Communication behavior recognition is an issue with increasingly importance in the antiterrorism and national defense area.However,the sensing data obtained in actual environment is often not sufficient to accurately ...Communication behavior recognition is an issue with increasingly importance in the antiterrorism and national defense area.However,the sensing data obtained in actual environment is often not sufficient to accurately analyze the communication behavior.Traditional means can hardly utilize the scarce and crude spectrum sensing data captured in a real scene.Thus,communication behavior recognition using raw sensing data under smallsample condition has become a new challenge.In this paper,a data enhanced communication behavior recognition(DECBR)scheme is proposed to meet this challenge.Firstly,a preprocessing method is designed to make the raw spectrum data suitable for the proposed scheme.Then,an adaptive convolutional neural network structure is exploited to carry out communication behavior recognition.Moreover,DCGAN is applied to support data enhancement,which realize communication behavior recognition under small-sample condition.Finally,the scheme is verified by experiments under different data size.The results show that the DECBR scheme can greatly improve the accuracy and efficiency of behavior recognition under smallsample condition.展开更多
The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure ...The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes.展开更多
In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The...In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The joint coordination of wireless power transfer(WPT)and wireless information transfer(WIT)yields simultaneous wireless information and power transfer(SWIPT)as well as data and energy integrated communication network(DEIN).However,as a promising technique,few efforts are invested in the hardware implementation of DEIN.In order to make DEIN a reality,this paper focuses on hardware implementation of a DEIN.It firstly provides a brief tutorial on SWIPT,while summarising the latest hardware design of WPT transceiver and the existing commercial solutions.Then,a prototype design in DEIN with full protocol stack is elaborated,followed by its performance evaluation.展开更多
The power communication network is a separate network from the power grid whose primary purpose is to ensure the power grid's safe operation.This paper expounds the composition of the comprehensive network managem...The power communication network is a separate network from the power grid whose primary purpose is to ensure the power grid's safe operation.This paper expounds the composition of the comprehensive network management architecture of the power communication data network and the implementation of the data acquisition module in the network management system through theoretical analysis,for the reference of relevant personnel,in order to better promote the collection of power grid communication network data.展开更多
Recent advances in wireless sensor networks and GPS have made constantly-evolving data a new type of data which bring a new challenge to traditional data processing methods. Data broadcasting is an effective means for...Recent advances in wireless sensor networks and GPS have made constantly-evolving data a new type of data which bring a new challenge to traditional data processing methods. Data broadcasting is an effective means for data dissemination in asymmetric communication networks, such as wireless networks. In this paper, definition of the mean uncertainty ratio of data is presented and a broadcasting scheme is proposed for constantly-evolving data dissemination. Simulation results show that the scheme can reduce the uncertainty of the broadcasted constantly-evolving data effectively at the cost of minor increase in data access time, in the case of no transmission error, transmission errors present, and multiple broadcast channels. As a result it benefits the qualities of the query results based on the data.展开更多
This paper discusses the model-based predictive controller design of networked nonlinear systems with communica- tion delay and data loss. Based on the analysis of the closed-loop networked predictive control systems,...This paper discusses the model-based predictive controller design of networked nonlinear systems with communica- tion delay and data loss. Based on the analysis of the closed-loop networked predictive control systems, the model-based networked predictive control strategy can compensate for communication delay and data loss in an active way. The designed model-based predictive controller can also guarantee the stability of the closed-loop networked system. The simulation re- suits demonstrate the feasibility and efficacy of the proposed model-based predictive controller design scheme.展开更多
Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data N...Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data Networking(NDN).In NDN,names,provider IDs and data are transmitted in plaintext,which exposes vehicular data to security threats and leads to considerable data communication costs and failure rates.This paper proposes a Secure vehicular Data Communication(SDC)approach in NDN to supress data communication costs and failure rates.SCD constructs a vehicular backbone to reduce the number of authenticated nodes involved in reverse paths.Only the ciphtertext of the name and data is included in the signed Interest and Data and transmitted along the backbone,so the secure data communications are achieved.SCD is evaluated,and the data results demonstrate that SCD achieves the above objectives.展开更多
Meter Data Collection Building Area Network(MDCBAN) deployed in high rises is playing an increasingly important role in wireless multi-hop smart grid meter data collection. Recently, increasingly numerous application ...Meter Data Collection Building Area Network(MDCBAN) deployed in high rises is playing an increasingly important role in wireless multi-hop smart grid meter data collection. Recently, increasingly numerous application layer data traffic makes MDCBAN be facing serious communication pressure. In addition, large density of meter data collection devices scattered in the limited geographical space of high rises results in obvious communication interference. To solve these problems, a traffic scheduling mechanism based on interference avoidance for meter data collection in MDCBAN is proposed. Firstly, the characteristics of network topology are analyzed and the corresponding traffic distribution model is proposed. Next, a wireless multi-channel selection scheme for different Floor Gateways and a single-channel time unit assignment scheme for data collection devices in the same Floor Network are proposed to avoid interference. At last, a data balanced traffic scheduling algorithm is proposed. Simulation results show that balanced traffic distribution and highly efficient and reliable data transmission can be achieved on the basis of effective interference avoidance between data collection devices.展开更多
The research of complex networks facilitates the progress of various disciplines,including biology,chemistry,social science,computer,and communication engineering.Recently,it is popular to utilize complex networks to ...The research of complex networks facilitates the progress of various disciplines,including biology,chemistry,social science,computer,and communication engineering.Recently,it is popular to utilize complex networks to study the communication networks,such as designing efficient routing strategies and robust communication networks.However,exploiting the advantages of communication networks to investigate networks in various disciplines beyond telecommunications is still in infancy.Because of this situation,this paper proposes an information-defined network(IDN)framework by which a complex network can be abstracted as a communication network associated with multiple intelligent agents.Specifically,each component and dynamic process in this framework can be defined by information.We show that the IDN framework promotes the research of unsolved problems in the current complex network field,especially for detecting new interaction types in realworld networks.展开更多
This paper considers an underwater acoustic sensor network with one mobile surface node to collect data from multiple underwater nodes,where the mobile destination requests retransmission from each underwater node ind...This paper considers an underwater acoustic sensor network with one mobile surface node to collect data from multiple underwater nodes,where the mobile destination requests retransmission from each underwater node individually employing traditional automatic-repeat-request(ARQ) protocol.We propose a practical node cooperation(NC) protocol to enhance the collection efficiency,utilizing the fact that underwater nodes can overhear the transmission of others.To reduce the source level of underwater nodes,the underwater data collection area is divided into several sub-zones,and in each sub-zone,the mobile surface node adopting the NC protocol could switch adaptively between selective relay cooperation(SRC) and dynamic network coded cooperation(DNC) .The difference of SRC and DNC lies in whether or not the selected relay node combines the local data and the data overheard from undecoded node(s) to form network coded packets in the retransmission phase.The NC protocol could also be applied across the sub-zones due to the wiretap property.In addition,we investigate the effects of different mobile collection paths,collection area division and cooperative zone design for energy saving.The numerical results showthat the proposed NC protocol can effectively save energy compared with the traditional ARQ scheme.展开更多
Because of the advanced developments in information technology and networking, a user can easily communicate with others via the Internet. In daily life, users can buy a lot of products through the e-commerce market. ...Because of the advanced developments in information technology and networking, a user can easily communicate with others via the Internet. In daily life, users can buy a lot of products through the e-commerce market. Thus, how to protect users' private data from being compromised on the Internet has become a very important research issue in recent years.展开更多
As the Internet of Things(IoT)advances,machine-type devices are densely deployed and massive networks such as ultra-dense networks(UDNs)are formed.Various devices attend to the network to transmit data using machine-t...As the Internet of Things(IoT)advances,machine-type devices are densely deployed and massive networks such as ultra-dense networks(UDNs)are formed.Various devices attend to the network to transmit data using machine-type communication(MTC),whereby numerous,various are generated.MTC devices generally have resource constraints and use wireless communication.In this kind of network,data aggregation is a key function to provide transmission efficiency.It can reduce the number of transmitted data in the network,and this leads to energy saving and reducing transmission delays.In order to effectively operate data aggregation in UDNs,it is important to select an aggregation point well.The total number of transmitted data may vary,depending on the aggregation point to which the data are delivered.Therefore,in this paper,we propose a novel data aggregation scheme to select the appropriate aggregation point and describe the data transmission method applying the proposed aggregation scheme.In addition,we evaluate the proposed scheme with extensive computer simulations.Better performances in the proposed scheme are achieved compared to the conventional approach.展开更多
NonorthogonalMultiple Access(NOMA)is incorporated into the wireless network systems to achieve better connectivity,spectral and energy effectiveness,higher data transfer rate,and also obtain the high quality of servic...NonorthogonalMultiple Access(NOMA)is incorporated into the wireless network systems to achieve better connectivity,spectral and energy effectiveness,higher data transfer rate,and also obtain the high quality of services(QoS).In order to improve throughput and minimum latency,aMultivariate Renkonen Regressive Weighted Preference Bootstrap Aggregation based Nonorthogonal Multiple Access(MRRWPBA-NOMA)technique is introduced for network communication.In the downlink transmission,each mobile device’s resources and their characteristics like energy,bandwidth,and trust are measured.Followed by,the Weighted Preference Bootstrap Aggregation is applied to recognize the resource-efficient mobile devices for aware data transmission by constructing the different weak hypotheses i.e.,Multivariate Renkonen Regression functions.Based on the classification,resource and trust-aware devices are selected for transmission.Simulation of the proposed MRRWPBA-NOMA technique and existing methods are carried out with different metrics such as data delivery ratio,throughput,latency,packet loss rate,and energy efficiency,signaling overhead.The simulation results assessment indicates that the proposed MRRWPBA-NOMA outperforms well than the conventional methods.展开更多
With the rapid spread of smart sensors,data collection is becoming more and more important in Mobile Edge Networks(MENs).The collected data can be used in many applications based on the analysis results of these data ...With the rapid spread of smart sensors,data collection is becoming more and more important in Mobile Edge Networks(MENs).The collected data can be used in many applications based on the analysis results of these data by cloud computing.Nowadays,data collection schemes have been widely studied by researchers.However,most of the researches take the amount of collected data into consideration without thinking about the problem of privacy leakage of the collected data.In this paper,we propose an energy-efficient and anonymous data collection scheme for MENs to keep a balance between energy consumption and data privacy,in which the privacy information of senors is hidden during data communication.In addition,the residual energy of nodes is taken into consideration in this scheme in particular when it comes to the selection of the relay node.The security analysis shows that no privacy information of the source node and relay node is leaked to attackers.Moreover,the simulation results demonstrate that the proposed scheme is better than other schemes in aspects of lifetime and energy consumption.At the end of the simulation part,we present a qualitative analysis for the proposed scheme and some conventional protocols.It is noteworthy that the proposed scheme outperforms the existing protocols in terms of the above indicators.展开更多
Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethe...Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethernet technology. The IP addresses are more and more important for the smart distribution grid equipment. The current IPv4 protocol occupies a dominant position; therefore, the challenges of the evolution to IPv6 and network security are faced by data communication systems of the smart distribution grid. The importance of data communications network and its main bearer of business were described. The data communications network from IPv4 to IPv6 evolution of the five processes and four stages of the transition were analyzed. The smart distribution grid data communications network security and types of their offensive and defensive were discussed. And the data communications network security architecture was established. It covers three dimensions, the security level, the communications network security engineering and the communications network security management. The security architecture safeguards the evolution to IPv6 for the smart distribution grid data communication systems.展开更多
As the rapid development of automotive telematics,modern vehicles are expected to be connected through heterogeneous radio access technologies and are able to exchange massive information with their surrounding enviro...As the rapid development of automotive telematics,modern vehicles are expected to be connected through heterogeneous radio access technologies and are able to exchange massive information with their surrounding environment. By significantly expanding the network scale and conducting both real-time and long-term information processing, the traditional Vehicular AdHoc Networks(VANETs) are evolving to the Internet of Vehicles(Io V), which promises efficient and intelligent prospect for the future transportation system. On the other hand, vehicles are not only consuming but also generating a huge amount and enormous types of data, which is referred to as Big Data. In this article, we first investigate the relationship between Io V and big data in vehicular environment, mainly on how Io V supports the transmission, storage, computing of the big data, and how Io V benefits from big data in terms of Io V characterization,performance evaluation and big data assisted communication protocol design. We then investigate the application of Io V big data in autonomous vehicles. Finally, the emerging issues of the big data enabled Io V are discussed.展开更多
Based on the nowadays' condition, it is urgent that the gas detection cable communication system must be replaced by the wireless communication systems. The wireless sensors distributed in the environment can achieve...Based on the nowadays' condition, it is urgent that the gas detection cable communication system must be replaced by the wireless communication systems. The wireless sensors distributed in the environment can achieve the intelligent gas monitoring system. Apply with multilayer data fuse to design working tactics, and import the artificial neural networks to analyze detecting result. The wireless sensors system communicates with the control center through the optical fiber cable. All the gas sensor nodes distributed in coal mine are combined into an intelligent, flexible structure wireless network system, forming coal mine gas monitoring system based on wireless sensor network.展开更多
With the popularity of the Internet and improvement of information technology,digital information sharing increasingly becomes the trend.More and More universities pay attention to the digital campus,and the construct...With the popularity of the Internet and improvement of information technology,digital information sharing increasingly becomes the trend.More and More universities pay attention to the digital campus,and the construction of digital library has become the focus of digital campus.A set of manageable,authenticated and secure solutions are needed for remote access to make the campus network be a transit point for the outside users.Remote Access IPSEC Virtual Private Network gives the solution of remote access to e-library resources,networks resources and so on very safely through a public network.It establishes a safe and stable tunnel which encrypts the data passing through it with robust secured algorithms.It is to establish a virtual private network in Internet,so that the two long-distance network users can transmit data to each other in a dedicated network channel.Using this technology,multi-network campus can communicate securely in the unreliable public internet.展开更多
Based on a generalized chaos synchronization system and a discrete Sinai map, a non-symmetric true color (RGB) digital image secure communication scheme is proposed. The scheme first changes an ordinary RGB digital ...Based on a generalized chaos synchronization system and a discrete Sinai map, a non-symmetric true color (RGB) digital image secure communication scheme is proposed. The scheme first changes an ordinary RGB digital image with 8 bits into unrecognizable disorder codes and then transforms the disorder codes into an RGB digital image with 16 bits for transmitting. A receiver uses a non-symmetric key to verify the authentication of the received data origin, and decrypts the ciphertext. The scheme can encrypt and decz:Fpt most formatted digital RGB images recognized by computers, and recover the plaintext almost without any errors. The scheme is suitable to be applied in network image communications. The analysis of the key space, sensitivity of key parameters, and correlation of encrypted images imply that this scheme has sound security.展开更多
基金supported by the National Natural Science Foundation of China(No.61971439 and No.61702543)the Natural Science Foundation of the Jiangsu Province of China(No.BK20191329)+1 种基金the China Postdoctoral Science Foundation Project(No.2019T120987)the Startup Foundation for Introducing Talent of NUIST(No.2020r100).
文摘Communication behavior recognition is an issue with increasingly importance in the antiterrorism and national defense area.However,the sensing data obtained in actual environment is often not sufficient to accurately analyze the communication behavior.Traditional means can hardly utilize the scarce and crude spectrum sensing data captured in a real scene.Thus,communication behavior recognition using raw sensing data under smallsample condition has become a new challenge.In this paper,a data enhanced communication behavior recognition(DECBR)scheme is proposed to meet this challenge.Firstly,a preprocessing method is designed to make the raw spectrum data suitable for the proposed scheme.Then,an adaptive convolutional neural network structure is exploited to carry out communication behavior recognition.Moreover,DCGAN is applied to support data enhancement,which realize communication behavior recognition under small-sample condition.Finally,the scheme is verified by experiments under different data size.The results show that the DECBR scheme can greatly improve the accuracy and efficiency of behavior recognition under smallsample condition.
基金support of the Interdisciplinary Research Center for Intelligent Secure Systems(IRC-ISS)Internal Fund Grant#INSS2202.
文摘The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes.
基金financial support of National Natural Science Foundation of China(NSFC),No.U1705263 and 61971102GF Innovative Research Programthe Sichuan Science and Technology Program,No.2019YJ0194。
文摘In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The joint coordination of wireless power transfer(WPT)and wireless information transfer(WIT)yields simultaneous wireless information and power transfer(SWIPT)as well as data and energy integrated communication network(DEIN).However,as a promising technique,few efforts are invested in the hardware implementation of DEIN.In order to make DEIN a reality,this paper focuses on hardware implementation of a DEIN.It firstly provides a brief tutorial on SWIPT,while summarising the latest hardware design of WPT transceiver and the existing commercial solutions.Then,a prototype design in DEIN with full protocol stack is elaborated,followed by its performance evaluation.
文摘The power communication network is a separate network from the power grid whose primary purpose is to ensure the power grid's safe operation.This paper expounds the composition of the comprehensive network management architecture of the power communication data network and the implementation of the data acquisition module in the network management system through theoretical analysis,for the reference of relevant personnel,in order to better promote the collection of power grid communication network data.
基金supported by the National High-Technology Research and Development Program of China (Grant No.2007AA01Z309)the National Natural Science Foundation of China (Grant No.60203017)
文摘Recent advances in wireless sensor networks and GPS have made constantly-evolving data a new type of data which bring a new challenge to traditional data processing methods. Data broadcasting is an effective means for data dissemination in asymmetric communication networks, such as wireless networks. In this paper, definition of the mean uncertainty ratio of data is presented and a broadcasting scheme is proposed for constantly-evolving data dissemination. Simulation results show that the scheme can reduce the uncertainty of the broadcasted constantly-evolving data effectively at the cost of minor increase in data access time, in the case of no transmission error, transmission errors present, and multiple broadcast channels. As a result it benefits the qualities of the query results based on the data.
基金Project supported by the Key Program for the National Natural Science Foundation of China(Grant No.61333003)the General Program for the National Natural Science Foundation of China(Grant No.61273104)
文摘This paper discusses the model-based predictive controller design of networked nonlinear systems with communica- tion delay and data loss. Based on the analysis of the closed-loop networked predictive control systems, the model-based networked predictive control strategy can compensate for communication delay and data loss in an active way. The designed model-based predictive controller can also guarantee the stability of the closed-loop networked system. The simulation re- suits demonstrate the feasibility and efficacy of the proposed model-based predictive controller design scheme.
基金supported by the National Natural Science Foundation of China under Grant No.62032013the LiaoNing Revitalization Talents Program under Grant No.XLYC1902010.
文摘Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data Networking(NDN).In NDN,names,provider IDs and data are transmitted in plaintext,which exposes vehicular data to security threats and leads to considerable data communication costs and failure rates.This paper proposes a Secure vehicular Data Communication(SDC)approach in NDN to supress data communication costs and failure rates.SCD constructs a vehicular backbone to reduce the number of authenticated nodes involved in reverse paths.Only the ciphtertext of the name and data is included in the signed Interest and Data and transmitted along the backbone,so the secure data communications are achieved.SCD is evaluated,and the data results demonstrate that SCD achieves the above objectives.
基金supported by the National Science and Technology Support Program of China (2015BAG10B01)the National Science Foundation of China under Grant No. 61232016, No.U1405254the PAPD fund
文摘Meter Data Collection Building Area Network(MDCBAN) deployed in high rises is playing an increasingly important role in wireless multi-hop smart grid meter data collection. Recently, increasingly numerous application layer data traffic makes MDCBAN be facing serious communication pressure. In addition, large density of meter data collection devices scattered in the limited geographical space of high rises results in obvious communication interference. To solve these problems, a traffic scheduling mechanism based on interference avoidance for meter data collection in MDCBAN is proposed. Firstly, the characteristics of network topology are analyzed and the corresponding traffic distribution model is proposed. Next, a wireless multi-channel selection scheme for different Floor Gateways and a single-channel time unit assignment scheme for data collection devices in the same Floor Network are proposed to avoid interference. At last, a data balanced traffic scheduling algorithm is proposed. Simulation results show that balanced traffic distribution and highly efficient and reliable data transmission can be achieved on the basis of effective interference avoidance between data collection devices.
基金supported in part by Young Elite Scientists Sponsorship Program by CAST under Grant number 2018QNRC001National Science Foundation of China with Grant number 91738202, 62071194
文摘The research of complex networks facilitates the progress of various disciplines,including biology,chemistry,social science,computer,and communication engineering.Recently,it is popular to utilize complex networks to study the communication networks,such as designing efficient routing strategies and robust communication networks.However,exploiting the advantages of communication networks to investigate networks in various disciplines beyond telecommunications is still in infancy.Because of this situation,this paper proposes an information-defined network(IDN)framework by which a complex network can be abstracted as a communication network associated with multiple intelligent agents.Specifically,each component and dynamic process in this framework can be defined by information.We show that the IDN framework promotes the research of unsolved problems in the current complex network field,especially for detecting new interaction types in realworld networks.
基金supported in part by National Key Research and Development Program of China under Grants No.2016YFC1400200 and 2016YFC1400204National Natural Science Foundation of China under Grants No.41476026,41676024 and 41376040Fundamental Research Funds for the Central Universities of China under Grant No.220720140506
文摘This paper considers an underwater acoustic sensor network with one mobile surface node to collect data from multiple underwater nodes,where the mobile destination requests retransmission from each underwater node individually employing traditional automatic-repeat-request(ARQ) protocol.We propose a practical node cooperation(NC) protocol to enhance the collection efficiency,utilizing the fact that underwater nodes can overhear the transmission of others.To reduce the source level of underwater nodes,the underwater data collection area is divided into several sub-zones,and in each sub-zone,the mobile surface node adopting the NC protocol could switch adaptively between selective relay cooperation(SRC) and dynamic network coded cooperation(DNC) .The difference of SRC and DNC lies in whether or not the selected relay node combines the local data and the data overheard from undecoded node(s) to form network coded packets in the retransmission phase.The NC protocol could also be applied across the sub-zones due to the wiretap property.In addition,we investigate the effects of different mobile collection paths,collection area division and cooperative zone design for energy saving.The numerical results showthat the proposed NC protocol can effectively save energy compared with the traditional ARQ scheme.
文摘Because of the advanced developments in information technology and networking, a user can easily communicate with others via the Internet. In daily life, users can buy a lot of products through the e-commerce market. Thus, how to protect users' private data from being compromised on the Internet has become a very important research issue in recent years.
基金supported by the National Research Foundation of Korea(NRF)grant funded by the Korea Government(MSIT)(No.2021R1C1C1013133)this work was supported by the Soonchunhyang University Research Fund(No.20210442).
文摘As the Internet of Things(IoT)advances,machine-type devices are densely deployed and massive networks such as ultra-dense networks(UDNs)are formed.Various devices attend to the network to transmit data using machine-type communication(MTC),whereby numerous,various are generated.MTC devices generally have resource constraints and use wireless communication.In this kind of network,data aggregation is a key function to provide transmission efficiency.It can reduce the number of transmitted data in the network,and this leads to energy saving and reducing transmission delays.In order to effectively operate data aggregation in UDNs,it is important to select an aggregation point well.The total number of transmitted data may vary,depending on the aggregation point to which the data are delivered.Therefore,in this paper,we propose a novel data aggregation scheme to select the appropriate aggregation point and describe the data transmission method applying the proposed aggregation scheme.In addition,we evaluate the proposed scheme with extensive computer simulations.Better performances in the proposed scheme are achieved compared to the conventional approach.
基金the Taif University Researchers Supporting Project number(TURSP-2020/36),Taif University,Taif,Saudi Arabiafundedby Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R97), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia。
文摘NonorthogonalMultiple Access(NOMA)is incorporated into the wireless network systems to achieve better connectivity,spectral and energy effectiveness,higher data transfer rate,and also obtain the high quality of services(QoS).In order to improve throughput and minimum latency,aMultivariate Renkonen Regressive Weighted Preference Bootstrap Aggregation based Nonorthogonal Multiple Access(MRRWPBA-NOMA)technique is introduced for network communication.In the downlink transmission,each mobile device’s resources and their characteristics like energy,bandwidth,and trust are measured.Followed by,the Weighted Preference Bootstrap Aggregation is applied to recognize the resource-efficient mobile devices for aware data transmission by constructing the different weak hypotheses i.e.,Multivariate Renkonen Regression functions.Based on the classification,resource and trust-aware devices are selected for transmission.Simulation of the proposed MRRWPBA-NOMA technique and existing methods are carried out with different metrics such as data delivery ratio,throughput,latency,packet loss rate,and energy efficiency,signaling overhead.The simulation results assessment indicates that the proposed MRRWPBA-NOMA outperforms well than the conventional methods.
基金This work is supported by the National Key R&D Program of China under Grant No.2018YFB0505000the National Natural Science Foundation of China under Grant No.U1836115,No.61922045,No.U1836115 and No.61672295+2 种基金the Natural Science Foundation of Jiangsu Province under Grant No.BK20181408the State Key Laboratory of Cryptology Foundation,Guangxi Key Laboratory of Cryptography and Information Security No.GCIS201715the CICAEET fund,and the PAPD fund.
文摘With the rapid spread of smart sensors,data collection is becoming more and more important in Mobile Edge Networks(MENs).The collected data can be used in many applications based on the analysis results of these data by cloud computing.Nowadays,data collection schemes have been widely studied by researchers.However,most of the researches take the amount of collected data into consideration without thinking about the problem of privacy leakage of the collected data.In this paper,we propose an energy-efficient and anonymous data collection scheme for MENs to keep a balance between energy consumption and data privacy,in which the privacy information of senors is hidden during data communication.In addition,the residual energy of nodes is taken into consideration in this scheme in particular when it comes to the selection of the relay node.The security analysis shows that no privacy information of the source node and relay node is leaked to attackers.Moreover,the simulation results demonstrate that the proposed scheme is better than other schemes in aspects of lifetime and energy consumption.At the end of the simulation part,we present a qualitative analysis for the proposed scheme and some conventional protocols.It is noteworthy that the proposed scheme outperforms the existing protocols in terms of the above indicators.
文摘Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethernet technology. The IP addresses are more and more important for the smart distribution grid equipment. The current IPv4 protocol occupies a dominant position; therefore, the challenges of the evolution to IPv6 and network security are faced by data communication systems of the smart distribution grid. The importance of data communications network and its main bearer of business were described. The data communications network from IPv4 to IPv6 evolution of the five processes and four stages of the transition were analyzed. The smart distribution grid data communications network security and types of their offensive and defensive were discussed. And the data communications network security architecture was established. It covers three dimensions, the security level, the communications network security engineering and the communications network security management. The security architecture safeguards the evolution to IPv6 for the smart distribution grid data communication systems.
基金supported by the National Natural Science Foundation of China(91638204)Natural Sciences and Engineering Research Council(NSERC)
文摘As the rapid development of automotive telematics,modern vehicles are expected to be connected through heterogeneous radio access technologies and are able to exchange massive information with their surrounding environment. By significantly expanding the network scale and conducting both real-time and long-term information processing, the traditional Vehicular AdHoc Networks(VANETs) are evolving to the Internet of Vehicles(Io V), which promises efficient and intelligent prospect for the future transportation system. On the other hand, vehicles are not only consuming but also generating a huge amount and enormous types of data, which is referred to as Big Data. In this article, we first investigate the relationship between Io V and big data in vehicular environment, mainly on how Io V supports the transmission, storage, computing of the big data, and how Io V benefits from big data in terms of Io V characterization,performance evaluation and big data assisted communication protocol design. We then investigate the application of Io V big data in autonomous vehicles. Finally, the emerging issues of the big data enabled Io V are discussed.
基金Supported by the National Natural Science Foundation of China(50534060)
文摘Based on the nowadays' condition, it is urgent that the gas detection cable communication system must be replaced by the wireless communication systems. The wireless sensors distributed in the environment can achieve the intelligent gas monitoring system. Apply with multilayer data fuse to design working tactics, and import the artificial neural networks to analyze detecting result. The wireless sensors system communicates with the control center through the optical fiber cable. All the gas sensor nodes distributed in coal mine are combined into an intelligent, flexible structure wireless network system, forming coal mine gas monitoring system based on wireless sensor network.
文摘With the popularity of the Internet and improvement of information technology,digital information sharing increasingly becomes the trend.More and More universities pay attention to the digital campus,and the construction of digital library has become the focus of digital campus.A set of manageable,authenticated and secure solutions are needed for remote access to make the campus network be a transit point for the outside users.Remote Access IPSEC Virtual Private Network gives the solution of remote access to e-library resources,networks resources and so on very safely through a public network.It establishes a safe and stable tunnel which encrypts the data passing through it with robust secured algorithms.It is to establish a virtual private network in Internet,so that the two long-distance network users can transmit data to each other in a dedicated network channel.Using this technology,multi-network campus can communicate securely in the unreliable public internet.
基金the National Natural Science Foundation of China under,the Foundation for University Key Teachers,高等学校博士学科点专项科研项目,教育部科学技术研究项目
文摘Based on a generalized chaos synchronization system and a discrete Sinai map, a non-symmetric true color (RGB) digital image secure communication scheme is proposed. The scheme first changes an ordinary RGB digital image with 8 bits into unrecognizable disorder codes and then transforms the disorder codes into an RGB digital image with 16 bits for transmitting. A receiver uses a non-symmetric key to verify the authentication of the received data origin, and decrypts the ciphertext. The scheme can encrypt and decz:Fpt most formatted digital RGB images recognized by computers, and recover the plaintext almost without any errors. The scheme is suitable to be applied in network image communications. The analysis of the key space, sensitivity of key parameters, and correlation of encrypted images imply that this scheme has sound security.