首页 > 最新文献

Telecommunication Systems最新文献

英文 中文
Distributed neuro-fuzzy routing for energy-efficient IoT smart city applications in WSN 面向 WSN 中高能效物联网智慧城市应用的分布式神经模糊路由选择
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-13 DOI: 10.1007/s11235-024-01195-6
S. Jeevanantham, C. Venkatesan, B. Rebekka

Wireless sensor networks (WSNs) enable seamless data gathering and communication, facilitating efficient and real-time decision-making in IoT monitoring applications. However, the energy required to maintain communication in WSN-based IoT networks poses significant challenges, such as packet loss, packet drop, and rapid energy depletion. These issues reduce network life and performance, increasing the risk of delayed packet delivery. To address these challenges, this work presents a novel energy-efficient distributed neuro-fuzzy routing model executed in two stages to enhance communication efficiency and energy management in WSN-based IoT applications. In the first stage, nodes with high energy levels are predicted using a fusion of distributed learning with neural networks and fuzzy logic. In the second stage, clustering and routing are performed based on the predicted eligible nodes, incorporating thresholds for energy and distance with two combined metrics. The cluster head (CH) combined metric optimizes cluster head selection, while the next-hop combined metric facilitates efficient multi-hop communication. Extensive simulation results demonstrate that the proposed model significantly enhances network lifetime compared to EANFR, RBFNN T2F, and TTDFP by 9.48%, 25%, and 31.5%, respectively.

无线传感器网络(WSN)实现了无缝数据收集和通信,有助于在物联网监控应用中做出高效和实时的决策。然而,在基于 WSN 的物联网网络中,维持通信所需的能量带来了巨大挑战,如数据包丢失、数据包丢弃和能量快速耗尽。这些问题降低了网络寿命和性能,增加了数据包延迟交付的风险。为应对这些挑战,本研究提出了一种新型高能效分布式神经模糊路由模型,该模型分两个阶段执行,以提高基于 WSN 的物联网应用中的通信效率和能源管理。在第一阶段,利用神经网络和模糊逻辑的分布式学习融合来预测高能量节点。在第二阶段,根据预测的合格节点进行聚类和路由选择,将能量和距离的阈值与两个综合指标结合起来。簇头(CH)组合指标优化了簇头选择,而下一跳组合指标则促进了有效的多跳通信。大量仿真结果表明,与 EANFR、RBFNN T2F 和 TTDFP 相比,所提出的模型能显著提高网络寿命,分别提高 9.48%、25% 和 31.5%。
{"title":"Distributed neuro-fuzzy routing for energy-efficient IoT smart city applications in WSN","authors":"S. Jeevanantham, C. Venkatesan, B. Rebekka","doi":"10.1007/s11235-024-01195-6","DOIUrl":"https://doi.org/10.1007/s11235-024-01195-6","url":null,"abstract":"<p>Wireless sensor networks (WSNs) enable seamless data gathering and communication, facilitating efficient and real-time decision-making in IoT monitoring applications. However, the energy required to maintain communication in WSN-based IoT networks poses significant challenges, such as packet loss, packet drop, and rapid energy depletion. These issues reduce network life and performance, increasing the risk of delayed packet delivery. To address these challenges, this work presents a novel energy-efficient distributed neuro-fuzzy routing model executed in two stages to enhance communication efficiency and energy management in WSN-based IoT applications. In the first stage, nodes with high energy levels are predicted using a fusion of distributed learning with neural networks and fuzzy logic. In the second stage, clustering and routing are performed based on the predicted eligible nodes, incorporating thresholds for energy and distance with two combined metrics. The cluster head (CH) combined metric optimizes cluster head selection, while the next-hop combined metric facilitates efficient multi-hop communication. Extensive simulation results demonstrate that the proposed model significantly enhances network lifetime compared to EANFR, RBFNN T2F, and TTDFP by 9.48%, 25%, and 31.5%, respectively.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"1 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141613743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An enhanced energy and distance based optimized clustering and dynamic adaptive cluster-based routing in software defined vehicular network 软件定义车载网络中基于能量和距离的增强型优化聚类和基于聚类的动态自适应路由选择
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-13 DOI: 10.1007/s11235-024-01194-7
A. Sajithabegam, T. Menakadevi

Software-Defined Vehicular Networks (SDVN) have been established to facilitate secure and adaptable vehicle communication within the dynamic environment of Vehicular Ad-hoc Networks (VANETs). To enhance efficiency, various optimization techniques are employed in cluster-based routing, focusing on reducing energy consumption, improving cluster stability, enhancing throughput, minimizing network overhead, increasing packet delivery ratio, and reducing latency. This work proposes enhancements to dynamic adaptive cluster-based routing to mitigate suboptimal decisions in VANETs. A centralized controller maintains Energy and Distance-Based Clustering and Dynamic Adaptive Cluster-Based Routing (EDBC-DACBR) to optimize VANET clustering and routing. EDBC utilizes energy and distance metrics between vehicles and cluster centres, or Roadside Units (RSUs), for cluster formation. A fitness model identifies Cluster Heads (CH) based on nodes with the highest fitness values, while a Location-Based Fuzzy C-Means (LBFCM) algorithm ensures optimal cluster formation. The resultant CH, chosen for their energy efficiency, stability, and dynamism, are derived by combining the LBFCM with the fitness model. Additionally, DACBR adapts to network variations, such as energy levels, communication distances, and vehicular congestion, to define the shortest path. Simulation-based evaluations demonstrate the effectiveness of the proposed approach, outperforming existing methods such as Learning-Based Cluster-Based Routing (ANFC-QGSOR), Fuzzy-Based Cluster-Based Routing (FCBR), Energy-Efficient-Based Cluster-Based Routing (EEOR), and Hierarchy-Based Cluster-Based Routing (EHCP) in terms of throughput, overhead, packet loss, latency, stability, and network lifetime. Specifically, EDACR achieves a 15% improvement in throughput, reduces network overhead by 20%, increases the packet delivery ratio by 25%, and decreases latency by 30% compared to existing approaches. Furthermore, EDACR enhances network stability, with a 10% reduction in packet loss and a 20% increase in network lifetime. These results highlight the efficacy of EDACR in enhancing the efficiency and reliability of SDVN deployments in dynamic vehicular environments.

软件定义车载网络(Software-Defined Vehicular Networks,SDVN)的建立旨在促进车载 Ad-hoc 网络(Vehicular Ad-hoc Networks,VANETs)动态环境中安全、适应性强的车辆通信。为了提高效率,在基于集群的路由选择中采用了各种优化技术,重点是降低能耗、提高集群稳定性、提高吞吐量、减少网络开销、提高数据包传送率和减少延迟。这项工作提出了对基于集群的动态自适应路由的改进,以减少 VANET 中的次优决策。中央控制器维护基于能量和距离的聚类和动态自适应聚类路由(EDBC-DACBR),以优化 VANET 聚类和路由。EDBC 利用车辆与集群中心或路边装置(RSU)之间的能量和距离指标来组建集群。适配度模型根据具有最高适配度值的节点确定簇头(CH),而基于位置的模糊 C-Means 算法(LBFCM)则确保簇的最佳形成。通过将 LBFCM 与适配度模型相结合,可得出根据能效、稳定性和动态性选择的 CH。此外,DACBR 还能适应能量水平、通信距离和车辆拥堵等网络变化,以确定最短路径。基于仿真的评估证明了所提方法的有效性,在吞吐量、开销、数据包丢失、延迟、稳定性和网络寿命等方面都优于基于学习的集群路由(ANFC-QGSOR)、基于模糊的集群路由(FCBR)、基于能量系数的集群路由(EEOR)和基于层次的集群路由(EHCP)等现有方法。与现有方法相比,EDACR 的吞吐量提高了 15%,网络开销减少了 20%,数据包传送率提高了 25%,延迟减少了 30%。此外,EDACR 还增强了网络稳定性,丢包率降低了 10%,网络寿命延长了 20%。这些结果凸显了 EDACR 在提高动态车辆环境中 SDVN 部署的效率和可靠性方面的功效。
{"title":"An enhanced energy and distance based optimized clustering and dynamic adaptive cluster-based routing in software defined vehicular network","authors":"A. Sajithabegam, T. Menakadevi","doi":"10.1007/s11235-024-01194-7","DOIUrl":"https://doi.org/10.1007/s11235-024-01194-7","url":null,"abstract":"<p>Software-Defined Vehicular Networks (SDVN) have been established to facilitate secure and adaptable vehicle communication within the dynamic environment of Vehicular Ad-hoc Networks (VANETs). To enhance efficiency, various optimization techniques are employed in cluster-based routing, focusing on reducing energy consumption, improving cluster stability, enhancing throughput, minimizing network overhead, increasing packet delivery ratio, and reducing latency. This work proposes enhancements to dynamic adaptive cluster-based routing to mitigate suboptimal decisions in VANETs. A centralized controller maintains Energy and Distance-Based Clustering and Dynamic Adaptive Cluster-Based Routing (EDBC-DACBR) to optimize VANET clustering and routing. EDBC utilizes energy and distance metrics between vehicles and cluster centres, or Roadside Units (RSUs), for cluster formation. A fitness model identifies Cluster Heads (CH) based on nodes with the highest fitness values, while a Location-Based Fuzzy C-Means (LBFCM) algorithm ensures optimal cluster formation. The resultant CH, chosen for their energy efficiency, stability, and dynamism, are derived by combining the LBFCM with the fitness model. Additionally, DACBR adapts to network variations, such as energy levels, communication distances, and vehicular congestion, to define the shortest path. Simulation-based evaluations demonstrate the effectiveness of the proposed approach, outperforming existing methods such as Learning-Based Cluster-Based Routing (ANFC-QGSOR), Fuzzy-Based Cluster-Based Routing (FCBR), Energy-Efficient-Based Cluster-Based Routing (EEOR), and Hierarchy-Based Cluster-Based Routing (EHCP) in terms of throughput, overhead, packet loss, latency, stability, and network lifetime. Specifically, EDACR achieves a 15% improvement in throughput, reduces network overhead by 20%, increases the packet delivery ratio by 25%, and decreases latency by 30% compared to existing approaches. Furthermore, EDACR enhances network stability, with a 10% reduction in packet loss and a 20% increase in network lifetime. These results highlight the efficacy of EDACR in enhancing the efficiency and reliability of SDVN deployments in dynamic vehicular environments.\u0000</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"25 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141613745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel PLS technique for secure ESM based MIMO systems 基于 ESM 的多输入多输出安全系统的新型 PLS 技术
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-11 DOI: 10.1007/s11235-024-01175-w
Ramaprabha Rengaraj, Gunaseelan Konganathan, Lavanya Dhamotharan Loganathan

Multiple-input multiple-output systems with spatial modulation has evolved into an energy efficient and less complex wireless transmission system due to the use of limited radio frequency chains. In this work, a novel physical layer security scheme with enhanced spatial modulation (ESM) and secret key generation using multi-level adaptive threshold binary-coded decimal quantization algorithm is introduced. The proposed method, as SPACESM, enhances spectral efficiency using ESM and achieves confidentiality by adaptively selecting and shuffling the codebook in ESM. For selection of ESM codebook, SPACESM uses physical layer signature called channel signal to noise ratio (SNR) and for shuffling of codebook and rotation of transmit vector, secret key is generated at the transmitter and receiver separately by threshold-based quantization algorithm, which uses channel state information. Adaptive modulation technique selects the modulation order for different SNR. The performance of the proposed method is evaluated in terms of confidentiality, spectral efficiency, and robustness of secret key through MATLAB simulation.The proposed SPACESM technique provides 2 bpcu improvement for both (N_t) = 2 and (N_t) = 4 with M = 64 than the existing SM. Also it provides 3 dB and 4 dB SNR gain than SM for (N_t) = 2 and (N_t) = 4 respectively. Similarly, it provides 2 dB and 4 dB SNR gain than the SMX technique for (N_t) = 2 and (N_t) = 4 respectively. In summary, the proposed method outperforms than the SMX and SM technique in all aspects.

由于使用了有限的无线电频率链,采用空间调制的多输入多输出系统已发展成为一种节能、不太复杂的无线传输系统。本研究采用多级自适应阈值二进制编码十进制量化算法,提出了一种新型物理层安全方案,即增强型空间调制(ESM)和秘钥生成。所提出的 SPACESM 方法利用 ESM 提高了频谱效率,并通过在 ESM 中自适应地选择和洗码来实现保密性。在选择 ESM 编码簿时,SPACESM 使用称为信道信噪比(SNR)的物理层签名;在洗牌编码簿和旋转发送矢量时,发送器和接收器分别使用基于阈值的量化算法生成密钥,该算法使用信道状态信息。自适应调制技术针对不同的信噪比选择调制顺序。通过 MATLAB 仿真,从密钥的保密性、频谱效率和鲁棒性等方面对所提出方法的性能进行了评估。与现有的 SM 相比,所提出的 SPACESM 技术在 M = 64 时为 (N_t) = 2 和 (N_t) = 4 提供了 2 bpcu 的改进。另外,在 (N_t) = 2 和 (N_t) = 4 时,它比 SM 分别提供了 3 分贝和 4 分贝的信噪比增益。同样,在 (N_t) = 2 和 (N_t) = 4 时,它比 SMX 技术分别提供了 2 分贝和 4 分贝的信噪比增益。总之,所提出的方法在各个方面都优于 SMX 和 SM 技术。
{"title":"A novel PLS technique for secure ESM based MIMO systems","authors":"Ramaprabha Rengaraj, Gunaseelan Konganathan, Lavanya Dhamotharan Loganathan","doi":"10.1007/s11235-024-01175-w","DOIUrl":"https://doi.org/10.1007/s11235-024-01175-w","url":null,"abstract":"<p>Multiple-input multiple-output systems with spatial modulation has evolved into an energy efficient and less complex wireless transmission system due to the use of limited radio frequency chains. In this work, a novel physical layer security scheme with enhanced spatial modulation (ESM) and secret key generation using multi-level adaptive threshold binary-coded decimal quantization algorithm is introduced. The proposed method, as SPACESM, enhances spectral efficiency using ESM and achieves confidentiality by adaptively selecting and shuffling the codebook in ESM. For selection of ESM codebook, SPACESM uses physical layer signature called channel signal to noise ratio (SNR) and for shuffling of codebook and rotation of transmit vector, secret key is generated at the transmitter and receiver separately by threshold-based quantization algorithm, which uses channel state information. Adaptive modulation technique selects the modulation order for different SNR. The performance of the proposed method is evaluated in terms of confidentiality, spectral efficiency, and robustness of secret key through MATLAB simulation.The proposed SPACESM technique provides 2 bpcu improvement for both <span>(N_t)</span> = 2 and <span>(N_t)</span> = 4 with <i>M</i> = 64 than the existing SM. Also it provides 3 dB and 4 dB SNR gain than SM for <span>(N_t)</span> = 2 and <span>(N_t)</span> = 4 respectively. Similarly, it provides 2 dB and 4 dB SNR gain than the SMX technique for <span>(N_t)</span> = 2 and <span>(N_t)</span> = 4 respectively. In summary, the proposed method outperforms than the SMX and SM technique in all aspects.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"145 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141613744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DOCA: a UAV-assisted multi-hop D2D resource allocation scheme for 5G and beyond using machine learning DOCA:使用机器学习的 5G 及更先进的无人机辅助多跳 D2D 资源分配方案
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-08 DOI: 10.1007/s11235-024-01186-7
Pradip Kumar Barik, Ashu Dayal Chaurasiya, Raja Datta

Device-to-Device (D2D) relayed communication helps in extending the coverage range of cellular networks. Relay devices support multi-hop D2D communication where two devices are out of the direct D2D range. However, identifying suitable fixed relays in a network is a complex problem that needs a more efficient solution. Relay-assisted communication may also fail due to the non-cooperative nature of the users (draining battery energy for supporting other devices). This paper proposes a UAV (Unmanned Aerial Vehicle)-assisted multi-hop D2D communication scheme that serves more out-of-direct-range D2D users using the dynamic location of the UAVs (drones). Dynamic location of UAVs solves the connectivity issues with many users. We aim at maximizing the achievable throughput of the D2D users for both uplink (users to UAVs) and downlink (UAVs to users) channels simultaneously. An optimization problem is formulated for maximizing throughput subject to interference, power, and bandwidth constraints. The UAV trajectories are predicted for serving the multi-hop D2D users in the system using Neural Network (NN), and thereafter, a novel resource assignment scheme, named Dual Optimal Channel Allocation (DOCA), is proposed. DOCA optimally allocates resource blocks (RBs) for both uplink and downlink channels and ensures that the overall interference caused by resource sharing between cellular and D2D users is minimal. The spectrum efficiency has been achieved by resource sharing between cellular and D2D users. An association matrix is obtained that indicates potential resource-sharing partners of D2D and cellular users. Finally, we show the performance of the proposed technique with regard to throughput improvement, buffer requirement, and churn rate of the system.

设备对设备(D2D)中继通信有助于扩大蜂窝网络的覆盖范围。中继设备支持多跳 D2D 通信,当两个设备不在直接 D2D 范围内时,可以进行多跳 D2D 通信。然而,在网络中识别合适的固定中继器是一个复杂的问题,需要更有效的解决方案。中继辅助通信也可能因用户的不合作性(消耗电池能量以支持其他设备)而失败。本文提出了一种无人飞行器(UAV)辅助多跳 D2D 通信方案,利用无人飞行器(drones)的动态定位为更多直接范围外的 D2D 用户提供服务。无人机的动态定位解决了与众多用户的连接问题。我们的目标是同时最大化 D2D 用户在上行(用户到无人机)和下行(无人机到用户)信道上的可实现吞吐量。在干扰、功率和带宽限制条件下,为实现吞吐量最大化提出了一个优化问题。利用神经网络(NN)预测了无人机为系统中的多跳 D2D 用户提供服务的轨迹,随后提出了一种名为 "双优化信道分配(DOCA)"的新型资源分配方案。DOCA 为上行和下行信道优化分配资源块(RB),确保蜂窝用户和 D2D 用户之间资源共享造成的总体干扰最小。蜂窝用户和 D2D 用户之间的资源共享实现了频谱效率。我们还得到了一个关联矩阵,它指明了 D2D 用户和蜂窝用户的潜在资源共享伙伴。最后,我们展示了所提技术在吞吐量改善、缓冲区需求和系统流失率方面的性能。
{"title":"DOCA: a UAV-assisted multi-hop D2D resource allocation scheme for 5G and beyond using machine learning","authors":"Pradip Kumar Barik, Ashu Dayal Chaurasiya, Raja Datta","doi":"10.1007/s11235-024-01186-7","DOIUrl":"https://doi.org/10.1007/s11235-024-01186-7","url":null,"abstract":"<p><i>Device-to-Device</i> (D2D) relayed communication helps in extending the coverage range of cellular networks. Relay devices support multi-hop D2D communication where two devices are out of the direct D2D range. However, identifying suitable fixed relays in a network is a complex problem that needs a more efficient solution. Relay-assisted communication may also fail due to the non-cooperative nature of the users (draining battery energy for supporting other devices). This paper proposes a UAV (Unmanned Aerial Vehicle)-assisted multi-hop D2D communication scheme that serves more out-of-direct-range D2D users using the dynamic location of the UAVs (drones). Dynamic location of UAVs solves the connectivity issues with many users. We aim at maximizing the achievable throughput of the D2D users for both uplink (users to UAVs) and downlink (UAVs to users) channels simultaneously. An optimization problem is formulated for maximizing throughput subject to interference, power, and bandwidth constraints. The UAV trajectories are predicted for serving the multi-hop D2D users in the system using Neural Network (NN), and thereafter, a novel resource assignment scheme, named Dual Optimal Channel Allocation (DOCA), is proposed. DOCA optimally allocates resource blocks (RBs) for both uplink and downlink channels and ensures that the overall interference caused by resource sharing between cellular and D2D users is minimal. The spectrum efficiency has been achieved by resource sharing between cellular and D2D users. An association matrix is obtained that indicates potential resource-sharing partners of D2D and cellular users. Finally, we show the performance of the proposed technique with regard to throughput improvement, buffer requirement, and churn rate of the system.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"78 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141568669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An anonymous broadcasting system with accountability based on group signatures 基于群体签名的问责匿名广播系统
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-07 DOI: 10.1007/s11235-024-01197-4
Huan Ye, Fagen Li

Advanced anonymous communication schemes have been proposed to protect the privacy of network users, enabling them to communicate anonymously on the Internet. However, this can lead to the issue of misuse of anonymous communication. Most anonymous communication systems lack accountability mechanisms, allowing malicious users to engage in illegal activities on the network without facing consequences. This presents difficulties for maintaining social stability and promoting anonymous communication. To address these challenges, we develop an accountable anonymous broadcast system that combines group signatures and a secret-shared shuffle protocol. This system allows honest users to anonymously publish messages, while the identities of users who publish illegal messages will be exposed. We employ batch verification to reduce the time required for verifying group signatures, which in turn reduces system latency. Finally, we implement the system and conduct performance evaluations to demonstrate its practicality. Compared to previous accountable anonymity mechanisms, our system can directly trace and hold malicious users accountable without compromising the privacy of honest users.

为了保护网络用户的隐私,人们提出了先进的匿名通信方案,使他们能够在互联网上进行匿名通信。然而,这会导致匿名通信被滥用的问题。大多数匿名通信系统缺乏问责机制,使得恶意用户可以在网络上从事非法活动而不承担后果。这给维护社会稳定和促进匿名通信带来了困难。为了应对这些挑战,我们开发了一种结合了组签名和秘密共享洗牌协议的可问责匿名广播系统。该系统允许诚实的用户匿名发布信息,而发布非法信息的用户的身份将被曝光。我们采用批量验证来减少验证组签名所需的时间,从而减少系统延迟。最后,我们实现了系统并进行了性能评估,以证明其实用性。与之前的问责匿名机制相比,我们的系统可以在不损害诚实用户隐私的情况下直接追踪恶意用户并追究其责任。
{"title":"An anonymous broadcasting system with accountability based on group signatures","authors":"Huan Ye, Fagen Li","doi":"10.1007/s11235-024-01197-4","DOIUrl":"https://doi.org/10.1007/s11235-024-01197-4","url":null,"abstract":"<p>Advanced anonymous communication schemes have been proposed to protect the privacy of network users, enabling them to communicate anonymously on the Internet. However, this can lead to the issue of misuse of anonymous communication. Most anonymous communication systems lack accountability mechanisms, allowing malicious users to engage in illegal activities on the network without facing consequences. This presents difficulties for maintaining social stability and promoting anonymous communication. To address these challenges, we develop an accountable anonymous broadcast system that combines group signatures and a secret-shared shuffle protocol. This system allows honest users to anonymously publish messages, while the identities of users who publish illegal messages will be exposed. We employ batch verification to reduce the time required for verifying group signatures, which in turn reduces system latency. Finally, we implement the system and conduct performance evaluations to demonstrate its practicality. Compared to previous accountable anonymity mechanisms, our system can directly trace and hold malicious users accountable without compromising the privacy of honest users.\u0000</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"5 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141568671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Statistical analysis and characterization of signaling and user traffic of a commercial multi-band LTE system 商用多频段 LTE 系统信令和用户流量的统计分析与特征描述
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-05 DOI: 10.1007/s11235-024-01196-5
Cesar Vargas Anamuro, Alberto Blanc, Xavier Lagrange

The fourth-generation (4 G) cellular network is currently the dominant mobile technology used worldwide. The analysis of the network behavior can help forecast the traffic and thus improve the network. The characterization of mobile user behavior can be useful in evaluating the emerging concepts. We collected traffic traces on a commercial multi-band 4 G cell to better understand and model the network and user behavior. We evaluate the network utilization, the number of connections, and the uplink and downlink cell achieved throughput. In addition, we analyze and identify statistical models that describe the connection inter-arrival time, connection duration, and connection size. The results show daily and weekly patterns that depend not only on the time of day but also on the frequency band. We find that the frequency band and time of day have a limited impact on user behavior. On the contrary, the connection inter-arrival time strongly depends on the frequency band.

第四代(4 G)蜂窝网络是目前全球使用的主流移动技术。对网络行为的分析有助于预测流量,从而改进网络。移动用户行为的特征描述有助于评估新兴概念。我们收集了一个商用多频段 4 G 小区的流量轨迹,以便更好地理解网络和用户行为并建立模型。我们评估了网络利用率、连接数以及上行和下行小区的吞吐量。此外,我们还分析并确定了描述连接到达间隔时间、连接持续时间和连接大小的统计模型。结果显示,每天和每周的模式不仅取决于一天中的时间,还取决于频段。我们发现,频段和时间对用户行为的影响有限。相反,连接到达间隔时间与频段密切相关。
{"title":"Statistical analysis and characterization of signaling and user traffic of a commercial multi-band LTE system","authors":"Cesar Vargas Anamuro, Alberto Blanc, Xavier Lagrange","doi":"10.1007/s11235-024-01196-5","DOIUrl":"https://doi.org/10.1007/s11235-024-01196-5","url":null,"abstract":"<p>The fourth-generation (4 G) cellular network is currently the dominant mobile technology used worldwide. The analysis of the network behavior can help forecast the traffic and thus improve the network. The characterization of mobile user behavior can be useful in evaluating the emerging concepts. We collected traffic traces on a commercial multi-band 4 G cell to better understand and model the network and user behavior. We evaluate the network utilization, the number of connections, and the uplink and downlink cell achieved throughput. In addition, we analyze and identify statistical models that describe the connection inter-arrival time, connection duration, and connection size. The results show daily and weekly patterns that depend not only on the time of day but also on the frequency band. We find that the frequency band and time of day have a limited impact on user behavior. On the contrary, the connection inter-arrival time strongly depends on the frequency band.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"22 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141577532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT traffic management using deep learning based on osmotic cloud to edge computing 基于渗透式云到边缘计算的深度学习物联网流量管理
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-05 DOI: 10.1007/s11235-024-01185-8
Zeinab Nazemi Absardi, Reza Javidan

IoT is critical in many application areas, such as smart cities, health care, and surveillance systems. Each application has its own QoS requirements. Dynamic traffic management in an IoT network is essential for optimal load balancing and routing. It also allows applications to achieve their desired level of QoS. Osmotic computing is a paradigm for edge/cloud integration. In this paradigm, to balance the load of the network hosts, the services must migrate from a higher resource-utilized data center to a smaller one. According to the osmotic computing approach, each IoT application could be broken into some Micro-Elements (MELs), and each MEL resides on a resource on the edge or cloud data center. Usually, in an IoT osmotic environment, services must be executed by the edge hosts. Some remaining services must migrate to the cloud data centers if the edge hosts lack computational resources. Therefore, such data migration may produce massive traffic across the network. Moreover, the traffic sometimes must pass through a particular route, which includes some pre-specified nodes, for security or monitoring reasons. The routes must be optimized regarding QoS metrics such as delay, jitter, and packet loss ratio. Therefore, finding an optimal path between the source and the destination MEL is essential. Deep learning can facilitate this process by exploiting the massive routing data to find the optimal routes with pre-specified node(s). For this purpose, this paper proposes a new traffic management algorithm based on a deep RNN model. The algorithm predicts the alternative optimal routes, including the desired node (s), in an IoT osmotic environment. A collection of paths is generated using the minimum-distance maximum-bandwidth routing algorithm to create the dataset. The IoT osmotic environment consists of three main layers: the edge data center, Software-Defined Wide Area Network (SDWAN) infrastructure, and cloud data centers. The proposed traffic management algorithm is implemented in the controller of each layer. The simulation results showed that the osmotic approach increased the energy consumption of the edge devices and reduced the transaction time. Because the data is processed near the user, the flow size of the traffic, which is sent across the network, is reduced. The experimental results also showed that the model could achieve up to 94% accuracy. The model training and prediction time do not affect the application's total running time.

物联网在智能城市、医疗保健和监控系统等许多应用领域都至关重要。每种应用都有自己的 QoS 要求。物联网网络中的动态流量管理对于优化负载平衡和路由选择至关重要。它还能让应用达到所需的 QoS 水平。渗透计算是边缘/云整合的一种模式。在这种模式下,为了平衡网络主机的负载,服务必须从资源利用率较高的数据中心迁移到较小的数据中心。根据渗透计算方法,每个物联网应用都可以分解成一些微元素(MEL),每个微元素都驻留在边缘或云数据中心的资源上。通常,在物联网渗透计算环境中,服务必须由边缘主机执行。如果边缘主机缺乏计算资源,剩余的一些服务必须迁移到云数据中心。因此,这种数据迁移可能会在网络上产生大量流量。此外,出于安全或监控原因,有时流量必须通过特定路由,其中包括一些预先指定的节点。路由必须根据延迟、抖动和丢包率等 QoS 指标进行优化。因此,在源和目的地 MEL 之间找到最佳路径至关重要。深度学习可以通过利用海量路由数据来找到带有预先指定节点的最优路由,从而促进这一过程。为此,本文提出了一种基于深度 RNN 模型的新型流量管理算法。该算法可预测物联网渗透环境中的备选最佳路线,包括所需的节点。使用最小距离最大带宽路由算法生成路径集合,从而创建数据集。物联网渗透环境由三个主要层组成:边缘数据中心、软件定义广域网(SDWAN)基础设施和云数据中心。提出的流量管理算法在每一层的控制器中实施。仿真结果表明,渗透法增加了边缘设备的能耗,缩短了交易时间。由于数据是在用户附近处理的,因此减少了跨网络发送的流量大小。实验结果还显示,该模型的准确率高达 94%。模型的训练和预测时间不会影响应用程序的总运行时间。
{"title":"IoT traffic management using deep learning based on osmotic cloud to edge computing","authors":"Zeinab Nazemi Absardi, Reza Javidan","doi":"10.1007/s11235-024-01185-8","DOIUrl":"https://doi.org/10.1007/s11235-024-01185-8","url":null,"abstract":"<p>IoT is critical in many application areas, such as smart cities, health care, and surveillance systems. Each application has its own QoS requirements. Dynamic traffic management in an IoT network is essential for optimal load balancing and routing. It also allows applications to achieve their desired level of QoS. Osmotic computing is a paradigm for edge/cloud integration. In this paradigm, to balance the load of the network hosts, the services must migrate from a higher resource-utilized data center to a smaller one. According to the osmotic computing approach, each IoT application could be broken into some Micro-Elements (MELs), and each MEL resides on a resource on the edge or cloud data center. Usually, in an IoT osmotic environment, services must be executed by the edge hosts. Some remaining services must migrate to the cloud data centers if the edge hosts lack computational resources. Therefore, such data migration may produce massive traffic across the network. Moreover, the traffic sometimes must pass through a particular route, which includes some pre-specified nodes, for security or monitoring reasons. The routes must be optimized regarding QoS metrics such as delay, jitter, and packet loss ratio. Therefore, finding an optimal path between the source and the destination MEL is essential. Deep learning can facilitate this process by exploiting the massive routing data to find the optimal routes with pre-specified node(s). For this purpose, this paper proposes a new traffic management algorithm based on a deep RNN model. The algorithm predicts the alternative optimal routes, including the desired node (s), in an IoT osmotic environment. A collection of paths is generated using the minimum-distance maximum-bandwidth routing algorithm to create the dataset. The IoT osmotic environment consists of three main layers: the edge data center, Software-Defined Wide Area Network (SDWAN) infrastructure, and cloud data centers. The proposed traffic management algorithm is implemented in the controller of each layer. The simulation results showed that the osmotic approach increased the energy consumption of the edge devices and reduced the transaction time. Because the data is processed near the user, the flow size of the traffic, which is sent across the network, is reduced. The experimental results also showed that the model could achieve up to 94% accuracy. The model training and prediction time do not affect the application's total running time.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"42 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141568670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LoRa interference issues and solution approaches in dense IoT networks: a review 密集物联网网络中的 LoRa 干扰问题和解决方法:综述
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-03 DOI: 10.1007/s11235-024-01192-9
B. Shilpa, Hari Prabhat Gupta, Rajesh Kumar Jha, Syed Shakeel Hashmi

Low Power Wide Area Networks (LPWAN) are prominent option of wireless communication technology for dense Internet of Things (IoT) applications. With a growing population of resource-constrained IoT devices, meeting various communication requirements in dynamic and dense wireless networks has become a significant problem. Long Range (LoRa) was designed for LPWAN, which features long-distance communication, low-power consumption, and simultaneous transmission of multiple end devices. However, LoRa deployment in dense IoT networks facing several challenges like interference, scalability, security, and reliability. In recent times numerous techniques have been developed for interference mitigation. As these techniques used a range of methodologies to address the interference challenge, it is necessary to thoroughly analyze current solutions. This paper presents a comprehensive overview of the existing literature on interference issues and the solution approaches in LoRa. Initially, the challenges in dense IoT networks are discussed. We next present the fundamentals of LoRa and the classification of interference in the different categories. In each type of interference, the available methodologies are categorized based on their solution approaches. The analysis of different solution approaches is summarized by examining various issues of the LoRa network. Finally, the open issues and future directions related to the interference in the LoRa network are discussed.

低功耗广域网(LPWAN)是高密度物联网(IoT)应用中无线通信技术的重要选择。随着资源受限的物联网设备日益增多,在动态和密集的无线网络中满足各种通信要求已成为一个重大问题。长距离(LoRa)是专为 LPWAN 设计的,具有长距离通信、低功耗和多终端设备同时传输的特点。然而,LoRa 在密集物联网网络中的部署面临着干扰、可扩展性、安全性和可靠性等诸多挑战。近来,人们开发了许多用于缓解干扰的技术。由于这些技术采用了一系列方法来应对干扰挑战,因此有必要对当前的解决方案进行全面分析。本文全面概述了有关 LoRa 干扰问题和解决方法的现有文献。首先,我们讨论了密集物联网网络面临的挑战。接下来,我们介绍了 LoRa 的基本原理以及不同类别干扰的分类。在每种干扰类型中,根据其解决方法对现有方法进行分类。通过研究 LoRa 网络的各种问题,总结了对不同解决方法的分析。最后,讨论了与 LoRa 网络干扰有关的开放问题和未来方向。
{"title":"LoRa interference issues and solution approaches in dense IoT networks: a review","authors":"B. Shilpa, Hari Prabhat Gupta, Rajesh Kumar Jha, Syed Shakeel Hashmi","doi":"10.1007/s11235-024-01192-9","DOIUrl":"https://doi.org/10.1007/s11235-024-01192-9","url":null,"abstract":"<p>Low Power Wide Area Networks (LPWAN) are prominent option of wireless communication technology for dense Internet of Things (IoT) applications. With a growing population of resource-constrained IoT devices, meeting various communication requirements in dynamic and dense wireless networks has become a significant problem. Long Range (LoRa) was designed for LPWAN, which features long-distance communication, low-power consumption, and simultaneous transmission of multiple end devices. However, LoRa deployment in dense IoT networks facing several challenges like interference, scalability, security, and reliability. In recent times numerous techniques have been developed for interference mitigation. As these techniques used a range of methodologies to address the interference challenge, it is necessary to thoroughly analyze current solutions. This paper presents a comprehensive overview of the existing literature on interference issues and the solution approaches in LoRa. Initially, the challenges in dense IoT networks are discussed. We next present the fundamentals of LoRa and the classification of interference in the different categories. In each type of interference, the available methodologies are categorized based on their solution approaches. The analysis of different solution approaches is summarized by examining various issues of the LoRa network. Finally, the open issues and future directions related to the interference in the LoRa network are discussed.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"30 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141525443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Post-quantum framework for authorized and secure communication in multi-server networking 多服务器网络中授权和安全通信的后量子框架
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-02 DOI: 10.1007/s11235-024-01190-x
Komal Pursharthi, Dheerendra Mishra

Multi-server authentication, called single sign-on, enables users to easily access the necessary services from multiple servers with a single registration. Users generally hesitate to sign up individually with each service provider due to the challenge of remembering numerous credentials and trust. Through real-time consumer validation on a public channel, the multi-server authentication allows speedy access to services. Several multi-server authentication techniques have been introduced. However, the existing efficient and robust authenticated key exchange (AKE) schemes are not secure against quantum attacks as they are constructed on traditional cryptographic primitives, integer factorization, and discrete log problems. Due to the advent of scalable quantum computers, these schemes will be breakable as per the application of Shor’s algorithm. To address this issue, we propose a quantum secure ring learning with error based AKE mechanism for multi-server networking to establish a secure connection between users and multiple servers. Our suggested technique provides robust mutual authentication and fulfils the desired security attributes, as presented by the rigorous security analysis in the random oracle model. Additionally, we demonstrate a detailed comparative analysis with other AKE schemes currently in practice for multi-server environments to describe further our proposed scheme’s increased efficiency and quantum security.

多服务器身份验证被称为单点登录,它使用户只需一次注册就能轻松访问多个服务器上的必要服务。由于难以记住众多凭据和信任,用户通常不愿在每个服务提供商处单独注册。多服务器身份验证通过在公共通道上对消费者进行实时验证,可以快速访问服务。目前已经推出了几种多服务器身份验证技术。然而,现有的高效、稳健的认证密钥交换(AKE)方案并不能安全地抵御量子攻击,因为这些方案是基于传统加密原语、整数因式分解和离散对数问题构建的。由于可扩展量子计算机的出现,这些方案将可根据肖尔算法的应用而被破解。为了解决这个问题,我们提出了一种基于错误的量子安全环学习 AKE 机制,用于多服务器网络,在用户和多个服务器之间建立安全连接。根据随机甲骨文模型的严格安全分析,我们建议的技术可提供稳健的相互验证,并满足所需的安全属性。此外,我们还展示了与目前用于多服务器环境的其他 AKE 方案的详细比较分析,以进一步说明我们提出的方案提高了效率和量子安全性。
{"title":"Post-quantum framework for authorized and secure communication in multi-server networking","authors":"Komal Pursharthi, Dheerendra Mishra","doi":"10.1007/s11235-024-01190-x","DOIUrl":"https://doi.org/10.1007/s11235-024-01190-x","url":null,"abstract":"<p>Multi-server authentication, called single sign-on, enables users to easily access the necessary services from multiple servers with a single registration. Users generally hesitate to sign up individually with each service provider due to the challenge of remembering numerous credentials and trust. Through real-time consumer validation on a public channel, the multi-server authentication allows speedy access to services. Several multi-server authentication techniques have been introduced. However, the existing efficient and robust authenticated key exchange (AKE) schemes are not secure against quantum attacks as they are constructed on traditional cryptographic primitives, integer factorization, and discrete log problems. Due to the advent of scalable quantum computers, these schemes will be breakable as per the application of Shor’s algorithm. To address this issue, we propose a quantum secure ring learning with error based AKE mechanism for multi-server networking to establish a secure connection between users and multiple servers. Our suggested technique provides robust mutual authentication and fulfils the desired security attributes, as presented by the rigorous security analysis in the random oracle model. Additionally, we demonstrate a detailed comparative analysis with other AKE schemes currently in practice for multi-server environments to describe further our proposed scheme’s increased efficiency and quantum security.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"37 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141525442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of LDPC-coded power series MIMO/FSO link with hybrid-SIM based on machine learning in satellite downlink for 5G and beyond applications 基于机器学习的卫星下行链路 LDPC 编码功率串联 MIMO/FSO 链路与混合-SIM 的优化,用于 5G 及其他应用
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-01 DOI: 10.1007/s11235-024-01178-7
Dheeraj Dubey, Yogendra Kumar Prajapati, Rajeev Tripathi

This study presents a thorough evaluation of satellite downlink performance in a Free Space Optics (FSO) system with a Low-Density-Parity-Check (LDPC) based Multiple-Input-Multiple-Output (MIMO) configuration. Atmospheric turbulence is characterized using a generalized K-distribution and a negative exponential distribution, with specified parameters. Key performance metrics including Bit Error Rate (BER), outage probability, and accuracy are measured. To address pointing-errors (PEs) and atmospheric turbulence (AT), a novel decoding methodology for Non-Recursive Convolutional Polynomial Encoding (NRCPE)-based Pulse Position Modulation (PPM)-Gaussian Minimum Shift Keying (GMSK)-modulated FSO transmissions is introduced, leveraging Support Vector Machines (SVM). The study introduces a sophisticated Meijer-G function for MIMO statistical analysis and proposes a power series-based Probability Density Function (PDF) with non-recursive GMSK modulation. This PDF allows closed-form derivation of BER and Outage Probability expressions, showcasing improved MIMO link performance in the presence of PEs and AT. Simulations validate the models, offering insights into their effectiveness across varying turbulence levels. The findings assist FSO-MIMO designers in minimizing PEs,AT and achieving optimal results.Subsequently, authors perform a suppression to BER, Particularly, the optimum beam width factors for (left{ptimes q|1times 2times 2, & 2times 3right}), diversity degrees by a (left{ptimes q|1times 1right}), as a reference are 81.24%, 87.32%, and 89.61%, respectively, at ({varepsilon }_{nj}=4.02) and ({I}_{o}=10text{ dBm}).The proposed MIMO/FSO provides accuracy and an irradiances gain of 13.34dBm,i.e.,({varepsilon }_{nj}=5.03) at BER ({10}^{-9}) for downlink satellite transmission over SIMO and SISO FSO links. This study provides a comprehensive framework for optimizing FSO communication systems, considering atmospheric turbulence and pointing errors.

本研究对自由空间光学(FSO)系统中的卫星下行链路性能进行了全面评估,该系统采用基于低密度奇偶校验(LDPC)的多输入多输出(MIMO)配置。大气湍流的特征采用广义 K 分布和负指数分布,并指定了参数。测量的关键性能指标包括比特误码率(BER)、中断概率和精度。为解决定点误码(PE)和大气湍流(AT)问题,利用支持向量机(SVM)为基于非递归卷积多项式编码(NRCPE)的脉冲位置调制(PPM)-高斯最小移位键控(GMSK)调制 FSO 传输引入了一种新型解码方法。研究为 MIMO 统计分析引入了复杂的 Meijer-G 函数,并提出了基于功率序列的非递归 GMSK 调制概率密度函数 (PDF)。利用该概率密度函数可以闭式推导出误码率和中断概率表达式,展示了在存在PE和AT的情况下MIMO链路性能的改善。仿真验证了这些模型,深入了解了它们在不同湍流水平下的有效性。这些发现有助于FSO-MIMO设计人员最大限度地减少PEs、AT并获得最佳结果。随后,作者对误码率进行了抑制,特别是,以(left{ptimes q|1times 2times 2, & 2times 3right})的最佳波束宽度系数、以(left{ptimes q|1times 1right})的分集度作为参考,分别为81.在 ({varepsilon }_{nj}=4.02) 和 ({I}_{o}=10text{ dBm}) 条件下,提议的 MIMO/FSO 提供了 13.34dBm 的精度和辐照增益,即、在误码率为({10}^{-9})的情况下,所提出的MIMO/FSO为SIMO和SISO FSO链路的下行卫星传输提供了精确度和13.34dBm的辐照增益,即({varepsilon }_{nj}=5.03)。这项研究为优化 FSO 通信系统提供了一个考虑到大气湍流和指向误差的综合框架。
{"title":"Optimization of LDPC-coded power series MIMO/FSO link with hybrid-SIM based on machine learning in satellite downlink for 5G and beyond applications","authors":"Dheeraj Dubey, Yogendra Kumar Prajapati, Rajeev Tripathi","doi":"10.1007/s11235-024-01178-7","DOIUrl":"https://doi.org/10.1007/s11235-024-01178-7","url":null,"abstract":"<p>This study presents a thorough evaluation of satellite downlink performance in a Free Space Optics (FSO) system with a Low-Density-Parity-Check (LDPC) based Multiple-Input-Multiple-Output (MIMO) configuration. Atmospheric turbulence is characterized using a generalized K-distribution and a negative exponential distribution, with specified parameters. Key performance metrics including Bit Error Rate (BER), outage probability, and accuracy are measured. To address pointing-errors (PEs) and atmospheric turbulence (AT), a novel decoding methodology for Non-Recursive Convolutional Polynomial Encoding (NRCPE)-based Pulse Position Modulation (PPM)-Gaussian Minimum Shift Keying (GMSK)-modulated FSO transmissions is introduced, leveraging Support Vector Machines (SVM). The study introduces a sophisticated Meijer-G function for MIMO statistical analysis and proposes a power series-based Probability Density Function (PDF) with non-recursive GMSK modulation. This PDF allows closed-form derivation of BER and Outage Probability expressions, showcasing improved MIMO link performance in the presence of PEs and AT. Simulations validate the models, offering insights into their effectiveness across varying turbulence levels. The findings assist FSO-MIMO designers in minimizing PEs,AT and achieving optimal results.Subsequently, authors perform a suppression to BER, Particularly, the optimum beam width factors for <span>(left{ptimes q|1times 2times 2, &amp; 2times 3right})</span>, diversity degrees by a <span>(left{ptimes q|1times 1right})</span>, as a reference are 81.24%, 87.32%, and 89.61%, respectively, at <span>({varepsilon }_{nj}=4.02)</span> and <span>({I}_{o}=10text{ dBm})</span>.The proposed MIMO/FSO provides accuracy and an irradiances gain of 13.34dBm,i.e.,<span>({varepsilon }_{nj}=5.03)</span> at BER <span>({10}^{-9})</span> for downlink satellite transmission over SIMO and SISO FSO links. This study provides a comprehensive framework for optimizing FSO communication systems, considering atmospheric turbulence and pointing errors.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"77 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141530008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Telecommunication Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1