In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,w...In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,which results in a collision and leads to the degrading of tags identifying efficiency.To improve the multiple tags’identifying efficiency due to collision,a physical layer network coding based binary search tree algorithm(PNBA)is proposed in this paper.PNBA pushes the conflicting signal information of multiple tags into a stack,which is discarded by the traditional anti-collision algorithm.In addition,physical layer network coding is exploited by PNBA to obtain unread tag information through the decoding operation of physical layer network coding using the conflicting information in the stack.Therefore,PNBA reduces the number of interactions between reader and tags,and improves the tags identification efficiency.Theoretical analysis and simulation results using MATLAB demonstrate that PNBA reduces the number of readings,and improve RFID identification efficiency.Especially,when the number of tags to be identified is 100,the average needed reading number of PNBA is 83%lower than the basic binary search tree algorithm,43%lower than reverse binary search tree algorithm,and its reading efficiency reaches 0.93.展开更多
5G is envisioned to guarantee high transmission rate,ultra-low latency,high reliability and massive connections.To satisfy the above requirements,the 5G architecture is designed with the properties of using service-ba...5G is envisioned to guarantee high transmission rate,ultra-low latency,high reliability and massive connections.To satisfy the above requirements,the 5G architecture is designed with the properties of using service-based architecture,cloud-native oriented,adopting IT-based API interfaces and introduction of the Network Repository Function.However,with the wide commercialization of 5G network and the exploration towards 6G,the 5G architecture exposes the disadvantages of high architecture complexity,difficult inter-interface communication,low cognitive capability,bad instantaneity,and deficient intelligence.To overcome these limitations,this paper investigates 6G network architecture,and proposes a cognitive intelligence based distributed 6G network architecture.This architecture consists of a physical network layer and an intelligent decision layer.The two layers coordinate through flexible service interfaces,supporting function decoupling and joint evolution of intelligence services and network services.With the above design,the proposed 6G architecture can be updated autonomously to deal with the future unpredicted complex services.展开更多
Systems are always designed and optimized based on full traffic load in the current literatures. However, practical systems are seldom operating at full load, even at peak traffic hours. Instead of maximizing system r...Systems are always designed and optimized based on full traffic load in the current literatures. However, practical systems are seldom operating at full load, even at peak traffic hours. Instead of maximizing system rate to achieve the full load, an optimal energy-efficient scheme to minimize the transmit power with required rates is investigated in this article. The considered scenario is a two-way relay channel using amplify-and-forward protocol of physical layer network coding, where two end nodes exchange messages via multiple relay nodes within two timeslots. A joint power allocation and relay selection scheme is designed to achieve the minimum transmit power. Through convex optimization theory, we firstly prove that single relay selection scheme is the most energy-efficient way for physical layer network coding. The closed-form expressions of power allocation are also given. Numerical simulations demonstrate the performance of the designed scheme as well as the comparison among different schemes.展开更多
Previous research on security of network coding focused on the protection of data dissemination procedures and the detection of malicious activities such as pollution attacks. The capabilities of network coding to det...Previous research on security of network coding focused on the protection of data dissemination procedures and the detection of malicious activities such as pollution attacks. The capabilities of network coding to detect other attacks have not been fully explored. In this paper, we propose a new mechanism based on physical layer network coding to detect wormhole attacks. When two signal sequences collide at the receiver, the starting point of the collision is determined by the distances between the receiver and the senders. Therefore, by comparing the starting points of the collisions at two receivers, we can estimate the distance between them and detect fake neighbor connections via wormholes. While the basic idea is clear, we have proposed several schemes at both physical and network layers to transform the idea into a practical approach. Simulations using BPSK modulation at the physical layer show that the wireless nodes can effectively detect fake neighbor connections without the adoption of special hardware or time synchronization.展开更多
基金the National Natural Science Foundation of China under Grant 61502411Natural Science Foundation of Jiangsu Province under Grant BK20150432 and BK20151299+7 种基金Natural Science Research Project for Universities of Jiangsu Province under Grant 15KJB520034China Postdoctoral Science Foundation under Grant 2015M581843Jiangsu Provincial Qinglan ProjectTeachers Overseas Study Program of Yancheng Institute of TechnologyJiangsu Provincial Government Scholarship for Overseas StudiesTalents Project of Yancheng Institute of Technology under Grant KJC2014038“2311”Talent Project of Yancheng Institute of TechnologyOpen Fund of Modern Agricultural Resources Intelligent Management and Application Laboratory of Huzhou Normal University.
文摘In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,which results in a collision and leads to the degrading of tags identifying efficiency.To improve the multiple tags’identifying efficiency due to collision,a physical layer network coding based binary search tree algorithm(PNBA)is proposed in this paper.PNBA pushes the conflicting signal information of multiple tags into a stack,which is discarded by the traditional anti-collision algorithm.In addition,physical layer network coding is exploited by PNBA to obtain unread tag information through the decoding operation of physical layer network coding using the conflicting information in the stack.Therefore,PNBA reduces the number of interactions between reader and tags,and improves the tags identification efficiency.Theoretical analysis and simulation results using MATLAB demonstrate that PNBA reduces the number of readings,and improve RFID identification efficiency.Especially,when the number of tags to be identified is 100,the average needed reading number of PNBA is 83%lower than the basic binary search tree algorithm,43%lower than reverse binary search tree algorithm,and its reading efficiency reaches 0.93.
基金funded by Beijing University of Posts and Telecommunications-China Mobile Research Institute Joint Innovation Center,the National Key R&D Program of China(2018YFE0205503)the National Natural Science Foundation of China(61902036,62032003,61922017)Fundamental Research Funds for the Central Universities。
文摘5G is envisioned to guarantee high transmission rate,ultra-low latency,high reliability and massive connections.To satisfy the above requirements,the 5G architecture is designed with the properties of using service-based architecture,cloud-native oriented,adopting IT-based API interfaces and introduction of the Network Repository Function.However,with the wide commercialization of 5G network and the exploration towards 6G,the 5G architecture exposes the disadvantages of high architecture complexity,difficult inter-interface communication,low cognitive capability,bad instantaneity,and deficient intelligence.To overcome these limitations,this paper investigates 6G network architecture,and proposes a cognitive intelligence based distributed 6G network architecture.This architecture consists of a physical network layer and an intelligent decision layer.The two layers coordinate through flexible service interfaces,supporting function decoupling and joint evolution of intelligence services and network services.With the above design,the proposed 6G architecture can be updated autonomously to deal with the future unpredicted complex services.
基金supported by the International Scientific and Technological Cooperation Program (S2010GR0902)
文摘Systems are always designed and optimized based on full traffic load in the current literatures. However, practical systems are seldom operating at full load, even at peak traffic hours. Instead of maximizing system rate to achieve the full load, an optimal energy-efficient scheme to minimize the transmit power with required rates is investigated in this article. The considered scenario is a two-way relay channel using amplify-and-forward protocol of physical layer network coding, where two end nodes exchange messages via multiple relay nodes within two timeslots. A joint power allocation and relay selection scheme is designed to achieve the minimum transmit power. Through convex optimization theory, we firstly prove that single relay selection scheme is the most energy-efficient way for physical layer network coding. The closed-form expressions of power allocation are also given. Numerical simulations demonstrate the performance of the designed scheme as well as the comparison among different schemes.
基金Supported in part by the NSF CNS Award (No. 1143602)
文摘Previous research on security of network coding focused on the protection of data dissemination procedures and the detection of malicious activities such as pollution attacks. The capabilities of network coding to detect other attacks have not been fully explored. In this paper, we propose a new mechanism based on physical layer network coding to detect wormhole attacks. When two signal sequences collide at the receiver, the starting point of the collision is determined by the distances between the receiver and the senders. Therefore, by comparing the starting points of the collisions at two receivers, we can estimate the distance between them and detect fake neighbor connections via wormholes. While the basic idea is clear, we have proposed several schemes at both physical and network layers to transform the idea into a practical approach. Simulations using BPSK modulation at the physical layer show that the wireless nodes can effectively detect fake neighbor connections without the adoption of special hardware or time synchronization.