15501329221107868
Shabir Ahmad, Salman Khan, Faisal Jamil, Faiza Qayyum, Abid Ali, Do-Hyeun Kim
Many real-life problems have different contradicting goals and no simple solution. Therefore, an analysis is made to select the appropriate solution based on the scenario, which is considered the best compromise toward the achievement of a goal. In literature, it is known as complex problem-solving and is a kind of paradigm that has been around since the last century, but the cognition involved in complex problem-solving has purely relied on experts in the field. However, with the evolution of the current stack of technologies such as artificial intelligence and the Internet of Things, it is quite possible to perform the cognition process with the help of machines based on the previously-trained historical data. Our previous work proposed the complex problem-solving as a service for smart cities. In this article, we extend this work and propose a generic architecture for complex problem-solving using task orchestration and predictive optimization in Internet of Things–enabled generic smart space. The proposed framework makes use of historical data for artificial cognition of the complexity of the given problem. For this, predictive optimization is used, which identifies the problem and intelligently predict the solution based on the given constraints. The task orchestration architecture is used to decompose the complex problem into small tasks for real-world deployment into sensors and actuators. The architecture is evaluated against different load conditions and different categories of problems, and the results suggest that the proposed architecture can be used a commonplace for different smart space solutions.
许多现实生活中的问题都有不同的矛盾目标,没有简单的解决方案。因此,我们会根据场景进行分析,选择合适的解决方案,这被认为是实现目标的最佳折衷方案。在文献中,它被称为复杂问题解决,是一种自上个世纪以来一直存在的范式,但复杂问题解决所涉及的认知完全依赖于该领域的专家。然而,随着人工智能和物联网等当前技术的发展,基于先前训练的历史数据,在机器的帮助下进行认知过程是相当可能的。我们之前的工作提出了将复杂的问题解决作为智能城市的服务。在本文中,我们扩展了这项工作,并提出了一种通用架构,用于在物联网通用智能空间中使用任务编排和预测优化来解决复杂问题。所提出的框架利用历史数据对给定问题的复杂性进行人工认知。为此,使用了预测优化,它识别问题并根据给定的约束智能地预测解决方案。任务编排架构用于将复杂问题分解为小任务,以便在现实世界中部署到传感器和执行器中。针对不同的负载条件和不同类别的问题对该架构进行了评估,结果表明,所提出的架构可以用于不同的智能空间解决方案。
{"title":"Design of a general complex problem-solving architecture based on task management and predictive optimization","authors":"Shabir Ahmad, Salman Khan, Faisal Jamil, Faiza Qayyum, Abid Ali, Do-Hyeun Kim","doi":"10.1177/15501329221107868","DOIUrl":"https://doi.org/10.1177/15501329221107868","url":null,"abstract":"Many real-life problems have different contradicting goals and no simple solution. Therefore, an analysis is made to select the appropriate solution based on the scenario, which is considered the best compromise toward the achievement of a goal. In literature, it is known as complex problem-solving and is a kind of paradigm that has been around since the last century, but the cognition involved in complex problem-solving has purely relied on experts in the field. However, with the evolution of the current stack of technologies such as artificial intelligence and the Internet of Things, it is quite possible to perform the cognition process with the help of machines based on the previously-trained historical data. Our previous work proposed the complex problem-solving as a service for smart cities. In this article, we extend this work and propose a generic architecture for complex problem-solving using task orchestration and predictive optimization in Internet of Things–enabled generic smart space. The proposed framework makes use of historical data for artificial cognition of the complexity of the given problem. For this, predictive optimization is used, which identifies the problem and intelligently predict the solution based on the given constraints. The task orchestration architecture is used to decompose the complex problem into small tasks for real-world deployment into sensors and actuators. The architecture is evaluated against different load conditions and different categories of problems, and the results suggest that the proposed architecture can be used a commonplace for different smart space solutions.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46559617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Deep learning–based resource allocation for secure transmission in a non-orthogonal multiple access network 基于深度学习的非正交多址网络安全传输资源分配
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-06-01 DOI: 10.1177/15501329221104330
Miao Zhang, Yao Zhang, Q. Cen, Shixun Wu
Machine learning techniques, especially deep learning algorithms have been widely utilized to deal with different kinds of research problems in wireless communications. In this article, we investigate the secrecy rate maximization problem in a non-orthogonal multiple access network based on deep learning approach. In this non-orthogonal multiple access network, the base station intends to transmit two integrated information: a confidential information to user 1 (the strong user) and a broadcast information to user 1 and user 2. In addition, there exists an eavesdropper that intends to decode the confidential information due to the broadcast nature of radio waves. Hence, we formulate the optimization problem as a secrecy rate maximization problem. We first solve this problem by employing convex optimization technique, then we generate the training, validation, and test dataset. We propose a deep neural network–based approach to learn to optimize the resource allocations. The advantages of the proposed deep neural network are the capabilities to achieve low complexity and latency resource allocations. Simulation results are provided to show that the proposed deep neural network approach is capable of reaching near-optimal secrecy rate performance with significantly reduced computational time, when compared with the benchmark conventional approach.
机器学习技术,特别是深度学习算法已被广泛应用于无线通信领域的各种研究问题。在本文中,我们研究了基于深度学习方法的非正交多址网络中的保密率最大化问题。在这种非正交多址网络中,基站打算向用户1(强用户)传输机密信息和向用户1和用户2传输广播信息两种综合信息。此外,由于无线电波的广播性质,存在意图解码机密信息的窃听者。因此,我们将优化问题表述为保密率最大化问题。我们首先采用凸优化技术来解决这个问题,然后生成训练、验证和测试数据集。我们提出了一种基于深度神经网络的方法来学习优化资源分配。所提出的深度神经网络的优点是能够实现低复杂度和延迟的资源分配。仿真结果表明,与基准的传统方法相比,所提出的深度神经网络方法能够在显著减少计算时间的同时达到接近最优的保密率性能。
{"title":"Deep learning–based resource allocation for secure transmission in a non-orthogonal multiple access network","authors":"Miao Zhang, Yao Zhang, Q. Cen, Shixun Wu","doi":"10.1177/15501329221104330","DOIUrl":"https://doi.org/10.1177/15501329221104330","url":null,"abstract":"Machine learning techniques, especially deep learning algorithms have been widely utilized to deal with different kinds of research problems in wireless communications. In this article, we investigate the secrecy rate maximization problem in a non-orthogonal multiple access network based on deep learning approach. In this non-orthogonal multiple access network, the base station intends to transmit two integrated information: a confidential information to user 1 (the strong user) and a broadcast information to user 1 and user 2. In addition, there exists an eavesdropper that intends to decode the confidential information due to the broadcast nature of radio waves. Hence, we formulate the optimization problem as a secrecy rate maximization problem. We first solve this problem by employing convex optimization technique, then we generate the training, validation, and test dataset. We propose a deep neural network–based approach to learn to optimize the resource allocations. The advantages of the proposed deep neural network are the capabilities to achieve low complexity and latency resource allocations. Simulation results are provided to show that the proposed deep neural network approach is capable of reaching near-optimal secrecy rate performance with significantly reduced computational time, when compared with the benchmark conventional approach.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43185229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel ambiguity resolution model of BeiDou navigation satellite system/inertial navigation system tightly coupled for kinematic-to-kinematic precise relative positioning 一种新型的北斗卫星导航系统/惯性导航系统紧耦合的运动-运动精确相对定位模糊度解算模型
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-06-01 DOI: 10.1177/15501329221102734
Ling Wu, Yongrong Sun, Xiyu Fu, Qing-hua Zeng
The carrier-based kinematic-to-kinematic relative positioning can obtain the precise baseline between two moving stations, which greatly expands the application field of dynamic relative positioning. However, the relative positioning performance is degraded greatly with low fixation rate of ambiguity with low-cost receivers. Especially, in the complex dynamic environment, ambiguity resolution effect is influenced by the satellite signal blocked, multipath outlier, and abnormal state prediction. Aiming at the problems, a novel inertial navigation system–aided robust adaptive filtering ambiguity resolution model is proposed. In addition, a hierarchical filtering strategy is developed to eliminate ambiguity parameters in BeiDou navigation satellite system/inertial navigation system tightly coupled integrated system. Finally, the precise relative position can be calculated with the “best” ambiguity solution. Both experiments with static data and field vehicle test were carried out to evaluate the algorithm efficiency in different data configurations. The results indicate that IRAFAR-TCRP method can effectively suppress the influence of observation outliers and model prediction abnormalities, which improves the success rate of ambiguity resolution, raises the accuracy as well as the continuity of relative positioning. The success rate of ambiguity resolution with single-frequency BeiDou navigation satellite system can reach 90% in the gross error and abnormal disturbance environments and centimeter-level accuracy can be achieved.
基于载体的运动学到运动学相对定位可以获得两个移动站之间的精确基线,极大地扩展了动态相对定位的应用领域。然而,在低成本接收机中,由于模糊度的固定率低,相对定位性能大大降低。特别是在复杂的动态环境中,卫星信号的阻塞、多径异常和异常状态预测会影响模糊度的解决效果。针对这些问题,提出了一种新的惯性导航系统辅助鲁棒自适应滤波模糊度求解模型。此外,针对北斗卫星导航系统/惯性导航系统紧耦合集成系统中的模糊度参数,提出了一种分层滤波策略。最后,可以使用“最佳”模糊度解来计算精确的相对位置。分别进行了静态数据实验和现场车辆测试,以评估算法在不同数据配置下的效率。结果表明,IRAFAR-TCRP方法可以有效地抑制观测异常值和模型预测异常的影响,提高了模糊度解算的成功率,提高了相对定位的准确性和连续性。单频北斗导航卫星系统在粗误差和异常干扰环境下解模糊成功率可达90%,精度可达厘米级。
{"title":"A novel ambiguity resolution model of BeiDou navigation satellite system/inertial navigation system tightly coupled for kinematic-to-kinematic precise relative positioning","authors":"Ling Wu, Yongrong Sun, Xiyu Fu, Qing-hua Zeng","doi":"10.1177/15501329221102734","DOIUrl":"https://doi.org/10.1177/15501329221102734","url":null,"abstract":"The carrier-based kinematic-to-kinematic relative positioning can obtain the precise baseline between two moving stations, which greatly expands the application field of dynamic relative positioning. However, the relative positioning performance is degraded greatly with low fixation rate of ambiguity with low-cost receivers. Especially, in the complex dynamic environment, ambiguity resolution effect is influenced by the satellite signal blocked, multipath outlier, and abnormal state prediction. Aiming at the problems, a novel inertial navigation system–aided robust adaptive filtering ambiguity resolution model is proposed. In addition, a hierarchical filtering strategy is developed to eliminate ambiguity parameters in BeiDou navigation satellite system/inertial navigation system tightly coupled integrated system. Finally, the precise relative position can be calculated with the “best” ambiguity solution. Both experiments with static data and field vehicle test were carried out to evaluate the algorithm efficiency in different data configurations. The results indicate that IRAFAR-TCRP method can effectively suppress the influence of observation outliers and model prediction abnormalities, which improves the success rate of ambiguity resolution, raises the accuracy as well as the continuity of relative positioning. The success rate of ambiguity resolution with single-frequency BeiDou navigation satellite system can reach 90% in the gross error and abnormal disturbance environments and centimeter-level accuracy can be achieved.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49122256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles 在支持雾的社交车联网中,一种可证明安全且轻量级的相互认证协议
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-06-01 DOI: 10.1177/15501329221104332
Z. Li, Qingkai Miao, Shehzad Ashraf Chaudhry, Chien-Ming Chen
The Internet of vehicles technology has developed rapidly in recent years and has become increasingly important. The social Internet of vehicles provides better resources and services for the development of the Internet of vehicles and provides better experience for users. However, there are still many security problems in social vehicle networking environments. Once the vehicle is networked, the biggest problem is data security according to the three levels of data collection, intelligent analysis, and decision control of the Internet of vehicles. Recently, Wu et al. proposed a lightweight vehicle social network security authentication protocol based on fog nodes. They claimed that their security authentication protocol could resist various attacks. However, we found that their authentication protocols are vulnerable to internal attacks, smart card theft attacks, and lack perfect forward security. In this study, we propose a new protocol to overcome these limitations. Finally, security and performance analyses show that our protocol perfectly overcomes these limitations and exhibits excellent performance and efficiency.
近年来,车联网技术发展迅速,其重要性日益凸显。社交车联网为车联网的发展提供了更好的资源和服务,为用户提供了更好的体验。然而,在社交车联网环境中,仍然存在许多安全问题。一旦车辆联网,从车联网的数据采集、智能分析、决策控制三个层面来看,最大的问题就是数据安全。最近,Wu等人提出了一种基于雾节点的轻型车辆社交网络安全认证协议。他们声称他们的安全认证协议可以抵御各种攻击。然而,我们发现他们的认证协议容易受到内部攻击,智能卡盗窃攻击,并且缺乏完善的前向安全性。在这项研究中,我们提出了一种新的协议来克服这些限制。最后,安全性和性能分析表明,我们的协议完全克服了这些限制,表现出优异的性能和效率。
{"title":"A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles","authors":"Z. Li, Qingkai Miao, Shehzad Ashraf Chaudhry, Chien-Ming Chen","doi":"10.1177/15501329221104332","DOIUrl":"https://doi.org/10.1177/15501329221104332","url":null,"abstract":"The Internet of vehicles technology has developed rapidly in recent years and has become increasingly important. The social Internet of vehicles provides better resources and services for the development of the Internet of vehicles and provides better experience for users. However, there are still many security problems in social vehicle networking environments. Once the vehicle is networked, the biggest problem is data security according to the three levels of data collection, intelligent analysis, and decision control of the Internet of vehicles. Recently, Wu et al. proposed a lightweight vehicle social network security authentication protocol based on fog nodes. They claimed that their security authentication protocol could resist various attacks. However, we found that their authentication protocols are vulnerable to internal attacks, smart card theft attacks, and lack perfect forward security. In this study, we propose a new protocol to overcome these limitations. Finally, security and performance analyses show that our protocol perfectly overcomes these limitations and exhibits excellent performance and efficiency.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47808633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
TEZEM: A new energy-efficient routing protocol for next-generation wireless sensor networks TEZEM:用于下一代无线传感器网络的新型节能路由协议
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-06-01 DOI: 10.1177/15501329221107246
Zain ul Abidin Jaffri, Muhammad Asif, W. U. Khan, Zeeshan Ahmad, Z. Akhtar, Kalim Ullah, Md. Sadek Ali
The design and implementation of energy-efficient routing protocols for next-generation wireless sensor networks is always a challenge due to limited power resource capabilities. Hierarchical (clustering) routing protocols appeared to be a remarkable solution for extending the lifetime of wireless sensor networks, particularly in application-aware (threshold-sensitive) and heterogeneity-aware cluster-based routing protocols. In this article, we propose a protocol, namely, Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol. It is a heterogeneity-aware and threshold-based protocol that provides a better solution to existing problems in next-generation wireless sensor networks. During execution, the Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol splits the entire network area into several zones to manage network traffic efficiently. In the first step, Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol is designed for a homogeneous network where the initial energy of all the nodes is the same. Thereafter, we bring in heterogeneity in the Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol execution environment to optimize its energy consumption. By investigating the performance of the various numbers of divisions, it is proved that the Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol with 9 zonal divisions has higher stability and throughput. The performance of the proposed Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol is compared with those of Stable Election Protocol, Low-Energy Adaptive Clustering Hierarchy, Modified Low-Energy Adaptive Clustering Hierarchy, and Gateway-Based Energy-Efficient Routing Protocol through computer simulations. Simulation results verify the improved performance of the proposed Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol in terms of network stability, lifetime, and throughput.
由于功率资源能力有限,下一代无线传感器网络的节能路由协议的设计和实现始终是一个挑战。分层(集群)路由协议似乎是延长无线传感器网络寿命的一个显著解决方案,特别是在应用感知(阈值敏感)和异构感知的基于集群的路由协议中。在本文中,我们提出了一种协议,即基于阈值的能量感知区域效率测量分层路由协议。它是一种异构感知和基于阈值的协议,为下一代无线传感器网络中的现有问题提供了更好的解决方案。在执行过程中,基于阈值的能量感知区域效率测量分层路由协议将整个网络区域划分为几个区域,以有效地管理网络流量。在第一步中,针对所有节点的初始能量相同的同构网络,设计了基于阈值的能量感知区域效率测量分层路由协议。然后,我们在基于阈值的能量感知区域效率测量分层路由协议执行环境中引入异构性,以优化其能耗。通过研究不同分区数的性能,证明了基于阈值的能量感知分区效率测量分层路由协议具有更高的稳定性和吞吐量。通过计算机仿真,将所提出的基于阈值的能量感知区域效率测量分层路由协议的性能与稳定选择协议、低能量自适应聚类层次结构、改进的低能量自适应集群层次结构和基于网关的能量高效路由协议进行了比较。仿真结果验证了所提出的基于阈值的能量感知区域效率测量分层路由协议在网络稳定性、寿命和吞吐量方面的改进性能。
{"title":"TEZEM: A new energy-efficient routing protocol for next-generation wireless sensor networks","authors":"Zain ul Abidin Jaffri, Muhammad Asif, W. U. Khan, Zeeshan Ahmad, Z. Akhtar, Kalim Ullah, Md. Sadek Ali","doi":"10.1177/15501329221107246","DOIUrl":"https://doi.org/10.1177/15501329221107246","url":null,"abstract":"The design and implementation of energy-efficient routing protocols for next-generation wireless sensor networks is always a challenge due to limited power resource capabilities. Hierarchical (clustering) routing protocols appeared to be a remarkable solution for extending the lifetime of wireless sensor networks, particularly in application-aware (threshold-sensitive) and heterogeneity-aware cluster-based routing protocols. In this article, we propose a protocol, namely, Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol. It is a heterogeneity-aware and threshold-based protocol that provides a better solution to existing problems in next-generation wireless sensor networks. During execution, the Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol splits the entire network area into several zones to manage network traffic efficiently. In the first step, Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol is designed for a homogeneous network where the initial energy of all the nodes is the same. Thereafter, we bring in heterogeneity in the Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol execution environment to optimize its energy consumption. By investigating the performance of the various numbers of divisions, it is proved that the Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol with 9 zonal divisions has higher stability and throughput. The performance of the proposed Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol is compared with those of Stable Election Protocol, Low-Energy Adaptive Clustering Hierarchy, Modified Low-Energy Adaptive Clustering Hierarchy, and Gateway-Based Energy-Efficient Routing Protocol through computer simulations. Simulation results verify the improved performance of the proposed Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol in terms of network stability, lifetime, and throughput.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42122763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis of relay selection schemes in underlay cognitive radio non-orthogonal multiple access networks 底层认知无线电非正交多址网络中继选择方案分析
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-05-01 DOI: 10.1177/15501477211066304
Dongmei Yang, Cheng Li, Baoquan Ren, Hongjun Li, K. Guo
This article investigates the impacts of relay selection schemes on cooperative underlay cognitive radio non-orthogonal multiple access networks, where the partial relay selection scheme, the max–min relay selection scheme and the two-stage relay selection scheme are applied in the network. Moreover, decode-and-forward protocol is used at the transmission relays. What’s more, in order to show the effect of the schemes on the considered network, the closed-form expressions and asymptotic expressions for the outage probability of the system are derived. Furthermore, the outage performance under the effect of perfect and imperfect successive interference cancellation is analysed. Numerical results are given to illustrate the impacts of the relay selection schemes, the number of relays, the residual interference factor and the power allocation factor on the outage performance. Finally, Monte Carlo simulations are presented to validate the accuracy of the numerical results.
本文研究了中继选择方案对协同底层认知无线电非正交多址网络的影响,该网络采用部分中继选择方案、最大最小中继选择方案和两级中继选择方案。此外,在传输中继上使用译码转发协议。此外,为了说明各方案对所考虑的网络的影响,导出了系统中断概率的封闭表达式和渐近表达式。进一步分析了完全和不完全连续干扰对消作用下的中断性能。数值结果说明了继电器选择方案、继电器个数、剩余干扰因数和功率分配因数对停电性能的影响。最后通过蒙特卡罗仿真验证了数值结果的准确性。
{"title":"Analysis of relay selection schemes in underlay cognitive radio non-orthogonal multiple access networks","authors":"Dongmei Yang, Cheng Li, Baoquan Ren, Hongjun Li, K. Guo","doi":"10.1177/15501477211066304","DOIUrl":"https://doi.org/10.1177/15501477211066304","url":null,"abstract":"This article investigates the impacts of relay selection schemes on cooperative underlay cognitive radio non-orthogonal multiple access networks, where the partial relay selection scheme, the max–min relay selection scheme and the two-stage relay selection scheme are applied in the network. Moreover, decode-and-forward protocol is used at the transmission relays. What’s more, in order to show the effect of the schemes on the considered network, the closed-form expressions and asymptotic expressions for the outage probability of the system are derived. Furthermore, the outage performance under the effect of perfect and imperfect successive interference cancellation is analysed. Numerical results are given to illustrate the impacts of the relay selection schemes, the number of relays, the residual interference factor and the power allocation factor on the outage performance. Finally, Monte Carlo simulations are presented to validate the accuracy of the numerical results.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46790143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-sensor fusion algorithm in cooperative vehicle-infrastructure system for blind spot warning 用于盲点预警的协同车辆基础设施系统中的多传感器融合算法
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-05-01 DOI: 10.1177/15501329221100412
Chao Xiang, Li Zhang, Xiaopo Xie, Longgang Zhao, Xin Ke, Zhendong Niu, Feng Wang
With the rapid development of electric vehicles and artificial intelligence technology, the automatic driving industry has entered a rapid development stage. However, there is a risk of traffic accidents due to the blind spot of vision, whether autonomous vehicles or traditional vehicles. In this article, a multi-sensor fusion perception method is proposed, in which the semantic information from the camera and the range information from the LiDAR are fused at the data layer and the LiDAR point cloud containing semantic information is clustered to obtain the type and location information of the objects. Based on the sensor equipments deployed on the roadside, the sensing information processed by the fusion method is sent to the nearby vehicles in real-time through 5G and V2X technology for blind spot early warning, and its feasibility is verified by experiments and simulations. The blind spot warning scheme based on roadside multi-sensor fusion perception proposed in this article has been experimentally verified in the closed park, which can obviously reduce the traffic accidents caused by the blind spot of vision, and is of great significance to improve traffic safety.
随着电动汽车和人工智能技术的快速发展,自动驾驶行业进入了快速发展阶段。然而,无论是自动驾驶汽车还是传统汽车,由于视觉盲点都存在交通事故的风险。本文提出了一种多传感器融合感知方法,在数据层融合来自相机的语义信息和来自激光雷达的距离信息,并对包含语义信息的激光雷达点云进行聚类,以获得物体的类型和位置信息。基于部署在路边的传感器设备,通过5G和V2X技术将融合方法处理后的传感信息实时发送给附近车辆进行盲点预警,并通过实验和仿真验证了其可行性。本文提出的基于路边多传感器融合感知的盲点预警方案已在封闭式公园中进行了实验验证,可以明显减少由视觉盲点引起的交通事故,对提高交通安全具有重要意义。
{"title":"Multi-sensor fusion algorithm in cooperative vehicle-infrastructure system for blind spot warning","authors":"Chao Xiang, Li Zhang, Xiaopo Xie, Longgang Zhao, Xin Ke, Zhendong Niu, Feng Wang","doi":"10.1177/15501329221100412","DOIUrl":"https://doi.org/10.1177/15501329221100412","url":null,"abstract":"With the rapid development of electric vehicles and artificial intelligence technology, the automatic driving industry has entered a rapid development stage. However, there is a risk of traffic accidents due to the blind spot of vision, whether autonomous vehicles or traditional vehicles. In this article, a multi-sensor fusion perception method is proposed, in which the semantic information from the camera and the range information from the LiDAR are fused at the data layer and the LiDAR point cloud containing semantic information is clustered to obtain the type and location information of the objects. Based on the sensor equipments deployed on the roadside, the sensing information processed by the fusion method is sent to the nearby vehicles in real-time through 5G and V2X technology for blind spot early warning, and its feasibility is verified by experiments and simulations. The blind spot warning scheme based on roadside multi-sensor fusion perception proposed in this article has been experimentally verified in the closed park, which can obviously reduce the traffic accidents caused by the blind spot of vision, and is of great significance to improve traffic safety.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41474409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
International Journal of Distributed Sensor Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1