Computer Science, Information Systems

Article Computer Science, Information Systems

PrivMaskFL: A private masking approach for heterogeneous federated learning in IoT

Jing Xiong, Hong Zhu

Summary: With the rapid growth of data in the era of IoT, the challenge of data privacy protection arises. This article proposes a federated learning approach that uses collaborative training to obtain a global model without direct exposure to local datasets. By utilizing dynamic masking and adaptive differential privacy methods, the approach reduces communication overhead and improves the converge performance of the model.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Intelligent wireless sensing driven metaverse: A survey

Lingjun Zhao, Qinglin Yang, Huakun Huang, Longtao Guo, Shan Jiang

Summary: Metaverse seamlessly integrates the real and virtual worlds, and intelligent wireless sensing technology can serve as an intelligent, flexible, non-contact way to access the metaverse and accelerate the establishment of a bridge between the real physical world and the metaverse. However, there are still challenges and open issues in this field.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Secure transmission in wireless ad-hoc networks without CSI at the destination

Hongliang He, Xingmei Li

Summary: In this study, we investigate the scenario where the receiver does not know the channel state information (CSI) in ad hoc network transmission. To improve security performance, novel transmission schemes are proposed, including the introduction of artificial noise or self-interference. By fusing multiple signals through a Hadamard matrix, the latter scheme demonstrates advantages in enhancing security while saving power.

AD HOC NETWORKS (2024)

Correction Computer Science, Information Systems

State-of-the-art solutions of blockchain technology for data dissemination in smart cities: A comprehensive review (vol 189, pg 120, 2022)

Nur Fadhilah Mohd Shari, Amizah Malip

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

QoS aware resource allocation for coexistence mechanisms between eMBB and URLLC: Issues, challenges, and future directions in 5G

Rajesh Kumar, Deepak Sinwar, Vijander Singh

Summary: This paper investigates the coexistence mechanisms between eMBB and URLLC traffic for resource scheduling in 5G. Through examining different approaches and performance metrics, it provides detailed insights for researchers in the field, and highlights key issues, challenges, and future directions.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Quantum-resistant Transport Layer Security

Carlos Rubio Garcia, Simon Rommel, Sofiane Takarabt, Juan Jose Vegas Olmos, Sylvain Guilley, Philippe Nguyen, Idelfonso Tafur Monroy

Summary: The reliance on asymmetric public key cryptography and symmetric encryption for cyber-security in current telecommunication networks is threatened by quantum computing technology. Quantum Key Distribution and post-quantum cryptography provide resistance to quantum attacks. This paper proposes two novel hybrid solutions integrating QKD and PQC into TLS for quantum-resistant key exchange.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Multi-Agent Deep Reinforcement Learning for content caching within the Internet of Vehicles

Anas Knari, Mostapha Derfouf, Mohammed-Amine Koulali, Ahmed Khoumsi

Summary: In this paper, a multi-agent deep reinforcement learning framework is proposed to design an optimal caching strategy for the Internet of Vehicles (IoV). The framework aims to incentivize sharing caching resources while minimizing errors in estimating content needs.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Effective and efficient crowd spectrum detection with active reconfigurable intelligent surface

Xiaohui Li, Yue Shan, Qi Zhu

Summary: This paper investigates the use of active reconfigurable intelligent surface (RIS) in crowd spectrum detection (CSD) to improve detection performance gains. By amplifying the amplitude of reflected signals, active RIS can enhance the received signal power, but it consumes more energy. Extensive simulation results demonstrate that active RIS-assisted CSD outperforms passive RIS-assisted CSD in terms of improved detection performance gains and detection efficiency.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

CollOR: Distributed collaborative offloading and routing for tasks with QoS demands in multi-robot system

Anqi Zhu, Huimin Lu, Songtao Guo, Zhiwen Zeng, Zongtan Zhou

Summary: This paper studies the computational offloading problem for multi-robot systems in MEC and proposes a distributed scheme to optimize the offloading and routing of computational tasks. By introducing a collaborative communication model and a QoS preference analysis mechanism, and using a game-theoretic approach, a utility-aware collaborative computational offloading algorithm is proposed, which significantly improves performance and achieves stability and scalability under different demands and scales.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Delay/Disruption-Tolerant Networking-based the Integrated Deep-Space Relay Network: State-of-the-Art

Dalia I. Elewaily, Hesham A. Ali, Ahmed I. Saleh, Mohamed M. Abdelsalam

Summary: This article introduces the Disruption/Delay Tolerant Networking (DTNs) architecture for deep-space communication, which overcomes intermittent connectivity issues through store-carry-forward data transmission. It provides an overview of the current and future deep-space communication systems' architecture, environmental challenges, DTN implementations and demonstrations, and validation of related routing strategies. Additionally, it explores the integration of machine learning techniques into DTN routing strategies and discusses ongoing research directions and open issues in DTN-based Deep Space Networking.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Complexity and algorithm of setting optimal location for data sink in real-time NOMA-based IIoTs

Chaonong Xu, Yaqi Xie, Fan Wu, Chao Li

Summary: This paper investigates how to improve real-time performance in Non-Orthogonal Multiple Access (NOMA) based Industrial Internet of Things (IIoTs) applications by setting a reasonable location for the data sink. By formulating the problem and designing a heuristic algorithm, simulation results show that this approach can enhance real-time performance with minimal loss.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Standardization and technology trends of artificial intelligence for mobile systems

Choongil Yeh, Yong-Seouk Choi, Young-Jo Ko, Il-Gyu Kim

Summary: The applications of AI/ML techniques are pervasive and numerous, including search engines, recommendation systems, autonomous vehicles, etc. In mobile systems, AI/ML has the potential to improve performance, automate network management, and reduce costs. Standardization activities for AI/ML applications are being conducted by 3GPP and O-RAN. Future technology trends include federated learning, E2E learning, and explainable AI/ML.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Key node identification in social networks based on topological potential model

Xueqin Zhang, Zhineng Wang, Gang Liu, Yan Wang

Summary: This paper proposes a node influence measurement method based on a topological potential model, which uses information entropy and effective distance to evaluate the value and influence range of nodes, thereby improving the accuracy of key node identification.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Dynamic WiFi indoor positioning based on the multi-scale metric learning

Yujie Wang, Ying Wang, Qingqing Liu, Yong Zhang

Summary: This paper proposes a dynamic indoor positioning method based on multi-scale metric learning of the channel state information (CSI). By constructing few-shot learning tasks, this method can achieve dynamic positioning using CSI signals without additional equipment. Experimental results show that compared to commonly used dynamic location and tracking algorithms, the proposed method has higher positioning accuracy and does not accumulate errors.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Route planning model based on multidimensional eigenvector processing in vehicular fog computing

Yakun Gao, Keren Ji, Tian Gao

Summary: This paper proposes a multi-dimensional daily travel suitability route prediction method based on a multi-dimensional characteristic model. By conducting multi-dimensional predictions on the entire dataset and considering the impact of time, space, and items on daily travel routes, this method improves the accuracy of predictions.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

PiGateway: Real-time granular analysis of smart home network traffic using P4

Suvrima Datta, U. Venkanna

Summary: The Internet of Things (IoT) enables real-time sensing and data transmission to make homes smarter. Effective device-type identification methods are crucial as the number of IoT devices continues to grow. In this paper, a P4-based gateway called PiGateway is proposed to classify and prioritize the type of IoT devices. By utilizing a decision tree model and flow rules, PiGateway enables real-time granular analysis and in-network classification of IoT traffic.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Resource allocation for cost minimization of a slice broker in a 5G-MEC scenario

Annisa Sarah, Gianfranco Nencioni

Summary: This article explores the concept of a Slice Broker, an intermediate entity that purchases resources from Infrastructure Providers to offer customized network slices to users. The article proposes a cost-minimization problem and compares it with alternative problems to demonstrate its effectiveness and cost-saving capabilities.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

A novel resource allocation method based on supermodular game in EH-CR-IoT networks

Jun Wang, Weibin Jiang, Changchun Chen, Ruiquan Lin, Riqing Chen, Hongjun Wang

Summary: Internet of Things (IoT) enables connectivity of smart devices with sensors, but overcrowding in unlicensed bands hinders data exchange. To address the scarcity of spectrum resources and energy, Energy Harvesting enabled Cognitive Radio IoT (EH-CR-IoT) networks are proposed. Resource allocation methods based on Supermodular Game (SG) theory are introduced to efficiently manage energy and spectrum resources in EH-CR-IoT networks, improving network resource utilization and benefits.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Performance analysis of a Vehicular Ad Hoc network Using LoRa technology and IoT devices in Amazon Rivers

Lucelia Cunha da Rocha Santos, Sarita Mazzini Bruschi, Paulo Sergio Lopes de Souza, Jo Ueyama, Alyson de Jesus dos Santos, Jezreel Souto Barbosa

Summary: This paper proposes a low-cost and low-energy communication alternative for remote communities in the Amazon region, using LoRa devices. By creating an Ad Hoc Network with a transmitter device on a boat and a receiver device on a riverside house, the experiment evaluated metrics such as maximum range, communication distance, and packet delivery rate. The results showed satisfactory performance within the configured parameters and study scenario conditions.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Multi-strategy enhanced grey wolf algorithm for obstacle-aware WSNs coverage optimization

Zhendong Wang, Lili Huang, Shuxin Yang, Xiao Luo, Daojing He, Sammy Chan

Summary: In this paper, an energy-efficient coverage optimization technique using the multi-Strategy grey wolf optimization (MSGWO) algorithm is proposed. The method combines higher-order multinomial sensing models and a sort-driven hybrid opposition-based learning to reduce energy consumption and improve coverage area. Node movement and boundary strategies are introduced to overcome obstacles. Experimental results show that the algorithm significantly increases network coverage, extends network lifecycle, reduces deployment cost, and ensures good connectivity and scalability.

AD HOC NETWORKS (2024)