Mobile edge computing (MEC) has emerged as a promising technology that can revolutionize the future of mobile networks. MEC brings compute and storage capabilities to the edge of the network closer to end-users. This enables faster data processing and improved user experience by reducing latency. MEC has the potential to decrease the burden on the core network by transferring computational and storage responsibilities to the edge, thereby reducing overall network congestion. Load balancing is critical for effectively utilizing the resources of the MEC. This ensures that the workload is distributed uniformly across all of the available resources. Load balancing is a complex task and there are various algorithms that can be used to achieve it, such as round-robin, least connection, and IP hash. To differentiate between heavily loaded and lightly loaded servers, current load balancing methods use an average response time to gauge the load on the edge server. Nevertheless, this approach has lower precision and may result in an unequal distribution of the workload. Our study introduces a dynamic threshold calculation technique that relies on a response-time threshold of the edge servers using K-means clustering. K-means based proposed algorithm classifies the servers in two sets (here K = 2), i.e., overloaded and lightly loaded edge servers. Consequently, workload is migrated from overloaded to lightly loaded servers to evenly distribute the workload. Experimental results show that the proposed technique reduces latency and improves resource utilization.
移动边缘计算(MEC)是一项前景广阔的技术,可彻底改变移动网络的未来。MEC 将计算和存储能力带到网络边缘,使其更接近终端用户。这样可以加快数据处理速度,并通过减少延迟改善用户体验。通过将计算和存储责任转移到边缘,MEC 有可能减轻核心网络的负担,从而减少整体网络拥塞。负载平衡对于有效利用 MEC 资源至关重要。这可确保工作负载在所有可用资源上均匀分布。负载平衡是一项复杂的任务,有多种算法可用于实现负载平衡,如轮循、最少连接和 IP 哈希算法。为了区分重负载和轻负载服务器,目前的负载平衡方法使用平均响应时间来衡量边缘服务器的负载。然而,这种方法的精确度较低,可能会导致工作量分配不均。我们的研究引入了一种动态阈值计算技术,它依赖于使用 K-means 聚类的边缘服务器响应时间阈值。基于 K-means 的拟议算法将服务器分为两组(此处 K = 2),即超负荷和轻负荷边缘服务器。因此,工作负载从超载服务器迁移到轻载服务器,以平均分配工作负载。实验结果表明,建议的技术减少了延迟,提高了资源利用率。
{"title":"Adaptive thresholds for improved load balancing in mobile edge computing using K-means clustering","authors":"Tahir Maqsood, Sardar Khaliq uz Zaman, Arslan Qayyum, Faisal Rehman, Saad Mustafa, Junaid Shuja","doi":"10.1007/s11235-024-01134-5","DOIUrl":"https://doi.org/10.1007/s11235-024-01134-5","url":null,"abstract":"<p>Mobile edge computing (MEC) has emerged as a promising technology that can revolutionize the future of mobile networks. MEC brings compute and storage capabilities to the edge of the network closer to end-users. This enables faster data processing and improved user experience by reducing latency. MEC has the potential to decrease the burden on the core network by transferring computational and storage responsibilities to the edge, thereby reducing overall network congestion. Load balancing is critical for effectively utilizing the resources of the MEC. This ensures that the workload is distributed uniformly across all of the available resources. Load balancing is a complex task and there are various algorithms that can be used to achieve it, such as round-robin, least connection, and IP hash. To differentiate between heavily loaded and lightly loaded servers, current load balancing methods use an average response time to gauge the load on the edge server. Nevertheless, this approach has lower precision and may result in an unequal distribution of the workload. Our study introduces a dynamic threshold calculation technique that relies on a response-time threshold of the edge servers using K-means clustering. K-means based proposed algorithm classifies the servers in two sets (here K = 2), i.e., overloaded and lightly loaded edge servers. Consequently, workload is migrated from overloaded to lightly loaded servers to evenly distribute the workload. Experimental results show that the proposed technique reduces latency and improves resource utilization.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"175 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140559895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-12DOI: 10.1007/s11235-024-01138-1
Meng-Shiuan Pan, Shao-Wei Kao
The 3GPP vehicle-to-everything (C-V2X) technology is a key solution to provide communication services for applications of intelligent transportation systems (ITS). According to the C-V2X specification, vehicles are allowed to communicate with each other without the help of cellular networks and can select subchannels (i.e. radio resources) by themselves. However, this design will induce subchannel collisions because of the mobility of vehicles. This work aims to relieve the aforementioned problem. We propose a cooperative subchannel selection (CoSS) scheme and a localized subchannel selection (LoSS) scheme, which consider vehicular mobility to prevent subchannel collisions. Based on the collected information, CoSS predicts possible subchannel collisions due to vehicles’ location changes. On the other hand, LoSS avoids subchannel collisions by organizing the usage of subchannels based on vehicles’ relative moving speeds. The simulation results indicate that the proposed schemes can effectively reduce subchannel collision ratio and increase packet delivery ratio for the network.
{"title":"Subchannel selection methods for 3GPP C-V2X networks by considering vehicular mobility","authors":"Meng-Shiuan Pan, Shao-Wei Kao","doi":"10.1007/s11235-024-01138-1","DOIUrl":"https://doi.org/10.1007/s11235-024-01138-1","url":null,"abstract":"<p>The 3GPP vehicle-to-everything (C-V2X) technology is a key solution to provide communication services for applications of intelligent transportation systems (ITS). According to the C-V2X specification, vehicles are allowed to communicate with each other without the help of cellular networks and can select subchannels (i.e. radio resources) by themselves. However, this design will induce subchannel collisions because of the mobility of vehicles. This work aims to relieve the aforementioned problem. We propose a cooperative subchannel selection (CoSS) scheme and a localized subchannel selection (LoSS) scheme, which consider vehicular mobility to prevent subchannel collisions. Based on the collected information, CoSS predicts possible subchannel collisions due to vehicles’ location changes. On the other hand, LoSS avoids subchannel collisions by organizing the usage of subchannels based on vehicles’ relative moving speeds. The simulation results indicate that the proposed schemes can effectively reduce subchannel collision ratio and increase packet delivery ratio for the network.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"94 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140599386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-12DOI: 10.1007/s11235-024-01139-0
C. Jenila, R. K. Jeyachitra
This paper presents an energy-efficient design of optical wireless communication (OWC) system for the indoor Internet of Things (IoT) with the assistance of machine learning (ML). A central coordinator (CC) has been proposed to interrogate the IoT devices and control the uplink formations with the prediction of transmission quality using ML classifiers. The passive reflective reflectors (PRF) are utilized in the IoT devices, which replaced the power-consuming active transmitters, formulate the zero-power consuming transmission links. The communication performance of the passive link establishments from the IoT devices have been investigated in terms of quality factor (Q-factor), bit error rate (BER), and signal-to-noise ratio (SNR) under different optical wireless channel conditions and link lengths. The ML classifiers have been evaluated on the prediction of transmission quality, and the results suggested the Euclidean K-nearest neighbor (KNN) with ten number of neighbors for the implementation. The IoT devices located within 1.2 m from the CC require a transmission power of 0.5 mW for links carrying 10 Gbps data, which increases the energy efficiency to 20 Gbps/mW with transmission energy consumption of 0.05 pJ/bit. This significant improvement in energy efficiency and passive communication ensures reliable, and green IoT links suitable for data-intensive indoor applications.
本文介绍了一种在机器学习(ML)辅助下为室内物联网(IoT)设计的高能效光无线通信(OWC)系统。本文提出了一个中央协调器(CC),通过使用 ML 分类器预测传输质量来询问物联网设备并控制上行链路编队。物联网设备采用无源反射器(PRF),取代了耗电的有源发射器,形成了零功耗的传输链路。在不同的光无线信道条件和链路长度下,研究了物联网设备建立的无源链路的通信性能,包括质量因子(Q-factor)、误码率(BER)和信噪比(SNR)。在对传输质量进行预测时,对 ML 分类器进行了评估,结果表明可以采用欧几里得 K 近邻(KNN)分类器(有 10 个邻居)。距离 CC 1.2 米以内的物联网设备在传输 10 Gbps 数据时,链路所需的传输功率为 0.5 mW,从而将能效提高到 20 Gbps/mW,传输能耗为 0.05 pJ/bit。能效和无源通信的大幅提高确保了可靠的绿色物联网链路,适合数据密集型室内应用。
{"title":"Energy-efficient design for green indoor OWC-IoT systems using passive reflective filters and machine learning-assisted quality prediction","authors":"C. Jenila, R. K. Jeyachitra","doi":"10.1007/s11235-024-01139-0","DOIUrl":"https://doi.org/10.1007/s11235-024-01139-0","url":null,"abstract":"<p>This paper presents an energy-efficient design of optical wireless communication (OWC) system for the indoor Internet of Things (IoT) with the assistance of machine learning (ML). A central coordinator (CC) has been proposed to interrogate the IoT devices and control the uplink formations with the prediction of transmission quality using ML classifiers. The passive reflective reflectors (PRF) are utilized in the IoT devices, which replaced the power-consuming active transmitters, formulate the zero-power consuming transmission links. The communication performance of the passive link establishments from the IoT devices have been investigated in terms of quality factor (Q-factor), bit error rate (BER), and signal-to-noise ratio (SNR) under different optical wireless channel conditions and link lengths. The ML classifiers have been evaluated on the prediction of transmission quality, and the results suggested the Euclidean K-nearest neighbor (KNN) with ten number of neighbors for the implementation. The IoT devices located within 1.2 m from the CC require a transmission power of 0.5 mW for links carrying 10 Gbps data, which increases the energy efficiency to 20 Gbps/mW with transmission energy consumption of 0.05 pJ/bit. This significant improvement in energy efficiency and passive communication ensures reliable, and green IoT links suitable for data-intensive indoor applications.\u0000</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"53 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140599556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-11DOI: 10.1007/s11235-024-01125-6
S. P. Subotha, L. Femila
Nowadays, wireless sensor networks (WSNs) are utilised in military-based applications like border surveillance. However, existing border surveillance methods have difficulties with energy efficiency, latency, security, connectivity, optimal path selection and coverage. In this paper, a Voronoi Modified Red Fox (VMRF) algorithm is proposed as a solution to these problems. Initially, secure cluster head (CH) selection and clustering is performed using Secure Spatial Intelligence-Enhanced Voronoi Clustering (SIEVC) to boost energy efficiency, security, and extend network coverage and connectivity. The SIEVC algorithm dynamically selects CHs based on past and present trust, identity trust, and energy trust to identify malicious nodes and form optimal clusters for improved network coverage and connectivity. It also employs dynamic cluster size adjustment to maintain proximity between CHs and cluster members and utilizes node alternation to ensure equitable cluster sizes. This approach minimizes energy depletion, enhances network longevity, and improves load balancing. The algorithm introduces a node alternation mechanism to balance cluster sizes and prevent energy holes. This approach ensures secure and efficient CH selection and promotes even energy distribution. Then the proposed modified red fox (MRF) optimization method, based on the fitness metric, computes the energy-efficient and safe path for data transmission. Trust, energy, distance, link quality and traffic intensity are the factors that the fitness function takes into account. Finally, the data is transmitted to the base station (BS) through CH along the path with the highest fitness value. Then the proposed VMRF algorithm is evaluated using the NS-2 platform, and the outcomes are compared with existing protocols. Based on the evaluations, the VMRF algorithm performs better than existing ones in terms of delay, energy consumption, throughput, packet delivery ratio (PDR), malicious node detection ratio, and residual energy.
{"title":"VMRF: revolutionizing military border surveillance with extensive coverage and connectivity","authors":"S. P. Subotha, L. Femila","doi":"10.1007/s11235-024-01125-6","DOIUrl":"https://doi.org/10.1007/s11235-024-01125-6","url":null,"abstract":"<p>Nowadays, wireless sensor networks (WSNs) are utilised in military-based applications like border surveillance. However, existing border surveillance methods have difficulties with energy efficiency, latency, security, connectivity, optimal path selection and coverage. In this paper, a Voronoi Modified Red Fox (VMRF) algorithm is proposed as a solution to these problems. Initially, secure cluster head (CH) selection and clustering is performed using Secure Spatial Intelligence-Enhanced Voronoi Clustering (SIEVC) to boost energy efficiency, security, and extend network coverage and connectivity. The SIEVC algorithm dynamically selects CHs based on past and present trust, identity trust, and energy trust to identify malicious nodes and form optimal clusters for improved network coverage and connectivity. It also employs dynamic cluster size adjustment to maintain proximity between CHs and cluster members and utilizes node alternation to ensure equitable cluster sizes. This approach minimizes energy depletion, enhances network longevity, and improves load balancing. The algorithm introduces a node alternation mechanism to balance cluster sizes and prevent energy holes. This approach ensures secure and efficient CH selection and promotes even energy distribution. Then the proposed modified red fox (MRF) optimization method, based on the fitness metric, computes the energy-efficient and safe path for data transmission. Trust, energy, distance, link quality and traffic intensity are the factors that the fitness function takes into account. Finally, the data is transmitted to the base station (BS) through CH along the path with the highest fitness value. Then the proposed VMRF algorithm is evaluated using the NS-2 platform, and the outcomes are compared with existing protocols. Based on the evaluations, the VMRF algorithm performs better than existing ones in terms of delay, energy consumption, throughput, packet delivery ratio (PDR), malicious node detection ratio, and residual energy.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"9 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140599896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-04DOI: 10.1007/s11235-024-01132-7
Hang Wan, Zhizhuo Qiu, Rui Quan, Michael David, William Derigent
Recently, wireless sensor networks have been widely used for environmental and structural safety monitoring. However, node batteries cannot be replaced or easily recharged in harsh environments. Maximizing network lifetime remains a challenging issue in designing WSN routing. This paper introduces GTIACO, a novel metaheuristic clustering protocol. It employs an optimal cluster head function to determine cluster number and utilizes game theory for selecting optimal cluster heads. To optimize inter-cluster routing, improved ant colony optimization (ACO) is introduced to construct gathering paths from clusters to the base station. Both blind pathways, pheromone concentration, and angle factors are considered to improve path exploration and transmission efficiency in ant colonies. To assess network performance, various scenarios involving different base station placements and network densities are examined. Experimental results demonstrate GTIACO's superiority over LEACH, ACO, SEP, and PRESPE protocols in network lifetime, stability, energy, and throughput. The proposed GTIACO shows an improvement of at least 4.3% in network lifetime and 32.8% in network throughout. It exhibits superior stability and transmission efficiency across diverse network densities.
{"title":"GTIACO: energy efficient clustering algorithm based on game theory and improved ant colony optimization","authors":"Hang Wan, Zhizhuo Qiu, Rui Quan, Michael David, William Derigent","doi":"10.1007/s11235-024-01132-7","DOIUrl":"https://doi.org/10.1007/s11235-024-01132-7","url":null,"abstract":"<p>Recently, wireless sensor networks have been widely used for environmental and structural safety monitoring. However, node batteries cannot be replaced or easily recharged in harsh environments. Maximizing network lifetime remains a challenging issue in designing WSN routing. This paper introduces GTIACO, a novel metaheuristic clustering protocol. It employs an optimal cluster head function to determine cluster number and utilizes game theory for selecting optimal cluster heads. To optimize inter-cluster routing, improved ant colony optimization (ACO) is introduced to construct gathering paths from clusters to the base station. Both blind pathways, pheromone concentration, and angle factors are considered to improve path exploration and transmission efficiency in ant colonies. To assess network performance, various scenarios involving different base station placements and network densities are examined. Experimental results demonstrate GTIACO's superiority over LEACH, ACO, SEP, and PRESPE protocols in network lifetime, stability, energy, and throughput. The proposed GTIACO shows an improvement of at least 4.3% in network lifetime and 32.8% in network throughout. It exhibits superior stability and transmission efficiency across diverse network densities.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"300 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140599555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-03DOI: 10.1007/s11235-024-01120-x
Huthaifa Obeidat, Mohammed Al-Sadoon, Chemseddine Zebiri, Omar Obeidat, Issa Elfergani, Raed Abd-Alhameed
As a simple and inexpensive channel characteristic, received signal strength (RSS) finds extensive usage in localization applications. However, the quick changes in signal strength impact the localization precision. By averaging over access points (APs) with multiple frequencies and/or heights, this article suggests a novel approach to lowering RSS fluctuation. Initially focused on the plane-earth loss model, the study was later extended to include a multipath indoor propagation scenario that was simulated. We used ray-tracing software to model the indoor propagation situation. This research takes into account the results of three distinct methods for averaging RSS: height averaging, frequency averaging, and hybrid frequency and height (FH) averaging, which combines the two. We discovered that the Height-only strategy considerably decreased the RSS variation with distance for both settings we looked at. Using the frequency-only method even further reduced the variation. Using the Hybrid FH technique greatly enhances the results. Root mean square error values of 4.427 dB, 3.70 dB, and 3.5 dB, respectively, are provided for the averaging approaches and the ideal scenario in which no variance occurs. Another finding is that averaging with APs that have double the height or frequency will not improve the RSS distance variation.
{"title":"Reduction of the received signal strength variation with distance using averaging over multiple heights and frequencies","authors":"Huthaifa Obeidat, Mohammed Al-Sadoon, Chemseddine Zebiri, Omar Obeidat, Issa Elfergani, Raed Abd-Alhameed","doi":"10.1007/s11235-024-01120-x","DOIUrl":"https://doi.org/10.1007/s11235-024-01120-x","url":null,"abstract":"<p>As a simple and inexpensive channel characteristic, received signal strength (RSS) finds extensive usage in localization applications. However, the quick changes in signal strength impact the localization precision. By averaging over access points (APs) with multiple frequencies and/or heights, this article suggests a novel approach to lowering RSS fluctuation. Initially focused on the plane-earth loss model, the study was later extended to include a multipath indoor propagation scenario that was simulated. We used ray-tracing software to model the indoor propagation situation. This research takes into account the results of three distinct methods for averaging RSS: height averaging, frequency averaging, and hybrid frequency and height (FH) averaging, which combines the two. We discovered that the Height-only strategy considerably decreased the RSS variation with distance for both settings we looked at. Using the frequency-only method even further reduced the variation. Using the Hybrid FH technique greatly enhances the results. Root mean square error values of 4.427 dB, 3.70 dB, and 3.5 dB, respectively, are provided for the averaging approaches and the ideal scenario in which no variance occurs. Another finding is that averaging with APs that have double the height or frequency will not improve the RSS distance variation.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"72 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140599553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-01DOI: 10.1007/s11235-024-01124-7
Abstract
Distributed inference tasks could be performed by adaptive filtering techniques. Several enhancement strategies for such techniques were proposed, such as sparsity-aware algorithms, coefficients reuse and correntropy-based cost functions in the case of impulsive noise. In this paper, a general framework based on Lagrange multipliers for the derivation of sophisticated algorithms that incorporate most of these improvements is described. A new general identification algorithm is derived as an example of the proposed approach and its performance is assessed in a distributed setting.
{"title":"Sparsity-aware distributed adaptive filtering with robustness against impulsive noise and low SNR","authors":"","doi":"10.1007/s11235-024-01124-7","DOIUrl":"https://doi.org/10.1007/s11235-024-01124-7","url":null,"abstract":"<h3>Abstract</h3> <p>Distributed inference tasks could be performed by adaptive filtering techniques. Several enhancement strategies for such techniques were proposed, such as sparsity-aware algorithms, coefficients reuse and correntropy-based cost functions in the case of impulsive noise. In this paper, a general framework based on Lagrange multipliers for the derivation of sophisticated algorithms that incorporate most of these improvements is described. A new general identification algorithm is derived as an example of the proposed approach and its performance is assessed in a distributed setting. </p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"36 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140599508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-25DOI: 10.1007/s11235-024-01126-5
Amitkumar V. Jha, Bhargav Appasani, Mohammad S. Khan, Sherali Zeadally, Iyad Katib
The advent of the sixth-generation (6G) wireless communication technology brings forth immense opportunities for enhancing Intelligent Transportation Systems (ITS). We investigate the potential of 6G in revolutionizing transportation systems by analyzing the standards, technologies, and challenges associated with its implementation. Building upon the advancements of 5G, 6G introduces unprecedented capabilities, including ultra-high data rates, ultra-low latency, massive connectivity, and intelligent network orchestration. Leveraging these capabilities, 6G can facilitate seamless connectivity among vehicles, infrastructure, and pedestrians, enabling novel applications such as autonomous driving, smart traffic management, and cooperative collision avoidance. However, realizing the full potential of 6G for ITS entails addressing several challenges, including spectrum allocation, network security, resource management, and interoperability with existing infrastructures. We present a comprehensive overview of the latest developments in 6G standards and technologies, including mmWave communications, terahertz spectrum, visible light communication, Artificial Intelligence, and edge computing, emphasizing their relevance to ITS. We also describe these technologies in the context of ITS. Furthermore, we explore the potential benefits and impacts of 6G on transportation systems, highlighting the opportunities for improved safety, efficiency, and sustainability. Finally, we conclude by discussing the key challenges and research directions that must be addressed to effectively deploy 6G for ITS, thereby paving the way for the next generation of intelligent and connected transportation systems.
{"title":"6G for intelligent transportation systems: standards, technologies, and challenges","authors":"Amitkumar V. Jha, Bhargav Appasani, Mohammad S. Khan, Sherali Zeadally, Iyad Katib","doi":"10.1007/s11235-024-01126-5","DOIUrl":"https://doi.org/10.1007/s11235-024-01126-5","url":null,"abstract":"<p>The advent of the sixth-generation (6G) wireless communication technology brings forth immense opportunities for enhancing Intelligent Transportation Systems (ITS). We investigate the potential of 6G in revolutionizing transportation systems by analyzing the standards, technologies, and challenges associated with its implementation. Building upon the advancements of 5G, 6G introduces unprecedented capabilities, including ultra-high data rates, ultra-low latency, massive connectivity, and intelligent network orchestration. Leveraging these capabilities, 6G can facilitate seamless connectivity among vehicles, infrastructure, and pedestrians, enabling novel applications such as autonomous driving, smart traffic management, and cooperative collision avoidance. However, realizing the full potential of 6G for ITS entails addressing several challenges, including spectrum allocation, network security, resource management, and interoperability with existing infrastructures. We present a comprehensive overview of the latest developments in 6G standards and technologies, including mmWave communications, terahertz spectrum, visible light communication, Artificial Intelligence, and edge computing, emphasizing their relevance to ITS. We also describe these technologies in the context of ITS. Furthermore, we explore the potential benefits and impacts of 6G on transportation systems, highlighting the opportunities for improved safety, efficiency, and sustainability. Finally, we conclude by discussing the key challenges and research directions that must be addressed to effectively deploy 6G for ITS, thereby paving the way for the next generation of intelligent and connected transportation systems.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"26 4 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140298088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-20DOI: 10.1007/s11235-024-01121-w
Abstract
Nowadays, users often opt to encrypt their sensitive data before outsourcing it to the cloud. While this encryption ensures data privacy, it compromises the search functionality. Public key encryption with keyword search (PEKS) has been posited as a potential solution to this challenge. However, many PEKS schemes are either inefficient or vulnerable to various types of attacks, such as inside keyword guessing attacks, outside keyword guessing attacks, etc. In response, we introduce a sustainable certificateless authenticated encryption system with a keyword search scheme. To the best of our knowledge, this proposed scheme is the first to consider multi-trapdoor indistinguishability within the certificateless primitive. Furthermore, our in-depth security analysis indicates that our scheme effectively protects against both online and offline keyword guessing attacksAdditionally, it ensures semantic security by offering both ciphertext indistinguishability and multi-trapdoor indistinguishability. Performance analysis results also suggest that our scheme is efficient and superior to existing alternatives.
{"title":"A sustainable certificateless authenticated searchable encryption with multi-trapdoor indistinguishability","authors":"","doi":"10.1007/s11235-024-01121-w","DOIUrl":"https://doi.org/10.1007/s11235-024-01121-w","url":null,"abstract":"<h3>Abstract</h3> <p>Nowadays, users often opt to encrypt their sensitive data before outsourcing it to the cloud. While this encryption ensures data privacy, it compromises the search functionality. Public key encryption with keyword search (PEKS) has been posited as a potential solution to this challenge. However, many PEKS schemes are either inefficient or vulnerable to various types of attacks, such as inside keyword guessing attacks, outside keyword guessing attacks, etc. In response, we introduce a sustainable certificateless authenticated encryption system with a keyword search scheme. To the best of our knowledge, this proposed scheme is the first to consider multi-trapdoor indistinguishability within the certificateless primitive. Furthermore, our in-depth security analysis indicates that our scheme effectively protects against both online and offline keyword guessing attacksAdditionally, it ensures semantic security by offering both ciphertext indistinguishability and multi-trapdoor indistinguishability. Performance analysis results also suggest that our scheme is efficient and superior to existing alternatives.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"25 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140200793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-20DOI: 10.1007/s11235-024-01123-8
Sangeeta Sa, Arunanshu Mahapatro
In cognitive radio networks (CRNs), rendezvous is the vital step prior to the communication between two unlicensed secondary users (SUs), where the SUs hop on the same channel at the same time to establish a link. With the dramatic fall in the cost and size of wireless transceivers, it becomes more reasonable to apply multiple radios to achieve significant improvement in the rendezvous performance. However, most of the existing multiradio rendezvous algorithms are proposed for homogeneous CRNs where all the SUs are equipped with an equal number of radios and do not possess backward compatibility to SU with a single radio. In reality, the CRNs are heterogeneous in nature as SUs may have different numbers of radios. In this paper, a composite CH algorithm is proposed for an asynchronous and heterogeneous network to achieve blind rendezvous with full rendezvous diversity. An SU with m number radios are categorized into three groups those follow different channel hopping (CH) algorithms. The upper bound of the rendezvous latency is being evaluated with a brief theoretical and mathematical analysis. Extensive simulations have conducted for different performance metrics, and the results are compared with the state-of-art algorithms. Overall, the proposed algorithm shows better performance in heterogeneous CRNs.
在认知无线电网络(CRNs)中,会合是两个未授权的次级用户(SUs)之间通信前的重要步骤,SUs 在同一时间跳转到同一信道以建立链接。随着无线收发器成本和尺寸的大幅下降,应用多无线电来显著提高会合性能变得更加合理。然而,现有的多无线电交会算法大多是针对同构 CRN 提出的,在同构 CRN 中,所有 SU 都配备了相同数量的无线电,并且不具备向后兼容单无线电 SU 的能力。在现实中,CRN 是异构的,因为 SU 可能有不同数量的无线电。本文针对异步异构网络提出了一种复合 CH 算法,以实现盲交会和完全交会分集。一个有 m 个无线电设备的 SU 被分为三组,分别采用不同的信道跳频(CH)算法。通过简要的理论和数学分析,对交会延迟的上限进行了评估。针对不同的性能指标进行了大量模拟,并将结果与最先进的算法进行了比较。总体而言,所提出的算法在异构 CRN 中表现出更好的性能。
{"title":"A composite channel hopping algorithm for blind rendezvous in heterogeneous cognitive radio networks","authors":"Sangeeta Sa, Arunanshu Mahapatro","doi":"10.1007/s11235-024-01123-8","DOIUrl":"https://doi.org/10.1007/s11235-024-01123-8","url":null,"abstract":"<p>In cognitive radio networks (CRNs), rendezvous is the vital step prior to the communication between two unlicensed secondary users (SUs), where the SUs hop on the same channel at the same time to establish a link. With the dramatic fall in the cost and size of wireless transceivers, it becomes more reasonable to apply multiple radios to achieve significant improvement in the rendezvous performance. However, most of the existing multiradio rendezvous algorithms are proposed for homogeneous CRNs where all the SUs are equipped with an equal number of radios and do not possess backward compatibility to SU with a single radio. In reality, the CRNs are heterogeneous in nature as SUs may have different numbers of radios. In this paper, a composite CH algorithm is proposed for an asynchronous and heterogeneous network to achieve blind rendezvous with full rendezvous diversity. An SU with <i>m</i> number radios are categorized into three groups those follow different channel hopping (CH) algorithms. The upper bound of the rendezvous latency is being evaluated with a brief theoretical and mathematical analysis. Extensive simulations have conducted for different performance metrics, and the results are compared with the state-of-art algorithms. Overall, the proposed algorithm shows better performance in heterogeneous CRNs.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"30 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140201088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}