首页 > 最新文献

Ad Hoc Networks最新文献

英文 中文
A digital twin-based traffic light management system using BIRCH algorithm 使用 BIRCH 算法的基于数字孪生的交通灯管理系统
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-02 DOI: 10.1016/j.adhoc.2024.103613

Urban transportation networks are vital for the economic and environmental well-being of cities and they are faced with the integration of Human-Driven Vehicles (HVs) and Connected and Autonomous Vehicles (CAVs) challenge. Most of the traditional traffic management systems fail to effectively manage the dynamic and complex flows of mixed traffic, mainly because of large computational requirements and the restrictions that control models of traffic lights directly based on extensive and continuous training data. Most of the times, the operational flexibility of CAVs is severely compromised for the safety of HVs, or CAVs are given high priority without taking into account the efficiency of HVs leading to lower performance, especially at low CAV penetration rates. On the other hand, the existing adaptive traffic light approaches were usually partial and could not adapt to the real-time behaviors of the traffic system. Some systems operate with inflexible temporal control plans that cannot react to variations in traffic flow or use adaptive control strategies that are based on a limited set of static traffic conditions. This paper presents a novel traffic light control approach utilizing the BIRCH (Balanced Iterative Reducing and Clustering using Hierarchies) clustering algorithm combined with digital twins for a more adaptive and efficient system. The BIRCH is effective in processing large datasets because it clusters data points incrementally and dynamically into a small set of representatives. The suggested method does not only enable better simulation and prediction of traffic patterns but also makes possible the real-time adaptive control of traffic signals at signalized intersections. It also improves traffic flow, reduces congestion, and minimizes vehicle idling time by adjusting the green and red light durations dynamically based on both real-time and historical traffic data. This approach is assessed under different traffic intensities, which include low, moderate, and high, while efficiency, fuel consumption, and the number of stops are being compared with the traditional and the existing adaptive traffic management systems.

城市交通网络对城市的经济和环境福祉至关重要,它们面临着人类驾驶车辆(HVs)与互联和自动驾驶车辆(CAVs)的整合挑战。大多数传统交通管理系统都无法有效管理动态复杂的混合交通流,主要原因是计算量大,以及直接根据大量连续的训练数据来控制交通信号灯模型的限制。在大多数情况下,为了保证高压车辆的安全,CAV 的操作灵活性受到严重影响,或者在不考虑高压车辆效率的情况下优先考虑 CAV,从而导致性能降低,尤其是在 CAV 渗透率较低的情况下。另一方面,现有的自适应交通灯方法通常是片面的,无法适应交通系统的实时行为。有些系统采用不灵活的时间控制计划,无法对交通流量的变化做出反应,或者采用基于有限的静态交通条件的自适应控制策略。本文介绍了一种新颖的交通灯控制方法,该方法利用 BIRCH(使用层次的平衡迭代还原和聚类)聚类算法与数字双胞胎相结合,实现了更自适应、更高效的系统。BIRCH 算法能有效处理大型数据集,因为它能以增量方式将数据点动态聚类为一小部分代表。所建议的方法不仅能更好地模拟和预测交通模式,还能对信号交叉口的交通信号进行实时自适应控制。它还能根据实时和历史交通数据动态调整绿灯和红灯的持续时间,从而改善交通流量,减少拥堵,并最大限度地减少车辆空转时间。该方法在不同的交通强度(包括低、中、高)下进行评估,同时将效率、油耗和停车次数与传统和现有的自适应交通管理系统进行比较。
{"title":"A digital twin-based traffic light management system using BIRCH algorithm","authors":"","doi":"10.1016/j.adhoc.2024.103613","DOIUrl":"10.1016/j.adhoc.2024.103613","url":null,"abstract":"<div><p>Urban transportation networks are vital for the economic and environmental well-being of cities and they are faced with the integration of Human-Driven Vehicles (HVs) and Connected and Autonomous Vehicles (CAVs) challenge. Most of the traditional traffic management systems fail to effectively manage the dynamic and complex flows of mixed traffic, mainly because of large computational requirements and the restrictions that control models of traffic lights directly based on extensive and continuous training data. Most of the times, the operational flexibility of CAVs is severely compromised for the safety of HVs, or CAVs are given high priority without taking into account the efficiency of HVs leading to lower performance, especially at low CAV penetration rates. On the other hand, the existing adaptive traffic light approaches were usually partial and could not adapt to the real-time behaviors of the traffic system. Some systems operate with inflexible temporal control plans that cannot react to variations in traffic flow or use adaptive control strategies that are based on a limited set of static traffic conditions. This paper presents a novel traffic light control approach utilizing the BIRCH (Balanced Iterative Reducing and Clustering using Hierarchies) clustering algorithm combined with digital twins for a more adaptive and efficient system. The BIRCH is effective in processing large datasets because it clusters data points incrementally and dynamically into a small set of representatives. The suggested method does not only enable better simulation and prediction of traffic patterns but also makes possible the real-time adaptive control of traffic signals at signalized intersections. It also improves traffic flow, reduces congestion, and minimizes vehicle idling time by adjusting the green and red light durations dynamically based on both real-time and historical traffic data. This approach is assessed under different traffic intensities, which include low, moderate, and high, while efficiency, fuel consumption, and the number of stops are being compared with the traditional and the existing adaptive traffic management systems.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141933614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards an optimal 3-D design and deployment of 6G UAVs for interference mitigation under terrestrial networks 实现 6G 无人机的最佳 3-D 设计和部署,以减轻地面网络的干扰
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-02 DOI: 10.1016/j.adhoc.2024.103612

Unmanned aerial vehicles (UAVs) have opened new communication possibilities by being able to access remote areas. Their ability to serve a large number of users based on demand and adaptability is a key strength. In Sixth Generation (6G) networks, UAVs are highly valued for their cost-efficiency and versatile deployment. However, the mobility of UAVs introduces different types of interference issues, resulting in a decrease in network performance and quality of service (QoS) for edge users. To address these challenges, this paper introduces a clustering-based solution involving three main steps. Firstly, UAVs are deployed in three-dimension (3D) space based on user requests using mini-batch K-mean clustering Subsequently, re-clustering is explored to tackle load balancing within clusters. Finally, outliers and boundary users are classified to enhance QoS for edge users. This model effectively reduces interference and boosts UAV reliability in terrestrial networks. Also, a case study is presented to show how UAVs can mitigate interference in maritime communication within terrestrial networks. Numerical results demonstrated that the proposed scheme increases throughput by 33.06% and reduces energy consumption and time delay by 73.15% and 9.15%, respectively, as compared to the existing baseline schemes.

无人驾驶飞行器(UAV)能够进入偏远地区,为通信提供了新的可能性。它们能够根据需求为大量用户提供服务,适应性强是其主要优势。在第六代(6G)网络中,无人机因其成本效益高、部署灵活而备受推崇。然而,无人机的移动性带来了不同类型的干扰问题,导致网络性能和边缘用户的服务质量(QoS)下降。为应对这些挑战,本文介绍了一种基于集群的解决方案,包括三个主要步骤。首先,根据用户请求,使用迷你批量 K-均值聚类在三维(3D)空间部署无人机。 随后,探索重新聚类,以解决聚类内的负载平衡问题。最后,对异常值和边界用户进行分类,以提高边缘用户的服务质量。该模型可有效减少干扰,提高无人机在地面网络中的可靠性。此外,还介绍了一个案例研究,说明无人机如何在地面网络中减少海上通信干扰。数值结果表明,与现有的基线方案相比,拟议方案的吞吐量提高了 33.06%,能耗和时延分别降低了 73.15% 和 9.15%。
{"title":"Towards an optimal 3-D design and deployment of 6G UAVs for interference mitigation under terrestrial networks","authors":"","doi":"10.1016/j.adhoc.2024.103612","DOIUrl":"10.1016/j.adhoc.2024.103612","url":null,"abstract":"<div><p>Unmanned aerial vehicles (UAVs) have opened new communication possibilities by being able to access remote areas. Their ability to serve a large number of users based on demand and adaptability is a key strength. In Sixth Generation (6G) networks, UAVs are highly valued for their cost-efficiency and versatile deployment. However, the mobility of UAVs introduces different types of interference issues, resulting in a decrease in network performance and quality of service (QoS) for edge users. To address these challenges, this paper introduces a clustering-based solution involving three main steps. Firstly, UAVs are deployed in three-dimension (3D) space based on user requests using mini-batch K-mean clustering Subsequently, re-clustering is explored to tackle load balancing within clusters. Finally, outliers and boundary users are classified to enhance QoS for edge users. This model effectively reduces interference and boosts UAV reliability in terrestrial networks. Also, a case study is presented to show how UAVs can mitigate interference in maritime communication within terrestrial networks. Numerical results demonstrated that the proposed scheme increases throughput by 33.06% and reduces energy consumption and time delay by 73.15% and 9.15%, respectively, as compared to the existing baseline schemes.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141933626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RTTV-TCP: Adaptive congestion control algorithm based on RTT variations for mmWave networks RTV-TCP:基于毫米波网络 RTT 变化的自适应拥塞控制算法
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-31 DOI: 10.1016/j.adhoc.2024.103611

Internet applications such as video gaming virtual/ augmented reality necessitate efficient fifth-generation (5G) millimeter-wave (mmWave) cellular networks. The Transmission Control Protocol (TCP) is an essential protocol for network connectivity. However, TCP faces challenges in efficiently utilizing the available bandwidth of 5G mmWave cellular networks while maintaining low latency, mainly due to constraints like Non-Line of Sight (NLoS) conditions. This paper introduces Round-Trip-Time Variations-TCP (RTTV-TCP), enhancing TCP performance in 5G mmWave cellular networks. Simulation scenarios for a 5G mmWave cellular network have been conducted to evaluate RTTV-TCP’s performance, comparing it to legacy TCP variants such as NewReno, HighSpeed, CUBIC, Bottleneck Bandwidth and Round-trip propagation time (BBR), FB-TCP (Fuzzy Based-TCP). The results demonstrate that RTTV-TCP achieves higher average throughput than these TCP variants while maintaining the same level of delay in 5G mmWave cellular networks. RTTV-TCP outperforms NewReno and CUBIC by a very significant margin, demonstrating a 208% improvement compared to HighSpeed and a 6% increase compared to BBR protocol in the worst Packet Error Rate (PER) scenario and when the buffer size matches the Bandwidth Delay Product (BDP).

视频游戏、虚拟现实/增强现实等互联网应用需要高效的第五代(5G)毫米波(mmWave)蜂窝网络。传输控制协议(TCP)是网络连接的基本协议。然而,主要由于非视线(NLoS)条件等限制,TCP 在有效利用 5G 毫米波蜂窝网络的可用带宽并保持低延迟方面面临挑战。本文介绍了往返时间变化-TCP(RTTV-TCP),以提高 5G 毫米波蜂窝网络中的 TCP 性能。本文对 5G 毫米波蜂窝网络进行了仿真,以评估 RTTV-TCP 的性能,并将其与 NewReno、HighSpeed、CUBIC、Bottleneck Bandwidth 和 Round-trip propagation time (BBR)、FB-TCP(基于模糊的 TCP)等传统 TCP 变体进行了比较。结果表明,在 5G 毫米波蜂窝网络中,RTV-TCP 比这些 TCP 变体实现了更高的平均吞吐量,同时保持了相同的延迟水平。在最差的数据包错误率(PER)情况下,当缓冲区大小与带宽延迟积(BDP)相匹配时,RTTV-TCP 的性能比 NewReno 和 CUBIC 高出 208%,比 BBR 协议高出 6%。
{"title":"RTTV-TCP: Adaptive congestion control algorithm based on RTT variations for mmWave networks","authors":"","doi":"10.1016/j.adhoc.2024.103611","DOIUrl":"10.1016/j.adhoc.2024.103611","url":null,"abstract":"<div><p>Internet applications such as video gaming virtual/ augmented reality necessitate efficient fifth-generation (5G) millimeter-wave (mmWave) cellular networks. The Transmission Control Protocol (TCP) is an essential protocol for network connectivity. However, TCP faces challenges in efficiently utilizing the available bandwidth of 5G mmWave cellular networks while maintaining low latency, mainly due to constraints like Non-Line of Sight (NLoS) conditions. This paper introduces Round-Trip-Time Variations-TCP (RTTV-TCP), enhancing TCP performance in 5G mmWave cellular networks. Simulation scenarios for a 5G mmWave cellular network have been conducted to evaluate RTTV-TCP’s performance, comparing it to legacy TCP variants such as NewReno, HighSpeed, CUBIC, Bottleneck Bandwidth and Round-trip propagation time (BBR), FB-TCP (Fuzzy Based-TCP). The results demonstrate that RTTV-TCP achieves higher average throughput than these TCP variants while maintaining the same level of delay in 5G mmWave cellular networks. RTTV-TCP outperforms NewReno and CUBIC by a very significant margin, demonstrating a 208% improvement compared to HighSpeed and a 6% increase compared to BBR protocol in the worst Packet Error Rate (PER) scenario and when the buffer size matches the Bandwidth Delay Product (BDP).</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141881787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CV POp-CoRN: The (smart) city-vehicle participatory-opportunistic cooperative route navigation system CV POp-CoRN:(智能)城市车辆参与式机会合作路线导航系统
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-26 DOI: 10.1016/j.adhoc.2024.103604

The phenomenon of urbanization, characterized by the migration of people from rural to urban areas, has led to an expansion of existing urban challenges while introducing new ones. Among these, mobility is a primary concern due to its far-reaching impacts on personal health, safety, social, economic, and environmental aspects. Information and communication technologies (ICT) have been identified as effective solutions to address these issues, leveraging the Internet of Things (IoT) and smart city infrastructure. However, the mainstream approach in smart cities is characterized by a vertical-siloed pattern, addressing individual problems (mobility, pollution, energy management, healthcare, safety, and security) in isolation, without actively engaging citizens, people, and communities as stakeholders.

This paper proposes a paradigm shift towards a holistic, multilateral approach to address mobility, incorporating diverse perspectives, stakeholder needs, and problem-solving strategies. By integrating smart city infrastructure, smart vehicles, and personal devices, an all-encompassing solution is implemented through direct interaction and cooperation between these entities. The resulting City-Vehicle Participatory-Opportunistic Cooperative Route Navigation system (CV POp-CoRN) enables the enforcement of mobility policy trade-offs, reconciling city, vehicle, and people requirements across various domains, including safety, emergency response, traffic management, travel time optimization, vehicle maintenance, pollution mitigation, and special event management. The paper presents the CV POp-CoRN framework, comprising route navigation policies, a heuristics for trading them off, the system design and architecture, and a model for assessing and demonstrating the effectiveness of the proposed approach and the feasibility of the solution.

城市化现象的特点是人口从农村向城市地区迁移,这导致现有的城市挑战不断扩大, 同时也带来了新的挑战。其中,流动性是一个首要问题,因为它对个人健康、安全、社会、经济和环境等方面都有深远的影响。信息和通信技术(ICT)被认为是利用物联网(IoT)和智慧城市基础设施解决这些问题的有效方案。然而,智慧城市的主流方法以垂直模式为特征,孤立地解决单个问题(流动性、污染、能源管理、医疗保健、安全和安保),而没有积极地让公民、人民和社区作为利益相关者参与进来。通过整合智能城市基础设施、智能车辆和个人设备,通过这些实体之间的直接互动与合作,实现全方位的解决方案。由此产生的城市-车辆参与-机会合作路线导航系统(CV POp-CoRN)能够执行移动政策权衡,协调城市、车辆和人员在不同领域的需求,包括安全、应急响应、交通管理、旅行时间优化、车辆维护、污染缓解和特殊事件管理。本文介绍了 CV POp-CoRN 框架,包括路线导航策略、用于权衡这些策略的启发式方法、系统设计和架构,以及用于评估和展示所建议方法的有效性和解决方案可行性的模型。
{"title":"CV POp-CoRN: The (smart) city-vehicle participatory-opportunistic cooperative route navigation system","authors":"","doi":"10.1016/j.adhoc.2024.103604","DOIUrl":"10.1016/j.adhoc.2024.103604","url":null,"abstract":"<div><p>The phenomenon of urbanization, characterized by the migration of people from rural to urban areas, has led to an expansion of existing urban challenges while introducing new ones. Among these, mobility is a primary concern due to its far-reaching impacts on personal health, safety, social, economic, and environmental aspects. Information and communication technologies (ICT) have been identified as effective solutions to address these issues, leveraging the Internet of Things (IoT) and smart city infrastructure. However, the mainstream approach in smart cities is characterized by a vertical-siloed pattern, addressing individual problems (mobility, pollution, energy management, healthcare, safety, and security) in isolation, without actively engaging citizens, people, and communities as stakeholders.</p><p>This paper proposes a paradigm shift towards a holistic, multilateral approach to address mobility, incorporating diverse perspectives, stakeholder needs, and problem-solving strategies. By integrating smart city infrastructure, smart vehicles, and personal devices, an all-encompassing solution is implemented through direct interaction and cooperation between these entities. The resulting City-Vehicle Participatory-Opportunistic Cooperative Route Navigation system (CV POp-CoRN) enables the enforcement of mobility policy trade-offs, reconciling city, vehicle, and people requirements across various domains, including safety, emergency response, traffic management, travel time optimization, vehicle maintenance, pollution mitigation, and special event management. The paper presents the CV POp-CoRN framework, comprising route navigation policies, a heuristics for trading them off, the system design and architecture, and a model for assessing and demonstrating the effectiveness of the proposed approach and the feasibility of the solution.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141843464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An in-depth assessment of the physical layer performance in the proposed B5G framework 深入评估拟议 B5G 框架中的物理层性能
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-26 DOI: 10.1016/j.adhoc.2024.103609

The introduction of fifth-generation (5G) technology marks a significant milestone in next-generation networks, offering higher data rates and new services. Achieving optimal performance in 5G and beyond 5G (B5G) systems requires addressing key requirements like increased capacity, high efficiency, improved performance, low latency, support for many connections, and quality of service. It is well-known that suboptimal network configuration, hardware impairments, or malfunctioning components can degrade system performance. The physical layer of the radio access network, particularly channel estimation and synchronization, plays a crucial role. Hence, this paper offers an in-depth evaluation of the 5G Physical Downlink Shared Channel (PDSCH), along with its related channel models such as the Clustered Delay Line (CDL) and the Tapped Delay Line (TDL). This work assesses 5G network performance through practical and IA-based channel estimation and synchronization techniques, and anticipates numerologies for B5G networks. Extensive simulations leveraging the Matlab 5G New Radio (NR) toolbox assess standardized channel scenarios in both macro-urban and indoor environments, following configurations set by the 3rd Generation Partnership Project (3GPP). The numerical results offer valuable insights into achieving the maximum achievable throughput across various channel environments, including both line-of-sight (LoS) and non-line-of-sight (NLoS) conditions. The throughput comparisons are performed under assumptions of ideal, realistic, and convolutional neural networks (CNN)-based channel estimation with both perfect and realistic synchronization conditions. Importantly, the study pinpoints certain physical layer elements that have a pronounced impact on system performance, providing essential insights for devising effective strategies or refining CNN-based methods for forthcoming mobile B5G networks.

第五代(5G)技术的推出标志着下一代网络的一个重要里程碑,它将提供更高的数据传输速率和新的服务。要在 5G 和超越 5G (B5G) 系统中实现最佳性能,就必须满足一些关键要求,如增加容量、提高效率、改善性能、降低延迟、支持多种连接以及提高服务质量。众所周知,网络配置不理想、硬件损坏或组件故障都会降低系统性能。无线接入网络的物理层,尤其是信道估计和同步,起着至关重要的作用。因此,本文对 5G 物理下行链路共享信道(PDSCH)及其相关信道模型(如集群延迟线(CDL)和分接延迟线(TDL))进行了深入评估。这项工作通过实用的基于 IA 的信道估计和同步技术来评估 5G 网络性能,并预测 B5G 网络的数字技术。利用 Matlab 5G 新无线电(NR)工具箱进行了大量仿真,按照第三代合作伙伴关系项目(3GPP)设定的配置,评估了宏观城市和室内环境中的标准化信道场景。数值结果为在各种信道环境(包括视距(LoS)和非视距(NLoS)条件)下实现最大可实现吞吐量提供了有价值的见解。吞吐量比较是在理想、现实和基于卷积神经网络(CNN)的信道估计以及完美和现实同步条件的假设下进行的。重要的是,该研究指出了对系统性能有明显影响的某些物理层元素,为即将推出的移动 B5G 网络设计有效策略或改进基于 CNN 的方法提供了重要启示。
{"title":"An in-depth assessment of the physical layer performance in the proposed B5G framework","authors":"","doi":"10.1016/j.adhoc.2024.103609","DOIUrl":"10.1016/j.adhoc.2024.103609","url":null,"abstract":"<div><p>The introduction of fifth-generation (5G) technology marks a significant milestone in next-generation networks, offering higher data rates and new services. Achieving optimal performance in 5G and beyond 5G (B5G) systems requires addressing key requirements like increased capacity, high efficiency, improved performance, low latency, support for many connections, and quality of service. It is well-known that suboptimal network configuration, hardware impairments, or malfunctioning components can degrade system performance. The physical layer of the radio access network, particularly channel estimation and synchronization, plays a crucial role. Hence, this paper offers an in-depth evaluation of the 5G Physical Downlink Shared Channel (PDSCH), along with its related channel models such as the Clustered Delay Line (CDL) and the Tapped Delay Line (TDL). This work assesses 5G network performance through practical and IA-based channel estimation and synchronization techniques, and anticipates numerologies for B5G networks. Extensive simulations leveraging the Matlab 5G New Radio (NR) toolbox assess standardized channel scenarios in both macro-urban and indoor environments, following configurations set by the 3rd Generation Partnership Project (3GPP). The numerical results offer valuable insights into achieving the maximum achievable throughput across various channel environments, including both line-of-sight (LoS) and non-line-of-sight (NLoS) conditions. The throughput comparisons are performed under assumptions of ideal, realistic, and convolutional neural networks (CNN)-based channel estimation with both perfect and realistic synchronization conditions. Importantly, the study pinpoints certain physical layer elements that have a pronounced impact on system performance, providing essential insights for devising effective strategies or refining CNN-based methods for forthcoming mobile B5G networks.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141849220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource and trajectory optimization for UAV-assisted MEC communication systems over unlicensed spectrum band 无人机辅助 MEC 通信系统在非许可频段上的资源和轨迹优化
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-25 DOI: 10.1016/j.adhoc.2024.103608

The new radio unlicensed (NR-U) technology is proposed by 3GPP to extend NR to the unlicensed spectrum because of the shortage of the licensed spectrum. Different from the ground and fixed communication equipment-based unlicensed spectrum access scheme, the unmanned aerial vehicle (UAV) mobile platform-based unlicensed spectrum access scheme is not only related to incumbent users but also its trajectory and resource allocation. Therefore, this paper proposes a hybrid unlicensed spectrum access scheme for the UAV-assisted unlicensed mobile edge computing (MEC) communication (UAUM) system, where each flight time slot of the UAV is divided into two parts: power free (PF) and power controlled (PC) stages. In the PF stage, the transmit power is only restrained by the unlicensed spectrum regulations, and thus the UAV can provide high-rate services for real-time downlink users (RDUs) and uplink computing users (UCUs). In the PC stage, the transmit power of the UAV is mainly restrained by the interference to WiFi devices, and thus UAV can be allowed to provide low-rate services for non-realtime downlink users (NDUs) without affecting WiFi users. Based on the proposed scheme, a multi-variable optimization problem regarding trajectory, bandwidth, transmit power, and duty cycle is formulated to maximize the total offloaded computing bits on the premise of ensuring the quality of experience of RDUs, NDUs, and WiFi users under the maximum energy budget. To solve this problem efficiently, we propose an iterative algorithm based on the block coordinate descent method and successive convex approximation technique to decompose the original problem into four optimization subproblems of trajectory, bandwidth, transmit power and duty cycle, which are then solved alternatively in an iterative manner. A large number of simulation results demonstrate that in terms of spectrum efficiency and total offloaded computing bits, the proposed algorithm outperforms other unlicensed spectrum access schemes and optimization algorithms. The other performances of the proposed algorithm are deeply evaluated to prove its effectiveness and feasibility.

由于授权频谱的短缺,3GPP 提出了新的无线电非授权(NR-U)技术,将 NR 扩展到非授权频谱。与基于地面和固定通信设备的非授权频谱接入方案不同,基于无人机(UAV)移动平台的非授权频谱接入方案不仅与现有用户有关,还与其轨迹和资源分配有关。因此,本文提出了无人机辅助无授权移动边缘计算(MEC)通信(UAUM)系统的混合无授权频谱接入方案,其中无人机的每个飞行时隙分为两部分:无功率(PF)阶段和功率受控(PC)阶段。在无功率(PF)阶段,发射功率仅受到非授权频谱法规的限制,因此无人机可以为实时下行链路用户(RDUs)和上行链路计算用户(UCUs)提供高速率服务。在 PC 阶段,无人机的发射功率主要受制于对 WiFi 设备的干扰,因此可以允许无人机在不影响 WiFi 用户的情况下为非实时下行链路用户(NDU)提供低速率服务。基于所提出的方案,我们提出了一个关于轨迹、带宽、发射功率和占空比的多变量优化问题,以在最大能量预算的前提下确保 RDU、NDU 和 WiFi 用户的体验质量,实现总卸载计算比特的最大化。为高效解决该问题,我们提出了一种基于块坐标下降法和连续凸逼近技术的迭代算法,将原问题分解为轨迹、带宽、发射功率和占空比四个优化子问题,然后以迭代方式交替求解。大量仿真结果表明,就频谱效率和总卸载计算比特而言,拟议算法优于其他非授权频谱接入方案和优化算法。此外,还对所提算法的其他性能进行了深入评估,以证明其有效性和可行性。
{"title":"Resource and trajectory optimization for UAV-assisted MEC communication systems over unlicensed spectrum band","authors":"","doi":"10.1016/j.adhoc.2024.103608","DOIUrl":"10.1016/j.adhoc.2024.103608","url":null,"abstract":"<div><p>The <em>new radio unlicensed</em> (NR-U) technology is proposed by 3GPP to extend NR to the unlicensed spectrum because of the shortage of the licensed spectrum. Different from the ground and fixed communication equipment-based unlicensed spectrum access scheme, the <em>unmanned aerial vehicle</em> (UAV) mobile platform-based unlicensed spectrum access scheme is not only related to incumbent users but also its trajectory and resource allocation. Therefore, this paper proposes a hybrid unlicensed spectrum access scheme for the UAV-assisted unlicensed <em>mobile edge computing</em> (MEC) communication (UAUM) system, where each flight time slot of the UAV is divided into two parts: <em>power free</em> (PF) and <em>power controlled</em> (PC) stages. In the PF stage, the transmit power is only restrained by the unlicensed spectrum regulations, and thus the UAV can provide high-rate services for <em>real-time downlink users</em> (RDUs) and <em>uplink computing users</em> (UCUs). In the PC stage, the transmit power of the UAV is mainly restrained by the interference to WiFi devices, and thus UAV can be allowed to provide low-rate services for <em>non-realtime downlink users</em> (NDUs) without affecting WiFi users. Based on the proposed scheme, a multi-variable optimization problem regarding trajectory, bandwidth, transmit power, and duty cycle is formulated to maximize the total offloaded computing bits on the premise of ensuring the quality of experience of RDUs, NDUs, and WiFi users under the maximum energy budget. To solve this problem efficiently, we propose an iterative algorithm based on the block coordinate descent method and successive convex approximation technique to decompose the original problem into four optimization subproblems of trajectory, bandwidth, transmit power and duty cycle, which are then solved alternatively in an iterative manner. A large number of simulation results demonstrate that in terms of spectrum efficiency and total offloaded computing bits, the proposed algorithm outperforms other unlicensed spectrum access schemes and optimization algorithms. The other performances of the proposed algorithm are deeply evaluated to prove its effectiveness and feasibility.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141844128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint optimization of communication and mission performance for multi-UAV collaboration network: A multi-agent reinforcement learning method 多无人机协作网络的通信和任务性能联合优化:一种多代理强化学习方法
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-24 DOI: 10.1016/j.adhoc.2024.103602

In emergency rescue, target search and other mission scenarios with Unmanned Aerial Vehicles (UAVs), the Relay UAVs (RUs) and Mission UAVs (MUs) can collaborate to accomplish tasks in unknown environments. In this paper, we investigate the problem of trajectory planning and power control for the MU and RU collaboration. Firstly, considering the characteristics of multi-hop data transmission between the MU and Ground Control Station, a multi-UAV collaborative coverage model is designed. Meanwhile, a UAV control algorithm named MUTTO is proposed based on multi-agent reinforcement learning. In order to solve the problem of the unknown information about the number and locations of targets, the geographic coverage rate is used to replace the target coverage rate for decision making. Then, the reward functions of two types of UAVs are designed separately for the purpose of better cooperation. By simultaneously planning the trajectory and transmission power of the RU and MU, the mission target coverage rate and network transmission rate are maximized while the energy consumption of the UAV is minimized. Finally, numerical simulations results show that MUTTO can solve the UAV network control problem in an efficient way and has better performance than the benchmark method.

在使用无人飞行器(UAV)执行紧急救援、目标搜索等任务时,中继无人飞行器(RU)和任务无人飞行器(MU)可以协同完成未知环境中的任务。本文研究了 MU 和 RU 协作的轨迹规划和功率控制问题。首先,考虑到 MU 与地面控制站之间多跳数据传输的特点,设计了多无人机协作覆盖模型。同时,提出了基于多代理强化学习的无人机控制算法 MUTTO。为了解决目标数量和位置信息未知的问题,用地理覆盖率代替目标覆盖率进行决策。然后,为了更好地合作,分别设计了两种无人机的奖励函数。通过同时规划 RU 和 MU 的轨迹和发射功率,使任务目标覆盖率和网络传输率最大化,同时使无人机的能耗最小化。最后,数值模拟结果表明,MUTTO 可以高效地解决无人机网络控制问题,其性能优于基准方法。
{"title":"Joint optimization of communication and mission performance for multi-UAV collaboration network: A multi-agent reinforcement learning method","authors":"","doi":"10.1016/j.adhoc.2024.103602","DOIUrl":"10.1016/j.adhoc.2024.103602","url":null,"abstract":"<div><p>In emergency rescue, target search and other mission scenarios with Unmanned Aerial Vehicles (UAVs), the Relay UAVs (RUs) and Mission UAVs (MUs) can collaborate to accomplish tasks in unknown environments. In this paper, we investigate the problem of trajectory planning and power control for the MU and RU collaboration. Firstly, considering the characteristics of multi-hop data transmission between the MU and Ground Control Station, a multi-UAV collaborative coverage model is designed. Meanwhile, a UAV control algorithm named MUTTO is proposed based on multi-agent reinforcement learning. In order to solve the problem of the unknown information about the number and locations of targets, the geographic coverage rate is used to replace the target coverage rate for decision making. Then, the reward functions of two types of UAVs are designed separately for the purpose of better cooperation. By simultaneously planning the trajectory and transmission power of the RU and MU, the mission target coverage rate and network transmission rate are maximized while the energy consumption of the UAV is minimized. Finally, numerical simulations results show that MUTTO can solve the UAV network control problem in an efficient way and has better performance than the benchmark method.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141840299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A smart contract-based 6G-enabled authentication scheme for securing Internet of Nano Medical Things network 基于智能合约的 6G 认证方案,确保纳米医疗物联网网络安全
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-23 DOI: 10.1016/j.adhoc.2024.103606

Nanotechnology has recently emerged as a pivotal field with wide-ranging implications. Its integration into the 6G-enabled Internet of Things (IoT) has given rise to the 6G-enabled IoNT (Internet of Nano Things) paradigm, impacting sectors such as healthcare, industries, smart homes, aerospace, and defense. This technology offers opportunities to revolutionize existing methodologies and enhance efficiency. Research efforts are now focusing on developing secure, scalable network infrastructures tailored for the healthcare sector at the nanoscale, leading to the concept of the Internet of Nano Medical Things (IoNMT). However, the unique characteristics of nanotechnology pose security challenges, particularly concerning privacy, confidentiality, dependability, latency, and the expensive consequences of blockchain-based storage. Authentication and transparency are vital for ensuring secure data handling in IoNMT networks, necessitating a secure access mechanism resistant to unauthorized interference. To tackle these challenges, this study proposes a smart contract-based authentication protocol developed specifically for 6G-IoNMT networks. The framework aims to manage real-time information with minimal latency through decentralized peer-to-peer cloud servers while addressing security and privacy concerns. Thorough security and privacy assessments, including ROR model evaluations, Scyther tool analysis, and informal security evaluations, validate the protocol’s effectiveness. Moreover, the simulation highlights that this protocol offers superior security and efficiency as well as energy consumption compared to existing protocols.

纳米技术最近已成为一个具有广泛影响的关键领域。它与支持 6G 的物联网(IoT)的融合催生了支持 6G 的 IoNT(纳米物联网)模式,对医疗保健、工业、智能家居、航空航天和国防等领域产生了影响。这项技术为彻底改变现有方法和提高效率提供了机遇。目前,研究工作的重点是在纳米尺度上为医疗保健领域开发安全、可扩展的网络基础设施,从而提出了纳米医疗物联网(IoNMT)的概念。然而,纳米技术的独特性带来了安全挑战,尤其是在隐私、保密性、可靠性、延迟以及基于区块链存储的昂贵后果方面。要确保 IoNMT 网络中数据处理的安全性,身份验证和透明度至关重要,这就需要一种能抵御未经授权干扰的安全访问机制。为应对这些挑战,本研究提出了一种基于智能合约的认证协议,专门为 6G-IoNMT 网络开发。该框架旨在通过分散的点对点云服务器以最小的延迟管理实时信息,同时解决安全和隐私问题。全面的安全和隐私评估(包括 ROR 模型评估、Scyther 工具分析和非正式安全评估)验证了该协议的有效性。此外,模拟结果表明,与现有协议相比,该协议在安全性、效率和能耗方面都更胜一筹。
{"title":"A smart contract-based 6G-enabled authentication scheme for securing Internet of Nano Medical Things network","authors":"","doi":"10.1016/j.adhoc.2024.103606","DOIUrl":"10.1016/j.adhoc.2024.103606","url":null,"abstract":"<div><p>Nanotechnology has recently emerged as a pivotal field with wide-ranging implications. Its integration into the 6G-enabled Internet of Things (IoT) has given rise to the 6G-enabled IoNT (Internet of Nano Things) paradigm, impacting sectors such as healthcare, industries, smart homes, aerospace, and defense. This technology offers opportunities to revolutionize existing methodologies and enhance efficiency. Research efforts are now focusing on developing secure, scalable network infrastructures tailored for the healthcare sector at the nanoscale, leading to the concept of the Internet of Nano Medical Things (IoNMT). However, the unique characteristics of nanotechnology pose security challenges, particularly concerning privacy, confidentiality, dependability, latency, and the expensive consequences of blockchain-based storage. Authentication and transparency are vital for ensuring secure data handling in IoNMT networks, necessitating a secure access mechanism resistant to unauthorized interference. To tackle these challenges, this study proposes a smart contract-based authentication protocol developed specifically for 6G-IoNMT networks. The framework aims to manage real-time information with minimal latency through decentralized peer-to-peer cloud servers while addressing security and privacy concerns. Thorough security and privacy assessments, including ROR model evaluations, Scyther tool analysis, and informal security evaluations, validate the protocol’s effectiveness. Moreover, the simulation highlights that this protocol offers superior security and efficiency as well as energy consumption compared to existing protocols.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141853704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement learning-based charging cluster determination algorithm for optimal charger placement in wireless rechargeable sensor networks 基于强化学习的充电群确定算法,用于优化无线充电传感器网络中的充电器位置
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-23 DOI: 10.1016/j.adhoc.2024.103605

Wireless power transfer (WPT) provides a promising technology for energy replenishment of wireless rechargeable sensor networks (WRSNs), where wireless chargers can be deployed at fixed locations for charging nodes simultaneously within their effective charging range. Optimal charger placement (OCP) for sustainable operations of WRSN with cheaper charging cost is a challenging and difficult problem due to its NP-completeness in nature. This paper proposes a novel reinforcement learning (RL) based approach for OCP, where the problem is firstly formulated as a charging cluster determination problem with a fixed clustering radius and then tackled by the reinforcement learning-based charging cluster determination (RL-CCD) algorithm. Specifically, nodes are coarsely clustered by the K-Means++ algorithm, with chargers placed at the cluster center. Meanwhile, RL is applied to explore the potential locations of the cluster centers to adjust the center locations and reduce the number of clusters, using the number of nodes in the cluster and the summation of distances between the cluster center and nodes as the reward. Moreover, an experience-strengthening mechanism is introduced to learn the current optimal charging experience. Extensive simulations show that RL-CCD significantly outperforms existing algorithms.

无线功率传输(WPT)为无线可充电传感器网络(WRSN)的能量补充提供了一种前景广阔的技术,无线充电器可部署在固定位置,在有效充电范围内同时为节点充电。最佳充电器位置(OCP)可降低充电成本,实现 WRSN 的可持续运行,但由于其 NP 的完备性,这是一个具有挑战性的难题。本文提出了一种基于强化学习(RL)的新型 OCP 方法,首先将该问题表述为具有固定聚类半径的充电聚类确定问题,然后通过基于强化学习的充电聚类确定(RL-CCD)算法加以解决。具体来说,采用 K-Means++ 算法对节点进行粗略聚类,并将充电器置于聚类中心。同时,应用 RL 探索簇中心的潜在位置,以调整中心位置并减少簇的数量,使用簇中节点的数量和簇中心与节点之间的距离总和作为奖励。此外,还引入了经验强化机制,以学习当前的最佳充电经验。大量仿真表明,RL-CCD 明显优于现有算法。
{"title":"Reinforcement learning-based charging cluster determination algorithm for optimal charger placement in wireless rechargeable sensor networks","authors":"","doi":"10.1016/j.adhoc.2024.103605","DOIUrl":"10.1016/j.adhoc.2024.103605","url":null,"abstract":"<div><p>Wireless power transfer (WPT) provides a promising technology for energy replenishment of wireless rechargeable sensor networks (WRSNs), where wireless chargers can be deployed at fixed locations for charging nodes simultaneously within their effective charging range. Optimal charger placement (OCP) for sustainable operations of WRSN with cheaper charging cost is a challenging and difficult problem due to its NP-completeness in nature. This paper proposes a novel reinforcement learning (RL) based approach for OCP, where the problem is firstly formulated as a charging cluster determination problem with a fixed clustering radius and then tackled by the reinforcement learning-based charging cluster determination (RL-CCD) algorithm. Specifically, nodes are coarsely clustered by the K-Means++ algorithm, with chargers placed at the cluster center. Meanwhile, RL is applied to explore the potential locations of the cluster centers to adjust the center locations and reduce the number of clusters, using the number of nodes in the cluster and the summation of distances between the cluster center and nodes as the reward. Moreover, an experience-strengthening mechanism is introduced to learn the current optimal charging experience. Extensive simulations show that RL-CCD significantly outperforms existing algorithms.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141842640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel integrated quantum-resistant cryptography for secure scientific data exchange in ad hoc networks 用于 Ad Hoc 网络安全科学数据交换的新型集成量子抗性密码学
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-22 DOI: 10.1016/j.adhoc.2024.103607

The fast advancement of quantum computing poses a substantial challenge to the privacy and security of critical scientific research data. This is because the standard cryptography methods, which have been proven effective in classical computers, are rendered less secure in the face of quantum computing approaches. Previously, numerous endeavors have been made to safeguard confidential information through the utilization of different standards and quantum cryptographic methods. However, there remains a research void with several challenges and limitations, including excessive computational burden, vulnerability to various attacks, and limited hardware compatibility for implementation. We propose a modern hybrid cryptographical approach to secure sensitive data from various attacks and vulnerabilities to address the existing limitations. The suggested standard integrates traditional cryptographic standards with quantum-resistant standards to boost sensitive scientific data privacy and security and address various classical cyber-attacks and critical quantum attacks. For the context of scientific data privacy and security, our work depicts a hybrid standard structure by performing a systematic exploration of current encipherment model challenges and issues such as the investigation of various susceptibilities of mathematical cryptographic models. In this work, we apply lattice-based coding as the outer layer and Advanced Encryption Standard (AES) as the inner layer to improve security and efficacy. The proposed security theorem launches the operational veracity of lattice-based coding in the face of quantum attacks, while a complete investigation of the proposed algorithm efficacy vitrines the enhanced security and scalability of the anticipated hybrid standard transversely diverse input sensitive data volumes. Furthermore, this proposed work offers the security confidence score of the hybrid model by the amalgamation of AES and lattice-based cryptography (LBC), hence guaranteeing strength next to both quantum and traditional computing weaknesses. The investigational results prove the improved efficiency of the proposed hybrid model in contrast to traditional and past quantum-resistant models.

量子计算的快速发展对关键科研数据的隐私和安全构成了巨大挑战。这是因为在经典计算机中被证明有效的标准加密方法,在量子计算方法面前变得不那么安全了。在此之前,人们已经做出了许多努力,通过利用不同的标准和量子加密方法来保护机密信息。然而,目前的研究仍处于空白状态,面临着一些挑战和限制,包括过重的计算负担、易受各种攻击以及实施时硬件兼容性有限等。针对现有的局限性,我们提出了一种现代混合加密方法,以确保敏感数据免受各种攻击和漏洞。建议的标准整合了传统密码标准和抗量子标准,以提高敏感科学数据的隐私和安全性,并应对各种经典网络攻击和关键量子攻击。在科学数据隐私与安全方面,我们的工作通过系统地探索当前密码模型面临的挑战和问题(如调查数学密码模型的各种易感性),描绘了一种混合标准结构。在这项工作中,我们将基于网格的编码作为外层,将高级加密标准(AES)作为内层,以提高安全性和有效性。所提出的安全定理揭示了基于网格的编码在面对量子攻击时的可操作性,而对所提出的算法功效的全面研究则显示了预期混合标准横向输入敏感数据量的增强安全性和可扩展性。此外,这项研究还通过将 AES 和基于网格的密码学(LBC)结合在一起,提供了混合模型的安全可信度,从而保证了在量子和传统计算弱点面前的优势。研究结果证明,与传统和过去的抗量子模型相比,所提出的混合模型提高了效率。
{"title":"A novel integrated quantum-resistant cryptography for secure scientific data exchange in ad hoc networks","authors":"","doi":"10.1016/j.adhoc.2024.103607","DOIUrl":"10.1016/j.adhoc.2024.103607","url":null,"abstract":"<div><p>The fast advancement of quantum computing poses a substantial challenge to the privacy and security of critical scientific research data. This is because the standard cryptography methods, which have been proven effective in classical computers, are rendered less secure in the face of quantum computing approaches. Previously, numerous endeavors have been made to safeguard confidential information through the utilization of different standards and quantum cryptographic methods. However, there remains a research void with several challenges and limitations, including excessive computational burden, vulnerability to various attacks, and limited hardware compatibility for implementation. We propose a modern hybrid cryptographical approach to secure sensitive data from various attacks and vulnerabilities to address the existing limitations. The suggested standard integrates traditional cryptographic standards with quantum-resistant standards to boost sensitive scientific data privacy and security and address various classical cyber-attacks and critical quantum attacks. For the context of scientific data privacy and security, our work depicts a hybrid standard structure by performing a systematic exploration of current encipherment model challenges and issues such as the investigation of various susceptibilities of mathematical cryptographic models. In this work, we apply lattice-based coding as the outer layer and Advanced Encryption Standard (AES) as the inner layer to improve security and efficacy. The proposed security theorem launches the operational veracity of lattice-based coding in the face of quantum attacks, while a complete investigation of the proposed algorithm efficacy vitrines the enhanced security and scalability of the anticipated hybrid standard transversely diverse input sensitive data volumes. Furthermore, this proposed work offers the security confidence score of the hybrid model by the amalgamation of AES and lattice-based cryptography (LBC), hence guaranteeing strength next to both quantum and traditional computing weaknesses. The investigational results prove the improved efficiency of the proposed hybrid model in contrast to traditional and past quantum-resistant models.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141848909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Ad Hoc Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1