首页 > 最新文献

IET Communications最新文献

英文 中文
FGDB-MLPP: A fine-grained data-sharing scheme with blockchain based on multi-level privacy protection FGDB-MLPP:基于多级隐私保护的区块链细粒度数据共享方案
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-03-01 DOI: 10.1049/cmu2.12737
Junyu Lin, Libo Feng, Jinli Wang, Fei Qiu, Bei Yu, Jing Cheng, Shaowen Yao

In the era of 5G, billions of terminal devices achieve global interconnection and intercommunication, which leads to the generation of massive data. However, the existing cloud-based data-sharing mechanism faces challenges such as sensitive information leakage and data islands, which makes it difficult to achieve secure sharing across domains. In this paper, the authors propose a fine-grained data-sharing scheme based on blockchain and ciphertext policy attribute-based encryption, and design a verifiable outsourced computation method to reduce the computational pressure of end users. Second, the authors comprehensively consider the user's identity privacy and transaction privacy, and propose a multi-level privacy protection method based on ring signature and garbled bloom filter, which enhance the user's data privacy and availability, and prevent the traceability of requests. Finally, the authors design a set of interconnected smart contracts, and verify that their scheme can achieve secure and efficient data sharing through security analysis and performance testing.

在 5G 时代,数十亿终端设备实现了全球互联互通,从而产生了海量数据。然而,现有的基于云的数据共享机制面临敏感信息泄露、数据孤岛等挑战,难以实现跨域安全共享。在本文中,作者提出了一种基于区块链和密文策略属性加密的细粒度数据共享方案,并设计了一种可验证的外包计算方法,以减轻终端用户的计算压力。其次,作者综合考虑了用户的身份隐私和交易隐私,提出了基于环签名和乱码 Bloom 过滤器的多层次隐私保护方法,增强了用户数据的私密性和可用性,防止了请求的可追溯性。最后,作者设计了一套互联的智能合约,并通过安全分析和性能测试验证了其方案能够实现安全高效的数据共享。
{"title":"FGDB-MLPP: A fine-grained data-sharing scheme with blockchain based on multi-level privacy protection","authors":"Junyu Lin,&nbsp;Libo Feng,&nbsp;Jinli Wang,&nbsp;Fei Qiu,&nbsp;Bei Yu,&nbsp;Jing Cheng,&nbsp;Shaowen Yao","doi":"10.1049/cmu2.12737","DOIUrl":"https://doi.org/10.1049/cmu2.12737","url":null,"abstract":"<p>In the era of 5G, billions of terminal devices achieve global interconnection and intercommunication, which leads to the generation of massive data. However, the existing cloud-based data-sharing mechanism faces challenges such as sensitive information leakage and data islands, which makes it difficult to achieve secure sharing across domains. In this paper, the authors propose a fine-grained data-sharing scheme based on blockchain and ciphertext policy attribute-based encryption, and design a verifiable outsourced computation method to reduce the computational pressure of end users. Second, the authors comprehensively consider the user's identity privacy and transaction privacy, and propose a multi-level privacy protection method based on ring signature and garbled bloom filter, which enhance the user's data privacy and availability, and prevent the traceability of requests. Finally, the authors design a set of interconnected smart contracts, and verify that their scheme can achieve secure and efficient data sharing through security analysis and performance testing.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 4","pages":"309-321"},"PeriodicalIF":1.6,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12737","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140063806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel federated learning aggregation algorithm for AIoT intrusion detection 用于人工智能物联网入侵检测的新型联合学习聚合算法
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-03-01 DOI: 10.1049/cmu2.12744
Yidong Jia, Fuhong Lin, Yan Sun

Nowadays, the development of Artificial Intelligence of Things (AIoT) is advancing rapidly, and intelligent devices are increasingly exposed to more security risks on the network. Deep learning-based intrusion detection is an effective security defence approach. Federated learning (FL) is capable of enabling deep learning models to be trained on local clients without uploading their data to a central server. This paper proposes a novel federated learning aggregation algorithm called fed-dynamic gravitational search algorithm (Fed-DGSA), which incorporates the GSA algorithm to optimize the weight updating process of FL local models. During the updating process, the decay rate of the gravity coefficient is optimized and random perturbations and dynamic weights are introduced to ensure a more stable and efficient FL aggregation process. The experimental results show that the detection accuracy of Fed-DGSA has reached about 97.8%, and it is demonstrated that the model trained using Fed-DGSA achieves higher accuracy compared to Fed-Avg.

如今,人工智能物联网(AIoT)的发展日新月异,智能设备越来越多地暴露在网络安全风险中。基于深度学习的入侵检测是一种有效的安全防御方法。联盟学习(FL)能够使深度学习模型在本地客户端上进行训练,而无需将其数据上传到中央服务器。本文提出了一种名为 "联合动态引力搜索算法(Fed-DGSA)"的新型联合学习聚合算法,它结合了 GSA 算法来优化 FL 本地模型的权重更新过程。在更新过程中,优化了重力系数的衰减率,并引入了随机扰动和动态权重,以确保 FL 聚合过程更加稳定和高效。实验结果表明,Fed-DGSA 的检测精度达到了约 97.8%,与 Fed-Avg 相比,使用 Fed-DGSA 训练的模型获得了更高的精度。
{"title":"A novel federated learning aggregation algorithm for AIoT intrusion detection","authors":"Yidong Jia,&nbsp;Fuhong Lin,&nbsp;Yan Sun","doi":"10.1049/cmu2.12744","DOIUrl":"10.1049/cmu2.12744","url":null,"abstract":"<p>Nowadays, the development of Artificial Intelligence of Things (AIoT) is advancing rapidly, and intelligent devices are increasingly exposed to more security risks on the network. Deep learning-based intrusion detection is an effective security defence approach. Federated learning (FL) is capable of enabling deep learning models to be trained on local clients without uploading their data to a central server. This paper proposes a novel federated learning aggregation algorithm called fed-dynamic gravitational search algorithm (Fed-DGSA), which incorporates the GSA algorithm to optimize the weight updating process of FL local models. During the updating process, the decay rate of the gravity coefficient is optimized and random perturbations and dynamic weights are introduced to ensure a more stable and efficient FL aggregation process. The experimental results show that the detection accuracy of Fed-DGSA has reached about 97.8%, and it is demonstrated that the model trained using Fed-DGSA achieves higher accuracy compared to Fed-Avg.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 7","pages":"429-436"},"PeriodicalIF":1.6,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12744","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140082479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust beamforming design for passive RIS-assisted NOMA systems 无源 RIS 辅助 NOMA 系统的稳健波束成形设计
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-02-29 DOI: 10.1049/cmu2.12738
Fengming Yang, Weiran Guo, Jianxin Dai

A transmission power minimization problem for a reconfigurable intelligent surface (RIS) aided non-orthogonal multiple access (NOMA) network has been studied here, which has assumed the channel state information is imperfect. The channel error in this paper has been modeled as two different error models, that is, bounded error model and statistical error model. First, a two-step algorithm is proposed to decouple the decoding order and optimization variables under bounded error model. Then, for the statistical error model, the alternating optimization method is adopted to decouple optimization variables. Finally, the performance difference is compared between the proposed beamforming scheme and the non-RIS scheme from two key parameters, the number of reflected elements and the error factor. Simulation results verify that passive RIS has the advantage on the system performance compared with the scheme without RIS.

本文研究了可重构智能表面(RIS)辅助非正交多址(NOMA)网络的传输功率最小化问题,该问题假定信道状态信息不完善。本文将信道误差建模为两种不同的误差模型,即有界误差模型和统计误差模型。首先,在有界误差模型下,提出了一种解耦解码顺序和优化变量的两步算法。然后,针对统计误差模型,采用交替优化法解耦优化变量。最后,从反射元素数量和误差因子这两个关键参数出发,比较了所提出的波束成形方案与非 RIS 方案的性能差异。仿真结果证明,与无 RIS 方案相比,无源 RIS 方案在系统性能上更具优势。
{"title":"Robust beamforming design for passive RIS-assisted NOMA systems","authors":"Fengming Yang,&nbsp;Weiran Guo,&nbsp;Jianxin Dai","doi":"10.1049/cmu2.12738","DOIUrl":"https://doi.org/10.1049/cmu2.12738","url":null,"abstract":"<p>A transmission power minimization problem for a reconfigurable intelligent surface (RIS) aided non-orthogonal multiple access (NOMA) network has been studied here, which has assumed the channel state information is imperfect. The channel error in this paper has been modeled as two different error models, that is, bounded error model and statistical error model. First, a two-step algorithm is proposed to decouple the decoding order and optimization variables under bounded error model. Then, for the statistical error model, the alternating optimization method is adopted to decouple optimization variables. Finally, the performance difference is compared between the proposed beamforming scheme and the non-RIS scheme from two key parameters, the number of reflected elements and the error factor. Simulation results verify that passive RIS has the advantage on the system performance compared with the scheme without RIS.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 4","pages":"322-331"},"PeriodicalIF":1.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12738","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140063853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A joint resource optimization allocation algorithm for NOMA-D2D communication 用于 NOMA-D2D 通信的联合资源优化分配算法
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-02-29 DOI: 10.1049/cmu2.12741
Jianli Xie, Lin Li, Cuiran Li

The AIoT, with its artificial intelligence capabilities, can further enhance Device-to-Device (D2D) communication. Based on Non-Orthogonal Multiple Access (NOMA), D2D technology can effectively alleviate wireless spectrum resource pressure and improve the capacity of heterogeneous cellular networks. However, it also introduces significant system interference issues. In this paper, a resource allocation algorithm is proposed for the NOMA-D2D heterogeneous cellular network, based on a multi-agent deep reinforcement learning framework. Firstly, the algorithm allocates appropriate channels to D2D clusters. Then, the power allocation factors and D2D transmit power are jointly optimized to suppress the interference and improve the system performance. Simulation results show that both the channel allocation efficiency and the power control performance of the system can be significantly improved.

人工智能物联网(AIoT)具有人工智能功能,可进一步增强设备到设备(D2D)通信。基于非正交多址(NOMA)技术,D2D 技术可以有效缓解无线频谱资源压力,提高异构蜂窝网络的容量。然而,它也会带来严重的系统干扰问题。本文基于多代理深度强化学习框架,提出了一种 NOMA-D2D 异构蜂窝网络的资源分配算法。首先,该算法为 D2D 集群分配适当的信道。然后,联合优化功率分配系数和 D2D 发射功率,以抑制干扰并提高系统性能。仿真结果表明,系统的信道分配效率和功率控制性能都能得到显著提高。
{"title":"A joint resource optimization allocation algorithm for NOMA-D2D communication","authors":"Jianli Xie,&nbsp;Lin Li,&nbsp;Cuiran Li","doi":"10.1049/cmu2.12741","DOIUrl":"10.1049/cmu2.12741","url":null,"abstract":"<p>The AIoT, with its artificial intelligence capabilities, can further enhance Device-to-Device (D2D) communication. Based on Non-Orthogonal Multiple Access (NOMA), D2D technology can effectively alleviate wireless spectrum resource pressure and improve the capacity of heterogeneous cellular networks. However, it also introduces significant system interference issues. In this paper, a resource allocation algorithm is proposed for the NOMA-D2D heterogeneous cellular network, based on a multi-agent deep reinforcement learning framework. Firstly, the algorithm allocates appropriate channels to D2D clusters. Then, the power allocation factors and D2D transmit power are jointly optimized to suppress the interference and improve the system performance. Simulation results show that both the channel allocation efficiency and the power control performance of the system can be significantly improved.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 6","pages":"398-408"},"PeriodicalIF":1.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12741","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140411757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge graph reasoning for cyber attack detection 用于网络攻击检测的知识图谱推理
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-02-26 DOI: 10.1049/cmu2.12736
Ezekia Gilliard, Jinshuo Liu, Ahmed Abubakar Aliyu

In today's digital landscape, cybercriminals are constantly evolving their tactics, making it challenging for traditional cybersecurity methods to keep up. To address this issue, this study explores the potential of knowledge graph reasoning as a more adaptable and sophisticated approach to identify and counter network attacks. By leveraging graph structures imbued with human-like thinking, this method enhances the resilience of cybersecurity systems. The study focuses on three critical aspects: data preparation, semantic foundations, and knowledge graph inference techniques. Through an in-depth analysis of these components, the research aims to reveal how knowledge graph reasoning can improve cyberattack detection and enhance the overall efficacy of cybersecurity measures, including intrusion detection systems. The proposed approach has undergone extensive experimentation to validate its effectiveness compared to existing methods. The results of the experiment have shown a remarkable advancement in accuracy, speed, and recall for recognition, surpassing current methods. This achievement is a notable contribution in the realm of managing big data in cybersecurity. The study establishes a foundation for the automation of network attack detection, ultimately enhancing overall network security.

在当今的数字环境中,网络犯罪分子的战术不断演变,传统的网络安全方法难以跟上。为解决这一问题,本研究探讨了知识图推理作为一种适应性更强、更复杂的方法来识别和反击网络攻击的潜力。通过利用具有类人思维的图结构,这种方法可以增强网络安全系统的复原力。研究重点关注三个关键方面:数据准备、语义基础和知识图推理技术。通过对这些部分的深入分析,研究旨在揭示知识图谱推理如何改进网络攻击检测,并提高网络安全措施(包括入侵检测系统)的整体功效。所提出的方法经过了广泛的实验,以验证其与现有方法相比的有效性。实验结果表明,该方法在识别的准确性、速度和召回率方面都有显著提高,超越了现有方法。这一成果是对网络安全大数据管理领域的显著贡献。这项研究为网络攻击检测的自动化奠定了基础,最终提高了整体网络安全。
{"title":"Knowledge graph reasoning for cyber attack detection","authors":"Ezekia Gilliard,&nbsp;Jinshuo Liu,&nbsp;Ahmed Abubakar Aliyu","doi":"10.1049/cmu2.12736","DOIUrl":"https://doi.org/10.1049/cmu2.12736","url":null,"abstract":"<p>In today's digital landscape, cybercriminals are constantly evolving their tactics, making it challenging for traditional cybersecurity methods to keep up. To address this issue, this study explores the potential of knowledge graph reasoning as a more adaptable and sophisticated approach to identify and counter network attacks. By leveraging graph structures imbued with human-like thinking, this method enhances the resilience of cybersecurity systems. The study focuses on three critical aspects: data preparation, semantic foundations, and knowledge graph inference techniques. Through an in-depth analysis of these components, the research aims to reveal how knowledge graph reasoning can improve cyberattack detection and enhance the overall efficacy of cybersecurity measures, including intrusion detection systems. The proposed approach has undergone extensive experimentation to validate its effectiveness compared to existing methods. The results of the experiment have shown a remarkable advancement in accuracy, speed, and recall for recognition, surpassing current methods. This achievement is a notable contribution in the realm of managing big data in cybersecurity. The study establishes a foundation for the automation of network attack detection, ultimately enhancing overall network security.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 4","pages":"297-308"},"PeriodicalIF":1.6,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12736","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140063859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data transmission path planning method for wireless sensor network in grounding grid area based on MM-DPS hybrid algorithm 基于 MM-DPS 混合算法的接地网格区域无线传感器网络数据传输路径规划方法
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-02-06 DOI: 10.1049/cmu2.12729
Xianghui Xiao, Longsheng Huang, Zhenshan Zhang, Mingxian Huang, Luchang Guan, Yunhao Song

At present, in order to conduct non-destructive testing on the grounding grid of substations under the condition of continuous power supply and no excavation, researchers have applied wireless technology based on electrochemical methods to remotely monitor the corrosion state of grounding conductors online. Nevertheless, wireless signals are affected by the environment when they are transmitted underground. In the field of grounding gird wireless monitoring, how to plan the information transmission path of wireless sensor network (WSN) with high accuracy of data transfer and low energy consumption earns growing research attention. To address the problem of WSN path planning in grounding grid area, a path planning method for WSN based on the hybrid algorithm of map-matching algorithm and double-pole search algorithm (MM-DPS) is proposed in this paper. The map-matching algorithm is employed to calculate the optimal sampling node number of the data transmission path. On the basis of the optimal sampling node number, the double-pole search algorithm is employed in seeking out each sensor node of the path, and two groups of path plans are obtained. In the simulation experiment, compared with the A-star algorithm, the MM-DPS algorithm shortens the data transmission path length by about 39% and reduces the energy consumption by about 57%. The research work brings a method to alleviate the problem of data transmission underground of WSN in grounding grid area. The method not only ensures the accuracy of data transmission, but also shorts the transmission distance and reduces energy consumption.

目前,为了在连续供电和不开挖的条件下对变电站的接地网进行无损检测,研究人员应用了基于电化学方法的无线技术,对接地导线的腐蚀状态进行在线远程监测。然而,无线信号在地下传输时会受到环境影响。在接地导线无线监测领域,如何规划无线传感器网络(WSN)的信息传输路径,实现高精度的数据传输和低能耗,越来越受到研究人员的关注。针对接地网区域 WSN 路径规划问题,本文提出了一种基于地图匹配算法和双极搜索算法(MM-DPS)混合算法的 WSN 路径规划方法。采用地图匹配算法计算数据传输路径的最优采样节点数。在最优采样节点数的基础上,采用双极搜索算法寻找路径上的每个传感器节点,得到两组路径方案。在仿真实验中,与 A-star 算法相比,MM-DPS 算法的数据传输路径长度缩短了约 39%,能耗降低了约 57%。该研究工作带来了一种缓解接地网区域 WSN 地下数据传输问题的方法。该方法不仅保证了数据传输的准确性,还缩短了传输距离,降低了能耗。
{"title":"Data transmission path planning method for wireless sensor network in grounding grid area based on MM-DPS hybrid algorithm","authors":"Xianghui Xiao,&nbsp;Longsheng Huang,&nbsp;Zhenshan Zhang,&nbsp;Mingxian Huang,&nbsp;Luchang Guan,&nbsp;Yunhao Song","doi":"10.1049/cmu2.12729","DOIUrl":"10.1049/cmu2.12729","url":null,"abstract":"<p>At present, in order to conduct non-destructive testing on the grounding grid of substations under the condition of continuous power supply and no excavation, researchers have applied wireless technology based on electrochemical methods to remotely monitor the corrosion state of grounding conductors online. Nevertheless, wireless signals are affected by the environment when they are transmitted underground. In the field of grounding gird wireless monitoring, how to plan the information transmission path of wireless sensor network (WSN) with high accuracy of data transfer and low energy consumption earns growing research attention. To address the problem of WSN path planning in grounding grid area, a path planning method for WSN based on the hybrid algorithm of map-matching algorithm and double-pole search algorithm (MM-DPS) is proposed in this paper. The map-matching algorithm is employed to calculate the optimal sampling node number of the data transmission path. On the basis of the optimal sampling node number, the double-pole search algorithm is employed in seeking out each sensor node of the path, and two groups of path plans are obtained. In the simulation experiment, compared with the A-star algorithm, the MM-DPS algorithm shortens the data transmission path length by about 39% and reduces the energy consumption by about 57%. The research work brings a method to alleviate the problem of data transmission underground of WSN in grounding grid area. The method not only ensures the accuracy of data transmission, but also shorts the transmission distance and reduces energy consumption.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 4","pages":"271-282"},"PeriodicalIF":1.6,"publicationDate":"2024-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12729","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139802391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On multiple handoff blocking-then-reaccess for opportunistic spectrum access 关于机会主义频谱接入的多重交接阻塞-再接入
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-02-03 DOI: 10.1049/cmu2.12733
Jing Zhang, Chu-Long Liang, Hong-Xu Gao, Yan He, Hong-Bo Zhu

Opportunistic spectrum access (OSA), a promising technology to resolve radio spectrum scarcity, is still faced with some challenges, of which one is potentially frequent channel handoff (CH) even handoff blocking (HB) for secondary user (SU) to avoid primary user (PU). Reaccess is a direct way to resolve HB. However, multiple handoff blocking-then-reaccess (H-BTR) are time consuming. Whether it is worthwhile to make multiple H-BTR, is an interesting but hardly mentioned issue. To this end, the multiple H-BTR-based OSA are focused on here. Three key indices, the average transmission probability, handoff delay, and average reaccess times of SU in the H-BTR-based OSA, are deduced as close form first. Then, the effects of H-BTR frequency and service traffic rate of SU on OSA are discussed. Finally, the H-BTR-based OSA is compared to two other schemes, the handoff without BTR (HWBTR)-based OSA and the stop-and-waiting (SW)-based OSA. Theoretical and simulated results show that the H-BTR-based OSA performs best among three schemes. Making H-BTR in moderate frequency according to service traffic rate can increase transmission opportunity while additional delay of SU is tolerable, thus the performance of OSA can be well improved.

机会性频谱接入(OSA)是解决无线电频谱稀缺问题的一项前景广阔的技术,但它仍然面临着一些挑战,其中之一就是次级用户(SU)为避开主用户(PU)而可能频繁进行信道切换(CH)甚至切换阻塞(HB)。重新接入是解决 HB 的直接方法。然而,多次切换阻塞-重接入(H-BTR)非常耗时。是否值得进行多次 H-BTR 是一个有趣但很少被提及的问题。为此,本文重点讨论了基于多重 H-BTR 的 OSA。首先推导出基于 H-BTR 的 OSA 中 SU 的平均传输概率、切换延迟和平均再访问时间这三个关键指标的近似形式。然后,讨论了 H-BTR 频率和 SU 的服务流量率对 OSA 的影响。最后,比较了基于 H-BTR 的 OSA 和其他两种方案,即基于无 BTR 移交(HWBTR)的 OSA 和基于停止等待(SW)的 OSA。理论和模拟结果表明,基于 H-BTR 的 OSA 在三种方案中表现最佳。根据服务流量速率以适度频率进行 H-BTR 可以增加传输机会,同时 SU 的额外延迟是可容忍的,因此 OSA 的性能可以得到很好的改善。
{"title":"On multiple handoff blocking-then-reaccess for opportunistic spectrum access","authors":"Jing Zhang,&nbsp;Chu-Long Liang,&nbsp;Hong-Xu Gao,&nbsp;Yan He,&nbsp;Hong-Bo Zhu","doi":"10.1049/cmu2.12733","DOIUrl":"10.1049/cmu2.12733","url":null,"abstract":"<p>Opportunistic spectrum access (OSA), a promising technology to resolve radio spectrum scarcity, is still faced with some challenges, of which one is potentially frequent channel handoff (CH) even handoff blocking (HB) for secondary user (SU) to avoid primary user (PU). Reaccess is a direct way to resolve HB. However, multiple handoff blocking-then-reaccess (H-BTR) are time consuming. Whether it is worthwhile to make multiple H-BTR, is an interesting but hardly mentioned issue. To this end, the multiple H-BTR-based OSA are focused on here. Three key indices, the average transmission probability, handoff delay, and average reaccess times of SU in the H-BTR-based OSA, are deduced as close form first. Then, the effects of H-BTR frequency and service traffic rate of SU on OSA are discussed. Finally, the H-BTR-based OSA is compared to two other schemes, the handoff without BTR (HWBTR)-based OSA and the stop-and-waiting (SW)-based OSA. Theoretical and simulated results show that the H-BTR-based OSA performs best among three schemes. Making H-BTR in moderate frequency according to service traffic rate can increase transmission opportunity while additional delay of SU is tolerable, thus the performance of OSA can be well improved.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 4","pages":"283-296"},"PeriodicalIF":1.6,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12733","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139808165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SybilPSIoT: Preventing Sybil attacks in signed social internet of things based on web of trust and smart contract SybilPSIoT:基于信任网络和智能合约,防止签名社交物联网中的假冒攻击
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-01-31 DOI: 10.1049/cmu2.12734
Aboulfazl Dayyani, Maghsoud Abbaspour

Sybil attacks are a very serious challenge in social networks including, the Social Internet of Things (SIoT). This paper introduces the SybilPSIoT method, in which a hybrid prevention and detection decentralized approach is proposed in SIoT based on smart contracts. The owner adds his objects to the smart contract. However, hostile owners can create Sybil things. This paper formally presents a model that uses a signed SIoT network with objects and identifiers as network nodes and information about the type of nodes (acknowledgers). Assuming the relationship between the edge marks between nodes and the node type, the proposed method uses trust paths between verification and desired nodes using a Bayesian inference model and structural balance patterns to judge the target node in these paths. It also uses game theory to control access owners to prevent Sybil from creating new things based on a cost-benefit function. Based on the analysis method, a validating effect proportional to the path length on the target object was presented. This method was compared with the most novel available methods; the results from this comparison depict the scalability and effectiveness of the proposed method for large networks.

在包括社交物联网(SIoT)在内的社交网络中,Sybil 攻击是一个非常严峻的挑战。本文介绍了 SybilPSIoT 方法,其中提出了一种基于智能合约的 SIoT 混合预防和检测分散方法。所有者将其对象添加到智能合约中。然而,有敌意的所有者可以创建 Sybil 物件。本文正式提出了一个模型,该模型使用一个签名的 SIoT 网络,将对象和标识符作为网络节点,并提供节点类型的信息(确认器)。假定节点之间的边缘标记与节点类型之间存在关系,所提出的方法利用贝叶斯推理模型和结构平衡模式,使用验证与期望节点之间的信任路径来判断这些路径中的目标节点。它还利用博弈论控制访问所有者,以防止 Sybil 基于成本效益函数创造新事物。根据分析方法,提出了与目标对象路径长度成正比的验证效果。该方法与现有的最新颖方法进行了比较;比较结果表明了所提方法在大型网络中的可扩展性和有效性。
{"title":"SybilPSIoT: Preventing Sybil attacks in signed social internet of things based on web of trust and smart contract","authors":"Aboulfazl Dayyani,&nbsp;Maghsoud Abbaspour","doi":"10.1049/cmu2.12734","DOIUrl":"https://doi.org/10.1049/cmu2.12734","url":null,"abstract":"<p>Sybil attacks are a very serious challenge in social networks including, the Social Internet of Things (SIoT). This paper introduces the SybilPSIoT method, in which a hybrid prevention and detection decentralized approach is proposed in SIoT based on smart contracts. The owner adds his objects to the smart contract. However, hostile owners can create Sybil things. This paper formally presents a model that uses a signed SIoT network with objects and identifiers as network nodes and information about the type of nodes (acknowledgers). Assuming the relationship between the edge marks between nodes and the node type, the proposed method uses trust paths between verification and desired nodes using a Bayesian inference model and structural balance patterns to judge the target node in these paths. It also uses game theory to control access owners to prevent Sybil from creating new things based on a cost-benefit function. Based on the analysis method, a validating effect proportional to the path length on the target object was presented. This method was compared with the most novel available methods; the results from this comparison depict the scalability and effectiveness of the proposed method for large networks.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 3","pages":"258-269"},"PeriodicalIF":1.6,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12734","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139732270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impairment-aware resource allocation scheme for elastic optical networks with different service priorities 针对具有不同服务优先级的弹性光网络的损伤感知资源分配方案
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-01-29 DOI: 10.1049/cmu2.12702
Kusala Munasinghe, Nishan Dharmaweera, Chamitha de Alwis, Uditha Wijewardhana, Rajendran Parthiban

Today, elastic optical networks (EONs) are required to accommodate traffic with different service priorities. For example, mission-critical applications such as industrial internet, smart grids, and remote surgery require an ultra-reliable low-latency communication system. The novel impairment-aware resource allocation scheme proposed here prioritises traffic. It satisfies the quality and latency requirements of mission-critical traffic while causing minimum disruptions to other forms of low-priority traffic connections. The results obtained for 6-node and 14-node networks under various traffic distribution environments indicate that the proposed algorithm achieves higher spectral efficiency, reduces spectrum fragmentation, and causes minimal disruptions over the benchmark algorithm.

如今,弹性光网络(EON)需要适应不同服务优先级的流量。例如,工业互联网、智能电网和远程手术等关键任务应用需要超可靠的低延迟通信系统。本文提出的新型损伤感知资源分配方案可确定流量的优先级。它既能满足关键任务流量的质量和延迟要求,又能对其他形式的低优先级流量连接造成最小的干扰。在不同流量分配环境下对 6 节点和 14 节点网络的研究结果表明,与基准算法相比,所提出的算法能实现更高的频谱效率,减少频谱碎片,并将干扰降至最低。
{"title":"Impairment-aware resource allocation scheme for elastic optical networks with different service priorities","authors":"Kusala Munasinghe,&nbsp;Nishan Dharmaweera,&nbsp;Chamitha de Alwis,&nbsp;Uditha Wijewardhana,&nbsp;Rajendran Parthiban","doi":"10.1049/cmu2.12702","DOIUrl":"https://doi.org/10.1049/cmu2.12702","url":null,"abstract":"<p>Today, elastic optical networks (EONs) are required to accommodate traffic with different service priorities. For example, mission-critical applications such as industrial internet, smart grids, and remote surgery require an ultra-reliable low-latency communication system. The novel impairment-aware resource allocation scheme proposed here prioritises traffic. It satisfies the quality and latency requirements of mission-critical traffic while causing minimum disruptions to other forms of low-priority traffic connections. The results obtained for 6-node and 14-node networks under various traffic distribution environments indicate that the proposed algorithm achieves higher spectral efficiency, reduces spectrum fragmentation, and causes minimal disruptions over the benchmark algorithm.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 3","pages":"197-213"},"PeriodicalIF":1.6,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12702","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139732404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint optimization of sampling point and sensing threshold for spectrum sensing 联合优化频谱传感的采样点和传感阈值
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-01-29 DOI: 10.1049/cmu2.12730
Yuebo Li, Wenjiang Ouyang, Jiawu Miao, Junsheng Mu, Xiaojun Jing

With the continuous evolution and in-depth integration between wireless communication and emerging technology such as internet of things (IoT), artificial intelligence (AI) etc., wireless terminals are growing exponentially, thus bringing great challenges to available spectrum resources. The contradiction between unlimited frequency needs and limited spectrum resources has become a bottleneck restricting the development of wireless communication technology. As an efficient way to improve spectrum efficiency, cognitive radio (CR) continues to be the focus of wireless communication within decades. To conduct CR, the main procedure is the discovery of available spectral holes by periodically monitoring the target authorized band, namely spectrum sensing (SS). Energy detector (ED) is widely accepted for SS due to its low complexity and high convenience. The essence of traditional ED based SS schemes consist in the adaptive variation of sensing threshold/sampling point with environmental signal-to-noise ratio (SNR) at the receiver of CR terminal, namely adaptive sensing threshold/sampling point based SS. However, the performance of both adaptive sensing threshold and adaptive sampling point based SS schemes are always at the expense of computation complexity due to the excessive sampling point. In addition, these two schemes are both about the optimization issue of a single variable under constraints. Actually, both detection probability and false alarm probability of ED are a two-dimensional function of sensing threshold and sampling point for a given SNR. The optimal solution of sensing performance can not be obtained by optimizing sensing threshold or sampling point alone. Motivated by these, the joint optimization of sampling point and sensing threshold is considered for SS in this paper, where sampling point and sensing threshold are jointly adaptive with the variation of environmental SNR. In addition, Q-learning is considered in this paper to obtain the sub-optimal solution due to the non-convexity of the considered optimization problem. Finally, the simulation experiments are made and the results validate the effectiveness of the proposed scheme.

随着无线通信与物联网、人工智能等新兴技术的不断演进和深度融合,无线终端呈指数级增长,给可用频谱资源带来巨大挑战。无限的频率需求与有限的频谱资源之间的矛盾已成为制约无线通信技术发展的瓶颈。作为提高频谱效率的有效途径,认知无线电(CR)在几十年内仍是无线通信领域的焦点。开展认知无线电通信的主要程序是通过定期监测目标授权频段来发现可用的频谱空洞,即频谱感知(SS)。能量探测器(ED)因其低复杂性和高便利性而被广泛用于频谱感测。传统的基于 ED 的频谱感知方案的精髓在于随着 CR 终端接收器的环境信噪比(SNR)而自适应地改变感知阈值/采样点,即基于自适应感知阈值/采样点的频谱感知。然而,基于自适应感应阈值和自适应采样点的 SS 方案的性能总是以采样点过多导致的计算复杂度为代价。此外,这两种方案都涉及约束条件下单一变量的优化问题。实际上,在给定信噪比下,ED 的检测概率和误报概率都是感测阈值和采样点的二维函数。仅优化感测阈值或采样点无法获得感测性能的最优解。受此启发,本文考虑对 SS 进行采样点和传感阈值的联合优化,其中采样点和传感阈值随环境 SNR 的变化而联合自适应。此外,由于所考虑的优化问题具有非凸性,本文还考虑了 Q-learning 来获得次优解。最后,本文进行了仿真实验,结果验证了所提方案的有效性。
{"title":"Joint optimization of sampling point and sensing threshold for spectrum sensing","authors":"Yuebo Li,&nbsp;Wenjiang Ouyang,&nbsp;Jiawu Miao,&nbsp;Junsheng Mu,&nbsp;Xiaojun Jing","doi":"10.1049/cmu2.12730","DOIUrl":"https://doi.org/10.1049/cmu2.12730","url":null,"abstract":"<p>With the continuous evolution and in-depth integration between wireless communication and emerging technology such as internet of things (IoT), artificial intelligence (AI) etc., wireless terminals are growing exponentially, thus bringing great challenges to available spectrum resources. The contradiction between unlimited frequency needs and limited spectrum resources has become a bottleneck restricting the development of wireless communication technology. As an efficient way to improve spectrum efficiency, cognitive radio (CR) continues to be the focus of wireless communication within decades. To conduct CR, the main procedure is the discovery of available spectral holes by periodically monitoring the target authorized band, namely spectrum sensing (SS). Energy detector (ED) is widely accepted for SS due to its low complexity and high convenience. The essence of traditional ED based SS schemes consist in the adaptive variation of sensing threshold/sampling point with environmental signal-to-noise ratio (SNR) at the receiver of CR terminal, namely adaptive sensing threshold/sampling point based SS. However, the performance of both adaptive sensing threshold and adaptive sampling point based SS schemes are always at the expense of computation complexity due to the excessive sampling point. In addition, these two schemes are both about the optimization issue of a single variable under constraints. Actually, both detection probability and false alarm probability of ED are a two-dimensional function of sensing threshold and sampling point for a given SNR. The optimal solution of sensing performance can not be obtained by optimizing sensing threshold or sampling point alone. Motivated by these, the joint optimization of sampling point and sensing threshold is considered for SS in this paper, where sampling point and sensing threshold are jointly adaptive with the variation of environmental SNR. In addition, Q-learning is considered in this paper to obtain the sub-optimal solution due to the non-convexity of the considered optimization problem. Finally, the simulation experiments are made and the results validate the effectiveness of the proposed scheme.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 3","pages":"235-247"},"PeriodicalIF":1.6,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12730","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139732405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1