期刊文献+
共找到37篇文章
< 1 2 >
每页显示 20 50 100
Design of Protograph LDPC-Coded MIMO-VLC Systems with Generalized Spatial Modulation 被引量:1
1
作者 Dai Lin Fang Yi +1 位作者 Guan Yongliang Mohsen Guizani 《China Communications》 SCIE CSCD 2024年第3期118-136,共19页
This paper investigates the bit-interleaved coded generalized spatial modulation(BICGSM) with iterative decoding(BICGSM-ID) for multiple-input multiple-output(MIMO) visible light communications(VLC). In the BICGSM-ID ... This paper investigates the bit-interleaved coded generalized spatial modulation(BICGSM) with iterative decoding(BICGSM-ID) for multiple-input multiple-output(MIMO) visible light communications(VLC). In the BICGSM-ID scheme, the information bits conveyed by the signal-domain(SiD) symbols and the spatial-domain(SpD) light emitting diode(LED)-index patterns are coded by a protograph low-density parity-check(P-LDPC) code. Specifically, we propose a signal-domain symbol expanding and re-allocating(SSER) method for constructing a type of novel generalized spatial modulation(GSM) constellations, referred to as SSERGSM constellations, so as to boost the performance of the BICGSM-ID MIMO-VLC systems.Moreover, by applying a modified PEXIT(MPEXIT) algorithm, we further design a family of rate-compatible P-LDPC codes, referred to as enhanced accumulate-repeat-accumulate(EARA) codes,which possess both excellent decoding thresholds and linear-minimum-distance-growth property. Both analysis and simulation results illustrate that the proposed SSERGSM constellations and P-LDPC codes can remarkably improve the convergence and decoding performance of MIMO-VLC systems. Therefore, the proposed P-LDPC-coded SSERGSM-mapped BICGSMID configuration is envisioned as a promising transmission solution to satisfy the high-throughput requirement of MIMO-VLC applications. 展开更多
关键词 bit-interleaved coded modulation generalized spatial modulation multiple-input multipleoutput protograph LDPC codes visible light communication
下载PDF
Cognitive Jammers Assisted Covert Communication in Cognitive Radio Networks
2
作者 Liu Changjun Shi Jia +1 位作者 Tie Zhuangzhuang Wang Yongchao 《China Communications》 SCIE CSCD 2024年第9期75-89,共15页
In this work,we investigate the covert communication in cognitive radio(CR)networks with the existence of multiple cognitive jammers(CJs).Specifically,the secondary transmitter(ST)helps the primary transmitter(PT)to r... In this work,we investigate the covert communication in cognitive radio(CR)networks with the existence of multiple cognitive jammers(CJs).Specifically,the secondary transmitter(ST)helps the primary transmitter(PT)to relay information to primary receiver(PR),as a reward,the ST can use PT's spectrum to transmit private information against the eavesdropper(Eve)under the help of one selected cognitive jammer(CJ).Meanwhile,we propose three jammer-selection schemes,namely,link-oriented jammer selection(LJS),min-max jammer selection(MMJS)and random jammer selection(RJS).For each scheme,we analyze the average covert throughput(ACT)and covert outage probability(COP).Our simulation results show that CJ is helpful to ST's covert communication,the expected minimum detection error probability and ACT can be significantly improved with the increase of false alarm of CJ.Moreover,the LJS scheme achieves best performance in ACT and COP,followed by RJS scheme,and MMJS scheme shows the worst performance. 展开更多
关键词 cognitive jammer cognitive radio covert communication performance analysis
下载PDF
Global stability of a susceptible-infected-susceptible epidemic model on networks with individual awareness 被引量:2
3
作者 李科赞 徐忠朴 +1 位作者 祝光湖 丁勇 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第11期692-699,共8页
Recent research results indicate that individual awareness can play an important influence on epidemic spreading in networks. By local stability analysis, a significant conclusion is that the embedded awareness in an ... Recent research results indicate that individual awareness can play an important influence on epidemic spreading in networks. By local stability analysis, a significant conclusion is that the embedded awareness in an epidemic network can increase its epidemic threshold. In this paper, by using limit theory and dynamical system theory, we further give global stability analysis of a susceptible-infected-susceptible (SIS) epidemic model on networks with awareness. Results show that the obtained epidemic threshold is also a global stability condition for its endemic equilibrium, which implies the embedded awareness can enhance the epidemic threshold globally. Some numerical examples are presented to verify the theoretical results. 展开更多
关键词 epidemic spreading global stability AWARENESS
下载PDF
Intelligent Network Selection for Data Offloading in 5G Multi-Radio Heterogeneous Networks 被引量:1
4
作者 WU Jin LIU Jing +3 位作者 HUANG Zhangpeng DU Chen ZHAO Hui BAI Yu 《China Communications》 SCIE CSCD 2015年第S1期132-139,共8页
In next generation networks, multiradio networks are emerging in order to deal with exponential data traffic increasing. Integrated Femto-WiFi(IFW) small cells have been introduced by 3GPP to offload data from cellula... In next generation networks, multiradio networks are emerging in order to deal with exponential data traffic increasing. Integrated Femto-WiFi(IFW) small cells have been introduced by 3GPP to offload data from cellular networks recently. These IFW cells are multi-mode capable(i.e., both licensed bands via cellular interface and unlicensed bands via WiFi interface). Therefore how to offload data effectively has become one of the most significant discussions in 5G Multi-Radio Heterogeneous Network. So far, most researches mainly focus on the generality of UEs, few attention has been paid to UEs' individual requirements. Considering UE's preference vary from individual to individual, in this paper, we present an UE preference-aware network selection scheme for mobile data offloading. It intelligently supports the distribution of heterogeneous classes of services, considers different types of UEs and delay-tolerant flows, and handles the mobility of UEs. The simulation results show the superiority of the proposed algorithm in user fairness, enhanced capacity and energy saving maximization. 展开更多
关键词 LTE WIFI MULTI-RADIO hetero geneous network DATA OFFLOADING
下载PDF
Performance analysis of mobile ad hoc networks under flooding attacks 被引量:1
5
作者 Ping Yi Futai Zou +1 位作者 Yan Zou Zhiyang Wang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第2期334-339,共6页
Due to their characteristics of dynamic topology, wireless channels and limited resources, mobile ad hoc networks are particularly vulnerable to a denial of service (DoS) attacks launched by intruders. The effects o... Due to their characteristics of dynamic topology, wireless channels and limited resources, mobile ad hoc networks are particularly vulnerable to a denial of service (DoS) attacks launched by intruders. The effects of flooding attacks in network simulation 2 (NS2) and measured performance parameters are investigated, including packet loss ratio, average delay, throughput and average number of hops under different numbers of attack nodes, flooding frequency, network bandwidth and network size. Simulation results show that with the increase of the flooding frequency and the number of attack nodes, network performance sharply drops. But when the frequency of flooding attacks or the number of attack nodes is greater than a certain value, performance degradation tends to a stable value. 展开更多
关键词 mobile ad hoc network SECURITY flooding attack.
下载PDF
Secrecy Transmission of NOMA-OTFS Based Multicast-Unicast Streaming 被引量:1
6
作者 Junfan Hu Jia Shi +4 位作者 Xianyu Wang Xiaoju Lu Zan Li Zhuangzhuang Tie Quanxue Gao 《China Communications》 SCIE CSCD 2023年第1期1-13,共13页
This paper investigates the security performance of a cooperative multicast-unicast system,where the users present the feature of high mobility.Specifically,we develop the non-orthogonal multiple access(NOMA)based ort... This paper investigates the security performance of a cooperative multicast-unicast system,where the users present the feature of high mobility.Specifically,we develop the non-orthogonal multiple access(NOMA)based orthogonal time frequency space(OTFS)transmission scheme,namely NOMAOTFS,in order to combat Doppler effect as well as to improve the spectral efficiency.Further,we propose a power allocation method addressing the trade-off between the reliability of multicast streaming and the confidentiality of unicast streaming.Based on that,we utilize the relay selection strategy,to improve the security of unicast streaming.In the context of multicastunicast streaming,our simulation findings validate the effectiveness of the NOMA-OTFS based cooperative transmission,which can significantly outperform the existing NOMA-OFDM in terms of both reliability and security. 展开更多
关键词 OTFS NOMA physical layer security multicast-unicast
下载PDF
Parameter analysis for the coexistence of cognitive LTE and spectrum authorized systems
7
作者 杨程 Rui Yun Li Mingqi 《High Technology Letters》 EI CAS 2013年第1期42-47,共6页
In order to realize the coexistence between the LTE system and the spectrum authorized systems over 700MHz frequency band,the geographical position and operation band location between long term evolution(LTE)base stat... In order to realize the coexistence between the LTE system and the spectrum authorized systems over 700MHz frequency band,the geographical position and operation band location between long term evolution(LTE)base stations and digital tevevision transmission tower should satisfy certain constraints,which are analyzed and deduced in this paper.Under the concluded constraints,the interference to each other is lower than their interference tolerances,so that the coexistance between the two types of systems is performed.Based on the constraints for both LTE and spectrum authorized systems,numerical results of the geographical position interval and operation band location interval are obtained,which have significant practical value for the LTE base station placement,network planning and operation band selection. 展开更多
关键词 cognitive long term evolution LTE) COEXISTENCE operation band location geographical position
下载PDF
Resource Trading and Miner Competition in Wireless Blockchain Networks with Edge Computing
8
作者 Yuchen Zhou Jian Chen +1 位作者 Lu Lyu Bingtao He 《China Communications》 SCIE CSCD 2023年第11期187-201,共15页
To promote the application of edge com-puting in wireless blockchain networks,this paper presents a business ecosystem,where edge comput-ing is introduced to assist blockchain users in imple-menting the mining process... To promote the application of edge com-puting in wireless blockchain networks,this paper presents a business ecosystem,where edge comput-ing is introduced to assist blockchain users in imple-menting the mining process.This paper exploits re-source trading and miner competition to enable se-cure and efficient transactions in the presented busi-ness ecosystem.The resource trading problem is for-mulated as a Stackelberg game between miner candi-dates and edge computing servers,where computing,caching,and communication resources are jointly op-timized to maximize the potential profit.Partial of-floading is introduced to further enhance the system performance when compared with the existing work.We analyze the existence and uniqueness of the Nash equilibrium and Stackelberg equilibrium.Based on the optimization result,winners are selected from the set of miner candidates by bidding and constitute the mining network.Simulation results demonstrate that the proposal is able to improve the social welfare of blockchain miners,thus stimulating more blockchain users to join the mining network. 展开更多
关键词 blockchain edge computing miner com-petition resource trading social welfare
下载PDF
Distributed user pairing and effective computation offloading in aerial edge networks
9
作者 Wei LIANG Shuhui WEN +1 位作者 Lixin LI Jingjing CUI 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2024年第4期378-390,共13页
Future Sixth-Generation (6G) mobile communication networks extremely require the global connectivity and the ground Base Stations (BSs) are difficult to develop in some specific areas,such as mountainous areas.Therefo... Future Sixth-Generation (6G) mobile communication networks extremely require the global connectivity and the ground Base Stations (BSs) are difficult to develop in some specific areas,such as mountainous areas.Therefore,the aerial networks are the key framework for the future communications,in which the aerial vehicle could act as the access point.Additionally,Mobile Edge Computing (MEC) is also essential to enhance the data processing capabilities of aerial networks.In this paper,we study a comprehensive communication-computation resource management problem for jointly optimizing user pairing,power and time allocation in the MEC aided Cognitive Radio (CR) aerial networks,namely CR-MEC aerial networks.Explicitly,this multilevel optimization problem could be decomposed into the user pairing and power allocation as well as time allocation sub-problems.In the conceived CR-MEC aerial networks,we propose a User Pairing and Computation Offloading Management Algorithm (UPCOMA) based on three-sided matching theory,aiming to minimize the system’s energy consumption.At the first step of UPCOMA,multiple Primary Users (PUs) and Cognitive Users (CUs) on the ground negotiate to each other with the suitable power allocation coefficients and construct the stable user pairs.Moreover,the stable user pairs would match to a high altitude platform who act as the base station,which is for appropriately allocating Transmission Time Slots (TSs) at the second step of UPCOMA.Additionally,a hybrid offloading mode is proposed in our conceived networks in order to support ground users to offload their tasks adaptively according to their individual deadlines.Furthermore,the simulation results reveal that the relative performance of UPCOMA is close to that of the Brute-Force Search Algorithm (BFSA) with low complexity.Meanwhile,the hybrid offloading mode with less energy consumption supports much more ground user pairs to offload tasks compared to the binary mode. 展开更多
关键词 Aerial edge computing Binary offloading Cognitive radio Hybrid offloading Resource management
原文传递
Guest Editorial
10
作者 Feng Wei Li Changle +2 位作者 Zhao Haitao Jin Shi Zhu Hongbo 《China Communications》 SCIE CSCD 2024年第11期I0002-I0003,共2页
IEEE International Conference on Communication Technology(ICCT)was jointly initiated and organized by IEEE Beijing Section and IEEE Com Soc in 1986.It is one of the highest-level academic events in the field of commun... IEEE International Conference on Communication Technology(ICCT)was jointly initiated and organized by IEEE Beijing Section and IEEE Com Soc in 1986.It is one of the highest-level academic events in the field of communication technology in China.It is also an international gathering for research for information and communication technology. 展开更多
关键词 COMMUNICATION technology. SOC
下载PDF
Physical Layer Security with Its Applications in 5GNetworks: A Review 被引量:9
11
作者 Li Sun Qinghe Du 《China Communications》 SCIE CSCD 2017年第12期1-14,共14页
5G network is expected to support massive user connections and exponentially increasing wireless services,which makes network security unprecedentedly important.Unlike traditional security-guaranteeing techniques whic... 5G network is expected to support massive user connections and exponentially increasing wireless services,which makes network security unprecedentedly important.Unlike traditional security-guaranteeing techniques which rely heavily on cryptographic approaches at upper layers of the protocol stack,physical-layer security(PLS) solutions fully take advantages of the characteristics of wireless channels to degrade the received signal qualities at the malicious users,and realize keyless secure transmission via signal design and signal processing techniques.PLS avoids the difficulties in the distribution and management of secret keys,and provides flexible security levels through adaptive transmission protocol design.Moreover,PLS techniques match the features of 5G networks well.Therefore,the application of PLS to 5G networks is a promising solution to address the security threats.This article presents a comprehensive review of the state-of-the-art PLS techniques,and discusses their applications in 5G networks.We first summarize the principle and advantages of PLS techniques,and point out the reasons why PLS is suitable for 5G networks.Then,we review the existing PLS methods in literature,and highlight severalPLS solutions that are expected to be applied in 5G networks.Finally,we conclude this article and figure out some further research directions. 展开更多
关键词 5G PHYSICAL layer security an-ti-eavesdropping signal design STATISTICAL se-curity GUARANTEE FOUNTAIN CODING
下载PDF
Performance analysis and comparison of PoW,PoS and DAG based blockchains 被引量:22
12
作者 Bin Cao Zhenghui Zhang +4 位作者 Daquan Feng Shengli Zhang Lei Zhang Mugen Peng Yun Li 《Digital Communications and Networks》 SCIE 2020年第4期480-485,共6页
In the blockchain,the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks.Various blockchain consensus mechanisms have been proposed.However,there is no... In the blockchain,the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks.Various blockchain consensus mechanisms have been proposed.However,there is no technical analysis and comparison as a guideline to determine which type of consensus mechanism should be adopted in a specific scenario/application.To this end,this work investigates three mainstream consensus mechanisms in the blockchain,namely,Proof of Work(PoW),Proof of Stake(PoS),and Direct Acyclic Graph(DAG),and identifies their performances in terms of the average time to generate a new block,the confirmation delay,the Transaction Per Second(TPS)and the confirmation failure probability.The results show that the consensus process is affected by both network resource(computation power/coin age,buffer size)and network load conditions.In addition,it shows that PoW and PoS are more sensitive to the change of network resource while DAG is more sensitive to network load conditions. 展开更多
关键词 Blockchain Proof of work Proof of stake Direct acyclic graph Performance comparison
下载PDF
Cooperative Spectrum Allocation with QoS Support in Cognitive Cooperative Vehicular Ad Hoc Networks 被引量:5
13
作者 ZHANG Lei LUO Tao +2 位作者 LIU Wei ZHU Siting LI Jianfeng 《China Communications》 SCIE CSCD 2014年第10期49-59,共11页
To solve the contradiction between the increasing demand of diverse vehicular wireless applications and the shortage of spectrum resource, a novel cognitive cooperative vehicular ad-hoc network (CC- VANET) framework... To solve the contradiction between the increasing demand of diverse vehicular wireless applications and the shortage of spectrum resource, a novel cognitive cooperative vehicular ad-hoc network (CC- VANET) framework is proposed in this paper. Firstly, we develop an adaptive cognitive spectrum sensing (ACSS) mechanism which can help to trigger and adjust the spectrum sensing window according to network traffic load status and communication quality. And then, Generalized Nash Bargaining SoLution (GNBS), which can achieve a good tradeoff between efficiency and weighted fairness, is proposed to formulate the asymmetric inter- cell resource allocation. Finally, GNBS- Safety (GNBS-S) scheme is developed to enhance the Quality of Service (QoS) of safety applications, especially in the heavy load status, where the bandwidth demanded and supplied cannot be matched well. Furthermore, the primary user activity (PUA) which can cause rate loss to secondary users, is also considered to alleviate its influence to fairness. Simulation results indicate that the proposed CC-VANET scheme can greatly improve the spectrum efficiency and reduce the transmission delay and packet loss rate on the heavy contention status. And GNBS spectrum allocation scheme outperforms both the Max-rain and Max-rate schemes, and canenhance the communication reliability of safety service considerably in CC-VANET. 展开更多
关键词 VANET spectrum sensing resource allocation ASYMMETRIC generalizedhash bargaining solution
下载PDF
Dynamic Matching-Based Spectrum Detection in Cognitive Radio Networks 被引量:2
14
作者 Yu Gu Qingqi Pei Hongning Li 《China Communications》 SCIE CSCD 2019年第4期47-58,共12页
Cognitive Radio Network provides an opportunity to reduce the spectrum resource crisis by allowing secondary users to access the idle spectrum allocated to primary users. The precondition of spectrum sharing is to obt... Cognitive Radio Network provides an opportunity to reduce the spectrum resource crisis by allowing secondary users to access the idle spectrum allocated to primary users. The precondition of spectrum sharing is to obtain the Spectrum Availability Information(SAI). Energy detection is a typical technology to get SAI. With the mobility of primary users, the energy received by secondary users varies greatly with the distance from the target primary users. Most of the existing energy detection algorithms that use fixed thresholds are not suitable. We propose a Dynamic Matching-Based Spectrum Detection(DMBSD) scheme which can detect sensing data, reduce the impact of malicious data and make final sensing results more accurate with dynamic threshold setting and data matching. Simulation results show that the proposed scheme can detect tempered data, and increase detection probability by decreasing false alarm probability and missed detection probability. 展开更多
关键词 COGNITIVE RADIO SPECTRUM sensing degradation DOMAIN dynamic MATCHING
下载PDF
Blind Channel Identification for Cyclic-Prefixed MIMO-OFDM Systems with Virtual Carriers 被引量:3
15
作者 Jung-Lang Yu Biling Zhang +1 位作者 Yipu Yuan Wei-Ting Hsu 《China Communications》 SCIE CSCD 2020年第3期101-116,共16页
This paper applies the repetition index scheme(RIS)to the channel identification of cyclic prefixed(CP)multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM)systems with virtual carriers(... This paper applies the repetition index scheme(RIS)to the channel identification of cyclic prefixed(CP)multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM)systems with virtual carriers(VCs)in the environment of the number of receive antennas being no less than that of transmit antennas.The VCs will cause a rank deficiency problem in computing the subspace information.With the subcarrier mapping matrix,the received signal is simplified to remove the rank deficiency.We use the RIS scheme to generate many times of equivalent symbols so the channel identification can converge with few received OFDM blocks.The RIS scheme will convert the white noise into non-white noise.With the Cholesky factorization,a noise whitening technique is developed to turn the non-white noise back to white noise.We further analyze the necessary conditions of identifiability of channel estimation.Simulations are performed to show the superiority of the proposed method. 展开更多
关键词 OFDM MIMO VIRTUAL CARRIER CHANNEL identification Cholesky FACTORIZATION
下载PDF
Linear complexity and autocorrelation of a new class of binary generalized cyclotomic sequences of order two and length pqr 被引量:1
16
作者 JIA Wenjuan GAO Juntao ZHANG Peng 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2019年第4期651-661,共11页
Cyclotomic sequences have good cryptographic properties and are closely related to difference sets.This paper proposes a new class of binary generalized cyclotomic sequences of order two and length pqr.Its linear comp... Cyclotomic sequences have good cryptographic properties and are closely related to difference sets.This paper proposes a new class of binary generalized cyclotomic sequences of order two and length pqr.Its linear complexity,minimal polynomial,and autocorrelation are investigated.The results show that these sequences have a large linear complexity when 2∈D1,which means they can resist the Berlekamp-Massey attack.Furthermore,the autocorrelation values are close to 0 with a probability of approximately 1?1/r.Therefore,when r is a big prime,the new sequence has a good autocorrelation. 展开更多
关键词 GENERALIZED cyclotomic sequence linear complexity MINIMAL POLYNOMIAL AUTOCORRELATION value.
下载PDF
Channel Selection Information Hiding Scheme for Tracking User Attack in Cognitive Radio Networks 被引量:1
17
作者 LI Hongning PEI Qingqi MA Lichuan 《China Communications》 SCIE CSCD 2014年第3期125-136,共12页
For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels tha... For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels that are not occupied by primary users,but they have to hand off to other spectrum holes to continue communication when primary users come back,which brings new security problems.Tracking user attack(TUA) is a typical attack during spectrum handoff,which will invalidate handoff by preventing user accessing,and break down the whole network.In this paper,we propose a Channel Selection Information Hiding scheme(CSIH) to defense TUA.With the proposed scheme,we can destroy the routes to the root node of the attack tree by hiding the information of channel selection and enhance the security of cognitive radio networks. 展开更多
关键词 HANDOFF tracking user attack attack tree
下载PDF
Users' Media Cloud Assisted D2D Communications for Distributed Caching Underlaying Cellular Network
18
作者 Mingkai Chen Lei Wang Jianxin Chen 《China Communications》 SCIE CSCD 2016年第8期13-23,共11页
In cellular networks, the proximity devices may share files directly without going through the e NBs, which is called Device-to-Device communications(D2D). It has been considered as a potential technological component... In cellular networks, the proximity devices may share files directly without going through the e NBs, which is called Device-to-Device communications(D2D). It has been considered as a potential technological component for the next generation of communication. In this paper, we investigate a novel framework to distribute video files from some other proximity devices through users' media cloud assisted D2 D communication. The main contributions of this work lie in: 1) Providing an efficient algorithm Media Cloud Cluster Selecting Scheme(MCCSS) to achieve the reasonable cluster; 2) Distributing the optimum updating files to the cluster heads, in order to minimize the expected D2 D communication transmission hop for files; 3) Proposing a minimum the hop method, which can ensure the user obtain required file as soon as possible. Extensive simulation results have demonstrated the efficiency of the proposed scheme. 展开更多
关键词 device-to-device communication users’ media cloud CACHE content delivery
下载PDF
Secure and reliable computation offloading in blockchain-assisted cyber-physical IoT systems
19
作者 Dan Wang Bin Song +1 位作者 Yingjie Liu Mingjun Wang 《Digital Communications and Networks》 SCIE CSCD 2022年第5期625-635,共11页
With the development of the Cyber-Physical Internet of Things System(CPIoTS),the number of Cyber-Physical System(CPS)applications accessed in networks has increased dramatically.Latency-sensitive resource orchestratio... With the development of the Cyber-Physical Internet of Things System(CPIoTS),the number of Cyber-Physical System(CPS)applications accessed in networks has increased dramatically.Latency-sensitive resource orchestration in CPS applications is extraordinarily essential for maintaining the Quality of Experience(QoE)for users.Although edge-cloud computing performs effectively in achieving latency-aware resource allocation in CPIoTS,existing methods fail to jointly consider the security and reliability requirements,thereby increasing the process latency of tasks and degrading the QoE of users.This paper aims to minimize the system latency of edge-cloud computing coupled with CPS while simultaneously considering the security and reliability requirements.We first consider a time-varying channel model as a Finite-State Markov Channel(FSMC)and propose a distributed blockchain-assisted CPIoTS to realize secure consensus and reliable resource orchestration by offloading computation tasks in edge-cloud computing.Moreover,we propose an efficient resource allocation algorithm,PPO-SRRA,that optimizes computing offloading and multi-dimension resource(e.g.,communication,computation,and consensus resource)allocation by using a policy-based Deep Reinforcement Learning(DRL)method.The experimental results show that the proposed resource allocation scheme can reduce the system latency and ensure consensus security. 展开更多
关键词 Cyber-physical internet of things system Blockchain Reinforcement learning(RL) Edge-cloud computing
下载PDF
A Novel Energy Efficient MAC Protocol for Wireless Body Area Network
20
作者 LIU Jing LI Ming +1 位作者 YUAN Bin LIU Wenlong 《China Communications》 SCIE CSCD 2015年第2期11-20,共10页
Wireless Body Area Network(WBAN) is the most promising technology in e-health applications.Energy efficiency stands out as the paramount issue for WBAN.In this paper,an energy efficient MAC protocol named Quasi-Sleep-... Wireless Body Area Network(WBAN) is the most promising technology in e-health applications.Energy efficiency stands out as the paramount issue for WBAN.In this paper,an energy efficient MAC protocol named Quasi-Sleep-Preempt-Supported(QSPS) is proposed.The protocol is mainly TDMA-based:nodes transmit packets in the allocated slots,while entering the Q-Sleep mode in other slots.Moreover,for a node with emergency packet,it can broadcast a special designed Awakening Message to wake up the whole network and preempts the right to use the current slot to transmit that emergency packet,thus decreasing delay.Compared with relevant protocols,QS-PS can achieve high energy efficiency and decrease the delay of both normal packets and emergency packets. 展开更多
关键词 WBAN energy efficient delay Quasi-Sleep TDMA preemption
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部