Telecommunications

Article Computer Science, Information Systems

A CrowdSensing-based approach for proximity detection in indoor museums with Bluetooth tags

Michele Girolami, Davide La Rosa, Paolo Barsocchi

Summary: In this work, a CrowdSensing-based proximity detection technique for visitors in an indoor museum is proposed and investigated. The technique utilizes data collected from users' smartphones, which can collect and upload Received Signal Strength (RSS) values of nearby Bluetooth tags to a backend server along with context-information. Experimental results show a clear improvement in performance when data from the crowd are exploited with the proposed architecture.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Age of information optimization in cyber-physical systems with stateful packet management techniques

Paulo Cesar Prandel, Priscila Solis Barreto

Summary: This study proposes two stateful techniques, LGFS-C and LGFS-C-peak, which optimize AoI metrics by making conditional preemption decisions on packets based on system state variables. Experimental results show that both techniques achieve better optimization results than the state-of-the-art techniques and may improve CPS performance.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

UAV-assisted finite block-length backscatter: Performance analysis and optimization

Phuong T. Tran, Le Thi Thanh Huyen, Ba Cao Nguyen, Huu Minh Nguyen, Tran Manh Hoang

Summary: This paper introduces and investigates a system utilizing an unmanned aerial vehicle (UAV) to assist terrestrial backscattering devices (BDs) in wireless energy charging and data transmission. The study considers energy efficiency (EE) and age-of-information (AoI) in performance assessment, and solves an optimization problem to maximize EE and minimize transmit power. Analytical and simulation results show that optimizing packet length and UAV altitude can achieve the best performance.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Intrusion detection system for cyberattacks in the Internet of Vehicles environment

Mohamed Selim Korium, Mohamed Saber, Alexander Beattie, Arun Narayanan, Subham Sahoo, Pedro H. J. Nardelli

Summary: This paper presents a novel framework for intrusion detection in the Internet of Vehicles environment, specifically designed to detect cyberattacks on vehicles. The proposed system uses machine learning to detect abnormal behavior by analyzing network traffic. Experimental results demonstrate the effectiveness of the system in terms of accuracy and speed.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Fairness-aware task offloading and load balancing with delay constraints for Power Internet of Things

Xue Li, Xiaojuan Chen, Guohua Li

Summary: This study proposes a two-tier cooperative edge network model for Power Internet of Things (PIoT) and introduces a fairness indicator based on the Theil index. By formulating a fairness and delay guaranteed task offloading and load balancing optimization problem, the research demonstrates that cooperation at the edge can significantly improve the performance of PIoT.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Improved junction-based routing for VANETs using a Bio-inspired route stability approach

Youcef Azzoug, Abdelmadjid Boukra

Summary: This paper presents a novel JBR routing protocol based on swarm-inspired optimization to reduce data packet loss and introduces a concept of route stability to predict the stability degree of road segments.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

A novel hierarchical distributed vehicular edge computing framework for supporting intelligent driving

Kun Yang, Peng Sun, Dingkang Yang, Jieyu Lin, Azzedine Boukerche, Liang Song

Summary: The focus of this research is to effectively coordinate the limited computing power of various components in intelligent transportation systems (ITS) and provide reliable support for resource-intensive applications through efficient resource allocation methods in the highly dynamic Internet-of-Vehicles environment. A novel joint computing and communication resource scheduling method is proposed, which includes a hierarchical three-layer Vehicular Edge Computing (VEC) framework and onboard joint computation offloading and transmission scheduling policy. Extensive simulation tests and ablation experiments demonstrate the effectiveness and stability of the proposed method in achieving stable performance and reducing scheduling overhead, improving resource utilization, and minimizing data transmission delay caused by vehicle motion.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

A game-theoretic approach of cyberattack resilient constraint-following control for cyber-physical systems

Xinrong Zhang, Ye-Hwa Chen, Dongsheng Zhang, Ruiying Zhao, Lei Guo

Summary: This paper proposes a game-theoretic method based on constraint following theory to enhance the control resilience of cyber-physical systems. It addresses the uncertainties, mechanical constraints, and cyberattacks that these systems may encounter. Experimental results demonstrate the resilience of the controlled system against cyberattack disturbances and other threat attacks, and simulations verify the superiority of the optimal control design parameter.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Multi-agent reinforcement learning for network routing in integrated access backhaul networks

Shahaf Yamin, Haim H. Permuter

Summary: This study examines the problem of downlink wireless routing in integrated access backhaul (IAB) networks and proposes a multi-agent reinforcement learning algorithm for joint routing optimization. Experimental results demonstrate the effectiveness of the algorithm in achieving near-centralized performance.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Explainable deep learning for attack intelligence and combating cyber-physical attacks

Muna Al-Hawawreh, Nour Moustafa

Summary: Cyber-physical control loops are crucial in the industrial Internet of Things, but vulnerable to attacks. This study proposes an AI-based attack intelligence framework for identifying and extracting attack intelligence, and demonstrates its effectiveness using a real-world case.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Distributed Physical-layer Network Coding MAC protocol

Mohammed Aissaoui, Chiraz Houaidia, Adrien Van Den Bossche, Thierry Val, Leila Azouz Saidane

Summary: This paper proposes a distributed MAC protocol that supports PNC in static multi-hop wireless networks. The protocol's advantages over conventional CSMA/CA and PNCOPP MAC protocols are demonstrated through practical testing and numerical results.

AD HOC NETWORKS (2024)

Review Computer Science, Information Systems

A review of on-device machine learning for IoT: An energy perspective

Nazli Tekin, Ahmet Aris, Abbas Acar, Selcuk Uluagac, Vehbi Cagri Gungor

Summary: This paper provides a review of existing studies on energy consumption of on-device machine learning models for IoT applications. It introduces a taxonomy to define approaches for energy-aware on-device ML models and discusses open issues for further research in this field.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

GAN-powered heterogeneous multi-agent reinforcement learning for UAV-assisted task

Yangyang Li, Lei Feng, Yang Yang, Wenjing Li

Summary: This study investigates a task offloading scheme and trajectory optimization in a multi-UAV-assisted system and proposes a heterogeneous multi-agent reinforcement learning-based approach. By training with generated environment states offline, the algorithm's performance is optimized, resulting in superior energy consumption and task latency.

AD HOC NETWORKS (2024)

Article Engineering, Electrical & Electronic

One-bit spectrum sensing using Gustafson-Kessel fuzzy clustering for cognitive radio network

Saikat Majumder

Summary: This article addresses the problem of one-bit spectrum sensing in cognitive radio networks and proposes a GKFCM clustering-based algorithm for detecting primary user signals in white and correlated noise. By identifying conserved features in the quantization process and clustering decision vectors, the proposed algorithm improves detection performance.

PHYSICAL COMMUNICATION (2024)

Article Engineering, Electrical & Electronic

Intelligent UAV planning for task-offloading with limited buffer and multiple computing servers

Xuefeng Chen, Rui Ma

Summary: This paper proposes a UAV-enabled MEC network to optimize transmission delay, computation delay, and system energy consumption, and achieves the optimal solution through an intelligent optimization algorithm based on Deep Dueling Double Q-Network and Twin Delayed Deep Deterministic Policy Gradient.

PHYSICAL COMMUNICATION (2024)

Article Engineering, Electrical & Electronic

Attention driven CWT-deep learning approach for discrimination of Radar PRI modulation

Purabi Sharma, Kandarpa Kumar Sarma

Summary: Electronic Warfare (EW) is becoming increasingly important with the proliferation of radio frequency (RF) systems and radar applications. This paper proposes an automatic approach based on continuous wavelet transform and a combination of convolutional neural network, multi-head self-attention mechanism, and long short-term memory for recognizing different types of pulse repetition interval modulation. The proposed method enhances performance and achieves robustness in noise-filled and imperfect channel knowledge environment.

PHYSICAL COMMUNICATION (2024)

Article Computer Science, Information Systems

Protection Techniques using Resource Delayed Release for SDN-based OTN over WDM Networks

Shideh Yavary Mehr, Byrav Ramamurthy

Summary: This paper focuses on the issue of link failures in optical networks and proposes an improved recovery strategy by combining resource delayed release (RDR) with protection strategies. Four different protection methods are evaluated, and it is found that the PPP method performs the best in terms of reducing blocking probability, bandwidth blocking probability, and service provisioning time when utilizing RDR.

OPTICAL SWITCHING AND NETWORKING (2024)

Article Engineering, Electrical & Electronic

A New Efficient Multi-Channel Fast NLMS (MC-FNLMS) Adaptive Algorithm for Audio Teleconferencing systems

Mohamed Zerouali, Mohamed Djendi

Summary: This paper proposes a new multichannel fast normalized least mean square (MC-FNLMS) algorithm for audio teleconferencing systems. The algorithm improves multichannel adaptive noise reduction by introducing a first order prediction process on the input signals. Compared with existing algorithms, the proposed algorithm demonstrates faster convergence speed, better noise reduction performance, and lower computational complexity.

PHYSICAL COMMUNICATION (2024)

Article Engineering, Electrical & Electronic

Multipaths' statistics for scatterers with inverted elliptic-parabolic spatial density around the mobile

Chidera Linda Anioke, Chibuzo Joseph Nnonyelu

Summary: In this paper, the joint and marginal probability densities of multipaths' angles-of-arrival (AOA) and times-of-arrival (TOA) at the cellular base station are derived. A novel assumption is made where scatterers are assumed to be located in an elliptical region instead of a circular region to better model the elliptical footprint around the mobile station. The proposed model shows a better fit to empirical AOA data compared to existing models.

PHYSICAL COMMUNICATION (2024)

Article Computer Science, Information Systems

MBP: Multi-channel broadcast proxy re-encryption for cloud-based IoT devices

Sumana Maiti, Sudip Misra, Ayan Mondal

Summary: The broadcast proxy re-encryption methods extend traditional proxy re-encryption mechanisms and propose a scheme called MBP for IoT applications. MBP calculates a single re-encryption key for all user groups and uses multi-channel broadcast encryption to reduce security element size. However, it increases computation time for receiver IoT devices. The use of Rubinstein-Stahl bargaining game approach addresses this issue and MBP is secure against selective group chosen-ciphertext attack in the random oracle model.

COMPUTER COMMUNICATIONS (2024)