首页 > 最新文献

Ad Hoc Networks最新文献

英文 中文
Vehicular edge cloud computing content caching optimization solution based on content prediction and deep reinforcement learning 基于内容预测和深度强化学习的车载边缘云计算内容缓存优化解决方案
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-03 DOI: 10.1016/j.adhoc.2024.103643
Lin Zhu, Bingxian Li, Long Tan

In conventional studies on vehicular edge computing, researchers frequently overlook the high-speed mobility of vehicles and the dynamic nature of the vehicular edge environment. Moreover, when employing deep reinforcement learning to address vehicular edge challenges, insufficient attention is given to the potential issue of the algorithm converging to a local optimal solution. This paper presents a content caching solution tailored for vehicular edge cloud computing, integrating content prediction and deep reinforcement learning techniques. Given the swift mobility of vehicles and the ever-changing nature of the vehicular edge environment, the study proposes a content prediction model based on Informer. Leveraging the Informer prediction model, the system anticipates the vehicular edge environment dynamics, thereby informing the caching of vehicle task content. Acknowledging the diverse time scales involved in policy decisions such as content updating, vehicle scheduling, and bandwidth allocation, the paper advocates a dual time-scale Markov modeling approach. Moreover, to address the local optimality issue inherent in the A3C algorithm, an enhanced A3C algorithm is introduced, incorporating an ɛ-greedy strategy to promote exploration. Recognizing the potential limitations posed by a fixed exploration rate ɛ, a dynamic baseline mechanism is proposed for updating ɛ dynamically. Experimental findings demonstrate that compared to alternative content caching approaches, the proposed vehicle edge computing content caching solution substantially mitigates content access costs. To support research in this area, we have publicly released the source code and pre-trained models at https://github.com/JYAyyyyyy/Informer.git.

在有关车辆边缘计算的传统研究中,研究人员经常忽视车辆的高速流动性和车辆边缘环境的动态性质。此外,在利用深度强化学习解决车辆边缘挑战时,对算法收敛到局部最优解的潜在问题关注不够。本文结合内容预测和深度强化学习技术,提出了一种为车载边缘云计算量身定制的内容缓存解决方案。考虑到车辆的快速移动性和车辆边缘环境的不断变化,本研究提出了一种基于 Informer 的内容预测模型。利用 Informer 预测模型,系统可以预测车辆边缘环境的动态,从而为车辆任务内容的缓存提供信息。考虑到内容更新、车辆调度和带宽分配等策略决策涉及不同的时间尺度,本文主张采用双时间尺度马尔可夫建模方法。此外,为了解决 A3C 算法中固有的局部最优性问题,本文引入了一种增强型 A3C 算法,其中包含一种促进探索的ɛ 贪婪策略。考虑到固定探索率ɛ 可能带来的限制,我们提出了一种动态基线机制,用于动态更新ɛ。实验结果表明,与其他内容缓存方法相比,所提出的车载边缘计算内容缓存解决方案大大降低了内容访问成本。为了支持这一领域的研究,我们在 https://github.com/JYAyyyyyy/Informer.git 上公开发布了源代码和预训练模型。
{"title":"Vehicular edge cloud computing content caching optimization solution based on content prediction and deep reinforcement learning","authors":"Lin Zhu,&nbsp;Bingxian Li,&nbsp;Long Tan","doi":"10.1016/j.adhoc.2024.103643","DOIUrl":"10.1016/j.adhoc.2024.103643","url":null,"abstract":"<div><p>In conventional studies on vehicular edge computing, researchers frequently overlook the high-speed mobility of vehicles and the dynamic nature of the vehicular edge environment. Moreover, when employing deep reinforcement learning to address vehicular edge challenges, insufficient attention is given to the potential issue of the algorithm converging to a local optimal solution. This paper presents a content caching solution tailored for vehicular edge cloud computing, integrating content prediction and deep reinforcement learning techniques. Given the swift mobility of vehicles and the ever-changing nature of the vehicular edge environment, the study proposes a content prediction model based on Informer. Leveraging the Informer prediction model, the system anticipates the vehicular edge environment dynamics, thereby informing the caching of vehicle task content. Acknowledging the diverse time scales involved in policy decisions such as content updating, vehicle scheduling, and bandwidth allocation, the paper advocates a dual time-scale Markov modeling approach. Moreover, to address the local optimality issue inherent in the A3C algorithm, an enhanced A3C algorithm is introduced, incorporating an <span><math><mi>ɛ</mi></math></span>-greedy strategy to promote exploration. Recognizing the potential limitations posed by a fixed exploration rate <span><math><mi>ɛ</mi></math></span>, a dynamic baseline mechanism is proposed for updating <span><math><mi>ɛ</mi></math></span> dynamically. Experimental findings demonstrate that compared to alternative content caching approaches, the proposed vehicle edge computing content caching solution substantially mitigates content access costs. To support research in this area, we have publicly released the source code and pre-trained models at <span><span>https://github.com/JYAyyyyyy/Informer.git</span><svg><path></path></svg></span>.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"165 ","pages":"Article 103643"},"PeriodicalIF":4.4,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142149092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain and Quantum Machine Learning Driven Energy Trading for Electric Vehicles 区块链和量子机器学习驱动的电动汽车能源交易
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-03 DOI: 10.1016/j.adhoc.2024.103632
Pankaj Kumar Kashyap , Upasana Dohare , Manoj Kumar , Sushil Kumar

With the steep growth of Electric Vehicles (EV's), the consequent demand of energy for charging puts significant load to powergrids. Renewable Energy Sources enabled microgrids can alleviate the problem of energy demand and trade the energy locally in Peer-to-Peer (P2P) manner, where seller (microgrid) and buyer (EV's) “meet” to trade electricity directly on agreed term without any intermediary. However, a foolproof system required for audit and verification of transaction record between seller and buyer to address privacy and security in untrusted and opaque local energy trading market (LETM). Centralized public blockchain enabled system (for audit the transaction records and storage) based on conventional learning models faces mainly two issues in the LETM. (a) if, centralize system runs out of energy and tear down then whole energy trading plunges treated as single point of failure (b) Conventional learning models fail to converge optimal point in case of large state and action space (large number of EV's and their energy demand). The primary objective of this paper to provide secure system for LETM, 1) Distributed nature of Consortium Blockchain used that solve the problem of single point of failure to audit and storage of transaction and profile info of microgrids and EV's. 2) Quantum based Reinforcement Learning (QRL) easily handles the large number of EV's energy supply and demand for smoothly run LETM. In this context, this paper presents Blockchain and Quantum Machine Learning driven energy trading model for EVs (B-MET). A utility maximization problem formulated as Markov Decision Process (MDP) and their solution provided by using QRL focusing on join optimization of selling price, loan amount and quantity of shared energy. MDP is a mathematical framework used to model decision-making in situations where outcomes are partly random and partly under the control of a decision-maker, i.e., the future state depends only on the current state and action, not on the sequence of events that preceded it. QRL method combines quantum theory with traditional RL. It is inspire by the principles of state superposition and quantum parallelism. Convergence analysis and performance results attest that B-MET convergences faster, maximizes the utility with lower confirmation delay in P2P energy trading as compare to state of the art techniques.

随着电动汽车(EV)的急剧增长,随之而来的充电能源需求给电网带来了巨大的负荷。支持可再生能源的微电网可以缓解能源需求问题,并以点对点(P2P)的方式在本地进行能源交易,即卖方(微电网)和买方(电动汽车)"见面",在商定的条件下直接进行电力交易,无需任何中介。然而,在不信任和不透明的本地能源交易市场(LETM)中,需要一个万无一失的系统来审计和验证卖方和买方之间的交易记录,以解决隐私和安全问题。基于传统学习模型的中心化公共区块链系统(用于审核交易记录和存储)在本地能源交易市场中主要面临两个问题。(a) 如果中心化系统耗尽能源并关闭,那么整个能源交易就会陷入单点故障 (b) 在状态和行动空间较大(大量电动汽车及其能源需求)的情况下,传统学习模型无法收敛到最佳点。本文的主要目标是为 LETM 提供安全系统,1)使用联盟区块链的分布式特性,解决单点故障问题,审计和存储微电网和电动汽车的交易和配置文件信息。2) 基于量子的强化学习(QRL)可轻松处理大量电动汽车的能源供应和需求,使 LETM 顺利运行。在此背景下,本文提出了区块链和量子机器学习驱动的电动汽车能源交易模型(B-MET)。将效用最大化问题表述为马尔可夫决策过程(Markov Decision Process,MDP),并通过量子机器学习提供解决方案,重点关注销售价格、贷款金额和共享能源数量的联合优化。马尔可夫决策过程是一个数学框架,用于模拟在结果部分随机、部分受决策者控制的情况下的决策,即未来状态只取决于当前状态和行动,而不取决于之前的事件序列。QRL 方法结合了量子理论和传统的 RL。它的灵感来源于状态叠加和量子并行原理。收敛分析和性能结果证明,与现有技术相比,B-MET 收敛速度更快,在 P2P 能量交易中以更低的确认延迟实现了效用最大化。
{"title":"Blockchain and Quantum Machine Learning Driven Energy Trading for Electric Vehicles","authors":"Pankaj Kumar Kashyap ,&nbsp;Upasana Dohare ,&nbsp;Manoj Kumar ,&nbsp;Sushil Kumar","doi":"10.1016/j.adhoc.2024.103632","DOIUrl":"10.1016/j.adhoc.2024.103632","url":null,"abstract":"<div><p>With the steep growth of Electric Vehicles (EV's), the consequent demand of energy for charging puts significant load to powergrids. Renewable Energy Sources enabled microgrids can alleviate the problem of energy demand and trade the energy locally in Peer-to-Peer (P2P) manner, where seller (microgrid) and buyer (EV's) “meet” to trade electricity directly on agreed term without any intermediary. However, a foolproof system required for audit and verification of transaction record between seller and buyer to address privacy and security in untrusted and opaque local energy trading market (LETM). Centralized public blockchain enabled system (for audit the transaction records and storage) based on conventional learning models faces mainly two issues in the LETM. (a) if, centralize system runs out of energy and tear down then whole energy trading plunges treated as single point of failure (b) Conventional learning models fail to converge optimal point in case of large state and action space (large number of EV's and their energy demand). The primary objective of this paper to provide secure system for LETM, 1) Distributed nature of Consortium Blockchain used that solve the problem of single point of failure to audit and storage of transaction and profile info of microgrids and EV's. 2) Quantum based Reinforcement Learning (QRL) easily handles the large number of EV's energy supply and demand for smoothly run LETM. In this context, this paper presents Blockchain and Quantum Machine Learning driven energy trading model for EVs (B-MET). A utility maximization problem formulated as Markov Decision Process (MDP) and their solution provided by using QRL focusing on join optimization of selling price, loan amount and quantity of shared energy. MDP is a mathematical framework used to model decision-making in situations where outcomes are partly random and partly under the control of a decision-maker, i.e., the future state depends only on the current state and action, not on the sequence of events that preceded it. QRL method combines quantum theory with traditional RL. It is inspire by the principles of state superposition and quantum parallelism. Convergence analysis and performance results attest that B-MET convergences faster, maximizes the utility with lower confirmation delay in P2P energy trading as compare to state of the art techniques.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"165 ","pages":"Article 103632"},"PeriodicalIF":4.4,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142129048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THz band drone communications with practical antennas: Performance under realistic mobility and misalignment scenarios 采用实用天线的太赫兹波段无人机通信:实际移动和错位情况下的性能
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1016/j.adhoc.2024.103644
Akhtar Saeed , Mikail Erdem , Ozgur Gurbuz , Mustafa Alper Akkas

For 6G non-terrestrial communications, drones will offer uninterrupted connectivity for surveillance, sensing, and localization. They will also serve as drone base stations to support terrestrial base stations, providing large bandwidth, high-rate, and ultra-reliable low latency services. In this paper, for the first time in the literature, we depict the true performance of Terahertz (THz) band communications among drones by applying various channel selection and power allocation schemes with practical THz antennas within (0.75–4.4) THz under realistic mobility and misalignment scenarios. Through numerical simulations, we unveil the capacity of drone links under different channel selection and power allocation schemes within 10s to 100s of Gbps at distances (1–100) m, when drones are in motion and subject to (mis)alignment due to mobility and even under beam misalignment fading. However, when exposed to real drone mobility traces, the performance of all channel selection schemes drops significantly, sometimes by up to six orders of magnitude, due to the occasional reverse orientations of antennas. In addition to the capacity analysis, we report available frequency bands (transmission windows) considering all schemes and mobility patterns. We also identify a band that is commonly available under all considered mobility and misalignment settings, and we evaluate its performance in terms of spectral and energy efficiencies, which can be useful in designing THz transceivers for drone communications. Our findings emphasize the essence of active beam control solutions to achieve the desired capacity potential of THz drone communications, while also highlighting the challenges of utilizing the THz band for drone communications.

对于 6G 非地面通信,无人机将为监控、传感和定位提供不间断的连接。它们还将作为无人机基站支持地面基站,提供大带宽、高速率和超可靠的低延迟服务。在本文中,我们首次在文献中描述了无人机之间太赫兹(THz)频段通信的真实性能,即在现实的移动性和错位场景下,通过(0.75-4.4)太赫兹范围内的实用太赫兹天线应用各种信道选择和功率分配方案。通过数值模拟,我们揭示了在不同信道选择和功率分配方案下,无人机链路在距离(1-100)米时的容量在 10 到 100 Gbps 之间,此时无人机处于运动状态,并且由于移动性甚至在波束错位衰落情况下会出现(错位)对齐。然而,当暴露在真实的无人机移动轨迹中时,由于天线偶尔会反向,所有信道选择方案的性能都会大幅下降,有时甚至会下降 6 个数量级。除了容量分析,我们还报告了考虑到所有方案和移动模式的可用频段(传输窗口)。我们还确定了一个在所有考虑的移动性和错位设置下都普遍可用的频段,并从频谱和能量效率的角度对其性能进行了评估,这对设计用于无人机通信的太赫兹收发器非常有用。我们的研究结果强调了主动波束控制解决方案对实现太赫兹无人机通信所需容量潜力的重要性,同时也突出了利用太赫兹频段进行无人机通信所面临的挑战。
{"title":"THz band drone communications with practical antennas: Performance under realistic mobility and misalignment scenarios","authors":"Akhtar Saeed ,&nbsp;Mikail Erdem ,&nbsp;Ozgur Gurbuz ,&nbsp;Mustafa Alper Akkas","doi":"10.1016/j.adhoc.2024.103644","DOIUrl":"10.1016/j.adhoc.2024.103644","url":null,"abstract":"<div><p>For 6G non-terrestrial communications, drones will offer uninterrupted connectivity for surveillance, sensing, and localization. They will also serve as drone base stations to support terrestrial base stations, providing large bandwidth, high-rate, and ultra-reliable low latency services. In this paper, for the first time in the literature, we depict the true performance of Terahertz (THz) band communications among drones by applying various channel selection and power allocation schemes with practical THz antennas within (0.75–4.4) THz under realistic mobility and misalignment scenarios. Through numerical simulations, we unveil the capacity of drone links under different channel selection and power allocation schemes within 10s to 100s of Gbps at distances (1–100) m, when drones are in motion and subject to (mis)alignment due to mobility and even under beam misalignment fading. However, when exposed to real drone mobility traces, the performance of all channel selection schemes drops significantly, sometimes by up to six orders of magnitude, due to the occasional reverse orientations of antennas. In addition to the capacity analysis, we report available frequency bands (transmission windows) considering all schemes and mobility patterns. We also identify a band that is commonly available under all considered mobility and misalignment settings, and we evaluate its performance in terms of spectral and energy efficiencies, which can be useful in designing THz transceivers for drone communications. Our findings emphasize the essence of active beam control solutions to achieve the desired capacity potential of THz drone communications, while also highlighting the challenges of utilizing the THz band for drone communications.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"166 ","pages":"Article 103644"},"PeriodicalIF":4.4,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142164835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Load-adaptive MAC protocol for frontier detection in Underwater Mobile Sensor Network 用于水下移动传感器网络前沿检测的负载自适应 MAC 协议
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-31 DOI: 10.1016/j.adhoc.2024.103641
Ansa Shermin S. , Bhavya Mehta , Sarang C. Dhongdi , Mandar A. Chitre

This work proposes a load-adaptive Medium Access Control (MAC) protocol for the frontier/boundary detection application of underwater phenomena using Underwater Mobile Sensor Network (UWMSN). A leader-follower architecture of a swarm of underwater vehicles is proposed here. Autonomous Underwater Vehicles (AUVs) traverse a random mobility pattern beneath one Autonomous Surface Vehicle (ASV) (leader) in the proposed network. ASV has to guide multiple-follower AUVs in the event of interest. The vehicular swarm aims to explore the frontiers in the event to build the map. Load-adaptive MAC protocol is therefore proposed and implemented in this hybrid multi-vehicular network to ensure seamless vehicular communications. The ASV has navigational capabilities to aid the AUVs in navigation and data collection. The proposed MAC protocol can adjust the dynamic mobility and load in the network. The protocol aims to provide dynamic Time Division Multiple Access (TDMA) slots for the AUVs wirelessly linked in the vicinity of the ASV. These slots are used for ranging/navigation and data transmission. Additional urgent data from any AUVs can be transmitted in open Carrier Sense Multiple Access (CSMA) protocol following the TDMA duration. Results have been generated by comparing protocols like CSMA, ALOHA, and TDMA with the proposed Load-Adaptive MAC protocol. The protocols have been compared to the throughput vs number of nodes and throughput vs simulation time. It has been observed that the proposed MAC can perform better than ALOHA and CSMA protocols. Nevertheless, it can produce comparable results for TDMA protocol while supporting the dynamic mobility and load in the network meantime supporting urgent data transmission for nodes in demand.

本研究提出了一种负载自适应介质访问控制(MAC)协议,用于利用水下移动传感器网络(UWMSN)对水下现象进行前沿/边界探测。这里提出了一种水下航行器群的领导者-跟随者架构。在提议的网络中,自主水下航行器(AUV)在一个自主水面航行器(ASV)(领导者)的下方以随机移动模式行进。ASV 必须在感兴趣时引导多个跟随者 AUV。车群的目标是探索事件的前沿,以绘制地图。因此,提出了负载自适应 MAC 协议,并在这个混合多车辆网络中实施,以确保无缝车辆通信。ASV 具有导航能力,可帮助 AUV 进行导航和数据收集。所提出的 MAC 协议可以调整网络中的动态移动性和负载。该协议旨在为在 ASV 附近无线连接的 AUV 提供动态时分多址 (TDMA) 时隙。这些时隙用于响铃/导航和数据传输。在 TDMA 持续时间之后,任何 AUV 的其他紧急数据都可以通过开放的载波感应多路访问(CSMA)协议进行传输。通过将 CSMA、ALOHA 和 TDMA 等协议与所提出的负载自适应 MAC 协议进行比较,得出了结果。这些协议的吞吐量与节点数、吞吐量与模拟时间进行了比较。结果表明,提议的 MAC 比 ALOHA 和 CSMA 协议表现更好。不过,在支持网络中的动态移动性和负载的同时,它还能产生与 TDMA 协议相当的结果,同时支持有需求节点的紧急数据传输。
{"title":"Load-adaptive MAC protocol for frontier detection in Underwater Mobile Sensor Network","authors":"Ansa Shermin S. ,&nbsp;Bhavya Mehta ,&nbsp;Sarang C. Dhongdi ,&nbsp;Mandar A. Chitre","doi":"10.1016/j.adhoc.2024.103641","DOIUrl":"10.1016/j.adhoc.2024.103641","url":null,"abstract":"<div><p>This work proposes a load-adaptive Medium Access Control (MAC) protocol for the frontier/boundary detection application of underwater phenomena using Underwater Mobile Sensor Network (UWMSN). A leader-follower architecture of a swarm of underwater vehicles is proposed here. Autonomous Underwater Vehicles (AUVs) traverse a random mobility pattern beneath one Autonomous Surface Vehicle (ASV) (leader) in the proposed network. ASV has to guide multiple-follower AUVs in the event of interest. The vehicular swarm aims to explore the frontiers in the event to build the map. Load-adaptive MAC protocol is therefore proposed and implemented in this hybrid multi-vehicular network to ensure seamless vehicular communications. The ASV has navigational capabilities to aid the AUVs in navigation and data collection. The proposed MAC protocol can adjust the dynamic mobility and load in the network. The protocol aims to provide dynamic Time Division Multiple Access (TDMA) slots for the AUVs wirelessly linked in the vicinity of the ASV. These slots are used for ranging/navigation and data transmission. Additional urgent data from any AUVs can be transmitted in open Carrier Sense Multiple Access (CSMA) protocol following the TDMA duration. Results have been generated by comparing protocols like CSMA, ALOHA, and TDMA with the proposed Load-Adaptive MAC protocol. The protocols have been compared to the throughput vs number of nodes and throughput vs simulation time. It has been observed that the proposed MAC can perform better than ALOHA and CSMA protocols. Nevertheless, it can produce comparable results for TDMA protocol while supporting the dynamic mobility and load in the network meantime supporting urgent data transmission for nodes in demand.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"165 ","pages":"Article 103641"},"PeriodicalIF":4.4,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards sustainable industry 4.0: A survey on greening IoE in 6G networks 迈向可持续的工业 4.0:6G 网络中的绿色物联网调查
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1016/j.adhoc.2024.103610
Saeed Hamood Alsamhi , Ammar Hawbani , Radhya Sahal , Sumit Srivastava , Santosh Kumar , Liang Zhao , Mohammed A.A. Al-qaness , Jahan Hassan , Mohsen Guizani , Edward Curry

The dramatic recent increase of the smart Internet of Everything (IoE) in Industry 4.0 has significantly increased energy consumption, carbon emissions, and global warming. IoE applications in Industry 4.0 face many challenges, including energy efficiency, heterogeneity, security, interoperability, and centralization. Therefore, Industry 4.0 in Beyond the Sixth-Generation (6G) networks demands moving to sustainable, green IoE and identifying efficient and emerging technologies to overcome sustainability challenges. Many advanced technologies and strategies efficiently solve issues by enhancing connectivity, interoperability, security, decentralization, and reliability. Greening IoE is a promising approach that focuses on improving energy efficiency, providing a high Quality of Service (QoS), and reducing carbon emissions to enhance the quality of life at a low cost. This survey provides a comprehensive overview of how advanced technologies can contribute to green IoE in the 6G network of Industry 4.0 applications. This survey provides a comprehensive overview of advanced technologies, including Blockchain, Digital Twins (DTs), Unmanned Aerial Vehicles (UAVs, a.k.a. drones), and Machine Learning (ML), to improve connectivity, QoS, and energy efficiency for green IoE in 6G networks. We evaluate the capability of each technology in greening IoE in Industry 4.0 applications and analyse the challenges and opportunities to make IoE greener using the discussed technologies.

最近,工业 4.0 中智能万物互联(IoE)的急剧增加大大增加了能源消耗、碳排放和全球变暖。工业 4.0 中的 IoE 应用面临许多挑战,包括能效、异构性、安全性、互操作性和集中化。因此,超越第六代(6G)网络的工业 4.0 要求转向可持续的绿色物联网,并确定高效的新兴技术来克服可持续性挑战。许多先进技术和战略通过增强连接性、互操作性、安全性、分散性和可靠性,有效地解决了各种问题。绿色物联网是一种前景广阔的方法,其重点是提高能源效率、提供高质量服务(QoS)和减少碳排放,从而以低成本提高生活质量。本调查全面概述了先进技术如何在工业 4.0 应用的 6G 网络中为绿色物联网做出贡献。本调查全面概述了先进技术,包括区块链、数字孪生(DTs)、无人机(UAVs,又称无人机)和机器学习(ML),以提高 6G 网络中绿色物联网的连接性、服务质量和能效。我们评估了每种技术在工业 4.0 应用中实现绿色物联网的能力,并分析了使用所讨论的技术使物联网更加绿色所面临的挑战和机遇。
{"title":"Towards sustainable industry 4.0: A survey on greening IoE in 6G networks","authors":"Saeed Hamood Alsamhi ,&nbsp;Ammar Hawbani ,&nbsp;Radhya Sahal ,&nbsp;Sumit Srivastava ,&nbsp;Santosh Kumar ,&nbsp;Liang Zhao ,&nbsp;Mohammed A.A. Al-qaness ,&nbsp;Jahan Hassan ,&nbsp;Mohsen Guizani ,&nbsp;Edward Curry","doi":"10.1016/j.adhoc.2024.103610","DOIUrl":"10.1016/j.adhoc.2024.103610","url":null,"abstract":"<div><p>The dramatic recent increase of the smart Internet of Everything (IoE) in Industry 4.0 has significantly increased energy consumption, carbon emissions, and global warming. IoE applications in Industry 4.0 face many challenges, including energy efficiency, heterogeneity, security, interoperability, and centralization. Therefore, Industry 4.0 in Beyond the Sixth-Generation (6G) networks demands moving to sustainable, green IoE and identifying efficient and emerging technologies to overcome sustainability challenges. Many advanced technologies and strategies efficiently solve issues by enhancing connectivity, interoperability, security, decentralization, and reliability. Greening IoE is a promising approach that focuses on improving energy efficiency, providing a high Quality of Service (QoS), and reducing carbon emissions to enhance the quality of life at a low cost. This survey provides a comprehensive overview of how advanced technologies can contribute to green IoE in the 6G network of Industry 4.0 applications. This survey provides a comprehensive overview of advanced technologies, including Blockchain, Digital Twins (DTs), Unmanned Aerial Vehicles (UAVs, a.k.a. drones), and Machine Learning (ML), to improve connectivity, QoS, and energy efficiency for green IoE in 6G networks. We evaluate the capability of each technology in greening IoE in Industry 4.0 applications and analyse the challenges and opportunities to make IoE greener using the discussed technologies.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"165 ","pages":"Article 103610"},"PeriodicalIF":4.4,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S157087052400221X/pdfft?md5=4458c1f0b4d6c5d5d72267474fa6aea4&pid=1-s2.0-S157087052400221X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint differential evolution algorithm in RIS-assisted multi-UAV IoT data collection system RIS 辅助多无人机物联网数据采集系统中的联合差分进化算法
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1016/j.adhoc.2024.103640
Yuchen Li , Hongwei Ding , Zhuguan Liang , Bo Li , Zhijun Yang

This paper investigates a Reconfigurable Intelligent Surface (RIS)-assisted multi-UAV data collection system, in which unmanned aerial vehicles (UAVs) collect data from Internet of Things (IoT) devices. The RIS, mounted on building surfaces, plays a vital role in preventing obstruction and improving the communication quality of the IoT-UAV transmission link. Our aim is to minimize the energy consumption of this system, including the transmission energy consumption of IoT devices and the hovering energy consumption of UAVs, by optimizing the deployment of UAVs and the phase shifts of RIS. To achieve this goal, a multi-UAV deployment and phase shift of RIS optimization algorithm (MUDPRA) is proposed that consists of two phases. In the first phase, a joint differential evolution (DE) algorithm with a two-layer structure featuring a variable population size, namely DEC-ADDE, is proposed to optimize the UAV deployment. Specifically, each UAV’s location is encoded as an individual, with the whole UAV deployment is considered as the population in DEC-ADDE. Thus, a differential evolution clustering (DEC) algorithm is employed initially to initialize the population, which allows for obtaining better initial UAV deployment without the need for a predefined number of UAVs. Subsequently, an adaptive and dynamic DE algorithm (ADDE) is employed to produce offspring population to further optimize UAV deployment. Finally, an adaptive updating strategy is adopted to adjust the population size to optimize the number of UAVs. In the second phase, a low-complexity method is proposed to optimize the phase shift of RIS with the aim of enhancing the IoT-UAV data transmission rate. Experimental results conducted on eight instances involving IoT devices ranging from 60 to 200 demonstrate the effectiveness of MUDPRA in minimizing energy consumption of this system compared to six alternative algorithms and three benchmark systems.

本文研究了可重构智能表面(RIS)辅助多无人机数据收集系统,其中无人机(UAV)从物联网(IoT)设备收集数据。安装在建筑物表面的可调节表面(RIS)在防止阻塞和提高物联网-无人机传输链路的通信质量方面发挥着至关重要的作用。我们的目标是通过优化无人机的部署和 RIS 的相移,最大限度地降低该系统的能耗,包括物联网设备的传输能耗和无人机的悬停能耗。为实现这一目标,提出了一种多无人机部署和 RIS 相移优化算法(MUDPRA),该算法由两个阶段组成。在第一阶段,提出了一种具有双层结构、种群规模可变的联合微分进化(DE)算法,即 DEC-ADDE,用于优化无人机部署。具体来说,在 DEC-ADDE 中,每个无人机的位置被编码为一个个体,而整个无人机部署被视为一个群体。因此,最初采用差分进化聚类(DEC)算法对种群进行初始化,这样就可以获得较好的无人机初始部署,而无需预先确定无人机的数量。随后,采用自适应动态演化算法(ADDE)产生子代群体,进一步优化无人机部署。最后,采用自适应更新策略调整种群规模,优化无人机数量。在第二阶段,提出了一种低复杂度方法来优化 RIS 的相移,以提高物联网-无人机数据传输速率。在涉及 60 到 200 个物联网设备的 8 个实例上进行的实验结果表明,与 6 种替代算法和 3 个基准系统相比,MUDPRA 能够有效地将该系统的能耗降至最低。
{"title":"Joint differential evolution algorithm in RIS-assisted multi-UAV IoT data collection system","authors":"Yuchen Li ,&nbsp;Hongwei Ding ,&nbsp;Zhuguan Liang ,&nbsp;Bo Li ,&nbsp;Zhijun Yang","doi":"10.1016/j.adhoc.2024.103640","DOIUrl":"10.1016/j.adhoc.2024.103640","url":null,"abstract":"<div><p>This paper investigates a Reconfigurable Intelligent Surface (RIS)-assisted multi-UAV data collection system, in which unmanned aerial vehicles (UAVs) collect data from Internet of Things (IoT) devices. The RIS, mounted on building surfaces, plays a vital role in preventing obstruction and improving the communication quality of the IoT-UAV transmission link. Our aim is to minimize the energy consumption of this system, including the transmission energy consumption of IoT devices and the hovering energy consumption of UAVs, by optimizing the deployment of UAVs and the phase shifts of RIS. To achieve this goal, a multi-UAV deployment and phase shift of RIS optimization algorithm (MUDPRA) is proposed that consists of two phases. In the first phase, a joint differential evolution (DE) algorithm with a two-layer structure featuring a variable population size, namely DEC-ADDE, is proposed to optimize the UAV deployment. Specifically, each UAV’s location is encoded as an individual, with the whole UAV deployment is considered as the population in DEC-ADDE. Thus, a differential evolution clustering (DEC) algorithm is employed initially to initialize the population, which allows for obtaining better initial UAV deployment without the need for a predefined number of UAVs. Subsequently, an adaptive and dynamic DE algorithm (ADDE) is employed to produce offspring population to further optimize UAV deployment. Finally, an adaptive updating strategy is adopted to adjust the population size to optimize the number of UAVs. In the second phase, a low-complexity method is proposed to optimize the phase shift of RIS with the aim of enhancing the IoT-UAV data transmission rate. Experimental results conducted on eight instances involving IoT devices ranging from 60 to 200 demonstrate the effectiveness of MUDPRA in minimizing energy consumption of this system compared to six alternative algorithms and three benchmark systems.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103640"},"PeriodicalIF":4.4,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142096629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on security of UAV and deep reinforcement learning 无人机安全与深度强化学习调查
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1016/j.adhoc.2024.103642
Burcu Sönmez Sarıkaya, Şerif Bahtiyar

Recently, the use of unmanned aerial vehicles (UAV)s for accomplishing various tasks has gained a significant interest from both civilian and military organizations due to their adaptive, autonomous, and flexibility nature in different environments. The characteristics of UAV systems introduce new threats from which cyber attacks may benefit. Adaptive security solutions for UAVs are required to counter the growing threat surface. The security of UAV systems has therefore become one of the fastest growing research topics. Machine learning based security mechanisms have a potential to provide effective countermeasures that complement traditional security mechanisms. The main motivation of this survey is to the lack of a comprehensive literature review about reinforcement learning based security solutions for UAV systems. In this paper, we present a comprehensive review on the security of UAV systems focusing on deep-reinforcement learning-based security solutions. We present a general architecture of an UAV system that includes communication systems to show potential sources of vulnerabilities. Then, the threat surface of UAV systems is explored. We explain attacks on UAV systems according to the threats in a systematic way. In addition, we present countermeasures in the literature for each attack on UAVs. Furthermore, traditional defense mechanisms are explained to highlight requirements for reinforcement based security solutions on UAVs. Next, we present the main reinforcement algorithms. We examine security solutions with reinforcement learning algorithms and their limitations in a holistic approach. We also identify research challenges about reinforcement based security solutions on UAVs. Briefly, this survey provides key guidelines on UAV systems, threats, attacks, reinforcement learning algorithms, the security of UAV systems, and research challenges.

最近,由于无人驾驶飞行器(UAV)在不同环境中的适应性、自主性和灵活性,利用无人驾驶飞行器完成各种任务的做法受到了民用和军用组织的极大关注。无人机系统的特点带来了新的威胁,网络攻击可能从中受益。需要为无人机提供自适应安全解决方案,以应对日益增长的威胁。因此,无人机系统的安全性已成为发展最快的研究课题之一。基于机器学习的安全机制有可能提供有效的应对措施,对传统安全机制进行补充。这项调查的主要动机是缺乏有关基于强化学习的无人机系统安全解决方案的全面文献综述。在本文中,我们对无人机系统的安全性进行了全面综述,重点关注基于深度强化学习的安全解决方案。我们介绍了包括通信系统在内的无人机系统的一般架构,以显示潜在的漏洞来源。然后,探讨了无人机系统的威胁面。我们根据威胁系统地解释了对无人机系统的攻击。此外,我们还介绍了针对无人机的每种攻击的文献对策。此外,我们还解释了传统的防御机制,以强调无人机对基于强化的安全解决方案的需求。接下来,我们将介绍主要的强化算法。我们从整体上研究了强化学习算法的安全解决方案及其局限性。我们还确定了无人机上基于强化的安全解决方案所面临的研究挑战。简而言之,本调查报告提供了有关无人机系统、威胁、攻击、强化学习算法、无人机系统安全和研究挑战的关键指南。
{"title":"A survey on security of UAV and deep reinforcement learning","authors":"Burcu Sönmez Sarıkaya,&nbsp;Şerif Bahtiyar","doi":"10.1016/j.adhoc.2024.103642","DOIUrl":"10.1016/j.adhoc.2024.103642","url":null,"abstract":"<div><p>Recently, the use of unmanned aerial vehicles (UAV)s for accomplishing various tasks has gained a significant interest from both civilian and military organizations due to their adaptive, autonomous, and flexibility nature in different environments. The characteristics of UAV systems introduce new threats from which cyber attacks may benefit. Adaptive security solutions for UAVs are required to counter the growing threat surface. The security of UAV systems has therefore become one of the fastest growing research topics. Machine learning based security mechanisms have a potential to provide effective countermeasures that complement traditional security mechanisms. The main motivation of this survey is to the lack of a comprehensive literature review about reinforcement learning based security solutions for UAV systems. In this paper, we present a comprehensive review on the security of UAV systems focusing on deep-reinforcement learning-based security solutions. We present a general architecture of an UAV system that includes communication systems to show potential sources of vulnerabilities. Then, the threat surface of UAV systems is explored. We explain attacks on UAV systems according to the threats in a systematic way. In addition, we present countermeasures in the literature for each attack on UAVs. Furthermore, traditional defense mechanisms are explained to highlight requirements for reinforcement based security solutions on UAVs. Next, we present the main reinforcement algorithms. We examine security solutions with reinforcement learning algorithms and their limitations in a holistic approach. We also identify research challenges about reinforcement based security solutions on UAVs. Briefly, this survey provides key guidelines on UAV systems, threats, attacks, reinforcement learning algorithms, the security of UAV systems, and research challenges.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103642"},"PeriodicalIF":4.4,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142096624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FIDWATCH: Federated incremental distillation for continuous monitoring of IoT security threats FIDWATCH:用于持续监控物联网安全威胁的联合增量提炼技术
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-27 DOI: 10.1016/j.adhoc.2024.103637
Ibrahim Alrashdi , Karam M. Sallam , Majed Abdullah Alrowaily , Omar Alruwaili , Bilal Arain

The fast evolutions of Internet of Things (IoT) technologies have been accelerating their applicability in different sectors of life and becoming a pillar for sustainable development. However, this revolutionary expansion led to a substantial increase in attack surface, raising many concerns about security threats and their possible consequences. Machine learning has significantly contributed to designing intrusion detection systems (IDS) but suffers from critical limitations such as data privacy and sovereignty, data imbalance, concept drift, and catastrophic forgetting. This collectively makes existing IDSs an improper choice for securing IoT environments. This paper presents a federated learning approach called FIDWATCH to continuously monitor and detect a broad range of IoT security threats. The local side of FIDWATCH introduces contrastive focal loss to enhance the ability of the local model (teacher) to discriminate between diverse types of IoT security threats while putting an increased emphasis on hard-to-classify samples. A fine-grained Knowledge Distillation (KD) is introduced to allow the client to distill the required teacher's knowledge into a lighter, more compact model termed the pupil model. This greatly assists the competence and flexibility of the model in resource-constrained scenarios. Furthermore, an adaptive incremental updating method is introduced in FIDWATCH to allow the global model to exploit the distilled knowledge and refine the shared dataset. This helps generate global anchors for improving the robustness of the mode against the distributional shift, thereby improving model alignment and compliance with the dynamics of IoT security threats. Proof-of-concept simulations are performed on data from two public datasets (BoT-IoT and ToN-IoT), demonstrating the superiority of FIDWATCH over cutting-edge performance with an average f1-score of 97.07% and 95.63%, respectively.

物联网(IoT)技术的快速发展加速了其在不同生活领域的应用,并成为可持续发展的支柱。然而,这种革命性的扩展导致攻击面大幅增加,引发了许多对安全威胁及其可能后果的担忧。机器学习为入侵检测系统(IDS)的设计做出了巨大贡献,但也存在一些严重的局限性,如数据隐私和主权、数据不平衡、概念漂移和灾难性遗忘。这一切都使得现有的 IDS 成为保护物联网环境安全的不当选择。本文提出了一种名为 FIDWATCH 的联合学习方法,用于持续监控和检测各种物联网安全威胁。FIDWATCH 的本地端引入了对比焦点损失,以增强本地模型(教师)区分不同类型物联网安全威胁的能力,同时更加重视难以分类的样本。引入了细粒度的知识蒸馏(KD),允许客户端将所需的教师知识蒸馏为更轻、更紧凑的模型(称为学生模型)。这大大提高了模型在资源受限情况下的能力和灵活性。此外,FIDWATCH 还引入了一种自适应增量更新方法,允许全局模型利用已提炼的知识并完善共享数据集。这有助于生成全局锚点,提高模式对分布变化的稳健性,从而改善模式的一致性并符合物联网安全威胁的动态变化。我们在两个公共数据集(BoT-IoT 和 ToN-IoT)的数据上进行了概念验证模拟,结果表明 FIDWATCH 优于尖端性能,平均 f1 分数分别为 97.07% 和 95.63%。
{"title":"FIDWATCH: Federated incremental distillation for continuous monitoring of IoT security threats","authors":"Ibrahim Alrashdi ,&nbsp;Karam M. Sallam ,&nbsp;Majed Abdullah Alrowaily ,&nbsp;Omar Alruwaili ,&nbsp;Bilal Arain","doi":"10.1016/j.adhoc.2024.103637","DOIUrl":"10.1016/j.adhoc.2024.103637","url":null,"abstract":"<div><p>The fast evolutions of Internet of Things (IoT) technologies have been accelerating their applicability in different sectors of life and becoming a pillar for sustainable development. However, this revolutionary expansion led to a substantial increase in attack surface, raising many concerns about security threats and their possible consequences. Machine learning has significantly contributed to designing intrusion detection systems (IDS) but suffers from critical limitations such as data privacy and sovereignty, data imbalance, concept drift, and catastrophic forgetting. This collectively makes existing IDSs an improper choice for securing IoT environments. This paper presents a federated learning approach called FIDWATCH to continuously monitor and detect a broad range of IoT security threats. The local side of FIDWATCH introduces contrastive focal loss to enhance the ability of the local model (teacher) to discriminate between diverse types of IoT security threats while putting an increased emphasis on hard-to-classify samples. A fine-grained Knowledge Distillation (KD) is introduced to allow the client to distill the required teacher's knowledge into a lighter, more compact model termed the pupil model. This greatly assists the competence and flexibility of the model in resource-constrained scenarios. Furthermore, an adaptive incremental updating method is introduced in FIDWATCH to allow the global model to exploit the distilled knowledge and refine the shared dataset. This helps generate global anchors for improving the robustness of the mode against the distributional shift, thereby improving model alignment and compliance with the dynamics of IoT security threats. Proof-of-concept simulations are performed on data from two public datasets (BoT-IoT and ToN-IoT), demonstrating the superiority of FIDWATCH over cutting-edge performance with an average f1-score of 97.07% and 95.63%, respectively.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"165 ","pages":"Article 103637"},"PeriodicalIF":4.4,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142129049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shared secret key extraction from atmospheric optical wireless channels with multi-scale information reconciliation 利用多尺度信息调和从大气光学无线信道中提取共享密钥
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-26 DOI: 10.1016/j.adhoc.2024.103638
Gang Pan , Chunyi Chen , Haifeng Yao , Xiaolong Ni , Xiaojuan Hu , Haiyang Yu , Qiong Li

Due to the impact of turbulence, atmospheric optical wireless channel exhibits characteristics such as time-varying, space-varying and natural randomness, which can be used as a common natural random source for shared secret key extraction. Wireless laser communication technology boasts advantages like high bandwidth and fast transmission, which is conducive to improving key generation rate. Additionally, the strong anti-interference of laser signal helps to reduce key disagreement rate. Moreover, the laser beam’s good directionality effectively decreases the risk of eavesdropping on key information. Given its advantages and a scarcity of research in this regard, this paper proposes a scheme of shared secret key extraction from atmospheric optical wireless channels with multi-scale information reconciliation. In the scheme, to increase the cross-correlation coefficient of signal samples at the two legitimate parties, a preprocessing algorithm is designed based on a denoising algorithm and a threshold-based outliers elimination algorithm, and the denoising algorithm is inspired by the Complete Ensemble Empirical Mode Decomposition with Adaptive Noise (CEEMDan); moreover, a multi-level quantization algorithm based on Equilibrium-Optimizer(EO) is developed to balance and optimize distribution of sample points in the sample space; furthermore, to simplify the process of and decrease the computational complexity of information reconciliation, a concept of a multi-scale information reconciliation is formed, on the basis of which three algorithms, B-MSIR, I-MSIR and C-MSIR, are formulated. Finally, its performance is verified by numerical simulations and experiments, and the results show it has better performance in terms of the key disagreement rate, the key generation rate and the key randomness compared with several state-of-the-art algorithms.

由于湍流的影响,大气光学无线信道具有时变、空变和自然随机等特性,可作为共享密钥提取的通用自然随机源。无线激光通信技术具有带宽高、传输速度快等优点,有利于提高密钥生成率。此外,激光信号的抗干扰性强,有助于降低密钥分歧率。此外,激光束的指向性好,能有效降低密钥信息被窃听的风险。鉴于其优势和这方面研究的稀缺性,本文提出了一种多尺度信息调和的大气光无线信道共享密钥提取方案。在该方案中,为了提高合法双方信号样本的交叉相关系数,设计了一种基于去噪算法和基于阈值的异常值消除算法的预处理算法,其中去噪算法借鉴了带自适应噪声的完全集合经验模式分解(CEEMDan);此外,为了简化信息调和过程并降低计算复杂度,提出了多尺度信息调和的概念,并在此基础上提出了 B-MSIR、I-MSIR 和 C-MSIR 三种算法。最后,通过数值模拟和实验验证了该算法的性能,结果表明,与几种最先进的算法相比,该算法在密钥分歧率、密钥生成率和密钥随机性方面都有更好的表现。
{"title":"Shared secret key extraction from atmospheric optical wireless channels with multi-scale information reconciliation","authors":"Gang Pan ,&nbsp;Chunyi Chen ,&nbsp;Haifeng Yao ,&nbsp;Xiaolong Ni ,&nbsp;Xiaojuan Hu ,&nbsp;Haiyang Yu ,&nbsp;Qiong Li","doi":"10.1016/j.adhoc.2024.103638","DOIUrl":"10.1016/j.adhoc.2024.103638","url":null,"abstract":"<div><p>Due to the impact of turbulence, atmospheric optical wireless channel exhibits characteristics such as time-varying, space-varying and natural randomness, which can be used as a common natural random source for shared secret key extraction. Wireless laser communication technology boasts advantages like high bandwidth and fast transmission, which is conducive to improving key generation rate. Additionally, the strong anti-interference of laser signal helps to reduce key disagreement rate. Moreover, the laser beam’s good directionality effectively decreases the risk of eavesdropping on key information. Given its advantages and a scarcity of research in this regard, this paper proposes a scheme of shared secret key extraction from atmospheric optical wireless channels with multi-scale information reconciliation. In the scheme, to increase the cross-correlation coefficient of signal samples at the two legitimate parties, a preprocessing algorithm is designed based on a denoising algorithm and a threshold-based outliers elimination algorithm, and the denoising algorithm is inspired by the Complete Ensemble Empirical Mode Decomposition with Adaptive Noise (CEEMDan); moreover, a multi-level quantization algorithm based on Equilibrium-Optimizer(EO) is developed to balance and optimize distribution of sample points in the sample space; furthermore, to simplify the process of and decrease the computational complexity of information reconciliation, a concept of a multi-scale information reconciliation is formed, on the basis of which three algorithms, B-MSIR, I-MSIR and C-MSIR, are formulated. Finally, its performance is verified by numerical simulations and experiments, and the results show it has better performance in terms of the key disagreement rate, the key generation rate and the key randomness compared with several state-of-the-art algorithms.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103638"},"PeriodicalIF":4.4,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142088660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobility-aware parallel offloading and resource allocation scheme for vehicular edge computing 面向车载边缘计算的移动感知并行卸载和资源分配方案
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-26 DOI: 10.1016/j.adhoc.2024.103639
Rui Men , Xiumei Fan , Kok-Lim Alvin Yau , Axida Shan , Yan Xiao

Vehicle edge computing (VEC) enhances the distributed task processing capability within intelligent vehicle-infrastructure cooperative systems (i-VICS) by deploying servers at the network edge. However, the proliferation of onboard sensors and the continual emergence of new applications have exacerbated the inadequacy of wireless spectrum resources and edge server resources, while the high mobility of vehicles reduces reliability in task processing, resulting in increased communication and task processing delays. To address these challenges, we propose a mobile-aware Many-to-Many Parallel (MTMP) offloading scheme that integrates: a) millimeter-wave (mmWave) and cellular vehicle-to-everything (C-V2X) to mitigate excessive communication delays; and b) leveraging the underutilized resources of surrounding vehicles and parallel offloading to mitigate excessive task processing delays. To minimize the average completion delay of all tasks, this paper formulates the objective as a min-max optimization problem and solves it using the maximum entropy method (MEM), the Lagrange multiplier method, and an iterative algorithm. Extensive experimental results demonstrate the superior performance of the proposed scheme in comparison with other baseline algorithms. Specifically, our proposal achieves a 47 % reduction in task completion delay under optimal conditions, a 31.3 % increase in task completion rate, and a 30 % decrease in program runtime compared to the worst-performing algorithm.

车辆边缘计算(VEC)通过在网络边缘部署服务器,增强了智能车辆-基础设施协同系统(i-VICS)的分布式任务处理能力。然而,车载传感器的激增和新应用的不断涌现加剧了无线频谱资源和边缘服务器资源的不足,同时车辆的高流动性降低了任务处理的可靠性,导致通信和任务处理延迟增加。为应对这些挑战,我们提出了一种移动感知的多对多并行(MTMP)卸载方案,该方案整合了:a) 毫米波(mmWave)和蜂窝车对万物(C-V2X),以缓解过长的通信延迟;b) 利用周围车辆未充分利用的资源和并行卸载,以缓解过长的任务处理延迟。为了最小化所有任务的平均完成延迟,本文将目标表述为最小最大优化问题,并使用最大熵法 (MEM)、拉格朗日乘法器法和迭代算法进行求解。广泛的实验结果表明,与其他基准算法相比,我们提出的方案性能优越。具体来说,与性能最差的算法相比,我们的建议在最佳条件下将任务完成延迟减少了 47%,任务完成率提高了 31.3%,程序运行时间减少了 30%。
{"title":"Mobility-aware parallel offloading and resource allocation scheme for vehicular edge computing","authors":"Rui Men ,&nbsp;Xiumei Fan ,&nbsp;Kok-Lim Alvin Yau ,&nbsp;Axida Shan ,&nbsp;Yan Xiao","doi":"10.1016/j.adhoc.2024.103639","DOIUrl":"10.1016/j.adhoc.2024.103639","url":null,"abstract":"<div><p>Vehicle edge computing (VEC) enhances the distributed task processing capability within intelligent vehicle-infrastructure cooperative systems (i-VICS) by deploying servers at the network edge. However, the proliferation of onboard sensors and the continual emergence of new applications have exacerbated the inadequacy of wireless spectrum resources and edge server resources, while the high mobility of vehicles reduces reliability in task processing, resulting in increased communication and task processing delays. To address these challenges, we propose a mobile-aware Many-to-Many Parallel (MTMP) offloading scheme that integrates: a) millimeter-wave (mmWave) and cellular vehicle-to-everything (C-V2X) to mitigate excessive communication delays; and b) leveraging the underutilized resources of surrounding vehicles and parallel offloading to mitigate excessive task processing delays. To minimize the average completion delay of all tasks, this paper formulates the objective as a min-max optimization problem and solves it using the maximum entropy method (MEM), the Lagrange multiplier method, and an iterative algorithm. Extensive experimental results demonstrate the superior performance of the proposed scheme in comparison with other baseline algorithms. Specifically, our proposal achieves a 47 % reduction in task completion delay under optimal conditions, a 31.3 % increase in task completion rate, and a 30 % decrease in program runtime compared to the worst-performing algorithm.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103639"},"PeriodicalIF":4.4,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142096630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Ad Hoc Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1