NonorthogonalMultiple Access(NOMA)is incorporated into the wireless network systems to achieve better connectivity,spectral and energy effectiveness,higher data transfer rate,and also obtain the high quality of servic...NonorthogonalMultiple Access(NOMA)is incorporated into the wireless network systems to achieve better connectivity,spectral and energy effectiveness,higher data transfer rate,and also obtain the high quality of services(QoS).In order to improve throughput and minimum latency,aMultivariate Renkonen Regressive Weighted Preference Bootstrap Aggregation based Nonorthogonal Multiple Access(MRRWPBA-NOMA)technique is introduced for network communication.In the downlink transmission,each mobile device’s resources and their characteristics like energy,bandwidth,and trust are measured.Followed by,the Weighted Preference Bootstrap Aggregation is applied to recognize the resource-efficient mobile devices for aware data transmission by constructing the different weak hypotheses i.e.,Multivariate Renkonen Regression functions.Based on the classification,resource and trust-aware devices are selected for transmission.Simulation of the proposed MRRWPBA-NOMA technique and existing methods are carried out with different metrics such as data delivery ratio,throughput,latency,packet loss rate,and energy efficiency,signaling overhead.The simulation results assessment indicates that the proposed MRRWPBA-NOMA outperforms well than the conventional methods.展开更多
In this study,a real-time rotor temperature monitoring system for large turbogenerators using SmartMesh IP wireless network communication technology was designed and tested.The system is capable of providing comprehen...In this study,a real-time rotor temperature monitoring system for large turbogenerators using SmartMesh IP wireless network communication technology was designed and tested.The system is capable of providing comprehensive,accurate,continuous,and reliable real-time temperature monitoring for turbogenerators.Additionally,it has demonstrated satisfactory results in a real-time monitoring test of the rotor temperature of various famous large-scale turbogenerators and giant nuclear power half-speed turbogenerators designed and manufactured in China.The development and application of this wireless temperature measurement system would aid in improving the intelligent operation quality,safety,and stability of China’s large turbine generators and even the entire power system.展开更多
Through reviewing different development phases of transportation and communication facilities as well as their profound influence on the evolution of urban spatial pattern,it was disclosed that the development and imp...Through reviewing different development phases of transportation and communication facilities as well as their profound influence on the evolution of urban spatial pattern,it was disclosed that the development and improvement of information network communication would bring fundamental transformation of urban basic functions which would take effect through the usage of urban land,and finally lead to the spatial pattern reform of the whole city.展开更多
Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effect...Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data.The communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time.Therefore,the scheme of an effectual routing protocol for reliable and stable communications is significant.Current research demonstrates that clustering is an intelligent method for effectual routing in a mobile environment.Therefore,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in VANETS.The FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the VANET.To accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust level.For the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR method.The experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods.展开更多
This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication...This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication constraints.These transmissions are carried out over an unreliable communication channel. In order to enhance the utilization rate of measurement data, a buffer-aided strategy is novelly employed to store historical measurements when communication networks are inaccessible. Using the neural network technique, a novel observer-based controller is introduced to address effects of signal transmission behaviors and unknown nonlinear dynamics.Through the application of stochastic analysis and Lyapunov stability, a joint framework is constructed for analyzing resultant system performance under the introduced controller. Subsequently, existence conditions for the desired output-feedback controller are delineated. The required parameters for the observerbased controller are then determined by resolving some specific matrix inequalities. Finally, a simulation example is showcased to confirm method efficacy.展开更多
In this paper,we study the covert performance of the downlink low earth orbit(LEO)satellite communication,where the unmanned aerial vehicle(UAV)is employed as a cooperative jammer.To maximize the covert rate of the LE...In this paper,we study the covert performance of the downlink low earth orbit(LEO)satellite communication,where the unmanned aerial vehicle(UAV)is employed as a cooperative jammer.To maximize the covert rate of the LEO satellite transmission,a multi-objective problem is formulated to jointly optimize the UAV’s jamming power and trajectory.For practical consideration,we assume that the UAV can only have partial environmental information,and can’t know the detection threshold and exact location of the eavesdropper on the ground.To solve the multiobjective problem,we propose the data-driven generative adversarial network(DD-GAN)based method to optimize the power and trajectory of the UAV,in which the sample data is collected by using genetic algorithm(GA).Simulation results show that the jamming solution of UAV generated by DD-GAN can achieve an effective trade-off between covert rate and probability of detection errors when only limited prior information is obtained.展开更多
The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents ...The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents two trust-based routing schemes,namely Trust-based Self-Detection Routing(TSDR)and Trust-based Cooperative Routing(TCOR)designed with an Ad hoc On-demand Distance Vector(AODV)protocol.The proposed work covers a wide range of security challenges,including malicious node identification and prevention,accurate trust quantification,secure trust data sharing,and trusted route maintenance.This brings a prominent solution for mitigating misbehaving nodes and establishing efficient communication in MANET.It is empirically validated based on a performance comparison with the current Evolutionary Self-Cooperative Trust(ESCT)scheme,Generalized Trust Model(GTM),and the conventional AODV protocol.The extensive simulations are conducted against three different varying network scenarios.The results affirm the improved values of eight popular performance metrics overcoming the existing routing schemes.Among the two proposed works,TCOR is more suitable for highly scalable networks;TSDR suits,however,the MANET application better with its small size.This work thus makes a significant contribution to the research community,in contrast to many previous works focusing solely on specific security aspects,and results in a trade-off in the expected values of evaluation parameters and asserts their efficiency.展开更多
This paper focuses on wireless-powered communication systems,which are increasingly relevant in the Internet of Things(IoT)due to their ability to extend the operational lifetime of devices with limited energy.The mai...This paper focuses on wireless-powered communication systems,which are increasingly relevant in the Internet of Things(IoT)due to their ability to extend the operational lifetime of devices with limited energy.The main contribution of the paper is a novel approach to minimize the secrecy outage probability(SOP)in these systems.Minimizing SOP is crucial for maintaining the confidentiality and integrity of data,especially in situations where the transmission of sensitive data is critical.Our proposed method harnesses the power of an improved biogeography-based optimization(IBBO)to effectively train a recurrent neural network(RNN).The proposed IBBO introduces an innovative migration model.The core advantage of IBBO lies in its adeptness at maintaining equilibrium between exploration and exploitation.This is accomplished by integrating tactics such as advancing towards a random habitat,adopting the crossover operator from genetic algorithms(GA),and utilizing the global best(Gbest)operator from particle swarm optimization(PSO)into the IBBO framework.The IBBO demonstrates its efficacy by enabling the RNN to optimize the system parameters,resulting in significant outage probability reduction.Through comprehensive simulations,we showcase the superiority of the IBBO-RNN over existing approaches,highlighting its capability to achieve remarkable gains in SOP minimization.This paper compares nine methods for predicting outage probability in wireless-powered communications.The IBBO-RNN achieved the highest accuracy rate of 98.92%,showing a significant performance improvement.In contrast,the standard RNN recorded lower accuracy rates of 91.27%.The IBBO-RNN maintains lower SOP values across the entire signal-to-noise ratio(SNR)spectrum tested,suggesting that the method is highly effective at optimizing system parameters for improved secrecy even at lower SNRs.展开更多
The demands on conventional communication networks are increasing rapidly because of the exponential expansion of connected multimedia content.In light of the data-centric aspect of contemporary communication,the info...The demands on conventional communication networks are increasing rapidly because of the exponential expansion of connected multimedia content.In light of the data-centric aspect of contemporary communication,the information-centric network(ICN)paradigm offers hope for a solution by emphasizing content retrieval by name instead of location.If 5G networks are to meet the expected data demand surge from expanded connectivity and Internet of Things(IoT)devices,then effective caching solutions will be required tomaximize network throughput andminimize the use of resources.Hence,an ICN-based Cooperative Caching(ICN-CoC)technique has been used to select a cache by considering cache position,content attractiveness,and rate prediction.The findings show that utilizing our suggested approach improves caching regarding the Cache Hit Ratio(CHR)of 84.3%,Average Hop Minimization Ratio(AHMR)of 89.5%,and Mean Access Latency(MAL)of 0.4 s.Within a framework,it suggests improved caching strategies to handle the difficulty of effectively controlling data consumption in 5G networks.These improvements aim to make the network run more smoothly by enhancing content delivery,decreasing latency,and relieving congestion.By improving 5G communication systems’capacity tomanage the demands faced by modern data-centric applications,the research ultimately aids in advancement.展开更多
Hybrid Power-line/Visible-light Communication(HPVC)network has been one of the most promising Cooperative Communication(CC)technologies for constructing Smart Home due to its superior communication reliability and har...Hybrid Power-line/Visible-light Communication(HPVC)network has been one of the most promising Cooperative Communication(CC)technologies for constructing Smart Home due to its superior communication reliability and hardware efficiency.Current research on HPVC networks focuses on the performance analysis and optimization of the Physical(PHY)layer,where the Power Line Communication(PLC)component only serves as the backbone to provide power to light Emitting Diode(LED)devices.So designing a Media Access Control(MAC)protocol remains a great challenge because it allows both PLC and Visible Light Communication(VLC)components to operate data transmission,i.e.,to achieve a true HPVC network CC.To solve this problem,we propose a new HPC network MAC protocol(HPVC MAC)based on Carrier Sense Multiple Access/Collision Avoidance(CSMA/CA)by combining IEEE 802.15.7 and IEEE 1901 standards.Firstly,we add an Additional Assistance(AA)layer to provide the channel selection strategies for sensor stations,so that they can complete data transmission on the selected channel via the specified CSMA/CA mechanism,respectively.Based on this,we give a detailed working principle of the HPVC MAC,followed by the construction of a joint analytical model for mathematicalmathematical validation of the HPVC MAC.In the modeling process,the impacts of PHY layer settings(including channel fading types and additive noise feature),CSMA/CA mechanisms of 802.15.7 and 1901,and practical configurations(such as traffic rate,transit buffer size)are comprehensively taken into consideration.Moreover,we prove the proposed analytical model has the solvability.Finally,through extensive simulations,we characterize the HPVC MAC performance under different system parameters and verify the correctness of the corresponding analytical model with an average error rate of 4.62%between the simulation and analytical results.展开更多
In unmanned aerial vehicle(UAV)networks,the high mobility of nodes leads to frequent changes in network topology,which brings challenges to the neighbor discovery(ND)for UAV networks.Integrated sensing and communicati...In unmanned aerial vehicle(UAV)networks,the high mobility of nodes leads to frequent changes in network topology,which brings challenges to the neighbor discovery(ND)for UAV networks.Integrated sensing and communication(ISAC),as an emerging technology in 6G mobile networks,has shown great potential in improving communication performance with the assistance of sensing information.ISAC obtains the prior information about node distribution,reducing the ND time.However,the prior information obtained through ISAC may be imperfect.Hence,an ND algorithm based on reinforcement learning is proposed.The learning automaton(LA)is applied to interact with the environment and continuously adjust the probability of selecting beams to accelerate the convergence speed of ND algorithms.Besides,an efficient ND algorithm in the neighbor maintenance phase is designed,which applies the Kalman filter to predict node movement.Simulation results show that the LA-based ND algorithm reduces the ND time by up to 32%compared with the Scan-Based Algorithm(SBA),which proves the efficiency of the proposed ND algorithms.展开更多
The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the sev...The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks.展开更多
The current resource allocation in 5G vehicular networks for mobile cloud communication faces several challenges,such as low user utilization,unbalanced resource allocation,and extended adaptive allocation time.We pro...The current resource allocation in 5G vehicular networks for mobile cloud communication faces several challenges,such as low user utilization,unbalanced resource allocation,and extended adaptive allocation time.We propose an adaptive allocation algorithm for mobile cloud communication resources in 5G vehicular networks to address these issues.This study analyzes the components of the 5G vehicular network architecture to determine the performance of different components.It is ascertained that the communication modes in 5G vehicular networks for mobile cloud communication include in-band and out-of-band modes.Furthermore,this study analyzes the single-hop and multi-hop modes in mobile cloud communication and calculates the resource transmission rate and bandwidth in different communication modes.The study also determines the scenario of one-way and two-way vehicle lane cloud communication network connectivity,calculates the probability of vehicle network connectivity under different mobile cloud communication radii,and determines the amount of cloud communication resources required by vehicles in different lane scenarios.Based on the communication status of users in 5G vehicular networks,this study calculates the bandwidth and transmission rate of the allocated channels using Shannon’s formula.It determines the adaptive allocation of cloud communication resources,introduces an objective function to obtain the optimal solution after allocation,and completes the adaptive allocation process.The experimental results demonstrate that,with the application of the proposed method,the maximum utilization of user communication resources reaches approximately 99%.The balance coefficient curve approaches 1,and the allocation time remains under 2 s.This indicates that the proposed method has higher adaptive allocation efficiency.展开更多
Generative artificial intelligence(AI), as an emerging paradigm in content generation, has demonstrated its great potentials in creating high-fidelity data including images, texts, and videos. Nowadays wireless networ...Generative artificial intelligence(AI), as an emerging paradigm in content generation, has demonstrated its great potentials in creating high-fidelity data including images, texts, and videos. Nowadays wireless networks and applications have been rapidly evolving from achieving “connected things” to embracing “connected intelligence”.展开更多
With the development of the transportation industry, the effective guidance of aircraft in an emergency to prevent catastrophic accidents remains one of the top safety concerns. Undoubtedly, operational status data of...With the development of the transportation industry, the effective guidance of aircraft in an emergency to prevent catastrophic accidents remains one of the top safety concerns. Undoubtedly, operational status data of the aircraft play an important role in the judgment and command of the Operational Control Center(OCC). However, how to transmit various operational status data from abnormal aircraft back to the OCC in an emergency is still an open problem. In this paper, we propose a novel Telemetry, Tracking,and Command(TT&C) architecture named Collaborative TT&C(CoTT&C) based on mega-constellation to solve such a problem. CoTT&C allows each satellite to help the abnormal aircraft by sharing TT&C resources when needed, realizing real-time and reliable aeronautical communication in an emergency. Specifically, we design a dynamic resource sharing mechanism for CoTT&C and model the mechanism as a single-leader-multi-follower Stackelberg game. Further, we give an unique Nash Equilibrium(NE) of the game as a closed form. Simulation results demonstrate that the proposed resource sharing mechanism is effective, incentive compatible, fair, and reciprocal. We hope that our findings can shed some light for future research on aeronautical communications in an emergency.展开更多
In recent years,deep learning has been gradually used in communication physical layer receivers and has achieved excellent performance.In this paper,we employ deep learning to establish covert communication systems,en...In recent years,deep learning has been gradually used in communication physical layer receivers and has achieved excellent performance.In this paper,we employ deep learning to establish covert communication systems,enabling the transmission of signals through high-power signals present in the prevailing environment while maintaining covertness,and propose a convolutional neural network(CNN)based model for covert communication receivers,namely Deep CCR.This model leverages CNN to execute the signal separation and recovery tasks commonly performed by traditional receivers.It enables the direct recovery of covert information from the received signal.The simulation results show that the proposed Deep CCR exhibits significant advantages in bit error rate(BER)compared to traditional receivers in the face of noise and multipath fading.We verify the covert performance of the covert method proposed in this paper using the maximum-minimum eigenvalue ratio-based method and the frequency domain entropy-based method.The results indicate that this method has excellent covert performance.We also evaluate the mutual influence between covert signals and opportunity signals,indicating that using opportunity signals as cover can cause certain performance losses to covert signals.When the interference-tosignal power ratio(ISR)is large,the impact of covert signals on opportunity signals is minimal.展开更多
The nonlinear filtering problem has enduringly been an active research topic in both academia and industry due to its ever-growing theoretical importance and practical significance.The main objective of nonlinear filt...The nonlinear filtering problem has enduringly been an active research topic in both academia and industry due to its ever-growing theoretical importance and practical significance.The main objective of nonlinear filtering is to infer the states of a nonlinear dynamical system of interest based on the available noisy measurements. In recent years, the advance of network communication technology has not only popularized the networked systems with apparent advantages in terms of installation,cost and maintenance, but also brought about a series of challenges to the design of nonlinear filtering algorithms, among which the communication constraint has been recognized as a dominating concern. In this context, a great number of investigations have been launched towards the networked nonlinear filtering problem with communication constraints, and many samplebased nonlinear filters have been developed to deal with the highly nonlinear and/or non-Gaussian scenarios. The aim of this paper is to provide a timely survey about the recent advances on the sample-based networked nonlinear filtering problem from the perspective of communication constraints. More specifically, we first review three important families of sample-based filtering methods known as the unscented Kalman filter, particle filter,and maximum correntropy filter. Then, the latest developments are surveyed with stress on the topics regarding incomplete/imperfect information, limited resources and cyber security.Finally, several challenges and open problems are highlighted to shed some lights on the possible trends of future research in this realm.展开更多
Integration of digital twin(DT)and wireless channel provides new solution of channel modeling and simulation,and can assist to design,optimize and evaluate intelligent wireless communication system and networks.With D...Integration of digital twin(DT)and wireless channel provides new solution of channel modeling and simulation,and can assist to design,optimize and evaluate intelligent wireless communication system and networks.With DT channel modeling,the generated channel data can be closer to realistic channel measurements without requiring a prior channel model,and amount of channel data can be significantly increased.Artificial intelligence(AI)based modeling approach shows outstanding performance to solve such problems.In this work,a channel modeling method based on generative adversarial networks is proposed for DT channel,which can generate identical statistical distribution with measured channel.Model validation is conducted by comparing DT channel characteristics with measurements,and results show that DT channel leads to fairly good agreement with measured channel.Finally,a link-layer simulation is implemented based on DT channel.It is found that the proposed DT channel model can be well used to conduct link-layer simulation and its performance is comparable to using measurement data.The observations and results can facilitate the development of DT channel modeling and provide new thoughts for DT channel applications,as well as improving the performance and reliability of intelligent communication networking.展开更多
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wirel...Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wireless propagation environment and the broad coverage pose severe threats to the protection of private data. Emerging covert communications provides a promising solution to achieve robust communication security. Aiming at facilitating the practical implementation of covert communications in space/air networks, we present a tutorial overview of its potentials, scenarios, and key technologies. Specifically, first, the commonly used covertness constraint model, covert performance metrics, and potential application scenarios are briefly introduced. Then, several efficient methods that introduce uncertainty into the covert system are thoroughly summarized, followed by several critical enabling technologies, including joint resource allocation and deployment/trajectory design, multi-antenna and beamforming techniques, reconfigurable intelligent surface(RIS), and artificial intelligence algorithms. Finally, we highlight some open issues for future investigation.展开更多
Nowadays,wireless sensor networks play a vital role in our day to day life.Wireless communication is preferred for many sensing applications due its convenience,flexibility and effectiveness.The sensors to sense the en...Nowadays,wireless sensor networks play a vital role in our day to day life.Wireless communication is preferred for many sensing applications due its convenience,flexibility and effectiveness.The sensors to sense the environmental factor are versatile and send sensed data to central station wirelessly.The cluster based protocols are provided an optimal solution for enhancing the lifetime of the sensor networks.In this paper,modified K-means++algorithm is used to form the cluster and cluster head in an efficient way and the Advanced Energy-Efficient Cluster head selection Algorithm(AEECA)is used to calculate the weighted fac-tor of the transmission path and effective data collection using gateway node.The experimental results show the proposed algorithm outperforms the existing routing algorithms.展开更多
基金the Taif University Researchers Supporting Project number(TURSP-2020/36),Taif University,Taif,Saudi Arabiafundedby Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R97), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia。
文摘NonorthogonalMultiple Access(NOMA)is incorporated into the wireless network systems to achieve better connectivity,spectral and energy effectiveness,higher data transfer rate,and also obtain the high quality of services(QoS).In order to improve throughput and minimum latency,aMultivariate Renkonen Regressive Weighted Preference Bootstrap Aggregation based Nonorthogonal Multiple Access(MRRWPBA-NOMA)technique is introduced for network communication.In the downlink transmission,each mobile device’s resources and their characteristics like energy,bandwidth,and trust are measured.Followed by,the Weighted Preference Bootstrap Aggregation is applied to recognize the resource-efficient mobile devices for aware data transmission by constructing the different weak hypotheses i.e.,Multivariate Renkonen Regression functions.Based on the classification,resource and trust-aware devices are selected for transmission.Simulation of the proposed MRRWPBA-NOMA technique and existing methods are carried out with different metrics such as data delivery ratio,throughput,latency,packet loss rate,and energy efficiency,signaling overhead.The simulation results assessment indicates that the proposed MRRWPBA-NOMA outperforms well than the conventional methods.
基金supported by the National Natura Science Foundation of China (NSFC), No.51607146China National Major Science and Technology Projects 2010ZX06004-013-04-02 and 2012ZX06002-017-02-01+1 种基金Sichuan Science and Technology Program,No.2018GZ0391Sichuan Hydropower Energy and power equipment technology Engineering Research Center, Xihua university, Chengdu 610039, China,No.SDNY2020-001
文摘In this study,a real-time rotor temperature monitoring system for large turbogenerators using SmartMesh IP wireless network communication technology was designed and tested.The system is capable of providing comprehensive,accurate,continuous,and reliable real-time temperature monitoring for turbogenerators.Additionally,it has demonstrated satisfactory results in a real-time monitoring test of the rotor temperature of various famous large-scale turbogenerators and giant nuclear power half-speed turbogenerators designed and manufactured in China.The development and application of this wireless temperature measurement system would aid in improving the intelligent operation quality,safety,and stability of China’s large turbine generators and even the entire power system.
文摘Through reviewing different development phases of transportation and communication facilities as well as their profound influence on the evolution of urban spatial pattern,it was disclosed that the development and improvement of information network communication would bring fundamental transformation of urban basic functions which would take effect through the usage of urban land,and finally lead to the spatial pattern reform of the whole city.
文摘Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data.The communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time.Therefore,the scheme of an effectual routing protocol for reliable and stable communications is significant.Current research demonstrates that clustering is an intelligent method for effectual routing in a mobile environment.Therefore,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in VANETS.The FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the VANET.To accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust level.For the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR method.The experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods.
基金supported in part by the National Natural Science Foundation of China (61933007,62273087,U22A2044,61973102,62073180)the Shanghai Pujiang Program of China (22PJ1400400)+1 种基金the Royal Society of the UKthe Alexander von Humboldt Foundation of Germany。
文摘This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication constraints.These transmissions are carried out over an unreliable communication channel. In order to enhance the utilization rate of measurement data, a buffer-aided strategy is novelly employed to store historical measurements when communication networks are inaccessible. Using the neural network technique, a novel observer-based controller is introduced to address effects of signal transmission behaviors and unknown nonlinear dynamics.Through the application of stochastic analysis and Lyapunov stability, a joint framework is constructed for analyzing resultant system performance under the introduced controller. Subsequently, existence conditions for the desired output-feedback controller are delineated. The required parameters for the observerbased controller are then determined by resolving some specific matrix inequalities. Finally, a simulation example is showcased to confirm method efficacy.
基金supported in part by the National Natural Science Foundation for Distinguished Young Scholar 61825104in part by the National Natural Science Foundation of China under Grant 62201582+4 种基金in part by the National Nature Science Foundation of China under Grants 62101450in part by the Key R&D Plan of Shaan Xi Province Grants 2023YBGY037in part by National Key R&D Program of China(2022YFC3301300)in part by the Natural Science Basic Research Program of Shaanxi under Grant 2022JQ-632in part by Innovative Cultivation Project of School of Information and Communication of National University of Defense Technology under Grant YJKT-ZD-2202。
文摘In this paper,we study the covert performance of the downlink low earth orbit(LEO)satellite communication,where the unmanned aerial vehicle(UAV)is employed as a cooperative jammer.To maximize the covert rate of the LEO satellite transmission,a multi-objective problem is formulated to jointly optimize the UAV’s jamming power and trajectory.For practical consideration,we assume that the UAV can only have partial environmental information,and can’t know the detection threshold and exact location of the eavesdropper on the ground.To solve the multiobjective problem,we propose the data-driven generative adversarial network(DD-GAN)based method to optimize the power and trajectory of the UAV,in which the sample data is collected by using genetic algorithm(GA).Simulation results show that the jamming solution of UAV generated by DD-GAN can achieve an effective trade-off between covert rate and probability of detection errors when only limited prior information is obtained.
文摘The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents two trust-based routing schemes,namely Trust-based Self-Detection Routing(TSDR)and Trust-based Cooperative Routing(TCOR)designed with an Ad hoc On-demand Distance Vector(AODV)protocol.The proposed work covers a wide range of security challenges,including malicious node identification and prevention,accurate trust quantification,secure trust data sharing,and trusted route maintenance.This brings a prominent solution for mitigating misbehaving nodes and establishing efficient communication in MANET.It is empirically validated based on a performance comparison with the current Evolutionary Self-Cooperative Trust(ESCT)scheme,Generalized Trust Model(GTM),and the conventional AODV protocol.The extensive simulations are conducted against three different varying network scenarios.The results affirm the improved values of eight popular performance metrics overcoming the existing routing schemes.Among the two proposed works,TCOR is more suitable for highly scalable networks;TSDR suits,however,the MANET application better with its small size.This work thus makes a significant contribution to the research community,in contrast to many previous works focusing solely on specific security aspects,and results in a trade-off in the expected values of evaluation parameters and asserts their efficiency.
文摘This paper focuses on wireless-powered communication systems,which are increasingly relevant in the Internet of Things(IoT)due to their ability to extend the operational lifetime of devices with limited energy.The main contribution of the paper is a novel approach to minimize the secrecy outage probability(SOP)in these systems.Minimizing SOP is crucial for maintaining the confidentiality and integrity of data,especially in situations where the transmission of sensitive data is critical.Our proposed method harnesses the power of an improved biogeography-based optimization(IBBO)to effectively train a recurrent neural network(RNN).The proposed IBBO introduces an innovative migration model.The core advantage of IBBO lies in its adeptness at maintaining equilibrium between exploration and exploitation.This is accomplished by integrating tactics such as advancing towards a random habitat,adopting the crossover operator from genetic algorithms(GA),and utilizing the global best(Gbest)operator from particle swarm optimization(PSO)into the IBBO framework.The IBBO demonstrates its efficacy by enabling the RNN to optimize the system parameters,resulting in significant outage probability reduction.Through comprehensive simulations,we showcase the superiority of the IBBO-RNN over existing approaches,highlighting its capability to achieve remarkable gains in SOP minimization.This paper compares nine methods for predicting outage probability in wireless-powered communications.The IBBO-RNN achieved the highest accuracy rate of 98.92%,showing a significant performance improvement.In contrast,the standard RNN recorded lower accuracy rates of 91.27%.The IBBO-RNN maintains lower SOP values across the entire signal-to-noise ratio(SNR)spectrum tested,suggesting that the method is highly effective at optimizing system parameters for improved secrecy even at lower SNRs.
基金New Brunswick Innovation Foundation(NBIF)for the financial support of the global project.
文摘The demands on conventional communication networks are increasing rapidly because of the exponential expansion of connected multimedia content.In light of the data-centric aspect of contemporary communication,the information-centric network(ICN)paradigm offers hope for a solution by emphasizing content retrieval by name instead of location.If 5G networks are to meet the expected data demand surge from expanded connectivity and Internet of Things(IoT)devices,then effective caching solutions will be required tomaximize network throughput andminimize the use of resources.Hence,an ICN-based Cooperative Caching(ICN-CoC)technique has been used to select a cache by considering cache position,content attractiveness,and rate prediction.The findings show that utilizing our suggested approach improves caching regarding the Cache Hit Ratio(CHR)of 84.3%,Average Hop Minimization Ratio(AHMR)of 89.5%,and Mean Access Latency(MAL)of 0.4 s.Within a framework,it suggests improved caching strategies to handle the difficulty of effectively controlling data consumption in 5G networks.These improvements aim to make the network run more smoothly by enhancing content delivery,decreasing latency,and relieving congestion.By improving 5G communication systems’capacity tomanage the demands faced by modern data-centric applications,the research ultimately aids in advancement.
基金supported by the National Natural Science Foundation of China(No.61772386)National Key Research and Development Project(No.2018YFB1305001)Fundamental Research Funds for the Central Universities(No.KJ02072021-0119).
文摘Hybrid Power-line/Visible-light Communication(HPVC)network has been one of the most promising Cooperative Communication(CC)technologies for constructing Smart Home due to its superior communication reliability and hardware efficiency.Current research on HPVC networks focuses on the performance analysis and optimization of the Physical(PHY)layer,where the Power Line Communication(PLC)component only serves as the backbone to provide power to light Emitting Diode(LED)devices.So designing a Media Access Control(MAC)protocol remains a great challenge because it allows both PLC and Visible Light Communication(VLC)components to operate data transmission,i.e.,to achieve a true HPVC network CC.To solve this problem,we propose a new HPC network MAC protocol(HPVC MAC)based on Carrier Sense Multiple Access/Collision Avoidance(CSMA/CA)by combining IEEE 802.15.7 and IEEE 1901 standards.Firstly,we add an Additional Assistance(AA)layer to provide the channel selection strategies for sensor stations,so that they can complete data transmission on the selected channel via the specified CSMA/CA mechanism,respectively.Based on this,we give a detailed working principle of the HPVC MAC,followed by the construction of a joint analytical model for mathematicalmathematical validation of the HPVC MAC.In the modeling process,the impacts of PHY layer settings(including channel fading types and additive noise feature),CSMA/CA mechanisms of 802.15.7 and 1901,and practical configurations(such as traffic rate,transit buffer size)are comprehensively taken into consideration.Moreover,we prove the proposed analytical model has the solvability.Finally,through extensive simulations,we characterize the HPVC MAC performance under different system parameters and verify the correctness of the corresponding analytical model with an average error rate of 4.62%between the simulation and analytical results.
基金supported in part by the Fundamental Research Funds for the Central Universities under Grant No.2024ZCJH01in part by the National Natural Science Foundation of China(NSFC)under Grant No.62271081in part by the National Key Research and Development Program of China under Grant No.2020YFA0711302.
文摘In unmanned aerial vehicle(UAV)networks,the high mobility of nodes leads to frequent changes in network topology,which brings challenges to the neighbor discovery(ND)for UAV networks.Integrated sensing and communication(ISAC),as an emerging technology in 6G mobile networks,has shown great potential in improving communication performance with the assistance of sensing information.ISAC obtains the prior information about node distribution,reducing the ND time.However,the prior information obtained through ISAC may be imperfect.Hence,an ND algorithm based on reinforcement learning is proposed.The learning automaton(LA)is applied to interact with the environment and continuously adjust the probability of selecting beams to accelerate the convergence speed of ND algorithms.Besides,an efficient ND algorithm in the neighbor maintenance phase is designed,which applies the Kalman filter to predict node movement.Simulation results show that the LA-based ND algorithm reduces the ND time by up to 32%compared with the Scan-Based Algorithm(SBA),which proves the efficiency of the proposed ND algorithms.
文摘The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks.
基金This research was supported by Science and Technology Research Project of Education Department of Jiangxi Province,China(Nos.GJJ2206701,GJJ2206717).
文摘The current resource allocation in 5G vehicular networks for mobile cloud communication faces several challenges,such as low user utilization,unbalanced resource allocation,and extended adaptive allocation time.We propose an adaptive allocation algorithm for mobile cloud communication resources in 5G vehicular networks to address these issues.This study analyzes the components of the 5G vehicular network architecture to determine the performance of different components.It is ascertained that the communication modes in 5G vehicular networks for mobile cloud communication include in-band and out-of-band modes.Furthermore,this study analyzes the single-hop and multi-hop modes in mobile cloud communication and calculates the resource transmission rate and bandwidth in different communication modes.The study also determines the scenario of one-way and two-way vehicle lane cloud communication network connectivity,calculates the probability of vehicle network connectivity under different mobile cloud communication radii,and determines the amount of cloud communication resources required by vehicles in different lane scenarios.Based on the communication status of users in 5G vehicular networks,this study calculates the bandwidth and transmission rate of the allocated channels using Shannon’s formula.It determines the adaptive allocation of cloud communication resources,introduces an objective function to obtain the optimal solution after allocation,and completes the adaptive allocation process.The experimental results demonstrate that,with the application of the proposed method,the maximum utilization of user communication resources reaches approximately 99%.The balance coefficient curve approaches 1,and the allocation time remains under 2 s.This indicates that the proposed method has higher adaptive allocation efficiency.
文摘Generative artificial intelligence(AI), as an emerging paradigm in content generation, has demonstrated its great potentials in creating high-fidelity data including images, texts, and videos. Nowadays wireless networks and applications have been rapidly evolving from achieving “connected things” to embracing “connected intelligence”.
基金supported by the National Natural Science Foundation of China under Grant 62131012/61971261。
文摘With the development of the transportation industry, the effective guidance of aircraft in an emergency to prevent catastrophic accidents remains one of the top safety concerns. Undoubtedly, operational status data of the aircraft play an important role in the judgment and command of the Operational Control Center(OCC). However, how to transmit various operational status data from abnormal aircraft back to the OCC in an emergency is still an open problem. In this paper, we propose a novel Telemetry, Tracking,and Command(TT&C) architecture named Collaborative TT&C(CoTT&C) based on mega-constellation to solve such a problem. CoTT&C allows each satellite to help the abnormal aircraft by sharing TT&C resources when needed, realizing real-time and reliable aeronautical communication in an emergency. Specifically, we design a dynamic resource sharing mechanism for CoTT&C and model the mechanism as a single-leader-multi-follower Stackelberg game. Further, we give an unique Nash Equilibrium(NE) of the game as a closed form. Simulation results demonstrate that the proposed resource sharing mechanism is effective, incentive compatible, fair, and reciprocal. We hope that our findings can shed some light for future research on aeronautical communications in an emergency.
基金supported in part by the National Natural Science Foundation of China under Grants U19B2016,62271447 and 61871348。
文摘In recent years,deep learning has been gradually used in communication physical layer receivers and has achieved excellent performance.In this paper,we employ deep learning to establish covert communication systems,enabling the transmission of signals through high-power signals present in the prevailing environment while maintaining covertness,and propose a convolutional neural network(CNN)based model for covert communication receivers,namely Deep CCR.This model leverages CNN to execute the signal separation and recovery tasks commonly performed by traditional receivers.It enables the direct recovery of covert information from the received signal.The simulation results show that the proposed Deep CCR exhibits significant advantages in bit error rate(BER)compared to traditional receivers in the face of noise and multipath fading.We verify the covert performance of the covert method proposed in this paper using the maximum-minimum eigenvalue ratio-based method and the frequency domain entropy-based method.The results indicate that this method has excellent covert performance.We also evaluate the mutual influence between covert signals and opportunity signals,indicating that using opportunity signals as cover can cause certain performance losses to covert signals.When the interference-tosignal power ratio(ISR)is large,the impact of covert signals on opportunity signals is minimal.
基金supported in part by the National Key R&D Program of China (2022ZD0116401,2022ZD0116400)the National Natural Science Foundation of China (62203016,U2241214,T2121002,62373008,61933007)+2 种基金the China Postdoctoral Science Foundation (2021TQ0009)the Royal Society of the UKthe Alexander von Humboldt Foundation of Germany。
文摘The nonlinear filtering problem has enduringly been an active research topic in both academia and industry due to its ever-growing theoretical importance and practical significance.The main objective of nonlinear filtering is to infer the states of a nonlinear dynamical system of interest based on the available noisy measurements. In recent years, the advance of network communication technology has not only popularized the networked systems with apparent advantages in terms of installation,cost and maintenance, but also brought about a series of challenges to the design of nonlinear filtering algorithms, among which the communication constraint has been recognized as a dominating concern. In this context, a great number of investigations have been launched towards the networked nonlinear filtering problem with communication constraints, and many samplebased nonlinear filters have been developed to deal with the highly nonlinear and/or non-Gaussian scenarios. The aim of this paper is to provide a timely survey about the recent advances on the sample-based networked nonlinear filtering problem from the perspective of communication constraints. More specifically, we first review three important families of sample-based filtering methods known as the unscented Kalman filter, particle filter,and maximum correntropy filter. Then, the latest developments are surveyed with stress on the topics regarding incomplete/imperfect information, limited resources and cyber security.Finally, several challenges and open problems are highlighted to shed some lights on the possible trends of future research in this realm.
基金supported by National Key R&D Program of China under Grant 2021YFB3901302 and 2021YFB2900301the National Natural Science Foundation of China under Grant 62271037,62001519,62221001,and U21A20445+1 种基金the State Key Laboratory of Advanced Rail Autonomous Operation under Grant RCS2022ZZ004the Fundamental Research Funds for the Central Universities under Grant 2022JBQY004.
文摘Integration of digital twin(DT)and wireless channel provides new solution of channel modeling and simulation,and can assist to design,optimize and evaluate intelligent wireless communication system and networks.With DT channel modeling,the generated channel data can be closer to realistic channel measurements without requiring a prior channel model,and amount of channel data can be significantly increased.Artificial intelligence(AI)based modeling approach shows outstanding performance to solve such problems.In this work,a channel modeling method based on generative adversarial networks is proposed for DT channel,which can generate identical statistical distribution with measured channel.Model validation is conducted by comparing DT channel characteristics with measurements,and results show that DT channel leads to fairly good agreement with measured channel.Finally,a link-layer simulation is implemented based on DT channel.It is found that the proposed DT channel model can be well used to conduct link-layer simulation and its performance is comparable to using measurement data.The observations and results can facilitate the development of DT channel modeling and provide new thoughts for DT channel applications,as well as improving the performance and reliability of intelligent communication networking.
基金supported in part by the National Natural Science Foundation of China(NSFC)under grant numbers U22A2007 and 62171010the Beijing Natural Science Foundation under grant number L212003.
文摘Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wireless propagation environment and the broad coverage pose severe threats to the protection of private data. Emerging covert communications provides a promising solution to achieve robust communication security. Aiming at facilitating the practical implementation of covert communications in space/air networks, we present a tutorial overview of its potentials, scenarios, and key technologies. Specifically, first, the commonly used covertness constraint model, covert performance metrics, and potential application scenarios are briefly introduced. Then, several efficient methods that introduce uncertainty into the covert system are thoroughly summarized, followed by several critical enabling technologies, including joint resource allocation and deployment/trajectory design, multi-antenna and beamforming techniques, reconfigurable intelligent surface(RIS), and artificial intelligence algorithms. Finally, we highlight some open issues for future investigation.
基金fund received from Department of Science and Technology,Govt.of India,grant no.DST/CERI/MI/SG/2017/080(AU)(G).
文摘Nowadays,wireless sensor networks play a vital role in our day to day life.Wireless communication is preferred for many sensing applications due its convenience,flexibility and effectiveness.The sensors to sense the environmental factor are versatile and send sensed data to central station wirelessly.The cluster based protocols are provided an optimal solution for enhancing the lifetime of the sensor networks.In this paper,modified K-means++algorithm is used to form the cluster and cluster head in an efficient way and the Advanced Energy-Efficient Cluster head selection Algorithm(AEECA)is used to calculate the weighted fac-tor of the transmission path and effective data collection using gateway node.The experimental results show the proposed algorithm outperforms the existing routing algorithms.