首页 > 最新文献

Ad Hoc Networks最新文献

英文 中文
Towards sustainable industry 4.0: A survey on greening IoE in 6G networks 迈向可持续的工业 4.0:6G 网络中的绿色物联网调查
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1016/j.adhoc.2024.103610
Saeed Hamood Alsamhi , Ammar Hawbani , Radhya Sahal , Sumit Srivastava , Santosh Kumar , Liang Zhao , Mohammed A.A. Al-qaness , Jahan Hassan , Mohsen Guizani , Edward Curry

The dramatic recent increase of the smart Internet of Everything (IoE) in Industry 4.0 has significantly increased energy consumption, carbon emissions, and global warming. IoE applications in Industry 4.0 face many challenges, including energy efficiency, heterogeneity, security, interoperability, and centralization. Therefore, Industry 4.0 in Beyond the Sixth-Generation (6G) networks demands moving to sustainable, green IoE and identifying efficient and emerging technologies to overcome sustainability challenges. Many advanced technologies and strategies efficiently solve issues by enhancing connectivity, interoperability, security, decentralization, and reliability. Greening IoE is a promising approach that focuses on improving energy efficiency, providing a high Quality of Service (QoS), and reducing carbon emissions to enhance the quality of life at a low cost. This survey provides a comprehensive overview of how advanced technologies can contribute to green IoE in the 6G network of Industry 4.0 applications. This survey provides a comprehensive overview of advanced technologies, including Blockchain, Digital Twins (DTs), Unmanned Aerial Vehicles (UAVs, a.k.a. drones), and Machine Learning (ML), to improve connectivity, QoS, and energy efficiency for green IoE in 6G networks. We evaluate the capability of each technology in greening IoE in Industry 4.0 applications and analyse the challenges and opportunities to make IoE greener using the discussed technologies.

最近,工业 4.0 中智能万物互联(IoE)的急剧增加大大增加了能源消耗、碳排放和全球变暖。工业 4.0 中的 IoE 应用面临许多挑战,包括能效、异构性、安全性、互操作性和集中化。因此,超越第六代(6G)网络的工业 4.0 要求转向可持续的绿色物联网,并确定高效的新兴技术来克服可持续性挑战。许多先进技术和战略通过增强连接性、互操作性、安全性、分散性和可靠性,有效地解决了各种问题。绿色物联网是一种前景广阔的方法,其重点是提高能源效率、提供高质量服务(QoS)和减少碳排放,从而以低成本提高生活质量。本调查全面概述了先进技术如何在工业 4.0 应用的 6G 网络中为绿色物联网做出贡献。本调查全面概述了先进技术,包括区块链、数字孪生(DTs)、无人机(UAVs,又称无人机)和机器学习(ML),以提高 6G 网络中绿色物联网的连接性、服务质量和能效。我们评估了每种技术在工业 4.0 应用中实现绿色物联网的能力,并分析了使用所讨论的技术使物联网更加绿色所面临的挑战和机遇。
{"title":"Towards sustainable industry 4.0: A survey on greening IoE in 6G networks","authors":"Saeed Hamood Alsamhi ,&nbsp;Ammar Hawbani ,&nbsp;Radhya Sahal ,&nbsp;Sumit Srivastava ,&nbsp;Santosh Kumar ,&nbsp;Liang Zhao ,&nbsp;Mohammed A.A. Al-qaness ,&nbsp;Jahan Hassan ,&nbsp;Mohsen Guizani ,&nbsp;Edward Curry","doi":"10.1016/j.adhoc.2024.103610","DOIUrl":"10.1016/j.adhoc.2024.103610","url":null,"abstract":"<div><p>The dramatic recent increase of the smart Internet of Everything (IoE) in Industry 4.0 has significantly increased energy consumption, carbon emissions, and global warming. IoE applications in Industry 4.0 face many challenges, including energy efficiency, heterogeneity, security, interoperability, and centralization. Therefore, Industry 4.0 in Beyond the Sixth-Generation (6G) networks demands moving to sustainable, green IoE and identifying efficient and emerging technologies to overcome sustainability challenges. Many advanced technologies and strategies efficiently solve issues by enhancing connectivity, interoperability, security, decentralization, and reliability. Greening IoE is a promising approach that focuses on improving energy efficiency, providing a high Quality of Service (QoS), and reducing carbon emissions to enhance the quality of life at a low cost. This survey provides a comprehensive overview of how advanced technologies can contribute to green IoE in the 6G network of Industry 4.0 applications. This survey provides a comprehensive overview of advanced technologies, including Blockchain, Digital Twins (DTs), Unmanned Aerial Vehicles (UAVs, a.k.a. drones), and Machine Learning (ML), to improve connectivity, QoS, and energy efficiency for green IoE in 6G networks. We evaluate the capability of each technology in greening IoE in Industry 4.0 applications and analyse the challenges and opportunities to make IoE greener using the discussed technologies.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"165 ","pages":"Article 103610"},"PeriodicalIF":4.4,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S157087052400221X/pdfft?md5=4458c1f0b4d6c5d5d72267474fa6aea4&pid=1-s2.0-S157087052400221X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint differential evolution algorithm in RIS-assisted multi-UAV IoT data collection system RIS 辅助多无人机物联网数据采集系统中的联合差分进化算法
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1016/j.adhoc.2024.103640
Yuchen Li , Hongwei Ding , Zhuguan Liang , Bo Li , Zhijun Yang

This paper investigates a Reconfigurable Intelligent Surface (RIS)-assisted multi-UAV data collection system, in which unmanned aerial vehicles (UAVs) collect data from Internet of Things (IoT) devices. The RIS, mounted on building surfaces, plays a vital role in preventing obstruction and improving the communication quality of the IoT-UAV transmission link. Our aim is to minimize the energy consumption of this system, including the transmission energy consumption of IoT devices and the hovering energy consumption of UAVs, by optimizing the deployment of UAVs and the phase shifts of RIS. To achieve this goal, a multi-UAV deployment and phase shift of RIS optimization algorithm (MUDPRA) is proposed that consists of two phases. In the first phase, a joint differential evolution (DE) algorithm with a two-layer structure featuring a variable population size, namely DEC-ADDE, is proposed to optimize the UAV deployment. Specifically, each UAV’s location is encoded as an individual, with the whole UAV deployment is considered as the population in DEC-ADDE. Thus, a differential evolution clustering (DEC) algorithm is employed initially to initialize the population, which allows for obtaining better initial UAV deployment without the need for a predefined number of UAVs. Subsequently, an adaptive and dynamic DE algorithm (ADDE) is employed to produce offspring population to further optimize UAV deployment. Finally, an adaptive updating strategy is adopted to adjust the population size to optimize the number of UAVs. In the second phase, a low-complexity method is proposed to optimize the phase shift of RIS with the aim of enhancing the IoT-UAV data transmission rate. Experimental results conducted on eight instances involving IoT devices ranging from 60 to 200 demonstrate the effectiveness of MUDPRA in minimizing energy consumption of this system compared to six alternative algorithms and three benchmark systems.

本文研究了可重构智能表面(RIS)辅助多无人机数据收集系统,其中无人机(UAV)从物联网(IoT)设备收集数据。安装在建筑物表面的可调节表面(RIS)在防止阻塞和提高物联网-无人机传输链路的通信质量方面发挥着至关重要的作用。我们的目标是通过优化无人机的部署和 RIS 的相移,最大限度地降低该系统的能耗,包括物联网设备的传输能耗和无人机的悬停能耗。为实现这一目标,提出了一种多无人机部署和 RIS 相移优化算法(MUDPRA),该算法由两个阶段组成。在第一阶段,提出了一种具有双层结构、种群规模可变的联合微分进化(DE)算法,即 DEC-ADDE,用于优化无人机部署。具体来说,在 DEC-ADDE 中,每个无人机的位置被编码为一个个体,而整个无人机部署被视为一个群体。因此,最初采用差分进化聚类(DEC)算法对种群进行初始化,这样就可以获得较好的无人机初始部署,而无需预先确定无人机的数量。随后,采用自适应动态演化算法(ADDE)产生子代群体,进一步优化无人机部署。最后,采用自适应更新策略调整种群规模,优化无人机数量。在第二阶段,提出了一种低复杂度方法来优化 RIS 的相移,以提高物联网-无人机数据传输速率。在涉及 60 到 200 个物联网设备的 8 个实例上进行的实验结果表明,与 6 种替代算法和 3 个基准系统相比,MUDPRA 能够有效地将该系统的能耗降至最低。
{"title":"Joint differential evolution algorithm in RIS-assisted multi-UAV IoT data collection system","authors":"Yuchen Li ,&nbsp;Hongwei Ding ,&nbsp;Zhuguan Liang ,&nbsp;Bo Li ,&nbsp;Zhijun Yang","doi":"10.1016/j.adhoc.2024.103640","DOIUrl":"10.1016/j.adhoc.2024.103640","url":null,"abstract":"<div><p>This paper investigates a Reconfigurable Intelligent Surface (RIS)-assisted multi-UAV data collection system, in which unmanned aerial vehicles (UAVs) collect data from Internet of Things (IoT) devices. The RIS, mounted on building surfaces, plays a vital role in preventing obstruction and improving the communication quality of the IoT-UAV transmission link. Our aim is to minimize the energy consumption of this system, including the transmission energy consumption of IoT devices and the hovering energy consumption of UAVs, by optimizing the deployment of UAVs and the phase shifts of RIS. To achieve this goal, a multi-UAV deployment and phase shift of RIS optimization algorithm (MUDPRA) is proposed that consists of two phases. In the first phase, a joint differential evolution (DE) algorithm with a two-layer structure featuring a variable population size, namely DEC-ADDE, is proposed to optimize the UAV deployment. Specifically, each UAV’s location is encoded as an individual, with the whole UAV deployment is considered as the population in DEC-ADDE. Thus, a differential evolution clustering (DEC) algorithm is employed initially to initialize the population, which allows for obtaining better initial UAV deployment without the need for a predefined number of UAVs. Subsequently, an adaptive and dynamic DE algorithm (ADDE) is employed to produce offspring population to further optimize UAV deployment. Finally, an adaptive updating strategy is adopted to adjust the population size to optimize the number of UAVs. In the second phase, a low-complexity method is proposed to optimize the phase shift of RIS with the aim of enhancing the IoT-UAV data transmission rate. Experimental results conducted on eight instances involving IoT devices ranging from 60 to 200 demonstrate the effectiveness of MUDPRA in minimizing energy consumption of this system compared to six alternative algorithms and three benchmark systems.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103640"},"PeriodicalIF":4.4,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142096629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on security of UAV and deep reinforcement learning 无人机安全与深度强化学习调查
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1016/j.adhoc.2024.103642
Burcu Sönmez Sarıkaya, Şerif Bahtiyar

Recently, the use of unmanned aerial vehicles (UAV)s for accomplishing various tasks has gained a significant interest from both civilian and military organizations due to their adaptive, autonomous, and flexibility nature in different environments. The characteristics of UAV systems introduce new threats from which cyber attacks may benefit. Adaptive security solutions for UAVs are required to counter the growing threat surface. The security of UAV systems has therefore become one of the fastest growing research topics. Machine learning based security mechanisms have a potential to provide effective countermeasures that complement traditional security mechanisms. The main motivation of this survey is to the lack of a comprehensive literature review about reinforcement learning based security solutions for UAV systems. In this paper, we present a comprehensive review on the security of UAV systems focusing on deep-reinforcement learning-based security solutions. We present a general architecture of an UAV system that includes communication systems to show potential sources of vulnerabilities. Then, the threat surface of UAV systems is explored. We explain attacks on UAV systems according to the threats in a systematic way. In addition, we present countermeasures in the literature for each attack on UAVs. Furthermore, traditional defense mechanisms are explained to highlight requirements for reinforcement based security solutions on UAVs. Next, we present the main reinforcement algorithms. We examine security solutions with reinforcement learning algorithms and their limitations in a holistic approach. We also identify research challenges about reinforcement based security solutions on UAVs. Briefly, this survey provides key guidelines on UAV systems, threats, attacks, reinforcement learning algorithms, the security of UAV systems, and research challenges.

最近,由于无人驾驶飞行器(UAV)在不同环境中的适应性、自主性和灵活性,利用无人驾驶飞行器完成各种任务的做法受到了民用和军用组织的极大关注。无人机系统的特点带来了新的威胁,网络攻击可能从中受益。需要为无人机提供自适应安全解决方案,以应对日益增长的威胁。因此,无人机系统的安全性已成为发展最快的研究课题之一。基于机器学习的安全机制有可能提供有效的应对措施,对传统安全机制进行补充。这项调查的主要动机是缺乏有关基于强化学习的无人机系统安全解决方案的全面文献综述。在本文中,我们对无人机系统的安全性进行了全面综述,重点关注基于深度强化学习的安全解决方案。我们介绍了包括通信系统在内的无人机系统的一般架构,以显示潜在的漏洞来源。然后,探讨了无人机系统的威胁面。我们根据威胁系统地解释了对无人机系统的攻击。此外,我们还介绍了针对无人机的每种攻击的文献对策。此外,我们还解释了传统的防御机制,以强调无人机对基于强化的安全解决方案的需求。接下来,我们将介绍主要的强化算法。我们从整体上研究了强化学习算法的安全解决方案及其局限性。我们还确定了无人机上基于强化的安全解决方案所面临的研究挑战。简而言之,本调查报告提供了有关无人机系统、威胁、攻击、强化学习算法、无人机系统安全和研究挑战的关键指南。
{"title":"A survey on security of UAV and deep reinforcement learning","authors":"Burcu Sönmez Sarıkaya,&nbsp;Şerif Bahtiyar","doi":"10.1016/j.adhoc.2024.103642","DOIUrl":"10.1016/j.adhoc.2024.103642","url":null,"abstract":"<div><p>Recently, the use of unmanned aerial vehicles (UAV)s for accomplishing various tasks has gained a significant interest from both civilian and military organizations due to their adaptive, autonomous, and flexibility nature in different environments. The characteristics of UAV systems introduce new threats from which cyber attacks may benefit. Adaptive security solutions for UAVs are required to counter the growing threat surface. The security of UAV systems has therefore become one of the fastest growing research topics. Machine learning based security mechanisms have a potential to provide effective countermeasures that complement traditional security mechanisms. The main motivation of this survey is to the lack of a comprehensive literature review about reinforcement learning based security solutions for UAV systems. In this paper, we present a comprehensive review on the security of UAV systems focusing on deep-reinforcement learning-based security solutions. We present a general architecture of an UAV system that includes communication systems to show potential sources of vulnerabilities. Then, the threat surface of UAV systems is explored. We explain attacks on UAV systems according to the threats in a systematic way. In addition, we present countermeasures in the literature for each attack on UAVs. Furthermore, traditional defense mechanisms are explained to highlight requirements for reinforcement based security solutions on UAVs. Next, we present the main reinforcement algorithms. We examine security solutions with reinforcement learning algorithms and their limitations in a holistic approach. We also identify research challenges about reinforcement based security solutions on UAVs. Briefly, this survey provides key guidelines on UAV systems, threats, attacks, reinforcement learning algorithms, the security of UAV systems, and research challenges.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103642"},"PeriodicalIF":4.4,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142096624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FIDWATCH: Federated incremental distillation for continuous monitoring of IoT security threats FIDWATCH:用于持续监控物联网安全威胁的联合增量提炼技术
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-27 DOI: 10.1016/j.adhoc.2024.103637
Ibrahim Alrashdi , Karam M. Sallam , Majed Abdullah Alrowaily , Omar Alruwaili , Bilal Arain

The fast evolutions of Internet of Things (IoT) technologies have been accelerating their applicability in different sectors of life and becoming a pillar for sustainable development. However, this revolutionary expansion led to a substantial increase in attack surface, raising many concerns about security threats and their possible consequences. Machine learning has significantly contributed to designing intrusion detection systems (IDS) but suffers from critical limitations such as data privacy and sovereignty, data imbalance, concept drift, and catastrophic forgetting. This collectively makes existing IDSs an improper choice for securing IoT environments. This paper presents a federated learning approach called FIDWATCH to continuously monitor and detect a broad range of IoT security threats. The local side of FIDWATCH introduces contrastive focal loss to enhance the ability of the local model (teacher) to discriminate between diverse types of IoT security threats while putting an increased emphasis on hard-to-classify samples. A fine-grained Knowledge Distillation (KD) is introduced to allow the client to distill the required teacher's knowledge into a lighter, more compact model termed the pupil model. This greatly assists the competence and flexibility of the model in resource-constrained scenarios. Furthermore, an adaptive incremental updating method is introduced in FIDWATCH to allow the global model to exploit the distilled knowledge and refine the shared dataset. This helps generate global anchors for improving the robustness of the mode against the distributional shift, thereby improving model alignment and compliance with the dynamics of IoT security threats. Proof-of-concept simulations are performed on data from two public datasets (BoT-IoT and ToN-IoT), demonstrating the superiority of FIDWATCH over cutting-edge performance with an average f1-score of 97.07% and 95.63%, respectively.

物联网(IoT)技术的快速发展加速了其在不同生活领域的应用,并成为可持续发展的支柱。然而,这种革命性的扩展导致攻击面大幅增加,引发了许多对安全威胁及其可能后果的担忧。机器学习为入侵检测系统(IDS)的设计做出了巨大贡献,但也存在一些严重的局限性,如数据隐私和主权、数据不平衡、概念漂移和灾难性遗忘。这一切都使得现有的 IDS 成为保护物联网环境安全的不当选择。本文提出了一种名为 FIDWATCH 的联合学习方法,用于持续监控和检测各种物联网安全威胁。FIDWATCH 的本地端引入了对比焦点损失,以增强本地模型(教师)区分不同类型物联网安全威胁的能力,同时更加重视难以分类的样本。引入了细粒度的知识蒸馏(KD),允许客户端将所需的教师知识蒸馏为更轻、更紧凑的模型(称为学生模型)。这大大提高了模型在资源受限情况下的能力和灵活性。此外,FIDWATCH 还引入了一种自适应增量更新方法,允许全局模型利用已提炼的知识并完善共享数据集。这有助于生成全局锚点,提高模式对分布变化的稳健性,从而改善模式的一致性并符合物联网安全威胁的动态变化。我们在两个公共数据集(BoT-IoT 和 ToN-IoT)的数据上进行了概念验证模拟,结果表明 FIDWATCH 优于尖端性能,平均 f1 分数分别为 97.07% 和 95.63%。
{"title":"FIDWATCH: Federated incremental distillation for continuous monitoring of IoT security threats","authors":"Ibrahim Alrashdi ,&nbsp;Karam M. Sallam ,&nbsp;Majed Abdullah Alrowaily ,&nbsp;Omar Alruwaili ,&nbsp;Bilal Arain","doi":"10.1016/j.adhoc.2024.103637","DOIUrl":"10.1016/j.adhoc.2024.103637","url":null,"abstract":"<div><p>The fast evolutions of Internet of Things (IoT) technologies have been accelerating their applicability in different sectors of life and becoming a pillar for sustainable development. However, this revolutionary expansion led to a substantial increase in attack surface, raising many concerns about security threats and their possible consequences. Machine learning has significantly contributed to designing intrusion detection systems (IDS) but suffers from critical limitations such as data privacy and sovereignty, data imbalance, concept drift, and catastrophic forgetting. This collectively makes existing IDSs an improper choice for securing IoT environments. This paper presents a federated learning approach called FIDWATCH to continuously monitor and detect a broad range of IoT security threats. The local side of FIDWATCH introduces contrastive focal loss to enhance the ability of the local model (teacher) to discriminate between diverse types of IoT security threats while putting an increased emphasis on hard-to-classify samples. A fine-grained Knowledge Distillation (KD) is introduced to allow the client to distill the required teacher's knowledge into a lighter, more compact model termed the pupil model. This greatly assists the competence and flexibility of the model in resource-constrained scenarios. Furthermore, an adaptive incremental updating method is introduced in FIDWATCH to allow the global model to exploit the distilled knowledge and refine the shared dataset. This helps generate global anchors for improving the robustness of the mode against the distributional shift, thereby improving model alignment and compliance with the dynamics of IoT security threats. Proof-of-concept simulations are performed on data from two public datasets (BoT-IoT and ToN-IoT), demonstrating the superiority of FIDWATCH over cutting-edge performance with an average f1-score of 97.07% and 95.63%, respectively.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"165 ","pages":"Article 103637"},"PeriodicalIF":4.4,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142129049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shared secret key extraction from atmospheric optical wireless channels with multi-scale information reconciliation 利用多尺度信息调和从大气光学无线信道中提取共享密钥
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-26 DOI: 10.1016/j.adhoc.2024.103638
Gang Pan , Chunyi Chen , Haifeng Yao , Xiaolong Ni , Xiaojuan Hu , Haiyang Yu , Qiong Li

Due to the impact of turbulence, atmospheric optical wireless channel exhibits characteristics such as time-varying, space-varying and natural randomness, which can be used as a common natural random source for shared secret key extraction. Wireless laser communication technology boasts advantages like high bandwidth and fast transmission, which is conducive to improving key generation rate. Additionally, the strong anti-interference of laser signal helps to reduce key disagreement rate. Moreover, the laser beam’s good directionality effectively decreases the risk of eavesdropping on key information. Given its advantages and a scarcity of research in this regard, this paper proposes a scheme of shared secret key extraction from atmospheric optical wireless channels with multi-scale information reconciliation. In the scheme, to increase the cross-correlation coefficient of signal samples at the two legitimate parties, a preprocessing algorithm is designed based on a denoising algorithm and a threshold-based outliers elimination algorithm, and the denoising algorithm is inspired by the Complete Ensemble Empirical Mode Decomposition with Adaptive Noise (CEEMDan); moreover, a multi-level quantization algorithm based on Equilibrium-Optimizer(EO) is developed to balance and optimize distribution of sample points in the sample space; furthermore, to simplify the process of and decrease the computational complexity of information reconciliation, a concept of a multi-scale information reconciliation is formed, on the basis of which three algorithms, B-MSIR, I-MSIR and C-MSIR, are formulated. Finally, its performance is verified by numerical simulations and experiments, and the results show it has better performance in terms of the key disagreement rate, the key generation rate and the key randomness compared with several state-of-the-art algorithms.

由于湍流的影响,大气光学无线信道具有时变、空变和自然随机等特性,可作为共享密钥提取的通用自然随机源。无线激光通信技术具有带宽高、传输速度快等优点,有利于提高密钥生成率。此外,激光信号的抗干扰性强,有助于降低密钥分歧率。此外,激光束的指向性好,能有效降低密钥信息被窃听的风险。鉴于其优势和这方面研究的稀缺性,本文提出了一种多尺度信息调和的大气光无线信道共享密钥提取方案。在该方案中,为了提高合法双方信号样本的交叉相关系数,设计了一种基于去噪算法和基于阈值的异常值消除算法的预处理算法,其中去噪算法借鉴了带自适应噪声的完全集合经验模式分解(CEEMDan);此外,为了简化信息调和过程并降低计算复杂度,提出了多尺度信息调和的概念,并在此基础上提出了 B-MSIR、I-MSIR 和 C-MSIR 三种算法。最后,通过数值模拟和实验验证了该算法的性能,结果表明,与几种最先进的算法相比,该算法在密钥分歧率、密钥生成率和密钥随机性方面都有更好的表现。
{"title":"Shared secret key extraction from atmospheric optical wireless channels with multi-scale information reconciliation","authors":"Gang Pan ,&nbsp;Chunyi Chen ,&nbsp;Haifeng Yao ,&nbsp;Xiaolong Ni ,&nbsp;Xiaojuan Hu ,&nbsp;Haiyang Yu ,&nbsp;Qiong Li","doi":"10.1016/j.adhoc.2024.103638","DOIUrl":"10.1016/j.adhoc.2024.103638","url":null,"abstract":"<div><p>Due to the impact of turbulence, atmospheric optical wireless channel exhibits characteristics such as time-varying, space-varying and natural randomness, which can be used as a common natural random source for shared secret key extraction. Wireless laser communication technology boasts advantages like high bandwidth and fast transmission, which is conducive to improving key generation rate. Additionally, the strong anti-interference of laser signal helps to reduce key disagreement rate. Moreover, the laser beam’s good directionality effectively decreases the risk of eavesdropping on key information. Given its advantages and a scarcity of research in this regard, this paper proposes a scheme of shared secret key extraction from atmospheric optical wireless channels with multi-scale information reconciliation. In the scheme, to increase the cross-correlation coefficient of signal samples at the two legitimate parties, a preprocessing algorithm is designed based on a denoising algorithm and a threshold-based outliers elimination algorithm, and the denoising algorithm is inspired by the Complete Ensemble Empirical Mode Decomposition with Adaptive Noise (CEEMDan); moreover, a multi-level quantization algorithm based on Equilibrium-Optimizer(EO) is developed to balance and optimize distribution of sample points in the sample space; furthermore, to simplify the process of and decrease the computational complexity of information reconciliation, a concept of a multi-scale information reconciliation is formed, on the basis of which three algorithms, B-MSIR, I-MSIR and C-MSIR, are formulated. Finally, its performance is verified by numerical simulations and experiments, and the results show it has better performance in terms of the key disagreement rate, the key generation rate and the key randomness compared with several state-of-the-art algorithms.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103638"},"PeriodicalIF":4.4,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142088660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobility-aware parallel offloading and resource allocation scheme for vehicular edge computing 面向车载边缘计算的移动感知并行卸载和资源分配方案
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-26 DOI: 10.1016/j.adhoc.2024.103639
Rui Men , Xiumei Fan , Kok-Lim Alvin Yau , Axida Shan , Yan Xiao

Vehicle edge computing (VEC) enhances the distributed task processing capability within intelligent vehicle-infrastructure cooperative systems (i-VICS) by deploying servers at the network edge. However, the proliferation of onboard sensors and the continual emergence of new applications have exacerbated the inadequacy of wireless spectrum resources and edge server resources, while the high mobility of vehicles reduces reliability in task processing, resulting in increased communication and task processing delays. To address these challenges, we propose a mobile-aware Many-to-Many Parallel (MTMP) offloading scheme that integrates: a) millimeter-wave (mmWave) and cellular vehicle-to-everything (C-V2X) to mitigate excessive communication delays; and b) leveraging the underutilized resources of surrounding vehicles and parallel offloading to mitigate excessive task processing delays. To minimize the average completion delay of all tasks, this paper formulates the objective as a min-max optimization problem and solves it using the maximum entropy method (MEM), the Lagrange multiplier method, and an iterative algorithm. Extensive experimental results demonstrate the superior performance of the proposed scheme in comparison with other baseline algorithms. Specifically, our proposal achieves a 47 % reduction in task completion delay under optimal conditions, a 31.3 % increase in task completion rate, and a 30 % decrease in program runtime compared to the worst-performing algorithm.

车辆边缘计算(VEC)通过在网络边缘部署服务器,增强了智能车辆-基础设施协同系统(i-VICS)的分布式任务处理能力。然而,车载传感器的激增和新应用的不断涌现加剧了无线频谱资源和边缘服务器资源的不足,同时车辆的高流动性降低了任务处理的可靠性,导致通信和任务处理延迟增加。为应对这些挑战,我们提出了一种移动感知的多对多并行(MTMP)卸载方案,该方案整合了:a) 毫米波(mmWave)和蜂窝车对万物(C-V2X),以缓解过长的通信延迟;b) 利用周围车辆未充分利用的资源和并行卸载,以缓解过长的任务处理延迟。为了最小化所有任务的平均完成延迟,本文将目标表述为最小最大优化问题,并使用最大熵法 (MEM)、拉格朗日乘法器法和迭代算法进行求解。广泛的实验结果表明,与其他基准算法相比,我们提出的方案性能优越。具体来说,与性能最差的算法相比,我们的建议在最佳条件下将任务完成延迟减少了 47%,任务完成率提高了 31.3%,程序运行时间减少了 30%。
{"title":"Mobility-aware parallel offloading and resource allocation scheme for vehicular edge computing","authors":"Rui Men ,&nbsp;Xiumei Fan ,&nbsp;Kok-Lim Alvin Yau ,&nbsp;Axida Shan ,&nbsp;Yan Xiao","doi":"10.1016/j.adhoc.2024.103639","DOIUrl":"10.1016/j.adhoc.2024.103639","url":null,"abstract":"<div><p>Vehicle edge computing (VEC) enhances the distributed task processing capability within intelligent vehicle-infrastructure cooperative systems (i-VICS) by deploying servers at the network edge. However, the proliferation of onboard sensors and the continual emergence of new applications have exacerbated the inadequacy of wireless spectrum resources and edge server resources, while the high mobility of vehicles reduces reliability in task processing, resulting in increased communication and task processing delays. To address these challenges, we propose a mobile-aware Many-to-Many Parallel (MTMP) offloading scheme that integrates: a) millimeter-wave (mmWave) and cellular vehicle-to-everything (C-V2X) to mitigate excessive communication delays; and b) leveraging the underutilized resources of surrounding vehicles and parallel offloading to mitigate excessive task processing delays. To minimize the average completion delay of all tasks, this paper formulates the objective as a min-max optimization problem and solves it using the maximum entropy method (MEM), the Lagrange multiplier method, and an iterative algorithm. Extensive experimental results demonstrate the superior performance of the proposed scheme in comparison with other baseline algorithms. Specifically, our proposal achieves a 47 % reduction in task completion delay under optimal conditions, a 31.3 % increase in task completion rate, and a 30 % decrease in program runtime compared to the worst-performing algorithm.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103639"},"PeriodicalIF":4.4,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142096630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mixed fragmentation technique for securing structured data using multi-cloud environment (MFT-SSD) 利用多云环境确保结构化数据安全的混合分片技术(MFT-SSD)
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-22 DOI: 10.1016/j.adhoc.2024.103625
Rabab Mohamed Nabawy , Mohammed Hassanin , Mohamed Hassan Ibrahim , Mostafa Rabea Kaseb

Large data storage security is a topic of great interest to researchers, particularly in the age of big data where preserving data from theft, unauthorized access, and storage failure has become a crucial concern. To safeguard such data, encryption/decryption approaches have been employed, which are time-consuming and inefficient. The aim of this study is to develop a method, namely Mixed Fragmentation Technique for Securing Structured Data using Multi-Cloud Environment (MFT-SSD), for protecting large-scale data stored in a multi-cloud environment. This prevents insider attacks by adopting a mixed fragmentation approach to split the data into three files. For example, healthcare data is will be distributed among many clouds, each of which stores a partially unrecognized fraction of data without the need for an encryption or decryption layer. Comparing MFT-SSD to various encryption/decryption algorithms, our results show significant improvement; hence, the total performance of big data security is also improved.

大数据存储安全是研究人员非常感兴趣的一个话题,尤其是在大数据时代,防止数据被盗、未经授权的访问和存储故障已成为一个至关重要的问题。为了保护这些数据,人们采用了既耗时又低效的加密/解密方法。本研究旨在开发一种方法,即利用多云环境保护结构化数据安全的混合碎片技术(MFT-SSD),用于保护存储在多云环境中的大规模数据。该技术通过采用混合分片方法将数据分成三个文件,从而防止内部攻击。例如,医疗保健数据将分布在许多云中,每个云都存储了部分未识别的数据,无需加密或解密层。将 MFT-SSD 与各种加密/解密算法进行比较,我们的结果表明,MFT-SSD 有了显著的改进;因此,大数据安全的总体性能也得到了提高。
{"title":"Mixed fragmentation technique for securing structured data using multi-cloud environment (MFT-SSD)","authors":"Rabab Mohamed Nabawy ,&nbsp;Mohammed Hassanin ,&nbsp;Mohamed Hassan Ibrahim ,&nbsp;Mostafa Rabea Kaseb","doi":"10.1016/j.adhoc.2024.103625","DOIUrl":"10.1016/j.adhoc.2024.103625","url":null,"abstract":"<div><p>Large data storage security is a topic of great interest to researchers, particularly in the age of big data where preserving data from theft, unauthorized access, and storage failure has become a crucial concern. To safeguard such data, encryption/decryption approaches have been employed, which are time-consuming and inefficient. The aim of this study is to develop a method, namely Mixed Fragmentation Technique for Securing Structured Data using Multi-Cloud Environment (MFT-SSD), for protecting large-scale data stored in a multi-cloud environment. This prevents insider attacks by adopting a mixed fragmentation approach to split the data into three files. For example, healthcare data is will be distributed among many clouds, each of which stores a partially unrecognized fraction of data without the need for an encryption or decryption layer. Comparing MFT-SSD to various encryption/decryption algorithms, our results show significant improvement; hence, the total performance of big data security is also improved.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103625"},"PeriodicalIF":4.4,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142049558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An edge computing and distributed ledger technology architecture for secure and efficient transportation 用于安全高效运输的边缘计算和分布式账本技术架构
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-22 DOI: 10.1016/j.adhoc.2024.103633
Douglas L.L. Moura , Andre L.L. Aquino , Antonio A.F. Loureiro

Intelligent Transportation Systems (ITS) faces significant challenges in achieving its goal of sustainable and efficient transportation. These challenges include real-time data processing bottlenecks caused by high communication latency and security vulnerabilities related to centralized data storage. We propose a novel architecture that leverages Edge Computing and Distributed Ledger Technology (DLT) to address these concerns. Edge computing pushes cloud services, such as vehicles and roadside units, closer to the data source. This strategy reduces latency and network congestion. DLT provides a secure, decentralized platform for storing and sharing ITS data. Its tamper-proof nature ensures data integrity and prevents unauthorized access. Our architecture utilizes these technologies to create a decentralized platform for ITS data management. This platform facilitates secure processing, storage, and data exchange from various sources in the transportation network. This paper delves deeper into the architecture, explaining its essential components and functionalities. Additionally, we explore its potential applications and benefits for ITS. We describe a case study focusing on a data marketplace system for connected vehicles to assess the architecture’s effectiveness. The simulation results show an average latency reduction of 83.35% for publishing and 87.57% for purchasing datasets compared to the cloud architecture. Additionally, transaction processing speed improved by 18.73% and network usage decreased by 96.67%. The proposed architecture also achieves up to 99.61% reduction in mining centralization.

智能交通系统(ITS)在实现可持续和高效交通目标方面面临着巨大挑战。这些挑战包括高通信延迟导致的实时数据处理瓶颈,以及与集中式数据存储相关的安全漏洞。我们提出了一种新型架构,利用边缘计算和分布式账本技术(DLT)来解决这些问题。边缘计算将车辆和路边装置等云服务推近数据源。这种策略可以减少延迟和网络拥塞。DLT 为存储和共享智能交通系统数据提供了一个安全、分散的平台。其防篡改特性可确保数据完整性,防止未经授权的访问。我们的架构利用这些技术为智能交通系统数据管理创建了一个分散式平台。该平台有助于安全处理、存储和交换来自交通网络中各种来源的数据。本文将深入探讨该架构,解释其基本组件和功能。此外,我们还探讨了其在智能交通系统中的潜在应用和优势。我们描述了一个案例研究,重点是互联车辆的数据市场系统,以评估该架构的有效性。模拟结果显示,与云架构相比,发布数据集的平均延迟降低了 83.35%,购买数据集的平均延迟降低了 87.57%。此外,交易处理速度提高了 18.73%,网络使用率降低了 96.67%。所提出的架构还将采矿集中化程度降低了 99.61%。
{"title":"An edge computing and distributed ledger technology architecture for secure and efficient transportation","authors":"Douglas L.L. Moura ,&nbsp;Andre L.L. Aquino ,&nbsp;Antonio A.F. Loureiro","doi":"10.1016/j.adhoc.2024.103633","DOIUrl":"10.1016/j.adhoc.2024.103633","url":null,"abstract":"<div><p>Intelligent Transportation Systems (ITS) faces significant challenges in achieving its goal of sustainable and efficient transportation. These challenges include real-time data processing bottlenecks caused by high communication latency and security vulnerabilities related to centralized data storage. We propose a novel architecture that leverages Edge Computing and Distributed Ledger Technology (DLT) to address these concerns. Edge computing pushes cloud services, such as vehicles and roadside units, closer to the data source. This strategy reduces latency and network congestion. DLT provides a secure, decentralized platform for storing and sharing ITS data. Its tamper-proof nature ensures data integrity and prevents unauthorized access. Our architecture utilizes these technologies to create a decentralized platform for ITS data management. This platform facilitates secure processing, storage, and data exchange from various sources in the transportation network. This paper delves deeper into the architecture, explaining its essential components and functionalities. Additionally, we explore its potential applications and benefits for ITS. We describe a case study focusing on a data marketplace system for connected vehicles to assess the architecture’s effectiveness. The simulation results show an average latency reduction of 83.35% for publishing and 87.57% for purchasing datasets compared to the cloud architecture. Additionally, transaction processing speed improved by 18.73% and network usage decreased by 96.67%. The proposed architecture also achieves up to 99.61% reduction in mining centralization.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103633"},"PeriodicalIF":4.4,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142088657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel differentiated coverage-based lifetime metric for wireless sensor networks 基于覆盖范围的新型无线传感器网络寿命指标
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-22 DOI: 10.1016/j.adhoc.2024.103636
Derya Nurcan-Atceken , Aysegul Altin-Kayhan , Bulent Tavli

This paper delves into optimizing network lifetime (NL) subject to connected-coverage requirement, a pivotal issue for realistic wireless sensor network (WSN) design. A key challenge in designing WSNs consisting of energy-limited sensors is maximizing NL, the time a network remains functional by providing the desired service quality. To this end, we introduce a novel NL metric addressing target-specific coverage requirements that remedies the shortcomings imposed by conventional definitions like first node die (FND) and last node die (LND). In this context, while we want targets to be sensed by multiple sensors for a portion of the network lifetime, we let the periods, during which cells are monitored by at least one sensor, vary. We also allow the ratios of multiple and single tracking times to differ depending on the target and incorporate target-based prioritization in coverage. Moreover, we address role assignment to sensors and propose a selective target-sensor assignment strategy. As such, we aim to reduce redundant data transmissions and hence overall energy consumption in WSNs. We first propose a unique 0-1 mixed integer programming (MIP) model, to analyze the impact of our proposal on optimal WSN performance, precisely. Next, we present comprehensive comparative studies of WSN performance for alternative NL metrics regarding different coverage requirements and priorities across a wide range of parameters. Our test results reveal that by utilizing our novel NL metric total coverage time can be improved significantly, while facilitating more reliable sensing of the target region.

本文探讨了在满足连接覆盖要求的前提下优化网络寿命(NL)的问题,这是现实无线传感器网络(WSN)设计中的一个关键问题。设计由能量有限的传感器组成的 WSN 时面临的一个关键挑战是最大化 NL,即网络通过提供所需的服务质量而保持功能的时间。为此,我们引入了一种新的 NL 指标,以满足特定目标的覆盖要求,弥补了传统定义(如第一个节点死亡(FND)和最后一个节点死亡(LND))的不足。在这种情况下,虽然我们希望目标在网络生命周期的一部分时间内被多个传感器感知,但我们允许至少有一个传感器监测单元的时间段各不相同。我们还允许多个和单个跟踪时间的比例因目标而异,并在覆盖范围中加入基于目标的优先级排序。此外,我们还解决了传感器的角色分配问题,并提出了一种选择性目标-传感器分配策略。因此,我们的目标是减少冗余数据传输,从而降低 WSN 的总体能耗。我们首先提出了一个独特的 0-1 混合整数编程(MIP)模型,以精确分析我们的建议对 WSN 最佳性能的影响。接下来,我们针对不同的覆盖要求和优先级,在广泛的参数范围内对替代 NL 指标的 WSN 性能进行了全面的比较研究。我们的测试结果表明,通过使用我们新颖的 NL 指标,总覆盖时间可以显著改善,同时促进对目标区域更可靠的感知。
{"title":"A novel differentiated coverage-based lifetime metric for wireless sensor networks","authors":"Derya Nurcan-Atceken ,&nbsp;Aysegul Altin-Kayhan ,&nbsp;Bulent Tavli","doi":"10.1016/j.adhoc.2024.103636","DOIUrl":"10.1016/j.adhoc.2024.103636","url":null,"abstract":"<div><p>This paper delves into optimizing network lifetime (NL) subject to connected-coverage requirement, a pivotal issue for realistic wireless sensor network (WSN) design. A key challenge in designing WSNs consisting of energy-limited sensors is maximizing NL, the time a network remains functional by providing the desired service quality. To this end, we introduce a novel NL metric addressing target-specific coverage requirements that remedies the shortcomings imposed by conventional definitions like <em>first node die</em> (FND) and <em>last node die</em> (LND). In this context, while we want targets to be sensed by multiple sensors for a portion of the network lifetime, we let the periods, during which cells are monitored by at least one sensor, vary. We also allow the ratios of multiple and single tracking times to differ depending on the target and incorporate target-based prioritization in coverage. Moreover, we address role assignment to sensors and propose a selective target-sensor assignment strategy. As such, we aim to reduce redundant data transmissions and hence overall energy consumption in WSNs. We first propose a unique 0-1 mixed integer programming (MIP) model, to analyze the impact of our proposal on optimal WSN performance, precisely. Next, we present comprehensive comparative studies of WSN performance for alternative NL metrics regarding different coverage requirements and priorities across a wide range of parameters. Our test results reveal that by utilizing our novel NL metric total coverage time can be improved significantly, while facilitating more reliable sensing of the target region.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103636"},"PeriodicalIF":4.4,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142084098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy minimization for IRS-and-UAV-assisted mobile edge computing 最小化 IRS 和无人机辅助移动边缘计算的能耗
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-20 DOI: 10.1016/j.adhoc.2024.103635
Tingting Li , Yanjun Li , Ping Hu , Yuzhe Chen , Zheng Yin

Intelligent reconfigurable surface (IRS) is an emerging technology for the enhancement of spectrum and energy efficiency. We propose a novel IRS-and-unmanned aerial vehicle (UAV)-Assisted mobile edge computing (MEC) framework, where a MEC server installing on an UAV to facilitate task calculations by mobile users (MUs), and an IRS modulates channels between MUs and the UAV. Non-orthogonal multiple access (NOMA) is employed for further improving system-wide spectral efficiency. There are needs for joint optimization of multiple parameters, e.g., the task partition parameters and the transmit power of all MUs, the reflection coefficient matrix of the IRS and the movement trajectory of the UAV, and such needs raises the challenge of minimizing the long-term total energy consumption of all MUs while satisfying required transmission rate and task completion delay. We divide optimization tasks into two sub-problems and propose specific solutions respectively, i.e., relevant decisions about the UAV and MUs to be solved by deep reinforcement learning (DRL); and the reflection coefficient matrix of the IRS to be solved by block coordinate descent (BCD). A series of experiments have verified the effectiveness of the proposed communication techniques and optimization algorithms. Simulation results demonstrate that (1) NOMA-IRS technique achieves better energy efficacy compared to the cases where random IRS or no IRS is deployed and the conventional orthogonal multiple access (OMA) technique with IRS. (2) our proposed deep deterministic policy gradient (DDPG)-BCD algorithm outperforms other four benchmark algorithms in solving the complex and dynamic optimization problem.

智能可重构表面(IRS)是一种提高频谱和能源效率的新兴技术。我们提出了一种新颖的 IRS-无人机辅助移动边缘计算(MEC)框架,其中 MEC 服务器安装在无人机上,以方便移动用户(MU)进行任务计算,而 IRS 则调制 MU 与无人机之间的信道。为进一步提高整个系统的频谱效率,采用了非正交多址接入(NOMA)技术。需要对多个参数进行联合优化,例如任务分区参数和所有 MU 的发射功率、IRS 的反射系数矩阵和无人机的运动轨迹,这些需求提出了一个挑战,即在满足所需的传输速率和任务完成延迟的同时,最大限度地降低所有 MU 的长期总能耗。我们将优化任务分为两个子问题,并分别提出了具体的解决方案,即通过深度强化学习(DRL)解决无人机和 MU 的相关决策问题;通过块坐标下降(BCD)解决 IRS 的反射系数矩阵问题。一系列实验验证了所提出的通信技术和优化算法的有效性。仿真结果表明:(1) NOMA-IRS 技术与随机部署 IRS 或不部署 IRS 的情况相比,以及与传统的带 IRS 的正交多址(OMA)技术相比,实现了更好的能效。(2) 在解决复杂的动态优化问题时,我们提出的深度确定性策略梯度(DDPG)-BCD 算法优于其他四种基准算法。
{"title":"Energy minimization for IRS-and-UAV-assisted mobile edge computing","authors":"Tingting Li ,&nbsp;Yanjun Li ,&nbsp;Ping Hu ,&nbsp;Yuzhe Chen ,&nbsp;Zheng Yin","doi":"10.1016/j.adhoc.2024.103635","DOIUrl":"10.1016/j.adhoc.2024.103635","url":null,"abstract":"<div><p>Intelligent reconfigurable surface (IRS) is an emerging technology for the enhancement of spectrum and energy efficiency. We propose a novel IRS-and-unmanned aerial vehicle (UAV)-Assisted mobile edge computing (MEC) framework, where a MEC server installing on an UAV to facilitate task calculations by mobile users (MUs), and an IRS modulates channels between MUs and the UAV. Non-orthogonal multiple access (NOMA) is employed for further improving system-wide spectral efficiency. There are needs for joint optimization of multiple parameters, e.g., the task partition parameters and the transmit power of all MUs, the reflection coefficient matrix of the IRS and the movement trajectory of the UAV, and such needs raises the challenge of minimizing the long-term total energy consumption of all MUs while satisfying required transmission rate and task completion delay. We divide optimization tasks into two sub-problems and propose specific solutions respectively, i.e., relevant decisions about the UAV and MUs to be solved by deep reinforcement learning (DRL); and the reflection coefficient matrix of the IRS to be solved by block coordinate descent (BCD). A series of experiments have verified the effectiveness of the proposed communication techniques and optimization algorithms. Simulation results demonstrate that (1) NOMA-IRS technique achieves better energy efficacy compared to the cases where random IRS or no IRS is deployed and the conventional orthogonal multiple access (OMA) technique with IRS. (2) our proposed deep deterministic policy gradient (DDPG)-BCD algorithm outperforms other four benchmark algorithms in solving the complex and dynamic optimization problem.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103635"},"PeriodicalIF":4.4,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142041065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Ad Hoc Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1