首页 > 最新文献

Ad Hoc Networks最新文献

英文 中文
Joint optimization of device scheduling and trajectory planning for UAV-assisted data collection in wireless power supply networks 无线供电网络中无人机辅助数据采集设备调度与轨迹规划联合优化
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-19 DOI: 10.1016/j.adhoc.2025.104085
Pingjie Xia, GuoQiang Zheng, Zhe Han, Zhenhua Li, Huahong Ma, Baofeng Ji
This paper addresses the problem of long-term service inequality of IoT devices in UAV-assisted wireless power communication networks. Considering factors such as the number of device historical services, the amount of device data, the UAV flight trajectory, and the binary service decision of the device, the scheduling and trajectory planning for UAV-assisted wireless power supply network data collection are modeled as a multi-objective optimization problem. The goals are to minimize the UAV’s energy usage, maximize the overall volume of data gathered, and guarantee long-term equity in device maintenance. Given the NP-hardness and mixed integer non-linear nature of the problem, a multi-objective master–slave co-optimization (MOMSCO) algorithm is proposed. The algorithm breaks the optimization problem down into a primary module and smaller modules for the solution. The primary module designs a multi-objective dynamically balanced sequence generating algorithm, chooses the best device service sequence, and calls the sub-module to optimize the UAV’s flying trajectory. By building a lightweight state space and creating a multi-objective reward function, the submodule proposes an expanded Deep Deterministic Policy Gradient (DDPG) algorithm to co-optimize UAV energy consumption and data gathering. Numerical simulation is used to validate the real scenario, and the findings demonstrate that the device service’s fairness significantly improves, steadily converging to about 97% after several data collection cycles. The usefulness of the suggested algorithm in enhancing system performance and long-term service fairness is further demonstrated by the fact that the system energy efficiency of the proposed scheme beats that of the benchmark scheme in every round.
本文研究了无人机辅助无线电力通信网络中物联网设备长期服务不平等问题。考虑设备历史服务数量、设备数据量、无人机飞行轨迹和设备二元服务决策等因素,将无人机辅助无线供电网络数据采集调度和轨迹规划建模为多目标优化问题。目标是最大限度地减少无人机的能源使用,最大限度地提高收集的数据总量,并保证设备维护的长期公平性。针对该问题的np -硬度和混合整数非线性特性,提出了一种多目标主从协同优化算法。该算法将优化问题分解为一个主要模块和更小的模块来求解。主模块设计多目标动态平衡序列生成算法,选择最佳设备服务序列,调用子模块优化无人机飞行轨迹。该子模块通过构建轻量级状态空间和创建多目标奖励函数,提出了一种扩展的深度确定性策略梯度(DDPG)算法,对无人机能耗和数据采集进行协同优化。通过数值模拟对真实场景进行验证,结果表明,经过几个数据采集周期后,设备服务的公平性显著提高,稳定收敛到97%左右。该算法在提高系统性能和长期服务公平性方面的有效性进一步得到了验证,该算法的系统能效在每一轮中都优于基准方案。
{"title":"Joint optimization of device scheduling and trajectory planning for UAV-assisted data collection in wireless power supply networks","authors":"Pingjie Xia,&nbsp;GuoQiang Zheng,&nbsp;Zhe Han,&nbsp;Zhenhua Li,&nbsp;Huahong Ma,&nbsp;Baofeng Ji","doi":"10.1016/j.adhoc.2025.104085","DOIUrl":"10.1016/j.adhoc.2025.104085","url":null,"abstract":"<div><div>This paper addresses the problem of long-term service inequality of IoT devices in UAV-assisted wireless power communication networks. Considering factors such as the number of device historical services, the amount of device data, the UAV flight trajectory, and the binary service decision of the device, the scheduling and trajectory planning for UAV-assisted wireless power supply network data collection are modeled as a multi-objective optimization problem. The goals are to minimize the UAV’s energy usage, maximize the overall volume of data gathered, and guarantee long-term equity in device maintenance. Given the NP-hardness and mixed integer non-linear nature of the problem, a multi-objective master–slave co-optimization (MOMSCO) algorithm is proposed. The algorithm breaks the optimization problem down into a primary module and smaller modules for the solution. The primary module designs a multi-objective dynamically balanced sequence generating algorithm, chooses the best device service sequence, and calls the sub-module to optimize the UAV’s flying trajectory. By building a lightweight state space and creating a multi-objective reward function, the submodule proposes an expanded Deep Deterministic Policy Gradient (DDPG) algorithm to co-optimize UAV energy consumption and data gathering. Numerical simulation is used to validate the real scenario, and the findings demonstrate that the device service’s fairness significantly improves, steadily converging to about 97% after several data collection cycles. The usefulness of the suggested algorithm in enhancing system performance and long-term service fairness is further demonstrated by the fact that the system energy efficiency of the proposed scheme beats that of the benchmark scheme in every round.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"182 ","pages":"Article 104085"},"PeriodicalIF":4.8,"publicationDate":"2025-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145580099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient Corona ring based data collection scheme using wireless sensor networks with Internet of Things for aeration control in smart shrimp aquaculture 一种基于电晕环的无线传感器网络与物联网数据采集方案,用于智能对虾养殖中的曝气控制
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-15 DOI: 10.1016/j.adhoc.2025.104091
Ram Prasath Sivarajaboopathy , Sivasankari Krishnakumar
Energy efficiency is a very crucial requirement in battery-operated wireless sensor networks. The Cluster and Corona Ring-based Data Collection (CCRDC) scheme is proposed to prolong the network lifetime. The waiting-time-dependent Cluster Head (CH) awareness message is applied in the proposed cluster head selection and cluster formation. Also, the Corona ring based routing is formed depending on the Corona ring ID, node ID, residual energy, and distance from the Base Station (BS). The proposed data collection scheme mitigates the excessive use of control packet exchange and energy consumption. Based on the simulation outcomes, it is observed that the suggested method achieves a high performance than other existing protocols in terms of average energy consumption, average end-to-end delay, packet delivery ratio, and average control packets. In the proposed work, the last node expiry is occurred in the network at 1634th round whereas in the existing works EERPMS, EDCGRP, and DCBSRP the last node expiry in the network is at 1285th, 1107th and 1026th round respectively. The proposed data collection and routing scheme is implemented and deployed to supervise the quality of the shrimp cultivation pond water in real time, in which the major parameters like pH level, dissolved oxygen (DO) and temperature are gathered by using appropriate sensors. The gathered data are transmitted to the cloud via BS. In shrimp ponds, Dissolved Oxygen (DO) level is a key metric for reducing stress and mortality. The oxygen level in the water is reduced due to many factors including high temperature, high nutrients levels, excessive plant growth, food wastes, etc. Several methods have currently been investigated to raise the DO level in the shrimp ponds. Many studies suggest that the aeration improves the water quality and cost effectiveness. The automatic ON/OFF control of the aerator is the most effective method to improve the DO concentration level in the ponds, although it is not entirely dependable. In this work, the automatic ON/OFF control of the aerator is implemented by using fuzzy logic with the input of pH level, dissolved oxygen and temperature.
在电池供电的无线传感器网络中,能源效率是一个非常关键的要求。提出了基于簇和电晕环的数据采集(CCRDC)方案来延长网络的生命周期。在簇头选择和簇形成过程中应用了依赖于等待时间的簇头感知信息。此外,基于电晕环的路由是根据电晕环ID、节点ID、剩余能量和与基站(BS)的距离形成的。所提出的数据收集方案减轻了控制分组交换的过度使用和能源消耗。仿真结果表明,该方法在平均能耗、端到端平均时延、分组分发率和平均控制包数等方面都比现有的协议具有更高的性能。在提议的工作中,网络中的最后一个节点到期发生在第1634轮,而在现有的EERPMS、EDCGRP和DCBSRP中,网络中的最后一个节点到期分别发生在第1285轮、第1107轮和第1026轮。实施并部署所提出的数据采集和路由方案,实时监测对虾养殖池水的质量,其中通过适当的传感器收集pH值、溶解氧(DO)和温度等主要参数。收集到的数据通过BS传输到云端。在虾池中,溶解氧(DO)水平是降低应激和死亡率的关键指标。由于高温、高营养水平、植物过度生长、食物浪费等多种因素,水中的氧含量会降低。目前研究了几种提高对虾池DO水平的方法。许多研究表明,曝气改善了水质和成本效益。曝气器的自动开/关控制是提高池塘DO浓度水平的最有效方法,尽管它并不完全可靠。在本工作中,采用模糊逻辑,以pH值、溶解氧和温度为输入,实现曝气机的自动开/关控制。
{"title":"An efficient Corona ring based data collection scheme using wireless sensor networks with Internet of Things for aeration control in smart shrimp aquaculture","authors":"Ram Prasath Sivarajaboopathy ,&nbsp;Sivasankari Krishnakumar","doi":"10.1016/j.adhoc.2025.104091","DOIUrl":"10.1016/j.adhoc.2025.104091","url":null,"abstract":"<div><div>Energy efficiency is a very crucial requirement in battery-operated wireless sensor networks. The Cluster and Corona Ring-based Data Collection (CCRDC) scheme is proposed to prolong the network lifetime. The waiting-time-dependent Cluster Head (CH) awareness message is applied in the proposed cluster head selection and cluster formation. Also, the Corona ring based routing is formed depending on the Corona ring ID, node ID, residual energy, and distance from the Base Station (BS). The proposed data collection scheme mitigates the excessive use of control packet exchange and energy consumption. Based on the simulation outcomes, it is observed that the suggested method achieves a high performance than other existing protocols in terms of average energy consumption, average end-to-end delay, packet delivery ratio, and average control packets. In the proposed work, the last node expiry is occurred in the network at 1634th round whereas in the existing works EERPMS, EDCGRP, and DCBSRP the last node expiry in the network is at 1285th, 1107th and 1026th round respectively. The proposed data collection and routing scheme is implemented and deployed to supervise the quality of the shrimp cultivation pond water in real time, in which the major parameters like pH level, dissolved oxygen (DO) and temperature are gathered by using appropriate sensors. The gathered data are transmitted to the cloud via BS. In shrimp ponds, Dissolved Oxygen (DO) level is a key metric for reducing stress and mortality. The oxygen level in the water is reduced due to many factors including high temperature, high nutrients levels, excessive plant growth, food wastes, etc. Several methods have currently been investigated to raise the DO level in the shrimp ponds. Many studies suggest that the aeration improves the water quality and cost effectiveness. The automatic ON/OFF control of the aerator is the most effective method to improve the DO concentration level in the ponds, although it is not entirely dependable. In this work, the automatic ON/OFF control of the aerator is implemented by using fuzzy logic with the input of pH level, dissolved oxygen and temperature.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"182 ","pages":"Article 104091"},"PeriodicalIF":4.8,"publicationDate":"2025-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145624182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A literature review on sinkhole attack detection for Internet of Things 物联网天坑攻击检测的文献综述
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-15 DOI: 10.1016/j.adhoc.2025.104081
Mohammad Nadim, John Rhed Eugenio, Anitha Chennamaneni
The growth of the Internet of Things (IoT), driven by Wireless Sensor Networks (WSNs) and Low-Power and Lossy Networks (LLNs), has raised significant security concerns, particularly regarding sinkhole attacks. These attacks compromise data integrity by redirecting traffic through malicious nodes. This paper reviews existing detection methods for sinkhole attacks in IoT and WSNs, analyzing their effectiveness, limitations, and current research gaps. Key challenges include the lack of benchmark datasets, limited real-world validation, and issues with scalability and protocol dependence. The study highlights future research directions to enhance the security and resilience of IoT systems.
在无线传感器网络(wsn)和低功耗损耗网络(lln)的推动下,物联网(IoT)的发展引发了重大的安全问题,尤其是天坑攻击。这些攻击通过将流量重定向到恶意节点来破坏数据完整性。本文综述了现有的物联网和无线传感器网络中天坑攻击的检测方法,分析了它们的有效性、局限性和目前的研究空白。主要挑战包括缺乏基准数据集、有限的实际验证以及可伸缩性和协议依赖性问题。该研究强调了未来的研究方向,以增强物联网系统的安全性和弹性。
{"title":"A literature review on sinkhole attack detection for Internet of Things","authors":"Mohammad Nadim,&nbsp;John Rhed Eugenio,&nbsp;Anitha Chennamaneni","doi":"10.1016/j.adhoc.2025.104081","DOIUrl":"10.1016/j.adhoc.2025.104081","url":null,"abstract":"<div><div>The growth of the Internet of Things (IoT), driven by Wireless Sensor Networks (WSNs) and Low-Power and Lossy Networks (LLNs), has raised significant security concerns, particularly regarding sinkhole attacks. These attacks compromise data integrity by redirecting traffic through malicious nodes. This paper reviews existing detection methods for sinkhole attacks in IoT and WSNs, analyzing their effectiveness, limitations, and current research gaps. Key challenges include the lack of benchmark datasets, limited real-world validation, and issues with scalability and protocol dependence. The study highlights future research directions to enhance the security and resilience of IoT systems.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"182 ","pages":"Article 104081"},"PeriodicalIF":4.8,"publicationDate":"2025-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145580100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A systematic literature review of emergency communications assisted by unnamed aerial vehicles 对未命名飞行器辅助应急通信的系统文献综述
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-13 DOI: 10.1016/j.adhoc.2025.104063
Isaac López-Villegas , Erick Axel Martínez-Rios , Javier Izquierdo-Reyes , Rogelio Bustamante-Bello , Francisco Falcone
Reliable communication systems are critical during emergency scenarios such as floods, earthquakes, fires, and hurricanes to ensure timely information exchange and minimize damage. However, traditional communication infrastructure is often severely compromised during such events. Unmanned Aerial Vehicles (UAVs) have emerged as a promising solution to deploy temporary communication networks in disaster-affected areas. Although several studies have proposed architectures and deployment strategies for UAV-assisted communication, and reviews have addressed their potential, comprehensive discussions on protocol configurations, architectural considerations, and deployment parameter optimization remain limited. This paper presents a systematic literature review covering the period from 2014 to 2024, focusing on the use of UAVs in emergency communication systems. The reviewed articles are classified into a structured taxonomy according to the emergency scenario, UAV role, communication architecture, and protocol layer. Additionally, common communication parameters optimized for deployment, such as coverage and throughput, and the optimization methods employed, including heuristic and artificial intelligence techniques, are identified. The findings reveal that UAVs are predominantly deployed as aerial base stations for large-scale dynamic disasters, with protocol development focusing mainly on the physical, data link, and network layers. However, the lack of standardized deployment guidelines and limited real-world experimentation highlight a significant research gap. This review underscores the need for benchmark methodologies to support the effective and comparable deployment of UAV-assisted emergency communication systems.
在洪水、地震、火灾和飓风等紧急情况下,可靠的通信系统至关重要,可以确保及时交换信息并将损失降到最低。然而,传统的通信基础设施在此类事件中经常受到严重损害。无人驾驶飞行器(uav)已经成为在受灾地区部署临时通信网络的一种有前途的解决方案。尽管一些研究已经提出了无人机辅助通信的架构和部署策略,并且审查了它们的潜力,但关于协议配置、架构考虑和部署参数优化的全面讨论仍然有限。本文对2014年至2024年期间的文献进行了系统的综述,重点介绍了无人机在应急通信系统中的应用。根据应急场景、无人机角色、通信架构和协议层,将审阅的文章分类为结构化分类法。此外,还确定了为部署优化的常见通信参数,例如覆盖范围和吞吐量,以及所采用的优化方法,包括启发式和人工智能技术。研究结果表明,无人机主要部署为大规模动态灾害的空中基站,协议开发主要集中在物理层、数据链路和网络层。然而,缺乏标准化的部署指南和有限的现实世界实验突出了一个重大的研究差距。该审查强调需要基准方法来支持无人机辅助应急通信系统的有效和可比部署。
{"title":"A systematic literature review of emergency communications assisted by unnamed aerial vehicles","authors":"Isaac López-Villegas ,&nbsp;Erick Axel Martínez-Rios ,&nbsp;Javier Izquierdo-Reyes ,&nbsp;Rogelio Bustamante-Bello ,&nbsp;Francisco Falcone","doi":"10.1016/j.adhoc.2025.104063","DOIUrl":"10.1016/j.adhoc.2025.104063","url":null,"abstract":"<div><div>Reliable communication systems are critical during emergency scenarios such as floods, earthquakes, fires, and hurricanes to ensure timely information exchange and minimize damage. However, traditional communication infrastructure is often severely compromised during such events. Unmanned Aerial Vehicles (UAVs) have emerged as a promising solution to deploy temporary communication networks in disaster-affected areas. Although several studies have proposed architectures and deployment strategies for UAV-assisted communication, and reviews have addressed their potential, comprehensive discussions on protocol configurations, architectural considerations, and deployment parameter optimization remain limited. This paper presents a systematic literature review covering the period from 2014 to 2024, focusing on the use of UAVs in emergency communication systems. The reviewed articles are classified into a structured taxonomy according to the emergency scenario, UAV role, communication architecture, and protocol layer. Additionally, common communication parameters optimized for deployment, such as coverage and throughput, and the optimization methods employed, including heuristic and artificial intelligence techniques, are identified. The findings reveal that UAVs are predominantly deployed as aerial base stations for large-scale dynamic disasters, with protocol development focusing mainly on the physical, data link, and network layers. However, the lack of standardized deployment guidelines and limited real-world experimentation highlight a significant research gap. This review underscores the need for benchmark methodologies to support the effective and comparable deployment of UAV-assisted emergency communication systems.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"182 ","pages":"Article 104063"},"PeriodicalIF":4.8,"publicationDate":"2025-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145529374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scheduling and routing strategies for executing task graphs on ad hoc switched networks 在自组织交换网络上执行任务图的调度和路由策略
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-13 DOI: 10.1016/j.adhoc.2025.104084
Chhavi Chaudhary , Rudrajyoti Roy , Rajesh Devaraj , Arnab Sarkar
Modern Cyber–Physical Systems (CPSs) rely on sophisticated software applications, often modeled as Dependency-constrained Task Graphs (DTGs), to capture the intricate inter-dependencies among their functional components. Efficient scheduling of tasks and routing of inter-task messages over ad hoc switched network platforms remain significant challenges due to task precedence constraints, processing heterogeneity, and communication contention. To the best of our knowledge, no prior work in the literature has addressed the integrated scheduling of computation and communication for DTG-structured applications on ad hoc switched network platforms. This paper addresses this research gap by introducing a contention-aware task-message co-scheduling framework for heterogeneous ad hoc switched networks, offering a generic and scalable offline scheduling strategy. The proposed strategy, termed DSHSN (DTG Scheduler on Heterogeneous Switched Networks), is a list-based heuristic that jointly optimizes task allocation on heterogeneous end stations and message routing through intermediate switches while ensuring precedence preservation and contention-free communication. Extensive simulations using benchmark DTGs on diverse network topologies demonstrate that DSHSN consistently achieves up to 20% reduction in makespan in the best case (and 12% on average) compared to baseline strategies, validating its effectiveness and scalability for modern distributed embedded platforms such as Network-on-Chips (NoCs) and Time-Sensitive Networking (TSN).
现代信息物理系统(cps)依赖于复杂的软件应用程序,通常建模为依赖约束任务图(dtg),以捕获其功能组件之间复杂的相互依赖关系。由于任务优先级约束、处理异构性和通信争用,在自组织交换网络平台上有效地调度任务和路由任务间消息仍然是一个重大挑战。据我们所知,文献中没有先前的工作涉及在自组织交换网络平台上dtg结构应用程序的计算和通信的集成调度。本文通过引入一种异构自组织交换网络的竞争感知任务消息协同调度框架来解决这一研究空白,提供了一种通用的可扩展离线调度策略。所提出的策略称为DSHSN(异构交换网络上的DTG调度程序),是一种基于列表的启发式算法,它在保证优先级保留和无争用通信的同时,共同优化异构端站上的任务分配和通过中间交换机的消息路由。在不同网络拓扑上使用基准dgs进行的广泛模拟表明,与基线策略相比,DSHSN在最佳情况下(平均约为12%)始终可以将最大寿命减少20%,验证了其在现代分布式嵌入式平台(如片上网络(noc)和时间敏感网络(TSN))中的有效性和可扩展性。
{"title":"Scheduling and routing strategies for executing task graphs on ad hoc switched networks","authors":"Chhavi Chaudhary ,&nbsp;Rudrajyoti Roy ,&nbsp;Rajesh Devaraj ,&nbsp;Arnab Sarkar","doi":"10.1016/j.adhoc.2025.104084","DOIUrl":"10.1016/j.adhoc.2025.104084","url":null,"abstract":"<div><div>Modern Cyber–Physical Systems (<em>CPSs</em>) rely on sophisticated software applications, often modeled as Dependency-constrained Task Graphs (DTGs), to capture the intricate inter-dependencies among their functional components. Efficient scheduling of tasks and routing of inter-task messages over ad hoc switched network platforms remain significant challenges due to task precedence constraints, processing heterogeneity, and communication contention. To the best of our knowledge, no prior work in the literature has addressed the integrated scheduling of computation and communication for DTG-structured applications on ad hoc switched network platforms. This paper addresses this research gap by introducing a contention-aware task-message co-scheduling framework for heterogeneous ad hoc switched networks, offering a generic and scalable offline scheduling strategy. The proposed strategy, termed <em>DSHSN</em> (<em>DTG Scheduler on Heterogeneous Switched Networks</em>), is a list-based heuristic that jointly optimizes task allocation on heterogeneous end stations and message routing through intermediate switches while ensuring precedence preservation and contention-free communication. Extensive simulations using benchmark DTGs on diverse network topologies demonstrate that <em>DSHSN</em> consistently achieves up to <span><math><mo>∼</mo></math></span>20% reduction in makespan in the best case (and <span><math><mo>∼</mo></math></span>12% on average) compared to baseline strategies, validating its effectiveness and scalability for modern distributed embedded platforms such as Network-on-Chips (NoCs) and Time-Sensitive Networking (TSN).</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"182 ","pages":"Article 104084"},"PeriodicalIF":4.8,"publicationDate":"2025-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145529373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Next-generation MIMO empowered mobile edge computing: A comprehensive survey toward 6G systems 下一代MIMO支持移动边缘计算:对6G系统的全面调查
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-12 DOI: 10.1016/j.adhoc.2025.104095
Tien V. Thai , Mai T.P. Le , Hieu V. Nguyen , Oh-Soon Shin , Maria-Gabriella Di Benedetto
The integration of Mobile Edge Computing (MEC) with Next-Generation Multiple-Input Multiple-Output (NG-MIMO) technologies has emerged as a cornerstone of next-generation wireless networks, enabling low-latency, high-bandwidth, and computationally efficient applications.This survey offers a comprehensive, structured analysis of recent advancements, key applications, and pressing challenges at the MEC–NG-MIMO interface. We emphasize performance optimization—resource allocation, spectral and energy efficiency, latency, fairness, and scalability in MEC-aided NG-MIMO systems, and examine a spectrum of architectures including massive MIMO (mMIMO), cell-free mMIMO (CF-mMIMO)/user-centric CF-mMIMO, extremely large-scale MIMO (XL-MIMO), holographic MIMO (H-MIMO), and movable antennas (MA). Beyond fundamentals, we introduce architectural patterns (centralized, distributed, and hybrid) to clarify orchestration and control/data-plane design, and deepen the discussion of RIS-aided systems (phase optimization, CSI overhead) and XL-MIMO (near-field propagation, visibility regions). We further review the convergence with emerging technologies including UAVs, RIS, NOMA, SWIPT, energy harvesting, and AI/ML-driven optimization, highlighting joint communication-computation strategies that enhance coverage, efficiency, and robustness. Practical relevance is reinforced through empirical deployment insights and KPI–use-case mappings, including references to key standards and environmental/implementation constraints (synchronization, hardware impairments, power/cooling/backhaul). Finally, we identify open problems and research directions that are critical to realizing intelligent, adaptive, and energy-efficient MEC-aided NG-MIMO networks on the path to 6G.
移动边缘计算(MEC)与下一代多输入多输出(NG-MIMO)技术的集成已成为下一代无线网络的基石,可实现低延迟、高带宽和计算效率高的应用。本调查对MEC-NG-MIMO接口的最新进展、关键应用和紧迫挑战进行了全面、结构化的分析。我们强调了mec辅助的NG-MIMO系统的性能优化——资源分配、频谱和能源效率、延迟、公平性和可扩展性,并研究了一系列架构,包括大规模MIMO (mMIMO)、无蜂窝MIMO (CF-mMIMO)/以用户为中心的cf -MIMO、超大规模MIMO (XL-MIMO)、全息MIMO (H-MIMO)和可移动天线(MA)。除了基础之外,我们还介绍了架构模式(集中式、分布式和混合式)来澄清编排和控制/数据平面设计,并深化了对ris辅助系统(相位优化、CSI开销)和xml - mimo(近场传播、可见区域)的讨论。我们进一步回顾了与新兴技术的融合,包括无人机、RIS、NOMA、SWIPT、能量收集和人工智能/机器学习驱动的优化,强调了增强覆盖、效率和鲁棒性的联合通信计算策略。通过经验部署见解和kpi用例映射,包括对关键标准和环境/实现约束(同步、硬件缺陷、电源/冷却/回程)的引用,增强了实际相关性。最后,我们确定了在通往6G的道路上实现智能、自适应和节能的mec辅助NG-MIMO网络的关键开放性问题和研究方向。
{"title":"Next-generation MIMO empowered mobile edge computing: A comprehensive survey toward 6G systems","authors":"Tien V. Thai ,&nbsp;Mai T.P. Le ,&nbsp;Hieu V. Nguyen ,&nbsp;Oh-Soon Shin ,&nbsp;Maria-Gabriella Di Benedetto","doi":"10.1016/j.adhoc.2025.104095","DOIUrl":"10.1016/j.adhoc.2025.104095","url":null,"abstract":"<div><div>The integration of Mobile Edge Computing (MEC) with Next-Generation Multiple-Input Multiple-Output (NG-MIMO) technologies has emerged as a cornerstone of next-generation wireless networks, enabling low-latency, high-bandwidth, and computationally efficient applications.This survey offers a comprehensive, structured analysis of recent advancements, key applications, and pressing challenges at the MEC–NG-MIMO interface. We emphasize performance optimization—resource allocation, spectral and energy efficiency, latency, fairness, and scalability in MEC-aided NG-MIMO systems, and examine a spectrum of architectures including massive MIMO (mMIMO), cell-free mMIMO (CF-mMIMO)/user-centric CF-mMIMO, extremely large-scale MIMO (XL-MIMO), holographic MIMO (H-MIMO), and movable antennas (MA). Beyond fundamentals, we introduce architectural patterns (centralized, distributed, and hybrid) to clarify orchestration and control/data-plane design, and deepen the discussion of RIS-aided systems (phase optimization, CSI overhead) and XL-MIMO (near-field propagation, visibility regions). We further review the convergence with emerging technologies including UAVs, RIS, NOMA, SWIPT, energy harvesting, and AI/ML-driven optimization, highlighting joint communication-computation strategies that enhance coverage, efficiency, and robustness. Practical relevance is reinforced through empirical deployment insights and KPI–use-case mappings, including references to key standards and environmental/implementation constraints (synchronization, hardware impairments, power/cooling/backhaul). Finally, we identify open problems and research directions that are critical to realizing intelligent, adaptive, and energy-efficient MEC-aided NG-MIMO networks on the path to 6G.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"182 ","pages":"Article 104095"},"PeriodicalIF":4.8,"publicationDate":"2025-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145580101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BER vs SINR: Selection of a metric for physical interference models for flooding messaging and WSN recovery BER vs SINR:为泛洪消息传递和WSN恢复的物理干扰模型选择度量
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-11 DOI: 10.1016/j.adhoc.2025.104092
Vladimir Fedorenko , Irina Samoylenko , Vladimir Samoylenko
Ensuring the reliable delivery of alarm messages under emergency conditions is a critical challenge in wireless sensor networks (WSNs), particularly when employing flood transmission mode, as the simultaneous, unsynchronized broadcasting by multiple transmitters leads to mutual interference in channels. In the existing literature, the physical communication channel is typically evaluated using either the Signal-to-Interference-plus-Noise Ratio (SINR) or the Bit Error Rate (BER). However, the cumulative nature of SINR makes it impossible to discern the individual contribution of each node to the aggregate interference, while estimating BER through bit error counting requires significant time and computational resources. This article presents an analysis of the impact of mutual interference on both BER and SINR functions, aiming to facilitate their rational integration for optimizing message routing strategies. The proposed analytical model describes BER as a function of environmental parameters, including Signal-to-Noise Ratio (SNR), Interference-to-Noise Ratio (INR), Signal and Interference Orthogonality Coefficient (SIOC) and the Rician K-factor as signal fading depth. The algorithm for constructing rapid data routing with minimal relay nodes is based on estimates of packet loss rates with erroneous bits. Meanwhile, route segment lengths correspond to retransmission frequency thresholds—specifically, no more than two packet requests per segment. An optimized algorithm for the accelerated selection of backup node locations relies on branch-and-bound method. This methodology reduces the initial set of solution options by a factor of 3.5 in the presented example. For a priori uncertainty conditions regarding the Rician K-factor, we propose to select the backup node channel with the minimal BER based on indirect estimates of SNR and INR. The research significantly contributes to the development and application of interference-resistant WSNs in critical applications, such as emergency response and industrial monitoring systems.
确保在紧急情况下可靠地发送报警信息是无线传感器网络(wsn)面临的一个关键挑战,特别是当采用洪水传输模式时,因为多个发射机同时不同步广播会导致信道相互干扰。在现有文献中,物理通信信道通常使用信噪比(SINR)或误码率(BER)进行评估。然而,信噪比的累积特性使得无法辨别每个节点对总干扰的单独贡献,而通过误码计数估计误码率需要大量的时间和计算资源。本文分析了互干扰对BER和SINR功能的影响,旨在促进它们的合理集成,以优化消息路由策略。该分析模型将误码率描述为环境参数的函数,包括信噪比(SNR)、干扰噪声比(INR)、信号与干扰正交系数(SIOC)以及作为信号衰落深度的k因子。构建具有最小中继节点的快速数据路由的算法是基于对包含错误比特的丢包率的估计。同时,路由段长度与重传频率阈值相对应,即每个路由段不超过两个报文请求。一种基于分支定界法的备份节点加速选择优化算法。在本例中,该方法将解决方案选项的初始集减少了3.5倍。对于关于rick因子的先验不确定性条件,我们建议基于信噪比和INR的间接估计选择具有最小误码的备份节点信道。该研究对抗干扰无线传感器网络在应急响应和工业监控系统等关键应用领域的发展和应用具有重要意义。
{"title":"BER vs SINR: Selection of a metric for physical interference models for flooding messaging and WSN recovery","authors":"Vladimir Fedorenko ,&nbsp;Irina Samoylenko ,&nbsp;Vladimir Samoylenko","doi":"10.1016/j.adhoc.2025.104092","DOIUrl":"10.1016/j.adhoc.2025.104092","url":null,"abstract":"<div><div>Ensuring the reliable delivery of alarm messages under emergency conditions is a critical challenge in wireless sensor networks (WSNs), particularly when employing flood transmission mode, as the simultaneous, unsynchronized broadcasting by multiple transmitters leads to mutual interference in channels. In the existing literature, the physical communication channel is typically evaluated using either the Signal-to-Interference-plus-Noise Ratio (SINR) or the Bit Error Rate (BER). However, the cumulative nature of SINR makes it impossible to discern the individual contribution of each node to the aggregate interference, while estimating BER through bit error counting requires significant time and computational resources. This article presents an analysis of the impact of mutual interference on both BER and SINR functions, aiming to facilitate their rational integration for optimizing message routing strategies. The proposed analytical model describes BER as a function of environmental parameters, including Signal-to-Noise Ratio (SNR), Interference-to-Noise Ratio (INR), Signal and Interference Orthogonality Coefficient (SIOC) and the Rician K-factor as signal fading depth. The algorithm for constructing rapid data routing with minimal relay nodes is based on estimates of packet loss rates with erroneous bits. Meanwhile, route segment lengths correspond to retransmission frequency thresholds—specifically, no more than two packet requests per segment. An optimized algorithm for the accelerated selection of backup node locations relies on branch-and-bound method. This methodology reduces the initial set of solution options by a factor of 3.5 in the presented example. For a priori uncertainty conditions regarding the Rician K-factor, we propose to select the backup node channel with the minimal BER based on indirect estimates of SNR and INR. The research significantly contributes to the development and application of interference-resistant WSNs in critical applications, such as emergency response and industrial monitoring systems.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"182 ","pages":"Article 104092"},"PeriodicalIF":4.8,"publicationDate":"2025-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145580098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain for message dissemination in VANETs based on approval voting 区块链用于在vanet中基于批准投票的消息传播
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-11 DOI: 10.1016/j.adhoc.2025.104093
Zhiqiang Du , Siqi Zheng , Mengze Sun , Muhong Huang , Yanfang Fu , Xiaopeng Zhang , Wendong Zhang , Alwyn Hoffman
With the increasing deployment of Vehicular Ad Hoc Networks(VANETs) in intelligent transportation systems, the efficient dissemination of emergency event messages has become a critical issue for enhancing traffic safety and emergency response capabilities. This paper proposes an emergency message dissemination approach based on an approval voting mechanism, aiming to improve the efficiency and reliability of message propagation through multi-hop transmission and relay node selection strategies. Furthermore, the proposed scheme quantifies the behavioral credibility of nodes through a reputation incentive mechanism, which can effectively enhance the reliability of information dissemination. Experiments comparing the proposed scheme to traditional reputation-based relay node selection methods show it outperforms classic methods in message delivery success, propagation latency, and network stability, achieving a minimum propagation delay of 183 ms with 100 nodes. The paper shows that different relay node strategies have varying impacts on information dissemination, with the satisfaction-based approach capable of improving efficiency.
随着车辆自组织网络(vanet)在智能交通系统中的应用越来越多,如何有效地传播突发事件信息已成为提高交通安全和应急响应能力的关键问题。本文提出了一种基于批准投票机制的应急消息传播方法,旨在通过多跳传输和中继节点选择策略提高消息传播的效率和可靠性。此外,该方案通过声誉激励机制量化节点的行为可信度,有效提高了信息传播的可靠性。与传统的基于声誉的中继节点选择方法进行对比实验表明,该方案在消息传递成功率、传播延迟和网络稳定性方面都优于经典方法,在100个节点下的最小传播延迟为183 ms。研究表明,不同中继节点策略对信息传播的影响是不同的,基于满意度的中继节点策略能够提高信息传播的效率。
{"title":"Blockchain for message dissemination in VANETs based on approval voting","authors":"Zhiqiang Du ,&nbsp;Siqi Zheng ,&nbsp;Mengze Sun ,&nbsp;Muhong Huang ,&nbsp;Yanfang Fu ,&nbsp;Xiaopeng Zhang ,&nbsp;Wendong Zhang ,&nbsp;Alwyn Hoffman","doi":"10.1016/j.adhoc.2025.104093","DOIUrl":"10.1016/j.adhoc.2025.104093","url":null,"abstract":"<div><div>With the increasing deployment of Vehicular Ad Hoc Networks(VANETs) in intelligent transportation systems, the efficient dissemination of emergency event messages has become a critical issue for enhancing traffic safety and emergency response capabilities. This paper proposes an emergency message dissemination approach based on an approval voting mechanism, aiming to improve the efficiency and reliability of message propagation through multi-hop transmission and relay node selection strategies. Furthermore, the proposed scheme quantifies the behavioral credibility of nodes through a reputation incentive mechanism, which can effectively enhance the reliability of information dissemination. Experiments comparing the proposed scheme to traditional reputation-based relay node selection methods show it outperforms classic methods in message delivery success, propagation latency, and network stability, achieving a minimum propagation delay of 183 ms with 100 nodes. The paper shows that different relay node strategies have varying impacts on information dissemination, with the satisfaction-based approach capable of improving efficiency.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"182 ","pages":"Article 104093"},"PeriodicalIF":4.8,"publicationDate":"2025-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145529375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transfer function-guided mixed-variable optimization for joint mining decisions and resource allocation in mobile edge computing-integrated blockchain networks 移动边缘计算集成区块链网络联合挖掘决策与资源分配的传递函数引导混合变量优化
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-07 DOI: 10.1016/j.adhoc.2025.104088
Mohamed Abdel-Basset , Reda Mohamed , Karam M. Sallam , Saber Elsayed
Recently, mobile edge computing (MEC) technology has been integrated with wireless blockchain networks to improve the computational capabilities of Internet of Things devices during the mining process. Jointly, optimizing miner selection (discrete) and resource allocation (continuous) in MEC-integrated blockchain networks is a challenging mixed-variable, NP-hard problem. Although several algorithms have been presented in the literature to solve it, they still suffer from low-quality results due to either slow convergence speed, local optima stagnation, or both, especially for small or medium problem sizes. To address this, we propose a transfer-function-guided encoding (TFE) framework that introduces a principled link between continuous metaheuristic search and discrete miner-operator control. Specifically, each individual maintains one discrete control variable determining insertion, deletion, or replacement of a miner and two continuous controls representing transmission power and computing resource allocation. Continuous metaheuristic outputs are converted to discrete decisions through families of S-shaped and V-shaped transfer functions, providing tunable exploration–exploitation balance and probabilistic control over operator selection. This mechanism is integrated with several state-of-the-art algorithms. Extensive experiments on MEC-blockchain networks with m[50,1000] miners demonstrate that TFE consistently accelerates convergence and improves system profit for small–medium scales, with HNOA-TFE achieving the best overall performance. The numerical results show that the hybrid nutcracker optimization algorithm with the TFE mechanism is effective across most problem instances. Also, the comparative study with recent MEC/blockchain resource-allocation and vehicular-edge benchmarks shows the robustness and scalability of the proposed method.
最近,移动边缘计算(MEC)技术与无线区块链网络相结合,以提高物联网设备在采矿过程中的计算能力。在mec集成区块链网络中,优化矿工选择(离散)和资源分配(连续)是一个具有挑战性的混合变量np困难问题。虽然文献中已经提出了几种算法来解决它,但由于收敛速度慢,局部最优停滞或两者兼而有之,它们仍然遭受低质量结果的困扰,特别是对于中小型问题规模。为了解决这个问题,我们提出了一个传递函数引导编码(TFE)框架,该框架在连续元启发式搜索和离散矿工算子控制之间引入了原则性的联系。具体来说,每个个体维护一个离散控制变量,决定插入、删除或替换一个矿工,以及两个连续控制变量,代表传输功率和计算资源分配。连续的元启发式输出通过s形和v形传递函数族转换为离散决策,提供可调的勘探-开采平衡和对操作员选择的概率控制。该机制集成了几种最先进的算法。在m∈[50,1000]矿工的mec -区块链网络上进行的大量实验表明,TFE持续加速收敛并提高中小型规模的系统利润,其中HNOA-TFE实现了最佳的整体性能。数值结果表明,结合TFE机制的混合胡桃夹子优化算法在大多数情况下都是有效的。此外,与最近的MEC/区块链资源分配和车辆边缘基准测试的比较研究表明了该方法的鲁棒性和可扩展性。
{"title":"Transfer function-guided mixed-variable optimization for joint mining decisions and resource allocation in mobile edge computing-integrated blockchain networks","authors":"Mohamed Abdel-Basset ,&nbsp;Reda Mohamed ,&nbsp;Karam M. Sallam ,&nbsp;Saber Elsayed","doi":"10.1016/j.adhoc.2025.104088","DOIUrl":"10.1016/j.adhoc.2025.104088","url":null,"abstract":"<div><div>Recently, mobile edge computing (MEC) technology has been integrated with wireless blockchain networks to improve the computational capabilities of Internet of Things devices during the mining process. Jointly, optimizing miner selection (discrete) and resource allocation (continuous) in MEC-integrated blockchain networks is a challenging mixed-variable, NP-hard problem. Although several algorithms have been presented in the literature to solve it, they still suffer from low-quality results due to either slow convergence speed, local optima stagnation, or both, especially for small or medium problem sizes. To address this, we propose a transfer-function-guided encoding (TFE) framework that introduces a principled link between continuous metaheuristic search and discrete miner-operator control. Specifically, each individual maintains one discrete control variable determining insertion, deletion, or replacement of a miner and two continuous controls representing transmission power and computing resource allocation. Continuous metaheuristic outputs are converted to discrete decisions through families of S-shaped and V-shaped transfer functions, providing tunable exploration–exploitation balance and probabilistic control over operator selection. This mechanism is integrated with several state-of-the-art algorithms. Extensive experiments on MEC-blockchain networks with <span><math><mrow><mi>m</mi><mspace></mspace><mo>∈</mo><mspace></mspace><mrow><mo>[</mo><mn>50</mn><mo>,</mo><mn>1000</mn><mo>]</mo></mrow></mrow></math></span> miners demonstrate that TFE consistently accelerates convergence and improves system profit for small–medium scales, with HNOA-TFE achieving the best overall performance. The numerical results show that the hybrid nutcracker optimization algorithm with the TFE mechanism is effective across most problem instances. Also, the comparative study with recent MEC/blockchain resource-allocation and vehicular-edge benchmarks shows the robustness and scalability of the proposed method.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"181 ","pages":"Article 104088"},"PeriodicalIF":4.8,"publicationDate":"2025-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145468556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Location-based early detection and prevention of DDoS attacks in mMTC networks mMTC网络中基于位置的DDoS攻击早期检测与防范
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-06 DOI: 10.1016/j.adhoc.2025.104090
Zeinab Rezaeifar , Zahra Alavikia , Changhee Hahn
The Random Access (RA) procedure of the current 3GPP cellular network has been adopted for small data packet transmissions by massive Machine Type Communication Devices (MTCDs). However, the initial steps of the RA procedure lack an authentication mechanism, making it susceptible to Distributed Denial of Service (DDoS) attacks, particularly in massive access scenarios. In these cases, attackers can hide among a large number of legitimate stationary devices with limited processing capabilities, such as installed sensors or smart meters. To address this issue, this paper proposes an early DDoS attack detection and prevention method that leverages the Timing Advance (TA) information from stationary MTCDs. The proposed method detects the approximate location of malicious devices sending consecutive preamble codes and blocks them by withholding Resource Blocks (RBs) during the RA procedure. Numerical results from a simulated Physical Random Access Channel (PRACH) for Machine Type Communications (MTC), considering noise and multipath effects, demonstrate the effectiveness of the proposed method in detecting and mitigating DDoS attacks. Under intense attack scenarios, the proposed method effectively identifies network attackers while reducing RA delay and RB consumption for MTCDs by approximately 50% compared to the baseline. This improvement enhances overall network performance and sustainability.
当前3GPP蜂窝网络采用随机存取(RA)程序进行大规模机型通信设备(mtcd)的小数据包传输。然而,RA过程的初始步骤缺乏身份验证机制,使其容易受到分布式拒绝服务(DDoS)攻击,特别是在大规模访问场景中。在这些情况下,攻击者可以隐藏在大量处理能力有限的合法固定设备中,例如安装的传感器或智能电表。为了解决这一问题,本文提出了一种利用静止mtcd的时序提前(TA)信息的早期DDoS攻击检测和预防方法。提出的方法检测发送连续前导码的恶意设备的大致位置,并在RA过程中通过扣留资源块(Resource block, RBs)来阻止它们。在考虑噪声和多径影响的情况下,模拟机器类型通信(MTC)的物理随机接入信道(PRACH)的数值结果证明了该方法在检测和减轻DDoS攻击方面的有效性。在激烈的攻击场景下,该方法有效地识别网络攻击者,同时将mtcd的RA延迟和RB消耗与基线相比减少了约50%。这种改进提高了整体网络性能和可持续性。
{"title":"Location-based early detection and prevention of DDoS attacks in mMTC networks","authors":"Zeinab Rezaeifar ,&nbsp;Zahra Alavikia ,&nbsp;Changhee Hahn","doi":"10.1016/j.adhoc.2025.104090","DOIUrl":"10.1016/j.adhoc.2025.104090","url":null,"abstract":"<div><div>The Random Access (RA) procedure of the current 3GPP cellular network has been adopted for small data packet transmissions by massive Machine Type Communication Devices (MTCDs). However, the initial steps of the RA procedure lack an authentication mechanism, making it susceptible to Distributed Denial of Service (DDoS) attacks, particularly in massive access scenarios. In these cases, attackers can hide among a large number of legitimate stationary devices with limited processing capabilities, such as installed sensors or smart meters. To address this issue, this paper proposes an early DDoS attack detection and prevention method that leverages the Timing Advance (TA) information from stationary MTCDs. The proposed method detects the approximate location of malicious devices sending consecutive preamble codes and blocks them by withholding Resource Blocks (RBs) during the RA procedure. Numerical results from a simulated Physical Random Access Channel (PRACH) for Machine Type Communications (MTC), considering noise and multipath effects, demonstrate the effectiveness of the proposed method in detecting and mitigating DDoS attacks. Under intense attack scenarios, the proposed method effectively identifies network attackers while reducing RA delay and RB consumption for MTCDs by approximately 50% compared to the baseline. This improvement enhances overall network performance and sustainability.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"181 ","pages":"Article 104090"},"PeriodicalIF":4.8,"publicationDate":"2025-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145468553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Ad Hoc Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1