In this paper,we investigate covert communications in data collected IoT with NOMA,where the paired sensor nodes S_(m) and S_(n) transmit covert messages to a legitimate receiver(Bob)in the presence of a Warden(Willie...In this paper,we investigate covert communications in data collected IoT with NOMA,where the paired sensor nodes S_(m) and S_(n) transmit covert messages to a legitimate receiver(Bob)in the presence of a Warden(Willie).To confuse the detection at Willie,an extra multi-antenna friendly jammer(Jammer)has been employed to transmit artificial noise(AN)with random power.Based on the CSI of Willie is available or not at Jammer,three AN transmission schemes,including null-space artificial noise(NAN),transmit antenna selection(TAS),and zeroforcing beamforming(ZFB),are proposed.Furthermore,the closed-form expressions of expected minimum detection error probability(EMDEP)and joint connection outage probability(JCOP)are derived to measure covertness and reliability,respectively.Finally,the maximum effective covert rate(ECR)is obtained with a given covertness constraint.The numerical results show that ZFB scheme has the best maximum ECR in the case of the number of antennas satisfies N>2,and the same maximum ECR can be achieved in ZFB and NAN schemes with N=2.Moreover,TAS scheme also can improve the maximum ECR compared with the benchmark scheme(i.e.,signal-antenna jammer).In addition,a proper NOMA node pairing can further improve the maximum ECR.展开更多
In recent years,Internet of Things(IoT)technology has emerged and gradually sprung up.As the needs of largescale IoT applications cannot be satisfied by the fifth generation(5G)network,wireless communication network n...In recent years,Internet of Things(IoT)technology has emerged and gradually sprung up.As the needs of largescale IoT applications cannot be satisfied by the fifth generation(5G)network,wireless communication network needs to be developed into the sixth generation(6G)network.However,with the increasingly prominent security problems of wireless communication networks such as 6G,covert communication has been recognized as one of the most promising solutions.Covert communication can realize the transmission of hidden information between both sides of communication to a certain extent,which makes the transmission content and transmission behavior challenging to be detected by noncooperative eavesdroppers.In addition,the integrated high altitude platform station(HAPS)terrestrial network is considered a promising development direction because of its flexibility and scalability.Based on the above facts,this article investigates the covert communication in an integrated HAPS terrestrial network,where a constant power auxiliary node is utilized to send artificial noise(AN)to realize the covert communication.Specifically,the covert constraint relationship between the transmitting and auxiliary nodes is derived.Moreover,the closed-form expressions of outage probability(OP)and effective covert communication rate are obtained.Finally,numerical results are provided to verify our analysis and reveal the impacts of critical parameters on the system performance.展开更多
Nowadays,wireless sensor networks play a vital role in our day to day life.Wireless communication is preferred for many sensing applications due its convenience,flexibility and effectiveness.The sensors to sense the en...Nowadays,wireless sensor networks play a vital role in our day to day life.Wireless communication is preferred for many sensing applications due its convenience,flexibility and effectiveness.The sensors to sense the environmental factor are versatile and send sensed data to central station wirelessly.The cluster based protocols are provided an optimal solution for enhancing the lifetime of the sensor networks.In this paper,modified K-means++algorithm is used to form the cluster and cluster head in an efficient way and the Advanced Energy-Efficient Cluster head selection Algorithm(AEECA)is used to calculate the weighted fac-tor of the transmission path and effective data collection using gateway node.The experimental results show the proposed algorithm outperforms the existing routing algorithms.展开更多
The network performance and the unmanned aerial vehicle(UAV)number are important objectives when UAVs are placed as communication relays to enhance the multi-agent information exchange.The problem is a non-determinist...The network performance and the unmanned aerial vehicle(UAV)number are important objectives when UAVs are placed as communication relays to enhance the multi-agent information exchange.The problem is a non-deterministic polynomial hard(NP-hard)multi-objective optimization problem,instead of generating a Pareto solution,this work focuses on considering both objectives at the same level so as to achieve a balanced solution between them.Based on the property that agents connected to the same UAV are a cluster,two clustering-based algorithms,M-K-means(MKM)and modified fast search and find density of peaks(MFSFDP)methods,are first proposed.Since the former algorithm requires too much computational time and the latter one requires too many relays,an algorithm for the balanced network performance and relay number(BPN)is proposed by discretizing the area to avoid missing the optimal relay positions and defining a new local density function to reflect the network performance metric.Simulation results demonstrate that the proposed algorithms are feasible and effective.Comparisons between these algorithms show that the BPN algorithm uses fewer relay UAVs than the MFSFDP and classic set-covering based algorithm,and its computational time is far less than the MKM algorithm.展开更多
Cooperative communication and cognitive radio have become hot topics in recent research of communication networks, attracting a widespread attention. Cooperative communication technique can enhance the transmission ca...Cooperative communication and cognitive radio have become hot topics in recent research of communication networks, attracting a widespread attention. Cooperative communication technique can enhance the transmission capacity of a communication system, while cognitive radio technique can improve the spectrum utilization ratio. As a result, the combination of the two techniques will have a significant impact on the future wireless mobile communication system. This lecture comes in four parts. This part analyzes the impacts of cooperative communication technology on modern wireless communication systems.展开更多
Cooperative communication and cognitive radio have become hot topics in recent researches of communication networks,attracting a widespread attention.Cooperative communication technique can enhance the transmission ca...Cooperative communication and cognitive radio have become hot topics in recent researches of communication networks,attracting a widespread attention.Cooperative communication technique can enhance the transmission capacity of a communication system,while cognitive radio technique can improve the spectrum utilization ratio.As a result,the combination of the two techniques will have significant impact on the future wireless mobile communication system.This lecture comes in four parts.This part introduces the history of cooperative communication as well as several cooperation schemes.展开更多
This paper mainly discussed some special requiremen ts for communication system and specific implement methods during the cause of cam paign cooperation in modern times. That system is the Advanced Field Tactical Da t...This paper mainly discussed some special requiremen ts for communication system and specific implement methods during the cause of cam paign cooperation in modern times. That system is the Advanced Field Tactical Da ta System which was developed to meet the requirements for controlling every fir e nodes, through which Army can achieve their campaign and tactical goals. The c ourse of dealing with communication message mainly include Emery’s situation rep orted, Message change (generally referred to taxis and how to choice best ways), Fire distribute, Evaluating for enemy’s casualty, cooperation among all fire no des, etc. The primary focus for this paper is how to deal with overall throughp ut, message latency, immunity from transmission errors, terrain effects on links and jamming. The system must balance all of these factors to provide within lit tle delay and that some messages are received with a specified time, finally we can make all fire nodes have best control in order to realize the aim of make th is system more optimized.展开更多
The airspace communication network based on spacecraft has a wide range of applications in regional information enhancement and emergency communication. In this paper, a routing algorithm for congestion degree detecti...The airspace communication network based on spacecraft has a wide range of applications in regional information enhancement and emergency communication. In this paper, a routing algorithm for congestion degree detection of multipath routing (CD_AOMDV) is proposed. The method of combining the whole congestion degree detection and local congestion degree detection before service initiation is adopted. Timely and accurate judgment of the congestion degree reduced the loss rate of the hot nodes, so the average packet loss rate reduced. Simulation results show that compared with the traditional AOMDV protocol, the CD_AOMDV proposed in this paper has reduced the packet loss and improved delay performance, which is more suitable for the airspace communication network.展开更多
B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later secti...B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later sections. Communication networks for industrial automation are typically built in hierarchi-展开更多
The foundation of ad hoc networks lies in the guarantee of continuous connectivity.However,critical nodes,whose failure can easily destroy network connectivity,will influence the ad hoc network connectivity significan...The foundation of ad hoc networks lies in the guarantee of continuous connectivity.However,critical nodes,whose failure can easily destroy network connectivity,will influence the ad hoc network connectivity significantly.To protect the network efficiently,critical nodes should be identified accurately and rapidly.Unlike existing critical node identification methods for unknown topology that identify critical nodes according to historical information,this paper develops a critical node identification method to relax the prior topology information condition about critical nodes.Specifically,we first deduce a theorem about the minimum communication range for a node through the number of nodes and deployment ranges,and prove the universality of the theorem in a realistic two-dimensional scenario.After that,we analyze the relationship between communication range and degree value for each node and prove that the greater number of nodes within the communication range of a node,the greater degree value of nodes with high probability.Moreover,we develop a novel strategy to improve the accuracy of critical node identification without topology information.Finally,simulation results indicate the proposed strategy can achieve high accuracy and low redundancy while ensuring low time consumption in the scenarios with unknown topology information in ad hoc networks.展开更多
SG (smart grids) is an intelligent power grid in which the diverse nodes should communicate different types of information which have different communication requirements with CS (control stations). There exist se...SG (smart grids) is an intelligent power grid in which the diverse nodes should communicate different types of information which have different communication requirements with CS (control stations). There exist several RATs (radio access technologies), with diversification in quality of service character which respect to the SG nodes communication requirements. On the other side, spectrum is becoming a rare source and its demands request is increasing exponentially. Therefore, resource allocation to support different types of SG nodes should be elaborated so that the resource efficiency is maximized while the SG communication requirements are respected. Using a CF (cost function) based on the SG node requirements and RATs characteristics to find the desirability value of every RATs for a certain node type accomplish this goal in combination with prioritizing the different SG nodes types based on SG goals by creating a priority table for RATs and different SG node types. The main node communication requirements are formulized to be used in the CF in this paper. The numerical results show that the proposed method defines the desirability value of each RAT for a certain SG node type that helps to make a priority table by using the SG node prioritization table.展开更多
Aiming at the application of a wireless sensor network to locating miners in underground mine,we design a wireless sensor network location node system,considering the communication performance and the intrinsic safety...Aiming at the application of a wireless sensor network to locating miners in underground mine,we design a wireless sensor network location node system,considering the communication performance and the intrinsic safety. The location node system consists of a mobile node,several fixed nodes,and a sink node,all of whose circuits were designed based on CC2430. A varistor and a RC circuit were used in the reset circuit of a sensor node to guarantee the intrinsic safety by reducing discharge energy,the theoretical analysis of the discharge energy shows that the reset circuit is an intrinsic safety one. The analysis and simulation about the performance of the location node system are discussed,such as network communication delay and packet loss rate,the results show that the highest network communication delay of the system is about 0.11 seconds,and the highest packet loss rate is about 0.13,which assures the location node system has a high reliability,and can locate miners in the underground mine.展开更多
Nowadays, hybrid satellite-terrestrial cooperative network has emerged as a key technology to provide a great variety of communication services. The deployment of this network will improve coverage and capacity in rem...Nowadays, hybrid satellite-terrestrial cooperative network has emerged as a key technology to provide a great variety of communication services. The deployment of this network will improve coverage and capacity in remote areas. Despite the benefits of this network, by increasing the number of users, communication efficiency based on interference management is a major challenge in satellite-based system. Also, the direct links between satellite system and the terrestrial equipment do not always have desirable channel condition. In order to avoid serious throughput degradation, choosing a cooperative relay node is very important. In this paper, Stackelberg game is exploited for interference management that is raised by satellites in down link over terrestrial equipment. Then, for interference management between ground station and relay node with other mobile users, CVX is used to allocate optimum power. Also, the best relay node in this structure is selected based on the harmonic mean function. Thus, the performance of the heterogeneous satellite-cooperative network is investigated based on three benchmarks, namely, successful transmission, energy consumption and outage probability. Finally, the simulation results showed the effect of proposed system model on the performance of next generation satellite networks.展开更多
Artificial intelligence(AI)techniques have received significant attention among research communities in the field of networking,image processing,natural language processing,robotics,etc.At the same time,a major proble...Artificial intelligence(AI)techniques have received significant attention among research communities in the field of networking,image processing,natural language processing,robotics,etc.At the same time,a major problem in wireless sensor networks(WSN)is node localization,which aims to identify the exact position of the sensor nodes(SN)using the known position of several anchor nodes.WSN comprises a massive number of SNs and records the position of the nodes,which becomes a tedious process.Besides,the SNs might be subjected to node mobility and the position alters with time.So,a precise node localization(NL)manner is required for determining the location of the SNs.In this view,this paper presents a new quantum bird migration optimizer-based NL(QBMA-NL)technique for WSN.The goal of the QBMA-NL approach is for determining the position of unknown nodes in the network by the use of anchor nodes.The QBMA-NL technique is mainly based on the mating behavior of bird species at the time of mating season.In addition,an objective function is derived based on the received signal strength indicator(RSSI)and Euclidean distance from the known to unknown SNs.For demonstrating the improved performance of the QBMA-NL technique,a wide range of simulations take place and the results reported the supreme performance over the recent NL techniques.展开更多
This paper considers an underwater acoustic sensor network with one mobile surface node to collect data from multiple underwater nodes,where the mobile destination requests retransmission from each underwater node ind...This paper considers an underwater acoustic sensor network with one mobile surface node to collect data from multiple underwater nodes,where the mobile destination requests retransmission from each underwater node individually employing traditional automatic-repeat-request(ARQ) protocol.We propose a practical node cooperation(NC) protocol to enhance the collection efficiency,utilizing the fact that underwater nodes can overhear the transmission of others.To reduce the source level of underwater nodes,the underwater data collection area is divided into several sub-zones,and in each sub-zone,the mobile surface node adopting the NC protocol could switch adaptively between selective relay cooperation(SRC) and dynamic network coded cooperation(DNC) .The difference of SRC and DNC lies in whether or not the selected relay node combines the local data and the data overheard from undecoded node(s) to form network coded packets in the retransmission phase.The NC protocol could also be applied across the sub-zones due to the wiretap property.In addition,we investigate the effects of different mobile collection paths,collection area division and cooperative zone design for energy saving.The numerical results showthat the proposed NC protocol can effectively save energy compared with the traditional ARQ scheme.展开更多
The network-on-chip(NoC)technology is frequently referred to as a front-end solution to a back-end problem.The physical substructure that transfers data on the chip and ensures the quality of service begins to collaps...The network-on-chip(NoC)technology is frequently referred to as a front-end solution to a back-end problem.The physical substructure that transfers data on the chip and ensures the quality of service begins to collapse when the size of semiconductor transistor dimensions shrinks and growing numbers of intellectual property(IP)blocks working together are integrated into a chip.The system on chip(SoC)architecture of today is so complex that not utilizing the crossbar and traditional hierarchical bus architecture.NoC connectivity reduces the amount of hardware required for routing and functions,allowing SoCs with NoC interconnect fabrics to operate at higher frequencies.Ring(Octagons)is a direct NoC that is specifically used to solve the scalability problem by expanding each node in the shape of an octagon.This paper discusses the ring NoC design concept and its simulation in Xilinx ISE 14.7,as well as the communication of functional nodes.For the field-programmable gate array(FPGA)synthesis,the performance of NoC is evaluated in terms of hardware and timing parameters.The design allows 64 to 256 node communication in a single chip with‘N’bit data transfer in the ring NoC.The performance of the NoC is evaluated with variable nodes from 2 to 256 in Digilent manufactured Virtex-5 FPGA hardware.展开更多
Next-Generation(NextG)wireless communication networks with their widespread applications require high data rates,seamless connectivity and high quality of service(QoS).To cope up with an unprecedented rise of data hun...Next-Generation(NextG)wireless communication networks with their widespread applications require high data rates,seamless connectivity and high quality of service(QoS).To cope up with an unprecedented rise of data hungry applications,users demand more spectral resources imposing a limitation on available wireless spectrum.One of the potential solutions to address the spectrum scarce issue is to incorporate in band full duplex(IBFD)or full duplex(FD)paradigm in next generation networks including 5G new radio(NR).Recently,FD has gained the research interest in cellular networks for its potential to double the wireless link capacity and enhancing spectral efficiency(SE).In half duplex(HD)cellular networks,base stations(BSs)can either perform uplink(UL)or downlink(DL)transmission at a particular time instant leading to reduced throughput levels.Due to the advancement in the self interference reduction(SIR)techniques,full duplex base stations(FD-BSs)can be employed to allow simultaneous UL and DL transmissions at the same time–frequency resources as compared to its HD counterpart.It ideally achieves twice the throughput without any additional complexity at user-equipment(UE).This paper covers a detailed survey on FD cellular networks.A series of SIR approaches,UE-UE mitigation techniques are summarized.Various existing MAC protocols and antenna architectures for FD cellular networks are outlined.An overview of security aspects for FD in cellular networks is also presented.Lastly,various open issues and possible research directions are brought up for FD cellular networks.展开更多
Underwater Wireless Sensor Networks(UWSNs)are becoming increasingly popular in marine applications due to advances in wireless and microelectronics technology.However,UWSNs present challenges in processing,energy,and ...Underwater Wireless Sensor Networks(UWSNs)are becoming increasingly popular in marine applications due to advances in wireless and microelectronics technology.However,UWSNs present challenges in processing,energy,and memory storage due to the use of acoustic waves for communication,which results in long delays,significant power consumption,limited bandwidth,and packet loss.This paper provides a comprehensive review of the latest advancements in UWSNs,including essential services,common platforms,critical elements,and components such as localization algorithms,communication,synchronization,security,mobility,and applications.Despite significant progress,reliable and flexible solutions are needed to meet the evolving requirements of UWSNs.The purpose of this paper is to provide a framework for future research in the field of UWSNs by examining recent advancements,establishing a standard platform and service criteria,using a taxonomy to determine critical elements,and emphasizing important unresolved issues.展开更多
As the means for communication of users in different communication networks and network resource sharing, communication network interconnection has been paid great attention to in recent years. The performance analysi...As the means for communication of users in different communication networks and network resource sharing, communication network interconnection has been paid great attention to in recent years. The performance analysis of internetworks is very important in communication network interconnection, for it is the basis for the study of other problems concerned. The main contribution of this paper is a wide and deep study of performance of internetwork, the construction of systematic performance analysis method for arbitrary internetworks, and of queuing model for gateways. In this paper, the performance analysis of internetwork with arbitrary topology is studied for the first time, and a new method - Node Equivalence of Subnetworks (NES) is proposed. The key step of this method is the node equivalence of subnetworks of all kinds, so we first deeply study the node equivalence, and develop two models for node equivalence. Then we study the node equivalence of CSMA/CD and SLOTTED ALOHA systems by using these models. The results show that the NES method is a systematic method which is suitable for performance analysis of any type of internetworks. The proposed equivalence models is usable with good approximation. The queuing model of gateway is first widely studied in this paper. The queuing model for gateways with packet fragmentation and reassembly is studied for the first time and the analysis method, proposed. In the analysis, two modeling tools, Reversed Switched Poisson Process (RSPP) and Switched Determined Process (SDP), are proposed and RSPP/M/1 queue and SDP/D/1 queue, analyzed. A new method-minislot method is proposed and used for the study of SDP/D/1 queue and performance of ATM multiplexer. In this paper, the interdeparture time distribution of ATM network under some input traffic models is studied and the expression, derived. These results can be used for both performance evaluation of ATM network and the performance of ATM networks interconnected with other networks. We also propose an approximate analysis method for queuing networks with priority service and the queuing networks with packet fragmentation and reassembly.展开更多
基金supported by the National Natural Science Foundation of China under Grant(no.62071486,no.61771487,no.62171464).
文摘In this paper,we investigate covert communications in data collected IoT with NOMA,where the paired sensor nodes S_(m) and S_(n) transmit covert messages to a legitimate receiver(Bob)in the presence of a Warden(Willie).To confuse the detection at Willie,an extra multi-antenna friendly jammer(Jammer)has been employed to transmit artificial noise(AN)with random power.Based on the CSI of Willie is available or not at Jammer,three AN transmission schemes,including null-space artificial noise(NAN),transmit antenna selection(TAS),and zeroforcing beamforming(ZFB),are proposed.Furthermore,the closed-form expressions of expected minimum detection error probability(EMDEP)and joint connection outage probability(JCOP)are derived to measure covertness and reliability,respectively.Finally,the maximum effective covert rate(ECR)is obtained with a given covertness constraint.The numerical results show that ZFB scheme has the best maximum ECR in the case of the number of antennas satisfies N>2,and the same maximum ECR can be achieved in ZFB and NAN schemes with N=2.Moreover,TAS scheme also can improve the maximum ECR compared with the benchmark scheme(i.e.,signal-antenna jammer).In addition,a proper NOMA node pairing can further improve the maximum ECR.
基金supported by the National Science Foundation of China under Grant 62001517in part by the Research Project of Space Engineering University under Grants 2020XXAQ01 and 2019XXAQ05,and in part by the Science and Technology Innovation Cultivation Fund of Space Engineering University.
文摘In recent years,Internet of Things(IoT)technology has emerged and gradually sprung up.As the needs of largescale IoT applications cannot be satisfied by the fifth generation(5G)network,wireless communication network needs to be developed into the sixth generation(6G)network.However,with the increasingly prominent security problems of wireless communication networks such as 6G,covert communication has been recognized as one of the most promising solutions.Covert communication can realize the transmission of hidden information between both sides of communication to a certain extent,which makes the transmission content and transmission behavior challenging to be detected by noncooperative eavesdroppers.In addition,the integrated high altitude platform station(HAPS)terrestrial network is considered a promising development direction because of its flexibility and scalability.Based on the above facts,this article investigates the covert communication in an integrated HAPS terrestrial network,where a constant power auxiliary node is utilized to send artificial noise(AN)to realize the covert communication.Specifically,the covert constraint relationship between the transmitting and auxiliary nodes is derived.Moreover,the closed-form expressions of outage probability(OP)and effective covert communication rate are obtained.Finally,numerical results are provided to verify our analysis and reveal the impacts of critical parameters on the system performance.
基金fund received from Department of Science and Technology,Govt.of India,grant no.DST/CERI/MI/SG/2017/080(AU)(G).
文摘Nowadays,wireless sensor networks play a vital role in our day to day life.Wireless communication is preferred for many sensing applications due its convenience,flexibility and effectiveness.The sensors to sense the environmental factor are versatile and send sensed data to central station wirelessly.The cluster based protocols are provided an optimal solution for enhancing the lifetime of the sensor networks.In this paper,modified K-means++algorithm is used to form the cluster and cluster head in an efficient way and the Advanced Energy-Efficient Cluster head selection Algorithm(AEECA)is used to calculate the weighted fac-tor of the transmission path and effective data collection using gateway node.The experimental results show the proposed algorithm outperforms the existing routing algorithms.
基金the National Natural Science Foundation of China(61573285)。
文摘The network performance and the unmanned aerial vehicle(UAV)number are important objectives when UAVs are placed as communication relays to enhance the multi-agent information exchange.The problem is a non-deterministic polynomial hard(NP-hard)multi-objective optimization problem,instead of generating a Pareto solution,this work focuses on considering both objectives at the same level so as to achieve a balanced solution between them.Based on the property that agents connected to the same UAV are a cluster,two clustering-based algorithms,M-K-means(MKM)and modified fast search and find density of peaks(MFSFDP)methods,are first proposed.Since the former algorithm requires too much computational time and the latter one requires too many relays,an algorithm for the balanced network performance and relay number(BPN)is proposed by discretizing the area to avoid missing the optimal relay positions and defining a new local density function to reflect the network performance metric.Simulation results demonstrate that the proposed algorithms are feasible and effective.Comparisons between these algorithms show that the BPN algorithm uses fewer relay UAVs than the MFSFDP and classic set-covering based algorithm,and its computational time is far less than the MKM algorithm.
基金supported by the National Natural Science Foundation of China under Grant No. 60872049 the National High-Tech Research and Development Plan of China ("863" Program) under Grant No. 2007AA10Z235the Teaching and Research Finances for the Returned Overseas Chinese Scholars.
文摘Cooperative communication and cognitive radio have become hot topics in recent research of communication networks, attracting a widespread attention. Cooperative communication technique can enhance the transmission capacity of a communication system, while cognitive radio technique can improve the spectrum utilization ratio. As a result, the combination of the two techniques will have a significant impact on the future wireless mobile communication system. This lecture comes in four parts. This part analyzes the impacts of cooperative communication technology on modern wireless communication systems.
基金supported by the National Natural Science Foundation of China under Grant No.60872049the National High-Tech Researchand Development Plan of China ("863" Program) under Grant No.2007AA10Z235the Teachingand Research Finances for the Returned Overseas Chinese Scholars.
文摘Cooperative communication and cognitive radio have become hot topics in recent researches of communication networks,attracting a widespread attention.Cooperative communication technique can enhance the transmission capacity of a communication system,while cognitive radio technique can improve the spectrum utilization ratio.As a result,the combination of the two techniques will have significant impact on the future wireless mobile communication system.This lecture comes in four parts.This part introduces the history of cooperative communication as well as several cooperation schemes.
文摘This paper mainly discussed some special requiremen ts for communication system and specific implement methods during the cause of cam paign cooperation in modern times. That system is the Advanced Field Tactical Da ta System which was developed to meet the requirements for controlling every fir e nodes, through which Army can achieve their campaign and tactical goals. The c ourse of dealing with communication message mainly include Emery’s situation rep orted, Message change (generally referred to taxis and how to choice best ways), Fire distribute, Evaluating for enemy’s casualty, cooperation among all fire no des, etc. The primary focus for this paper is how to deal with overall throughp ut, message latency, immunity from transmission errors, terrain effects on links and jamming. The system must balance all of these factors to provide within lit tle delay and that some messages are received with a specified time, finally we can make all fire nodes have best control in order to realize the aim of make th is system more optimized.
文摘The airspace communication network based on spacecraft has a wide range of applications in regional information enhancement and emergency communication. In this paper, a routing algorithm for congestion degree detection of multipath routing (CD_AOMDV) is proposed. The method of combining the whole congestion degree detection and local congestion degree detection before service initiation is adopted. Timely and accurate judgment of the congestion degree reduced the loss rate of the hot nodes, so the average packet loss rate reduced. Simulation results show that compared with the traditional AOMDV protocol, the CD_AOMDV proposed in this paper has reduced the packet loss and improved delay performance, which is more suitable for the airspace communication network.
文摘B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later sections. Communication networks for industrial automation are typically built in hierarchi-
基金supported by the National Natural Science Foundation of China(62231020)the Youth Innovation Team of Shaanxi Universities。
文摘The foundation of ad hoc networks lies in the guarantee of continuous connectivity.However,critical nodes,whose failure can easily destroy network connectivity,will influence the ad hoc network connectivity significantly.To protect the network efficiently,critical nodes should be identified accurately and rapidly.Unlike existing critical node identification methods for unknown topology that identify critical nodes according to historical information,this paper develops a critical node identification method to relax the prior topology information condition about critical nodes.Specifically,we first deduce a theorem about the minimum communication range for a node through the number of nodes and deployment ranges,and prove the universality of the theorem in a realistic two-dimensional scenario.After that,we analyze the relationship between communication range and degree value for each node and prove that the greater number of nodes within the communication range of a node,the greater degree value of nodes with high probability.Moreover,we develop a novel strategy to improve the accuracy of critical node identification without topology information.Finally,simulation results indicate the proposed strategy can achieve high accuracy and low redundancy while ensuring low time consumption in the scenarios with unknown topology information in ad hoc networks.
文摘SG (smart grids) is an intelligent power grid in which the diverse nodes should communicate different types of information which have different communication requirements with CS (control stations). There exist several RATs (radio access technologies), with diversification in quality of service character which respect to the SG nodes communication requirements. On the other side, spectrum is becoming a rare source and its demands request is increasing exponentially. Therefore, resource allocation to support different types of SG nodes should be elaborated so that the resource efficiency is maximized while the SG communication requirements are respected. Using a CF (cost function) based on the SG node requirements and RATs characteristics to find the desirability value of every RATs for a certain node type accomplish this goal in combination with prioritizing the different SG nodes types based on SG goals by creating a priority table for RATs and different SG node types. The main node communication requirements are formulized to be used in the CF in this paper. The numerical results show that the proposed method defines the desirability value of each RAT for a certain SG node type that helps to make a priority table by using the SG node prioritization table.
基金Projects 20070411065 supported by the China Postdoctoral Science Foundation0801028B by the Jiangsu Postdoctoral Science Research Foundation
文摘Aiming at the application of a wireless sensor network to locating miners in underground mine,we design a wireless sensor network location node system,considering the communication performance and the intrinsic safety. The location node system consists of a mobile node,several fixed nodes,and a sink node,all of whose circuits were designed based on CC2430. A varistor and a RC circuit were used in the reset circuit of a sensor node to guarantee the intrinsic safety by reducing discharge energy,the theoretical analysis of the discharge energy shows that the reset circuit is an intrinsic safety one. The analysis and simulation about the performance of the location node system are discussed,such as network communication delay and packet loss rate,the results show that the highest network communication delay of the system is about 0.11 seconds,and the highest packet loss rate is about 0.13,which assures the location node system has a high reliability,and can locate miners in the underground mine.
文摘Nowadays, hybrid satellite-terrestrial cooperative network has emerged as a key technology to provide a great variety of communication services. The deployment of this network will improve coverage and capacity in remote areas. Despite the benefits of this network, by increasing the number of users, communication efficiency based on interference management is a major challenge in satellite-based system. Also, the direct links between satellite system and the terrestrial equipment do not always have desirable channel condition. In order to avoid serious throughput degradation, choosing a cooperative relay node is very important. In this paper, Stackelberg game is exploited for interference management that is raised by satellites in down link over terrestrial equipment. Then, for interference management between ground station and relay node with other mobile users, CVX is used to allocate optimum power. Also, the best relay node in this structure is selected based on the harmonic mean function. Thus, the performance of the heterogeneous satellite-cooperative network is investigated based on three benchmarks, namely, successful transmission, energy consumption and outage probability. Finally, the simulation results showed the effect of proposed system model on the performance of next generation satellite networks.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under grant number(RGP 1/279/42)Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2022R114)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Artificial intelligence(AI)techniques have received significant attention among research communities in the field of networking,image processing,natural language processing,robotics,etc.At the same time,a major problem in wireless sensor networks(WSN)is node localization,which aims to identify the exact position of the sensor nodes(SN)using the known position of several anchor nodes.WSN comprises a massive number of SNs and records the position of the nodes,which becomes a tedious process.Besides,the SNs might be subjected to node mobility and the position alters with time.So,a precise node localization(NL)manner is required for determining the location of the SNs.In this view,this paper presents a new quantum bird migration optimizer-based NL(QBMA-NL)technique for WSN.The goal of the QBMA-NL approach is for determining the position of unknown nodes in the network by the use of anchor nodes.The QBMA-NL technique is mainly based on the mating behavior of bird species at the time of mating season.In addition,an objective function is derived based on the received signal strength indicator(RSSI)and Euclidean distance from the known to unknown SNs.For demonstrating the improved performance of the QBMA-NL technique,a wide range of simulations take place and the results reported the supreme performance over the recent NL techniques.
基金supported in part by National Key Research and Development Program of China under Grants No.2016YFC1400200 and 2016YFC1400204National Natural Science Foundation of China under Grants No.41476026,41676024 and 41376040Fundamental Research Funds for the Central Universities of China under Grant No.220720140506
文摘This paper considers an underwater acoustic sensor network with one mobile surface node to collect data from multiple underwater nodes,where the mobile destination requests retransmission from each underwater node individually employing traditional automatic-repeat-request(ARQ) protocol.We propose a practical node cooperation(NC) protocol to enhance the collection efficiency,utilizing the fact that underwater nodes can overhear the transmission of others.To reduce the source level of underwater nodes,the underwater data collection area is divided into several sub-zones,and in each sub-zone,the mobile surface node adopting the NC protocol could switch adaptively between selective relay cooperation(SRC) and dynamic network coded cooperation(DNC) .The difference of SRC and DNC lies in whether or not the selected relay node combines the local data and the data overheard from undecoded node(s) to form network coded packets in the retransmission phase.The NC protocol could also be applied across the sub-zones due to the wiretap property.In addition,we investigate the effects of different mobile collection paths,collection area division and cooperative zone design for energy saving.The numerical results showthat the proposed NC protocol can effectively save energy compared with the traditional ARQ scheme.
基金This work was supported by the Taif University Researchers Supporting Project,Taif University,Taif,Saudi Arabia,under Grant TURSP-2020/26.
文摘The network-on-chip(NoC)technology is frequently referred to as a front-end solution to a back-end problem.The physical substructure that transfers data on the chip and ensures the quality of service begins to collapse when the size of semiconductor transistor dimensions shrinks and growing numbers of intellectual property(IP)blocks working together are integrated into a chip.The system on chip(SoC)architecture of today is so complex that not utilizing the crossbar and traditional hierarchical bus architecture.NoC connectivity reduces the amount of hardware required for routing and functions,allowing SoCs with NoC interconnect fabrics to operate at higher frequencies.Ring(Octagons)is a direct NoC that is specifically used to solve the scalability problem by expanding each node in the shape of an octagon.This paper discusses the ring NoC design concept and its simulation in Xilinx ISE 14.7,as well as the communication of functional nodes.For the field-programmable gate array(FPGA)synthesis,the performance of NoC is evaluated in terms of hardware and timing parameters.The design allows 64 to 256 node communication in a single chip with‘N’bit data transfer in the ring NoC.The performance of the NoC is evaluated with variable nodes from 2 to 256 in Digilent manufactured Virtex-5 FPGA hardware.
文摘Next-Generation(NextG)wireless communication networks with their widespread applications require high data rates,seamless connectivity and high quality of service(QoS).To cope up with an unprecedented rise of data hungry applications,users demand more spectral resources imposing a limitation on available wireless spectrum.One of the potential solutions to address the spectrum scarce issue is to incorporate in band full duplex(IBFD)or full duplex(FD)paradigm in next generation networks including 5G new radio(NR).Recently,FD has gained the research interest in cellular networks for its potential to double the wireless link capacity and enhancing spectral efficiency(SE).In half duplex(HD)cellular networks,base stations(BSs)can either perform uplink(UL)or downlink(DL)transmission at a particular time instant leading to reduced throughput levels.Due to the advancement in the self interference reduction(SIR)techniques,full duplex base stations(FD-BSs)can be employed to allow simultaneous UL and DL transmissions at the same time–frequency resources as compared to its HD counterpart.It ideally achieves twice the throughput without any additional complexity at user-equipment(UE).This paper covers a detailed survey on FD cellular networks.A series of SIR approaches,UE-UE mitigation techniques are summarized.Various existing MAC protocols and antenna architectures for FD cellular networks are outlined.An overview of security aspects for FD in cellular networks is also presented.Lastly,various open issues and possible research directions are brought up for FD cellular networks.
文摘Underwater Wireless Sensor Networks(UWSNs)are becoming increasingly popular in marine applications due to advances in wireless and microelectronics technology.However,UWSNs present challenges in processing,energy,and memory storage due to the use of acoustic waves for communication,which results in long delays,significant power consumption,limited bandwidth,and packet loss.This paper provides a comprehensive review of the latest advancements in UWSNs,including essential services,common platforms,critical elements,and components such as localization algorithms,communication,synchronization,security,mobility,and applications.Despite significant progress,reliable and flexible solutions are needed to meet the evolving requirements of UWSNs.The purpose of this paper is to provide a framework for future research in the field of UWSNs by examining recent advancements,establishing a standard platform and service criteria,using a taxonomy to determine critical elements,and emphasizing important unresolved issues.
文摘As the means for communication of users in different communication networks and network resource sharing, communication network interconnection has been paid great attention to in recent years. The performance analysis of internetworks is very important in communication network interconnection, for it is the basis for the study of other problems concerned. The main contribution of this paper is a wide and deep study of performance of internetwork, the construction of systematic performance analysis method for arbitrary internetworks, and of queuing model for gateways. In this paper, the performance analysis of internetwork with arbitrary topology is studied for the first time, and a new method - Node Equivalence of Subnetworks (NES) is proposed. The key step of this method is the node equivalence of subnetworks of all kinds, so we first deeply study the node equivalence, and develop two models for node equivalence. Then we study the node equivalence of CSMA/CD and SLOTTED ALOHA systems by using these models. The results show that the NES method is a systematic method which is suitable for performance analysis of any type of internetworks. The proposed equivalence models is usable with good approximation. The queuing model of gateway is first widely studied in this paper. The queuing model for gateways with packet fragmentation and reassembly is studied for the first time and the analysis method, proposed. In the analysis, two modeling tools, Reversed Switched Poisson Process (RSPP) and Switched Determined Process (SDP), are proposed and RSPP/M/1 queue and SDP/D/1 queue, analyzed. A new method-minislot method is proposed and used for the study of SDP/D/1 queue and performance of ATM multiplexer. In this paper, the interdeparture time distribution of ATM network under some input traffic models is studied and the expression, derived. These results can be used for both performance evaluation of ATM network and the performance of ATM networks interconnected with other networks. We also propose an approximate analysis method for queuing networks with priority service and the queuing networks with packet fragmentation and reassembly.