首页 > 最新文献

Telecommunication Systems最新文献

英文 中文
A dynamic spectrum access algorithm based on deep reinforcement learning with novel multi-vehicle reward functions in cognitive vehicular networks 认知车载网络中基于深度强化学习和新型多车辆奖励函数的动态频谱接入算法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-28 DOI: 10.1007/s11235-024-01188-5
Lingling Chen, Ziwei Wang, Xiaohui Zhao, Xuan Shen, Wei He

As a revolution in the field of transportation, the demand for communication of vehicles is increasing. Therefore, how to improve the success rate of vehicle spectrum access has become a major problem to be solved. The case of a single vehicle accessing a channel was only considered in the previous research on dynamic spectrum access in cognitive vehicular networks (CVNs), and the spectrum resources could not be fully utilized. In order to fully utilize spectrum resources, a model for spectrum sharing among multiple secondary vehicles (SVs) and a primary vehicle (PV) is proposed. This model includes scenarios where multiple SVs share spectrum to maximize the average quality of service (QoS) for vehicles. And the condition is considered that the total interference generated by vehicles accessing the same channel is less than the interference threshold. In this paper, a deep Q-network method with a modified reward function (IDQN) algorithm is proposed to maximize the average QoS of PVs and SVs and improve spectrum utilization. The algorithm is designed with different reward functions according to the QoS of PVs and SVs under different situations. Finally, the proposed algorithm is compared with the deep Q-network (DQN) and Q-learning algorithms under the Python simulation platform. The average access success rate of SVs in the IDQN algorithm proposed can reach 98(%), which is improved by 18(%) compared with the Q-learning algorithm. And the convergence speed is 62.5(%) faster than the DQN algorithm. At the same time, the average QoS of PVs and the average QoS of SVs in the IDQN algorithm can reach 2.4, which is improved by 50(%) and 33(%) compared with the DQN algorithm, and improved by 60(%) and 140(%) compared with the Q-learning algorithm.

随着交通领域的变革,人们对车辆通信的需求与日俱增。因此,如何提高车辆频谱接入的成功率成为亟待解决的重大问题。以往的认知车载网络(CVN)动态频谱接入研究只考虑了单车接入信道的情况,频谱资源无法得到充分利用。为了充分利用频谱资源,本文提出了多个辅助车辆(SV)和一个主要车辆(PV)之间的频谱共享模型。该模型包括多个 SV 共享频谱以最大限度提高车辆平均服务质量(QoS)的场景。考虑的条件是,访问同一信道的车辆产生的总干扰小于干扰阈值。本文提出了一种具有修正奖励函数(IDQN)的深度 Q 网络算法,以最大化 PV 和 SV 的平均 QoS 并提高频谱利用率。该算法根据不同情况下 PV 和 SV 的 QoS 设计了不同的奖励函数。最后,在 Python 仿真平台下将所提算法与深度 Q 网络(DQN)和 Q-learning 算法进行了比较。所提出的IDQN算法中SV的平均接入成功率可达98%,与Q-learning算法相比提高了18%。收敛速度比DQN算法快62.5(%)。同时,IDQN算法中PV的平均QoS和SV的平均QoS可以达到2.4,与DQN算法相比分别提高了50(%)和33(%),与Q-learning算法相比分别提高了60(%)和140(%)。
{"title":"A dynamic spectrum access algorithm based on deep reinforcement learning with novel multi-vehicle reward functions in cognitive vehicular networks","authors":"Lingling Chen, Ziwei Wang, Xiaohui Zhao, Xuan Shen, Wei He","doi":"10.1007/s11235-024-01188-5","DOIUrl":"https://doi.org/10.1007/s11235-024-01188-5","url":null,"abstract":"<p>As a revolution in the field of transportation, the demand for communication of vehicles is increasing. Therefore, how to improve the success rate of vehicle spectrum access has become a major problem to be solved. The case of a single vehicle accessing a channel was only considered in the previous research on dynamic spectrum access in cognitive vehicular networks (CVNs), and the spectrum resources could not be fully utilized. In order to fully utilize spectrum resources, a model for spectrum sharing among multiple secondary vehicles (SVs) and a primary vehicle (PV) is proposed. This model includes scenarios where multiple SVs share spectrum to maximize the average quality of service (QoS) for vehicles. And the condition is considered that the total interference generated by vehicles accessing the same channel is less than the interference threshold. In this paper, a deep Q-network method with a modified reward function (IDQN) algorithm is proposed to maximize the average QoS of PVs and SVs and improve spectrum utilization. The algorithm is designed with different reward functions according to the QoS of PVs and SVs under different situations. Finally, the proposed algorithm is compared with the deep Q-network (DQN) and Q-learning algorithms under the Python simulation platform. The average access success rate of SVs in the IDQN algorithm proposed can reach 98<span>(%)</span>, which is improved by 18<span>(%)</span> compared with the Q-learning algorithm. And the convergence speed is 62.5<span>(%)</span> faster than the DQN algorithm. At the same time, the average QoS of PVs and the average QoS of SVs in the IDQN algorithm can reach 2.4, which is improved by 50<span>(%)</span> and 33<span>(%)</span> compared with the DQN algorithm, and improved by 60<span>(%)</span> and 140<span>(%)</span> compared with the Q-learning algorithm.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"357 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141525444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV flight path planning optimization 无人机飞行路径规划优化
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-27 DOI: 10.1007/s11235-024-01167-w
Hui Li, Zhangpeng Qiu, Xiaoyi Han, Ming Zhang, Dan Liao, Haiyan Jin

In modern warfare, the use of UAVs for reconnaissance, search and rescue missions is very common, and it is essential to plan the flight path of UAVs. However, in the face of complex battlefield environment, the existing flight path planning algorithms have the problems of long time consumption and unstable path. Therefore, this paper studies the UAV flight path planning optimization in complex battlefield environment. First, we construct the battlefield environment model. Then, by analyzing the UAV flight constraints existing in battlefield environment, the objective function is obtained. And the problem of UAV flight path planning optimization is transformed into a nonlinear combinatorial optimization problem. On this basis, an Adaptive Adjustment Flight Path Planning algorithm (AA-FPP) is proposed. The AA-FPP algorithm adaptively adjusts the absorption coefficient of fireflies by using chaotic strategy. It adjusts the control position updating formula by using time-varying inertia weight to enhance its global searching ability. Then, random factors based on Boltzmann selection strategy are introduced to perturb the iterative solutions in AA-FPP. It expands the search space of the path and enhances the convergence efficiency. Finally, simulation results show that the AA-FPP algorithm can successfully plan a flight path that reduces static/dynamic threat intensity. And it has greater advantages in path stability and planning time consumption.

在现代战争中,使用无人机执行侦察、搜索和救援任务非常普遍,因此规划无人机的飞行路径至关重要。然而,面对复杂的战场环境,现有的飞行路径规划算法存在耗时长、路径不稳定等问题。因此,本文对复杂战场环境下的无人机飞行路径规划优化进行了研究。首先,我们构建了战场环境模型。然后,通过分析战场环境中存在的无人机飞行约束条件,得到目标函数。并将无人机飞行路径规划优化问题转化为非线性组合优化问题。在此基础上,提出了自适应调整飞行路径规划算法(AA-FPP)。AA-FPP 算法利用混沌策略自适应地调整萤火虫的吸收系数。它利用时变惯性权重调整控制位置更新公式,以增强其全局搜索能力。然后,在 AA-FPP 中引入基于玻尔兹曼选择策略的随机因素来扰动迭代解。它扩展了路径的搜索空间,提高了收敛效率。最后,仿真结果表明,AA-FPP 算法能成功规划出一条降低静态/动态威胁强度的飞行路径。而且它在路径稳定性和规划时间消耗方面具有更大的优势。
{"title":"UAV flight path planning optimization","authors":"Hui Li, Zhangpeng Qiu, Xiaoyi Han, Ming Zhang, Dan Liao, Haiyan Jin","doi":"10.1007/s11235-024-01167-w","DOIUrl":"https://doi.org/10.1007/s11235-024-01167-w","url":null,"abstract":"<p>In modern warfare, the use of UAVs for reconnaissance, search and rescue missions is very common, and it is essential to plan the flight path of UAVs. However, in the face of complex battlefield environment, the existing flight path planning algorithms have the problems of long time consumption and unstable path. Therefore, this paper studies the UAV flight path planning optimization in complex battlefield environment. First, we construct the battlefield environment model. Then, by analyzing the UAV flight constraints existing in battlefield environment, the objective function is obtained. And the problem of UAV flight path planning optimization is transformed into a nonlinear combinatorial optimization problem. On this basis, an Adaptive Adjustment Flight Path Planning algorithm (AA-FPP) is proposed. The AA-FPP algorithm adaptively adjusts the absorption coefficient of fireflies by using chaotic strategy. It adjusts the control position updating formula by using time-varying inertia weight to enhance its global searching ability. Then, random factors based on Boltzmann selection strategy are introduced to perturb the iterative solutions in AA-FPP. It expands the search space of the path and enhances the convergence efficiency. Finally, simulation results show that the AA-FPP algorithm can successfully plan a flight path that reduces static/dynamic threat intensity. And it has greater advantages in path stability and planning time consumption.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"141 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141525445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An energy-optimized green cooperative cognitive radio network for better spectrum sharing 优化能源的绿色合作认知无线电网络,实现更好的频谱共享
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-27 DOI: 10.1007/s11235-024-01189-4
M. Poonguzhali, M. V. H. Bhaskara Murthy, Rakesh Kumar Godi, N. Mahesh Kumar

Higher energy consumption and poor spectrum sharing were identified as the common problems in spectrum sharing at cognitive radio networks. So to overcome these issues in the present research, a novel Horse herd-based Elman spectrum sharing model is developed. The current study found lower energy consumption and a higher spectrum sharing rate in less time. Subsequently, a channel was created for sharing the spectrum over the primary and secondary users. After that, through the proposed model, the sharing system is monitored. Moreover, the spectrum is transmitted until the false alarm is detected. The system stops the users' spectrum sharing function if a false alarm is detected. However, the spectrum is shared with every user in the designed channel. Then a case study is developed to explain the working process of the model. After that, the performance of the proposed design is detailed, and in the comparison analysis, the performance of the proposed model is compared with the existing models. Consequently, the performance of the proposed model is validated based on the throughput, outage probability, bit error rate, energy consumption, data transmission, and spectral efficiency.

较高的能耗和较差的频谱共享被认为是认知无线电网络频谱共享的常见问题。因此,为了克服这些问题,本研究开发了一种基于马群的新型 Elman 频谱共享模型。目前的研究发现,在更短的时间内,能耗更低,频谱共享率更高。随后,创建了一个通道,用于在主用户和次用户之间共享频谱。然后,通过所提出的模型,对共享系统进行监控。此外,频谱会一直传输到检测到误报为止。如果检测到误报,系统会停止用户的频谱共享功能。不过,在设计的信道中,频谱会与每个用户共享。然后,通过案例研究来解释模型的工作过程。之后,详细介绍了拟议设计的性能,并在对比分析中将拟议模型的性能与现有模型进行了比较。最后,根据吞吐量、中断概率、误码率、能耗、数据传输和频谱效率验证了所提模型的性能。
{"title":"An energy-optimized green cooperative cognitive radio network for better spectrum sharing","authors":"M. Poonguzhali, M. V. H. Bhaskara Murthy, Rakesh Kumar Godi, N. Mahesh Kumar","doi":"10.1007/s11235-024-01189-4","DOIUrl":"https://doi.org/10.1007/s11235-024-01189-4","url":null,"abstract":"<p>Higher energy consumption and poor spectrum sharing were identified as the common problems in spectrum sharing at cognitive radio networks. So to overcome these issues in the present research, a novel Horse herd-based Elman spectrum sharing model is developed. The current study found lower energy consumption and a higher spectrum sharing rate in less time. Subsequently, a channel was created for sharing the spectrum over the primary and secondary users. After that, through the proposed model, the sharing system is monitored. Moreover, the spectrum is transmitted until the false alarm is detected. The system stops the users' spectrum sharing function if a false alarm is detected. However, the spectrum is shared with every user in the designed channel. Then a case study is developed to explain the working process of the model. After that, the performance of the proposed design is detailed, and in the comparison analysis, the performance of the proposed model is compared with the existing models. Consequently, the performance of the proposed model is validated based on the throughput, outage probability, bit error rate, energy consumption, data transmission, and spectral efficiency.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"19 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141510135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An energy-aware traffic offloading approach based on deep learning and optimization in massive MIMO 基于深度学习和优化的大规模多输入多输出(MIMO)能量感知流量卸载方法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-27 DOI: 10.1007/s11235-024-01177-8
A. B. Farakte, K. P. Sridhar, M. B. Rasale

In the wireless communication, the shortage of bandwidth has motivated the investigation and study of the wireless access technology called massive Multiple-Input Multiple-Output (MIMO). In multi-tier heterogeneous Fifth Generation (5G) networks, energy efficiency is a severe concern as the power utilization of macro base stations' is comparatively higher and proportional to their traffic load. In this paper, a novel African Vulture Shepherd Optimization Algorithm (AVSOA) is established that relies on macro cells and small cell system load information to determine the highly energy-efficient traffic offloading system. The proposed AVSOA model is a combination of the African Vulture Optimization Algorithm (AVOA) and the Shuffled Shepherd Optimization Algorithm (SSOA). The system load is predicted here by exploiting a Deep Quantum Neural Network (DQNN) algorithm to perform the conditional traffic offloading in that every macro-Base Station (BS) conjectures the offloading systems of other macro cells. The experimental evaluation of the adopted model is contrasted with the conventional models considering the energy efficiency, spectral efficiency, throughput, and system load. Finally, the performance analysis of the proposed model achieved better energy efficiency, spectral efficiency, and throughput of 0.250598, 0.184527, and 0.820354 Mbps and a minimum system load of 697.

在无线通信领域,带宽的短缺促使人们调查和研究被称为大规模多输入多输出(MIMO)的无线接入技术。在多层异构的第五代(5G)网络中,由于宏基站的功率利用率相对较高,且与其流量负载成正比,因此能效问题备受关注。本文建立了一种新颖的非洲秃鹫牧羊人优化算法(AVSOA),该算法依靠宏基站和小基站系统负载信息来确定高能效的流量卸载系统。所提出的 AVSOA 模型是非洲秃鹫优化算法(AVOA)和洗牌牧羊人优化算法(SSOA)的结合。该模型通过利用深度量子神经网络(DQNN)算法来预测系统负载,从而执行有条件的流量卸载,即每个宏基站(BS)都会推测其他宏小区的卸载系统。考虑到能效、频谱效率、吞吐量和系统负载,对所采用模型的实验评估与传统模型进行了对比。最后,通过性能分析,所提模型的能量效率、频谱效率和吞吐量分别达到 0.250598、0.184527 和 0.820354 Mbps,系统负荷最小为 697。
{"title":"An energy-aware traffic offloading approach based on deep learning and optimization in massive MIMO","authors":"A. B. Farakte, K. P. Sridhar, M. B. Rasale","doi":"10.1007/s11235-024-01177-8","DOIUrl":"https://doi.org/10.1007/s11235-024-01177-8","url":null,"abstract":"<p>In the wireless communication, the shortage of bandwidth has motivated the investigation and study of the wireless access technology called massive Multiple-Input Multiple-Output (MIMO). In multi-tier heterogeneous Fifth Generation (5G) networks, energy efficiency is a severe concern as the power utilization of macro base stations' is comparatively higher and proportional to their traffic load. In this paper, a novel African Vulture Shepherd Optimization Algorithm (AVSOA) is established that relies on macro cells and small cell system load information to determine the highly energy-efficient traffic offloading system. The proposed AVSOA model is a combination of the African Vulture Optimization Algorithm (AVOA) and the Shuffled Shepherd Optimization Algorithm (SSOA). The system load is predicted here by exploiting a Deep Quantum Neural Network (DQNN) algorithm to perform the conditional traffic offloading in that every macro-Base Station (BS) conjectures the offloading systems of other macro cells. The experimental evaluation of the adopted model is contrasted with the conventional models considering the energy efficiency, spectral efficiency, throughput, and system load. Finally, the performance analysis of the proposed model achieved better energy efficiency, spectral efficiency, and throughput of 0.250598, 0.184527, and 0.820354 Mbps and a minimum system load of 697.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"1 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141525446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing physical layer security via information hiding and chaotic frequency-hopping signal 通过信息隐藏和混沌跳频信号加强物理层安全
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-26 DOI: 10.1007/s11235-024-01146-1
MingQuan Fan

With the development of super computation ability and invention of quantum computer, safeguarding network layer data confidentiality by computation based encryption method suffers great impact. As a result, people pay more attention to safeguarding data confidentiality in physical layer of wireless satellite communication system. In this paper, a groundbreaking method for enhancing physical layer security (PLS) by information hiding technology is proposed, that is, embedding secret information into chaotic frequency-hopping signal by multilevel frequency shift keying (MFSK) modulation. First, the secret information to be transmitted is encrypted with chaotic binary sequence. Secondly, according to frequency-hopping pattern and chaotic address sequence, select suitable modulation order and specific frequency point corresponding to each encrypted data block. Finally, the encrypted information is embedded into frequency-hopping Sine signal by MFSK modulation. Experimental results indicate that the proposed scheme is robust against various jamming attacks, such as power attenuation, noise adding, single-tone jamming, key exhaustive search, etc.

随着超级计算能力的发展和量子计算机的发明,以计算为基础的加密方法来保障网络层数据的机密性受到了极大的冲击。因此,人们更加关注无线卫星通信系统物理层的数据保密问题。本文提出了一种利用信息隐藏技术增强物理层安全性(PLS)的突破性方法,即通过多级频移键控(MFSK)调制将秘密信息嵌入到混沌跳频信号中。首先,用混沌二进制序列对要传输的秘密信息进行加密。其次,根据跳频模式和混沌地址序列,选择合适的调制顺序和与每个加密数据块相对应的特定频点。最后,通过 MFSK 调制将加密信息嵌入跳频正弦信号中。实验结果表明,所提出的方案对各种干扰攻击,如功率衰减、噪声添加、单音干扰、密钥穷举搜索等具有很强的鲁棒性。
{"title":"Enhancing physical layer security via information hiding and chaotic frequency-hopping signal","authors":"MingQuan Fan","doi":"10.1007/s11235-024-01146-1","DOIUrl":"https://doi.org/10.1007/s11235-024-01146-1","url":null,"abstract":"<p>With the development of super computation ability and invention of quantum computer, safeguarding network layer data confidentiality by computation based encryption method suffers great impact. As a result, people pay more attention to safeguarding data confidentiality in physical layer of wireless satellite communication system. In this paper, a groundbreaking method for enhancing physical layer security (PLS) by information hiding technology is proposed, that is, embedding secret information into chaotic frequency-hopping signal by multilevel frequency shift keying (MFSK) modulation. First, the secret information to be transmitted is encrypted with chaotic binary sequence. Secondly, according to frequency-hopping pattern and chaotic address sequence, select suitable modulation order and specific frequency point corresponding to each encrypted data block. Finally, the encrypted information is embedded into frequency-hopping Sine signal by MFSK modulation. Experimental results indicate that the proposed scheme is robust against various jamming attacks, such as power attenuation, noise adding, single-tone jamming, key exhaustive search, etc.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"26 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141510136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint resource and trajectory optimization for video streaming in UAV-based emergency indoor-outdoor communication 基于无人机的室内外应急通信中视频流的联合资源和轨迹优化
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-25 DOI: 10.1007/s11235-024-01151-4
Zinan Guo, Bo Hu, Shanzhi Chen, Bufang Zhang, Lei Wang

Due to its ability for flexible placement, the Unmanned Aerial Vehicle (UAV) has been widely utilized as an aerial relay to transmit the video streaming data, which is particularly useful in emergency communication networks that lack the communication infrastructure. In this paper, we examine the combined resource optimization and trajectory planning for video services using dynamic adaptive streaming over HTTP (DASH) in the uplink transmission of UAV-based emergency indoor-outdoor communication networks. In detail, a rotary-wing UAV works as an aerial relay, forwarding emergency video collected by indoor users to a remote Base Station (BS). To ensure that the UAV can forward the emergency video data from disaster area with stable video quality, we formulate an optimization problem of maximizing the uplink throughput and video streaming utility for all indoor users, by jointly optimizing the 3D flight trajectory of UAV, playback rate of video, communication time as well as bandwidth allocation, subject to the UAV trajectory constraints, total available bandwidth limitation, video quality variation constraints, as well as information-causality constraints for both UAV relaying and video playing. To tackle the formulated non-convex problem, we present a joint UAV trajectory, bandwidth allocation and video utility (JTBU) algorithm. Specifically, we first decouple the original problem into two sub-issues: 3D UAV trajectory optimization subproblem and resource allocation optimization subproblem. Then the JTBU algorithm alternately optimizes the two subproblems until the convergency is reached. Finally, the numerical results confirm that the proposed algorithm had a higher video streaming utility and system throughput than the baseline methods.

无人飞行器(UAV)具有灵活的放置能力,因此被广泛用作传输视频流数据的空中中继器,这在缺乏通信基础设施的应急通信网络中尤其有用。本文研究了在基于无人机的室内外应急通信网络的上行链路传输中,使用 HTTP 上的动态自适应流(DASH)为视频服务进行资源优化和轨迹规划的组合。具体来说,旋转翼无人机充当空中中继器,将室内用户收集的紧急视频转发到远程基站(BS)。为确保无人机能以稳定的视频质量转发来自灾区的应急视频数据,我们提出了一个优化问题,即在无人机飞行轨迹约束、总可用带宽限制、视频质量变化约束以及无人机中继和视频播放的信息相关性约束下,通过联合优化无人机的三维飞行轨迹、视频播放速率、通信时间以及带宽分配,最大化所有室内用户的上行链路吞吐量和视频流效用。为了解决这个非凸问题,我们提出了一种联合无人机轨迹、带宽分配和视频效用(JTBU)算法。具体来说,我们首先将原始问题分解为两个子问题:三维无人机轨迹优化子问题和资源分配优化子问题。然后,JTBU 算法交替优化这两个子问题,直到达到收敛。最后,数值结果证实,与基线方法相比,所提出的算法具有更高的视频流实用性和系统吞吐量。
{"title":"Joint resource and trajectory optimization for video streaming in UAV-based emergency indoor-outdoor communication","authors":"Zinan Guo, Bo Hu, Shanzhi Chen, Bufang Zhang, Lei Wang","doi":"10.1007/s11235-024-01151-4","DOIUrl":"https://doi.org/10.1007/s11235-024-01151-4","url":null,"abstract":"<p>Due to its ability for flexible placement, the Unmanned Aerial Vehicle (UAV) has been widely utilized as an aerial relay to transmit the video streaming data, which is particularly useful in emergency communication networks that lack the communication infrastructure. In this paper, we examine the combined resource optimization and trajectory planning for video services using dynamic adaptive streaming over HTTP (DASH) in the uplink transmission of UAV-based emergency indoor-outdoor communication networks. In detail, a rotary-wing UAV works as an aerial relay, forwarding emergency video collected by indoor users to a remote Base Station (BS). To ensure that the UAV can forward the emergency video data from disaster area with stable video quality, we formulate an optimization problem of maximizing the uplink throughput and video streaming utility for all indoor users, by jointly optimizing the 3D flight trajectory of UAV, playback rate of video, communication time as well as bandwidth allocation, subject to the UAV trajectory constraints, total available bandwidth limitation, video quality variation constraints, as well as information-causality constraints for both UAV relaying and video playing. To tackle the formulated non-convex problem, we present a joint UAV trajectory, bandwidth allocation and video utility (JTBU) algorithm. Specifically, we first decouple the original problem into two sub-issues: 3D UAV trajectory optimization subproblem and resource allocation optimization subproblem. Then the JTBU algorithm alternately optimizes the two subproblems until the convergency is reached. Finally, the numerical results confirm that the proposed algorithm had a higher video streaming utility and system throughput than the baseline methods.\u0000</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"45 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141525447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient PCCM masking scheme for PAPR reduction and encryption in OFDM-VLC system 在 OFDM-VLC 系统中降低 PAPR 和加密的高效 PCCM 掩码方案
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-24 DOI: 10.1007/s11235-024-01174-x
J. P. P. Jemimah, S. Miruna Joe Amali

Wide usage of Orthogonal frequency division multiplexing (OFDM) in visible light communication (VLC) systems aids in sharing immense multimedia files. But, an increase in the peak-to-average power ratio (PAPR) becomes a setback for OFDM. This paper focuses on PAPR reduction and encrypted image transmission in OFDM-based VLC systems using masking approach. The proposed technique generates a mask with the random sequence from a Pi-based coupled chaotic map (PCCM). The ciphering of the transmitted image data involves twofold administration of the PCCM mask. First, the image data is confused using Arnold’s Cat Map (ACM), and then the PCCM mask is applied. For the second time, the PCCM masks are applied on the equal-sized blocks of the subdivided image data at the Quadrature Amplitude Modulation (QAM) mapper stage, hence secures the transmission path. The proposed masking scheme frustrates statistical, brute-force and differential attacks and has a large key space of about (10^{340}). The PCCM based masking scheme is able to reduce PAPR from 13.5 dB to 6 dB, with 56% reduction percentile when compared to the normal OFDM system, and the same is validated by Complementary cumulative distribution function (CCDF). The decryption quality of the PCCM mask based encryption approach is proven better with high correlation coefficient and output signal-to-noise ratio (SNR) values. This scheme also maintains the condition of the image shared with a Bit error rate (BER) improvement of (thicksim )1.2 to 1.5 dB compared to the normal OFDM system. This proposed technique is evaluated by simulation experiments.

正交频分复用技术(OFDM)在可见光通信(VLC)系统中的广泛应用有助于共享大量多媒体文件。但是,峰均功率比(PAPR)的增加成为 OFDM 的一个障碍。本文的重点是在基于 OFDM 的 VLC 系统中使用掩码方法降低 PAPR 和加密图像传输。所提出的技术利用基于π的耦合混沌图(PCCM)的随机序列生成掩码。传输图像数据的加密涉及对 PCCM 掩码的两方面管理。首先,使用阿诺德猫图(ACM)混淆图像数据,然后应用 PCCM 掩码。第二次,在正交调幅(QAM)映射器阶段,在细分图像数据的等大小块上应用 PCCM 掩码,从而确保传输路径的安全。所提出的掩码方案能阻止统计攻击、暴力攻击和差分攻击,并具有约 (10^{340}) 的大密钥空间。与普通的 OFDM 系统相比,基于 PCCM 的掩码方案能够将 PAPR 从 13.5 dB 降低到 6 dB,百分位数降低了 56%。基于 PCCM 掩码的加密方法具有较高的相关系数和输出信噪比 (SNR) 值,证明其解密质量更好。与普通的 OFDM 系统相比,该方案还能保持图像共享的状态,误码率(BER)提高了 1.2 到 1.5 dB。我们通过模拟实验对所提出的技术进行了评估。
{"title":"An efficient PCCM masking scheme for PAPR reduction and encryption in OFDM-VLC system","authors":"J. P. P. Jemimah, S. Miruna Joe Amali","doi":"10.1007/s11235-024-01174-x","DOIUrl":"https://doi.org/10.1007/s11235-024-01174-x","url":null,"abstract":"<p>Wide usage of Orthogonal frequency division multiplexing (OFDM) in visible light communication (VLC) systems aids in sharing immense multimedia files. But, an increase in the peak-to-average power ratio (PAPR) becomes a setback for OFDM. This paper focuses on PAPR reduction and encrypted image transmission in OFDM-based VLC systems using masking approach. The proposed technique generates a mask with the random sequence from a Pi-based coupled chaotic map (PCCM). The ciphering of the transmitted image data involves twofold administration of the PCCM mask. First, the image data is confused using Arnold’s Cat Map (ACM), and then the PCCM mask is applied. For the second time, the PCCM masks are applied on the equal-sized blocks of the subdivided image data at the Quadrature Amplitude Modulation (QAM) mapper stage, hence secures the transmission path. The proposed masking scheme frustrates statistical, brute-force and differential attacks and has a large key space of about <span>(10^{340})</span>. The PCCM based masking scheme is able to reduce PAPR from 13.5 dB to 6 dB, with 56% reduction percentile when compared to the normal OFDM system, and the same is validated by Complementary cumulative distribution function (CCDF). The decryption quality of the PCCM mask based encryption approach is proven better with high correlation coefficient and output signal-to-noise ratio (SNR) values. This scheme also maintains the condition of the image shared with a Bit error rate (BER) improvement of <span>(thicksim )</span>1.2 to 1.5 dB compared to the normal OFDM system. This proposed technique is evaluated by simulation experiments.\u0000</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"5 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141510243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IHKM: an improved hierarchical key management scheme for wireless sensor network IHKM:适用于无线传感器网络的改进型分层密钥管理方案
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-23 DOI: 10.1007/s11235-024-01182-x
Khushboo Jain, Akansha Singh

Wireless sensor networks (WSNs) are widely acknowledged for their potential as a robust infrastructure for collecting, processing, and transmitting information. Rezaeipour & Barati proposed a hierarchical key management scheme that manages key creation, distribution, and maintenance to provide services like message confidentiality, integrity, and authenticity to wireless sensor networks. As per the assertions posited by the authors, their scheme purportedly exhibits resilience against a spectrum of potential threats. Nevertheless, upon subjecting their scheme to meticulous scrutiny, our analysis revealed vulnerabilities to manifold adversarial strategies, notably including man-in-the-middle attacks, replay attacks, impersonation attacks, and node capture attacks. This scheme fails to establish a secure session key agreement also. In response to these identified shortcomings, this research devised an “Improved Hierarchical Key Management” (IHKM) Scheme aimed at rectifying the deficiencies of Rezaeipour and Barati’s scheme (RB scheme). This work proposed an enhanced key management scheme that utilizes a blend of symmetric and asymmetric key cryptography to enhance the security parameters of Hierarchical WSNs. A comprehensive security analysis of the proposed work shows that the IHKM scheme is secure against impersonation attacks, man-in-the-middle attacks, replay attacks node capture attacks, Denial-of-Service attacks, and base station bypassing attacks while establishing the mutual key agreement between the area managers and sensor nodes. Moreover, a comparative analysis of the IHKM scheme exhibits notable reductions in energy consumption (62.27% and 49.15%) and memory utilization (39.28%, 23.36%) when compared with the RB scheme and HISCOM schemes respectively. Simultaneously, IHKM contributes to the extension of the network’s overall lifespan by 48.78% as compared to HISCOM scheme and 32.63% as compared to compared with the RB scheme, thereby enhancing the efficiency and longevity of the WSN infrastructure.

无线传感器网络(WSN)作为收集、处理和传输信息的强大基础设施,其潜力已得到广泛认可。Rezaeipour & Barati 提出了一种分层密钥管理方案,用于管理密钥的创建、分发和维护,为无线传感器网络提供信息保密性、完整性和真实性等服务。根据作者的论断,他们的方案据称能抵御一系列潜在威胁。然而,在对他们的方案进行细致检查后,我们的分析表明,该方案容易受到多种对抗策略的攻击,主要包括中间人攻击、重放攻击、冒充攻击和节点捕获攻击。该方案还无法建立安全的会话密钥协议。针对这些缺陷,本研究设计了一种 "改进的分级密钥管理"(IHKM)方案,旨在纠正 Rezaeipour 和 Barati 方案(RB 方案)的不足之处。这项研究提出了一种增强型密钥管理方案,利用对称和非对称密钥加密技术的混合来增强分级 WSN 的安全参数。对所提工作的全面安全分析表明,IHKM 方案在区域管理器和传感器节点之间建立相互密钥协议的同时,还能安全地抵御冒充攻击、中间人攻击、重放攻击、节点捕获攻击、拒绝服务攻击和基站绕过攻击。此外,IHKM 方案的对比分析表明,与 RB 方案和 HISCOM 方案相比,IHKM 方案的能耗(62.27% 和 49.15%)和内存使用率(39.28% 和 23.36%)分别显著降低。同时,与 HISCOM 方案和 RB 方案相比,IHKM 将网络的整体寿命分别延长了 48.78% 和 32.63%,从而提高了 WSN 基础设施的效率和寿命。
{"title":"IHKM: an improved hierarchical key management scheme for wireless sensor network","authors":"Khushboo Jain, Akansha Singh","doi":"10.1007/s11235-024-01182-x","DOIUrl":"https://doi.org/10.1007/s11235-024-01182-x","url":null,"abstract":"<p>Wireless sensor networks (WSNs) are widely acknowledged for their potential as a robust infrastructure for collecting, processing, and transmitting information. Rezaeipour &amp; Barati proposed a hierarchical key management scheme that manages key creation, distribution, and maintenance to provide services like message confidentiality, integrity, and authenticity to wireless sensor networks. As per the assertions posited by the authors, their scheme purportedly exhibits resilience against a spectrum of potential threats. Nevertheless, upon subjecting their scheme to meticulous scrutiny, our analysis revealed vulnerabilities to manifold adversarial strategies, notably including man-in-the-middle attacks, replay attacks, impersonation attacks, and node capture attacks. This scheme fails to establish a secure session key agreement also. In response to these identified shortcomings, this research devised an “Improved Hierarchical Key Management” (IHKM) Scheme aimed at rectifying the deficiencies of Rezaeipour and Barati’s scheme (RB scheme). This work proposed an enhanced key management scheme that utilizes a blend of symmetric and asymmetric key cryptography to enhance the security parameters of Hierarchical WSNs. A comprehensive security analysis of the proposed work shows that the IHKM scheme is secure against impersonation attacks, man-in-the-middle attacks, replay attacks node capture attacks, Denial-of-Service attacks, and base station bypassing attacks while establishing the mutual key agreement between the area managers and sensor nodes. Moreover, a comparative analysis of the IHKM scheme exhibits notable reductions in energy consumption (62.27% and 49.15%) and memory utilization (39.28%, 23.36%) when compared with the RB scheme and HISCOM schemes respectively. Simultaneously, IHKM contributes to the extension of the network’s overall lifespan by 48.78% as compared to HISCOM scheme and 32.63% as compared to compared with the RB scheme, thereby enhancing the efficiency and longevity of the WSN infrastructure.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"59 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141525448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-efficient cluster head selection in wireless sensor networks-based internet of things (IoT) using fuzzy-based Harris hawks optimization 在基于无线传感器网络的物联网(IoT)中使用基于模糊的哈里斯鹰优化技术选择高能效簇头
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-21 DOI: 10.1007/s11235-024-01176-9
Sankar Sennan, Somula Ramasubbareddy, Rajesh Kumar Dhanaraj, Anand Nayyar, Balamurugan Balusamy

The Internet of things (IoT) has become a cornerstone of the fourth industrial revolution. IoT sensor devices in the network are provisioned with limited resources, such as little processing speed, minimal computing capacity, and less power. Furthermore, IoT devices are battery-powered, which cannot provide battery sufficiently to some applications resulting in an energy scarcity problem. Clustering is an efficient method in IoT networks to save energy. Nodes can coordinate communication by selecting an optimal cluster head (CH) within the cluster and transmitting information to a central node or sink. The CH minimizes energy consumption associated with communication overhead and extends the overall lifespan of the network by facilitating coordination between clusters and the central server. Many existing optimization techniques have proposed CH selection to improve the network's lifespan but all the existing algorithms on CH selection are not practical due to the long convergence time. This research paper proposes a novel fuzzy-based Harris Hawks Optimization (FHHO) algorithm that chooses optimal CH considering Residual energy (RER) and distance between sink and node. The fitness function is evaluated using fuzzy logic over maximization and minimization network parameters. Extensive experimentations were conducted to test and validate the performance of proposed FHHO algorithm on MATLAB 2019a tool. And, the results stated that the proposed method FHHO has better results as compared to other CH selection techniques, namely, PSO-ECHS, FIGWO, and GWO-C, in network lifespan by 18–44% and throughput by 5–20%.

物联网(IoT)已成为第四次工业革命的基石。网络中的物联网传感器设备资源有限,如处理速度低、计算能力小、功率小等。此外,物联网设备由电池供电,无法为某些应用提供充足的电池,从而导致能源稀缺问题。在物联网网络中,聚类是一种有效的节能方法。节点可以通过在簇内选择一个最佳簇头(CH)来协调通信,并将信息传输到中心节点或 sink。簇头可最大限度地减少与通信开销相关的能耗,并通过促进簇与中央服务器之间的协调来延长网络的整体寿命。现有的许多优化技术都提出了 CH 选择来提高网络的寿命,但由于收敛时间较长,所有现有的 CH 选择算法都不实用。本研究论文提出了一种新颖的基于模糊的哈里斯-霍克斯优化(FHHO)算法,该算法可在考虑剩余能量(RER)和水槽与节点之间距离的情况下选择最佳 CH。利用模糊逻辑对最大化和最小化网络参数进行适配函数评估。在 MATLAB 2019a 工具上进行了大量实验,以测试和验证拟议 FHHO 算法的性能。结果表明,与其他 CH 选择技术(即 PSO-ECHS、FIGWO 和 GWO-C)相比,所提出的 FHHO 方法具有更好的效果,网络寿命延长了 18-44%,吞吐量提高了 5-20%。
{"title":"Energy-efficient cluster head selection in wireless sensor networks-based internet of things (IoT) using fuzzy-based Harris hawks optimization","authors":"Sankar Sennan, Somula Ramasubbareddy, Rajesh Kumar Dhanaraj, Anand Nayyar, Balamurugan Balusamy","doi":"10.1007/s11235-024-01176-9","DOIUrl":"https://doi.org/10.1007/s11235-024-01176-9","url":null,"abstract":"<p>The Internet of things (IoT) has become a cornerstone of the fourth industrial revolution. IoT sensor devices in the network are provisioned with limited resources, such as little processing speed, minimal computing capacity, and less power. Furthermore, IoT devices are battery-powered, which cannot provide battery sufficiently to some applications resulting in an energy scarcity problem. Clustering is an efficient method in IoT networks to save energy. Nodes can coordinate communication by selecting an optimal cluster head (CH) within the cluster and transmitting information to a central node or sink. The CH minimizes energy consumption associated with communication overhead and extends the overall lifespan of the network by facilitating coordination between clusters and the central server. Many existing optimization techniques have proposed CH selection to improve the network's lifespan but all the existing algorithms on CH selection are not practical due to the long convergence time. This research paper proposes a novel fuzzy-based Harris Hawks Optimization (FHHO) algorithm that chooses optimal CH considering Residual energy (RER) and distance between sink and node. The fitness function is evaluated using fuzzy logic over maximization and minimization network parameters. Extensive experimentations were conducted to test and validate the performance of proposed FHHO algorithm on MATLAB 2019a tool. And, the results stated that the proposed method FHHO has better results as compared to other CH selection techniques, namely, PSO-ECHS, FIGWO, and GWO-C, in network lifespan by 18–44% and throughput by 5–20%.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"27 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141510244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RSSI-based optimization of static and mobile node combinations for dynamic node localization in wireless sensor networks 基于 RSSI 的静态和移动节点组合优化,实现无线传感器网络中的动态节点定位
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-21 DOI: 10.1007/s11235-024-01183-w
Kottu Santosh Kumar, Saroja Kumar Rout, Sujit Kumar Panda, Pradyumna Kumar Mohapatra, Sachi Nandan Mohanty, M. Ijaz Khan

The fact that sensor nodes are situated in specific places is most obvious in wireless sensor networks. A wireless sensor network has been designed to address node localization through several solutions. Environmental monitoring, healthcare, and industrial automation are just some of the fields where wireless sensor networks (WSNs) find extensive application. This sort of WSN application is fundamentally dependent on the accurate localization of sensor nodes. The purpose of this paper is to propose an enhanced received signal strength indicator (RSSI) technique for determining unlocalized nodes using anchor nodes. An optimal communication range, aligning with the application needs, can be determined by assessing the dynamic correlation between communication distance and the RSSI throughout the localization procedure. The advanced RSSI-based node localization method proposed in this study involves two distinct stages: the distance determination phase and the computation phase. In this work, we assess the outcome using the Castalia simulation. The precision of wireless sensor network node location is greatly improved by integrating mobile anchor nodes with RSSI-based dynamic node localization. The results of the simulations and the subsequent analysis attest to the excellent accuracy and low energy consumption of the suggested method during the localization procedure.

传感器节点位于特定地点这一事实在无线传感器网络中最为明显。无线传感器网络的设计通过多种解决方案来解决节点定位问题。环境监测、医疗保健和工业自动化只是无线传感器网络(WSN)广泛应用的部分领域。这类 WSN 应用从根本上依赖于传感器节点的精确定位。本文旨在提出一种增强型接收信号强度指示器(RSSI)技术,利用锚节点确定未定位节点。在整个定位过程中,通过评估通信距离与 RSSI 之间的动态相关性,可以确定符合应用需求的最佳通信范围。本研究提出的基于 RSSI 的先进节点定位方法包括两个不同的阶段:距离确定阶段和计算阶段。在这项工作中,我们利用 Castalia 仿真对结果进行了评估。通过将移动锚节点与基于 RSSI 的动态节点定位相结合,大大提高了无线传感器网络节点定位的精度。仿真结果和后续分析证明,建议的方法在定位过程中具有出色的精确性和低能耗。
{"title":"RSSI-based optimization of static and mobile node combinations for dynamic node localization in wireless sensor networks","authors":"Kottu Santosh Kumar, Saroja Kumar Rout, Sujit Kumar Panda, Pradyumna Kumar Mohapatra, Sachi Nandan Mohanty, M. Ijaz Khan","doi":"10.1007/s11235-024-01183-w","DOIUrl":"https://doi.org/10.1007/s11235-024-01183-w","url":null,"abstract":"<p>The fact that sensor nodes are situated in specific places is most obvious in wireless sensor networks. A wireless sensor network has been designed to address node localization through several solutions. Environmental monitoring, healthcare, and industrial automation are just some of the fields where wireless sensor networks (WSNs) find extensive application. This sort of WSN application is fundamentally dependent on the accurate localization of sensor nodes. The purpose of this paper is to propose an enhanced received signal strength indicator (RSSI) technique for determining unlocalized nodes using anchor nodes. An optimal communication range, aligning with the application needs, can be determined by assessing the dynamic correlation between communication distance and the RSSI throughout the localization procedure. The advanced RSSI-based node localization method proposed in this study involves two distinct stages: the distance determination phase and the computation phase. In this work, we assess the outcome using the Castalia simulation. The precision of wireless sensor network node location is greatly improved by integrating mobile anchor nodes with RSSI-based dynamic node localization. The results of the simulations and the subsequent analysis attest to the excellent accuracy and low energy consumption of the suggested method during the localization procedure.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"15 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141525449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Telecommunication Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1