Article
Computer Science, Information Systems
Changhao Li, Huanjing Li, Tao Wu, Lei Yan, Suzhi Cao
Summary: The maximum flow problem based on a contact graph in Delay-Tolerant Networking (DTN) is important for routing and data planning. Existing algorithms cannot be directly applied to topological networks with time series changes. This paper proposes a method of dismantling and reconstructing the graph to solve the maximum flow problem in a continuously changing network. The method discretizes time on different nodes to reduce the scale of the graph, optimizing data transmission, improving data delivery rate, and reducing link occupation.
Article
Computer Science, Information Systems
Baogang Li, Jia Liao, Xi Gong, Hongyin Xiang, Zhi Yang, Wei Zhao
Summary: This paper addresses the issue of physical layer security in a UAV network and proposes a Stackelberg game model to solve the game problem of information security transmission. The dual optimization theory and KKT conditions are employed to solve the problem. The research demonstrates that the accuracy of location sensing can be effectively measured using the CRB bound while considering Eve's location awareness. The relaxation method and convex optimization tools are used to solve the non-convex optimization problem.
Article
Computer Science, Information Systems
Giovanni Nardini, Giovanni Stea
Summary: Digital Twins of Networks (DTNs) are proposed as digital replicas of physical entities, enabling efficient data-driven network management and performance-driven network optimization. DTNs provide simulation services for dynamic reconfiguration and fault anticipation, using discrete-event network simulators as the ideal tools. Challenges include centralized vs. distributed implementation, input gathering from the physical network, security issues and hosting. The possibilities of network simulation for what-if analysis are explored, with the concepts of lockstep and branching analysis defined.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Zhaolin Ma, Jiali You, Haojiang Deng
Summary: This paper presents the Distributed In-Network Name Resolution System (DINNRS), which leverages software-defined networking and Information-Centric Networking (ICN) paradigm to provide high scalability and minimal request delay. Our methods, including an enhanced marked cuckoo filter for fast resolving, achieve significant performance gains in simulation experiments.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Chao-Hsiang Li, Alexander I-Chi Lai, Ruey-Beei Wu
Summary: This study proposes a fusion-based approach that combines Wi-Fi fingerprint positioning with accurate UWB ranging to optimize indoor localization accuracy in dense wireless networks (DWNs). Theoretical analysis and simulation results show that the improvement in localization accuracy is proportional to the square root of the number of participating nodes when at least 6 additional measured distances are available.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Eric Ossongo, Moez Esseghir, Leila Merghem-Boulahia
Summary: The implementation of 5G networks allows for the efficient coexistence of heterogeneous services in a single physical virtualized infrastructure. Virtualization of network functions enables more flexible resource management and customizable services. However, the increasing number of connected objects poses challenges in managing physical and virtual resources, requiring intelligent systems to ensure communication quality.
COMPUTER COMMUNICATIONS
(2024)
Review
Computer Science, Information Systems
Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, Heather Molyneaux, Ali A. Ghorbani
Summary: The Internet of Things (IoT) has the potential to revolutionize medical treatment in healthcare, but it also faces security threats. Advanced analytics can enhance IoT security, but generating realistic datasets is complex. This research conducts a review of Machine Learning (ML) solutions for IoT security in healthcare, focusing on existing datasets, resources, applications, and challenges, to highlight the current landscape and future requirements.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Mubarak Umar, Jiandong Wang, Feng Li, Shuguang Wang, Minggang Zheng, Zhiwei Zhang, Yulong Shen
Summary: This paper proposes a physical layer authentication (PLA) scheme based on Gaussian process (GP) regression, which enhances the reliability of authentication in Internet of Vehicles (IoV) by jointly considering the location and speed attributes of vehicles. The proposed scheme utilizes historical channel state information and transmitters' location and speed information to train a GP model for predicting the next legitimate location and speed for authentication. Experimental results demonstrate that the proposed approach significantly improves authentication performance compared to existing methods.
Article
Computer Science, Information Systems
Rakesh Das, Jitendra Nath Bera
Summary: This paper focuses on the development of a highly reliable customized home area networking (HAN) to provide a robust communication network for smart home owners. The proposed HAN utilizes a multi-gateway-based partial mesh networking topology with ZigBee control boards to enable remote monitoring and control of individual appliances within the home. The introduction of active and pseudo gateway concept enhances the reliability of the HAN by automatically reconfiguring in case of failure. Experimental verification demonstrates the fail-proof and reliable nature of the proposed HAN with alternate routes and activation of pseudo gateway as active gateway.
Article
Computer Science, Information Systems
Sami Mnasri, Mansoor Alghamdi
Summary: This survey focuses on the 3D indoor deployment in IoT collection networks, specifically on finding the right locations of IoT connected objects and addressing coverage holes. It analyzes different models and hypotheses presented in the literature, and highlights the use of artificial intelligence techniques such as meta-heuristics, evolutionary optimization, machine learning, and reinforcement learning. The study demonstrates that using these techniques for 3D deployment of IoT networks can enhance the quality of deployment compared to other approaches.
Article
Computer Science, Information Systems
Ryhan Uddin, Sathish A. P. Kumar, Vinay Chamola
Summary: This paper examines the impact of different types of DoS and DDoS attacks on edge computing layers and investigates existing detection and prevention mechanisms to address security weaknesses. Additionally, a theoretical architecture is proposed to mitigate the impact of distributed denial of service attacks on edge systems.
Article
Computer Science, Information Systems
Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Saqib Hussain, Zulfiqar Ali Zardari, Ghulam Ali Mallah, Md. Jalil Piran, Fayaz Ali Dharejo
Summary: This paper explores the relationship between heterogeneous cluster networks and federated learning, as well as the challenges of implementing federated learning in heterogeneous networks and the Internet of Things. The authors propose an Intra-Clustered FL (ICFL) model that optimizes computation and communication to select heterogeneous FL nodes in each cluster, enabling efficient processing of asynchronous data and ensuring data security.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Pankaj Kumar, Hari Om
Summary: This paper presents NextGenV2V, a protocol for the next-generation vehicular network that achieves authenticated communication between vehicles using symmetric keys and a (2, n)-threshold scheme. The protocol reduces communication overhead and improves authentication delay, ensuring better security. Comparative analysis demonstrates the suitability of NextGenV2V in next-generation vehicular networks.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Duncan Deveaux, Takamasa Higuchi, Seyhan Ucar, Jerome Harri, Onur Altintas
Summary: This paper investigates the ability to predict the risk patterns of vehicles in a roundabout and suggests that constraining knowledge transfer to roundabouts with a similar context can significantly improve accuracy.
COMPUTER COMMUNICATIONS
(2024)
Article
Engineering, Electrical & Electronic
Audrey Cayron, Christophe Viallon, Ayad Ghannam, Alessandro Magnani, Thierry Parra
Summary: A 4x4 Butler matrix for millimeter-wave communications is presented in this paper, which utilizes a new 3-D Integrated Passive Devices (IPD) process to achieve a higher performance/compactness trade-off. The design incorporates 3-D transformers and solenoids to optimize couplers and phase shifters and results in a wide bandwidth and low insertion loss.
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS
(2024)
Article
Engineering, Electrical & Electronic
Peyman PourMohammadi, Hassan Naseri, Noureddine Melouki, Fahad Ahmed, Qi Zheng, Amjad Iqbal, Guy A. E. Vandenbosch, Tayeb A. Denidni
Summary: This article presents a novel low-profile self-duplexing antenna with high isolation for out-band operation applications. The antenna features two patches, one rectangular and one triangular, both utilizing the quarter-mode substrate integrated waveguide (QMSIW) cavity for enhanced performance. Miniaturization is achieved through capacitive slots. The antenna operates at both 5.8 and 9.8 GHz frequencies, with impressive alignment between measured and simulated results. It has compact dimensions and 40 dB isolation between its ports, as well as consistent radiation patterns at both frequencies. The gains at 5.8 and 9.8 GHz are 4.1 and 4.6 dBi, respectively. The antenna's frequency bands can be independently tuned by adjusting the size of the capacitive slots. The article also provides valuable insights into the antenna's functionality and versatility, making it a valuable asset for dual-band wireless communication applications.
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS
(2024)
Article
Engineering, Electrical & Electronic
Duy-Thai Nguyen, Thanh-Hai Le, Van-Sang Doan, Van-Phuc Hoang
Summary: This paper proposes a method that combines UNet and rootMUSIC algorithm to improve the accuracy of DOA estimation. By converting the covariance matrix of received signals into an ideal antenna array's covariance matrix, and then using rootMUSIC algorithm for DOA estimation, the experimental simulation results show that this method can significantly reduce the error of DOA estimation compared with traditional methods.
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS
(2024)
Article
Engineering, Electrical & Electronic
Tetsushi Matsuda, Satoshi Kitaoka, Kenji Nakahira, Taishi Ito, Takeharu Kato, Junzo Kasahara
Summary: DFOS devices deployed in geothermal boreholes require optical fibers that can withstand high temperatures and understanding the deterioration behavior at these temperatures is crucial for predicting device lifetimes.
OPTICAL FIBER TECHNOLOGY
(2024)
Article
Engineering, Electrical & Electronic
Kumar Saurabh, Sukwinder Singh
Summary: This article introduces a method to improve the performance of a power amplifier. By calculating the optimal load and source impedances through source and load-pull analysis, and designing the optimal matching architecture of input and output network using neural network algorithm, the power amplifier achieves high efficiency and gain in the frequency range of 13.75 GHz-14.5 GHz.
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Songshi Dou, Li Qi, Zehua Guo
Summary: Emerging cloud services and applications have different QoS requirements for the network. SD-WANs play a crucial role in QoS provisioning by introducing network programmability, dynamic flow routing, and low data transmission latency. However, controller failures may degrade QoS. To address this, we propose PREDATOR, a QoS-aware network programmability recovery scheme that achieves fine-grained per-flow remapping without introducing extra delays, ensuring QoS robustness for high-priority flows.