首页 > 最新文献

Ad Hoc Networks最新文献

英文 中文
TSP-DRL: High-robustness service deployment for mobile virtual reality TSP-DRL:移动虚拟现实的高鲁棒性业务部署
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-26 DOI: 10.1016/j.adhoc.2025.104126
Xuejian Chi , Xiaoya Jin , Dapeng Jiao
Mobile virtual reality (MVR), leveraging edge computing’s proximity to end devices, enables real-time responsiveness and improves users’ Quality of Experience (QoE), and has therefore attracted growing attention. However, the mobility and instability of edge environments render edge servers vulnerable to network attacks or hardware failures, undermining service continuity. Prior studies have devoted limited attention to the systemic impact of such failures. In this work, we study the problem of robust service deployment and scheduling, focusing on how to deploy service components to mitigate the degradation in user experience caused by server failures. This problem presents two challenges: (i) seamless takeover of users served by failed servers; and (ii) balancing robustness gains against the total system cost. To overcome these challenges, we design a two-stage service placement strategy based on deep reinforcement learning (TSP-DRL). In the first stage, an iterative search groups neighboring edge servers to identify those that can take over users from failed servers. In the second stage, a deep reinforcement learning agent models the complex relationship between robustness gains and total cost, enabling efficient service-component placement in dynamic environments. Finally, real trace-based data simulations indicate that, compared with state-of-the-art methods, TSP-DRL improves robustness gains by 12%–23% while reducing total system cost by 11%–14%.
移动虚拟现实(MVR)利用边缘计算与终端设备的接近性,实现了实时响应并提高了用户的体验质量(QoE),因此引起了越来越多的关注。但是,边缘环境的移动性和不稳定性使得边缘服务器容易受到网络攻击或硬件故障的影响,从而影响业务的连续性。先前的研究对此类失败的系统性影响关注有限。在这项工作中,我们研究了健壮的服务部署和调度问题,重点关注如何部署服务组件以减轻服务器故障导致的用户体验下降。这个问题提出了两个挑战:(i)无缝接管由故障服务器服务的用户;(ii)平衡鲁棒性收益与系统总成本。为了克服这些挑战,我们设计了一种基于深度强化学习(TSP-DRL)的两阶段服务放置策略。在第一阶段,迭代搜索对相邻的边缘服务器进行分组,以确定那些可以从故障服务器接管用户的服务器。在第二阶段,深度强化学习代理对鲁棒性增益和总成本之间的复杂关系进行建模,从而在动态环境中实现高效的服务组件放置。最后,基于真实轨迹的数据模拟表明,与最先进的方法相比,TSP-DRL的鲁棒性增益提高了12%-23%,同时将系统总成本降低了11%-14%。
{"title":"TSP-DRL: High-robustness service deployment for mobile virtual reality","authors":"Xuejian Chi ,&nbsp;Xiaoya Jin ,&nbsp;Dapeng Jiao","doi":"10.1016/j.adhoc.2025.104126","DOIUrl":"10.1016/j.adhoc.2025.104126","url":null,"abstract":"<div><div>Mobile virtual reality (MVR), leveraging edge computing’s proximity to end devices, enables real-time responsiveness and improves users’ Quality of Experience (QoE), and has therefore attracted growing attention. However, the mobility and instability of edge environments render edge servers vulnerable to network attacks or hardware failures, undermining service continuity. Prior studies have devoted limited attention to the systemic impact of such failures. In this work, we study the problem of robust service deployment and scheduling, focusing on how to deploy service components to mitigate the degradation in user experience caused by server failures. This problem presents two challenges: (i) seamless takeover of users served by failed servers; and (ii) balancing robustness gains against the total system cost. To overcome these challenges, we design a two-stage service placement strategy based on deep reinforcement learning (TSP-DRL). In the first stage, an iterative search groups neighboring edge servers to identify those that can take over users from failed servers. In the second stage, a deep reinforcement learning agent models the complex relationship between robustness gains and total cost, enabling efficient service-component placement in dynamic environments. Finally, real trace-based data simulations indicate that, compared with state-of-the-art methods, TSP-DRL improves robustness gains by 12%–23% while reducing total system cost by 11%–14%.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"183 ","pages":"Article 104126"},"PeriodicalIF":4.8,"publicationDate":"2025-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145884186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey of trust management mechanisms in the Internet of Vehicles 车联网信任管理机制研究
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-24 DOI: 10.1016/j.adhoc.2025.104131
Zijiang Yang, Qi Tao
With the rapid growth of the automotive industry, the Internet of Vehicles (IoV) has become a vital platform for information exchange among vehicles and between vehicles and roadside infrastructure. However, due to complex network structures and high vehicle mobility, such exchanges are not always reliable. Trust management in IoV is therefore critical to ensuring safety and reliability. This paper reviews research on IoV trust management mechanisms. It first introduces the basic IoV models, and then identifies an evolutionary trajectory based on the existing literature: from early trust management models, to growing attention to privacy protection, and more recently to the adoption of emerging technologies such as blockchain for decentralized trust management. Based on this trajectory, the paper analyzes existing work from three perspectives: trust management models, privacy protection, and blockchain-IoV integration. Furthermore, this article systematically surveys experimental simulation platforms and evaluation indicators to clarify validation practices. Finally, by synthesizing the research landscape and highlighting key limitations and bottlenecks, the paper outlines future directions and priorities for IoV trust management in light of both technological advances and application needs.
随着汽车工业的快速发展,车联网(IoV)已成为车辆之间以及车辆与路边基础设施之间信息交换的重要平台。然而,由于复杂的网络结构和车辆的高移动性,这种交换并不总是可靠的。因此,在车联网中,信任管理对于确保安全性和可靠性至关重要。本文综述了车联网信任管理机制的研究进展。首先介绍了基本的车联网模型,然后根据现有文献确定了一个进化轨迹:从早期的信任管理模型,到对隐私保护的日益关注,再到最近采用区块链等新兴技术进行分散信任管理。基于这一轨迹,本文从信任管理模型、隐私保护和区块链-车联网集成三个角度分析了现有的工作。此外,本文还对实验仿真平台和评价指标进行了系统调查,以明确验证实践。最后,通过综合研究现状,突出关键限制和瓶颈,从技术进步和应用需求两方面概述了车联网信任管理的未来方向和优先事项。
{"title":"A survey of trust management mechanisms in the Internet of Vehicles","authors":"Zijiang Yang,&nbsp;Qi Tao","doi":"10.1016/j.adhoc.2025.104131","DOIUrl":"10.1016/j.adhoc.2025.104131","url":null,"abstract":"<div><div>With the rapid growth of the automotive industry, the Internet of Vehicles (IoV) has become a vital platform for information exchange among vehicles and between vehicles and roadside infrastructure. However, due to complex network structures and high vehicle mobility, such exchanges are not always reliable. Trust management in IoV is therefore critical to ensuring safety and reliability. This paper reviews research on IoV trust management mechanisms. It first introduces the basic IoV models, and then identifies an evolutionary trajectory based on the existing literature: from early trust management models, to growing attention to privacy protection, and more recently to the adoption of emerging technologies such as blockchain for decentralized trust management. Based on this trajectory, the paper analyzes existing work from three perspectives: trust management models, privacy protection, and blockchain-IoV integration. Furthermore, this article systematically surveys experimental simulation platforms and evaluation indicators to clarify validation practices. Finally, by synthesizing the research landscape and highlighting key limitations and bottlenecks, the paper outlines future directions and priorities for IoV trust management in light of both technological advances and application needs.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"183 ","pages":"Article 104131"},"PeriodicalIF":4.8,"publicationDate":"2025-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145884345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collaborative DRL-driven task offloading for maritime edge computing 协同drl驱动的海上边缘计算任务卸载
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-17 DOI: 10.1016/j.adhoc.2025.104124
Huogen Yang , Yiwen Hu , Zhongming Yang , Xiaohui Yang , Guangxue Yue
The introduction of Mobile edge computing enables resource-constrained maritime terminal users to access low-latency computing services; however, the dynamic nature of the marine environment and scarce resources render traditional computation offloading strategies inadequate for meeting actual demands, making task offloading a critical issue for achieving prompt and efficient service with optimal resource utilization. In particular, fine-tuning the offloading decision process is crucial for enhancing network stability and extending system endurance. To address these challenges, this paper proposes a deep reinforcement learning-based task offloading method for maritime edge computing. The method derives the optimal transmission power for task offloading and incorporates the power allocation problem into the offloading decision framework, ensuring that offloading decisions are efficiently executed within a specific power range. We model the task offloading problem as a Markov decision process, and based on this formulation, we design an improved Double Deep Q-Network (Double DQN) Energy-Delay Tradeoff Optimization algorithm (ID-EDTO), which enables the system to dynamically obtain state feedback from task requests and adapt its offloading strategies accordingly. Experimental results demonstrate that the proposed method outperforms both traditional baseline methods, such as random selection, Lyapunov optimization, and joint resource allocation, as well as DRL based algorithms including PPO, SAC, and A3C, in terms of reducing latency and energy consumption.
移动边缘计算的引入使资源受限的海上终端用户能够访问低延迟的计算服务;然而,由于海洋环境的动态性和资源的稀缺性,传统的计算卸载策略已不能满足实际需求,任务卸载成为实现资源优化利用的快速高效服务的关键问题。特别是,微调卸载决策过程对于增强网络稳定性和延长系统耐久性至关重要。为了解决这些问题,本文提出了一种基于深度强化学习的海上边缘计算任务卸载方法。该方法推导出任务卸载的最优传输功率,并将功率分配问题纳入到卸载决策框架中,保证了任务卸载决策在特定功率范围内有效执行。将任务卸载问题建模为马尔可夫决策过程,并在此基础上设计了一种改进的双深度q -网络(Double Deep Q-Network, DQN)能量-延迟权衡优化算法(ID-EDTO),使系统能够从任务请求中动态获取状态反馈,并相应地调整卸载策略。实验结果表明,该方法在降低延迟和能耗方面优于随机选择、Lyapunov优化、联合资源分配等传统基线方法,也优于PPO、SAC、A3C等基于DRL的算法。
{"title":"Collaborative DRL-driven task offloading for maritime edge computing","authors":"Huogen Yang ,&nbsp;Yiwen Hu ,&nbsp;Zhongming Yang ,&nbsp;Xiaohui Yang ,&nbsp;Guangxue Yue","doi":"10.1016/j.adhoc.2025.104124","DOIUrl":"10.1016/j.adhoc.2025.104124","url":null,"abstract":"<div><div>The introduction of Mobile edge computing enables resource-constrained maritime terminal users to access low-latency computing services; however, the dynamic nature of the marine environment and scarce resources render traditional computation offloading strategies inadequate for meeting actual demands, making task offloading a critical issue for achieving prompt and efficient service with optimal resource utilization. In particular, fine-tuning the offloading decision process is crucial for enhancing network stability and extending system endurance. To address these challenges, this paper proposes a deep reinforcement learning-based task offloading method for maritime edge computing. The method derives the optimal transmission power for task offloading and incorporates the power allocation problem into the offloading decision framework, ensuring that offloading decisions are efficiently executed within a specific power range. We model the task offloading problem as a Markov decision process, and based on this formulation, we design an improved Double Deep Q-Network (Double DQN) Energy-Delay Tradeoff Optimization algorithm (ID-EDTO), which enables the system to dynamically obtain state feedback from task requests and adapt its offloading strategies accordingly. Experimental results demonstrate that the proposed method outperforms both traditional baseline methods, such as random selection, Lyapunov optimization, and joint resource allocation, as well as DRL based algorithms including PPO, SAC, and A3C, in terms of reducing latency and energy consumption.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"183 ","pages":"Article 104124"},"PeriodicalIF":4.8,"publicationDate":"2025-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145791036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing energy efficiency and QoS in Q-learning-based small-world WSNs 提高基于q学习的小世界无线传感器网络的能量效率和服务质量
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-17 DOI: 10.1016/j.adhoc.2025.104123
Yan Zhao, Lintao Huang, Mengzhe Ren, Hanyang Shi
In a wireless sensor network (WSN), achieving efficient data transmission while extending network lifetime remains a critical issue. Sensor nodes may fail due to energy depletion during mass data transmission, which results in frequent changes in the network topology. The frequent topology changes not only increase the complexity of network management and maintenance, but also severely impair both energy efficiency and quality-of-service (QoS). To address these challenges, in this paper, we construct a small-world WSN (SW-WSN) and address its joint optimization problem of energy efficiency and QoS. In the constructed SW-WSN, long-range (LoRa) links are used to replace some of the conventional links between sensor nodes as well as between nodes and the gateway, and a small-world model is introduced to reduce the intermediate hop count for data transmission. A Q-learning-based adaptive link allocation algorithm is proposed to map all conventional and LoRa links to state space and action space respectively and learn to form state–action pairs through training, which determines an optimal link replacement strategy under different network states and ultimately constructs a self-optimizing network architecture SW-WSN. Then, considering the network topology, link capacity, delay tolerance, and node energy of SW-WSN, the joint optimization problem of energy efficiency and QoS is formulated as an instance of linear programming (LP) with the objective of maximizing energy efficiency while ensuring QoS, and a heuristic algorithm is further designed to obtain the optimal solution. As shown by the simulation results, the Q-learning-based SW-WSN exhibits excellent learning capability and convergence stability across different network scales, successfully achieving a relatively ideal balance between energy efficiency and QoS. The Q-learning-based SW-WSN demonstrates substantial improvements in both energy efficiency (alive or dead devices, and network residual energy) and QoS (average transmission delay, data throughput, and bandwidth utilization) compared with the reinforcement learning (RL)-based routing, low-energy adaptive clustering hierarchy (LEACH), conventional small-world characteristics (SWC), multihop data transmission, and direct data transmission methods.
在无线传感器网络(WSN)中,如何在延长网络寿命的同时实现高效的数据传输一直是一个关键问题。在大量数据传输过程中,传感器节点可能会因能量耗尽而失效,导致网络拓扑结构频繁变化。频繁的拓扑变化不仅增加了网络管理和维护的复杂性,而且严重影响了网络的能效和服务质量(QoS)。为了解决这些问题,本文构建了一个小世界WSN (SW-WSN),并解决了其能效和QoS的联合优化问题。在构建的无线传感器网络中,采用远程链路(LoRa)代替部分传感器节点之间以及节点与网关之间的传统链路,并引入小世界模型来减少数据传输的中间跳数。提出了一种基于q学习的自适应链路分配算法,将所有常规链路和LoRa链路分别映射到状态空间和动作空间,并通过训练学习形成状态-动作对,确定不同网络状态下的最优链路替换策略,最终构建自优化网络架构SW-WSN。然后,考虑无线传感器网络的网络拓扑结构、链路容量、时延容限和节点能量等因素,将能效和QoS联合优化问题作为线性规划(LP)的实例,以保证QoS的同时实现能效最大化为目标,设计了启发式算法求解该优化问题。仿真结果表明,基于q -learning的SW-WSN在不同网络尺度上表现出优异的学习能力和收敛稳定性,成功地实现了能量效率和QoS之间相对理想的平衡。与基于强化学习(RL)的路由、低能量自适应聚类层次(LEACH)、传统的小世界特征(SWC)、多跳数据传输和直接数据传输方法相比,基于q学习的SW-WSN在能源效率(活设备或死设备,以及网络剩余能量)和QoS(平均传输延迟、数据吞吐量和带宽利用率)方面都有显著改善。
{"title":"Enhancing energy efficiency and QoS in Q-learning-based small-world WSNs","authors":"Yan Zhao,&nbsp;Lintao Huang,&nbsp;Mengzhe Ren,&nbsp;Hanyang Shi","doi":"10.1016/j.adhoc.2025.104123","DOIUrl":"10.1016/j.adhoc.2025.104123","url":null,"abstract":"<div><div>In a wireless sensor network (WSN), achieving efficient data transmission while extending network lifetime remains a critical issue. Sensor nodes may fail due to energy depletion during mass data transmission, which results in frequent changes in the network topology. The frequent topology changes not only increase the complexity of network management and maintenance, but also severely impair both energy efficiency and quality-of-service (QoS). To address these challenges, in this paper, we construct a small-world WSN (SW-WSN) and address its joint optimization problem of energy efficiency and QoS. In the constructed SW-WSN, long-range (LoRa) links are used to replace some of the conventional links between sensor nodes as well as between nodes and the gateway, and a small-world model is introduced to reduce the intermediate hop count for data transmission. A Q-learning-based adaptive link allocation algorithm is proposed to map all conventional and LoRa links to state space and action space respectively and learn to form state–action pairs through training, which determines an optimal link replacement strategy under different network states and ultimately constructs a self-optimizing network architecture SW-WSN. Then, considering the network topology, link capacity, delay tolerance, and node energy of SW-WSN, the joint optimization problem of energy efficiency and QoS is formulated as an instance of linear programming (LP) with the objective of maximizing energy efficiency while ensuring QoS, and a heuristic algorithm is further designed to obtain the optimal solution. As shown by the simulation results, the Q-learning-based SW-WSN exhibits excellent learning capability and convergence stability across different network scales, successfully achieving a relatively ideal balance between energy efficiency and QoS. The Q-learning-based SW-WSN demonstrates substantial improvements in both energy efficiency (alive or dead devices, and network residual energy) and QoS (average transmission delay, data throughput, and bandwidth utilization) compared with the reinforcement learning (RL)-based routing, low-energy adaptive clustering hierarchy (LEACH), conventional small-world characteristics (SWC), multihop data transmission, and direct data transmission methods.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"183 ","pages":"Article 104123"},"PeriodicalIF":4.8,"publicationDate":"2025-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145790979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive scale-free topology optimization using deep reinforcement learning in UASNs 基于深度强化学习的自适应无标度拓扑优化
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-16 DOI: 10.1016/j.adhoc.2025.104121
Haoran Cheng, Xiangyu Bai, Xiaoying Yang
In underwater acoustic sensor networks (UASNs), topology optimization strategies are effective ways to enhance network robustness, reduce transmission delay, and address issues such as high bit error rates and limited energy. However, current topology optimization strategies exhibit limitations in multifactorial consideration and dynamic adaptability, resulting in low energy efficiency and compromised robustness in UASNs. To address these issues, this paper proposes an adaptive scale-free topology optimization algorithm based on deep reinforcement learning (SFTG-DRL), aiming to ensure the network’s lifetime, reduce delay, and enhance the network’s fault tolerance. First, we optimize the transmission power of each sensor node to obtain its optimal power level, while proposing an improved preferential attachment model that incorporates node energy and depth information to achieve scale-free network characteristics. Then, deep reinforcement learning is applied to constrain minimum connections, further refining the topology for improved dynamic adaptability. Finally, extensive simulation experiments are conducted to validate the performance of the proposed algorithm, assessing aspects such as exploration strategy, node degree distribution, fault tolerance, network lifetime, and end-to-end delay.
在水声传感器网络(uasn)中,拓扑优化策略是提高网络鲁棒性、降低传输延迟、解决高误码率和能量有限等问题的有效途径。然而,目前的拓扑优化策略在多因素考虑和动态适应性方面存在局限性,导致usns的能量效率低,鲁棒性受损。针对这些问题,本文提出了一种基于深度强化学习的自适应无标度拓扑优化算法(SFTG-DRL),旨在保证网络的生存期,降低时延,增强网络的容错能力。首先,我们对每个传感器节点的传输功率进行优化,以获得其最优功率水平,同时提出了一种改进的优先依恋模型,该模型融合了节点能量和深度信息,以实现无标度网络特性。然后,应用深度强化学习来约束最小连接,进一步细化拓扑以提高动态适应性。最后,进行了大量的仿真实验来验证所提出算法的性能,评估了探索策略、节点度分布、容错性、网络生存期和端到端延迟等方面。
{"title":"Adaptive scale-free topology optimization using deep reinforcement learning in UASNs","authors":"Haoran Cheng,&nbsp;Xiangyu Bai,&nbsp;Xiaoying Yang","doi":"10.1016/j.adhoc.2025.104121","DOIUrl":"10.1016/j.adhoc.2025.104121","url":null,"abstract":"<div><div>In underwater acoustic sensor networks (UASNs), topology optimization strategies are effective ways to enhance network robustness, reduce transmission delay, and address issues such as high bit error rates and limited energy. However, current topology optimization strategies exhibit limitations in multifactorial consideration and dynamic adaptability, resulting in low energy efficiency and compromised robustness in UASNs. To address these issues, this paper proposes an adaptive scale-free topology optimization algorithm based on deep reinforcement learning (SFTG-DRL), aiming to ensure the network’s lifetime, reduce delay, and enhance the network’s fault tolerance. First, we optimize the transmission power of each sensor node to obtain its optimal power level, while proposing an improved preferential attachment model that incorporates node energy and depth information to achieve scale-free network characteristics. Then, deep reinforcement learning is applied to constrain minimum connections, further refining the topology for improved dynamic adaptability. Finally, extensive simulation experiments are conducted to validate the performance of the proposed algorithm, assessing aspects such as exploration strategy, node degree distribution, fault tolerance, network lifetime, and end-to-end delay.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"183 ","pages":"Article 104121"},"PeriodicalIF":4.8,"publicationDate":"2025-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145791117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint channel connectivity and interference management in DT-assisted cognitive vehicular networks dt辅助认知车辆网络的联合信道连接与干扰管理
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-15 DOI: 10.1016/j.adhoc.2025.104094
Xuan Li , Wen Jiang , Wanting Wang , Tianqing Zhou , Kan Wang , Shuai Liu
In cognitive vehicular networks (CVNs), cognitive vehicles are permitted to opportunistically utilize idle spectrum bands. However, the reclaiming of channels by licensed users may result in significant interference or even network disconnection, failing to meet the reliable data transmission requirements in CVNs. Vehicles need to frequently exchange a large amount of information to cope with unpredictable topology changes and channel reuse scenarios, resulting in significant communication and computational overhead, which conflicts with the low-latency requirements of vehicular networks. To address this, we introduce digital twin (DT) technology into CVNs, enabling cognitive vehicles to effectively avoid transmission interruption caused by primary user channel occupancy. First, we propose a DT-assisted connectivity algorithm (DT-CA) that maps real-world vehicular networks to their digital replicas, enabling interaction in the virtual world. DT-CA assists vehicles in forming specific clusters to ensure channel connectivity. Subsequently, we propose a vehicle-to-vehicle (V2V) connectivity algorithm that quantifies vehicle mobility using communication probabilities and dynamically optimizes cluster structures. Finally, we conduct extensive simulation studies in different traffic scenarios, such as T-junctions and crossroads, which demonstrate that the DT-assisted algorithms have significant advantages in enhancing the connectivity and cluster stability of CVNs, while also exhibiting dynamic adaptability and low complexity.
在认知车辆网络(CVNs)中,认知车辆被允许投机地利用空闲频段。但是,有许可证的用户对信道的回收可能会造成明显的干扰,甚至导致网络中断,无法满足cvn中数据可靠传输的要求。车辆需要频繁地交换大量信息,以应对不可预测的拓扑变化和通道重用场景,这导致了巨大的通信和计算开销,这与车载网络的低延迟要求相冲突。为了解决这个问题,我们在cvn中引入了数字孪生(DT)技术,使认知车辆能够有效地避免因主用户信道占用而导致的传输中断。首先,我们提出了一种dt辅助连接算法(DT-CA),该算法将现实世界的车辆网络映射到它们的数字副本,从而实现虚拟世界中的交互。DT-CA帮助车辆形成特定的集群,以确保通道连接。随后,我们提出了一种车对车(V2V)连接算法,该算法使用通信概率量化车辆的移动性并动态优化集群结构。最后,我们在不同的交通场景下进行了大量的仿真研究,如t型路口和十字路口,结果表明dt辅助算法在增强CVNs的连通性和簇稳定性方面具有显著优势,同时还具有动态适应性和低复杂度。
{"title":"Joint channel connectivity and interference management in DT-assisted cognitive vehicular networks","authors":"Xuan Li ,&nbsp;Wen Jiang ,&nbsp;Wanting Wang ,&nbsp;Tianqing Zhou ,&nbsp;Kan Wang ,&nbsp;Shuai Liu","doi":"10.1016/j.adhoc.2025.104094","DOIUrl":"10.1016/j.adhoc.2025.104094","url":null,"abstract":"<div><div>In cognitive vehicular networks (CVNs), cognitive vehicles are permitted to opportunistically utilize idle spectrum bands. However, the reclaiming of channels by licensed users may result in significant interference or even network disconnection, failing to meet the reliable data transmission requirements in CVNs. Vehicles need to frequently exchange a large amount of information to cope with unpredictable topology changes and channel reuse scenarios, resulting in significant communication and computational overhead, which conflicts with the low-latency requirements of vehicular networks. To address this, we introduce digital twin (DT) technology into CVNs, enabling cognitive vehicles to effectively avoid transmission interruption caused by primary user channel occupancy. First, we propose a DT-assisted connectivity algorithm (DT-CA) that maps real-world vehicular networks to their digital replicas, enabling interaction in the virtual world. DT-CA assists vehicles in forming specific clusters to ensure channel connectivity. Subsequently, we propose a vehicle-to-vehicle (V2V) connectivity algorithm that quantifies vehicle mobility using communication probabilities and dynamically optimizes cluster structures. Finally, we conduct extensive simulation studies in different traffic scenarios, such as T-junctions and crossroads, which demonstrate that the DT-assisted algorithms have significant advantages in enhancing the connectivity and cluster stability of CVNs, while also exhibiting dynamic adaptability and low complexity.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"183 ","pages":"Article 104094"},"PeriodicalIF":4.8,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145790981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PriV2I: Privacy-preserving V2I authentication protocol with fine-grained access control PriV2I:具有细粒度访问控制的保护隐私的V2I身份验证协议
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-13 DOI: 10.1016/j.adhoc.2025.104122
Zhengze Liu , Nianmin Yao , Shengyuan Bai , Tengyi Mai
As vehicular ad hoc networks (VANETs) increase in size and complexity, ensuring secure, flexible, and privacy-preserving vehicle-to-infrastructure (V2I) authentication remains a major challenge. Existing protocols often focus solely on identity verification, overlooking the need for access control based on vehicle attributes. Furthermore, vehicles must obtain authentication credentials from various trusted entities, including automakers, regulators, and government agencies. However, the absence of a unified credential issuance mechanism introduces fragmentation and inconsistencies during the registration process. To address these issues, we propose a V2I authentication protocol, called PriV2I, that integrates distributed credential issuance, attribute-based access control, and strong anonymity guarantees. During vehicle registration, our approach uses Shamir’s Secret Sharing with a threshold t of n across multiple certification authorities (CAs) to consolidate credentials. A vehicle credential can only be issued by a predefined threshold number of CAs, enhancing security and flexibility. Within the authentication protocol, Pointcheval-Sanders (PS) signatures enable fine-grained access control based on vehicle attributes such as type and role. Meanwhile, noninteractive zero-knowledge proofs protect identity privacy by allowing vehicles to prove credential possession and policy compliance without revealing sensitive information. The proposed scheme also supports batch authentication at Roadside Units (RSUs) to efficiently handle high-density environments and includes a comprehensive revocation mechanism to trace and revoke malicious vehicles promptly and securely. In our implementation, the computation cost during the authentication phase is 75.58 ms. The communication overhead per authentication exchange is 992 bytes across two messages. Overall, the protocol provides a secure, scalable, and privacy-preserving solution tailored to modern VANET environments.
随着车辆自组织网络(vanet)的规模和复杂性的增加,确保安全、灵活和保护隐私的车辆到基础设施(V2I)身份验证仍然是一个主要挑战。现有协议通常只关注身份验证,忽略了基于车辆属性的访问控制需求。此外,车辆必须从各种可信实体(包括汽车制造商、监管机构和政府机构)获得身份验证凭证。但是,由于缺乏统一的证书颁发机制,在注册过程中会出现碎片化和不一致性。为了解决这些问题,我们提出了一个V2I身份验证协议,称为PriV2I,它集成了分布式凭据发布、基于属性的访问控制和强匿名保证。在车辆注册期间,我们的方法在多个证书颁发机构(ca)之间使用阈值t为n的Shamir秘密共享来合并凭证。车辆凭证只能由预定义的ca阈值数量颁发,从而增强了安全性和灵活性。在身份验证协议中,Pointcheval-Sanders (PS)签名支持基于车辆属性(如类型和角色)的细粒度访问控制。同时,非交互式零知识证明通过允许车辆在不泄露敏感信息的情况下证明凭证的所有权和策略的合规性,从而保护身份隐私。建议计划亦支持路边单位的批量认证,以有效处理高密度环境,并包括一个全面的撤销机制,以迅速和安全地追踪和撤销恶意车辆。在我们的实现中,身份验证阶段的计算成本为75.58 ms。两个消息之间每个身份验证交换的通信开销为992字节。总的来说,该协议为现代VANET环境提供了一个安全、可扩展和隐私保护的解决方案。
{"title":"PriV2I: Privacy-preserving V2I authentication protocol with fine-grained access control","authors":"Zhengze Liu ,&nbsp;Nianmin Yao ,&nbsp;Shengyuan Bai ,&nbsp;Tengyi Mai","doi":"10.1016/j.adhoc.2025.104122","DOIUrl":"10.1016/j.adhoc.2025.104122","url":null,"abstract":"<div><div>As vehicular ad hoc networks (VANETs) increase in size and complexity, ensuring secure, flexible, and privacy-preserving vehicle-to-infrastructure (V2I) authentication remains a major challenge. Existing protocols often focus solely on identity verification, overlooking the need for access control based on vehicle attributes. Furthermore, vehicles must obtain authentication credentials from various trusted entities, including automakers, regulators, and government agencies. However, the absence of a unified credential issuance mechanism introduces fragmentation and inconsistencies during the registration process. To address these issues, we propose a V2I authentication protocol, called PriV2I, that integrates distributed credential issuance, attribute-based access control, and strong anonymity guarantees. During vehicle registration, our approach uses Shamir’s Secret Sharing with a threshold <span><math><mi>t</mi></math></span> of <span><math><mi>n</mi></math></span> across multiple certification authorities (CAs) to consolidate credentials. A vehicle credential can only be issued by a predefined threshold number of CAs, enhancing security and flexibility. Within the authentication protocol, Pointcheval-Sanders (PS) signatures enable fine-grained access control based on vehicle attributes such as type and role. Meanwhile, noninteractive zero-knowledge proofs protect identity privacy by allowing vehicles to prove credential possession and policy compliance without revealing sensitive information. The proposed scheme also supports batch authentication at Roadside Units (RSUs) to efficiently handle high-density environments and includes a comprehensive revocation mechanism to trace and revoke malicious vehicles promptly and securely. In our implementation, the computation cost during the authentication phase is 75.58 ms. The communication overhead per authentication exchange is 992 bytes across two messages. Overall, the protocol provides a secure, scalable, and privacy-preserving solution tailored to modern VANET environments.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"183 ","pages":"Article 104122"},"PeriodicalIF":4.8,"publicationDate":"2025-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145790980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating slice vulnerabilities in 5G core networks: A comprehensive survey 缓解5G核心网分片漏洞:综合调查
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-06 DOI: 10.1016/j.adhoc.2025.104118
John Breeden , Mohammad S. Khan , Simone Silvestri , Biju Bajracharya , Chandler Scott
Network slicing in the fifth generation (5G) cellular architecture provides fundamental support for the key performance required by users. To create the infrastructure of network slicing, enablers such as software-defined networking and network function virtualization facilitate a separation between the physical distributed infrastructure and the controls and functions that provide the services and that construct the individual, isolated network slices. In the modern framework of 5G, a single service provider no longer needs to maintain the physical infrastructure and the enabling functions. Third-party vendors and suppliers lease out their facilities and services to the 5G framework of the primary service provider. The 5G architecture derives from multiple services, distributed over great distances, and managed by multiple parties. Each of these enablers and providers adds vulnerabilities to the architecture and to network slicing specifically. In this work, we will examine the interweaving of the technological enablers and external infrastructure providers, identify vulnerabilities created by this complexity, and discuss the potential mitigation for these vulnerabilities. In order to rigorously evaluate vulnerabilities and mitigation, analysis requires a clearly-defined perspective. Network defenders often follow a perspective of defense-in-depth which concentrates on covering all possible vulnerabilities from multiple threat vectors. In this discussion, we will apply the concepts of attack-in-depth and the cyber kill chain from a threat actor’s perspective as contrasted to the cybersecurity concept of defense-in-depth. Finally, we will examine a case study that demonstrates how a series of vulnerabilities cascade into an advanced attack that infiltrates and exploits users’ network slices.
第五代(5G)蜂窝架构中的网络切片为用户所需的关键性能提供了基础支持。为了创建网络切片的基础设施,诸如软件定义的网络和网络功能虚拟化之类的支持工具促进了物理分布式基础设施与控制和功能之间的分离,这些控制和功能提供了服务,并构建了单独的、隔离的网络切片。在5G的现代框架下,单个服务提供商不再需要维护物理基础设施和使能功能。第三方厂商和供应商将其设施和服务出租给主要服务提供商的5G框架。5G架构源于多种服务,远距离分布,多方管理。这些推动者和提供者中的每一个都给体系结构和网络切片增加了漏洞。在这项工作中,我们将研究技术推动者和外部基础设施提供商之间的相互交织,识别由这种复杂性产生的漏洞,并讨论这些漏洞的潜在缓解措施。为了严格评估脆弱性和缓解,分析需要一个明确定义的视角。网络防御者通常遵循深度防御的观点,集中于覆盖来自多个威胁向量的所有可能的漏洞。在本次讨论中,我们将从威胁行为者的角度应用深度攻击和网络杀伤链的概念,与深度防御的网络安全概念进行对比。最后,我们将研究一个案例研究,该案例研究演示了一系列漏洞如何级联成渗透和利用用户网络切片的高级攻击。
{"title":"Mitigating slice vulnerabilities in 5G core networks: A comprehensive survey","authors":"John Breeden ,&nbsp;Mohammad S. Khan ,&nbsp;Simone Silvestri ,&nbsp;Biju Bajracharya ,&nbsp;Chandler Scott","doi":"10.1016/j.adhoc.2025.104118","DOIUrl":"10.1016/j.adhoc.2025.104118","url":null,"abstract":"<div><div>Network slicing in the fifth generation (5G) cellular architecture provides fundamental support for the key performance required by users. To create the infrastructure of network slicing, enablers such as software-defined networking and network function virtualization facilitate a separation between the physical distributed infrastructure and the controls and functions that provide the services and that construct the individual, isolated network slices. In the modern framework of 5G, a single service provider no longer needs to maintain the physical infrastructure and the enabling functions. Third-party vendors and suppliers lease out their facilities and services to the 5G framework of the primary service provider. The 5G architecture derives from multiple services, distributed over great distances, and managed by multiple parties. Each of these enablers and providers adds vulnerabilities to the architecture and to network slicing specifically. In this work, we will examine the interweaving of the technological enablers and external infrastructure providers, identify vulnerabilities created by this complexity, and discuss the potential mitigation for these vulnerabilities. In order to rigorously evaluate vulnerabilities and mitigation, analysis requires a clearly-defined perspective. Network defenders often follow a perspective of defense-in-depth which concentrates on covering all possible vulnerabilities from multiple threat vectors. In this discussion, we will apply the concepts of attack-in-depth and the cyber kill chain from a threat actor’s perspective as contrasted to the cybersecurity concept of defense-in-depth. Finally, we will examine a case study that demonstrates how a series of vulnerabilities cascade into an advanced attack that infiltrates and exploits users’ network slices.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"183 ","pages":"Article 104118"},"PeriodicalIF":4.8,"publicationDate":"2025-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145738226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards byzantine fault-tolerant non-interactive zero knowledge cross-domain batch authentication in VANET VANET中拜占庭式容错非交互零知识跨域批处理认证
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-05 DOI: 10.1016/j.adhoc.2025.104120
Shaolin Qiu , Shuchao Deng , Honglei Pang
Vehicle Ad Hoc Network (VANET) is becoming an essential vehicle communication network paradigm. However, the safe and reliable operation of VANETs faces serious challenges, especially in how users authenticate to the network. Idealized access control rules for trusted network entities are highly susceptible to the leakage of critical private data from inbound users. In addition, the open network environment puts the security of networked entities at significant risk, and the presence of Byzantine devices severely hampers legitimate vehicles from requesting network access services. To address the above problems, this paper proposes an efficient vehicle cross-domain identity batch authentication framework that is functional, privacy-preserving, and resistant to Byzantine attacks. The scheme uses non-interactive zero-knowledge proofs to achieve anonymous vehicle authentication. We integrate an improved Practical Byzantine Fault Tolerance (PBFT) protocol to enhance the robustness of zero-knowledge authentication. It achieves efficient consensus for inbound vehicle authentication in cross-domain scenarios, even in the presence of a small number of Byzantine entities. The scheme is further integrated into cross-domain authentication frameworks to support seamless inter-domain access. Under dynamic VANET topologies, we derive consensus probability and authentication accuracy; simulations confirm high accuracy with low communication overhead.
车载自组网(VANET)正在成为一种重要的车载通信网络模式。然而,VANETs的安全可靠运行面临着严峻的挑战,特别是在用户如何向网络认证方面。理想的可信网络实体访问控制规则极易受到入站用户关键私有数据泄露的影响。此外,开放的网络环境将网络实体的安全性置于重大风险之中,拜占庭设备的存在严重阻碍了合法车辆请求网络访问服务。为了解决上述问题,本文提出了一种高效的车辆跨域身份批认证框架,该框架具有功能性、保密性和抗拜占庭攻击的特点。该方案采用非交互式零知识证明实现车辆匿名认证。我们集成了一种改进的实用拜占庭容错(PBFT)协议来增强零知识认证的鲁棒性。即使在存在少量拜占庭实体的情况下,它也能在跨域场景下实现入站车辆认证的高效共识。该方案进一步集成到跨域认证框架中,以支持跨域无缝访问。在动态VANET拓扑下,导出了一致性概率和认证精度;仿真结果表明,该方法具有较高的精度和较低的通信开销。
{"title":"Towards byzantine fault-tolerant non-interactive zero knowledge cross-domain batch authentication in VANET","authors":"Shaolin Qiu ,&nbsp;Shuchao Deng ,&nbsp;Honglei Pang","doi":"10.1016/j.adhoc.2025.104120","DOIUrl":"10.1016/j.adhoc.2025.104120","url":null,"abstract":"<div><div>Vehicle Ad Hoc Network (VANET) is becoming an essential vehicle communication network paradigm. However, the safe and reliable operation of VANETs faces serious challenges, especially in how users authenticate to the network. Idealized access control rules for trusted network entities are highly susceptible to the leakage of critical private data from inbound users. In addition, the open network environment puts the security of networked entities at significant risk, and the presence of Byzantine devices severely hampers legitimate vehicles from requesting network access services. To address the above problems, this paper proposes an efficient vehicle cross-domain identity batch authentication framework that is functional, privacy-preserving, and resistant to Byzantine attacks. The scheme uses non-interactive zero-knowledge proofs to achieve anonymous vehicle authentication. We integrate an improved Practical Byzantine Fault Tolerance (PBFT) protocol to enhance the robustness of zero-knowledge authentication. It achieves efficient consensus for inbound vehicle authentication in cross-domain scenarios, even in the presence of a small number of Byzantine entities. The scheme is further integrated into cross-domain authentication frameworks to support seamless inter-domain access. Under dynamic VANET topologies, we derive consensus probability and authentication accuracy; simulations confirm high accuracy with low communication overhead.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"183 ","pages":"Article 104120"},"PeriodicalIF":4.8,"publicationDate":"2025-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145694342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FS-MCS: A reinforcement learning-based data inference scheme for sparse mobile crowd sensing FS-MCS:基于强化学习的稀疏移动人群感知数据推理方案
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-04 DOI: 10.1016/j.adhoc.2025.104109
Yuan Tao , Taochun Wang , Fulong Chen , Biao Jie , Junmei Cai , Dong Xie
With the development of mobile computing and the Internet of Things (IoT), Sparse mobile crowd sensing (SMCS) has emerged as a new data collection paradigm, demonstrating significant application potential in fields. However, due to budget constraints and area inaccessibility, maximizing the quality of inferred data with limited sensing users and resources has become an important research challenge. This paper proposes a fix-based data inference method (FS-MCS) based on deep reinforcement learning, which aims to reduce error accumulation and improve the accuracy of data inference by optimizing the cell selection strategy. Specifically, FS-MCS uses Kriging interpolation to compute the weights of spatiotemporal data and combines Deep Q Learning to dynamically select sensing cells. This allows for the collection of the most informative data in each time series, fixing the inference model and inferring the remaining data. By considering the data correlation over different time periods and budget constraints, FS-MCS can maximize data quality and minimize the impact of outliers on inference results, while ensuring the budget is adhered to. The results show that the proposed method performs well in terms of data quality, convergence speed, and budget utilization, especially when dealing with complex spatiotemporal data and dynamic environmental changes, where it demonstrates significant advantages.
随着移动计算和物联网(IoT)的发展,稀疏移动人群感知(SMCS)作为一种新的数据采集范式应运而生,在各个领域显示出巨大的应用潜力。然而,由于预算限制和区域不可达性,在有限的传感用户和资源下最大限度地提高推断数据的质量已成为一个重要的研究挑战。本文提出了一种基于深度强化学习的基于固定的数据推理方法(FS-MCS),该方法旨在通过优化单元格选择策略来减少错误积累,提高数据推理的准确性。具体而言,FS-MCS使用Kriging插值计算时空数据的权重,并结合深度Q学习动态选择感知单元。这允许在每个时间序列中收集最有信息的数据,固定推理模型并推断剩余的数据。通过考虑不同时间段的数据相关性和预算约束,FS-MCS可以在保证预算的前提下,最大限度地提高数据质量,最小化异常值对推理结果的影响。结果表明,该方法在数据质量、收敛速度和预算利用率等方面都有较好的表现,特别是在处理复杂时空数据和动态环境变化时,具有明显的优势。
{"title":"FS-MCS: A reinforcement learning-based data inference scheme for sparse mobile crowd sensing","authors":"Yuan Tao ,&nbsp;Taochun Wang ,&nbsp;Fulong Chen ,&nbsp;Biao Jie ,&nbsp;Junmei Cai ,&nbsp;Dong Xie","doi":"10.1016/j.adhoc.2025.104109","DOIUrl":"10.1016/j.adhoc.2025.104109","url":null,"abstract":"<div><div>With the development of mobile computing and the Internet of Things (IoT), Sparse mobile crowd sensing (SMCS) has emerged as a new data collection paradigm, demonstrating significant application potential in fields. However, due to budget constraints and area inaccessibility, maximizing the quality of inferred data with limited sensing users and resources has become an important research challenge. This paper proposes a fix-based data inference method (FS-MCS) based on deep reinforcement learning, which aims to reduce error accumulation and improve the accuracy of data inference by optimizing the cell selection strategy. Specifically, FS-MCS uses Kriging interpolation to compute the weights of spatiotemporal data and combines Deep Q Learning to dynamically select sensing cells. This allows for the collection of the most informative data in each time series, fixing the inference model and inferring the remaining data. By considering the data correlation over different time periods and budget constraints, FS-MCS can maximize data quality and minimize the impact of outliers on inference results, while ensuring the budget is adhered to. The results show that the proposed method performs well in terms of data quality, convergence speed, and budget utilization, especially when dealing with complex spatiotemporal data and dynamic environmental changes, where it demonstrates significant advantages.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"183 ","pages":"Article 104109"},"PeriodicalIF":4.8,"publicationDate":"2025-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145694384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Ad Hoc Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1