Article
Computer Science, Information Systems
Jing Xiong, Hong Zhu
Summary: With the rapid growth of data in the era of IoT, the challenge of data privacy protection arises. This article proposes a federated learning approach that uses collaborative training to obtain a global model without direct exposure to local datasets. By utilizing dynamic masking and adaptive differential privacy methods, the approach reduces communication overhead and improves the converge performance of the model.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Lingjun Zhao, Qinglin Yang, Huakun Huang, Longtao Guo, Shan Jiang
Summary: Metaverse seamlessly integrates the real and virtual worlds, and intelligent wireless sensing technology can serve as an intelligent, flexible, non-contact way to access the metaverse and accelerate the establishment of a bridge between the real physical world and the metaverse. However, there are still challenges and open issues in this field.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Hongliang He, Xingmei Li
Summary: In this study, we investigate the scenario where the receiver does not know the channel state information (CSI) in ad hoc network transmission. To improve security performance, novel transmission schemes are proposed, including the introduction of artificial noise or self-interference. By fusing multiple signals through a Hadamard matrix, the latter scheme demonstrates advantages in enhancing security while saving power.
Correction
Computer Science, Information Systems
Nur Fadhilah Mohd Shari, Amizah Malip
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Rajesh Kumar, Deepak Sinwar, Vijander Singh
Summary: This paper investigates the coexistence mechanisms between eMBB and URLLC traffic for resource scheduling in 5G. Through examining different approaches and performance metrics, it provides detailed insights for researchers in the field, and highlights key issues, challenges, and future directions.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Carlos Rubio Garcia, Simon Rommel, Sofiane Takarabt, Juan Jose Vegas Olmos, Sylvain Guilley, Philippe Nguyen, Idelfonso Tafur Monroy
Summary: The reliance on asymmetric public key cryptography and symmetric encryption for cyber-security in current telecommunication networks is threatened by quantum computing technology. Quantum Key Distribution and post-quantum cryptography provide resistance to quantum attacks. This paper proposes two novel hybrid solutions integrating QKD and PQC into TLS for quantum-resistant key exchange.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Anas Knari, Mostapha Derfouf, Mohammed-Amine Koulali, Ahmed Khoumsi
Summary: In this paper, a multi-agent deep reinforcement learning framework is proposed to design an optimal caching strategy for the Internet of Vehicles (IoV). The framework aims to incentivize sharing caching resources while minimizing errors in estimating content needs.
Article
Computer Science, Information Systems
Xiaohui Li, Yue Shan, Qi Zhu
Summary: This paper investigates the use of active reconfigurable intelligent surface (RIS) in crowd spectrum detection (CSD) to improve detection performance gains. By amplifying the amplitude of reflected signals, active RIS can enhance the received signal power, but it consumes more energy. Extensive simulation results demonstrate that active RIS-assisted CSD outperforms passive RIS-assisted CSD in terms of improved detection performance gains and detection efficiency.
Article
Computer Science, Information Systems
Anqi Zhu, Huimin Lu, Songtao Guo, Zhiwen Zeng, Zongtan Zhou
Summary: This paper studies the computational offloading problem for multi-robot systems in MEC and proposes a distributed scheme to optimize the offloading and routing of computational tasks. By introducing a collaborative communication model and a QoS preference analysis mechanism, and using a game-theoretic approach, a utility-aware collaborative computational offloading algorithm is proposed, which significantly improves performance and achieves stability and scalability under different demands and scales.
Article
Computer Science, Information Systems
Dalia I. Elewaily, Hesham A. Ali, Ahmed I. Saleh, Mohamed M. Abdelsalam
Summary: This article introduces the Disruption/Delay Tolerant Networking (DTNs) architecture for deep-space communication, which overcomes intermittent connectivity issues through store-carry-forward data transmission. It provides an overview of the current and future deep-space communication systems' architecture, environmental challenges, DTN implementations and demonstrations, and validation of related routing strategies. Additionally, it explores the integration of machine learning techniques into DTN routing strategies and discusses ongoing research directions and open issues in DTN-based Deep Space Networking.
Article
Computer Science, Information Systems
Chaonong Xu, Yaqi Xie, Fan Wu, Chao Li
Summary: This paper investigates how to improve real-time performance in Non-Orthogonal Multiple Access (NOMA) based Industrial Internet of Things (IIoTs) applications by setting a reasonable location for the data sink. By formulating the problem and designing a heuristic algorithm, simulation results show that this approach can enhance real-time performance with minimal loss.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Choongil Yeh, Yong-Seouk Choi, Young-Jo Ko, Il-Gyu Kim
Summary: The applications of AI/ML techniques are pervasive and numerous, including search engines, recommendation systems, autonomous vehicles, etc. In mobile systems, AI/ML has the potential to improve performance, automate network management, and reduce costs. Standardization activities for AI/ML applications are being conducted by 3GPP and O-RAN. Future technology trends include federated learning, E2E learning, and explainable AI/ML.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Xueqin Zhang, Zhineng Wang, Gang Liu, Yan Wang
Summary: This paper proposes a node influence measurement method based on a topological potential model, which uses information entropy and effective distance to evaluate the value and influence range of nodes, thereby improving the accuracy of key node identification.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Yujie Wang, Ying Wang, Qingqing Liu, Yong Zhang
Summary: This paper proposes a dynamic indoor positioning method based on multi-scale metric learning of the channel state information (CSI). By constructing few-shot learning tasks, this method can achieve dynamic positioning using CSI signals without additional equipment. Experimental results show that compared to commonly used dynamic location and tracking algorithms, the proposed method has higher positioning accuracy and does not accumulate errors.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Yakun Gao, Keren Ji, Tian Gao
Summary: This paper proposes a multi-dimensional daily travel suitability route prediction method based on a multi-dimensional characteristic model. By conducting multi-dimensional predictions on the entire dataset and considering the impact of time, space, and items on daily travel routes, this method improves the accuracy of predictions.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Suvrima Datta, U. Venkanna
Summary: The Internet of Things (IoT) enables real-time sensing and data transmission to make homes smarter. Effective device-type identification methods are crucial as the number of IoT devices continues to grow. In this paper, a P4-based gateway called PiGateway is proposed to classify and prioritize the type of IoT devices. By utilizing a decision tree model and flow rules, PiGateway enables real-time granular analysis and in-network classification of IoT traffic.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Annisa Sarah, Gianfranco Nencioni
Summary: This article explores the concept of a Slice Broker, an intermediate entity that purchases resources from Infrastructure Providers to offer customized network slices to users. The article proposes a cost-minimization problem and compares it with alternative problems to demonstrate its effectiveness and cost-saving capabilities.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Jun Wang, Weibin Jiang, Changchun Chen, Ruiquan Lin, Riqing Chen, Hongjun Wang
Summary: Internet of Things (IoT) enables connectivity of smart devices with sensors, but overcrowding in unlicensed bands hinders data exchange. To address the scarcity of spectrum resources and energy, Energy Harvesting enabled Cognitive Radio IoT (EH-CR-IoT) networks are proposed. Resource allocation methods based on Supermodular Game (SG) theory are introduced to efficiently manage energy and spectrum resources in EH-CR-IoT networks, improving network resource utilization and benefits.
Article
Computer Science, Information Systems
Lucelia Cunha da Rocha Santos, Sarita Mazzini Bruschi, Paulo Sergio Lopes de Souza, Jo Ueyama, Alyson de Jesus dos Santos, Jezreel Souto Barbosa
Summary: This paper proposes a low-cost and low-energy communication alternative for remote communities in the Amazon region, using LoRa devices. By creating an Ad Hoc Network with a transmitter device on a boat and a receiver device on a riverside house, the experiment evaluated metrics such as maximum range, communication distance, and packet delivery rate. The results showed satisfactory performance within the configured parameters and study scenario conditions.
Article
Computer Science, Information Systems
Zhendong Wang, Lili Huang, Shuxin Yang, Xiao Luo, Daojing He, Sammy Chan
Summary: In this paper, an energy-efficient coverage optimization technique using the multi-Strategy grey wolf optimization (MSGWO) algorithm is proposed. The method combines higher-order multinomial sensing models and a sort-driven hybrid opposition-based learning to reduce energy consumption and improve coverage area. Node movement and boundary strategies are introduced to overcome obstacles. Experimental results show that the algorithm significantly increases network coverage, extends network lifecycle, reduces deployment cost, and ensures good connectivity and scalability.