首页 > 最新文献

China Communications最新文献

英文 中文
MTCR-CR routing strategy for connection-oriented routing over satellite networks 卫星网络上面向连接的 MTCR-CR 路由策略
IF 4.1 3区 计算机科学 Q1 Engineering Pub Date : 2024-05-01 DOI: 10.23919/JCC.ea.2021-0646.202401
Changhao Li, Sun Xue, Yan Lei, Cao Suzhi
The high-speed movement of satellites makes it not feasible to directly apply the mature routing scheme on the ground to the satellite network. DT-DVTR in the snapshot-based connection-oriented routing strategy is one of the representative solutions, but it still has room for improvement in terms of routing stability. In this paper, we propose an improved scheme for connection-oriented routing strategy named the Minimal Topology Change Routing based on Collaborative Rules (MTCR-CR). The MTCR-CR uses continuous time static topology snapshots based on satellite status to search for intersatellite link(ISL) construction solutions that meet the minimum number of topology changes to avoid route oscillations. The simulation results in Beidou-3 show that compared with DT-DVTR, MTCR-CR reduces the number of routing changes by about 92%, the number of path changes caused by routing changes is about 38%, and the rerouting time is reduced by approximately 47%. At the same time, in order to show our algorithm more comprehensively, the same experimental index test was also carried out on the Globalstar satellite constellation.
卫星的高速移动使得将地面上成熟的路由方案直接应用于卫星网络并不可行。基于快照的面向连接路由策略中的 DT-DVTR 是具有代表性的方案之一,但在路由稳定性方面仍有改进空间。本文提出了一种面向连接路由策略的改进方案,即基于协作规则的最小拓扑变化路由(MTCR-CR)。MTCR-CR 利用基于卫星状态的连续时间静态拓扑快照来搜索满足最小拓扑变化次数的卫星间链路(ISL)构建方案,以避免路由振荡。北斗三号的仿真结果表明,与DT-DVTR相比,MTCR-CR减少了约92%的路由变化次数,由路由变化引起的路径变化次数约为38%,重路由时间减少了约47%。同时,为了更全面地展示我们的算法,还在 Globalstar 卫星星座上进行了相同的实验指标测试。
{"title":"MTCR-CR routing strategy for connection-oriented routing over satellite networks","authors":"Changhao Li, Sun Xue, Yan Lei, Cao Suzhi","doi":"10.23919/JCC.ea.2021-0646.202401","DOIUrl":"https://doi.org/10.23919/JCC.ea.2021-0646.202401","url":null,"abstract":"The high-speed movement of satellites makes it not feasible to directly apply the mature routing scheme on the ground to the satellite network. DT-DVTR in the snapshot-based connection-oriented routing strategy is one of the representative solutions, but it still has room for improvement in terms of routing stability. In this paper, we propose an improved scheme for connection-oriented routing strategy named the Minimal Topology Change Routing based on Collaborative Rules (MTCR-CR). The MTCR-CR uses continuous time static topology snapshots based on satellite status to search for intersatellite link(ISL) construction solutions that meet the minimum number of topology changes to avoid route oscillations. The simulation results in Beidou-3 show that compared with DT-DVTR, MTCR-CR reduces the number of routing changes by about 92%, the number of path changes caused by routing changes is about 38%, and the rerouting time is reduced by approximately 47%. At the same time, in order to show our algorithm more comprehensively, the same experimental index test was also carried out on the Globalstar satellite constellation.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":null,"pages":null},"PeriodicalIF":4.1,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141132563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security-enhanced directional modulation based on two-dimensional M-WFRFT 基于二维 M-WFRFT 的安全增强型定向调制
IF 4.1 3区 计算机科学 Q1 Engineering Pub Date : 2024-05-01 DOI: 10.23919/JCC.ja.2022-0491
Zhuang Zhou, Junshan Luo, Shilian Wang, Guojiang Xia
Directional modulation (DM) is one of the most promising secure communication techniques. However, when the eavesdropper is co-located with the legitimate receiver, the conventional DM has the disadvantages of weak anti-scanning capability, anti-deciphering capability, and low secrecy rate. In response to these problems, we propose a two-dimensional multi-term weighted fractional Fourier transform aided DM scheme, in which the legitimate receiver and the transmitter use different transform terms and transform orders to encrypt and decrypt the confidential information. In order to further lower the probability of being deciphered by an eavesdropper, we use the subblock partition method to convert the one-dimensional modulated signal vector into a two-dimensional signal matrix, increasing the confusion of the useful information. Numerical results demonstrate that the proposed DM scheme not only provides stronger anti-deciphering and anti-scanning capabilities but also improves the secrecy rate performance of the system.
定向调制(DM)是最有前途的安全通信技术之一。然而,当窃听者与合法接收者同处一地时,传统的定向调制具有抗扫描能力弱、抗破译能力差、保密率低等缺点。针对这些问题,我们提出了一种二维多期加权分数傅里叶变换辅助 DM 方案,在该方案中,合法接收方和发送方使用不同的变换项和变换阶数对机密信息进行加密和解密。为了进一步降低被窃听者破译的概率,我们使用子块分割法将一维调制信号矢量转换为二维信号矩阵,增加了有用信息的混淆度。数值结果表明,所提出的 DM 方案不仅具有更强的反破译和反扫描能力,而且提高了系统的保密率性能。
{"title":"Security-enhanced directional modulation based on two-dimensional M-WFRFT","authors":"Zhuang Zhou, Junshan Luo, Shilian Wang, Guojiang Xia","doi":"10.23919/JCC.ja.2022-0491","DOIUrl":"https://doi.org/10.23919/JCC.ja.2022-0491","url":null,"abstract":"Directional modulation (DM) is one of the most promising secure communication techniques. However, when the eavesdropper is co-located with the legitimate receiver, the conventional DM has the disadvantages of weak anti-scanning capability, anti-deciphering capability, and low secrecy rate. In response to these problems, we propose a two-dimensional multi-term weighted fractional Fourier transform aided DM scheme, in which the legitimate receiver and the transmitter use different transform terms and transform orders to encrypt and decrypt the confidential information. In order to further lower the probability of being deciphered by an eavesdropper, we use the subblock partition method to convert the one-dimensional modulated signal vector into a two-dimensional signal matrix, increasing the confusion of the useful information. Numerical results demonstrate that the proposed DM scheme not only provides stronger anti-deciphering and anti-scanning capabilities but also improves the secrecy rate performance of the system.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":null,"pages":null},"PeriodicalIF":4.1,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141144162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital twin-assisted semi-federated learning framework for industrial edge intelligence 面向工业边缘智能的数字孪生辅助半联合学习框架
IF 4.1 3区 计算机科学 Q1 Engineering Pub Date : 2024-05-01 DOI: 10.23919/JCC.ea.2022-0699.202401
Xiongyue Wu, Jianhua Tang, Marie Siew
The rapid development of emerging technologies, such as edge intelligence and digital twins, have added momentum towards the development of the Industrial Internet of Things (IIoT). However, the massive amount of data generated by the IIoT, coupled with heterogeneous computation capacity across IIoT devices, and users' data privacy concerns, have posed challenges towards achieving industrial edge intelligence (IEI). To achieve IEI, in this paper, we propose a semi-federated learning framework where a portion of the data with higher privacy is kept locally and a portion of the less private data can be potentially uploaded to the edge server. In addition, we leverage digital twins to overcome the problem of computation capacity heterogeneity of IIoT devices through the mapping of physical entities. We formulate a synchronization latency minimization problem which jointly optimizes edge association and the proportion of uploaded nonprivate data. As the joint problem is NP-hard and combinatorial and taking into account the reality of large-scale device training, we develop a multi-agent hybrid action deep reinforcement learning (DRL) algorithm to find the optimal solution. Simulation results show that our proposed DRL algorithm can reduce latency and have a better convergence performance for semi-federated learning compared to benchmark algorithms.
边缘智能和数字孪生等新兴技术的快速发展为工业物联网(IIoT)的发展增添了动力。然而,IIoT 产生的海量数据、IIoT 设备的异构计算能力以及用户对数据隐私的担忧,都为实现工业边缘智能(IEI)带来了挑战。为了实现工业边缘智能(IEI),我们在本文中提出了一个半联邦学习框架,其中一部分隐私性较高的数据保存在本地,另一部分隐私性较低的数据则有可能上传到边缘服务器。此外,我们还利用数字孪生,通过物理实体的映射来克服 IIoT 设备计算能力异构的问题。我们提出了一个同步延迟最小化问题,该问题联合优化了边缘关联和上传非私有数据的比例。由于该联合问题具有 NP 难度和组合性,同时考虑到大规模设备训练的现实情况,我们开发了一种多代理混合行动深度强化学习(DRL)算法来寻找最优解。仿真结果表明,与基准算法相比,我们提出的 DRL 算法可以减少延迟,并在半联合学习中具有更好的收敛性能。
{"title":"Digital twin-assisted semi-federated learning framework for industrial edge intelligence","authors":"Xiongyue Wu, Jianhua Tang, Marie Siew","doi":"10.23919/JCC.ea.2022-0699.202401","DOIUrl":"https://doi.org/10.23919/JCC.ea.2022-0699.202401","url":null,"abstract":"The rapid development of emerging technologies, such as edge intelligence and digital twins, have added momentum towards the development of the Industrial Internet of Things (IIoT). However, the massive amount of data generated by the IIoT, coupled with heterogeneous computation capacity across IIoT devices, and users' data privacy concerns, have posed challenges towards achieving industrial edge intelligence (IEI). To achieve IEI, in this paper, we propose a semi-federated learning framework where a portion of the data with higher privacy is kept locally and a portion of the less private data can be potentially uploaded to the edge server. In addition, we leverage digital twins to overcome the problem of computation capacity heterogeneity of IIoT devices through the mapping of physical entities. We formulate a synchronization latency minimization problem which jointly optimizes edge association and the proportion of uploaded nonprivate data. As the joint problem is NP-hard and combinatorial and taking into account the reality of large-scale device training, we develop a multi-agent hybrid action deep reinforcement learning (DRL) algorithm to find the optimal solution. Simulation results show that our proposed DRL algorithm can reduce latency and have a better convergence performance for semi-federated learning compared to benchmark algorithms.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":null,"pages":null},"PeriodicalIF":4.1,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141141116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transmit power minimization for IRS-assisted NOMA-UAV networks 最小化 IRS 辅助 NOMA-UAV 网络的发射功率
IF 4.1 3区 计算机科学 Q1 Engineering Pub Date : 2024-05-01 DOI: 10.23919/JCC.ea.2021-0783.202401
Zhao Chen, Xiaowei Pang, Tang Jie, Mingqian Liu, Zhao Nan, Xiuyin Zhang, Xianbin Wang
The flexibility of unmanned aerial vehicles (UAVs) allows them to be quickly deployed to support ground users. Intelligent reflecting surface (IRS) can reflect the incident signal and form passive beamforming to enhance the signal in the specific direction. Motivated by the promising benefits of both technologies, we consider a new scenario in this paper where a UAV uses non-orthogonal multiple access to serve multiple users with IRS. According to their distance to the UAV, the users are divided into the close users and remote users. The UAV hovers above the close users due to their higher rate requirement, while the IRS is deployed near the remote users to enhance their received power. We aim at minimizing the transmit power of UAV by jointly optimizing the beamforming of UAV and the phase shift of IRS while ensuring the decoding requirement. However, the problem is non-convex. Therefore, we decompose it into two sub-problems, including the transmit beamforming optimization and phase shift optimization, which are transformed into second-order cone programming and semidefinite programming, respectively. We propose an iterative algorithm to solve the two sub-problems alternatively. Simulation results prove the effectiveness of the proposed scheme in minimizing the transmit power of UAV.
无人驾驶飞行器(UAV)的灵活性使其能够快速部署,为地面用户提供支持。智能反射面(IRS)可以反射入射信号并形成无源波束成形,从而增强特定方向的信号。由于这两种技术都有很好的前景,我们在本文中考虑了一种新的方案,即无人机使用非正交多址接入为多个使用 IRS 的用户提供服务。根据与无人机的距离,用户被分为近距离用户和远距离用户。由于近距离用户对速率要求较高,因此无人机悬停在近距离用户上方,而 IRS 则部署在远距离用户附近,以增强其接收功率。我们的目标是在保证解码要求的前提下,通过联合优化无人机的波束成形和 IRS 的相移,最大限度地降低无人机的发射功率。然而,这个问题是非凸的。因此,我们将其分解为两个子问题,包括发射波束成形优化和相移优化,并分别转化为二阶圆锥编程和半定式编程。我们提出了一种迭代算法来交替解决这两个子问题。仿真结果证明了所提方案在最小化无人机发射功率方面的有效性。
{"title":"Transmit power minimization for IRS-assisted NOMA-UAV networks","authors":"Zhao Chen, Xiaowei Pang, Tang Jie, Mingqian Liu, Zhao Nan, Xiuyin Zhang, Xianbin Wang","doi":"10.23919/JCC.ea.2021-0783.202401","DOIUrl":"https://doi.org/10.23919/JCC.ea.2021-0783.202401","url":null,"abstract":"The flexibility of unmanned aerial vehicles (UAVs) allows them to be quickly deployed to support ground users. Intelligent reflecting surface (IRS) can reflect the incident signal and form passive beamforming to enhance the signal in the specific direction. Motivated by the promising benefits of both technologies, we consider a new scenario in this paper where a UAV uses non-orthogonal multiple access to serve multiple users with IRS. According to their distance to the UAV, the users are divided into the close users and remote users. The UAV hovers above the close users due to their higher rate requirement, while the IRS is deployed near the remote users to enhance their received power. We aim at minimizing the transmit power of UAV by jointly optimizing the beamforming of UAV and the phase shift of IRS while ensuring the decoding requirement. However, the problem is non-convex. Therefore, we decompose it into two sub-problems, including the transmit beamforming optimization and phase shift optimization, which are transformed into second-order cone programming and semidefinite programming, respectively. We propose an iterative algorithm to solve the two sub-problems alternatively. Simulation results prove the effectiveness of the proposed scheme in minimizing the transmit power of UAV.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":null,"pages":null},"PeriodicalIF":4.1,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141142555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An SDN-based algorithm for caching, routing, and load balancing in ICN 基于 SDN 的 ICN 缓存、路由和负载平衡算法
IF 4.1 3区 计算机科学 Q1 Engineering Pub Date : 2024-05-01 DOI: 10.23919/JCC.ja.2023-0165
MohammadBagher Tavasoli, Hossein Saidi, Ali Ghiasian
One of the challenges of Information-centric Networking (ICN) is finding the optimal location for caching content and processing users' requests. In this paper, we address this challenge by leveraging Software-defined Networking (SDN) for efficient ICN management. To achieve this, we formulate the problem as a mixed-integer nonlinear programming (MINLP) model, incorporating caching, routing, and load balancing decisions. We explore two distinct scenarios to tackle the problem. Firstly, we solve the problem in an offline mode using the GAMS environment, assuming a stable network state to demonstrate the superior performance of the cache-enabled network compared to non-cache networks. Subsequently, we investigate the problem in an online mode where the network state dynamically changes over time. Given the computational complexity associated with MINLP, we propose the software-defined caching, routing, and load balancing (SDCRL) algorithm as an efficient and scalable solution. Our evaluation demonstrates that the SDCRL algorithm significantly reduces computational time while maintaining results that closely resemble those achieved by GAMS.
以信息为中心的网络(ICN)面临的挑战之一是找到缓存内容和处理用户请求的最佳位置。在本文中,我们通过利用软件定义网络(SDN)进行高效的 ICN 管理来应对这一挑战。为此,我们将问题表述为混合整数非线性编程(MINLP)模型,其中包含缓存、路由和负载平衡决策。我们探索了两种不同的方案来解决这个问题。首先,我们使用 GAMS 环境在离线模式下解决该问题,假设网络状态稳定,以证明与非缓存网络相比,启用缓存的网络性能更优。随后,我们研究了网络状态随时间动态变化的在线模式下的问题。考虑到与 MINLP 相关的计算复杂性,我们提出了软件定义缓存、路由和负载平衡(SDCRL)算法,作为一种高效且可扩展的解决方案。我们的评估结果表明,SDCRL 算法大大缩短了计算时间,同时保持了与 GAMS 算法接近的结果。
{"title":"An SDN-based algorithm for caching, routing, and load balancing in ICN","authors":"MohammadBagher Tavasoli, Hossein Saidi, Ali Ghiasian","doi":"10.23919/JCC.ja.2023-0165","DOIUrl":"https://doi.org/10.23919/JCC.ja.2023-0165","url":null,"abstract":"One of the challenges of Information-centric Networking (ICN) is finding the optimal location for caching content and processing users' requests. In this paper, we address this challenge by leveraging Software-defined Networking (SDN) for efficient ICN management. To achieve this, we formulate the problem as a mixed-integer nonlinear programming (MINLP) model, incorporating caching, routing, and load balancing decisions. We explore two distinct scenarios to tackle the problem. Firstly, we solve the problem in an offline mode using the GAMS environment, assuming a stable network state to demonstrate the superior performance of the cache-enabled network compared to non-cache networks. Subsequently, we investigate the problem in an online mode where the network state dynamically changes over time. Given the computational complexity associated with MINLP, we propose the software-defined caching, routing, and load balancing (SDCRL) algorithm as an efficient and scalable solution. Our evaluation demonstrates that the SDCRL algorithm significantly reduces computational time while maintaining results that closely resemble those achieved by GAMS.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":null,"pages":null},"PeriodicalIF":4.1,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141137138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient modelling of oversampling with optimal deep learning enabled anomaly detection in streaming data 通过优化深度学习实现流数据异常检测的超采样高效模型
IF 4.1 3区 计算机科学 Q1 Engineering Pub Date : 2024-05-01 DOI: 10.23919/JCC.ja.2022-0592
R. Rajakumar, S. S. Devi
Recently, anomaly detection (AD) in streaming data gained significant attention among research communities due to its applicability in finance, business, healthcare, education, etc. The recent developments of deep learning (DL) models find helpful in the detection and classification of anomalies. This article designs an oversampling with an optimal deep learning-based streaming data classification (OS-ODLSDC) model. The aim of the OS-ODLSDC model is to recognize and classify the presence of anomalies in the streaming data. The proposed OS-ODLSDC model initially undergoes preprocessing step. Since streaming data is unbalanced, support vector machine (SVM)-Synthetic Minority Over-sampling Technique (SVM-SMOTE) is applied for oversampling process. Besides, the OS-ODLSDC model employs bidirectional long short-term memory (BiLSTM) for AD and classification. Finally, the root means square propagation (RMSProp) optimizer is applied for optimal hyperparameter tuning of the BiL-STM model. For ensuring the promising performance of the OS-ODLSDC model, a wide-ranging experimental analysis is performed using three benchmark datasets such as CICIDS 2018, KDD-Cup 1999, and NSL-KDD datasets.
最近,流数据中的异常检测(AD)因其在金融、商业、医疗保健、教育等领域的适用性而备受研究界关注。深度学习(DL)模型的最新发展有助于异常数据的检测和分类。本文设计了一种基于深度学习的流数据分类(OS-ODLSDC)模型。OS-ODLSDC 模型的目的是识别流数据中存在的异常并进行分类。拟议的 OS-ODLSDC 模型首先要经过预处理步骤。由于流数据是不平衡的,因此要应用支持向量机(SVM)--合成少数群体过度采样技术(SVM-SMOTE)进行过度采样处理。此外,OS-ODLSDC 模型还采用了双向长短时记忆(BiLSTM)进行 AD 和分类。最后,采用均方根传播(RMSProp)优化器对 BiL-STM 模型进行优化超参数调整。为确保 OS-ODLSDC 模型的良好性能,我们使用三个基准数据集(如 CICIDS 2018、KDD-Cup 1999 和 NSL-KDD 数据集)进行了广泛的实验分析。
{"title":"An efficient modelling of oversampling with optimal deep learning enabled anomaly detection in streaming data","authors":"R. Rajakumar, S. S. Devi","doi":"10.23919/JCC.ja.2022-0592","DOIUrl":"https://doi.org/10.23919/JCC.ja.2022-0592","url":null,"abstract":"Recently, anomaly detection (AD) in streaming data gained significant attention among research communities due to its applicability in finance, business, healthcare, education, etc. The recent developments of deep learning (DL) models find helpful in the detection and classification of anomalies. This article designs an oversampling with an optimal deep learning-based streaming data classification (OS-ODLSDC) model. The aim of the OS-ODLSDC model is to recognize and classify the presence of anomalies in the streaming data. The proposed OS-ODLSDC model initially undergoes preprocessing step. Since streaming data is unbalanced, support vector machine (SVM)-Synthetic Minority Over-sampling Technique (SVM-SMOTE) is applied for oversampling process. Besides, the OS-ODLSDC model employs bidirectional long short-term memory (BiLSTM) for AD and classification. Finally, the root means square propagation (RMSProp) optimizer is applied for optimal hyperparameter tuning of the BiL-STM model. For ensuring the promising performance of the OS-ODLSDC model, a wide-ranging experimental analysis is performed using three benchmark datasets such as CICIDS 2018, KDD-Cup 1999, and NSL-KDD datasets.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":null,"pages":null},"PeriodicalIF":4.1,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141139230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A fuzzy trust management mechanism with dynamic behavior monitoring for wireless sensor networks 无线传感器网络的动态行为监测模糊信任管理机制
IF 4.1 3区 计算机科学 Q1 Engineering Pub Date : 2024-05-01 DOI: 10.23919/JCC.fa.2022-0616.202405
Shiming Fu, Zhang Ping, Xuehong Shi
Traditional wireless sensor networks (WSNs) are typically deployed in remote and hostile environments for information collection. The wireless communication methods adopted by sensor nodes may make the network highly vulnerable to various attacks. Traditional encryption and authentication mechanisms cannot prevent attacks launched by internal malicious nodes. The trust-based security mechanism is usually adopted to solve this problem in WSNs. However, the behavioral evidence used for trust estimation presents some uncertainties due to the open wireless medium and the inexpensive sensor nodes. Moreover, how to efficiently collect behavioral evidences are rarely discussed. To address these issues, in this paper, we present a trust management mechanism based on fuzzy logic and a cloud model. First, a type-II fuzzy logic system is used to preprocess the behavioral evidences and alleviate uncertainty. Then, the cloud model is introduced to estimate the trust values for sensor nodes. Finally, a dynamic behavior monitoring protocol is proposed to provide a balance between energy conservation and safety assurance. Simulation results demonstrate that our trust management mechanism can effectively protect the network from internal malicious attacks while enhancing the energy efficiency of behavior monitoring.
传统的无线传感器网络(WSN)通常部署在偏远和恶劣的环境中收集信息。传感器节点采用的无线通信方法可能会使网络极易受到各种攻击。传统的加密和认证机制无法阻止内部恶意节点发起的攻击。WSN 通常采用基于信任的安全机制来解决这一问题。然而,由于无线介质的开放性和传感器节点的廉价性,用于信任估计的行为证据具有一定的不确定性。此外,如何有效地收集行为证据也鲜有讨论。针对这些问题,本文提出了一种基于模糊逻辑和云模型的信任管理机制。首先,使用第二类模糊逻辑系统对行为证据进行预处理,减轻不确定性。然后,引入云模型来估计传感器节点的信任值。最后,提出了一种动态行为监控协议,以在节能和安全保证之间取得平衡。仿真结果表明,我们的信任管理机制能有效保护网络免受内部恶意攻击,同时提高行为监控的能效。
{"title":"A fuzzy trust management mechanism with dynamic behavior monitoring for wireless sensor networks","authors":"Shiming Fu, Zhang Ping, Xuehong Shi","doi":"10.23919/JCC.fa.2022-0616.202405","DOIUrl":"https://doi.org/10.23919/JCC.fa.2022-0616.202405","url":null,"abstract":"Traditional wireless sensor networks (WSNs) are typically deployed in remote and hostile environments for information collection. The wireless communication methods adopted by sensor nodes may make the network highly vulnerable to various attacks. Traditional encryption and authentication mechanisms cannot prevent attacks launched by internal malicious nodes. The trust-based security mechanism is usually adopted to solve this problem in WSNs. However, the behavioral evidence used for trust estimation presents some uncertainties due to the open wireless medium and the inexpensive sensor nodes. Moreover, how to efficiently collect behavioral evidences are rarely discussed. To address these issues, in this paper, we present a trust management mechanism based on fuzzy logic and a cloud model. First, a type-II fuzzy logic system is used to preprocess the behavioral evidences and alleviate uncertainty. Then, the cloud model is introduced to estimate the trust values for sensor nodes. Finally, a dynamic behavior monitoring protocol is proposed to provide a balance between energy conservation and safety assurance. Simulation results demonstrate that our trust management mechanism can effectively protect the network from internal malicious attacks while enhancing the energy efficiency of behavior monitoring.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":null,"pages":null},"PeriodicalIF":4.1,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141136688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning for signal demodulation in underwater wireless optical communications 水下无线光通信信号解调的机器学习
IF 4.1 3区 计算机科学 Q1 Engineering Pub Date : 2024-05-01 DOI: 10.23919/JCC.ja.2023-0084
Ma Shuai, Yang Lei, Wanying Ding, Li Hang, Zhongdan Zhang, Xu Jing, Zongyan Li, Xu Gang, Shiyin Li
The underwater wireless optical communication (UWOC) system has gradually become essential to underwater wireless communication technology. Unlike other existing works on UWOC systems, this paper evaluates the proposed machine learning-based signal demodulation methods through the selfbuilt experimental platform. Based on such a platform, we first construct a real signal dataset with ten modulation methods. Then, we propose a deep belief network (DBN)-based demodulator for feature extraction and multi-class feature classification. We also design an adaptive boosting (AdaBoost) demodulator as an alternative scheme without feature filtering for multiple modulated signals. Finally, it is demonstrated by extensive experimental results that the AdaBoost demodulator significantly outperforms the other algorithms. It also reveals that the demodulator accuracy decreases as the modulation order increases for a fixed received optical power. A higher-order modulation may achieve a higher effective transmission rate when the signal-to-noise ratio (SNR) is higher.
水下无线光通信(UWOC)系统已逐渐成为水下无线通信技术的重要组成部分。与其他现有的 UWOC 系统研究不同,本文通过自建实验平台来评估所提出的基于机器学习的信号解调方法。基于该平台,我们首先构建了一个包含十种调制方法的真实信号数据集。然后,我们提出了一种基于深度信念网络(DBN)的解调器,用于特征提取和多类特征分类。我们还设计了一种自适应提升(AdaBoost)解调器,作为多调制信号无需特征过滤的替代方案。最后,大量实验结果表明,AdaBoost 解调器的性能明显优于其他算法。实验还表明,在接收光功率固定的情况下,解调器的精度会随着调制阶数的增加而降低。当信噪比(SNR)较高时,高阶调制可实现更高的有效传输速率。
{"title":"Machine learning for signal demodulation in underwater wireless optical communications","authors":"Ma Shuai, Yang Lei, Wanying Ding, Li Hang, Zhongdan Zhang, Xu Jing, Zongyan Li, Xu Gang, Shiyin Li","doi":"10.23919/JCC.ja.2023-0084","DOIUrl":"https://doi.org/10.23919/JCC.ja.2023-0084","url":null,"abstract":"The underwater wireless optical communication (UWOC) system has gradually become essential to underwater wireless communication technology. Unlike other existing works on UWOC systems, this paper evaluates the proposed machine learning-based signal demodulation methods through the selfbuilt experimental platform. Based on such a platform, we first construct a real signal dataset with ten modulation methods. Then, we propose a deep belief network (DBN)-based demodulator for feature extraction and multi-class feature classification. We also design an adaptive boosting (AdaBoost) demodulator as an alternative scheme without feature filtering for multiple modulated signals. Finally, it is demonstrated by extensive experimental results that the AdaBoost demodulator significantly outperforms the other algorithms. It also reveals that the demodulator accuracy decreases as the modulation order increases for a fixed received optical power. A higher-order modulation may achieve a higher effective transmission rate when the signal-to-noise ratio (SNR) is higher.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":null,"pages":null},"PeriodicalIF":4.1,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141142075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security-reliability tradeoff analysis for jamming aided decode-and-forward relay networks 干扰辅助解码前向中继网络的安全可靠性权衡分析
IF 4.1 3区 计算机科学 Q1 Engineering Pub Date : 2024-05-01 DOI: 10.23919/JCC.fa.2022-0004.202405
Ronggui Zou, Yulong Zou, Zhu Jia, Li Bin
In this paper, we explore a cooperative decode-and-forward (DF) relay network comprised of a source, a relay, and a destination in the presence of an eavesdropper. To improve physical-layer security of the relay system, we propose a jamming aided decode-and-forward relay (JDFR) scheme combining the use of artificial noise and DF relaying which requires two stages to transmit a packet. Specifically, in stage one, the source sends confidential message to the relay while the destination acts as a friendly jammer and transmits artificial noise to confound the eavesdropper. In stage two, the relay forwards its re-encoded message to the destination while the source emits artificial noise to confuse the eavesdropper. In addition, we analyze the security-reliability tradeoff (SRT) performance of the proposed JDFR scheme, where security and reliability are evaluated by deriving intercept probability (IP) and outage probability (OP), respectively. For the purpose of comparison, SRT of the traditional decode-and-forward relay (TDFR) scheme is also analyzed. Numerical results show that the SRT performance of the proposed JDFR scheme is better than that of the TDFR scheme. Also, it is shown that for the JDFR scheme, a better SRT performance can be obtained by the optimal power allocation (OPA) between the friendly jammer and user.
本文探讨了在存在窃听者的情况下,由信源、中继和目的地组成的合作解码前向(DF)中继网络。为了提高中继系统的物理层安全性,我们提出了一种干扰辅助解码前向中继(JDFR)方案,该方案结合使用了人工噪声和 DF 中继,需要两个阶段来传输一个数据包。具体来说,在第一阶段,源方向中继站发送机密信息,而目的地则充当友好干扰者,发送人工噪音以迷惑窃听者。在第二阶段,中继站将其重新编码的信息转发给目的地,而源站则发射人工噪音来迷惑窃听者。此外,我们还分析了所提出的 JDFR 方案的安全性-可靠性权衡(SRT)性能,其中安全性和可靠性分别通过得出截获概率(IP)和中断概率(OP)来评估。为了进行比较,还分析了传统解码前向中继(TDFR)方案的 SRT。数值结果表明,所提出的 JDFR 方案的 SRT 性能优于 TDFR 方案。此外,对于 JDFR 方案,通过在友好干扰者和用户之间进行最佳功率分配 (OPA),可以获得更好的 SRT 性能。
{"title":"Security-reliability tradeoff analysis for jamming aided decode-and-forward relay networks","authors":"Ronggui Zou, Yulong Zou, Zhu Jia, Li Bin","doi":"10.23919/JCC.fa.2022-0004.202405","DOIUrl":"https://doi.org/10.23919/JCC.fa.2022-0004.202405","url":null,"abstract":"In this paper, we explore a cooperative decode-and-forward (DF) relay network comprised of a source, a relay, and a destination in the presence of an eavesdropper. To improve physical-layer security of the relay system, we propose a jamming aided decode-and-forward relay (JDFR) scheme combining the use of artificial noise and DF relaying which requires two stages to transmit a packet. Specifically, in stage one, the source sends confidential message to the relay while the destination acts as a friendly jammer and transmits artificial noise to confound the eavesdropper. In stage two, the relay forwards its re-encoded message to the destination while the source emits artificial noise to confuse the eavesdropper. In addition, we analyze the security-reliability tradeoff (SRT) performance of the proposed JDFR scheme, where security and reliability are evaluated by deriving intercept probability (IP) and outage probability (OP), respectively. For the purpose of comparison, SRT of the traditional decode-and-forward relay (TDFR) scheme is also analyzed. Numerical results show that the SRT performance of the proposed JDFR scheme is better than that of the TDFR scheme. Also, it is shown that for the JDFR scheme, a better SRT performance can be obtained by the optimal power allocation (OPA) between the friendly jammer and user.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":null,"pages":null},"PeriodicalIF":4.1,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141135449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource allocation in multi-user cellular networks: A transformer-based deep reinforcement learning approach 多用户蜂窝网络的资源分配:基于变压器的深度强化学习方法
IF 4.1 3区 计算机科学 Q1 Engineering Pub Date : 2024-05-01 DOI: 10.23919/JCC.ea.2021-0665.202401
Zhao Di, Zheng Zhong, Pengfei Qin, Qin Hao, Song Bin
To meet the communication services with diverse requirements, dynamic resource allocation has shown increasing importance. In this paper, we consider the multi-slot and multi-user resource allocation (MSMU-RA) in a downlink cellular scenario with the aim of maximizing system spectral efficiency while guaranteeing user fairness. We first model the MSMU-RA problem as a dual-sequence decision-making process, and then solve it by a novel Transformer-based deep reinforcement learning (TDRL) approach. Specifically, the proposed TDRL approach can be achieved based on two aspects: 1) To adapt to the dynamic wireless environment, the proximal policy optimization (PPO) algorithm is used to optimize the multi-slot RA strategy. 2) To avoid co-channel interference, the Transformer-based PPO algorithm is presented to obtain the optimal multi-user RA scheme by exploring the mapping between user sequence and resource sequence. Experimental results show that: i) the proposed approach outperforms both the traditional and DRL methods in spectral efficiency and user fairness, ii) the proposed algorithm is superior to DRL approaches in terms of convergence speed and generalization performance.
为了满足多样化需求的通信服务,动态资源分配变得越来越重要。本文考虑了下行蜂窝场景中的多时隙和多用户资源分配(MSMU-RA)问题,目的是在保证用户公平性的同时最大化系统频谱效率。我们首先将 MSMU-RA 问题建模为一个双序列决策过程,然后通过一种新颖的基于变换器的深度强化学习(TDRL)方法来解决该问题。具体来说,所提出的 TDRL 方法可以从两个方面实现:1) 为适应动态无线环境,采用近端策略优化(PPO)算法来优化多槽 RA 策略。2) 为避免同信道干扰,提出了基于变换器的 PPO 算法,通过探索用户序列和资源序列之间的映射关系,获得最优的多用户 RA 方案。实验结果表明:i) 所提出的方法在频谱效率和用户公平性方面优于传统方法和 DRL 方法;ii) 所提出的算法在收敛速度和泛化性能方面优于 DRL 方法。
{"title":"Resource allocation in multi-user cellular networks: A transformer-based deep reinforcement learning approach","authors":"Zhao Di, Zheng Zhong, Pengfei Qin, Qin Hao, Song Bin","doi":"10.23919/JCC.ea.2021-0665.202401","DOIUrl":"https://doi.org/10.23919/JCC.ea.2021-0665.202401","url":null,"abstract":"To meet the communication services with diverse requirements, dynamic resource allocation has shown increasing importance. In this paper, we consider the multi-slot and multi-user resource allocation (MSMU-RA) in a downlink cellular scenario with the aim of maximizing system spectral efficiency while guaranteeing user fairness. We first model the MSMU-RA problem as a dual-sequence decision-making process, and then solve it by a novel Transformer-based deep reinforcement learning (TDRL) approach. Specifically, the proposed TDRL approach can be achieved based on two aspects: 1) To adapt to the dynamic wireless environment, the proximal policy optimization (PPO) algorithm is used to optimize the multi-slot RA strategy. 2) To avoid co-channel interference, the Transformer-based PPO algorithm is presented to obtain the optimal multi-user RA scheme by exploring the mapping between user sequence and resource sequence. Experimental results show that: i) the proposed approach outperforms both the traditional and DRL methods in spectral efficiency and user fairness, ii) the proposed algorithm is superior to DRL approaches in terms of convergence speed and generalization performance.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":null,"pages":null},"PeriodicalIF":4.1,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141133313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
China Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1