Road transport is been used for moving people and all kinds of goods throughout the world. However, it is one mode of transportation that is prone to accidents and it faces a plethora of never-ending challenges, such ...Road transport is been used for moving people and all kinds of goods throughout the world. However, it is one mode of transportation that is prone to accidents and it faces a plethora of never-ending challenges, such as the frequent loss of lives and valuables when accident occurs. The best course of action to handle these issues is to set up an autonomous incident detection system using wireless communication, 5G technologies and the Internet of Things. IoT is a seamless technology that increases the connectivity between humans and machines. It is web-based, and improves communication between vehicle to vehicle, vehicle to infrastructures, transfer of data and information to predict incident occurrences through various networks and frameworks such as eCall, OneM2M and integration of mobile broadband. Additionally, internet of things is being adopted for public safety;for instance, it can speed up first responders’ response times to situations by displaying the best routes to a scene of an accident. The rapid development of 5G is happening in parallel with developments of internet of things (IoT), artificial intelligence (AI), and smart platforms for novel applications such as mission-critical communications. 5G is a new generation technology that operates on the Ultra High Spectrum Band UHSB. It is an innovation that uses the pedestrians-vehicle-road-cloud, and the communication between vehicle locations and temperature of high-quality connection. It is essential for intelligent transport systems because it allows for information sharing, prediction of incidences as safety is the primary concern of road transport. This review examines accident detection through 5G technology, integrated mobile broadband, and multiple inputs multiple outputs (MIMO) wireless system. Finally, we conclude by examining recent technology, challenges, present and future research trends.展开更多
The ever-increasing needs of Internet of Things networks (IoTn) present considerable issues in computing complexity, security, trust, and authentication, among others. This gets increasingly more challenging as techno...The ever-increasing needs of Internet of Things networks (IoTn) present considerable issues in computing complexity, security, trust, and authentication, among others. This gets increasingly more challenging as technology advances, and its use expands. As a consequence, boosting the capacity of these networks has garnered widespread attention. As a result, 5G, the next phase of cellular networks, is expected to be a game-changer, bringing with it faster data transmission rates, more capacity, improved service quality, and reduced latency. However, 5G networks continue to confront difficulties in establishing pervasive and dependable connections amongst high-speed IoT devices. Thus, to address the shortcomings in current recommendations, we present a unified architecture based on software-defined networks (SDNs) that provides 5G-enabled devices that must have complete secrecy. Through SDN, the architecture streamlines network administration while optimizing network communications. A mutual authentication protocol using elliptic curve cryptography is introduced for mutual authentication across certificate authorities and clustered heads in IoT network deployments based on IoT. Again, a dimensionality reduction intrusion detection mechanism is introduced to decrease computational cost and identify possible network breaches. However, to leverage the method’s potential, the initial module's security is reviewed. The second module is evaluated and compared to modern models.展开更多
The fast technology development of 5G mobile broadband (5G), Internet of Things (IoT), Big Data Analytics (Big Data), Cloud Computing (Cloud) and Software Defined Networks (SDN) has made those technologies one after a...The fast technology development of 5G mobile broadband (5G), Internet of Things (IoT), Big Data Analytics (Big Data), Cloud Computing (Cloud) and Software Defined Networks (SDN) has made those technologies one after another and created strong interdependence among one another. For example, IoT applications that generate small data with large volume and fast velocity will need 5G with characteristics of high data rate and low latency to transmit such data faster and cheaper. On the other hand, those data also need Cloud to process and to store and furthermore, SDN to provide scalable network infrastructure to transport this large volume of data in an optimal way. This article explores the technical relationships among the development of IoT, Big Data, Cloud, and SDN in the coming 5G era and illustrates several ongoing programs and applications at National Chiao Tung University that are based on the converging of those technologies.展开更多
近年来国内的物联网(Internet of Things,IoT)技术实现了显著的发展,是现代信息技术领域中重要的技术内容。在5G时代,将5G网络技术作为发展物联网技术的核心,可以为物联网技术的研究创造良好的基础条件,大幅提高物联网技术的实际应用水...近年来国内的物联网(Internet of Things,IoT)技术实现了显著的发展,是现代信息技术领域中重要的技术内容。在5G时代,将5G网络技术作为发展物联网技术的核心,可以为物联网技术的研究创造良好的基础条件,大幅提高物联网技术的实际应用水平,扩大物联网技术的影响范围,使得物联网技术在信息交流与通信过程中具有更好的优势,相关领域对于5G网络技术与物联网技术的融合研究也更加深刻,能够充分认识到物联网技术对现代社会发展的重要作用。对5G网络技术的应用现状进行分析,研究了5G网络技术的基本特点,分析了5G网络技术与物联网技术的融合趋势,旨在推进我国5G移动通信与物联网技术的同步发展。展开更多
The term Internet of Things has increased in popularity in recent years and has spread to be used in many applications around us,such as healthcare applications,smart homes and smart cities,IoT is a group of smart dev...The term Internet of Things has increased in popularity in recent years and has spread to be used in many applications around us,such as healthcare applications,smart homes and smart cities,IoT is a group of smart devices equipped with sensors that have the ability to calculate data,and carry out actions in the environment in which they are located,they are connected to each other through the Internet and recently it has become supported by 5G technology due to many advantages such as its ability to provide a fast connection,despite the efficiency of the IoT supported by the five G technology,it is subject to many security challenges.In this paper,we conducted a comprehensive review of previous research related to the security requirements of the IoT and security attacks.展开更多
The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for...The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms.展开更多
The Internet of Things(IoT)is playing an important role in providing access to affordable,clean and green energy worldwide through the use of smart devices.The current electric power networks will be more reliable,sec...The Internet of Things(IoT)is playing an important role in providing access to affordable,clean and green energy worldwide through the use of smart devices.The current electric power networks will be more reliable,secure,flexible and durable by implementing IoT in power systems.This paper presents a brief discussion about IoT contributions in the development of power systems from a generation,transmission,distribution and consumption point of view.5G cellular networks have a great potential for the development of IoT technology.Additionally,5G cellular networks can be instrumental in supporting the greater communication needs of IoT.This review provides a comprehensive analysis about the role of 5G cellular networks in the growth of IoT technology and power systems.Large amounts of data will be generated due to the incorporation of renewable energy,deployment of the smart grid and the improvements to the electricity market.In this way,in order to realize the connection between things and people,things and things and people and people in power systems,it is essential to apply IoT in power systems.In this case,5G is providing numerous advantages to Power IoT(PIoT)by offering greater opportunities in progress and improvements;however,there are also numerous challenges with the deployment of 5G in PIoT.Finally,this review article provides an overview of the role,implications and challenges of 5G in PIoT.展开更多
Internet of Things(IoT) is one of the targeted application scenarios of fifth generation(5 G) wireless communication.IoT brings a large amount of data transported on the network.Considering those data,machine learning...Internet of Things(IoT) is one of the targeted application scenarios of fifth generation(5 G) wireless communication.IoT brings a large amount of data transported on the network.Considering those data,machine learning(ML) algorithms can be naturally utilized to make network efficiently and reliably.However,how to fully apply ML to IoT driven wireless network is still open.The fundamental reason is that wireless communication pursuits the high capacity and quality facing the challenges from the varying and fading wireless channel.So in this paper,we explore feasible combination for ML and IoT driven wireless network from wireless channel perspective.Firstly,a three-level structure of wireless channel fading features is defined in order to classify the versatile propagation environments.This three-layer structure includes scenario,meter and wavelength levels.Based on this structure,there are different tasks like service prediction and pushing,self-organization networking,self adapting largescale fading modeling and so on,which can be abstracted into problems like regression,classification,clustering,etc.Then,we introduce corresponding ML methods to different levelsfrom channel perspective,which makes their interdisciplinary research promisingly.展开更多
To provide Artificial Intelligence(AI)services such as object detection,Internet of Things(IoT)sensor devices should be able to send a large amount of data such as images and videos.However,this inevitably causes IoT ...To provide Artificial Intelligence(AI)services such as object detection,Internet of Things(IoT)sensor devices should be able to send a large amount of data such as images and videos.However,this inevitably causes IoT networks to be severely overloaded.In this paper,therefore,we propose a novel oneM2M-compliant Artificial Intelligence of Things(AIoT)system for reducing overall data traffic and offering object detection.It consists of some IoT sensor devices with random sampling functions controlled by a compressed sensing(CS)rate,an IoT edge gateway with CS recovery and domain transform functions related to compressed sensing,and a YOLOv5 deep learning function for object detection,and an IoT server.By analyzing the effects of compressed sensing on data traffic reduction in terms of data rate per IoT sensor device,we showed that the proposed AIoT system can reduce the overall data traffic by changing compressed sensing rates of random sampling functions in IoT sensor devices.In addition,we analyzed the effects of the compressed sensing on YOLOv5 object detection in terms of performance metrics such as recall,precision,mAP50,and mAP,and found that recall slightly decreases but precision remains almost constant even though the compressed sensing rate decreases and that mAP50 and mAP are gradually degraded according to the decreased compressed sensing rate.Consequently,if proper compressed sensing rates are chosen,the proposed AIoT system will reduce the overall data traffic without significant performance degradation of YOLOv5.展开更多
Fog Radio Access Network(F-RAN)has been regarded as a promising solution to the alleviation of the ever-increasing traffic burden on current and future wireless networks,for it shifts the caching and computing resourc...Fog Radio Access Network(F-RAN)has been regarded as a promising solution to the alleviation of the ever-increasing traffic burden on current and future wireless networks,for it shifts the caching and computing resources from remote cloud to the network edge.However,it makes wireless networks more vulnerable to security attacks as well.To resolve this issue,in this article,we propose a secure yet trustless Blockchain-based F-RAN(BF-RAN),which allows a massive number of trustless devices to form a large-scale trusted cooperative network by leveraging the key features of blockchain,such as decentralization,tamper-proof,and traceability.The architecture of BF-RAN is first presented.Then,the key technologies,including access control,dynamic resource management,and network deployment are discussed.Finally,challenges and open problems in the BF-RAN are identified.展开更多
The indigenous developed global BeiDou Navigation System(BDS-3)was formally commissioned,marking the completion of the three-step BDS development strategy,and a new era for BDS to better serve people from all walks of...The indigenous developed global BeiDou Navigation System(BDS-3)was formally commissioned,marking the completion of the three-step BDS development strategy,and a new era for BDS to better serve people from all walks of life.In this paper,the recent progress and main characteristics of BDS technology fusion and industry integration are analyzed.The discussion on the latest development on"BDS+"application starts from"BDS+Technology"and"BDS+Industry",through to the future prospective BDS applications.展开更多
Despite intensive efforts,there are still enormous challenges in provision of healthcare services to the increasing aging population.Recent observations have raised concerns regarding the soaring costs of healthcare,t...Despite intensive efforts,there are still enormous challenges in provision of healthcare services to the increasing aging population.Recent observations have raised concerns regarding the soaring costs of healthcare,the imbalance of medical resources,inefficient healthcare system administration,and inconvenient medical experiences.However,cutting-edge technologies are being developed to meet these challenges,including,but not limited to,Internet of Things(IoT),big data,artificial intelligence,and 5G wireless transmission technology to improve the patient experience and healthcare service quality,while cutting the total cost attributable to healthcare.This is not an unrealistic fantasy,as these emerging technologies are beginning to impact and reconstruct healthcare in subtleways.Although the technologies mentioned above are integrated,in this review we take a brief look at cases focusing on the application of 5G wireless transmission technology in healthcare.We also highlight the potential pitfalls to availability of 5G technologies.展开更多
The existing literature on device-to-device(D2D)architecture suffers from a dearth of analysis under imperfect channel conditions.There is a need for rigorous analyses on the policy improvement and evaluation of netwo...The existing literature on device-to-device(D2D)architecture suffers from a dearth of analysis under imperfect channel conditions.There is a need for rigorous analyses on the policy improvement and evaluation of network performance.Accordingly,a two-stage transmit power control approach(named QSPCA)is proposed:First,a reinforcement Q-learning based power control technique and;second,a supervised learning based support vector machine(SVM)model.This model replaces the unified communication model of the conventional D2D setup with a distributed one,thereby requiring lower resources,such as D2D throughput,transmit power,and signal-to-interference-plus-noise ratio as compared to existing algorithms.Results confirm that the QSPCA technique is better than existing models by at least 15.31%and 19.5%in terms of throughput as compared to SVM and Q-learning techniques,respectively.The customizability of the QSPCA technique opens up multiple avenues and industrial communication technologies in 5G networks,such as factory automation.展开更多
With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to netw...With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to networks and brings huge challenge to servicing user demand.Edge caching,which utilizes the storage and computation resources of the edge to bring resources closer to end users,is a promising way to relieve network burden and enhance user experience.In this paper,we aim to survey the edge caching techniques from a comprehensive and systematic perspective.We first present an overview of edge caching,summarizing the three key issues regarding edge caching,i.e.,where,what,and how to cache,and then introducing several significant caching metrics.We then carry out a detailed and in-depth elaboration on these three issues,which correspond to caching locations,caching objects,and caching strategies,respectively.In particular,we innovate on the issue“what to cache”,interpreting it as the classification of the“caching objects”,which can be further classified into content cache,data cache,and service cache.Finally,we discuss several open issues and challenges of edge caching to inspire future investigations in this research area.展开更多
IoT devices have been widely used with the advent of 5G.These devices contain a large amount of private data during transmission.It is primely important for ensuring their security.Therefore,we proposed a lightweight ...IoT devices have been widely used with the advent of 5G.These devices contain a large amount of private data during transmission.It is primely important for ensuring their security.Therefore,we proposed a lightweight block cipher based on dynamic S-box named DBST.It is introduced for devices with limited hardware resources and high throughput requirements.DBST is a 128-bit block cipher supporting 64-bit key,which is based on a new generalized Feistel variant structure.It retains the consistency and significantly boosts the diffusion of the traditional Feistel structure.The SubColumns of round function is implemented by combining bit-slice technology with subkeys.The S-box is dynamically associated with the key.It has been demonstrated that DBST has a good avalanche effect,low hardware area,and high throughput.Our S-box has been proven to have fewer differential features than RECTANGLE S-box.The security analysis of DBST reveals that it can against impossible differential attack,differential attack,linear attack,and other types of attacks.展开更多
As a promising physical layer technique, nonorthogonal multiple access(NOMA) can admit multiple users over the same space-time resource block, and thus improve the spectral efficiency and increase the number of access...As a promising physical layer technique, nonorthogonal multiple access(NOMA) can admit multiple users over the same space-time resource block, and thus improve the spectral efficiency and increase the number of access users. Specifically, NOMA provides a feasible solution to massive Internet of Things(IoT) in 5G and beyond-5G wireless networks over a limited radio spectrum. However, severe co-channel interference and high implementation complexity hinder its application in practical systems. To solve these problems, multiple-antenna techniques have been widely used in NOMA systems by exploiting the benefits of spatial degrees of freedom. This study provides a comprehensive review of various multiple-antenna techniques in NOMA systems, with an emphasis on spatial interference cancellation and complexity reduction. In particular, we provide a detailed investigation on multiple-antenna techniques in two-user, multiuser, massive connectivity, and heterogeneous NOMA systems.Finally, future research directions and challenges are identified.展开更多
With the large-scale application of 5G in industrial production,the Internet of Things has become an important technology for various industries to achieve efficiency improvement and digital transformation with the he...With the large-scale application of 5G in industrial production,the Internet of Things has become an important technology for various industries to achieve efficiency improvement and digital transformation with the help of the mobile edge computing.In the modern industry,the user often stores data collected by IoT devices in the cloud,but the data at the edge of the network involves a large of the sensitive information,which increases the risk of privacy leakage.In order to address these two challenges,we propose a security strategy in the edge computing.Our security strategy combines the Feistel architecture and short comparable encryption based on sliding window(SCESW).Compared to existing security strategies,our proposed security strategy guarantees its security while significantly reducing the computational overhead.And our GRC algorithm can be successfully deployed on a hardware platform.展开更多
With the large-scale application of 5G in industrial production,the Internet of Things has become an important technology for various industries to achieve efficiency improvement and digital transformation with the he...With the large-scale application of 5G in industrial production,the Internet of Things has become an important technology for various industries to achieve efficiency improvement and digital transformation with the help of the mobile edge computing.In the modern industry,the user often stores data collected by IoT devices in the cloud,but the data at the edge of the network involves a large of the sensitive information,which increases the risk of privacy leakage.In order to address these two challenges,we propose a security strategy in the edge computing.Our security strategy combines the Feistel architecture and short comparable encryption based on sliding window(SCESW).Compared to existing security strategies,our proposed security strategy guarantees its security while significantly reducing the computational overhead.And our GRC algorithm can be successfully deployed on a hardware platform.展开更多
文摘Road transport is been used for moving people and all kinds of goods throughout the world. However, it is one mode of transportation that is prone to accidents and it faces a plethora of never-ending challenges, such as the frequent loss of lives and valuables when accident occurs. The best course of action to handle these issues is to set up an autonomous incident detection system using wireless communication, 5G technologies and the Internet of Things. IoT is a seamless technology that increases the connectivity between humans and machines. It is web-based, and improves communication between vehicle to vehicle, vehicle to infrastructures, transfer of data and information to predict incident occurrences through various networks and frameworks such as eCall, OneM2M and integration of mobile broadband. Additionally, internet of things is being adopted for public safety;for instance, it can speed up first responders’ response times to situations by displaying the best routes to a scene of an accident. The rapid development of 5G is happening in parallel with developments of internet of things (IoT), artificial intelligence (AI), and smart platforms for novel applications such as mission-critical communications. 5G is a new generation technology that operates on the Ultra High Spectrum Band UHSB. It is an innovation that uses the pedestrians-vehicle-road-cloud, and the communication between vehicle locations and temperature of high-quality connection. It is essential for intelligent transport systems because it allows for information sharing, prediction of incidences as safety is the primary concern of road transport. This review examines accident detection through 5G technology, integrated mobile broadband, and multiple inputs multiple outputs (MIMO) wireless system. Finally, we conclude by examining recent technology, challenges, present and future research trends.
文摘The ever-increasing needs of Internet of Things networks (IoTn) present considerable issues in computing complexity, security, trust, and authentication, among others. This gets increasingly more challenging as technology advances, and its use expands. As a consequence, boosting the capacity of these networks has garnered widespread attention. As a result, 5G, the next phase of cellular networks, is expected to be a game-changer, bringing with it faster data transmission rates, more capacity, improved service quality, and reduced latency. However, 5G networks continue to confront difficulties in establishing pervasive and dependable connections amongst high-speed IoT devices. Thus, to address the shortcomings in current recommendations, we present a unified architecture based on software-defined networks (SDNs) that provides 5G-enabled devices that must have complete secrecy. Through SDN, the architecture streamlines network administration while optimizing network communications. A mutual authentication protocol using elliptic curve cryptography is introduced for mutual authentication across certificate authorities and clustered heads in IoT network deployments based on IoT. Again, a dimensionality reduction intrusion detection mechanism is introduced to decrease computational cost and identify possible network breaches. However, to leverage the method’s potential, the initial module's security is reviewed. The second module is evaluated and compared to modern models.
文摘The fast technology development of 5G mobile broadband (5G), Internet of Things (IoT), Big Data Analytics (Big Data), Cloud Computing (Cloud) and Software Defined Networks (SDN) has made those technologies one after another and created strong interdependence among one another. For example, IoT applications that generate small data with large volume and fast velocity will need 5G with characteristics of high data rate and low latency to transmit such data faster and cheaper. On the other hand, those data also need Cloud to process and to store and furthermore, SDN to provide scalable network infrastructure to transport this large volume of data in an optimal way. This article explores the technical relationships among the development of IoT, Big Data, Cloud, and SDN in the coming 5G era and illustrates several ongoing programs and applications at National Chiao Tung University that are based on the converging of those technologies.
文摘近年来国内的物联网(Internet of Things,IoT)技术实现了显著的发展,是现代信息技术领域中重要的技术内容。在5G时代,将5G网络技术作为发展物联网技术的核心,可以为物联网技术的研究创造良好的基础条件,大幅提高物联网技术的实际应用水平,扩大物联网技术的影响范围,使得物联网技术在信息交流与通信过程中具有更好的优势,相关领域对于5G网络技术与物联网技术的融合研究也更加深刻,能够充分认识到物联网技术对现代社会发展的重要作用。对5G网络技术的应用现状进行分析,研究了5G网络技术的基本特点,分析了5G网络技术与物联网技术的融合趋势,旨在推进我国5G移动通信与物联网技术的同步发展。
文摘The term Internet of Things has increased in popularity in recent years and has spread to be used in many applications around us,such as healthcare applications,smart homes and smart cities,IoT is a group of smart devices equipped with sensors that have the ability to calculate data,and carry out actions in the environment in which they are located,they are connected to each other through the Internet and recently it has become supported by 5G technology due to many advantages such as its ability to provide a fast connection,despite the efficiency of the IoT supported by the five G technology,it is subject to many security challenges.In this paper,we conducted a comprehensive review of previous research related to the security requirements of the IoT and security attacks.
文摘The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms.
文摘The Internet of Things(IoT)is playing an important role in providing access to affordable,clean and green energy worldwide through the use of smart devices.The current electric power networks will be more reliable,secure,flexible and durable by implementing IoT in power systems.This paper presents a brief discussion about IoT contributions in the development of power systems from a generation,transmission,distribution and consumption point of view.5G cellular networks have a great potential for the development of IoT technology.Additionally,5G cellular networks can be instrumental in supporting the greater communication needs of IoT.This review provides a comprehensive analysis about the role of 5G cellular networks in the growth of IoT technology and power systems.Large amounts of data will be generated due to the incorporation of renewable energy,deployment of the smart grid and the improvements to the electricity market.In this way,in order to realize the connection between things and people,things and things and people and people in power systems,it is essential to apply IoT in power systems.In this case,5G is providing numerous advantages to Power IoT(PIoT)by offering greater opportunities in progress and improvements;however,there are also numerous challenges with the deployment of 5G in PIoT.Finally,this review article provides an overview of the role,implications and challenges of 5G in PIoT.
基金supported by National Science and Technology Major Program of the Ministry of Science and Technology(No.2018ZX03001031)Key program of Beijing Municipal Natural Science Foundation(No.L172030)+1 种基金Beijing unicipal Science and Technology Commission Project(No.Z181100003218007)National Key Technology Research and Development Program of the Ministry of Science and Technology of China(NO.2012BAF14B01)
文摘Internet of Things(IoT) is one of the targeted application scenarios of fifth generation(5 G) wireless communication.IoT brings a large amount of data transported on the network.Considering those data,machine learning(ML) algorithms can be naturally utilized to make network efficiently and reliably.However,how to fully apply ML to IoT driven wireless network is still open.The fundamental reason is that wireless communication pursuits the high capacity and quality facing the challenges from the varying and fading wireless channel.So in this paper,we explore feasible combination for ML and IoT driven wireless network from wireless channel perspective.Firstly,a three-level structure of wireless channel fading features is defined in order to classify the versatile propagation environments.This three-layer structure includes scenario,meter and wavelength levels.Based on this structure,there are different tasks like service prediction and pushing,self-organization networking,self adapting largescale fading modeling and so on,which can be abstracted into problems like regression,classification,clustering,etc.Then,we introduce corresponding ML methods to different levelsfrom channel perspective,which makes their interdisciplinary research promisingly.
基金This work was supported by Institute for Information&communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(No.2020-0-00959,Fast Intelligence Analysis HW/SW Engine Exploiting IoT Platform for Boosting On-device AI in 5G Environment).
文摘To provide Artificial Intelligence(AI)services such as object detection,Internet of Things(IoT)sensor devices should be able to send a large amount of data such as images and videos.However,this inevitably causes IoT networks to be severely overloaded.In this paper,therefore,we propose a novel oneM2M-compliant Artificial Intelligence of Things(AIoT)system for reducing overall data traffic and offering object detection.It consists of some IoT sensor devices with random sampling functions controlled by a compressed sensing(CS)rate,an IoT edge gateway with CS recovery and domain transform functions related to compressed sensing,and a YOLOv5 deep learning function for object detection,and an IoT server.By analyzing the effects of compressed sensing on data traffic reduction in terms of data rate per IoT sensor device,we showed that the proposed AIoT system can reduce the overall data traffic by changing compressed sensing rates of random sampling functions in IoT sensor devices.In addition,we analyzed the effects of the compressed sensing on YOLOv5 object detection in terms of performance metrics such as recall,precision,mAP50,and mAP,and found that recall slightly decreases but precision remains almost constant even though the compressed sensing rate decreases and that mAP50 and mAP are gradually degraded according to the decreased compressed sensing rate.Consequently,if proper compressed sensing rates are chosen,the proposed AIoT system will reduce the overall data traffic without significant performance degradation of YOLOv5.
基金This work was supported in part by National Key R&D Program of China(2020YFB1806700)in part by the Key Research and Development Project of Sichuan Provincial Department of Science and Technology(2018JZ0071)+3 种基金in part by the Zhejiang Lab(No.2021KF0AB03)in part by the Chongqing Technological Innovation and Application Development Projects(cstc2019jscx-msxm1322)in part by the Sichuan International Science and Technology Innovation Cooperation/Hong Kong,Macao and Taiwan Science and Technology Innovation Cooperation Project(2019YFH0163)in part by the Young Elite Scientist Sponsorship Program by China Institute of Communications.
文摘Fog Radio Access Network(F-RAN)has been regarded as a promising solution to the alleviation of the ever-increasing traffic burden on current and future wireless networks,for it shifts the caching and computing resources from remote cloud to the network edge.However,it makes wireless networks more vulnerable to security attacks as well.To resolve this issue,in this article,we propose a secure yet trustless Blockchain-based F-RAN(BF-RAN),which allows a massive number of trustless devices to form a large-scale trusted cooperative network by leveraging the key features of blockchain,such as decentralization,tamper-proof,and traceability.The architecture of BF-RAN is first presented.Then,the key technologies,including access control,dynamic resource management,and network deployment are discussed.Finally,challenges and open problems in the BF-RAN are identified.
文摘The indigenous developed global BeiDou Navigation System(BDS-3)was formally commissioned,marking the completion of the three-step BDS development strategy,and a new era for BDS to better serve people from all walks of life.In this paper,the recent progress and main characteristics of BDS technology fusion and industry integration are analyzed.The discussion on the latest development on"BDS+"application starts from"BDS+Technology"and"BDS+Industry",through to the future prospective BDS applications.
基金Thisworkwas supported by National Institutes of Health(Grant No.UL1TR001881).
文摘Despite intensive efforts,there are still enormous challenges in provision of healthcare services to the increasing aging population.Recent observations have raised concerns regarding the soaring costs of healthcare,the imbalance of medical resources,inefficient healthcare system administration,and inconvenient medical experiences.However,cutting-edge technologies are being developed to meet these challenges,including,but not limited to,Internet of Things(IoT),big data,artificial intelligence,and 5G wireless transmission technology to improve the patient experience and healthcare service quality,while cutting the total cost attributable to healthcare.This is not an unrealistic fantasy,as these emerging technologies are beginning to impact and reconstruct healthcare in subtleways.Although the technologies mentioned above are integrated,in this review we take a brief look at cases focusing on the application of 5G wireless transmission technology in healthcare.We also highlight the potential pitfalls to availability of 5G technologies.
文摘The existing literature on device-to-device(D2D)architecture suffers from a dearth of analysis under imperfect channel conditions.There is a need for rigorous analyses on the policy improvement and evaluation of network performance.Accordingly,a two-stage transmit power control approach(named QSPCA)is proposed:First,a reinforcement Q-learning based power control technique and;second,a supervised learning based support vector machine(SVM)model.This model replaces the unified communication model of the conventional D2D setup with a distributed one,thereby requiring lower resources,such as D2D throughput,transmit power,and signal-to-interference-plus-noise ratio as compared to existing algorithms.Results confirm that the QSPCA technique is better than existing models by at least 15.31%and 19.5%in terms of throughput as compared to SVM and Q-learning techniques,respectively.The customizability of the QSPCA technique opens up multiple avenues and industrial communication technologies in 5G networks,such as factory automation.
基金supported by the National Natural Science Foundation of China(No.92267104)the Natural Science Foundation of Jiangsu Province of China(No.BK20211284)Financial and Science Technology Plan Project of Xinjiang Production and Construction Corps(No.2020DB005).
文摘With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to networks and brings huge challenge to servicing user demand.Edge caching,which utilizes the storage and computation resources of the edge to bring resources closer to end users,is a promising way to relieve network burden and enhance user experience.In this paper,we aim to survey the edge caching techniques from a comprehensive and systematic perspective.We first present an overview of edge caching,summarizing the three key issues regarding edge caching,i.e.,where,what,and how to cache,and then introducing several significant caching metrics.We then carry out a detailed and in-depth elaboration on these three issues,which correspond to caching locations,caching objects,and caching strategies,respectively.In particular,we innovate on the issue“what to cache”,interpreting it as the classification of the“caching objects”,which can be further classified into content cache,data cache,and service cache.Finally,we discuss several open issues and challenges of edge caching to inspire future investigations in this research area.
文摘IoT devices have been widely used with the advent of 5G.These devices contain a large amount of private data during transmission.It is primely important for ensuring their security.Therefore,we proposed a lightweight block cipher based on dynamic S-box named DBST.It is introduced for devices with limited hardware resources and high throughput requirements.DBST is a 128-bit block cipher supporting 64-bit key,which is based on a new generalized Feistel variant structure.It retains the consistency and significantly boosts the diffusion of the traditional Feistel structure.The SubColumns of round function is implemented by combining bit-slice technology with subkeys.The S-box is dynamically associated with the key.It has been demonstrated that DBST has a good avalanche effect,low hardware area,and high throughput.Our S-box has been proven to have fewer differential features than RECTANGLE S-box.The security analysis of DBST reveals that it can against impossible differential attack,differential attack,linear attack,and other types of attacks.
基金the National Natural Science Founda-tion of China(No.61871344)the Zhejiang Provincial Natural Science Foundation of China(No.LR20F010002)+1 种基金the National Science and Technology Major Project of China(No.2018ZX03001017-002)the National Key R&D Programof China (No. 2018YFB1801104)。
文摘As a promising physical layer technique, nonorthogonal multiple access(NOMA) can admit multiple users over the same space-time resource block, and thus improve the spectral efficiency and increase the number of access users. Specifically, NOMA provides a feasible solution to massive Internet of Things(IoT) in 5G and beyond-5G wireless networks over a limited radio spectrum. However, severe co-channel interference and high implementation complexity hinder its application in practical systems. To solve these problems, multiple-antenna techniques have been widely used in NOMA systems by exploiting the benefits of spatial degrees of freedom. This study provides a comprehensive review of various multiple-antenna techniques in NOMA systems, with an emphasis on spatial interference cancellation and complexity reduction. In particular, we provide a detailed investigation on multiple-antenna techniques in two-user, multiuser, massive connectivity, and heterogeneous NOMA systems.Finally, future research directions and challenges are identified.
基金the National Natural Science Foundation of China under Grant 61802303,61772418 and 61602378the Key Research and Development Program of Shaanxi under Grant 2020ZDLGY08-04 and 2019KW-053+3 种基金the Innovation Capability Support Program in Shaanxi Province of China under Grant 2020KJXX-052 and 2017KJXX-47the Natural Science Basic Research Plan in Shaanxi Province of China under Grant 2019JQ-866,2018JZ6001 and 2016JM6033the Research Program of Education Bureau of Shaanxi Province under Grant 19JK0803the New Star Team of Xi’an University of Posts and Telecommunications under Grant 2016-02.
文摘With the large-scale application of 5G in industrial production,the Internet of Things has become an important technology for various industries to achieve efficiency improvement and digital transformation with the help of the mobile edge computing.In the modern industry,the user often stores data collected by IoT devices in the cloud,but the data at the edge of the network involves a large of the sensitive information,which increases the risk of privacy leakage.In order to address these two challenges,we propose a security strategy in the edge computing.Our security strategy combines the Feistel architecture and short comparable encryption based on sliding window(SCESW).Compared to existing security strategies,our proposed security strategy guarantees its security while significantly reducing the computational overhead.And our GRC algorithm can be successfully deployed on a hardware platform.
基金supported by the National Natural Science Foundation of China under Grant 61802303,61772418 and 61602378the Key Research and Development Program of Shaanxi under Grant 2020ZDLGY08-04 and 2019KW-053+3 种基金the Innovation Capability Support Program in Shaanxi Province of China under Grant 2020KJXX-052 and 2017KJXX-47the Natural Science Basic Research Plan in Shaanxi Province of China under Grant 2019JQ-866,2018JZ6001 and 2016JM6033the Research Program of Education Bureau of Shaanxi Province under Grant 19JK0803the New Star Team of Xi’an University of Posts and Telecommunications under Grant 2016-02.
文摘With the large-scale application of 5G in industrial production,the Internet of Things has become an important technology for various industries to achieve efficiency improvement and digital transformation with the help of the mobile edge computing.In the modern industry,the user often stores data collected by IoT devices in the cloud,but the data at the edge of the network involves a large of the sensitive information,which increases the risk of privacy leakage.In order to address these two challenges,we propose a security strategy in the edge computing.Our security strategy combines the Feistel architecture and short comparable encryption based on sliding window(SCESW).Compared to existing security strategies,our proposed security strategy guarantees its security while significantly reducing the computational overhead.And our GRC algorithm can be successfully deployed on a hardware platform.