首页 > 最新文献

Ad Hoc Networks最新文献

英文 中文
Task offloading in satellite–MEC networks for latency-sensitive IoT applications: A martingale-based game approach 针对延迟敏感物联网应用的卫星- mec网络任务卸载:基于鞅的游戏方法
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-24 DOI: 10.1016/j.adhoc.2025.104052
Xintong Pei , Zhenjiang Zhang , HanChieh Chao , Zihang Yu , Wenhui Wang
To address the growing demand for latency-sensitive Internet of Things (IoT) applications in remote regions, satellite–integrated mobile edge computing (SMEC) deploys computational resources on Low Earth Orbit (LEO) satellites to provide seamless network access and edge computing services for IoT devices lacking terrestrial network coverage. However, ensuring quality of service (QoS) for latency-sensitive tasks in SMEC systems remains challenging due to two critical limitations: existing deterministic models cannot adequately capture the stochastic nature of discontinuous satellite–ground links, leading to inaccurate queuing delay predictions, and current approaches fail to adapt to dynamic user task preferences that significantly impact offloading effectiveness. In response to these challenges, this paper develops a novel dynamic task offloading framework that integrates martingale-based delay analysis with adaptive game-theoretic optimization. We employ Markov Chain Monte Carlo (MCMC) methods to characterize discontinuous satellite–ground stochastic service processes and apply martingale theory to derive tight statistical delay guarantees that significantly outperform conventional moment generating function approaches. Based on this analytical foundation, we formulate multi-task offloading as an exact potential game and propose the Temporal-Enhanced Stochastic Learning (TESL) algorithm, which leverages historical trend learning and environmental dynamics detection to achieve robust convergence in non-stationary environments. Experimental results demonstrate that TESL achieves a 37% lower delay violation probability compared to the best-performing baseline algorithm, exhibiting superior convergence efficiency and adaptability while improving utility, making it well-suited for practical SMEC deployments.
为了满足偏远地区对延迟敏感的物联网(IoT)应用日益增长的需求,卫星集成移动边缘计算(SMEC)将计算资源部署在低地球轨道(LEO)卫星上,为缺乏地面网络覆盖的物联网设备提供无缝网络接入和边缘计算服务。然而,由于两个关键的限制,确保SMEC系统中延迟敏感任务的服务质量(QoS)仍然具有挑战性:现有的确定性模型不能充分捕捉不连续卫星-地面链路的随机性,导致不准确的排队延迟预测,以及当前的方法不能适应动态用户任务偏好,这将显著影响卸载效率。针对这些挑战,本文开发了一种新的动态任务卸载框架,该框架将基于鞅的延迟分析与自适应博弈论优化相结合。我们采用马尔可夫链蒙特卡罗(MCMC)方法来表征不连续的卫星-地面随机服务过程,并应用鞅理论推导出严格的统计延迟保证,显著优于传统的矩生成函数方法。基于此分析基础,我们将多任务卸载作为一种精确的潜在博弈,并提出了时间增强随机学习(TESL)算法,该算法利用历史趋势学习和环境动态检测来实现非平稳环境下的鲁棒收敛。实验结果表明,与性能最好的基线算法相比,TESL算法的延迟违反概率降低了37%,在提高效用的同时表现出优越的收敛效率和适应性,非常适合实际的SMEC部署。
{"title":"Task offloading in satellite–MEC networks for latency-sensitive IoT applications: A martingale-based game approach","authors":"Xintong Pei ,&nbsp;Zhenjiang Zhang ,&nbsp;HanChieh Chao ,&nbsp;Zihang Yu ,&nbsp;Wenhui Wang","doi":"10.1016/j.adhoc.2025.104052","DOIUrl":"10.1016/j.adhoc.2025.104052","url":null,"abstract":"<div><div>To address the growing demand for latency-sensitive Internet of Things (IoT) applications in remote regions, satellite–integrated mobile edge computing (SMEC) deploys computational resources on Low Earth Orbit (LEO) satellites to provide seamless network access and edge computing services for IoT devices lacking terrestrial network coverage. However, ensuring quality of service (QoS) for latency-sensitive tasks in SMEC systems remains challenging due to two critical limitations: existing deterministic models cannot adequately capture the stochastic nature of discontinuous satellite–ground links, leading to inaccurate queuing delay predictions, and current approaches fail to adapt to dynamic user task preferences that significantly impact offloading effectiveness. In response to these challenges, this paper develops a novel dynamic task offloading framework that integrates martingale-based delay analysis with adaptive game-theoretic optimization. We employ Markov Chain Monte Carlo (MCMC) methods to characterize discontinuous satellite–ground stochastic service processes and apply martingale theory to derive tight statistical delay guarantees that significantly outperform conventional moment generating function approaches. Based on this analytical foundation, we formulate multi-task offloading as an exact potential game and propose the Temporal-Enhanced Stochastic Learning (TESL) algorithm, which leverages historical trend learning and environmental dynamics detection to achieve robust convergence in non-stationary environments. Experimental results demonstrate that TESL achieves a 37% lower delay violation probability compared to the best-performing baseline algorithm, exhibiting superior convergence efficiency and adaptability while improving utility, making it well-suited for practical SMEC deployments.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"181 ","pages":"Article 104052"},"PeriodicalIF":4.8,"publicationDate":"2025-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145419847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LSTMO-MADDPG: A system for intelligent computation offloading in UAV-enabled MEC in next generation networks LSTMO-MADDPG:下一代网络中支持无人机的MEC智能计算卸载系统
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-24 DOI: 10.1016/j.adhoc.2025.104061
Amita Chauhan, Rijul Tandon, Sakshi Kaushal, Harish Kumar
The advent of next generation networks designated as 5G and beyond signifies a revolution in wireless communications technology. They are intended to overcome the shortcomings of earlier generations with extraordinary degrees of speed, connectivity, and dependability. The integration of Unmanned Aerial Vehicles (UAVs) into new-generation communication networks results in numerous advantages, advancing the capabilities, coverage, and performance of networks. The incorporation of UAVs into Mobile Edge Computing (MEC) frameworks adds another dimension of flexibility and adaptability. A primary obstacle in UAV-supported MEC systems involves efficiently offloading computational tasks from mobile devices to nearby UAVs serving as edge servers. This paper introduces a new method for efficient computation offloading in Multi-UAV-Enabled MEC systems based on decision-making abilities of hierarchical Deep Deterministic Policy Gradient (DDPG) and forecasting abilities of Long Short-Term Memory (LSTM) networks. The proposed method is called LSTM Optimized Multi-Agent DDPG (LSTMO-MADDPG), and includes three modules, i.e., High-Level DDPG, LSTM Refiner and Low-Level DDPG. The technique is intended to improve the efficiency and reliability of computation offloading which is pivotal for next-generation networks. A large number of simulations prove considerable improvements in terms of latency minimization, energy saving, and throughput relative to several existing approaches. The implementation is publicly available on Github, ensuring reproducibility. This approach advances efficient task offloading, enhancing system performance in next-generation networks.
5G及以上下一代网络的出现标志着无线通信技术的一场革命。它们旨在以非凡的速度、连接性和可靠性来克服前几代产品的缺点。将无人驾驶飞行器(uav)集成到新一代通信网络中会带来许多优势,提高网络的能力、覆盖范围和性能。将无人机整合到移动边缘计算(MEC)框架中增加了灵活性和适应性的另一个维度。无人机支持的MEC系统的一个主要障碍是如何有效地将计算任务从移动设备卸载到附近作为边缘服务器的无人机上。介绍了一种基于分层深度确定性策略梯度(DDPG)决策能力和长短期记忆(LSTM)网络预测能力的多无人机MEC系统高效计算卸载方法。该方法被称为LSTM优化多agent DDPG (LSTMO-MADDPG),包括高层次DDPG、LSTM细化器和低层次DDPG三个模块。该技术旨在提高计算卸载的效率和可靠性,这对下一代网络至关重要。大量的模拟证明,相对于几种现有方法,该方法在最小化延迟、节能和吞吐量方面有相当大的改进。实现在Github上是公开的,确保了可重复性。这种方法推进了高效的任务卸载,提高了下一代网络的系统性能。
{"title":"LSTMO-MADDPG: A system for intelligent computation offloading in UAV-enabled MEC in next generation networks","authors":"Amita Chauhan,&nbsp;Rijul Tandon,&nbsp;Sakshi Kaushal,&nbsp;Harish Kumar","doi":"10.1016/j.adhoc.2025.104061","DOIUrl":"10.1016/j.adhoc.2025.104061","url":null,"abstract":"<div><div>The advent of next generation networks designated as 5G and beyond signifies a revolution in wireless communications technology. They are intended to overcome the shortcomings of earlier generations with extraordinary degrees of speed, connectivity, and dependability. The integration of Unmanned Aerial Vehicles (UAVs) into new-generation communication networks results in numerous advantages, advancing the capabilities, coverage, and performance of networks. The incorporation of UAVs into Mobile Edge Computing (MEC) frameworks adds another dimension of flexibility and adaptability. A primary obstacle in UAV-supported MEC systems involves efficiently offloading computational tasks from mobile devices to nearby UAVs serving as edge servers. This paper introduces a new method for efficient computation offloading in Multi-UAV-Enabled MEC systems based on decision-making abilities of hierarchical Deep Deterministic Policy Gradient (DDPG) and forecasting abilities of Long Short-Term Memory (LSTM) networks. The proposed method is called LSTM Optimized Multi-Agent DDPG (LSTMO-MADDPG), and includes three modules, i.e., High-Level DDPG, LSTM Refiner and Low-Level DDPG. The technique is intended to improve the efficiency and reliability of computation offloading which is pivotal for next-generation networks. A large number of simulations prove considerable improvements in terms of latency minimization, energy saving, and throughput relative to several existing approaches. The implementation is publicly available on <span><span>Github</span><svg><path></path></svg></span>, ensuring reproducibility. This approach advances efficient task offloading, enhancing system performance in next-generation networks.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"181 ","pages":"Article 104061"},"PeriodicalIF":4.8,"publicationDate":"2025-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145419842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Routing algorithm for LWSN in natural disaster environmental monitoring along railway lines 铁路沿线自然灾害环境监测中LWSN的路由算法
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-23 DOI: 10.1016/j.adhoc.2025.104060
Decang Li , Zhaoji Niu , Zixian Qu , Xiaoqiang Chen , Ruxun Xu
Aiming at the “energy hole” problem caused by high energy consumption of linear wireless sensor networks in the environmental detection of natural disasters along high-speed railways, a routing algorithm based on weighted least squares estimation method and particle swarm optimization theory is proposed. Firstly, a node residual energy estimation model based on adaptive unscented Kalman filter estimation is established according to the historical data of node residual energy. The parameters are estimated by dynamically adjusting the weights of the observation data, and the weighted residual sum of squares is minimized to handle data heterogeneity and adapt to the dynamic changes of node residual energy. At the same time, the observation values and design matrices are continuously updated to estimate the node residual energy in real time and accurately, optimize network resource management, and extend the network lifetime. Secondly, the fitness function is constructed by defining the node residual energy estimation factor and the cluster compactness evaluation factor. The initial position distribution of the particle swarm is improved by using the Logistic-Tent chaotic map to expand the local search range and accelerate the convergence speed of global search. The simulated annealing operation is introduced, and the Metropolis criterion of the Golden Sine Simulated Annealing (GSSA) algorithm is used to guide the population to accept new solutions or old solutions with a certain probability, thereby ensuring that the algorithm can continuously perform global optimization, reducing the risk of premature convergence and falling into local optimal solutions, and obtaining the optimal solution set of cluster heads. Finally, the data transmission of cluster head nodes is based on the Dijkstra algorithm to obtain the optimal main path from the source node to the Sink node. Simulation test results show that compared with the LEACH algorithm, IACO algorithm, and GACR algorithm, the network lifetime of the proposed method is extended by 97.62%, 40.69%, and 18.61%, respectively. The research results provide a reference basis for further optimizing the wireless sensor network for high-speed railway environmental detection and ensuring the safe operation of high-speed railways.
针对高速铁路沿线自然灾害环境检测中线性无线传感器网络高能耗造成的“能量空洞”问题,提出了一种基于加权最小二乘估计法和粒子群优化理论的路由算法。首先,根据节点剩余能量的历史数据,建立了基于自适应无气味卡尔曼滤波估计的节点剩余能量估计模型;该方法通过动态调整观测数据的权值来估计参数,并将加权残差平方和最小化,以处理数据的异质性,适应节点残差能量的动态变化。同时,不断更新观测值和设计矩阵,实时准确地估计节点剩余能量,优化网络资源管理,延长网络寿命。其次,通过定义节点剩余能量估计因子和聚类紧密度评价因子构造适应度函数;利用Logistic-Tent混沌映射改进粒子群的初始位置分布,扩大了局部搜索范围,加快了全局搜索的收敛速度。引入模拟退火操作,利用金正弦模拟退火(Golden Sine simulation退火,GSSA)算法的Metropolis准则,引导种群以一定的概率接受新解或旧解,从而保证算法能够持续进行全局优化,降低过早收敛和陷入局部最优解的风险,获得簇头最优解集。最后,簇头节点的数据传输基于Dijkstra算法,以获得从源节点到汇聚节点的最优主路径。仿真测试结果表明,与LEACH算法、IACO算法和GACR算法相比,该方法的网络寿命分别延长了97.62%、40.69%和18.61%。研究结果为进一步优化高速铁路环境检测无线传感器网络,保障高速铁路安全运行提供了参考依据。
{"title":"Routing algorithm for LWSN in natural disaster environmental monitoring along railway lines","authors":"Decang Li ,&nbsp;Zhaoji Niu ,&nbsp;Zixian Qu ,&nbsp;Xiaoqiang Chen ,&nbsp;Ruxun Xu","doi":"10.1016/j.adhoc.2025.104060","DOIUrl":"10.1016/j.adhoc.2025.104060","url":null,"abstract":"<div><div>Aiming at the “energy hole” problem caused by high energy consumption of linear wireless sensor networks in the environmental detection of natural disasters along high-speed railways, a routing algorithm based on weighted least squares estimation method and particle swarm optimization theory is proposed. Firstly, a node residual energy estimation model based on adaptive unscented Kalman filter estimation is established according to the historical data of node residual energy. The parameters are estimated by dynamically adjusting the weights of the observation data, and the weighted residual sum of squares is minimized to handle data heterogeneity and adapt to the dynamic changes of node residual energy. At the same time, the observation values and design matrices are continuously updated to estimate the node residual energy in real time and accurately, optimize network resource management, and extend the network lifetime. Secondly, the fitness function is constructed by defining the node residual energy estimation factor and the cluster compactness evaluation factor. The initial position distribution of the particle swarm is improved by using the Logistic-Tent chaotic map to expand the local search range and accelerate the convergence speed of global search. The simulated annealing operation is introduced, and the Metropolis criterion of the Golden Sine Simulated Annealing (GSSA) algorithm is used to guide the population to accept new solutions or old solutions with a certain probability, thereby ensuring that the algorithm can continuously perform global optimization, reducing the risk of premature convergence and falling into local optimal solutions, and obtaining the optimal solution set of cluster heads. Finally, the data transmission of cluster head nodes is based on the Dijkstra algorithm to obtain the optimal main path from the source node to the Sink node. Simulation test results show that compared with the LEACH algorithm, IACO algorithm, and GACR algorithm, the network lifetime of the proposed method is extended by 97.62%, 40.69%, and 18.61%, respectively. The research results provide a reference basis for further optimizing the wireless sensor network for high-speed railway environmental detection and ensuring the safe operation of high-speed railways.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"181 ","pages":"Article 104060"},"PeriodicalIF":4.8,"publicationDate":"2025-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145419846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CLEHTO — A multi-layered algorithm for secure, adaptive data transmission in IoT-enhanced healthcare networks CLEHTO—一种在物联网增强的医疗保健网络中用于安全、自适应数据传输的多层算法
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-18 DOI: 10.1016/j.adhoc.2025.104056
Sofiane Hamrioui , Angela Voinea Ciocan , Camil Adam Mohamed Hamrioui , Pascal Lorenz
The rapid growth of IoT in healthcare demands reliable, secure, and energy-efficient communication solutions. We propose CLEHTO, a novel cross-layer optimization framework that dynamically adapts to network conditions by integrating real-time energy monitoring, joint mobility–security assessment, and adaptive congestion control. Unlike conventional approaches, CLEHTO introduces a unified reliability scoring system that simultaneously evaluates physical channel quality, link reliability, node mobility, and transport-layer congestion. Experimental results demonstrate CLEHTO’s exceptional performance: a 92.8% Packet Delivery Ratio under 20% link failure while maintaining 4.5 Mbps throughput, a 98.6% authentication success rate using SSL/TLS (outperforming IPSec’s 98.3%), and optimal energy consumption of 0.55 mAh for battery-powered devices. CLEHTO maintains 105 ms latency (vs. IPSec’s 95 ms) for secure medical data flows, showing significant improvements over single-layer approaches. These results establish CLEHTO as a robust and efficient solution for IoT-based healthcare systems.
物联网在医疗保健领域的快速发展需要可靠、安全、节能的通信解决方案。我们提出了一种新的跨层优化框架CLEHTO,它通过集成实时能源监测、联合移动安全评估和自适应拥塞控制来动态适应网络条件。与传统方法不同,CLEHTO引入了一个统一的可靠性评分系统,可以同时评估物理信道质量、链路可靠性、节点移动性和传输层拥塞。实验结果证明了CLEHTO的卓越性能:在20%链路故障情况下,包投递率为92.8%,同时保持4.5 Mbps的吞吐量,使用SSL/TLS认证成功率为98.6%(优于IPSec的98.3%),电池供电设备的最佳能耗为0.55 mAh。对于安全的医疗数据流,CLEHTO保持了105毫秒的延迟(IPSec为95毫秒),与单层方法相比有了显著的改进。这些结果使CLEHTO成为基于物联网的医疗保健系统的强大而高效的解决方案。
{"title":"CLEHTO — A multi-layered algorithm for secure, adaptive data transmission in IoT-enhanced healthcare networks","authors":"Sofiane Hamrioui ,&nbsp;Angela Voinea Ciocan ,&nbsp;Camil Adam Mohamed Hamrioui ,&nbsp;Pascal Lorenz","doi":"10.1016/j.adhoc.2025.104056","DOIUrl":"10.1016/j.adhoc.2025.104056","url":null,"abstract":"<div><div>The rapid growth of IoT in healthcare demands reliable, secure, and energy-efficient communication solutions. We propose <strong>CLEHTO</strong>, a novel cross-layer optimization framework that dynamically adapts to network conditions by integrating real-time energy monitoring, joint mobility–security assessment, and adaptive congestion control. Unlike conventional approaches, CLEHTO introduces a unified reliability scoring system that simultaneously evaluates physical channel quality, link reliability, node mobility, and transport-layer congestion. Experimental results demonstrate CLEHTO’s exceptional performance: a 92.8% Packet Delivery Ratio under 20% link failure while maintaining 4.5 Mbps throughput, a 98.6% authentication success rate using SSL/TLS (outperforming IPSec’s 98.3%), and optimal energy consumption of 0.55 mAh for battery-powered devices. CLEHTO maintains 105 ms latency (vs. IPSec’s 95 ms) for secure medical data flows, showing significant improvements over single-layer approaches. These results establish CLEHTO as a robust and efficient solution for IoT-based healthcare systems.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"180 ","pages":"Article 104056"},"PeriodicalIF":4.8,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145364133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A patient-centric secure access control architecture with dynamic edge data integrity verification in Internet of Medical Things 医疗物联网中以患者为中心、具有动态边缘数据完整性验证的安全访问控制体系结构
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-17 DOI: 10.1016/j.adhoc.2025.104055
Keerat Kaur, Saifur Rahman, Shantanu Pal, Chandan Karmakar
In the Internet of Medical Things (IoMT), securing patient data access is critical, but must be achieved without overwhelming the limited computational resources of edge devices. While cryptographic methods and access policies are widely applied to secure medical data, existing solutions often assume high computational capacity, centralized infrastructure, or predefined key structures, which are not ideal for the heterogeneous and resource-constrained environments found in IoMT. In addition to security, patient-centricity is becoming an essential design principle, where patients must have control over who accesses their data and under what conditions. Similarly, edge computing has emerged as a means to reduce latency, but edge devices are often semi-trusted, exposed to physical threats, and limited in processing power, making them unsuitable for heavyweight integrity verification or outsourced computation. Therefore, this paper presents a lightweight, patient-centric architecture that unifies attribute-based access control, dynamic edge data integrity verification, and consent-driven sharing in a secure and scalable architecture. The system minimizes communication and computational overhead by eliminating predefined keys, restricting edge computation, and guaranteeing verifiable data delivery. The experimental results demonstrate efficient handling of tampered and untampered cases, achieving fast, verifiable, and secure access with minimal resource consumption. This paper offers a practical and integrative solution to ensure security without sacrificing lightweight performance in real-world IoMT deployments.
在医疗物联网(IoMT)中,确保患者数据访问至关重要,但必须在不压倒边缘设备有限计算资源的情况下实现。虽然加密方法和访问策略被广泛应用于保护医疗数据,但现有的解决方案通常采用高计算能力、集中式基础设施或预定义的密钥结构,这对于IoMT中的异构和资源受限环境来说并不理想。除了安全之外,以病人为中心正在成为一个基本的设计原则,病人必须控制谁在什么条件下访问他们的数据。类似地,边缘计算已经成为减少延迟的一种手段,但是边缘设备通常是半可信的,容易受到物理威胁,并且处理能力有限,因此不适合重量级完整性验证或外包计算。因此,本文提出了一个轻量级的、以患者为中心的架构,该架构将基于属性的访问控制、动态边缘数据完整性验证和同意驱动的共享统一在一个安全和可扩展的架构中。该系统通过消除预定义密钥、限制边缘计算和保证可验证的数据交付来最大限度地减少通信和计算开销。实验结果证明了对篡改和未篡改情况的有效处理,以最小的资源消耗实现了快速,可验证和安全的访问。本文提供了一种实用的集成解决方案,在不牺牲实际IoMT部署中的轻量级性能的情况下确保安全性。
{"title":"A patient-centric secure access control architecture with dynamic edge data integrity verification in Internet of Medical Things","authors":"Keerat Kaur,&nbsp;Saifur Rahman,&nbsp;Shantanu Pal,&nbsp;Chandan Karmakar","doi":"10.1016/j.adhoc.2025.104055","DOIUrl":"10.1016/j.adhoc.2025.104055","url":null,"abstract":"<div><div>In the Internet of Medical Things (IoMT), securing patient data access is critical, but must be achieved without overwhelming the limited computational resources of edge devices. While cryptographic methods and access policies are widely applied to secure medical data, existing solutions often assume high computational capacity, centralized infrastructure, or predefined key structures, which are not ideal for the heterogeneous and resource-constrained environments found in IoMT. In addition to security, patient-centricity is becoming an essential design principle, where patients must have control over who accesses their data and under what conditions. Similarly, edge computing has emerged as a means to reduce latency, but edge devices are often semi-trusted, exposed to physical threats, and limited in processing power, making them unsuitable for heavyweight integrity verification or outsourced computation. Therefore, this paper presents a lightweight, patient-centric architecture that unifies attribute-based access control, dynamic edge data integrity verification, and consent-driven sharing in a secure and scalable architecture. The system minimizes communication and computational overhead by eliminating predefined keys, restricting edge computation, and guaranteeing verifiable data delivery. The experimental results demonstrate efficient handling of tampered and untampered cases, achieving fast, verifiable, and secure access with minimal resource consumption. This paper offers a practical and integrative solution to ensure security without sacrificing lightweight performance in real-world IoMT deployments.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"180 ","pages":"Article 104055"},"PeriodicalIF":4.8,"publicationDate":"2025-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145364134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SDN-Qache: A Q-Learning-based Hybrid Caching Scheme in SDN-based Mobile Named Data Networks (MNDN) SDN-Qache:基于sdn的移动命名数据网络(MNDN)中基于q学习的混合缓存方案
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-15 DOI: 10.1016/j.adhoc.2025.104054
Shahid Md. Asif Iqbal , Asaduzzaman , Mohammad Ashfak Habib
In-network caching and name-based forwarding features of Named Data Networks (NDN) enable it to counteract the unstable connectivity and resource constraints problems of Mobile Ad Hoc Networks (MANET). The topology-aware and hybrid NDN caching schemes often struggle to adapt to dynamic topology changes in NDN-based MANET. Moreover, the decentralized nature of MANET leads the existing schemes, especially the hybrid ones that install multiple caching schemes in a node and select the best option at any given time, to become stuck with the local best scheme. Software-defined networking (SDN) is an approach that decouples and centralizes the control planes of nodes from the data planes. The centralized controller is connected to each node and is aware of the underlying cache state of each node. It can be programmed to recommend a global caching strategy to the nodes. Under such SDN-based NDN circumstances, the hybrid caching schemes that utilize identical parameters, such as hop-distance, to make caching decisions or that operate the cache based on the local best solution may undermine the efficient content retrieval in MANETs. A new hybrid caching strategy that can combine content and node attributes to make caching decisions under changing network contexts, such as varying resource availability or traffic load, is inevitable. Such a hybrid strategy can scale well in terms of network resource usage and optimizing network performance. In this direction, we propose a reinforcement learning-based hybrid caching scheme, namely SDN-Qache, that equips each router with a content-attribute-based and a node-attribute-based caching schemes and uses the Q-learning algorithm to pick the most suitable local caching option. The nodes communicate their local optimal caching choices to the controller, which utilizes the information to compute a global optimal solution and recommend it back to the nodes. Simulation reveals that SDN-Qache improves the PDR by approximately 10%, content retrieval latency by approximately 40%, retransmission ratio by approximately 8.5%, and cache replacement rate by approximately 70% compared to the reference strategies.
命名数据网络(NDN)的网内缓存和基于名称的转发特性使其能够解决移动自组网(MANET)的连接不稳定和资源限制问题。在基于NDN的MANET中,拓扑感知和混合NDN缓存方案往往难以适应动态拓扑变化。此外,MANET的分散性导致现有方案,特别是在一个节点上安装多个缓存方案并在任何给定时间选择最佳方案的混合方案,陷入局部最佳方案。软件定义网络(SDN)是一种将节点的控制平面与数据平面解耦和集中的方法。集中式控制器连接到每个节点,并了解每个节点的底层缓存状态。它可以被编程为向节点推荐全局缓存策略。在这种基于sdn的NDN环境下,使用相同参数(如跳距)进行缓存决策或基于局部最优解决方案操作缓存的混合缓存方案可能会破坏manet中有效的内容检索。一种新的混合缓存策略是不可避免的,它可以结合内容和节点属性,以便在不断变化的网络环境下做出缓存决策,比如资源可用性或流量负载的变化。这种混合策略在网络资源使用和优化网络性能方面可以很好地扩展。在这个方向上,我们提出了一种基于强化学习的混合缓存方案,即SDN-Qache,该方案为每个路由器配备基于内容属性和基于节点属性的缓存方案,并使用q -学习算法选择最合适的本地缓存选项。节点将它们的本地最优缓存选择传递给控制器,控制器利用这些信息计算出全局最优解决方案,并将其推荐给节点。仿真结果表明,与参考策略相比,SDN-Qache将PDR提高了约10%,内容检索延迟提高了约40%,重传率提高了约8.5%,缓存替换率提高了约70%。
{"title":"SDN-Qache: A Q-Learning-based Hybrid Caching Scheme in SDN-based Mobile Named Data Networks (MNDN)","authors":"Shahid Md. Asif Iqbal ,&nbsp;Asaduzzaman ,&nbsp;Mohammad Ashfak Habib","doi":"10.1016/j.adhoc.2025.104054","DOIUrl":"10.1016/j.adhoc.2025.104054","url":null,"abstract":"<div><div>In-network caching and name-based forwarding features of Named <em>Data</em> Networks (<em>NDN</em>) enable it to counteract the unstable connectivity and resource constraints problems of Mobile Ad Hoc Networks (<em>MANET</em>). The topology-aware and hybrid <em>NDN</em> caching schemes often struggle to adapt to dynamic topology changes in <em>NDN</em>-based <em>MANET</em>. Moreover, the decentralized nature of <em>MANET</em> leads the existing schemes, especially the hybrid ones that install multiple caching schemes in a node and select the best option at any given time, to become stuck with the local best scheme. Software-defined networking (<em>SDN</em>) is an approach that decouples and centralizes the control planes of nodes from the data planes. The centralized controller is connected to each node and is aware of the underlying cache state of each node. It can be programmed to recommend a global caching strategy to the nodes. Under such <em>SDN</em>-based <em>NDN</em> circumstances, the hybrid caching schemes that utilize identical parameters, such as hop-distance, to make caching decisions or that operate the cache based on the local best solution may undermine the efficient content retrieval in <em>MANET</em>s. A new hybrid caching strategy that can combine content and node attributes to make caching decisions under changing network contexts, such as varying resource availability or traffic load, is inevitable. Such a hybrid strategy can scale well in terms of network resource usage and optimizing network performance. In this direction, we propose a reinforcement learning-based hybrid caching scheme, namely <em>SDN-Qache</em>, that equips each router with a content-attribute-based and a node-attribute-based caching schemes and uses the <em>Q</em>-learning algorithm to pick the most suitable local caching option. The nodes communicate their local optimal caching choices to the controller, which utilizes the information to compute a global optimal solution and recommend it back to the nodes. Simulation reveals that <em>SDN-Qache</em> improves the <em>PDR</em> by approximately 10%, content retrieval latency by approximately 40%, retransmission ratio by approximately 8.5%, and cache replacement rate by approximately 70% compared to the reference strategies.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"180 ","pages":"Article 104054"},"PeriodicalIF":4.8,"publicationDate":"2025-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145322001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personalized trajectory privacy protection method based on Transformer-CGAN in mobile crowd sensing networks 移动人群传感网络中基于Transformer-CGAN的个性化轨迹隐私保护方法
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-13 DOI: 10.1016/j.adhoc.2025.104050
Xinya Yu, Qi Xu, Jianpo Li, Yunfeng Peng
Trajectory privacy is a critical issue in mobile crowd sensing (MCS) network, but existing methods ignore location sensitivity differences, making it difficult to achieve personalized protection. To this end, this paper proposes a personalized trajectory synthesis method (PTS-TCGAN) that fuses Transformer and conditional generative adversarial networks (CGAN). Firstly, the trajectory point sensitivity is evaluated by spatiotemporal features. Secondly, a sensitivity-based Transformer-CGAN model is introduced, which uses Transformer to capture spatiotemporal dependencies and generates high-quality synthetic trajectories through CGAN, which enhances trajectory privacy protection while improving the model’s utility. Meanwhile, the multi-task TrajLoss function is introduced to improve the accuracy of the synthetic trajectories. Finally, experiments on Foursquare NYC, T-Drive, and Geolife datasets show that the proposed method improves privacy preservation by at least 38% and utility by at least 10% compared to existing TrajGAN and LSTM-TrajGAN methods.
轨迹隐私是移动人群传感(MCS)网络中的一个关键问题,但现有方法忽略了位置敏感性差异,难以实现个性化保护。为此,本文提出了一种融合Transformer和条件生成对抗网络(CGAN)的个性化轨迹综合方法(PTS-TCGAN)。首先,利用时空特征评价轨迹点的灵敏度;其次,介绍了一种基于灵敏度的Transformer-CGAN模型,该模型利用Transformer捕获时空依赖关系,通过CGAN生成高质量的合成轨迹,在增强轨迹隐私保护的同时提高了模型的实用性。同时,引入多任务TrajLoss函数,提高合成轨迹的精度。最后,在Foursquare NYC、T-Drive和Geolife数据集上的实验表明,与现有的TrajGAN和LSTM-TrajGAN方法相比,所提出的方法将隐私保护提高了至少38%,实用性提高了至少10%。
{"title":"Personalized trajectory privacy protection method based on Transformer-CGAN in mobile crowd sensing networks","authors":"Xinya Yu,&nbsp;Qi Xu,&nbsp;Jianpo Li,&nbsp;Yunfeng Peng","doi":"10.1016/j.adhoc.2025.104050","DOIUrl":"10.1016/j.adhoc.2025.104050","url":null,"abstract":"<div><div>Trajectory privacy is a critical issue in mobile crowd sensing (MCS) network, but existing methods ignore location sensitivity differences, making it difficult to achieve personalized protection. To this end, this paper proposes a personalized trajectory synthesis method (PTS-TCGAN) that fuses Transformer and conditional generative adversarial networks (CGAN). Firstly, the trajectory point sensitivity is evaluated by spatiotemporal features. Secondly, a sensitivity-based Transformer-CGAN model is introduced, which uses Transformer to capture spatiotemporal dependencies and generates high-quality synthetic trajectories through CGAN, which enhances trajectory privacy protection while improving the model’s utility. Meanwhile, the multi-task TrajLoss function is introduced to improve the accuracy of the synthetic trajectories. Finally, experiments on Foursquare NYC, T-Drive, and Geolife datasets show that the proposed method improves privacy preservation by at least 38% and utility by at least 10% compared to existing TrajGAN and LSTM-TrajGAN methods.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"180 ","pages":"Article 104050"},"PeriodicalIF":4.8,"publicationDate":"2025-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145321999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VPrWS: Vision transformer-based prototypical network with cross-inductive bias distillation for cross-domain wireless human sensing 基于视觉变压器的交叉感应偏置蒸馏跨域无线人体传感原型网络
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-13 DOI: 10.1016/j.adhoc.2025.104049
Phuoc Nguyen T.H. , Minh Tuan Pham
Wireless-based human sensing (WHS) is a powerful technique for device-free activity recognition. It analyzes channel state information (CSI) extracted from wireless signals. However, domain shift remains a major challenge, as performance degrades significantly when models are applied across users, environments, or locations. Few-shot learning (FSL) offers a practical solution by enabling rapid adaptation using limited labeled samples. Among FSL approaches, Prototypical Networks (PNs) are favored for their simplicity and effectiveness in low-data regimes. However, due to the heterogeneous nature of CSI data, constructing a robust and semantically meaningful prototype metric space remains challenging.
To address this issue, we propose VPrWS, a system that integrates a prototypical network (PN) with a vision transformer (ViT) and employs cross-inductive-bias knowledge distillation to enrich the prototype space. Specifically, we develop a knowledge distillation framework for PNs that induces complementary inductive biases from bidirectional long short-term memory (BiLSTM)- and convolutional neural network (CNN)-based PNs to a ViT-based PN. This approach yields a more robust and semantically structured metric space, especially in the context of CSI data, thereby improving cross-domain WHS performance without materially increasing inference time. Evaluations on three public CSI datasets under both in-domain and cross-domain settings demonstrate that VPrWS consistently outperforms existing representative baselines.
基于无线的人体传感(WHS)是一种强大的无设备活动识别技术。它分析从无线信号中提取的信道状态信息(CSI)。然而,领域转移仍然是一个主要的挑战,因为当模型跨用户、环境或位置应用时,性能会显著下降。少射学习(FSL)提供了一个实用的解决方案,使快速适应使用有限的标记样本。在FSL方法中,原型网络(PNs)因其在低数据环境下的简单性和有效性而受到青睐。然而,由于CSI数据的异构性,构建一个鲁棒和语义上有意义的原型度量空间仍然是一个挑战。为了解决这一问题,我们提出了VPrWS系统,该系统将原型网络(PN)与视觉变压器(ViT)相结合,并采用交叉感应偏置知识蒸馏来丰富原型空间。具体来说,我们开发了一个知识蒸馏框架,将基于双向长短期记忆(BiLSTM)和卷积神经网络(CNN)的PN诱导为基于vit的PN的互补归纳偏差。这种方法产生了一个更加健壮和语义结构化的度量空间,特别是在CSI数据的上下文中,从而在不显著增加推理时间的情况下提高了跨域WHS性能。在域内和跨域设置下对三个公共CSI数据集的评估表明,VPrWS始终优于现有的代表性基线。
{"title":"VPrWS: Vision transformer-based prototypical network with cross-inductive bias distillation for cross-domain wireless human sensing","authors":"Phuoc Nguyen T.H. ,&nbsp;Minh Tuan Pham","doi":"10.1016/j.adhoc.2025.104049","DOIUrl":"10.1016/j.adhoc.2025.104049","url":null,"abstract":"<div><div>Wireless-based human sensing (WHS) is a powerful technique for device-free activity recognition. It analyzes channel state information (CSI) extracted from wireless signals. However, domain shift remains a major challenge, as performance degrades significantly when models are applied across users, environments, or locations. Few-shot learning (FSL) offers a practical solution by enabling rapid adaptation using limited labeled samples. Among FSL approaches, Prototypical Networks (PNs) are favored for their simplicity and effectiveness in low-data regimes. However, due to the heterogeneous nature of CSI data, constructing a robust and semantically meaningful prototype metric space remains challenging.</div><div>To address this issue, we propose VPrWS, a system that integrates a prototypical network (PN) with a vision transformer (ViT) and employs cross-inductive-bias knowledge distillation to enrich the prototype space. Specifically, we develop a knowledge distillation framework for PNs that induces complementary inductive biases from bidirectional long short-term memory (BiLSTM)- and convolutional neural network (CNN)-based PNs to a ViT-based PN. This approach yields a more robust and semantically structured metric space, especially in the context of CSI data, thereby improving cross-domain WHS performance without materially increasing inference time. Evaluations on three public CSI datasets under both in-domain and cross-domain settings demonstrate that VPrWS consistently outperforms existing representative baselines.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"180 ","pages":"Article 104049"},"PeriodicalIF":4.8,"publicationDate":"2025-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145321996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IG-APSO-DNN: Deep learning intrusion detection model to detect false data injection attacks in smart grids IG-APSO-DNN:用于检测智能电网虚假数据注入攻击的深度学习入侵检测模型
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-13 DOI: 10.1016/j.adhoc.2025.104053
Saad Hammood Mohammed , Mandeep S. Jit Singh , Abdulmajeed Al-Jumaily , Mohammad Tariqul Islam , Md. Shabiul Islam , Abdulmajeed M. Alenezi , Mohamad A. Alawad , Muaadh A. Alsoufi
False Data Injection Attacks (FDIAs) present a significant threat to smart grids by manipulating measurement data, which may lead control centers to make incorrect operational decisions. Accurate and efficient detection of FDIAs is critical for ensuring reliable grid operation. Existing deep learning approaches often fail to capture both short-term local features and long-term dependencies in power grid data, and they typically show weak correlations with past and future time series information, reducing the trustworthiness of detection results. Similarly, conventional Intrusion Detection Systems (IDS) struggle to detect advanced FDIAs due to their reliance on predefined signatures and rule-based mechanisms. To overcome these limitations, we propose IG-APSO-DNN, a two-stage deep learning model for detecting FDIAs in smart grids. The first stage employs Information Gain (IG) and Adaptive Particle Swarm Optimization (APSO) for feature selection, reducing data dimensionality and improving model efficiency. The second stage uses a Deep Neural Network (DNN) to effectively capture both spatial and temporal patterns in smart grid measurements. The proposed model is evaluated on the Industrial Control System (ICS) Cyber Attack Power System Dataset, which simulates various FDIA scenarios. Results demonstrate that IG-APSO-DNN significantly outperforms traditional methods, improving key performance metrics including detection accuracy, precision, recall, and F-measure, while ensuring reliable operation of the smart grid. This study presents a robust anomaly-based IDS framework and highlights future directions, such as real-world validation, adaptive learning, exploration of novel optimization algorithms, and addressing scalability and real-time processing challenges.
虚假数据注入攻击(FDIAs)通过操纵测量数据对智能电网构成重大威胁,可能导致控制中心做出错误的运营决策。准确、高效地检测外来干扰对保证电网的可靠运行至关重要。现有的深度学习方法往往无法同时捕获电网数据中的短期局部特征和长期依赖关系,并且它们通常与过去和未来的时间序列信息表现出较弱的相关性,从而降低了检测结果的可信度。同样,传统的入侵检测系统(IDS)由于依赖于预定义的签名和基于规则的机制而难以检测高级入侵。为了克服这些限制,我们提出了一种用于检测智能电网中fdi的两阶段深度学习模型IG-APSO-DNN。第一阶段采用信息增益(IG)和自适应粒子群优化(APSO)进行特征选择,降低数据维数,提高模型效率。第二阶段使用深度神经网络(DNN)来有效地捕获智能电网测量中的空间和时间模式。该模型在工业控制系统(ICS)网络攻击电力系统数据集上进行了评估,该数据集模拟了各种FDIA场景。结果表明,IG-APSO-DNN显著优于传统方法,在确保智能电网可靠运行的同时,提高了检测准确度、精密度、召回率和F-measure等关键性能指标。本研究提出了一个鲁棒的基于异常的IDS框架,并强调了未来的发展方向,如现实世界的验证、自适应学习、探索新的优化算法,以及解决可扩展性和实时处理挑战。
{"title":"IG-APSO-DNN: Deep learning intrusion detection model to detect false data injection attacks in smart grids","authors":"Saad Hammood Mohammed ,&nbsp;Mandeep S. Jit Singh ,&nbsp;Abdulmajeed Al-Jumaily ,&nbsp;Mohammad Tariqul Islam ,&nbsp;Md. Shabiul Islam ,&nbsp;Abdulmajeed M. Alenezi ,&nbsp;Mohamad A. Alawad ,&nbsp;Muaadh A. Alsoufi","doi":"10.1016/j.adhoc.2025.104053","DOIUrl":"10.1016/j.adhoc.2025.104053","url":null,"abstract":"<div><div>False Data Injection Attacks (FDIAs) present a significant threat to smart grids by manipulating measurement data, which may lead control centers to make incorrect operational decisions. Accurate and efficient detection of FDIAs is critical for ensuring reliable grid operation. Existing deep learning approaches often fail to capture both short-term local features and long-term dependencies in power grid data, and they typically show weak correlations with past and future time series information, reducing the trustworthiness of detection results. Similarly, conventional Intrusion Detection Systems (IDS) struggle to detect advanced FDIAs due to their reliance on predefined signatures and rule-based mechanisms. To overcome these limitations, we propose IG-APSO-DNN, a two-stage deep learning model for detecting FDIAs in smart grids. The first stage employs Information Gain (IG) and Adaptive Particle Swarm Optimization (APSO) for feature selection, reducing data dimensionality and improving model efficiency. The second stage uses a Deep Neural Network (DNN) to effectively capture both spatial and temporal patterns in smart grid measurements. The proposed model is evaluated on the Industrial Control System (ICS) Cyber Attack Power System Dataset, which simulates various FDIA scenarios. Results demonstrate that IG-APSO-DNN significantly outperforms traditional methods, improving key performance metrics including detection accuracy, precision, recall, and F-measure, while ensuring reliable operation of the smart grid. This study presents a robust anomaly-based IDS framework and highlights future directions, such as real-world validation, adaptive learning, exploration of novel optimization algorithms, and addressing scalability and real-time processing challenges.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"180 ","pages":"Article 104053"},"PeriodicalIF":4.8,"publicationDate":"2025-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145322056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Connection in the air: QoE-centric multi-hop transmission in UAV-assisted emergency communication system 空中连接:无人机辅助应急通信系统中以qos为中心的多跳传输
IF 4.8 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-11 DOI: 10.1016/j.adhoc.2025.104051
Weihao Sun , Hai Wang , Zhen Qin
In this paper, we investigate the multi-hop transmission scheme for quality of experience (QoE)-centric air-ground collaborative emergency communication system (ECS). In unmanned aerial vehicle (UAV) assisted communication, existing efforts focus on the quality of service (QoS) metric, such as fairness and throughput. The optimization mechanism centered on the QoS metric ignores the matching relationship between the transmission demands and achievable end-to-end (E2E) data rate, leading to an underutilized resource utilization. Considering the heterogeneous transmission demands, we apply general utility theory to portray model-free user satisfaction. Assuming the positions of users are previously unknown and network size may dynamically change, we focus on optimizing the UAV deployment and multi-hop transmission scheme to maximize the network-wide QoE while maintaining the regional coverage rate and connectivity. However, the formulated problem is a non-convex problem with the curse of dimensionality. To address this challenge, we propose a game-based best response algorithm for UAV deployment. The game-based many-to-many matching algorithm performs the multi-hop transmission scheme. Simulation results demonstrate that the proposed QoE-centric optimization method can efficiently improve the QoE performance compared to the existing QoS-centric multi-hop transmission algorithms. The proposed QoE optimization improves resource utilization without incurring additional system costs.
本文研究了以体验质量(QoE)为中心的空地协同应急通信系统(ECS)的多跳传输方案。在无人机辅助通信中,现有的工作主要集中在服务质量(QoS)度量上,如公平性和吞吐量。以QoS指标为中心的优化机制忽略了传输需求与可实现的端到端数据速率之间的匹配关系,导致资源利用率未得到充分利用。考虑到传输需求的异质性,我们运用一般效用理论来描述无模型用户满意度。在用户位置未知且网络规模可能发生动态变化的情况下,重点优化无人机部署和多跳传输方案,在保持区域覆盖率和连通性的前提下实现全网QoE最大化。然而,公式化问题是一个具有维数诅咒的非凸问题。为了解决这一挑战,我们提出了一种基于博弈的无人机部署最佳响应算法。基于游戏的多对多匹配算法执行多跳传输方案。仿真结果表明,与现有的以qos为中心的多跳传输算法相比,提出的以qos为中心的优化方法可以有效地提高QoE性能。建议的QoE优化提高了资源利用率,而不会产生额外的系统成本。
{"title":"Connection in the air: QoE-centric multi-hop transmission in UAV-assisted emergency communication system","authors":"Weihao Sun ,&nbsp;Hai Wang ,&nbsp;Zhen Qin","doi":"10.1016/j.adhoc.2025.104051","DOIUrl":"10.1016/j.adhoc.2025.104051","url":null,"abstract":"<div><div>In this paper, we investigate the multi-hop transmission scheme for quality of experience (QoE)-centric air-ground collaborative emergency communication system (ECS). In unmanned aerial vehicle (UAV) assisted communication, existing efforts focus on the quality of service (QoS) metric, such as fairness and throughput. The optimization mechanism centered on the QoS metric ignores the matching relationship between the transmission demands and achievable end-to-end (E2E) data rate, leading to an underutilized resource utilization. Considering the heterogeneous transmission demands, we apply general utility theory to portray model-free user satisfaction. Assuming the positions of users are previously unknown and network size may dynamically change, we focus on optimizing the UAV deployment and multi-hop transmission scheme to maximize the network-wide QoE while maintaining the regional coverage rate and connectivity. However, the formulated problem is a non-convex problem with the curse of dimensionality. To address this challenge, we propose a game-based best response algorithm for UAV deployment. The game-based many-to-many matching algorithm performs the multi-hop transmission scheme. Simulation results demonstrate that the proposed QoE-centric optimization method can efficiently improve the QoE performance compared to the existing QoS-centric multi-hop transmission algorithms. The proposed QoE optimization improves resource utilization without incurring additional system costs.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"180 ","pages":"Article 104051"},"PeriodicalIF":4.8,"publicationDate":"2025-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145364132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Ad Hoc Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1