首页 > 最新文献

Ad Hoc Networks最新文献

英文 中文
TAVA: Traceable anonymity-self-controllable V2X Authentication over dynamic multiple charging-service providers TAVA:动态多充电服务提供商上的可追踪匿名-自控 V2X 验证
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-14 DOI: 10.1016/j.adhoc.2024.103666

The widespread deployment of Electric vehicles (EVs) leads to an increasing demand for charging piles and corresponding charging service (CS) from CS providers (CSPs). Pseudonym-based authentication mechanisms have been designed to resist the attacks which exploit the charging-authentication information to infer EV users’ identities and their driving routes. However, these existing mechanisms generated EV users' pseudonyms by relying on a trusted third entity, which affects the authentication system's resilience and EV user privacy-preservation.

To this end, this paper proposes a Traceable Anonymity-self-controllable V2X Authentication (TAVA) scheme for the multiple-CSP (forming a CSP set) scenario, where each CSP independently manages its own CPs and a CSP randomly joins or leaves the CSP set. TAVA has a series of security capabilities. (1) First, it allows the mutual authentication between an EV user and a CP, while preserving EV user privacy and also assuring forward and backward security. This capability is achieved by using the multi-party computation technique to let all CSPs join the process of generating EV-users’ credentials but each CSP knows nothing about the credentials. (2) Secondly, TAVA has the capabilities of self-controllable anonymity and unlinkability by allowing each EV user to self-generate verifiable and unlinkable one-time pseudonyms based on bilinear- mapping technique. (3) At last, each EV user under TAVA is traceable. It is achieved by applying the two-factor authentication technique in TAVA and linking the one-time pseudonym to the two factors, namely, the credential and the EV user's biometric characteristics with low entropy rates. Note that all these security capabilities are achieved with less performance degradation in terms of communication and storage overheads in the dynamic environment. We conduct the informal and formal analysis of security capabilities and also make performance evaluations. The results indicate that, compared with the latest works, the computation overhead of the mutual authentication in TAVA is reduced by up to 89 %.

电动汽车(EV)的广泛使用导致对充电桩和充电服务提供商(CSP)提供的相应充电服务(CS)的需求不断增加。人们设计了基于假名的认证机制,以抵御利用充电认证信息推断电动汽车用户身份及其驾驶路线的攻击。为此,本文针对多 CSP(形成一个 CSP 集)场景,即每个 CSP 独立管理自己的 CPs,且一个 CSP 随机加入或离开 CSP 集的情况,提出了一种可追踪匿名-自控 V2X 身份验证(TAVA)方案。TAVA 具有一系列安全功能。(1) 首先,它允许 EV 用户和 CP 之间相互认证,同时保护 EV 用户的隐私,并确保前向和后向安全。这种能力是通过多方计算技术实现的,即让所有的 CSP 都加入到生成 EV 用户凭证的过程中,但每个 CSP 对凭证一无所知。(2)其次,TAVA 具有可自我控制的匿名性和不可链接性,允许每个 EV 用户基于双线性映射技术自我生成可验证和不可链接的一次性假名。(3) 最后,TAVA 下的每个 EV 用户都是可追踪的。这是通过在 TAVA 中应用双因素认证技术,并将一次性假名与两个因素(即凭证和 EV 用户的低熵率生物特征)相联系来实现的。需要注意的是,所有这些安全功能都是在动态环境中以较低的通信和存储开销降低性能的情况下实现的。我们对安全能力进行了非正式和正式分析,并进行了性能评估。结果表明,与最新成果相比,TAVA 中相互认证的计算开销最多减少了 89%。
{"title":"TAVA: Traceable anonymity-self-controllable V2X Authentication over dynamic multiple charging-service providers","authors":"","doi":"10.1016/j.adhoc.2024.103666","DOIUrl":"10.1016/j.adhoc.2024.103666","url":null,"abstract":"<div><p>The widespread deployment of Electric vehicles (EVs) leads to an increasing demand for charging piles and corresponding charging service (CS) from CS providers (CSPs). Pseudonym-based authentication mechanisms have been designed to resist the attacks which exploit the charging-authentication information to infer EV users’ identities and their driving routes. However, these existing mechanisms generated EV users' pseudonyms by relying on a trusted third entity, which affects the authentication system's resilience and EV user privacy-preservation.</p><p>To this end, this paper proposes a <em>T</em>raceable <em>A</em>nonymity-self-controllable <em>V</em>2X <em>A</em>uthentication (TAVA) scheme for the multiple-CSP (forming a CSP set) scenario, where each CSP independently manages its own CPs and a CSP randomly joins or leaves the CSP set. TAVA has a series of security capabilities. (1) First, it allows the mutual authentication between an EV user and a CP, while preserving EV user privacy and also assuring forward and backward security. This capability is achieved by using the multi-party computation technique to let all CSPs join the process of generating EV-users’ credentials but each CSP knows nothing about the credentials. (2) Secondly, TAVA has the capabilities of self-controllable anonymity and unlinkability by allowing each EV user to self-generate verifiable and unlinkable one-time pseudonyms based on bilinear- mapping technique. (3) At last, each EV user under TAVA is traceable. It is achieved by applying the two-factor authentication technique in TAVA and linking the one-time pseudonym to the two factors, namely, the credential and the EV user's biometric characteristics with low entropy rates. Note that all these security capabilities are achieved with less performance degradation in terms of communication and storage overheads in the dynamic environment. We conduct the informal and formal analysis of security capabilities and also make performance evaluations. The results indicate that, compared with the latest works, the computation overhead of the mutual authentication in TAVA is reduced by up to 89 %.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142270760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RL-based mobile edge computing scheme for high reliability low latency services in UAV-aided IIoT networks 基于 RL 的移动边缘计算方案,为无人机辅助的 IIoT 网络提供高可靠性低延迟服务
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-12 DOI: 10.1016/j.adhoc.2024.103646

The prevailing adoption of Internet of Things paradigm is giving rise to a wide range of use cases in various vertical industries including remote health, industrial automation, and smart agriculture. However, the realization of such use cases is mainly challenged due to their stringent service requirements of high reliability and low latency. This challenge grows further when the service entails processing collected data for informed decision making. In this work, we consider a field of industrial Internet of Things devices that generate computational tasks and are covered by a nearby base station equipped with an edge server. The edge server offers fast processing to the devices’ tasks to help in meeting their latency requirement. Due to statistical wireless variability, the task data may not be correctly delivered in time for processing. To this end, we utilize an unmanned aerial vehicle as a supplemental edge server that tailors its trajectory and flies closer to the IIoT devices to ensure a highly reliable task delivery based on the given task reliability constraints. We formulate the problem as a Markov Decision Process, and propose a deep reinforcement learning-based approach using proximal policy optimization to optimize the unmanned aerial vehicle trajectory and scheduling devices to offload their data for processing. We present simulation results for various system scenarios to illustrate the effectiveness of the proposed solution as compared to several baseline approaches.

物联网范例的普遍采用正在催生各种垂直行业的广泛用例,包括远程医疗、工业自动化和智能农业。然而,这些用例的实现主要面临着高可靠性和低延迟的严格服务要求。当服务需要处理收集到的数据以做出明智决策时,这一挑战就会进一步加大。在这项工作中,我们考虑了工业物联网设备领域,这些设备会产生计算任务,并由附近配备边缘服务器的基站覆盖。边缘服务器为设备任务提供快速处理,以帮助满足其延迟要求。由于统计上的无线变异性,任务数据可能无法及时正确交付处理。为此,我们利用无人驾驶飞行器作为补充边缘服务器,调整其飞行轨迹并飞近 IIoT 设备,以确保在给定任务可靠性约束的基础上实现高可靠性的任务交付。我们将该问题表述为马尔可夫决策过程,并提出了一种基于深度强化学习的方法,利用近端策略优化来优化无人飞行器的轨迹,并调度设备卸载其数据以进行处理。我们展示了各种系统场景的仿真结果,以说明与几种基线方法相比,所提解决方案的有效性。
{"title":"RL-based mobile edge computing scheme for high reliability low latency services in UAV-aided IIoT networks","authors":"","doi":"10.1016/j.adhoc.2024.103646","DOIUrl":"10.1016/j.adhoc.2024.103646","url":null,"abstract":"<div><p>The prevailing adoption of Internet of Things paradigm is giving rise to a wide range of use cases in various vertical industries including remote health, industrial automation, and smart agriculture. However, the realization of such use cases is mainly challenged due to their stringent service requirements of high reliability and low latency. This challenge grows further when the service entails processing collected data for informed decision making. In this work, we consider a field of industrial Internet of Things devices that generate computational tasks and are covered by a nearby base station equipped with an edge server. The edge server offers fast processing to the devices’ tasks to help in meeting their latency requirement. Due to statistical wireless variability, the task data may not be correctly delivered in time for processing. To this end, we utilize an unmanned aerial vehicle as a supplemental edge server that tailors its trajectory and flies closer to the IIoT devices to ensure a highly reliable task delivery based on the given task reliability constraints. We formulate the problem as a Markov Decision Process, and propose a deep reinforcement learning-based approach using proximal policy optimization to optimize the unmanned aerial vehicle trajectory and scheduling devices to offload their data for processing. We present simulation results for various system scenarios to illustrate the effectiveness of the proposed solution as compared to several baseline approaches.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142243787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PLLM-CS: Pre-trained Large Language Model (LLM) for cyber threat detection in satellite networks PLLM-CS:用于卫星网络网络威胁检测的预训练大型语言模型(LLM)
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-11 DOI: 10.1016/j.adhoc.2024.103645

Satellite networks are vital in facilitating communication services for various critical infrastructures. These networks can seamlessly integrate with a diverse array of systems. However, some of these systems are vulnerable due to the absence of effective intrusion detection systems, which can be attributed to limited research and the high costs associated with deploying, fine-tuning, monitoring, and responding to security breaches. To address these challenges, we propose a pre-trained Large Language Model for Cyber Security, for short PLLM-CS, which is a variant of pre-trained Transformers, which includes a specialized module for transforming network data into contextually suitable inputs. This transformation enables the proposed LLM to encode contextual information within the cyber data. To validate the efficacy of the proposed method, we conducted empirical experiments using two publicly available network datasets, UNSW_NB 15 and TON_IoT, both providing Internet of Things (IoT)-based traffic data. Our experiments demonstrate that proposed LLM method outperforms state-of-the-art techniques such as BiLSTM, GRU, and CNN. Notably, the PLLM-CS method achieves an outstanding accuracy level of 100% on the UNSW_NB 15 dataset, setting a new standard for benchmark performance in this domain.

卫星网络对促进各种关键基础设施的通信服务至关重要。这些网络可以与各种系统无缝集成。然而,由于缺乏有效的入侵检测系统,其中一些系统很容易受到攻击,原因可能是研究有限,以及与部署、微调、监控和应对安全漏洞相关的成本高昂。为了应对这些挑战,我们提出了一种预训练的网络安全大型语言模型(简称 PLLM-CS),它是预训练 Transformers 的一种变体,其中包括一个专门模块,用于将网络数据转换为适合上下文的输入。这种转换使拟议的 LLM 能够对网络数据中的上下文信息进行编码。为了验证所提方法的有效性,我们使用两个公开网络数据集(UNSW_NB 15 和 TON_IoT)进行了实证实验,这两个数据集都提供了基于物联网(IoT)的流量数据。实验证明,所提出的 LLM 方法优于 BiLSTM、GRU 和 CNN 等最先进的技术。值得注意的是,PLLM-CS 方法在 UNSW_NB 15 数据集上达到了 100% 的出色准确率水平,为该领域的基准性能设定了新标准。
{"title":"PLLM-CS: Pre-trained Large Language Model (LLM) for cyber threat detection in satellite networks","authors":"","doi":"10.1016/j.adhoc.2024.103645","DOIUrl":"10.1016/j.adhoc.2024.103645","url":null,"abstract":"<div><p>Satellite networks are vital in facilitating communication services for various critical infrastructures. These networks can seamlessly integrate with a diverse array of systems. However, some of these systems are vulnerable due to the absence of effective intrusion detection systems, which can be attributed to limited research and the high costs associated with deploying, fine-tuning, monitoring, and responding to security breaches. To address these challenges, we propose a pre-trained Large Language Model for Cyber Security, for short PLLM-CS, which is a variant of pre-trained Transformers, which includes a specialized module for transforming network data into contextually suitable inputs. This transformation enables the proposed LLM to encode contextual information within the cyber data. To validate the efficacy of the proposed method, we conducted empirical experiments using two publicly available network datasets, UNSW_NB 15 and TON_IoT, both providing Internet of Things (IoT)-based traffic data. Our experiments demonstrate that proposed LLM method outperforms state-of-the-art techniques such as BiLSTM, GRU, and CNN. Notably, the PLLM-CS method achieves an outstanding accuracy level of 100% on the UNSW_NB 15 dataset, setting a new standard for benchmark performance in this domain.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142167953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A two-context-aware approach for navigation: A case study for vehicular route recommendation 双情境感知导航方法:车辆路线推荐案例研究
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-10 DOI: 10.1016/j.adhoc.2024.103655

In contemporary urban environments, route recommendation systems have become an indispensable tool in moving the population from large centers, serving as valuable resources for circumventing traffic congestion. Enhancing vehicular traffic flow through strategic route adjustments is a pivotal element in improving traffic mobility. However, depending exclusively on traffic-related data for route recommendations fails to meet the essential criteria for ensuring effective management and safety for drivers and passengers during travel. Thus, context awareness and traffic data are crucial for enhancing efficiency and safety in traffic management. Our study proposes a two-context-aware approach to recommend safe routes for urban traffic management, considering road safety and travel time. Experiments were carried out using the widely recognized tool — HERE Navigation. Comparatively, our approach signifies a progressive stride in balancing mobility and security when contrasted with a single focus on travel time.

在当代城市环境中,路线推荐系统已成为大型中心城市人口流动不可或缺的工具,是规避交通拥堵的宝贵资源。通过战略性路线调整提高车辆交通流量是改善交通流动性的关键因素。然而,仅仅依靠交通相关数据来提供路线建议,并不能满足确保有效管理和驾乘人员出行安全的基本标准。因此,情境感知和交通数据对于提高交通管理的效率和安全性至关重要。我们的研究提出了一种双情境感知方法,在考虑道路安全和旅行时间的情况下,为城市交通管理推荐安全路线。我们使用广受认可的工具 HERE 导航进行了实验。与只关注出行时间的方法相比,我们的方法在平衡机动性和安全性方面取得了长足进步。
{"title":"A two-context-aware approach for navigation: A case study for vehicular route recommendation","authors":"","doi":"10.1016/j.adhoc.2024.103655","DOIUrl":"10.1016/j.adhoc.2024.103655","url":null,"abstract":"<div><p>In contemporary urban environments, route recommendation systems have become an indispensable tool in moving the population from large centers, serving as valuable resources for circumventing traffic congestion. Enhancing vehicular traffic flow through strategic route adjustments is a pivotal element in improving traffic mobility. However, depending exclusively on traffic-related data for route recommendations fails to meet the essential criteria for ensuring effective management and safety for drivers and passengers during travel. Thus, context awareness and traffic data are crucial for enhancing efficiency and safety in traffic management. Our study proposes a two-context-aware approach to recommend safe routes for urban traffic management, considering road safety and travel time. Experiments were carried out using the widely recognized tool — HERE Navigation. Comparatively, our approach signifies a progressive stride in balancing mobility and security when contrasted with a single focus on travel time.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S157087052400266X/pdfft?md5=a85e68699e4c9d590fd509b0f69d7794&pid=1-s2.0-S157087052400266X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142171603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A joint optimization of resource allocation management and multi-task offloading in high-mobility vehicular multi-access edge computing networks 高移动性车载多接入边缘计算网络中资源分配管理和多任务卸载的联合优化
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-06 DOI: 10.1016/j.adhoc.2024.103656

Vehicular communications have advanced data exchange and real-time services in intelligent transportation systems by exploiting advanced communication between vehicles and infrastructure. The emergence of Multi-access Edge Computing (MEC) has further elevated this field by utilizing distributed edge resources near vehicles for low-latency data processing and high-reliability communication. In this dynamic environment, adequate resource allocation and task offloading are pivotal to ensure superior performance, lower latency, and efficient network resource utilization, enhancing Quality of Service (QoS) and overall driving experience and safety. This paper presents a developed vehicular network and offloading mechanism, introducing a resource management model with real-time allocation and load balancing. The proposed method integrates task prioritization, multi-agent collaboration, context-aware decision-making, and distributed learning to optimize network performance. The introduced optimized algorithm initializes Q-networks and target networks, sets up an experience replay buffer, and configures agents with local state representations. Agents use an ε-greedy policy for action selection, update Q-values through experience replay, and prioritize tasks based on urgency while sharing state information for collaborative decision-making. Evaluations through simulation demonstrate optimized performance, enhancing efficiency in vehicular MEC networks compared to baseline and the other well-known algorithms.

通过利用车辆与基础设施之间的先进通信,车载通信推进了智能交通系统中的数据交换和实时服务。通过利用车辆附近的分布式边缘资源进行低延迟数据处理和高可靠性通信,多接入边缘计算(MEC)的出现进一步提升了这一领域。在这种动态环境中,适当的资源分配和任务卸载对于确保卓越性能、较低延迟和高效网络资源利用、提高服务质量(QoS)以及整体驾驶体验和安全性至关重要。本文介绍了一种开发的车载网络和卸载机制,引入了一种具有实时分配和负载平衡功能的资源管理模型。所提出的方法整合了任务优先级、多代理协作、情境感知决策和分布式学习,以优化网络性能。引入的优化算法会初始化 Q 网络和目标网络,建立经验重放缓冲区,并配置具有本地状态表示的代理。代理使用ε-贪婪策略进行行动选择,通过经验回放更新Q值,并根据紧迫性确定任务的优先级,同时共享状态信息以进行协同决策。通过仿真进行的评估表明,与基线算法和其他著名算法相比,该算法性能优化,提高了车辆 MEC 网络的效率。
{"title":"A joint optimization of resource allocation management and multi-task offloading in high-mobility vehicular multi-access edge computing networks","authors":"","doi":"10.1016/j.adhoc.2024.103656","DOIUrl":"10.1016/j.adhoc.2024.103656","url":null,"abstract":"<div><p>Vehicular communications have advanced data exchange and real-time services in intelligent transportation systems by exploiting advanced communication between vehicles and infrastructure. The emergence of Multi-access Edge Computing (MEC) has further elevated this field by utilizing distributed edge resources near vehicles for low-latency data processing and high-reliability communication. In this dynamic environment, adequate resource allocation and task offloading are pivotal to ensure superior performance, lower latency, and efficient network resource utilization, enhancing Quality of Service (QoS) and overall driving experience and safety. This paper presents a developed vehicular network and offloading mechanism, introducing a resource management model with real-time allocation and load balancing. The proposed method integrates task prioritization, multi-agent collaboration, context-aware decision-making, and distributed learning to optimize network performance. The introduced optimized algorithm initializes Q-networks and target networks, sets up an experience replay buffer, and configures agents with local state representations. Agents use an ε-greedy policy for action selection, update Q-values through experience replay, and prioritize tasks based on urgency while sharing state information for collaborative decision-making. Evaluations through simulation demonstrate optimized performance, enhancing efficiency in vehicular MEC networks compared to baseline and the other well-known algorithms.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142171604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-domain gesture recognition via WiFi signals with deep learning 利用深度学习通过 WiFi 信号进行跨域手势识别
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-05 DOI: 10.1016/j.adhoc.2024.103654

Compared with systems rely on wearable sensors, cameras or other devices, WiFi-based gesture recognition systems are convenient, non-contact and privacy-friendly, which have received widespread attention in recent years. In WiFi-based gesture recognition systems, the channel state information (CSI) carried by WiFi signals contains fine-grained information, which is commonly used to extract features of gesture activities. However, since the CSI patterns of the same gesture change across domains, these gesture recognition systems cannot effectively work without retraining in new domains, which will hinder the practical adoption of gesture recognition systems. Therefore, we propose a novel gesture recognition system that can address the issue of cross-domain recognition while achieving higher recognition accuracy for in-domain scenarios. Firstly, we employ CSI ratio and subcarrier selection to effectively eliminate noise from the CSI, and propose a method to reconstruct CSI sequence using low-frequency signals, which can effectively remove irrelevant noise in the high-frequency part and ensure the validity of the data. Next, we calculate the phase difference to explore the intrinsic features of gesture and convert the obtained data into RGB image. Finally, we use Dense Convolutional Network as backbone network, combined with dynamic convolution module, for RGB image recognition. Extensive experiments demonstrate that our proposed system can achieve 99.58% in-domain gesture recognition, and its performance across new person and orientations is 99.15% and 98.31%, respectively.

与依赖可穿戴传感器、摄像头或其他设备的系统相比,基于 WiFi 的手势识别系统具有便捷、非接触、隐私友好等特点,近年来受到广泛关注。在基于 WiFi 的手势识别系统中,WiFi 信号携带的信道状态信息(CSI)包含细粒度信息,通常用于提取手势活动的特征。然而,由于同一手势在不同领域的 CSI 模式会发生变化,这些手势识别系统如果不在新领域进行再训练,就无法有效工作,这将阻碍手势识别系统的实际应用。因此,我们提出了一种新型手势识别系统,既能解决跨域识别问题,又能在域内场景中实现更高的识别准确率。首先,我们利用 CSI 比值和子载波选择来有效消除 CSI 中的噪声,并提出了一种利用低频信号重构 CSI 序列的方法,可以有效去除高频部分的无关噪声,确保数据的有效性。接下来,我们通过计算相位差来探索手势的内在特征,并将获得的数据转换为 RGB 图像。最后,我们使用密集卷积网络(Dense Convolutional Network)作为骨干网络,结合动态卷积模块,实现 RGB 图像识别。大量实验证明,我们提出的系统可以达到 99.58% 的域内手势识别率,其跨新人物和新方向的识别率分别为 99.15% 和 98.31%。
{"title":"Cross-domain gesture recognition via WiFi signals with deep learning","authors":"","doi":"10.1016/j.adhoc.2024.103654","DOIUrl":"10.1016/j.adhoc.2024.103654","url":null,"abstract":"<div><p>Compared with systems rely on wearable sensors, cameras or other devices, WiFi-based gesture recognition systems are convenient, non-contact and privacy-friendly, which have received widespread attention in recent years. In WiFi-based gesture recognition systems, the channel state information (CSI) carried by WiFi signals contains fine-grained information, which is commonly used to extract features of gesture activities. However, since the CSI patterns of the same gesture change across domains, these gesture recognition systems cannot effectively work without retraining in new domains, which will hinder the practical adoption of gesture recognition systems. Therefore, we propose a novel gesture recognition system that can address the issue of cross-domain recognition while achieving higher recognition accuracy for in-domain scenarios. Firstly, we employ CSI ratio and subcarrier selection to effectively eliminate noise from the CSI, and propose a method to reconstruct CSI sequence using low-frequency signals, which can effectively remove irrelevant noise in the high-frequency part and ensure the validity of the data. Next, we calculate the phase difference to explore the intrinsic features of gesture and convert the obtained data into RGB image. Finally, we use Dense Convolutional Network as backbone network, combined with dynamic convolution module, for RGB image recognition. Extensive experiments demonstrate that our proposed system can achieve 99.58% in-domain gesture recognition, and its performance across new person and orientations is 99.15% and 98.31%, respectively.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142164834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vehicular edge cloud computing content caching optimization solution based on content prediction and deep reinforcement learning 基于内容预测和深度强化学习的车载边缘云计算内容缓存优化解决方案
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-03 DOI: 10.1016/j.adhoc.2024.103643

In conventional studies on vehicular edge computing, researchers frequently overlook the high-speed mobility of vehicles and the dynamic nature of the vehicular edge environment. Moreover, when employing deep reinforcement learning to address vehicular edge challenges, insufficient attention is given to the potential issue of the algorithm converging to a local optimal solution. This paper presents a content caching solution tailored for vehicular edge cloud computing, integrating content prediction and deep reinforcement learning techniques. Given the swift mobility of vehicles and the ever-changing nature of the vehicular edge environment, the study proposes a content prediction model based on Informer. Leveraging the Informer prediction model, the system anticipates the vehicular edge environment dynamics, thereby informing the caching of vehicle task content. Acknowledging the diverse time scales involved in policy decisions such as content updating, vehicle scheduling, and bandwidth allocation, the paper advocates a dual time-scale Markov modeling approach. Moreover, to address the local optimality issue inherent in the A3C algorithm, an enhanced A3C algorithm is introduced, incorporating an ɛ-greedy strategy to promote exploration. Recognizing the potential limitations posed by a fixed exploration rate ɛ, a dynamic baseline mechanism is proposed for updating ɛ dynamically. Experimental findings demonstrate that compared to alternative content caching approaches, the proposed vehicle edge computing content caching solution substantially mitigates content access costs. To support research in this area, we have publicly released the source code and pre-trained models at https://github.com/JYAyyyyyy/Informer.git.

在有关车辆边缘计算的传统研究中,研究人员经常忽视车辆的高速流动性和车辆边缘环境的动态性质。此外,在利用深度强化学习解决车辆边缘挑战时,对算法收敛到局部最优解的潜在问题关注不够。本文结合内容预测和深度强化学习技术,提出了一种为车载边缘云计算量身定制的内容缓存解决方案。考虑到车辆的快速移动性和车辆边缘环境的不断变化,本研究提出了一种基于 Informer 的内容预测模型。利用 Informer 预测模型,系统可以预测车辆边缘环境的动态,从而为车辆任务内容的缓存提供信息。考虑到内容更新、车辆调度和带宽分配等策略决策涉及不同的时间尺度,本文主张采用双时间尺度马尔可夫建模方法。此外,为了解决 A3C 算法中固有的局部最优性问题,本文引入了一种增强型 A3C 算法,其中包含一种促进探索的ɛ 贪婪策略。考虑到固定探索率ɛ 可能带来的限制,我们提出了一种动态基线机制,用于动态更新ɛ。实验结果表明,与其他内容缓存方法相比,所提出的车载边缘计算内容缓存解决方案大大降低了内容访问成本。为了支持这一领域的研究,我们在 https://github.com/JYAyyyyyy/Informer.git 上公开发布了源代码和预训练模型。
{"title":"Vehicular edge cloud computing content caching optimization solution based on content prediction and deep reinforcement learning","authors":"","doi":"10.1016/j.adhoc.2024.103643","DOIUrl":"10.1016/j.adhoc.2024.103643","url":null,"abstract":"<div><p>In conventional studies on vehicular edge computing, researchers frequently overlook the high-speed mobility of vehicles and the dynamic nature of the vehicular edge environment. Moreover, when employing deep reinforcement learning to address vehicular edge challenges, insufficient attention is given to the potential issue of the algorithm converging to a local optimal solution. This paper presents a content caching solution tailored for vehicular edge cloud computing, integrating content prediction and deep reinforcement learning techniques. Given the swift mobility of vehicles and the ever-changing nature of the vehicular edge environment, the study proposes a content prediction model based on Informer. Leveraging the Informer prediction model, the system anticipates the vehicular edge environment dynamics, thereby informing the caching of vehicle task content. Acknowledging the diverse time scales involved in policy decisions such as content updating, vehicle scheduling, and bandwidth allocation, the paper advocates a dual time-scale Markov modeling approach. Moreover, to address the local optimality issue inherent in the A3C algorithm, an enhanced A3C algorithm is introduced, incorporating an <span><math><mi>ɛ</mi></math></span>-greedy strategy to promote exploration. Recognizing the potential limitations posed by a fixed exploration rate <span><math><mi>ɛ</mi></math></span>, a dynamic baseline mechanism is proposed for updating <span><math><mi>ɛ</mi></math></span> dynamically. Experimental findings demonstrate that compared to alternative content caching approaches, the proposed vehicle edge computing content caching solution substantially mitigates content access costs. To support research in this area, we have publicly released the source code and pre-trained models at <span><span>https://github.com/JYAyyyyyy/Informer.git</span><svg><path></path></svg></span>.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142149092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain and Quantum Machine Learning Driven Energy Trading for Electric Vehicles 区块链和量子机器学习驱动的电动汽车能源交易
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-03 DOI: 10.1016/j.adhoc.2024.103632

With the steep growth of Electric Vehicles (EV's), the consequent demand of energy for charging puts significant load to powergrids. Renewable Energy Sources enabled microgrids can alleviate the problem of energy demand and trade the energy locally in Peer-to-Peer (P2P) manner, where seller (microgrid) and buyer (EV's) “meet” to trade electricity directly on agreed term without any intermediary. However, a foolproof system required for audit and verification of transaction record between seller and buyer to address privacy and security in untrusted and opaque local energy trading market (LETM). Centralized public blockchain enabled system (for audit the transaction records and storage) based on conventional learning models faces mainly two issues in the LETM. (a) if, centralize system runs out of energy and tear down then whole energy trading plunges treated as single point of failure (b) Conventional learning models fail to converge optimal point in case of large state and action space (large number of EV's and their energy demand). The primary objective of this paper to provide secure system for LETM, 1) Distributed nature of Consortium Blockchain used that solve the problem of single point of failure to audit and storage of transaction and profile info of microgrids and EV's. 2) Quantum based Reinforcement Learning (QRL) easily handles the large number of EV's energy supply and demand for smoothly run LETM. In this context, this paper presents Blockchain and Quantum Machine Learning driven energy trading model for EVs (B-MET). A utility maximization problem formulated as Markov Decision Process (MDP) and their solution provided by using QRL focusing on join optimization of selling price, loan amount and quantity of shared energy. MDP is a mathematical framework used to model decision-making in situations where outcomes are partly random and partly under the control of a decision-maker, i.e., the future state depends only on the current state and action, not on the sequence of events that preceded it. QRL method combines quantum theory with traditional RL. It is inspire by the principles of state superposition and quantum parallelism. Convergence analysis and performance results attest that B-MET convergences faster, maximizes the utility with lower confirmation delay in P2P energy trading as compare to state of the art techniques.

随着电动汽车(EV)的急剧增长,随之而来的充电能源需求给电网带来了巨大的负荷。支持可再生能源的微电网可以缓解能源需求问题,并以点对点(P2P)的方式在本地进行能源交易,即卖方(微电网)和买方(电动汽车)"见面",在商定的条件下直接进行电力交易,无需任何中介。然而,在不信任和不透明的本地能源交易市场(LETM)中,需要一个万无一失的系统来审计和验证卖方和买方之间的交易记录,以解决隐私和安全问题。基于传统学习模型的中心化公共区块链系统(用于审核交易记录和存储)在本地能源交易市场中主要面临两个问题。(a) 如果中心化系统耗尽能源并关闭,那么整个能源交易就会陷入单点故障 (b) 在状态和行动空间较大(大量电动汽车及其能源需求)的情况下,传统学习模型无法收敛到最佳点。本文的主要目标是为 LETM 提供安全系统,1)使用联盟区块链的分布式特性,解决单点故障问题,审计和存储微电网和电动汽车的交易和配置文件信息。2) 基于量子的强化学习(QRL)可轻松处理大量电动汽车的能源供应和需求,使 LETM 顺利运行。在此背景下,本文提出了区块链和量子机器学习驱动的电动汽车能源交易模型(B-MET)。将效用最大化问题表述为马尔可夫决策过程(Markov Decision Process,MDP),并通过量子机器学习提供解决方案,重点关注销售价格、贷款金额和共享能源数量的联合优化。马尔可夫决策过程是一个数学框架,用于模拟在结果部分随机、部分受决策者控制的情况下的决策,即未来状态只取决于当前状态和行动,而不取决于之前的事件序列。QRL 方法结合了量子理论和传统的 RL。它的灵感来源于状态叠加和量子并行原理。收敛分析和性能结果证明,与现有技术相比,B-MET 收敛速度更快,在 P2P 能量交易中以更低的确认延迟实现了效用最大化。
{"title":"Blockchain and Quantum Machine Learning Driven Energy Trading for Electric Vehicles","authors":"","doi":"10.1016/j.adhoc.2024.103632","DOIUrl":"10.1016/j.adhoc.2024.103632","url":null,"abstract":"<div><p>With the steep growth of Electric Vehicles (EV's), the consequent demand of energy for charging puts significant load to powergrids. Renewable Energy Sources enabled microgrids can alleviate the problem of energy demand and trade the energy locally in Peer-to-Peer (P2P) manner, where seller (microgrid) and buyer (EV's) “meet” to trade electricity directly on agreed term without any intermediary. However, a foolproof system required for audit and verification of transaction record between seller and buyer to address privacy and security in untrusted and opaque local energy trading market (LETM). Centralized public blockchain enabled system (for audit the transaction records and storage) based on conventional learning models faces mainly two issues in the LETM. (a) if, centralize system runs out of energy and tear down then whole energy trading plunges treated as single point of failure (b) Conventional learning models fail to converge optimal point in case of large state and action space (large number of EV's and their energy demand). The primary objective of this paper to provide secure system for LETM, 1) Distributed nature of Consortium Blockchain used that solve the problem of single point of failure to audit and storage of transaction and profile info of microgrids and EV's. 2) Quantum based Reinforcement Learning (QRL) easily handles the large number of EV's energy supply and demand for smoothly run LETM. In this context, this paper presents Blockchain and Quantum Machine Learning driven energy trading model for EVs (B-MET). A utility maximization problem formulated as Markov Decision Process (MDP) and their solution provided by using QRL focusing on join optimization of selling price, loan amount and quantity of shared energy. MDP is a mathematical framework used to model decision-making in situations where outcomes are partly random and partly under the control of a decision-maker, i.e., the future state depends only on the current state and action, not on the sequence of events that preceded it. QRL method combines quantum theory with traditional RL. It is inspire by the principles of state superposition and quantum parallelism. Convergence analysis and performance results attest that B-MET convergences faster, maximizes the utility with lower confirmation delay in P2P energy trading as compare to state of the art techniques.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142129048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THz band drone communications with practical antennas: Performance under realistic mobility and misalignment scenarios 采用实用天线的太赫兹波段无人机通信:实际移动和错位情况下的性能
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1016/j.adhoc.2024.103644

For 6G non-terrestrial communications, drones will offer uninterrupted connectivity for surveillance, sensing, and localization. They will also serve as drone base stations to support terrestrial base stations, providing large bandwidth, high-rate, and ultra-reliable low latency services. In this paper, for the first time in the literature, we depict the true performance of Terahertz (THz) band communications among drones by applying various channel selection and power allocation schemes with practical THz antennas within (0.75–4.4) THz under realistic mobility and misalignment scenarios. Through numerical simulations, we unveil the capacity of drone links under different channel selection and power allocation schemes within 10s to 100s of Gbps at distances (1–100) m, when drones are in motion and subject to (mis)alignment due to mobility and even under beam misalignment fading. However, when exposed to real drone mobility traces, the performance of all channel selection schemes drops significantly, sometimes by up to six orders of magnitude, due to the occasional reverse orientations of antennas. In addition to the capacity analysis, we report available frequency bands (transmission windows) considering all schemes and mobility patterns. We also identify a band that is commonly available under all considered mobility and misalignment settings, and we evaluate its performance in terms of spectral and energy efficiencies, which can be useful in designing THz transceivers for drone communications. Our findings emphasize the essence of active beam control solutions to achieve the desired capacity potential of THz drone communications, while also highlighting the challenges of utilizing the THz band for drone communications.

对于 6G 非地面通信,无人机将为监控、传感和定位提供不间断的连接。它们还将作为无人机基站支持地面基站,提供大带宽、高速率和超可靠的低延迟服务。在本文中,我们首次在文献中描述了无人机之间太赫兹(THz)频段通信的真实性能,即在现实的移动性和错位场景下,通过(0.75-4.4)太赫兹范围内的实用太赫兹天线应用各种信道选择和功率分配方案。通过数值模拟,我们揭示了在不同信道选择和功率分配方案下,无人机链路在距离(1-100)米时的容量在 10 到 100 Gbps 之间,此时无人机处于运动状态,并且由于移动性甚至在波束错位衰落情况下会出现(错位)对齐。然而,当暴露在真实的无人机移动轨迹中时,由于天线偶尔会反向,所有信道选择方案的性能都会大幅下降,有时甚至会下降 6 个数量级。除了容量分析,我们还报告了考虑到所有方案和移动模式的可用频段(传输窗口)。我们还确定了一个在所有考虑的移动性和错位设置下都普遍可用的频段,并从频谱和能量效率的角度对其性能进行了评估,这对设计用于无人机通信的太赫兹收发器非常有用。我们的研究结果强调了主动波束控制解决方案对实现太赫兹无人机通信所需容量潜力的重要性,同时也突出了利用太赫兹频段进行无人机通信所面临的挑战。
{"title":"THz band drone communications with practical antennas: Performance under realistic mobility and misalignment scenarios","authors":"","doi":"10.1016/j.adhoc.2024.103644","DOIUrl":"10.1016/j.adhoc.2024.103644","url":null,"abstract":"<div><p>For 6G non-terrestrial communications, drones will offer uninterrupted connectivity for surveillance, sensing, and localization. They will also serve as drone base stations to support terrestrial base stations, providing large bandwidth, high-rate, and ultra-reliable low latency services. In this paper, for the first time in the literature, we depict the true performance of Terahertz (THz) band communications among drones by applying various channel selection and power allocation schemes with practical THz antennas within (0.75–4.4) THz under realistic mobility and misalignment scenarios. Through numerical simulations, we unveil the capacity of drone links under different channel selection and power allocation schemes within 10s to 100s of Gbps at distances (1–100) m, when drones are in motion and subject to (mis)alignment due to mobility and even under beam misalignment fading. However, when exposed to real drone mobility traces, the performance of all channel selection schemes drops significantly, sometimes by up to six orders of magnitude, due to the occasional reverse orientations of antennas. In addition to the capacity analysis, we report available frequency bands (transmission windows) considering all schemes and mobility patterns. We also identify a band that is commonly available under all considered mobility and misalignment settings, and we evaluate its performance in terms of spectral and energy efficiencies, which can be useful in designing THz transceivers for drone communications. Our findings emphasize the essence of active beam control solutions to achieve the desired capacity potential of THz drone communications, while also highlighting the challenges of utilizing the THz band for drone communications.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142164835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Load-adaptive MAC protocol for frontier detection in Underwater Mobile Sensor Network 用于水下移动传感器网络前沿检测的负载自适应 MAC 协议
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-31 DOI: 10.1016/j.adhoc.2024.103641

This work proposes a load-adaptive Medium Access Control (MAC) protocol for the frontier/boundary detection application of underwater phenomena using Underwater Mobile Sensor Network (UWMSN). A leader-follower architecture of a swarm of underwater vehicles is proposed here. Autonomous Underwater Vehicles (AUVs) traverse a random mobility pattern beneath one Autonomous Surface Vehicle (ASV) (leader) in the proposed network. ASV has to guide multiple-follower AUVs in the event of interest. The vehicular swarm aims to explore the frontiers in the event to build the map. Load-adaptive MAC protocol is therefore proposed and implemented in this hybrid multi-vehicular network to ensure seamless vehicular communications. The ASV has navigational capabilities to aid the AUVs in navigation and data collection. The proposed MAC protocol can adjust the dynamic mobility and load in the network. The protocol aims to provide dynamic Time Division Multiple Access (TDMA) slots for the AUVs wirelessly linked in the vicinity of the ASV. These slots are used for ranging/navigation and data transmission. Additional urgent data from any AUVs can be transmitted in open Carrier Sense Multiple Access (CSMA) protocol following the TDMA duration. Results have been generated by comparing protocols like CSMA, ALOHA, and TDMA with the proposed Load-Adaptive MAC protocol. The protocols have been compared to the throughput vs number of nodes and throughput vs simulation time. It has been observed that the proposed MAC can perform better than ALOHA and CSMA protocols. Nevertheless, it can produce comparable results for TDMA protocol while supporting the dynamic mobility and load in the network meantime supporting urgent data transmission for nodes in demand.

本研究提出了一种负载自适应介质访问控制(MAC)协议,用于利用水下移动传感器网络(UWMSN)对水下现象进行前沿/边界探测。这里提出了一种水下航行器群的领导者-跟随者架构。在提议的网络中,自主水下航行器(AUV)在一个自主水面航行器(ASV)(领导者)的下方以随机移动模式行进。ASV 必须在感兴趣时引导多个跟随者 AUV。车群的目标是探索事件的前沿,以绘制地图。因此,提出了负载自适应 MAC 协议,并在这个混合多车辆网络中实施,以确保无缝车辆通信。ASV 具有导航能力,可帮助 AUV 进行导航和数据收集。所提出的 MAC 协议可以调整网络中的动态移动性和负载。该协议旨在为在 ASV 附近无线连接的 AUV 提供动态时分多址 (TDMA) 时隙。这些时隙用于响铃/导航和数据传输。在 TDMA 持续时间之后,任何 AUV 的其他紧急数据都可以通过开放的载波感应多路访问(CSMA)协议进行传输。通过将 CSMA、ALOHA 和 TDMA 等协议与所提出的负载自适应 MAC 协议进行比较,得出了结果。这些协议的吞吐量与节点数、吞吐量与模拟时间进行了比较。结果表明,提议的 MAC 比 ALOHA 和 CSMA 协议表现更好。不过,在支持网络中的动态移动性和负载的同时,它还能产生与 TDMA 协议相当的结果,同时支持有需求节点的紧急数据传输。
{"title":"Load-adaptive MAC protocol for frontier detection in Underwater Mobile Sensor Network","authors":"","doi":"10.1016/j.adhoc.2024.103641","DOIUrl":"10.1016/j.adhoc.2024.103641","url":null,"abstract":"<div><p>This work proposes a load-adaptive Medium Access Control (MAC) protocol for the frontier/boundary detection application of underwater phenomena using Underwater Mobile Sensor Network (UWMSN). A leader-follower architecture of a swarm of underwater vehicles is proposed here. Autonomous Underwater Vehicles (AUVs) traverse a random mobility pattern beneath one Autonomous Surface Vehicle (ASV) (leader) in the proposed network. ASV has to guide multiple-follower AUVs in the event of interest. The vehicular swarm aims to explore the frontiers in the event to build the map. Load-adaptive MAC protocol is therefore proposed and implemented in this hybrid multi-vehicular network to ensure seamless vehicular communications. The ASV has navigational capabilities to aid the AUVs in navigation and data collection. The proposed MAC protocol can adjust the dynamic mobility and load in the network. The protocol aims to provide dynamic Time Division Multiple Access (TDMA) slots for the AUVs wirelessly linked in the vicinity of the ASV. These slots are used for ranging/navigation and data transmission. Additional urgent data from any AUVs can be transmitted in open Carrier Sense Multiple Access (CSMA) protocol following the TDMA duration. Results have been generated by comparing protocols like CSMA, ALOHA, and TDMA with the proposed Load-Adaptive MAC protocol. The protocols have been compared to the throughput vs number of nodes and throughput vs simulation time. It has been observed that the proposed MAC can perform better than ALOHA and CSMA protocols. Nevertheless, it can produce comparable results for TDMA protocol while supporting the dynamic mobility and load in the network meantime supporting urgent data transmission for nodes in demand.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Ad Hoc Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1