In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ...In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ISAC, we propose a design scheme based on spectrum sharing, that is,to maximize the mutual information(MI) of radar sensing while ensuring certain communication rate and transmission power constraints. In the proposed scheme, three cases are considered for the scattering off the target due to the communication signals,as negligible signal, beneficial signal, and interference signal to radar sensing, respectively, thus requiring three power allocation schemes. However,the corresponding power allocation schemes are nonconvex and their closed-form solutions are unavailable as a consequence. Motivated by this, alternating optimization(AO), sequence convex programming(SCP) and Lagrange multiplier are individually combined for three suboptimal solutions corresponding with three power allocation schemes. By combining the three algorithms, we transform the non-convex problem which is difficult to deal with into a convex problem which is easy to solve and obtain the suboptimal solution of the corresponding optimization problem. Numerical results show that, compared with the allocation results of the existing algorithms, the proposed joint design algorithm significantly improves the radar performance.展开更多
The Backscatter communication has gained widespread attention from academia and industry in recent years. In this paper, A method of resource allocation and trajectory optimization is proposed for UAV-assisted backsca...The Backscatter communication has gained widespread attention from academia and industry in recent years. In this paper, A method of resource allocation and trajectory optimization is proposed for UAV-assisted backscatter communication based on user trajectory. This paper will establish an optimization problem of jointly optimizing the UAV trajectories, UAV transmission power and BD scheduling based on the large-scale channel state signals estimated in advance of the known user trajectories, taking into account the constraints of BD data and working energy consumption, to maximize the energy efficiency of the system. The problem is a non-convex optimization problem in fractional form, and there is nonlinear coupling between optimization variables.An iterative algorithm is proposed based on Dinkelbach algorithm, block coordinate descent method and continuous convex optimization technology. First, the objective function is converted into a non-fractional programming problem based on Dinkelbach method,and then the block coordinate descent method is used to decompose the original complex problem into three independent sub-problems. Finally, the successive convex approximation method is used to solve the trajectory optimization sub-problem. The simulation results show that the proposed scheme and algorithm have obvious energy efficiency gains compared with the comparison scheme.展开更多
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t...With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.展开更多
The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and ...The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and needs to be explored in various areas to understand the key challenges for deployment in real-world scenarios.The paper systematically reviewed the available literature using the PRISMA guiding principle.The study aims to provide a detailed overview of the increasing use of FL in IoT networks,including the architecture and challenges.A systematic review approach is used to collect,categorize and analyze FL-IoT-based articles.Asearch was performed in the IEEE,Elsevier,Arxiv,ACM,and WOS databases and 92 articles were finally examined.Inclusion measures were published in English and with the keywords“FL”and“IoT”.The methodology begins with an overview of recent advances in FL and the IoT,followed by a discussion of how these two technologies can be integrated.To be more specific,we examine and evaluate the capabilities of FL by talking about communication protocols,frameworks and architecture.We then present a comprehensive analysis of the use of FL in a number of key IoT applications,including smart healthcare,smart transportation,smart cities,smart industry,smart finance,and smart agriculture.The key findings from this analysis of FL IoT services and applications are also presented.Finally,we performed a comparative analysis with FL IID(independent and identical data)and non-ID,traditional centralized deep learning(DL)approaches.We concluded that FL has better performance,especially in terms of privacy protection and resource utilization.FL is excellent for preserving privacy becausemodel training takes place on individual devices or edge nodes,eliminating the need for centralized data aggregation,which poses significant privacy risks.To facilitate development in this rapidly evolving field,the insights presented are intended to help practitioners and researchers navigate the complex terrain of FL and IoT.展开更多
This paper investigates the bit-interleaved coded generalized spatial modulation(BICGSM) with iterative decoding(BICGSM-ID) for multiple-input multiple-output(MIMO) visible light communications(VLC). In the BICGSM-ID ...This paper investigates the bit-interleaved coded generalized spatial modulation(BICGSM) with iterative decoding(BICGSM-ID) for multiple-input multiple-output(MIMO) visible light communications(VLC). In the BICGSM-ID scheme, the information bits conveyed by the signal-domain(SiD) symbols and the spatial-domain(SpD) light emitting diode(LED)-index patterns are coded by a protograph low-density parity-check(P-LDPC) code. Specifically, we propose a signal-domain symbol expanding and re-allocating(SSER) method for constructing a type of novel generalized spatial modulation(GSM) constellations, referred to as SSERGSM constellations, so as to boost the performance of the BICGSM-ID MIMO-VLC systems.Moreover, by applying a modified PEXIT(MPEXIT) algorithm, we further design a family of rate-compatible P-LDPC codes, referred to as enhanced accumulate-repeat-accumulate(EARA) codes,which possess both excellent decoding thresholds and linear-minimum-distance-growth property. Both analysis and simulation results illustrate that the proposed SSERGSM constellations and P-LDPC codes can remarkably improve the convergence and decoding performance of MIMO-VLC systems. Therefore, the proposed P-LDPC-coded SSERGSM-mapped BICGSMID configuration is envisioned as a promising transmission solution to satisfy the high-throughput requirement of MIMO-VLC applications.展开更多
This paper investigates the consensus control of multi-agent systems(MASs) with constrained input using the dynamic event-triggered mechanism(ETM).Consider the MASs with small-scale networks where a centralized dynami...This paper investigates the consensus control of multi-agent systems(MASs) with constrained input using the dynamic event-triggered mechanism(ETM).Consider the MASs with small-scale networks where a centralized dynamic ETM with global information of the MASs is first designed.Then,a distributed dynamic ETM which only uses local information is developed for the MASs with large-scale networks.It is shown that the semi-global consensus of the MASs can be achieved by the designed bounded control protocol where the Zeno phenomenon is eliminated by a designable minimum inter-event time.In addition,it is easier to find a trade-off between the convergence rate and the minimum inter-event time by an adjustable parameter.Furthermore,the results are extended to regional consensus of the MASs with the bounded control protocol.Numerical simulations show the effectiveness of the proposed approach.展开更多
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e...The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.展开更多
In this paper,the channel capacity of the multiple-input multiple-output(MIMO)visible light communication(VLC)system is investigated under the peak,average optical and electrical power constraints.Finding the channel ...In this paper,the channel capacity of the multiple-input multiple-output(MIMO)visible light communication(VLC)system is investigated under the peak,average optical and electrical power constraints.Finding the channel capacity of MIMO VLC is shown to be a mixed integer programming problem.To address this open problem,we propose an inexact gradient projection method to find the channel capacity-achieving discrete input distribution and the channel capacity of MIMO VLC.Also we derive both upper and lower bounds of the capacity of MIMO VLC with the closed-form expressions.Furthermore,by considering practical discrete constellation inputs,we develop the optimal power allocation scheme to maximize transmission rate of MIMO VLC system.Simulation results show that more discrete points are needed to achieve the channel capacity as SNR increases.Both the upper and lower bounds of channel capacity are tight at low SNR region.In addition,comparing the equal power allocation,the proposed power allocation scheme can significantly increase the rate for the low-order modulation inputs.展开更多
This paper focuses on anti-jamming and anti-eavesdropping problem in air-to-ground(A2G)communication networks considering the impact of body jitter of unmanned aerial vehicle(UAV).A full-duplex(FD)active ground eavesd...This paper focuses on anti-jamming and anti-eavesdropping problem in air-to-ground(A2G)communication networks considering the impact of body jitter of unmanned aerial vehicle(UAV).A full-duplex(FD)active ground eavesdropper launches jamming attack while eavesdropping to stimulate the legitimate transmitter(i.e.,UAV)to increase its transmission power.The legitimate transmitter’s objective is to against the simultaneous wiretapping and jamming with a robust and power-efficient transmission scheme.The active eavesdropper aims to minimize the system secrecy rate.To study the interaction between the legitimate transmitter and the active eavesdropper,a non-cooperative game framework is formulated.Detailed,considering the impact of UAV jitter on antenna array response and secrecy performance,we first investigate the UAV’s transmission power minimization problem for the worst scenario with minimum legitimate data rate and maximum eavesdropping data rate under UAV jitter.Then,the active eavesdropper’s secrecy rate minimization problem with the worst scenario is investigated by optimizing its jamming strategy.Nash equilibrium is proved to be existed and obtained with the proposed iterative algorithm.Finally,extensive numerical results are provided to evaluate the system secrecy performance and to show the secrecy performance gains of the proposed method.展开更多
This paper proposes a high-throughput short reference differential chaos shift keying cooperative communication system with the aid of code index modulation,referred to as CIM-SR-DCSK-CC system.In the proposed CIM-SR-...This paper proposes a high-throughput short reference differential chaos shift keying cooperative communication system with the aid of code index modulation,referred to as CIM-SR-DCSK-CC system.In the proposed CIM-SR-DCSK-CC system,the source transmits information bits to both the relay and destination in the first time slot,while the relay not only forwards the source information bits but also sends new information bits to the destination in the second time slot.To be specific,the relay employs an N-order Walsh code to carry additional log_(2)N information bits,which are superimposed onto the SRDCSK signal carrying the decoded source information bits.Subsequently,the superimposed signal carrying both the source and relay information bits is transmitted to the destination.Moreover,the theoretical bit error rate(BER)expressions of the proposed CIMSR-DCSK-CC system are derived over additive white Gaussian noise(AWGN)and multipath Rayleigh fading channels.Compared with the conventional DCSKCC system and SR-DCSK-CC system,the proposed CIM-SR-DCSK-CC system can significantly improve the throughput without deteriorating any BER performance.As a consequence,the proposed system is very promising for the applications of the 6G-enabled lowpower and high-rate communication.展开更多
Dear Editor, In recent decades, owing to the significance of sampled-data control way on reducing the burden of communication transmission and improving the control capability of networked control systems, the researc...Dear Editor, In recent decades, owing to the significance of sampled-data control way on reducing the burden of communication transmission and improving the control capability of networked control systems, the research of sampled-data systems has become increasingly important(see [1]–[5]).展开更多
This paper concerns minimum-energy leader-following formation design and analysis problems of distributed multiagent systems(DMASs)subjected to randomly switching topologies and aperiodic communication pauses.The crit...This paper concerns minimum-energy leader-following formation design and analysis problems of distributed multiagent systems(DMASs)subjected to randomly switching topologies and aperiodic communication pauses.The critical feature of this paper is that the energy consumption during the formation control process is restricted by the minimum-energy constraint in the sense of the linear matrix inequality.Firstly,the leader-following formation control protocol is proposed based on the relative state information of neighboring agents,where the total energy consumption is considered.Then,minimum-energy leader-following formation design and analysis criteria are presented in the form of the linear matrix inequality,which can be checked by the generalized eigenvalue method.Especially,the value of the minimum-energy constraint is determined.An illustrative simulation is provided to show the effectiveness of the main results.展开更多
We present a faithful and efficient hyperentanglement purification protocol(hyper-EPP)for nonlocal two-photon systems in spatial-polarization-time-bin hyperentangled Bell states.As the single-photon detectors can dete...We present a faithful and efficient hyperentanglement purification protocol(hyper-EPP)for nonlocal two-photon systems in spatial-polarization-time-bin hyperentangled Bell states.As the single-photon detectors can detect and herald the undesirable properties caused by side leakage and finite coupling strength,the parity-check gates and swap gates of our hyper-EPP in the spatial,polarization and time-bin mode degrees of freedom(DoFs)work faithfully.The qubit-flip errors in photon systems in three DoFs can be corrected effectively with the faithful parity-check gates and the photon pairs can be reused to distill high-fidelity ones by introducing the faithful swap gates,which greatly increases the efficiency of our hyper-EPP.Further,the maximal hyperentanglement can be obtained in principle by operating multiple rounds of the hyper-EPP.展开更多
Free space optical(FSO)communication has recently aroused great interest in academia due to its unique features,such as large transmission band,high data rates,and strong anti-electromagnetic interference.With the aim...Free space optical(FSO)communication has recently aroused great interest in academia due to its unique features,such as large transmission band,high data rates,and strong anti-electromagnetic interference.With the aim of evaluating the performance of an FSO communication system and extending the line-of-sight transmission distance,we propose an unmanned aerial vehicle(UAV)-assisted dual-hop FSO communication system equipped with amplifyand-forward protocol at the relay node.Specifically,we consider impairments of atmospheric absorption,pointing errors,atmospheric turbulence,and link interruptions due to angle-of-arrival fluctuations in the relay system.The Gamma-Gamma and Malaga distributions are used to model the influence of atmospheric turbulence on the source-to-UAV and UAVto-destination links,respectively.We derive closedform expressions of the probability density function(PDF)and cumulative distribution function(CDF)for the proposed communication system,in terms of the Meijer-G function.Based on the precise PDF and CDF,analytical expressions for the outage probability,average bit error rate,and ergodic capacity are proposed with the aid of the extended generalized bivariate Fox’s H function.Finally,we show that there is a match between the analytical results and numerical results,and we analyze the influence of the system and channel parameters on the performance.展开更多
The minimum energy per bit(EPB)as the energy efficiency(EE)metric in an automatic retransmission request(ARQ)based multi-hop system is analyzed under power and throughput constraints.Two ARQ protocols including type-I...The minimum energy per bit(EPB)as the energy efficiency(EE)metric in an automatic retransmission request(ARQ)based multi-hop system is analyzed under power and throughput constraints.Two ARQ protocols including type-I(ARQ-I)and repetition redundancy(ARQ-RR)are considered and expressions for the optimal power allocation(PA)are obtained.Using the obtained optimal powers,the EE-throughput tradeoff(EETT)is analyzed and the EETT closed-form expressions for both ARQ protocols and in arbitrary average channel gain values are obtained.It is shown that how different throughput requirements,especially the high levels,affect the EE performance.Additionally,asymptotic analysis is made in the feasible high throughput values and lower and upper EETT bounds are derived for ARQ-I protocol.To evaluate the EE a distributed PA scenario,as a benchmark,is presented and the energy savinggain obtained from the optimal PA in comparison with the distributed PA for ARQ-I and ARQ-RR protocols is discussed in different throughput values and node locations.展开更多
Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)networks.However,several security vulnerabil...Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)networks.However,several security vulnerabilities and attacks have plagued previous generations of communication systems;thus,physical layer security,especially against eavesdroppers,is vital,especially for upcoming 6G networks.In this regard,UAVs have appeared as a winning candidate to mitigate security risks.In this paper,we leverage UAVs to propose two methods.The first method utilizes a UAV as Decode-and-Forward(DF)relay,whereas the second method utilizes a UAV as a jammer to mitigate eavesdropping attacks for URLLC between transmitter and receiver devices.Moreover,we present a low-complexity algorithm that outlines the two aforementioned methods of mitigating interception,i.e.increasing secrecy rate,and we compare them with the benchmark null method in which there is a direct communication link between transmitter and receiver without the UAV DF relay.Additionally,simulation results show the effectiveness of such methods by improving the secrecy rate and its dependency on UAV height,blocklength,decoding error probability and transmitter-receiver separation distance.Lastly,we recommend the best method to enhance the secrecy rate in the presence of an eavesdropper based on our simulations.展开更多
As one of the most promising platforms for wireless communication,radiofrequency(RF)electronics have been widely advocated for the development of sensing systems.In particular,monolayer and few-layer two-dimensional(2...As one of the most promising platforms for wireless communication,radiofrequency(RF)electronics have been widely advocated for the development of sensing systems.In particular,monolayer and few-layer two-dimensional(2D)materials exhibiting extraordinary electrical properties not only can be integrated to improve the performance of RF circuits,but also to display exceptional sensing capabilities.This review provides an in-depth perspective of current trends and challenges in the application of 2D materials for RF biochemical sensing,including:(i)theoretical bases to achieve different sensing schemes;(ii)unique properties of 2D materials for reasoning their applications in RF sensing;(iii)developments in 2D RF sensors to facilitate the practice of biochemical sensors with ever-demanding sensitivities,as well as their potential uses in meeting the requirements and challenges of biochemical sensors in the Internet-of-Things era.展开更多
In order to reduce the physical impairment caused by signal distortion,in this paper,we investigate symbol detection with Deep Learning(DL)methods to improve bit-error performance in the optical communication system.M...In order to reduce the physical impairment caused by signal distortion,in this paper,we investigate symbol detection with Deep Learning(DL)methods to improve bit-error performance in the optical communication system.Many DL-based methods have been applied to such systems to improve bit-error performance.Referring to the speech-to-text method of automatic speech recognition,this paper proposes a signal-to-symbol method based on DL and designs a receiver for symbol detection on single-polarized optical communications modes.To realize this detection method,we propose a non-causal temporal convolutional network-assisted receiver to detect symbols directly from the baseband signal,which specifically integrates most modules of the receiver.Meanwhile,we adopt three training approaches for different signal-to-noise ratios.We also apply a parametric rectified linear unit to enhance the noise robustness of the proposed network.According to the simulation experiments,the biterror-rate performance of the proposed method is close to or even superior to that of the conventional receiver and better than the recurrent neural network-based receiver.展开更多
Many Internet of Things(IoT)systems are based on the intercommunication among different devices and centralized systems.Nowadays,there are several commercial and research platforms available to simplify the creation o...Many Internet of Things(IoT)systems are based on the intercommunication among different devices and centralized systems.Nowadays,there are several commercial and research platforms available to simplify the creation of such IoT systems.However,developing these systems can often be a tedious task.To address this challenge,a proposed solution involves the implementation of a unified program or script that encompasses the entire system,including IoT devices functionality.This approach is based on an abstraction,integrating the control of the devices in a single program through a programmable object.Subsequently,the proposal processes the unified script to generate the centralized system code and a controller for each device.By adopting this approach,developers will be able to create IoT systems with significantly reduced implementation costs,surpassing current platforms by more than 10%.The results demonstrate that the single program approach can significantly accelerate the development of IoT systems relying on device communication.展开更多
Target signal acquisition and detection based on sonar images is a challenging task due to the complex underwater environment.In order to solve the problem that some semantic information in sonar images is lost and mo...Target signal acquisition and detection based on sonar images is a challenging task due to the complex underwater environment.In order to solve the problem that some semantic information in sonar images is lost and model detection performance is degraded due to the complex imaging environment,we proposed a more effective and robust target detection framework based on deep learning,which can make full use of the acoustic shadow information in the forward-looking sonar images to assist underwater target detection.Firstly,the weighted box fusion method is adopted to generate a fusion box by weighted fusion of prediction boxes with high confidence,so as to obtain accurate acoustic shadow boxes.Further,the acoustic shadow box is cut down to get the feature map containing the acoustic shadow information,and then the acoustic shadow feature map and the target information feature map are adaptively fused to make full use of the acoustic shadow feature information.In addition,we introduce a threshold processing module to improve the attention of the model to important feature information.Through the underwater sonar dataset provided by Pengcheng Laboratory,the proposed method improved the average accuracy by 3.14%at the IoU threshold of 0.7,which is better than the current traditional target detection model.展开更多
文摘In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ISAC, we propose a design scheme based on spectrum sharing, that is,to maximize the mutual information(MI) of radar sensing while ensuring certain communication rate and transmission power constraints. In the proposed scheme, three cases are considered for the scattering off the target due to the communication signals,as negligible signal, beneficial signal, and interference signal to radar sensing, respectively, thus requiring three power allocation schemes. However,the corresponding power allocation schemes are nonconvex and their closed-form solutions are unavailable as a consequence. Motivated by this, alternating optimization(AO), sequence convex programming(SCP) and Lagrange multiplier are individually combined for three suboptimal solutions corresponding with three power allocation schemes. By combining the three algorithms, we transform the non-convex problem which is difficult to deal with into a convex problem which is easy to solve and obtain the suboptimal solution of the corresponding optimization problem. Numerical results show that, compared with the allocation results of the existing algorithms, the proposed joint design algorithm significantly improves the radar performance.
文摘The Backscatter communication has gained widespread attention from academia and industry in recent years. In this paper, A method of resource allocation and trajectory optimization is proposed for UAV-assisted backscatter communication based on user trajectory. This paper will establish an optimization problem of jointly optimizing the UAV trajectories, UAV transmission power and BD scheduling based on the large-scale channel state signals estimated in advance of the known user trajectories, taking into account the constraints of BD data and working energy consumption, to maximize the energy efficiency of the system. The problem is a non-convex optimization problem in fractional form, and there is nonlinear coupling between optimization variables.An iterative algorithm is proposed based on Dinkelbach algorithm, block coordinate descent method and continuous convex optimization technology. First, the objective function is converted into a non-fractional programming problem based on Dinkelbach method,and then the block coordinate descent method is used to decompose the original complex problem into three independent sub-problems. Finally, the successive convex approximation method is used to solve the trajectory optimization sub-problem. The simulation results show that the proposed scheme and algorithm have obvious energy efficiency gains compared with the comparison scheme.
基金This work has received funding from National Natural Science Foundation of China(No.42275157).
文摘With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.
文摘The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and needs to be explored in various areas to understand the key challenges for deployment in real-world scenarios.The paper systematically reviewed the available literature using the PRISMA guiding principle.The study aims to provide a detailed overview of the increasing use of FL in IoT networks,including the architecture and challenges.A systematic review approach is used to collect,categorize and analyze FL-IoT-based articles.Asearch was performed in the IEEE,Elsevier,Arxiv,ACM,and WOS databases and 92 articles were finally examined.Inclusion measures were published in English and with the keywords“FL”and“IoT”.The methodology begins with an overview of recent advances in FL and the IoT,followed by a discussion of how these two technologies can be integrated.To be more specific,we examine and evaluate the capabilities of FL by talking about communication protocols,frameworks and architecture.We then present a comprehensive analysis of the use of FL in a number of key IoT applications,including smart healthcare,smart transportation,smart cities,smart industry,smart finance,and smart agriculture.The key findings from this analysis of FL IoT services and applications are also presented.Finally,we performed a comparative analysis with FL IID(independent and identical data)and non-ID,traditional centralized deep learning(DL)approaches.We concluded that FL has better performance,especially in terms of privacy protection and resource utilization.FL is excellent for preserving privacy becausemodel training takes place on individual devices or edge nodes,eliminating the need for centralized data aggregation,which poses significant privacy risks.To facilitate development in this rapidly evolving field,the insights presented are intended to help practitioners and researchers navigate the complex terrain of FL and IoT.
基金supported in part by the NSF of China under Grant 62322106,62071131the Guangdong Basic and Applied Basic Research Foundation under Grant 2022B1515020086+2 种基金the International Collaborative Research Program of Guangdong Science and Technology Department under Grant 2022A0505050070in part by the Open Research Fund of the State Key Laboratory of Integrated Services Networks under Grant ISN22-23the National Research Foundation,Singapore University of Technology Design under its Future Communications Research&Development Programme“Advanced Error Control Coding for 6G URLLC and mMTC”Grant No.FCP-NTU-RG-2022-020.
文摘This paper investigates the bit-interleaved coded generalized spatial modulation(BICGSM) with iterative decoding(BICGSM-ID) for multiple-input multiple-output(MIMO) visible light communications(VLC). In the BICGSM-ID scheme, the information bits conveyed by the signal-domain(SiD) symbols and the spatial-domain(SpD) light emitting diode(LED)-index patterns are coded by a protograph low-density parity-check(P-LDPC) code. Specifically, we propose a signal-domain symbol expanding and re-allocating(SSER) method for constructing a type of novel generalized spatial modulation(GSM) constellations, referred to as SSERGSM constellations, so as to boost the performance of the BICGSM-ID MIMO-VLC systems.Moreover, by applying a modified PEXIT(MPEXIT) algorithm, we further design a family of rate-compatible P-LDPC codes, referred to as enhanced accumulate-repeat-accumulate(EARA) codes,which possess both excellent decoding thresholds and linear-minimum-distance-growth property. Both analysis and simulation results illustrate that the proposed SSERGSM constellations and P-LDPC codes can remarkably improve the convergence and decoding performance of MIMO-VLC systems. Therefore, the proposed P-LDPC-coded SSERGSM-mapped BICGSMID configuration is envisioned as a promising transmission solution to satisfy the high-throughput requirement of MIMO-VLC applications.
基金supported in part by the National Natural Science Foundation of China(51939001,61976033,62273072)the Natural Science Foundation of Sichuan Province (2022NSFSC0903)。
文摘This paper investigates the consensus control of multi-agent systems(MASs) with constrained input using the dynamic event-triggered mechanism(ETM).Consider the MASs with small-scale networks where a centralized dynamic ETM with global information of the MASs is first designed.Then,a distributed dynamic ETM which only uses local information is developed for the MASs with large-scale networks.It is shown that the semi-global consensus of the MASs can be achieved by the designed bounded control protocol where the Zeno phenomenon is eliminated by a designable minimum inter-event time.In addition,it is easier to find a trade-off between the convergence rate and the minimum inter-event time by an adjustable parameter.Furthermore,the results are extended to regional consensus of the MASs with the bounded control protocol.Numerical simulations show the effectiveness of the proposed approach.
基金supported by the Natural Science Foundation Research Plan of Shanxi Province (2023JCQN0728)。
文摘The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.
基金supported by the Graduate Innovation Program of China University of Mining and Technology (2022WLKXJ016)in part by the Postgraduate Research&Practice Innovation Program of Jiangsu Province (KYCX222549)+3 种基金supported by Shaanxi Provincial Natural Science Foundation of China (2023-JC-YB-510)the Fundamental Research Funds for the Central Universities,CHD (300102322103)supported in part by Natural Science Foundation of Jiangsu Province (BK20200488)supported in part by Challenge Cup National Student Curricular Academic Science and Technology Works Competition (DCXM202212)。
文摘In this paper,the channel capacity of the multiple-input multiple-output(MIMO)visible light communication(VLC)system is investigated under the peak,average optical and electrical power constraints.Finding the channel capacity of MIMO VLC is shown to be a mixed integer programming problem.To address this open problem,we propose an inexact gradient projection method to find the channel capacity-achieving discrete input distribution and the channel capacity of MIMO VLC.Also we derive both upper and lower bounds of the capacity of MIMO VLC with the closed-form expressions.Furthermore,by considering practical discrete constellation inputs,we develop the optimal power allocation scheme to maximize transmission rate of MIMO VLC system.Simulation results show that more discrete points are needed to achieve the channel capacity as SNR increases.Both the upper and lower bounds of channel capacity are tight at low SNR region.In addition,comparing the equal power allocation,the proposed power allocation scheme can significantly increase the rate for the low-order modulation inputs.
基金supported in part by the Beijing Municipal Natural Science Foundation under Grant 4212005in part by the National Natural Science Foundation of China under 62271076+1 种基金in part by Young Elite Scientists Sponsorship Program by CAST(YESS20200283)in part by the Fundamental Research Funds for the Central Universities under Grant 2242022k60006.
文摘This paper focuses on anti-jamming and anti-eavesdropping problem in air-to-ground(A2G)communication networks considering the impact of body jitter of unmanned aerial vehicle(UAV).A full-duplex(FD)active ground eavesdropper launches jamming attack while eavesdropping to stimulate the legitimate transmitter(i.e.,UAV)to increase its transmission power.The legitimate transmitter’s objective is to against the simultaneous wiretapping and jamming with a robust and power-efficient transmission scheme.The active eavesdropper aims to minimize the system secrecy rate.To study the interaction between the legitimate transmitter and the active eavesdropper,a non-cooperative game framework is formulated.Detailed,considering the impact of UAV jitter on antenna array response and secrecy performance,we first investigate the UAV’s transmission power minimization problem for the worst scenario with minimum legitimate data rate and maximum eavesdropping data rate under UAV jitter.Then,the active eavesdropper’s secrecy rate minimization problem with the worst scenario is investigated by optimizing its jamming strategy.Nash equilibrium is proved to be existed and obtained with the proposed iterative algorithm.Finally,extensive numerical results are provided to evaluate the system secrecy performance and to show the secrecy performance gains of the proposed method.
基金supported in part by the NSF of China under Grant 62322106,62071131 and 62171135the Guangdong Basic and Applied Basic Research Foundation under Grant 2022B1515020086+2 种基金the NSF of Guangdong Province under Grant 2019A1515011465the International Collaborative Research Program of Guangdong Science and Technology Department under Grant 2022A0505050070the Industrial R&D Project of Haoyang Electronic Co.,Ltd.under Grant 2022440002001494.
文摘This paper proposes a high-throughput short reference differential chaos shift keying cooperative communication system with the aid of code index modulation,referred to as CIM-SR-DCSK-CC system.In the proposed CIM-SR-DCSK-CC system,the source transmits information bits to both the relay and destination in the first time slot,while the relay not only forwards the source information bits but also sends new information bits to the destination in the second time slot.To be specific,the relay employs an N-order Walsh code to carry additional log_(2)N information bits,which are superimposed onto the SRDCSK signal carrying the decoded source information bits.Subsequently,the superimposed signal carrying both the source and relay information bits is transmitted to the destination.Moreover,the theoretical bit error rate(BER)expressions of the proposed CIMSR-DCSK-CC system are derived over additive white Gaussian noise(AWGN)and multipath Rayleigh fading channels.Compared with the conventional DCSKCC system and SR-DCSK-CC system,the proposed CIM-SR-DCSK-CC system can significantly improve the throughput without deteriorating any BER performance.As a consequence,the proposed system is very promising for the applications of the 6G-enabled lowpower and high-rate communication.
基金supported in part by the National Natural Science Foundation of China (61873137, 61973179)the Shandong Taishan Scholar Project (ts20190930)。
文摘Dear Editor, In recent decades, owing to the significance of sampled-data control way on reducing the burden of communication transmission and improving the control capability of networked control systems, the research of sampled-data systems has become increasingly important(see [1]–[5]).
基金the National Natural Science Foundation of China(62176263,62103434,62003363)the Science Foundation for Distinguished Youth of Shaanxi Province(2021JC-35)+2 种基金the Youth Talent Promotion Program of Shaanxi Provincial Association for Science and Technology(20220123)the Natural Science Basic Research Program of Shaanxi Province(2022KJXX-99)the National Defense Basic Research Program of Technology and Industry for National Defense(JCKY2021912B001).
文摘This paper concerns minimum-energy leader-following formation design and analysis problems of distributed multiagent systems(DMASs)subjected to randomly switching topologies and aperiodic communication pauses.The critical feature of this paper is that the energy consumption during the formation control process is restricted by the minimum-energy constraint in the sense of the linear matrix inequality.Firstly,the leader-following formation control protocol is proposed based on the relative state information of neighboring agents,where the total energy consumption is considered.Then,minimum-energy leader-following formation design and analysis criteria are presented in the form of the linear matrix inequality,which can be checked by the generalized eigenvalue method.Especially,the value of the minimum-energy constraint is determined.An illustrative simulation is provided to show the effectiveness of the main results.
基金Project supported by the National Natural Science Foundation of China(Grant No.61901420 and 11604226)the Shanxi Province Science Foundation for Youths(Grant No.201901D211235)+1 种基金the Scientific and Technological Innovation Programs of Higher Education Institutions in Shanxi(Grant No.2019L0507)the Program of Beijing Municipal Commission of Education of China(Grant Nos.CIT&TCD201904080 and KM201810028005)。
文摘We present a faithful and efficient hyperentanglement purification protocol(hyper-EPP)for nonlocal two-photon systems in spatial-polarization-time-bin hyperentangled Bell states.As the single-photon detectors can detect and herald the undesirable properties caused by side leakage and finite coupling strength,the parity-check gates and swap gates of our hyper-EPP in the spatial,polarization and time-bin mode degrees of freedom(DoFs)work faithfully.The qubit-flip errors in photon systems in three DoFs can be corrected effectively with the faithful parity-check gates and the photon pairs can be reused to distill high-fidelity ones by introducing the faithful swap gates,which greatly increases the efficiency of our hyper-EPP.Further,the maximal hyperentanglement can be obtained in principle by operating multiple rounds of the hyper-EPP.
文摘Free space optical(FSO)communication has recently aroused great interest in academia due to its unique features,such as large transmission band,high data rates,and strong anti-electromagnetic interference.With the aim of evaluating the performance of an FSO communication system and extending the line-of-sight transmission distance,we propose an unmanned aerial vehicle(UAV)-assisted dual-hop FSO communication system equipped with amplifyand-forward protocol at the relay node.Specifically,we consider impairments of atmospheric absorption,pointing errors,atmospheric turbulence,and link interruptions due to angle-of-arrival fluctuations in the relay system.The Gamma-Gamma and Malaga distributions are used to model the influence of atmospheric turbulence on the source-to-UAV and UAVto-destination links,respectively.We derive closedform expressions of the probability density function(PDF)and cumulative distribution function(CDF)for the proposed communication system,in terms of the Meijer-G function.Based on the precise PDF and CDF,analytical expressions for the outage probability,average bit error rate,and ergodic capacity are proposed with the aid of the extended generalized bivariate Fox’s H function.Finally,we show that there is a match between the analytical results and numerical results,and we analyze the influence of the system and channel parameters on the performance.
文摘The minimum energy per bit(EPB)as the energy efficiency(EE)metric in an automatic retransmission request(ARQ)based multi-hop system is analyzed under power and throughput constraints.Two ARQ protocols including type-I(ARQ-I)and repetition redundancy(ARQ-RR)are considered and expressions for the optimal power allocation(PA)are obtained.Using the obtained optimal powers,the EE-throughput tradeoff(EETT)is analyzed and the EETT closed-form expressions for both ARQ protocols and in arbitrary average channel gain values are obtained.It is shown that how different throughput requirements,especially the high levels,affect the EE performance.Additionally,asymptotic analysis is made in the feasible high throughput values and lower and upper EETT bounds are derived for ARQ-I protocol.To evaluate the EE a distributed PA scenario,as a benchmark,is presented and the energy savinggain obtained from the optimal PA in comparison with the distributed PA for ARQ-I and ARQ-RR protocols is discussed in different throughput values and node locations.
文摘Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)networks.However,several security vulnerabilities and attacks have plagued previous generations of communication systems;thus,physical layer security,especially against eavesdroppers,is vital,especially for upcoming 6G networks.In this regard,UAVs have appeared as a winning candidate to mitigate security risks.In this paper,we leverage UAVs to propose two methods.The first method utilizes a UAV as Decode-and-Forward(DF)relay,whereas the second method utilizes a UAV as a jammer to mitigate eavesdropping attacks for URLLC between transmitter and receiver devices.Moreover,we present a low-complexity algorithm that outlines the two aforementioned methods of mitigating interception,i.e.increasing secrecy rate,and we compare them with the benchmark null method in which there is a direct communication link between transmitter and receiver without the UAV DF relay.Additionally,simulation results show the effectiveness of such methods by improving the secrecy rate and its dependency on UAV height,blocklength,decoding error probability and transmitter-receiver separation distance.Lastly,we recommend the best method to enhance the secrecy rate in the presence of an eavesdropper based on our simulations.
基金the National Natural Science Foundation of China(Nos.52073160,62004114 and 62174098)the National Key Research and Development Program of China(Nos.2020YFF01014706 and 2020YFB2008704)+2 种基金Beijing Municipal Science and Technology Commission(Z211100002421012 and Z221100005822011)Tsinghua University Initiative Scientific Research Center(2022Z02ORD008 and 2022Z11QYJ022)TsinghuaFoshan Innovation Special Fund(2021THFS0215)。
文摘As one of the most promising platforms for wireless communication,radiofrequency(RF)electronics have been widely advocated for the development of sensing systems.In particular,monolayer and few-layer two-dimensional(2D)materials exhibiting extraordinary electrical properties not only can be integrated to improve the performance of RF circuits,but also to display exceptional sensing capabilities.This review provides an in-depth perspective of current trends and challenges in the application of 2D materials for RF biochemical sensing,including:(i)theoretical bases to achieve different sensing schemes;(ii)unique properties of 2D materials for reasoning their applications in RF sensing;(iii)developments in 2D RF sensors to facilitate the practice of biochemical sensors with ever-demanding sensitivities,as well as their potential uses in meeting the requirements and challenges of biochemical sensors in the Internet-of-Things era.
基金supported by the National Key R&D Program of China under Grant 2018YFB1801500.
文摘In order to reduce the physical impairment caused by signal distortion,in this paper,we investigate symbol detection with Deep Learning(DL)methods to improve bit-error performance in the optical communication system.Many DL-based methods have been applied to such systems to improve bit-error performance.Referring to the speech-to-text method of automatic speech recognition,this paper proposes a signal-to-symbol method based on DL and designs a receiver for symbol detection on single-polarized optical communications modes.To realize this detection method,we propose a non-causal temporal convolutional network-assisted receiver to detect symbols directly from the baseband signal,which specifically integrates most modules of the receiver.Meanwhile,we adopt three training approaches for different signal-to-noise ratios.We also apply a parametric rectified linear unit to enhance the noise robustness of the proposed network.According to the simulation experiments,the biterror-rate performance of the proposed method is close to or even superior to that of the conventional receiver and better than the recurrent neural network-based receiver.
文摘Many Internet of Things(IoT)systems are based on the intercommunication among different devices and centralized systems.Nowadays,there are several commercial and research platforms available to simplify the creation of such IoT systems.However,developing these systems can often be a tedious task.To address this challenge,a proposed solution involves the implementation of a unified program or script that encompasses the entire system,including IoT devices functionality.This approach is based on an abstraction,integrating the control of the devices in a single program through a programmable object.Subsequently,the proposal processes the unified script to generate the centralized system code and a controller for each device.By adopting this approach,developers will be able to create IoT systems with significantly reduced implementation costs,surpassing current platforms by more than 10%.The results demonstrate that the single program approach can significantly accelerate the development of IoT systems relying on device communication.
基金This work is supported by National Natural Science Foundation of China(Grant:62272109).
文摘Target signal acquisition and detection based on sonar images is a challenging task due to the complex underwater environment.In order to solve the problem that some semantic information in sonar images is lost and model detection performance is degraded due to the complex imaging environment,we proposed a more effective and robust target detection framework based on deep learning,which can make full use of the acoustic shadow information in the forward-looking sonar images to assist underwater target detection.Firstly,the weighted box fusion method is adopted to generate a fusion box by weighted fusion of prediction boxes with high confidence,so as to obtain accurate acoustic shadow boxes.Further,the acoustic shadow box is cut down to get the feature map containing the acoustic shadow information,and then the acoustic shadow feature map and the target information feature map are adaptively fused to make full use of the acoustic shadow feature information.In addition,we introduce a threshold processing module to improve the attention of the model to important feature information.Through the underwater sonar dataset provided by Pengcheng Laboratory,the proposed method improved the average accuracy by 3.14%at the IoU threshold of 0.7,which is better than the current traditional target detection model.