Telecommunications

Article Computer Science, Information Systems

Realization of maximum flow in DTN and application in CGR

Changhao Li, Huanjing Li, Tao Wu, Lei Yan, Suzhi Cao

Summary: The maximum flow problem based on a contact graph in Delay-Tolerant Networking (DTN) is important for routing and data planning. Existing algorithms cannot be directly applied to topological networks with time series changes. This paper proposes a method of dismantling and reconstructing the graph to solve the maximum flow problem in a continuously changing network. The method discretizes time on different nodes to reduce the scale of the graph, optimizing data transmission, improving data delivery rate, and reducing link occupation.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

UAV-assisted ISAC network physical layer security based on Stackelberg game

Baogang Li, Jia Liao, Xi Gong, Hongyin Xiang, Zhi Yang, Wei Zhao

Summary: This paper addresses the issue of physical layer security in a UAV network and proposes a Stackelberg game model to solve the game problem of information security transmission. The dual optimization theory and KKT conditions are employed to solve the problem. The research demonstrates that the accuracy of location sensing can be effectively measured using the CRB bound while considering Eve's location awareness. The relaxation method and convex optimization tools are used to solve the non-convex optimization problem.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Enabling simulation services for digital twins of 5G/B5G mobile networks

Giovanni Nardini, Giovanni Stea

Summary: Digital Twins of Networks (DTNs) are proposed as digital replicas of physical entities, enabling efficient data-driven network management and performance-driven network optimization. DTNs provide simulation services for dynamic reconfiguration and fault anticipation, using discrete-event network simulators as the ideal tools. Challenges include centralized vs. distributed implementation, input gathering from the physical network, security issues and hosting. The possibilities of network simulation for what-if analysis are explored, with the concepts of lockstep and branching analysis defined.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

DINNRS: A Distributed In-Network Name Resolution System for information-centric networks

Zhaolin Ma, Jiali You, Haojiang Deng

Summary: This paper presents the Distributed In-Network Name Resolution System (DINNRS), which leverages software-defined networking and Information-Centric Networking (ICN) paradigm to provide high scalability and minimal request delay. Our methods, including an enhanced marked cuckoo filter for fast resolving, achieve significant performance gains in simulation experiments.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Accuracy enhancement of Wi-Fi positioning by ranging in dense UWB networks*

Chao-Hsiang Li, Alexander I-Chi Lai, Ruey-Beei Wu

Summary: This study proposes a fusion-based approach that combines Wi-Fi fingerprint positioning with accurate UWB ranging to optimize indoor localization accuracy in dense wireless networks (DWNs). Theoretical analysis and simulation results show that the improvement in localization accuracy is proportional to the square root of the number of participating nodes when at least 6 additional measured distances are available.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

A multi-agent federated reinforcement learning-based optimization of quality of service in various LoRa network slices

Eric Ossongo, Moez Esseghir, Leila Merghem-Boulahia

Summary: The implementation of 5G networks allows for the efficient coexistence of heterogeneous services in a single physical virtualized infrastructure. Virtualization of network functions enables more flexible resource management and customizable services. However, the increasing number of connected objects poses challenges in managing physical and virtual resources, requiring intelligent systems to ensure communication quality.

COMPUTER COMMUNICATIONS (2024)

Review Computer Science, Information Systems

A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective

Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, Heather Molyneaux, Ali A. Ghorbani

Summary: The Internet of Things (IoT) has the potential to revolutionize medical treatment in healthcare, but it also faces security threats. Advanced analytics can enhance IoT security, but generating realistic datasets is complex. This research conducts a review of Machine Learning (ML) solutions for IoT security in healthcare, focusing on existing datasets, resources, applications, and challenges, to highlight the current landscape and future requirements.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Physical layer authentication in the internet of vehicles through multiple vehicle-based physical attributes prediction

Mubarak Umar, Jiandong Wang, Feng Li, Shuguang Wang, Minggang Zheng, Zhiwei Zhang, Yulong Shen

Summary: This paper proposes a physical layer authentication (PLA) scheme based on Gaussian process (GP) regression, which enhances the reliability of authentication in Internet of Vehicles (IoV) by jointly considering the location and speed attributes of vehicles. The proposed scheme utilizes historical channel state information and transmitters' location and speed information to train a GP model for predicting the next legitimate location and speed for authentication. Experimental results demonstrate that the proposed approach significantly improves authentication performance compared to existing methods.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Self-reconfigurable partial mesh using ZigBee control board towards fail-proof and reliable home area networking

Rakesh Das, Jitendra Nath Bera

Summary: This paper focuses on the development of a highly reliable customized home area networking (HAN) to provide a robust communication network for smart home owners. The proposed HAN utilizes a multi-gateway-based partial mesh networking topology with ZigBee control boards to enable remote monitoring and control of individual appliances within the home. The introduction of active and pseudo gateway concept enhances the reliability of the HAN by automatically reconfiguring in case of failure. Experimental verification demonstrates the fail-proof and reliable nature of the proposed HAN with alternate routes and activation of pseudo gateway as active gateway.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

On the interest of artificial intelligence approaches in solving the IoT coverage problem

Sami Mnasri, Mansoor Alghamdi

Summary: This survey focuses on the 3D indoor deployment in IoT collection networks, specifically on finding the right locations of IoT connected objects and addressing coverage holes. It analyzes different models and hypotheses presented in the literature, and highlights the use of artificial intelligence techniques such as meta-heuristics, evolutionary optimization, machine learning, and reinforcement learning. The study demonstrates that using these techniques for 3D deployment of IoT networks can enhance the quality of deployment compared to other approaches.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions

Ryhan Uddin, Sathish A. P. Kumar, Vinay Chamola

Summary: This paper examines the impact of different types of DoS and DDoS attacks on edge computing layers and investigates existing detection and prevention mechanisms to address security weaknesses. Additionally, a theoretical architecture is proposed to mitigate the impact of distributed denial of service attacks on edge systems.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Resource management in multi-heterogeneous cluster networks using intelligent intra-clustered federated learning

Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Saqib Hussain, Zulfiqar Ali Zardari, Ghulam Ali Mallah, Md. Jalil Piran, Fayaz Ali Dharejo

Summary: This paper explores the relationship between heterogeneous cluster networks and federated learning, as well as the challenges of implementing federated learning in heterogeneous networks and the Internet of Things. The authors propose an Intra-Clustered FL (ICFL) model that optimizes computation and communication to select heterogeneous FL nodes in each cluster, enabling efficient processing of asynchronous data and ensuring data security.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

NextGenV2V: Authenticated V2V communication for next generation vehicular network using (2, n)-threshold scheme

Pankaj Kumar, Hari Om

Summary: This paper presents NextGenV2V, a protocol for the next-generation vehicular network that achieves authenticated communication between vehicles using symmetric keys and a (2, n)-threshold scheme. The protocol reduces communication overhead and improves authentication delay, ensuring better security. Comparative analysis demonstrates the suitability of NextGenV2V in next-generation vehicular networks.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Role of context in determining transfer of risk knowledge in roundabouts

Duncan Deveaux, Takamasa Higuchi, Seyhan Ucar, Jerome Harri, Onur Altintas

Summary: This paper investigates the ability to predict the risk patterns of vehicles in a roundabout and suggests that constraining knowledge transfer to roundabouts with a similar context can significantly improve accuracy.

COMPUTER COMMUNICATIONS (2024)

Article Engineering, Electrical & Electronic

Compact and wideband 3-D IPD butler matrix for millimeter-wave communications

Audrey Cayron, Christophe Viallon, Ayad Ghannam, Alessandro Magnani, Thierry Parra

Summary: A 4x4 Butler matrix for millimeter-wave communications is presented in this paper, which utilizes a new 3-D Integrated Passive Devices (IPD) process to achieve a higher performance/compactness trade-off. The design incorporates 3-D transformers and solenoids to optimize couplers and phase shifters and results in a wide bandwidth and low insertion loss.

AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS (2024)

Article Engineering, Electrical & Electronic

Highly-isolated compact self-diplexing antenna

Peyman PourMohammadi, Hassan Naseri, Noureddine Melouki, Fahad Ahmed, Qi Zheng, Amjad Iqbal, Guy A. E. Vandenbosch, Tayeb A. Denidni

Summary: This article presents a novel low-profile self-duplexing antenna with high isolation for out-band operation applications. The antenna features two patches, one rectangular and one triangular, both utilizing the quarter-mode substrate integrated waveguide (QMSIW) cavity for enhanced performance. Miniaturization is achieved through capacitive slots. The antenna operates at both 5.8 and 9.8 GHz frequencies, with impressive alignment between measured and simulated results. It has compact dimensions and 40 dB isolation between its ports, as well as consistent radiation patterns at both frequencies. The gains at 5.8 and 9.8 GHz are 4.1 and 4.6 dBi, respectively. The antenna's frequency bands can be independently tuned by adjusting the size of the capacitive slots. The article also provides valuable insights into the antenna's functionality and versatility, making it a valuable asset for dual-band wireless communication applications.

AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS (2024)

Article Engineering, Electrical & Electronic

UNet-rootMUSIC: A high accuracy direction of arrival estimation method under array imperfection

Duy-Thai Nguyen, Thanh-Hai Le, Van-Sang Doan, Van-Phuc Hoang

Summary: This paper proposes a method that combines UNet and rootMUSIC algorithm to improve the accuracy of DOA estimation. By converting the covariance matrix of received signals into an ideal antenna array's covariance matrix, and then using rootMUSIC algorithm for DOA estimation, the experimental simulation results show that this method can significantly reduce the error of DOA estimation compared with traditional methods.

AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS (2024)

Article Engineering, Electrical & Electronic

Evaluation of in-situ optical loss of polyimide-coated optical fiber under hydrothermal environments

Tetsushi Matsuda, Satoshi Kitaoka, Kenji Nakahira, Taishi Ito, Takeharu Kato, Junzo Kasahara

Summary: DFOS devices deployed in geothermal boreholes require optical fibers that can withstand high temperatures and understanding the deterioration behavior at these temperatures is crucial for predicting device lifetimes.

OPTICAL FIBER TECHNOLOGY (2024)

Article Engineering, Electrical & Electronic

Design of Ku-band power amplifier for satellite applications using neural network

Kumar Saurabh, Sukwinder Singh

Summary: This article introduces a method to improve the performance of a power amplifier. By calculating the optimal load and source impedances through source and load-pull analysis, and designing the optimal matching architecture of input and output network using neural network algorithm, the power amplifier achieves high efficiency and gain in the frequency range of 13.75 GHz-14.5 GHz.

AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS (2024)

Article Computer Science, Hardware & Architecture

Mitigating the impact of controller failures on QoS robustness for software-defined wide area networks

Songshi Dou, Li Qi, Zehua Guo

Summary: Emerging cloud services and applications have different QoS requirements for the network. SD-WANs play a crucial role in QoS provisioning by introducing network programmability, dynamic flow routing, and low data transmission latency. However, controller failures may degrade QoS. To address this, we propose PREDATOR, a QoS-aware network programmability recovery scheme that achieves fine-grained per-flow remapping without introducing extra delays, ensuring QoS robustness for high-priority flows.

COMPUTER NETWORKS (2024)