Large-scale wireless sensor networks(WSNs)play a critical role in monitoring dangerous scenarios and responding to medical emergencies.However,the inherent instability and error-prone nature of wireless links present ...Large-scale wireless sensor networks(WSNs)play a critical role in monitoring dangerous scenarios and responding to medical emergencies.However,the inherent instability and error-prone nature of wireless links present significant challenges,necessitating efficient data collection and reliable transmission services.This paper addresses the limitations of existing data transmission and recovery protocols by proposing a systematic end-to-end design tailored for medical event-driven cluster-based large-scale WSNs.The primary goal is to enhance the reliability of data collection and transmission services,ensuring a comprehensive and practical approach.Our approach focuses on refining the hop-count-based routing scheme to achieve fairness in forwarding reliability.Additionally,it emphasizes reliable data collection within clusters and establishes robust data transmission over multiple hops.These systematic improvements are designed to optimize the overall performance of the WSN in real-world scenarios.Simulation results of the proposed protocol validate its exceptional performance compared to other prominent data transmission schemes.The evaluation spans varying sensor densities,wireless channel conditions,and packet transmission rates,showcasing the protocol’s superiority in ensuring reliable and efficient data transfer.Our systematic end-to-end design successfully addresses the challenges posed by the instability of wireless links in large-scaleWSNs.By prioritizing fairness,reliability,and efficiency,the proposed protocol demonstrates its efficacy in enhancing data collection and transmission services,thereby offering a valuable contribution to the field of medical event-drivenWSNs.展开更多
The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure ...The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes.展开更多
Simultaneous dimming controlling and data transmission are usually required in a white LED based indoor visible light communication system.However,the diming controlling of LED normally interferes the data transmissio...Simultaneous dimming controlling and data transmission are usually required in a white LED based indoor visible light communication system.However,the diming controlling of LED normally interferes the data transmission due to the modulation nonlinearity of LED.In order to solve this problem,a scheme by separating the LEDs for the functions of dimming control and data transmission respectively is proposed in this paper.In the scheme,the LEDs used for dimming control function are driven by a dc amplified circuit,and the LEDs for data transmission are driven by a digital modulation circuit respectively.In this way,the modulation distortion to the data signal caused by the modulation nonlinearity can be avoided even if the dimming is at high level dc driven current.The proof-of-concept experiment of a 2.5Mbit/s visible light communication system demonstrates that the dimming controlling and data transmission can be realized simultaneously in a simple way,and the data transmission is not affected by the dimming controlling function.Compared to previous methods,the scheme in this paper is simpler and cost effective,and makes sense when high rate data is transmitted in a visible light communication system.展开更多
Remote transmission of log data is an urgent problem for service companies. Remote transmission technology of log data here refers to both the transmission solution in combination with the CifNet multi-well data manag...Remote transmission of log data is an urgent problem for service companies. Remote transmission technology of log data here refers to both the transmission solution in combination with the CifNet multi-well data management system to automate the transmission, storage, management, and retrieval of log data to reduce turn-over time. It is an applied digital signature technology to implement breakpoint transmission and error recovery and ensure the effectiveness and reliability of log data transmission.展开更多
The industrial Internet of Things(IoT)is a trend of factory development and a basic condition of intelligent factory.It is very important to ensure the security of data transmission in industrial IoT.Applying a new ch...The industrial Internet of Things(IoT)is a trend of factory development and a basic condition of intelligent factory.It is very important to ensure the security of data transmission in industrial IoT.Applying a new chaotic secure communication scheme to address the security problem of data transmission is the main contribution of this paper.The scheme is proposed and studied based on the synchronization of different-structure fractional-order chaotic systems with different order.The Lyapunov stability theory is used to prove the synchronization between the fractional-order drive system and the response system.The encryption and decryption process of the main data signals is implemented by using the n-shift encryption principle.We calculate and analyze the key space of the scheme.Numerical simulations are introduced to show the effectiveness of theoretical approach we proposed.展开更多
Tactical Data Link(TDL)is a communication system that utilizes a particular message format and a protocol to transmit data via wireless channels in an instant,automatic,and secure way.So far,TDL has shown its excellen...Tactical Data Link(TDL)is a communication system that utilizes a particular message format and a protocol to transmit data via wireless channels in an instant,automatic,and secure way.So far,TDL has shown its excellence in military applications.Current TDL adopts a distributed architecture to enhance anti-destruction capacity.However,It still faces a problem of data inconsistency and thus cannot well support cooperation across multiple militarily domains.To tackle this problem,we propose to leverage blockchain to build an automatic and adaptive data transmission control scheme for TDL.It achieves automatic data transmission and realizes information consistency among different TDL entities.Besides,applying smart contracts based on blockchain further enables adjusting data transmission policies automatically.Security analysis and experimental results based on simulations illustrate the effectiveness and efficiency of our proposed scheme.展开更多
Since web based GIS processes large size spatial geographic information on internet, we should try to improve the efficiency of spatial data query processing and transmission. This paper presents two efficient metho...Since web based GIS processes large size spatial geographic information on internet, we should try to improve the efficiency of spatial data query processing and transmission. This paper presents two efficient methods for this purpose: division transmission and progressive transmission methods. In division transmission method, a map can be divided into several parts, called “tiles”, and only tiles can be transmitted at the request of a client. In progressive transmission method, a map can be split into several phase views based on the significance of vertices, and a server produces a target object and then transmits it progressively when this spatial object is requested from a client. In order to achieve these methods, the algorithms, “tile division”, “priority order estimation” and the strategies for data transmission are proposed in this paper, respectively. Compared with such traditional methods as “map total transmission” and “layer transmission”, the web based GIS data transmission, proposed in this paper, is advantageous in the increase of the data transmission efficiency by a great margin.展开更多
To detect the deformation of the tunnel structure based on image sensor networks is the advanced study and application of spatial sensor technology. For the vertical settlement of metro tunnel caused by internal and e...To detect the deformation of the tunnel structure based on image sensor networks is the advanced study and application of spatial sensor technology. For the vertical settlement of metro tunnel caused by internal and external stress after its long period operation, the overall scheme and measuring principle of tunnel deformation detection system is in- troduced. The image data acquisition and processing of detection target are achieved by the cooperative work of image sensor, ARM embedded system. RS485 communication achieves the data transmission between ARM memory and host computer. The database system in station platform analyses the detection data and obtains the deformation state of tunnel inner wall, which makes it possible to early-warn the tunnel deformation and take preventive measures in time.展开更多
In the inductively coupled data transmission system of the mooring buoy, the carrier signal frequency of the transmission channel is limited due to the inherent characteristics of the system, resulting in limited chan...In the inductively coupled data transmission system of the mooring buoy, the carrier signal frequency of the transmission channel is limited due to the inherent characteristics of the system, resulting in limited channel bandwidth. The limited channel bandwidth limits the increase in inductively coupled data transmission rate.In order to improve the inductively coupled data transmission rate of mooring buoy as much as possible without damaging the data transmission performance, a new method was proposed in this paper. The method is proposed to improve the data transmission rate by selecting the appropriate carrier signal frequencies based on the principle of maximizing the amplitude value of amplitude-frequency characteristic curve of the system. Research has been done according to this method as follows. Firstly, according to the inductively coupled transmission mooring buoy structure, the inductively coupled data transmission circuit model was established. The binary frequency shift keying(2FSK) digital signal modulation mode was selected. Through theoretical analysis, the relation between the carrier signal frequency and the data transmission performance, the relation between the carrier signal frequency and the 2FSK signal bandwidth were obtained. Secondly, the performance and the bandwidth of the signal transmission were studied for the inherent characteristics of the actual inductively coupled data transmission system. The amplitude-frequency characteristic of the system was analyzed by experiments. By selecting the appropriate carrier signal frequency parameters, an excellent data transmission performance was guaranteed and a large 2FSK signal bandwidth was obtained. Finally, an inductively coupled data transmission rate optimization experiment and a bit error rate analysis experiment were designed and carried out. The results show that the high-speed and reliable data transmission of the system was realized and the rate can reach 100 kbps.展开更多
Data Center of Xinjiang Astronomical Observatory(XAO-DC)commenced operating in 2015,and provides services including archiving,releasing and retrieving precious astronomical data collected by the Nanshan 26 m Radio Tel...Data Center of Xinjiang Astronomical Observatory(XAO-DC)commenced operating in 2015,and provides services including archiving,releasing and retrieving precious astronomical data collected by the Nanshan 26 m Radio Telescope(NSRT)over the years,and realises the open sharing of astronomical observation data.The observation data from NSRT are transmitted to XAO-DC 100 km away through dedicated fiber for long-term storage.With the continuous increase of data,the static architecture of the current network cannot meet NSRT data-transmission requirements due to limited network bandwidth.To get high-speed data-transmission using the existing static network architecture,a method for reconstruction data-transmission network using Software-Defined Networks(SDN)is proposed.Benefit from the SDN’s data and control plane separation,and open programmable,combined with the Mininet simulation platform for experiments,the TCP throughput(of single thread)was improved by~24.7%,the TCP throughput(of multi threads)was improved by~9.8%,~40.9%,~35.5%and~11.7%.Compared with the current network architecture,the Latency was reduced by~63.2%.展开更多
Adaptive packet scheduling can efficiently enhance the performance of multipath Data Transmission.However,realizing precise packet scheduling is challenging due to the nature of high dynamics and unpredictability of n...Adaptive packet scheduling can efficiently enhance the performance of multipath Data Transmission.However,realizing precise packet scheduling is challenging due to the nature of high dynamics and unpredictability of network link states.To this end,this paper proposes a distributed asynchronous deep reinforcement learning framework to intensify the dynamics and prediction of adaptive packet scheduling.Our framework contains two parts:local asynchronous packet scheduling and distributed cooperative control center.In local asynchronous packet scheduling,an asynchronous prioritized replay double deep Q-learning packets scheduling algorithm is proposed for dynamic adaptive packet scheduling learning,which makes a combination of prioritized replay double deep Q-learning network(P-DDQN)to make the fitting analysis.In distributed cooperative control center,a distributed scheduling learning and neural fitting acceleration algorithm to adaptively update neural network parameters of P-DDQN for more precise packet scheduling.Experimental results show that our solution has a better performance than Random weight algorithm and Round-Robin algorithm in throughput and loss ratio.Further,our solution has 1.32 times and 1.54 times better than Random weight algorithm and Round-Robin algorithm on the stability of multipath data transmission,respectively.展开更多
This article outlines the development of downhole monitoring and data transmission technology for separated zone water injection in China.According to the development stages,the principles,operation processes,adaptabi...This article outlines the development of downhole monitoring and data transmission technology for separated zone water injection in China.According to the development stages,the principles,operation processes,adaptability and application status of traditional downhole data acquisition method,cable communications and testing technology,cable-controlled downhole parameter real-time monitoring communication method and downhole wireless communication technology are introduced in detail.Problems and challenges of existing technologies in downhole monitoring and data transmission technology are pointed out.According to the production requirement,the future development direction of the downhole monitoring and data transmission technology for separated zone water injection is proposed.For the large number of wells adopting cable measuring and adjustment technology,the key is to realize the digitalization of downhole plug.For the key monitoring wells,cable-controlled communication technology needs to be improved,and downhole monitoring and data transmission technology based on composite coiled tubing needs to be developed to make the operation more convenient and reliable.For large-scale application in oil fields,downhole wireless communication technology should be developed to realize automation of measurement and adjustment.In line with ground mobile communication network,a digital communication network covering the control center,water distribution station and oil reservoir should be built quickly to provide technical support for the digitization of reservoir development.展开更多
With the increasing demand for marine exploration, underwater acoustic sensor networks (UASNs) are prone to have the characteristics of large-scale, long term monitoring, and high data traffic load. Underwater media a...With the increasing demand for marine exploration, underwater acoustic sensor networks (UASNs) are prone to have the characteristics of large-scale, long term monitoring, and high data traffic load. Underwater media access control (MAC) protocols, which allow multiple users to share the common medium fairly and efficiently, are essential for the performance of UASNs. However, the design of MAC protocols is confronted with the challenges of spatial unfairness, data eruption, and low energy efficiency. In this paper, we propose a novel data concurrent transmission (DCT) MAC protocol, which is able to exploit long propagation delay and conduct concurrent transmission. Specifically, we present the theoretical performance analysis of the proposed MAC protocol in detail and give an analytical solution of the success concurrent transmission probability between nodes. In addition, simulation results are provided to demonstrate that our proposed protocol is appropriate for UASNs and can significantly improve the performance in terms of network throughput and energy consumption. Finally, we give some typical future applications of UASNs and discuss the demands on MAC protocol design.展开更多
To evaluate and improve the real-time performance of Ethernet for plant automation(EPA) industrial Ethernet,the real-time performance of EPA periodic data transmission was theoretically and experimentally studied.By...To evaluate and improve the real-time performance of Ethernet for plant automation(EPA) industrial Ethernet,the real-time performance of EPA periodic data transmission was theoretically and experimentally studied.By analyzing information transmission regularity and EPA deterministic scheduling mechanism,periodic messages were categorized as different modes according to their entering-queue time.The scheduling characteristics and delivery time of each mode and their interacting relations were studied,during which the models of real-time performance of periodic information transmission in EPA system were established.On this basis,an experimental platform is developed to test the delivery time of periodic messages transmission in EPA system.According to the analysis and the experiment,the main factors that limit the real-time performance of EPA periodic data transmission and the improvement methods were proposed.展开更多
This paper considers a time-constrained data collection problem from a network of ground sensors located on uneven terrain by an Unmanned Aerial Vehicle(UAV),a typical Unmanned Aerial System(UAS).The ground sensors ha...This paper considers a time-constrained data collection problem from a network of ground sensors located on uneven terrain by an Unmanned Aerial Vehicle(UAV),a typical Unmanned Aerial System(UAS).The ground sensors harvest renewable energy and are equipped with batteries and data buffers.The ground sensor model takes into account sensor data buffer and battery limitations.An asymptotically globally optimal method of joint UAV 3D trajectory optimization and data transmission schedule is developed.The developed method maximizes the amount of data transmitted to the UAV without losses and too long delays and minimizes the propulsion energy of the UAV.The developed algorithm of optimal trajectory optimization and transmission scheduling is based on dynamic programming.Computer simulations demonstrate the effectiveness of the proposed algorithm.展开更多
Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply,which are not suitable for traditional security technology.The security technology based o...Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply,which are not suitable for traditional security technology.The security technology based on the physicalmechanism has attracted extensive attention.How to improve the key generation rate has always been one of the urgent problems to be solved in the security technology based on the physical mechanism.In this paper,superlattice technology is introduced to the security field of Internet of things,and a high-speed symmetric key generation scheme based on superlattice for Internet of things is proposed.In order to ensure the efficiency and privacy of data transmission,we also combine the superlattice symmetric key and compressive sensing technology to build a lightweight data transmission scheme that supports data compression and data encryption at the same time.Theoretical analysis and experimental evaluation results show that the proposed scheme is superior to the most closely related work.展开更多
Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interc...Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interconnection of all things.The variety of application scenarios has brought serious challenges to mobile IIoT networks,which face complex and changeable communication environments.Ensuring data secure transmission is critical for mobile IIoT networks.This paper investigates the data secure transmission performance prediction of mobile IIoT networks.To cut down computational complexity,we propose a data secure transmission scheme employing Transmit Antenna Selection(TAS).The novel secrecy performance expressions are first derived.Then,to realize real-time secrecy analysis,we design an improved Convolutional Neural Network(CNN)model,and propose an intelligent data secure transmission performance prediction algorithm.For mobile signals,the important features may be removed by the pooling layers.This will lead to negative effects on the secrecy performance prediction.A novel nine-layer improved CNN model is designed.Out of the input and output layers,it removes the pooling layer and contains six convolution layers.Elman,Back-Propagation(BP)and LeNet methods are employed to compare with the proposed algorithm.Through simulation analysis,good prediction accuracy is achieved by the CNN algorithm.The prediction accuracy obtains a 59%increase.展开更多
As the Internet of Things(IoT)advances,machine-type devices are densely deployed and massive networks such as ultra-dense networks(UDNs)are formed.Various devices attend to the network to transmit data using machine-t...As the Internet of Things(IoT)advances,machine-type devices are densely deployed and massive networks such as ultra-dense networks(UDNs)are formed.Various devices attend to the network to transmit data using machine-type communication(MTC),whereby numerous,various are generated.MTC devices generally have resource constraints and use wireless communication.In this kind of network,data aggregation is a key function to provide transmission efficiency.It can reduce the number of transmitted data in the network,and this leads to energy saving and reducing transmission delays.In order to effectively operate data aggregation in UDNs,it is important to select an aggregation point well.The total number of transmitted data may vary,depending on the aggregation point to which the data are delivered.Therefore,in this paper,we propose a novel data aggregation scheme to select the appropriate aggregation point and describe the data transmission method applying the proposed aggregation scheme.In addition,we evaluate the proposed scheme with extensive computer simulations.Better performances in the proposed scheme are achieved compared to the conventional approach.展开更多
Wireless Mesh Network (WMN) is a new-type wireless network. Its core idea is that any of its wireless equipment can act as both an Access Point (AP) and a router. Each node in the network can send and receive signals ...Wireless Mesh Network (WMN) is a new-type wireless network. Its core idea is that any of its wireless equipment can act as both an Access Point (AP) and a router. Each node in the network can send and receive signals as well as directly communicate with one or several peer nodes. One important issue to be considered in wireless Mesh networks is how to secure reliable data transmission in multi-hop links. To solve the problem, the 3GPP system architecture proposes two functionalities: ARQ and HARQ. This paper presents two HARQ schemes, namely hop-by-hop and edge-to-edge, and three ARQ schemes: hop-by-hop, edge-to-edge, and last-hop. Moreover, it proposes three solutions for WMNs from the perspective of protocol stock design: layered cooperative mechanism, relay ARQ mechanism and multi-hop mechanism.展开更多
This paper describes a data transmission method using a cyclic redundancy check and inaudible frequencies.The proposed method uses inaudible high frequencies from 18 k Hz to 22 k Hz generated via the inner speaker of ...This paper describes a data transmission method using a cyclic redundancy check and inaudible frequencies.The proposed method uses inaudible high frequencies from 18 k Hz to 22 k Hz generated via the inner speaker of smart devices.Using the proposed method,the performance is evaluated by conducting data transmission tests between a smart book and smart phone.The test results confirm that the proposed method can send 32 bits of data in an average of 235 ms,the transmission success rate reaches 99.47%,and the error detection rate of the cyclic redundancy check is0.53%.展开更多
文摘Large-scale wireless sensor networks(WSNs)play a critical role in monitoring dangerous scenarios and responding to medical emergencies.However,the inherent instability and error-prone nature of wireless links present significant challenges,necessitating efficient data collection and reliable transmission services.This paper addresses the limitations of existing data transmission and recovery protocols by proposing a systematic end-to-end design tailored for medical event-driven cluster-based large-scale WSNs.The primary goal is to enhance the reliability of data collection and transmission services,ensuring a comprehensive and practical approach.Our approach focuses on refining the hop-count-based routing scheme to achieve fairness in forwarding reliability.Additionally,it emphasizes reliable data collection within clusters and establishes robust data transmission over multiple hops.These systematic improvements are designed to optimize the overall performance of the WSN in real-world scenarios.Simulation results of the proposed protocol validate its exceptional performance compared to other prominent data transmission schemes.The evaluation spans varying sensor densities,wireless channel conditions,and packet transmission rates,showcasing the protocol’s superiority in ensuring reliable and efficient data transfer.Our systematic end-to-end design successfully addresses the challenges posed by the instability of wireless links in large-scaleWSNs.By prioritizing fairness,reliability,and efficiency,the proposed protocol demonstrates its efficacy in enhancing data collection and transmission services,thereby offering a valuable contribution to the field of medical event-drivenWSNs.
基金support of the Interdisciplinary Research Center for Intelligent Secure Systems(IRC-ISS)Internal Fund Grant#INSS2202.
文摘The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes.
基金financially supported by National Natural Science Foundation of China(No.61475094)National 973 Program of China(No.2013CB329202)
文摘Simultaneous dimming controlling and data transmission are usually required in a white LED based indoor visible light communication system.However,the diming controlling of LED normally interferes the data transmission due to the modulation nonlinearity of LED.In order to solve this problem,a scheme by separating the LEDs for the functions of dimming control and data transmission respectively is proposed in this paper.In the scheme,the LEDs used for dimming control function are driven by a dc amplified circuit,and the LEDs for data transmission are driven by a digital modulation circuit respectively.In this way,the modulation distortion to the data signal caused by the modulation nonlinearity can be avoided even if the dimming is at high level dc driven current.The proof-of-concept experiment of a 2.5Mbit/s visible light communication system demonstrates that the dimming controlling and data transmission can be realized simultaneously in a simple way,and the data transmission is not affected by the dimming controlling function.Compared to previous methods,the scheme in this paper is simpler and cost effective,and makes sense when high rate data is transmitted in a visible light communication system.
文摘Remote transmission of log data is an urgent problem for service companies. Remote transmission technology of log data here refers to both the transmission solution in combination with the CifNet multi-well data management system to automate the transmission, storage, management, and retrieval of log data to reduce turn-over time. It is an applied digital signature technology to implement breakpoint transmission and error recovery and ensure the effectiveness and reliability of log data transmission.
基金supported in part by the National Science Foundation Project of China (61931001, 61873026)the National Key R&D Program of China (2017YFC0820700)
文摘The industrial Internet of Things(IoT)is a trend of factory development and a basic condition of intelligent factory.It is very important to ensure the security of data transmission in industrial IoT.Applying a new chaotic secure communication scheme to address the security problem of data transmission is the main contribution of this paper.The scheme is proposed and studied based on the synchronization of different-structure fractional-order chaotic systems with different order.The Lyapunov stability theory is used to prove the synchronization between the fractional-order drive system and the response system.The encryption and decryption process of the main data signals is implemented by using the n-shift encryption principle.We calculate and analyze the key space of the scheme.Numerical simulations are introduced to show the effectiveness of theoretical approach we proposed.
基金This work is sponsored by the open grant of the Tactical Data Link Lab of the 20th Research Institute of China Electronics Technology Group Corporation,P.R.China(Grant CLDL-20182119)the National Natural Science Foundation of China under Grants 61672410 and 61802293+2 种基金the Key Lab of Information Network Security,Ministry of Public Security(Grant C18614)the Academy of Finland(Grants 308087,314203,and 335262)the Shaanxi Innovation Team project under grant 2018TD-007,and the 111 project under grant B16037.
文摘Tactical Data Link(TDL)is a communication system that utilizes a particular message format and a protocol to transmit data via wireless channels in an instant,automatic,and secure way.So far,TDL has shown its excellence in military applications.Current TDL adopts a distributed architecture to enhance anti-destruction capacity.However,It still faces a problem of data inconsistency and thus cannot well support cooperation across multiple militarily domains.To tackle this problem,we propose to leverage blockchain to build an automatic and adaptive data transmission control scheme for TDL.It achieves automatic data transmission and realizes information consistency among different TDL entities.Besides,applying smart contracts based on blockchain further enables adjusting data transmission policies automatically.Security analysis and experimental results based on simulations illustrate the effectiveness and efficiency of our proposed scheme.
文摘Since web based GIS processes large size spatial geographic information on internet, we should try to improve the efficiency of spatial data query processing and transmission. This paper presents two efficient methods for this purpose: division transmission and progressive transmission methods. In division transmission method, a map can be divided into several parts, called “tiles”, and only tiles can be transmitted at the request of a client. In progressive transmission method, a map can be split into several phase views based on the significance of vertices, and a server produces a target object and then transmits it progressively when this spatial object is requested from a client. In order to achieve these methods, the algorithms, “tile division”, “priority order estimation” and the strategies for data transmission are proposed in this paper, respectively. Compared with such traditional methods as “map total transmission” and “layer transmission”, the web based GIS data transmission, proposed in this paper, is advantageous in the increase of the data transmission efficiency by a great margin.
基金Science and Technology Commission of Shanghai Municipality(No.08201202103)
文摘To detect the deformation of the tunnel structure based on image sensor networks is the advanced study and application of spatial sensor technology. For the vertical settlement of metro tunnel caused by internal and external stress after its long period operation, the overall scheme and measuring principle of tunnel deformation detection system is in- troduced. The image data acquisition and processing of detection target are achieved by the cooperative work of image sensor, ARM embedded system. RS485 communication achieves the data transmission between ARM memory and host computer. The database system in station platform analyses the detection data and obtains the deformation state of tunnel inner wall, which makes it possible to early-warn the tunnel deformation and take preventive measures in time.
基金supported by the National Natural Science Foundation of China [Grant number 61733012]Qingdao Ocean Engineering and Technology Think Tank Joint Fund Project [Grant number 20190131-2]the Shandong Provincial Natural Science Fund Project [Grant number ZR2017MEE072]。
文摘In the inductively coupled data transmission system of the mooring buoy, the carrier signal frequency of the transmission channel is limited due to the inherent characteristics of the system, resulting in limited channel bandwidth. The limited channel bandwidth limits the increase in inductively coupled data transmission rate.In order to improve the inductively coupled data transmission rate of mooring buoy as much as possible without damaging the data transmission performance, a new method was proposed in this paper. The method is proposed to improve the data transmission rate by selecting the appropriate carrier signal frequencies based on the principle of maximizing the amplitude value of amplitude-frequency characteristic curve of the system. Research has been done according to this method as follows. Firstly, according to the inductively coupled transmission mooring buoy structure, the inductively coupled data transmission circuit model was established. The binary frequency shift keying(2FSK) digital signal modulation mode was selected. Through theoretical analysis, the relation between the carrier signal frequency and the data transmission performance, the relation between the carrier signal frequency and the 2FSK signal bandwidth were obtained. Secondly, the performance and the bandwidth of the signal transmission were studied for the inherent characteristics of the actual inductively coupled data transmission system. The amplitude-frequency characteristic of the system was analyzed by experiments. By selecting the appropriate carrier signal frequency parameters, an excellent data transmission performance was guaranteed and a large 2FSK signal bandwidth was obtained. Finally, an inductively coupled data transmission rate optimization experiment and a bit error rate analysis experiment were designed and carried out. The results show that the high-speed and reliable data transmission of the system was realized and the rate can reach 100 kbps.
基金the National Natural Science Foundation of China(NSFC,Grant Nos.11803080,11873082 and 12003062)the National Key Research and Development Program of China(2018YFA0404704)+3 种基金the Youth Innovation Promotion Association,Chinese Academy of Sciences(CAS)the program of the Light in China’s Western Region(2019-XBQNXZ-B-018)supported by China National Astronomical Data Center(NADC)supported by Astronomical Big Data Joint Research Center,co-founded by National Astronomical Observatories,CAS。
文摘Data Center of Xinjiang Astronomical Observatory(XAO-DC)commenced operating in 2015,and provides services including archiving,releasing and retrieving precious astronomical data collected by the Nanshan 26 m Radio Telescope(NSRT)over the years,and realises the open sharing of astronomical observation data.The observation data from NSRT are transmitted to XAO-DC 100 km away through dedicated fiber for long-term storage.With the continuous increase of data,the static architecture of the current network cannot meet NSRT data-transmission requirements due to limited network bandwidth.To get high-speed data-transmission using the existing static network architecture,a method for reconstruction data-transmission network using Software-Defined Networks(SDN)is proposed.Benefit from the SDN’s data and control plane separation,and open programmable,combined with the Mininet simulation platform for experiments,the TCP throughput(of single thread)was improved by~24.7%,the TCP throughput(of multi threads)was improved by~9.8%,~40.9%,~35.5%and~11.7%.Compared with the current network architecture,the Latency was reduced by~63.2%.
基金the National Key Research and Development Program of China under Grant No.2018YFE0206800the National Natural Science Foundation of Beijing,China,under Grant No.4212010the National Natural Science Foundation of China,under Grant No.61971028。
文摘Adaptive packet scheduling can efficiently enhance the performance of multipath Data Transmission.However,realizing precise packet scheduling is challenging due to the nature of high dynamics and unpredictability of network link states.To this end,this paper proposes a distributed asynchronous deep reinforcement learning framework to intensify the dynamics and prediction of adaptive packet scheduling.Our framework contains two parts:local asynchronous packet scheduling and distributed cooperative control center.In local asynchronous packet scheduling,an asynchronous prioritized replay double deep Q-learning packets scheduling algorithm is proposed for dynamic adaptive packet scheduling learning,which makes a combination of prioritized replay double deep Q-learning network(P-DDQN)to make the fitting analysis.In distributed cooperative control center,a distributed scheduling learning and neural fitting acceleration algorithm to adaptively update neural network parameters of P-DDQN for more precise packet scheduling.Experimental results show that our solution has a better performance than Random weight algorithm and Round-Robin algorithm in throughput and loss ratio.Further,our solution has 1.32 times and 1.54 times better than Random weight algorithm and Round-Robin algorithm on the stability of multipath data transmission,respectively.
基金Supported by the National Natural Science Foundation Science Center Project/Basic Science Center Project(72088101)PetroChina Scientific Research and Technology Development Project(2020B-4119,2021ZG12).
文摘This article outlines the development of downhole monitoring and data transmission technology for separated zone water injection in China.According to the development stages,the principles,operation processes,adaptability and application status of traditional downhole data acquisition method,cable communications and testing technology,cable-controlled downhole parameter real-time monitoring communication method and downhole wireless communication technology are introduced in detail.Problems and challenges of existing technologies in downhole monitoring and data transmission technology are pointed out.According to the production requirement,the future development direction of the downhole monitoring and data transmission technology for separated zone water injection is proposed.For the large number of wells adopting cable measuring and adjustment technology,the key is to realize the digitalization of downhole plug.For the key monitoring wells,cable-controlled communication technology needs to be improved,and downhole monitoring and data transmission technology based on composite coiled tubing needs to be developed to make the operation more convenient and reliable.For large-scale application in oil fields,downhole wireless communication technology should be developed to realize automation of measurement and adjustment.In line with ground mobile communication network,a digital communication network covering the control center,water distribution station and oil reservoir should be built quickly to provide technical support for the digitization of reservoir development.
基金supported in part by the National Natural Science Foundation of China under Grant 62171405in part by the National Science Fund for Distinguished Young Scholars under Grant 62225114
文摘With the increasing demand for marine exploration, underwater acoustic sensor networks (UASNs) are prone to have the characteristics of large-scale, long term monitoring, and high data traffic load. Underwater media access control (MAC) protocols, which allow multiple users to share the common medium fairly and efficiently, are essential for the performance of UASNs. However, the design of MAC protocols is confronted with the challenges of spatial unfairness, data eruption, and low energy efficiency. In this paper, we propose a novel data concurrent transmission (DCT) MAC protocol, which is able to exploit long propagation delay and conduct concurrent transmission. Specifically, we present the theoretical performance analysis of the proposed MAC protocol in detail and give an analytical solution of the success concurrent transmission probability between nodes. In addition, simulation results are provided to demonstrate that our proposed protocol is appropriate for UASNs and can significantly improve the performance in terms of network throughput and energy consumption. Finally, we give some typical future applications of UASNs and discuss the demands on MAC protocol design.
基金Supported by the National High Technology Research and Development Program of China (2006AA040301-4,2007AA041301-6)
文摘To evaluate and improve the real-time performance of Ethernet for plant automation(EPA) industrial Ethernet,the real-time performance of EPA periodic data transmission was theoretically and experimentally studied.By analyzing information transmission regularity and EPA deterministic scheduling mechanism,periodic messages were categorized as different modes according to their entering-queue time.The scheduling characteristics and delivery time of each mode and their interacting relations were studied,during which the models of real-time performance of periodic information transmission in EPA system were established.On this basis,an experimental platform is developed to test the delivery time of periodic messages transmission in EPA system.According to the analysis and the experiment,the main factors that limit the real-time performance of EPA periodic data transmission and the improvement methods were proposed.
基金funding from the Australian Government,via Grant No.AUSMURIB000001 associated with ONR MURI Grant No.N00014-19-1-2571。
文摘This paper considers a time-constrained data collection problem from a network of ground sensors located on uneven terrain by an Unmanned Aerial Vehicle(UAV),a typical Unmanned Aerial System(UAS).The ground sensors harvest renewable energy and are equipped with batteries and data buffers.The ground sensor model takes into account sensor data buffer and battery limitations.An asymptotically globally optimal method of joint UAV 3D trajectory optimization and data transmission schedule is developed.The developed method maximizes the amount of data transmitted to the UAV without losses and too long delays and minimizes the propulsion energy of the UAV.The developed algorithm of optimal trajectory optimization and transmission scheduling is based on dynamic programming.Computer simulations demonstrate the effectiveness of the proposed algorithm.
基金This work was supported by the Humanities and Social Science Youth Fund of Ministry of Education of China(19YJCZH254)the Innovation driven plan project of Hunan University of Technology and Business in 2020,the Scientific Research Fund of Hunan Provincial Education Department(19B315)this work was funded by the Researchers Supporting Project No.(RSP-2021/102)King Saud University,Riyadh,Saudi Arabia.
文摘Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply,which are not suitable for traditional security technology.The security technology based on the physicalmechanism has attracted extensive attention.How to improve the key generation rate has always been one of the urgent problems to be solved in the security technology based on the physical mechanism.In this paper,superlattice technology is introduced to the security field of Internet of things,and a high-speed symmetric key generation scheme based on superlattice for Internet of things is proposed.In order to ensure the efficiency and privacy of data transmission,we also combine the superlattice symmetric key and compressive sensing technology to build a lightweight data transmission scheme that supports data compression and data encryption at the same time.Theoretical analysis and experimental evaluation results show that the proposed scheme is superior to the most closely related work.
基金supported by the National Natural Science Foundation of China(No.62201313)the Opening Foundation of Fujian Key Laboratory of Sensing and Computing for Smart Cities(Xiamen University)(No.SCSCKF202101)the Open Project of Fujian Provincial Key Laboratory of Information Processing and Intelligent Control(Minjiang University)(No.MJUKF-IPIC202206).
文摘Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interconnection of all things.The variety of application scenarios has brought serious challenges to mobile IIoT networks,which face complex and changeable communication environments.Ensuring data secure transmission is critical for mobile IIoT networks.This paper investigates the data secure transmission performance prediction of mobile IIoT networks.To cut down computational complexity,we propose a data secure transmission scheme employing Transmit Antenna Selection(TAS).The novel secrecy performance expressions are first derived.Then,to realize real-time secrecy analysis,we design an improved Convolutional Neural Network(CNN)model,and propose an intelligent data secure transmission performance prediction algorithm.For mobile signals,the important features may be removed by the pooling layers.This will lead to negative effects on the secrecy performance prediction.A novel nine-layer improved CNN model is designed.Out of the input and output layers,it removes the pooling layer and contains six convolution layers.Elman,Back-Propagation(BP)and LeNet methods are employed to compare with the proposed algorithm.Through simulation analysis,good prediction accuracy is achieved by the CNN algorithm.The prediction accuracy obtains a 59%increase.
基金supported by the National Research Foundation of Korea(NRF)grant funded by the Korea Government(MSIT)(No.2021R1C1C1013133)this work was supported by the Soonchunhyang University Research Fund(No.20210442).
文摘As the Internet of Things(IoT)advances,machine-type devices are densely deployed and massive networks such as ultra-dense networks(UDNs)are formed.Various devices attend to the network to transmit data using machine-type communication(MTC),whereby numerous,various are generated.MTC devices generally have resource constraints and use wireless communication.In this kind of network,data aggregation is a key function to provide transmission efficiency.It can reduce the number of transmitted data in the network,and this leads to energy saving and reducing transmission delays.In order to effectively operate data aggregation in UDNs,it is important to select an aggregation point well.The total number of transmitted data may vary,depending on the aggregation point to which the data are delivered.Therefore,in this paper,we propose a novel data aggregation scheme to select the appropriate aggregation point and describe the data transmission method applying the proposed aggregation scheme.In addition,we evaluate the proposed scheme with extensive computer simulations.Better performances in the proposed scheme are achieved compared to the conventional approach.
文摘Wireless Mesh Network (WMN) is a new-type wireless network. Its core idea is that any of its wireless equipment can act as both an Access Point (AP) and a router. Each node in the network can send and receive signals as well as directly communicate with one or several peer nodes. One important issue to be considered in wireless Mesh networks is how to secure reliable data transmission in multi-hop links. To solve the problem, the 3GPP system architecture proposes two functionalities: ARQ and HARQ. This paper presents two HARQ schemes, namely hop-by-hop and edge-to-edge, and three ARQ schemes: hop-by-hop, edge-to-edge, and last-hop. Moreover, it proposes three solutions for WMNs from the perspective of protocol stock design: layered cooperative mechanism, relay ARQ mechanism and multi-hop mechanism.
基金supported by Ministry of Educationunder Basic Science Research Program under Grant No.NRF-2013R1A1A2061478
文摘This paper describes a data transmission method using a cyclic redundancy check and inaudible frequencies.The proposed method uses inaudible high frequencies from 18 k Hz to 22 k Hz generated via the inner speaker of smart devices.Using the proposed method,the performance is evaluated by conducting data transmission tests between a smart book and smart phone.The test results confirm that the proposed method can send 32 bits of data in an average of 235 ms,the transmission success rate reaches 99.47%,and the error detection rate of the cyclic redundancy check is0.53%.