The evolution of smart mobile devices has significantly impacted the way we generate and share contents and introduced a huge volume of Internet traffic.To address this issue and take advantage of the short-range comm...The evolution of smart mobile devices has significantly impacted the way we generate and share contents and introduced a huge volume of Internet traffic.To address this issue and take advantage of the short-range communication capabilities of smart mobile devices,the decentralized content sharing approach has emerged as a suitable and promising alternative.Decentralized content sharing uses a peer-to-peer network among colocated smart mobile device users to fulfil content requests.Several articles have been published to date to address its different aspects including group management,interest extraction,message forwarding,participation incentive,and content replication.This survey paper summarizes and critically analyzes recent advancements in decentralized content sharing and highlights potential research issues that need further consideration.展开更多
The paper presents a new protocol called Link Stability and Transmission Delay Aware(LSTDA)for Flying Adhoc Network(FANET)with a focus on network corridors(NC).FANET consists of Unmanned Aerial Vehicles(UAVs)that face...The paper presents a new protocol called Link Stability and Transmission Delay Aware(LSTDA)for Flying Adhoc Network(FANET)with a focus on network corridors(NC).FANET consists of Unmanned Aerial Vehicles(UAVs)that face challenges in avoiding transmission loss and delay while ensuring stable communication.The proposed protocol introduces a novel link stability with network corridors priority node selection to check and ensure fair communication in the entire network.The protocol uses a Red-Black(R-B)tree to achieve maximum channel utilization and an advanced relay approach.The paper evaluates LSTDA in terms of End-to-End Delay(E2ED),Packet Delivery Ratio(PDR),Network Lifetime(NLT),and Transmission Loss(TL),and compares it with existing methods such as Link Stability Estimation-based Routing(LEPR),Distributed Priority Tree-based Routing(DPTR),and Delay and Link Stability Aware(DLSA)using MATLAB simulations.The results show that LSTDA outperforms the other protocols,with lower average delay,higher average PDR,longer average NLT,and comparable average TL.展开更多
Due to the fading characteristics of wireless channels and the burstiness of data traffic,how to deal with congestion in Ad-hoc networks with effective algorithms is still open and challenging.In this paper,we focus o...Due to the fading characteristics of wireless channels and the burstiness of data traffic,how to deal with congestion in Ad-hoc networks with effective algorithms is still open and challenging.In this paper,we focus on enabling congestion control to minimize network transmission delays through flexible power control.To effectively solve the congestion problem,we propose a distributed cross-layer scheduling algorithm,which is empowered by graph-based multi-agent deep reinforcement learning.The transmit power is adaptively adjusted in real-time by our algorithm based only on local information(i.e.,channel state information and queue length)and local communication(i.e.,information exchanged with neighbors).Moreover,the training complexity of the algorithm is low due to the regional cooperation based on the graph attention network.In the evaluation,we show that our algorithm can reduce the transmission delay of data flow under severe signal interference and drastically changing channel states,and demonstrate the adaptability and stability in different topologies.The method is general and can be extended to various types of topologies.展开更多
Mobile computing is the most powerful application for network com-munication and connectivity,given recent breakthroughs in thefield of wireless networks or Mobile Ad-hoc networks(MANETs).There are several obstacles th...Mobile computing is the most powerful application for network com-munication and connectivity,given recent breakthroughs in thefield of wireless networks or Mobile Ad-hoc networks(MANETs).There are several obstacles that effective networks confront and the networks must be able to transport data from one system to another with adequate precision.For most applications,a frame-work must ensure that the retrieved data reflects the transmitted data.Before driv-ing to other nodes,if the frame between the two nodes is deformed in the data-link layer,it must be repaired.Most link-layer protocols immediately disregard the frame and enable the high-layer protocols to transmit it down.In other words,because of asset information must be secured from threats,information is a valu-able resource.In MANETs,some applications necessitate the use of a network method for detecting and blocking these assaults.Building a secure intrusion detection system in the network,which provides security to the nodes and route paths in the network,is a major difficulty in MANET.Attacks on the network can jeopardize security issues discovered by the intrusion detection system engine,which are then blocked by the network’s intrusion prevention engine.By bringing the Secure Intrusion Detection System(S-IDS)into the network,a new technique for implementing security goals and preventing attacks will be developed.The Secure Energy Routing(SER)protocol for MANETs is introduced in this study.The protocol addresses the issue of network security by detecting and preventing attacks in the network.The data transmission in the MANET is forwarded using Elliptical Curve Cryptography(ECC)with an objective to improve the level of security.Network Simulator–2 is used to simulate the network and experiments are compared with existing methods.展开更多
LoRa(Long Range radio)系统在当前不断发展的低功率广域网(LPWAN)中处于相对领先地位。它的MAC层采用的是基于ALOHA的接入协议。该接入机制虽然简单易实现,但同时也容易加剧冲突和碰撞的发生,降低整个系统的通信性能。因此,需要研究多...LoRa(Long Range radio)系统在当前不断发展的低功率广域网(LPWAN)中处于相对领先地位。它的MAC层采用的是基于ALOHA的接入协议。该接入机制虽然简单易实现,但同时也容易加剧冲突和碰撞的发生,降低整个系统的通信性能。因此,需要研究多个终端同时占用信道资源时的相互干扰情况,而LoRa信号的扩频因子(SF)将决定信号的通信覆盖范围。因此,分析了干扰信号的SF与发送信号的SF相同以及不同时,干扰信号对发送信号解调性能的影响。实验结果表明,相同SF信号间的干扰影响相对较大,而干扰信号使用的SF与发送信号不同时,干扰的影响相对较小。通过理论分析,获得了接收端正确解调时所要求的信干比(SIR)。可见,不同SF的LoRa信号可看作伪正交。展开更多
Lo Ra无线网络技术是一项广泛应用物联网平台的网络通信技术,能够以超低功耗提供长距离连接设施。由于AES-128加密技术用于从终端设备到应用服务器的有效负载传输,因此它提供了强大的安全功能。由于其自身网络体系架构的设计,网关是网...Lo Ra无线网络技术是一项广泛应用物联网平台的网络通信技术,能够以超低功耗提供长距离连接设施。由于AES-128加密技术用于从终端设备到应用服务器的有效负载传输,因此它提供了强大的安全功能。由于其自身网络体系架构的设计,网关是网络中的弱点,这给攻击者提供了可乘之机。提出了一种新的证书认证技术来保护网络中的网关。构建Lo Ra无线网络技术的实验仿真环境进行有效验证,大大提升了Lo Ra无线网络技术的安全性。展开更多
本研究旨在探索LoRa广域网(LoRa Wide Area Network,LoRaWAN)技术在远程监控系统中的应用,设计并实现了一种基于该技术的远程监控系统。通过充分利用LoRa技术的长距离传输和低功耗特性,成功构建了一个稳定可靠的监控系统。系统架构包括...本研究旨在探索LoRa广域网(LoRa Wide Area Network,LoRaWAN)技术在远程监控系统中的应用,设计并实现了一种基于该技术的远程监控系统。通过充分利用LoRa技术的长距离传输和低功耗特性,成功构建了一个稳定可靠的监控系统。系统架构包括网络/应用服务器、LoRaWAN网关以及LoRaWAN节点。节点负责环境数据的采集,并通过LoRaWAN协议传输到网关,网关再将数据转发至服务器进行处理和分析。通过在实际环境中的验证,证明了该系统的有效性和可行性,为远程监控领域的应用提供了新的解决方案。展开更多
基金国家重点研发计划项目(No.2021YFB2900100)国家自然科学基金面上项目(No.62172091,62232004)资助the Jiangsu Provincial Key Laboratory of Network and Information Security under grant BM2003201。
文摘The evolution of smart mobile devices has significantly impacted the way we generate and share contents and introduced a huge volume of Internet traffic.To address this issue and take advantage of the short-range communication capabilities of smart mobile devices,the decentralized content sharing approach has emerged as a suitable and promising alternative.Decentralized content sharing uses a peer-to-peer network among colocated smart mobile device users to fulfil content requests.Several articles have been published to date to address its different aspects including group management,interest extraction,message forwarding,participation incentive,and content replication.This survey paper summarizes and critically analyzes recent advancements in decentralized content sharing and highlights potential research issues that need further consideration.
基金supported in part by the Office of Research and Sponsored Programs,Kean University,the RIF Activity Code 23009 of Zayed University,UAE,and the National Natural Science Foundation of China under Grant 62172366.
文摘The paper presents a new protocol called Link Stability and Transmission Delay Aware(LSTDA)for Flying Adhoc Network(FANET)with a focus on network corridors(NC).FANET consists of Unmanned Aerial Vehicles(UAVs)that face challenges in avoiding transmission loss and delay while ensuring stable communication.The proposed protocol introduces a novel link stability with network corridors priority node selection to check and ensure fair communication in the entire network.The protocol uses a Red-Black(R-B)tree to achieve maximum channel utilization and an advanced relay approach.The paper evaluates LSTDA in terms of End-to-End Delay(E2ED),Packet Delivery Ratio(PDR),Network Lifetime(NLT),and Transmission Loss(TL),and compares it with existing methods such as Link Stability Estimation-based Routing(LEPR),Distributed Priority Tree-based Routing(DPTR),and Delay and Link Stability Aware(DLSA)using MATLAB simulations.The results show that LSTDA outperforms the other protocols,with lower average delay,higher average PDR,longer average NLT,and comparable average TL.
基金supported by Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government(MSIT) (No.RS-2022-00155885, Artificial Intelligence Convergence Innovation Human Resources Development (Hanyang University ERICA))supported by the National Natural Science Foundation of China under Grant No. 61971264the National Natural Science Foundation of China/Research Grants Council Collaborative Research Scheme under Grant No. 62261160390
文摘Due to the fading characteristics of wireless channels and the burstiness of data traffic,how to deal with congestion in Ad-hoc networks with effective algorithms is still open and challenging.In this paper,we focus on enabling congestion control to minimize network transmission delays through flexible power control.To effectively solve the congestion problem,we propose a distributed cross-layer scheduling algorithm,which is empowered by graph-based multi-agent deep reinforcement learning.The transmit power is adaptively adjusted in real-time by our algorithm based only on local information(i.e.,channel state information and queue length)and local communication(i.e.,information exchanged with neighbors).Moreover,the training complexity of the algorithm is low due to the regional cooperation based on the graph attention network.In the evaluation,we show that our algorithm can reduce the transmission delay of data flow under severe signal interference and drastically changing channel states,and demonstrate the adaptability and stability in different topologies.The method is general and can be extended to various types of topologies.
文摘Mobile computing is the most powerful application for network com-munication and connectivity,given recent breakthroughs in thefield of wireless networks or Mobile Ad-hoc networks(MANETs).There are several obstacles that effective networks confront and the networks must be able to transport data from one system to another with adequate precision.For most applications,a frame-work must ensure that the retrieved data reflects the transmitted data.Before driv-ing to other nodes,if the frame between the two nodes is deformed in the data-link layer,it must be repaired.Most link-layer protocols immediately disregard the frame and enable the high-layer protocols to transmit it down.In other words,because of asset information must be secured from threats,information is a valu-able resource.In MANETs,some applications necessitate the use of a network method for detecting and blocking these assaults.Building a secure intrusion detection system in the network,which provides security to the nodes and route paths in the network,is a major difficulty in MANET.Attacks on the network can jeopardize security issues discovered by the intrusion detection system engine,which are then blocked by the network’s intrusion prevention engine.By bringing the Secure Intrusion Detection System(S-IDS)into the network,a new technique for implementing security goals and preventing attacks will be developed.The Secure Energy Routing(SER)protocol for MANETs is introduced in this study.The protocol addresses the issue of network security by detecting and preventing attacks in the network.The data transmission in the MANET is forwarded using Elliptical Curve Cryptography(ECC)with an objective to improve the level of security.Network Simulator–2 is used to simulate the network and experiments are compared with existing methods.
文摘LoRa(Long Range radio)系统在当前不断发展的低功率广域网(LPWAN)中处于相对领先地位。它的MAC层采用的是基于ALOHA的接入协议。该接入机制虽然简单易实现,但同时也容易加剧冲突和碰撞的发生,降低整个系统的通信性能。因此,需要研究多个终端同时占用信道资源时的相互干扰情况,而LoRa信号的扩频因子(SF)将决定信号的通信覆盖范围。因此,分析了干扰信号的SF与发送信号的SF相同以及不同时,干扰信号对发送信号解调性能的影响。实验结果表明,相同SF信号间的干扰影响相对较大,而干扰信号使用的SF与发送信号不同时,干扰的影响相对较小。通过理论分析,获得了接收端正确解调时所要求的信干比(SIR)。可见,不同SF的LoRa信号可看作伪正交。
文摘本研究旨在探索LoRa广域网(LoRa Wide Area Network,LoRaWAN)技术在远程监控系统中的应用,设计并实现了一种基于该技术的远程监控系统。通过充分利用LoRa技术的长距离传输和低功耗特性,成功构建了一个稳定可靠的监控系统。系统架构包括网络/应用服务器、LoRaWAN网关以及LoRaWAN节点。节点负责环境数据的采集,并通过LoRaWAN协议传输到网关,网关再将数据转发至服务器进行处理和分析。通过在实际环境中的验证,证明了该系统的有效性和可行性,为远程监控领域的应用提供了新的解决方案。