-
Physical layer security analysis for RIS-aided NOMA systems with non-colluding eavesdroppers Comput. Commun. (IF 6.0) Pub Date : 2024-03-12 Anh-Tu Le, Tran Dinh Hieu, Tan N. Nguyen, Thanh-Lanh Le, Sang Quang Nguyen, Miroslav Voznak
Within the realm of sixth-generation (6G) wireless systems, there exist two primary imperatives: establishing massive connections and ensuring robust data transmission security. Therefore, this paper delves into the realm of physical layer security (PLS) within the context of a reconfigurable intelligent surface (RIS)-assisted Non-Orthogonal Multiple Access (NOMA) network coupled with the Internet
-
Multi-round transmission and contention protocol in WLANs with multi-packet reception Comput. Commun. (IF 6.0) Pub Date : 2024-03-12 Victor Sandoval-Curmina, Aldo G. Orozco-Lugo, Ramon Parra-Michel, Mauricio Lara
Nowadays, there are many scenarios in Wi-Fi networks where many devices compete for network access via an Access Point to transmit their information. Thus, the ability to separate multiple packets sent simultaneously using advanced digital processing techniques in the physical layer, known as Multi-Packet Reception (MPR), has become crucial. As this feature may increase network throughput, medium access
-
Secrecy outage performance of MIMO-NOMA relay systems with MRT/MRC schemes Comput. Commun. (IF 6.0) Pub Date : 2024-03-11 Nguyen Le Cuong, Tran Manh Hoang, Pham Thanh Hiep
Non-orthogonal multiple access (NOMA) systems have indicated that they can provide higher spectral efficiency and secrecy capability compared with orthogonal multiple access (OMA) conventional systems. Therefore, the NOMA technique is expected to replace the OMA systems. Moreover, multiple-input multiple-output (MIMO) communications can achieve a high-level security thank to high channel gain between
-
Relay selection in Underwater Acoustic Sensor Networks for QoS-based cooperative communication using game theory Comput. Commun. (IF 6.0) Pub Date : 2024-03-11 Fang Ye, Hengyu Xu, Jingpeng Gao
Underwater Acoustic Sensor Networks (UASN) plays a crucial role in monitoring and transmitting environmental information for marine resource exploration. However, underwater communication faces significant challenges such as signal attenuation, noise interference, and unstable underwater environments. Moreover, with the deployment of a large number of nodes, inefficient resource allocation strategies
-
Comprehensive fault diagnosis in UAV-assisted sensor networks: A three-phase automated approach Comput. Commun. (IF 6.0) Pub Date : 2024-03-05 Sipra Swain, Pabitra Mohan Khilar, Biswa Ranjan Senapati, Rakesh Ranjan Swain
Ensuring operational safety in an automated working environment is a crucial requirement. In this article, we propose a technique for automated fault diagnosis in unmanned aerial vehicle-based sensor networks (UAV-sensor networks) aimed explicitly at the composite nature of different faults. Our technique consists of 3-stages: (1) UAVs collecting data from sensors and running a modified Z-score statistics
-
AP-assisted adaptive video streaming in wireless networks with high-density clients Comput. Commun. (IF 6.0) Pub Date : 2024-03-05 Wenjia Wu, Jiale Yuan, Sheng Ma, Ming Yang
Adaptive video streaming over wireless networks has experienced tremendous growth in past few years. In order to guarantee users’ quality of experience (QoE), adaptive bitrate (ABR) algorithms have been extensively studied. With the recent emergency of high-density Wi-Fi networks, these solutions no longer perform well. On the one hand, bitrate decisions respond slowly to high network fluctuations
-
A survey on privacy-preserving authentication protocols for secure vehicular communication Comput. Commun. (IF 6.0) Pub Date : 2024-03-01 Kartick Sutradhar, Beena G. Pillai, Ruhul Amin, Dayanand Lal Narayan
Secure vehicular communication is one of the challenges of vehicular technology. The main goal of vehicular ad hoc networks is to prevent road accidents and collisions by transferring traffic signals and essential information to vehicles securely. Secure vehicular communication relies significantly on authentication techniques. There are numerous privacy-preserving authentication techniques for secure
-
An efficient and certificateless conditional privacy-preserving authentication and key agreement scheme for smart healthcare Comput. Commun. (IF 6.0) Pub Date : 2024-02-28 Yihao Hu, Chunguang Huang, Hai Cheng
Smart healthcare overcomes the limitations of time and space, allowing users to access medical and health services anywhere and anytime, thus improving the quality and efficiency of these services. However, due to its excessive reliance on wireless public networks, smart healthcare faces challenges and issues related to communication security. As a result, authentication and key agreement are critical
-
Optimization and analysis of air-to-ground wireless link parameters for UAV mounted adaptable Radar Antenna Array Comput. Commun. (IF 6.0) Pub Date : 2024-02-28 Priti Mandal, Lakshi Prosad Roy, Santos Kumar Das
Unmanned Aerial Vehicles (UAVs) are rapidly used in a variety of applications such as surveillance, search and rescue operation, delivery, etc. These operations strongly depend on the performance of the air-to-ground (A2G) communication link. This link communicates vital information between the UAV and the ground station (GS). However, due to the UAV’s unpredictable mobility, the A2G link becomes unreliable
-
Online Learning to parallel offloading in heterogeneous wireless networks Comput. Commun. (IF 6.0) Pub Date : 2024-02-27 Yulin Qin, Jie Zheng, Hai Wang, Ling Gao, Yuhui Ma, Shuo Ji, Yi Liu, Jie Ren, Rui Cao, Yongxing Zheng
In the forthcoming era of 6G, the deployment of dense and diverse wireless networks equipped with edge servers makes parallel offloading a crucial technology for multiple access edge computing. However, the effectiveness of parallel offloading is constrained by heterogeneous edge servers (HES) and heterogeneous wireless networks (HWN). Existing solutions often assume that the link state of the wireless
-
GEMLIDS-MIOT: A Green Effective Machine Learning Intrusion Detection System based on Federated Learning for Medical IoT network security hardening Comput. Commun. (IF 6.0) Pub Date : 2024-02-24 Iacovos Ioannou, Prabagarane Nagaradjane, Pelin Angin, Palaniappan Balasubramanian, Karthick Jeyagopal Kavitha, Palani Murugan, Vasos Vassiliou
The increasing use of Internet of Things (IoT) gadgets in a daily rate has heightened security apprehension, particularly within the healthcare sector. In order to prevent the unauthorized disclosure of sensitive data, it is imperative for Internet of Things (IoT) systems to promptly and effectively respond to harmful activities. Nevertheless, the act of transferring data to distant cloud servers for
-
Privacy-preserving and verifiable data aggregation for Internet of Vehicles Comput. Commun. (IF 6.0) Pub Date : 2024-02-23 Fucai Zhou, Qiyu Wu, Pengfei Wu, Jian Xu, Da Feng
With the development of Internet of Vehicles (IoV), organizations or institutions are increasingly interested in aggregating vehicle perception data to perform data analysis. Nevertheless, the existing solutions are difficult to meet the comprehensive requirements of IoV scenario, such as low latency, privacy preservation and rich functions. Additionally, it is more challenging that the aggregation
-
An optimization NPUSCH uplink scheduling approach for NB-IoT application via the feasible combinations of link adaptation, Resource assignment and energy efficiency Comput. Commun. (IF 6.0) Pub Date : 2024-02-23 Agung Mulyo Widodo, Hsing-Chung Chen
Low-power wide area (LPWA) technology, specifically Narrowband Internet of Things (NB-IoT), has emerged as a pivotal sixth-generation (6G) network technology, catering to the demands of massive-type communications (-MTC), extended battery life, wide range coverage, and high reliability. Despite its advancements, existing studies often fall short in simultaneously addressing energy efficiency, latency
-
A physical layer security scheme for 6G wireless networks using post-quantum cryptography Comput. Commun. (IF 6.0) Pub Date : 2024-02-21 Walid Abdallah
The sixth generation (6G) of mobile networks is poised to revolutionize communication capabilities with its infinite-like reach. These networks will feature an ultra-dense topology, accommodating a wide range of devices, from macro devices like satellites to nano-devices integrated within the human body. However, the extensive data traffic handled by 6G networks, a significant portion of which is sensitive
-
TDS-NA: Blockchain-based trusted data sharing scheme with PKI authentication Comput. Commun. (IF 6.0) Pub Date : 2024-02-19 Zhenshen Ou, Xiaofei Xing, Siqi He, Guojun Wang
Data sharing has received much attention and research as an excellent way to unlock the value of data. Trusted data storage servers will participate in the data-sharing system to provide users with convenient data access and storage services. Currently, the vast majority of researchers design data-sharing systems based on centralized trusted authorities and key management centers, but they tend to
-
An attack-resistant target localization in underwater based on consensus fusion Comput. Commun. (IF 6.0) Pub Date : 2024-02-19 Chenlu Gao, Jing Yan, Xian Yang, Xiaoyuan Luo, Xinping Guan
Target localization has been regarded as one of the most important techniques of underwater sensor networks (USNs). However, the challenges posed by weak communication, inhomogeneous medium, and openness of underwater environment make localization more difficult. With consideration of the asynchronous clock, isogradient sound speed and forging attack, this paper presents a consensus fusion-based target
-
Provably secured and lightweight authenticated encryption protocol in machine-to-machine communication in industry 4.0 Comput. Commun. (IF 6.0) Pub Date : 2024-02-16 Fatma Foad Ashrif, Elankovan A. Sundararajan, Mohammad Kamrul Hasan, Rami Ahmad, Aisha-Hassan Abdalla Hashim, Azhar Abu Talib
Industry 4.0 and the industrial Internet of Things (IIoT) aim to create a platform for data-driven decision-making through machine-to-machine (M2M) communication, often facilitated by the 6LoWPAN standard. However, as a resource-constrained device, 6LoWPAN raises security and privacy concerns for M2M communications, necessitating efficient and lightweight authentication and key establishment (AKE)
-
AlLoRa: Empowering environmental intelligence through an advanced LoRa-based IoT solution Comput. Commun. (IF 6.0) Pub Date : 2024-02-15 Benjamín Arratia, Erika Rosas, Carlos T. Calafate, Juan-Carlos Cano, José M. Cecilia, Pietro Manzoni
Environmental intelligence aims to improve the decision-making process for high social and environmental value ecosystems. To this end, data are collected using different sensors to allow monitoring of different variables of interest. Typically, these ecosystems cover a large geographical area, with spots of low or no connectivity, preventing their monitoring in real time. In this work, we propose
-
A secure certificateless ring signcryption scheme based on SM2 algorithm in smart grid Comput. Commun. (IF 6.0) Pub Date : 2024-02-15 Shuanggen Liu, Zhentao Liu, Jueqin Liang, Wanju Zhang, Zirong Heng
In the context of smart grids, bidirectional transmission of electricity information enables real-time electricity generation tailored to consumer needs. However, ensuring user privacy during data collection has emerged as a significant concern with the proliferation of data collection and transmission capabilities. Existing solutions such as group signature and pseudonym systems have limitations,
-
Blockchain-based remote operation and maintenance network slicing resource transaction method for intelligent manufacturing products Comput. Commun. (IF 6.0) Pub Date : 2024-02-15 Jin Chen, Ziyang Guo, Liang Tan
With the development of the Industrial Internet of Things (IIoT), there will be more and more intelligent manufacturing products requiring remote monitoring, maintenance, management, and optimization. IIoT and intelligent manufacturing require precise control of the remote maintenance process of products. The traditional remote operation and maintenance network based on ordinary Internet technologies
-
Radio-in-the-Loop simulation and emulation modeling for energy-efficient and cognitive Internet of Things in smart cities: A cross-layer optimization case study Comput. Commun. (IF 6.0) Pub Date : 2024-02-14 Sebastian Böhm, Hartmut König
Wireless communication technologies and Internet of Things (IoT) applications are the main drivers of upcoming sustainable smart networks which require an effective resource management. The reduction of the transmission energy consumption and the efficient utilization of the available spectrum for wireless communication, for instance, have to be enabled by energy-efficient and cognitive IoT networks
-
Cyber–physical system architecture of autonomous robot ecosystem for industrial asset monitoring Comput. Commun. (IF 6.0) Pub Date : 2024-02-14 Hasan Kivrak, Muhammed Zahid Karakusak, Simon Watson, Barry Lennox
Driven by advancements in Industry 4.0, the Internet of Things (IoT), digital twins (DT), and cyber–physical systems (CPS), there is a growing interest in the digitalizing of asset integrity management. CPS, in particular, is a pivotal technology for the development of intelligent and interconnected systems. The design of a scalable, low-latency communication network with efficient data management
-
Evaluation of Greedy and CBF for ETSI non-area GeoNetworking: The impact of DCC Comput. Commun. (IF 6.0) Pub Date : 2024-02-13 Oscar Amador, Maria Calderon, Manuel Urueña, Ignacio Soto
This paper evaluates the performance of the two ETSI non-area forwarding algorithms in the GeoNetworking specification: Greedy Forwarding and Non-Area Contention-Based Forwarding (CBF). Non-area forwarding occurs when a packet is sent to a geographical Destination Area from a node located outside of this area, e.g., when a vehicle wants to alert of hazardous events to other vehicles located in a distant
-
An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure Comput. Commun. (IF 6.0) Pub Date : 2024-02-12 Mouna Rabhi, Roberto Di Pietro
In this paper, we provide a novel failure-resilient token-based mutual exclusion (ME) algorithm for distributed systems. Like a few other solutions in the literature, the proposed solution leverages a logical tree as its underlying topology. However, unlike any other solution, the tree is built using a probabilistic, fully distributed approach, without exchanging messages. The current tree-based ME
-
STI: A self-evolutive traffic identification system for unknown applications based on improved random forest Comput. Commun. (IF 6.0) Pub Date : 2024-02-12 Yulong Liang, Fei Wang, Shuhui Chen, Beier Chen, Yunjiao Bo
Artificial intelligence technology has proven potential and effective in traffic identification for network management and security. However, the accuracy of its identification is easily influenced by the massive unknown traffic. Given the fact of numerous unknown applications in real networks and even more as time goes by, a promising traffic identification system should have the ability to discover
-
EAPRAD: A MAC protocol for Enhancing Access Probability and Reducing Access Delay in VANETs Comput. Commun. (IF 6.0) Pub Date : 2024-02-12 Xiaolin Wu, Demin Li, Peng Wang, Qinghua Tang, Xuemin Chen
Vehicular Ad Hoc Networks (VANETs) present challenges in terms of access collision and merge collision, leading to increased access delay in end-to-end vehicle communication. How to address these issues remains an unsolved problem. In this paper, we propose EAPRAD (Enhancing Access Probability and Reducing Access Delay), a novel MAC (Media Access Control) protocol based on a Markov model. Our protocol
-
-
A comprehensive latency profiling study of the Tofino P4 programmable ASIC-based hardware Comput. Commun. (IF 6.0) Pub Date : 2024-02-09 David Franco, Eder Ollora Zaballa, Mingyuan Zang, Asier Atutxa, Jorge Sasiain, Aleksander Pruski, Elisa Rojas, Marivi Higuero, Eduardo Jacob
Network softwarization has significantly evolved since programmable data planes became topical in academia and industry. Programming Protocol-Independent Packet Processors (P4) is a language to define packet forwarding behavior. Forwarding devices that are programmed with the P4 language support a flexible way to define headers, parse graphs, and data plane logic. However, extending the data plane
-
Feature selection applied to QoS/QoE modeling on video and web-based mobile data services: An ordinal approach Comput. Commun. (IF 6.0) Pub Date : 2024-02-07 Miguel García-Torres, Diego P. Pinto-Roa, Carlos Núñez-Castillo, Brenda Quiñonez, Gabriela Vázquez, Mauricio Allegretti, María E. García-Diaz
Nowadays, mobile service providers perceive the user experience as a reliable indicator of the quality associated to a service. Given a set of Quality of Service (QoS) factors, the aim is to predict the Quality of Experience (QoE), measured in terms of the Mean Opinion Score (MOS). Although this problem is receiving much attention, there are still some challenges that require more research in order
-
Blockchain-and-6G-based Ubiquitous UAV Task Security Management Architecture Comput. Commun. (IF 6.0) Pub Date : 2024-02-07 Hui Xie, Jun Zheng, Shengjun Wei, Changzhen Hu
Because of the inadequate network coverage and latency, Unmanned Aerial Vehicles (UAVs) may only move within the control range of the Ground Station (GS). The ability of UAVs to communicate with one another is also restricted by distance. These will make performing a task difficult. Simultaneously, data exchanged among UAVs as well as between UAVs and GSs encounter the threat of cyber attackers. This
-
When game theory meets satellite communication networks: A survey Comput. Commun. (IF 6.0) Pub Date : 2024-02-07 Weiwei Jiang, Haoyu Han, Miao He, Weixi Gu
Satellite communication networks have been considered an integral part of B5G and 6G networks to achieve global coverage and enhanced Internet services. However, the integration of satellite and terrestrial networks also brings many challenges, including the explosion of management complexity, the limited resource in satellite nodes, and the strategic behavior among network participants. To solve these
-
PUF-based dynamic secret-key strategy with hierarchical blockchain for UAV swarm authentication Comput. Commun. (IF 6.0) Pub Date : 2024-02-06 Liquan Chen, Yaqing Zhu, Suhui Liu, Hongtao Yu, Bing Zhang
The evolving UAV swarm flight environment exacerbates the difficulty of secure message delivery within the swarm. Physical Unclonable Functions (PUFs) have the potential to provide lightweight physical identities to UAV nodes. Nevertheless, the explicit storage of a private key within each UAV device invariably results in privacy leakage arising from physical hijacking. Therefore, to accomplish unified
-
Traffic matrix estimation using matrix-CUR decomposition Comput. Commun. (IF 6.0) Pub Date : 2024-02-05 Awnish Kumar, Ngangbam Herojit Singh, Suyel Namasudra, Ruben Gonzalez Crespo, Nageswara Rao Moparthi
Traffic Matrices (TMs) are the primary input for a multitude of network operations and management activities within a backbone network. TMs can be collected directly using monitoring tools but with an additional communication and processing overhead. Thus, TM estimation techniques gained prominence, where the objective is to obtain an estimate of the TM using easily available information without any
-
Available energy routing algorithm considering QoS requirements for LEO satellite network Comput. Commun. (IF 6.0) Pub Date : 2024-01-29 Li Yang, Huitao Zhang, Yaowen Qi, Qilong Huang
Satellite networks are becoming an integral part of future network infrastructure. However, premature depletion of energy in some satellites caused by the limited capacity of batteries and the uneven distribution of network traffic poses a significant challenge. Therefore, we have a keen interest in designing an available energy routing algorithm for LEO satellite networks to balance energy usage.
-
A truthful double auction framework for security-driven and deadline-aware task offloading in fog-cloud environment Comput. Commun. (IF 6.0) Pub Date : 2024-02-03 Branka Mikavica, Aleksandra Kostic-Ljubisavljevic
Emerging as an alternative to cloud computing, fog computing is expected to fulfill the resource demand of mobile users and provide low-latency and high-bandwidth services for ever-increasing Internet of Things (IoT) applications. Offloading time-critical and computation-intensive tasks to the fog can significantly reduce response time. Due to dynamicity, heterogeneity, and limited resources, fog may
-
Throughput maximization in multi-slice cooperative NOMA-based system with underlay D2D communications Comput. Commun. (IF 6.0) Pub Date : 2024-01-30 Asmaa Amer, Sahar Hoteit, Jalel Ben Othman
The fifth generation (5G) and beyond-5G networks aim to meet the rapidly growing traffic demands while considering the scarcity of radio resources and the heterogeneity of services and technical requirements. Non-Orthogonal Multiple Access (NOMA) has been considered a key technology to address resource scarcity by enabling more users to share the resources. Furthermore, network slicing tackles the
-
ms-van3t: An integrated multi-stack framework for virtual validation of V2X communication and services Comput. Commun. (IF 6.0) Pub Date : 2024-01-29 F. Raviglione, C.M. Risma Carletti, M. Malinverno, C. Casetti, C.F. Chiasserini
The automotive field is evolving towards high levels of automation, requiring seamless data exchange between vehicles through Vehicle-to-Everything (V2X) communications. Direct V2X technology is already being deployed on commercial vehicles, and it has the potential to deliver a range of safety and efficiency benefits on the road. However, the deployment of V2X-based applications is a complex process
-
ASSOCIATE: A simulator for assessing soft security in the Cognitive Internet of Things Comput. Commun. (IF 6.0) Pub Date : 2024-01-30 Masoud Narimani Zaman Abadi, Amir Jalaly Bidgoly, Yaghoub Farjami
-
Semantic segmentation of deep learning remote sensing images based on band combination principle: Application in urban planning and land use Comput. Commun. (IF 6.0) Pub Date : 2024-01-28 Peiyan Jia, Chen Chen, Delong Zhang, Yulong Sang, Lei Zhang
This study investigates the relevance of semantic segmentation of remote sensing images in urban planning and land use. We introduce a novel deep learning model that leverages the principle of band combination in remote sensing images to enhance the efficiency and accuracy of semantic segmentation. Our research focuses not only on advancing the segmentation capabilities of remote sensing images but
-
-
The anatomy of conspiracy theorists: Unveiling traits using a comprehensive Twitter dataset Comput. Commun. (IF 6.0) Pub Date : 2024-01-29 Margherita Gambini, Serena Tardelli, Maurizio Tesconi
The discourse around conspiracy theories is currently thriving amidst the rampant misinformation in online environments. Research in this field has been focused on detecting conspiracy theories on social media, often relying on limited datasets. In this study, we present a novel methodology for constructing a Twitter dataset that encompasses accounts engaged in conspiracy-related activities throughout
-
Exploring the design space of privacy-enhanced content discovery for bitswap Comput. Commun. (IF 6.0) Pub Date : 2024-01-28 Erik Daniel, Florian Tschorsch
IPFS is a content-addressed peer-to-peer data network, which follows the paradigm of information centric networking. In IPFS, data is exchanged with the Bitswap protocol. For content discovery, Bitswap queries all neighbors for the content, leaking the interest to all neighbors. In our paper, we develop three privacy-enhanced protocols for content discovery, which reduce the interest leak from all
-
Enhancement of edge-based surveillance videos based on bilateral filtering Comput. Commun. (IF 6.0) Pub Date : 2024-01-29 Simai Chen, Jia Xu, Qiyou Wu
Digital pictures are modified during the process of image enhancement to provide outcomes that are more suited for display or additional image analysis. Up to now, many achievements have been made in the field of image enhancement processing. Image enhancement algorithms is consisted of deblurring, filtering, and contrast methods. And Gaussian filtering is the most widely used image enhancement algorithm
-
Mobility aware and energy-efficient federated deep reinforcement learning assisted resource allocation for 5G-RAN slicing Comput. Commun. (IF 6.0) Pub Date : 2024-01-28 Yaser Azimi, Saleh Yousefi, Hashem Kalbkhani, Thomas Kunz
Network slicing is one of the foundations for the realization of 5G and beyond. However, due to the mobility of the users and the network dynamics, flexible and efficient radio access network (RAN) resource slicing is still a challenge. In this paper, we allocate the power and radio block (RB) resources in a multi-RAN scenario to the users of both rate-based and resource-based slices. We propose a
-
Efficient resource allocation and user association in NOMA-enabled vehicular-aided HetNets with high altitude platforms Comput. Commun. (IF 6.0) Pub Date : 2024-01-23 Ali Nauman, Mashael Maashi, Hadeel Alsolai, Fahd N. Al-Wesabi, Nojood O Aljehane, Mohammed Assiri, Sara Saadeldeen Ibrahim, Wali Ullah Khan
The increasing demand for massive connectivity and high data rates has made the efficient use of existing spectrum resources an increasingly challenging problem. Non-orthogonal multiple access (NOMA) is a potential solution for future heterogeneous networks (HetNets) due to its high capacity and spectrum efficiency. In this study, we analyze an uplink NOMA-enabled vehicular-aided HetNet, where multiple
-
Secure opportunistic routing in 2-hop IEEE 802.15.4 networks with SMOR Comput. Commun. (IF 6.0) Pub Date : 2024-01-26 Konrad-Felix Krentz, Thiemo Voigt
The IEEE 802.15.4 radio standard features the possibility for IEEE 802.15.4 nodes to run on batteries for several years. This is made possible by duty-cycling medium access control (MAC) protocols, which allow IEEE 802.15.4 nodes to leave their radios in energy-saving sleep modes most of the time. Yet, duty-cycling MAC protocols usually incur long routing delays since it may take a while until a particular
-
Optimizing secrecy energy efficiency in RIS-assisted MISO systems using deep reinforcement learning Comput. Commun. (IF 6.0) Pub Date : 2024-01-24 Mian Muaz Razaq, Huanhuan Song, Limei Peng, Pin-Han Ho
This article investigates the maximization of secrecy energy efficiency (SEE) in B5G mobile systems where a suite of reconfigurable intelligent surface (RIS) modules is incorporated. Taking into account the location information of legitimate users and eavesdroppers, we formulate the problem as a joint optimization of the phase shifts, physical orientations, and locations of the RIS modules, as well
-
Integrated sensing and communication-assisted beam rendezvous in airborne networks Comput. Commun. (IF 6.0) Pub Date : 2024-01-21 Xinyu Hong, Na Lv, Ying Pan
This paper investigates the feasibility of the integrated sensing and communication (ISAC) technology in the future airborne network (AN), a large heterogeneous network of various aircraft to realize situation awareness and sharing. In order to achieve better transmissions with few overheads, an effective beam rendezvous scheme is fundamental. However, due to the nodes’ oblivious movements in AN, the
-
Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication Comput. Commun. (IF 6.0) Pub Date : 2024-01-23 Jiby J. Puthiyidam, Shelbi Joseph, Bharat Bhushan
Internet of Things (IoT) networks are vulnerable to various security threats, especially in client authentication. The current authentication methods require significant resources and are vulnerable to specific attacks. The Non-Interactive Zero Knowledge Proof (NIZKP) concept suits IoT device authentication. Elliptic Curve Digital Signature (ECDSA) is a popular algorithm for IoT device authentication
-
A robust and machine learning-driven identification scheme for malicious nodes in UASNs Comput. Commun. (IF 6.0) Pub Date : 2024-01-23 Xiangdang Huang, Chao Chen, Nuo Chen, Pengcheng Li, Rongxin Zhu, Qiuling Yang
Underwater Acoustic Sensor Networks (UASNs) have garnered widespread adoption across maritime domains and national security sectors. Their deployment, often in remote and challenging conditions, necessitates robust trust models to assess node integrity and to pinpoint compromised units, particularly under adversarial assault. Prevailing trust models, however, predominantly focus on nodes’ communicative
-
Coverage performance of cooperative NOMA MmWave networks with wireless power transfer Comput. Commun. (IF 6.0) Pub Date : 2024-01-23 Kun Tang, Guitao Xu, Pengwei Yan, Haoshen Zhu, Wenjie Feng
The millimeter-wave (mmWave) plays a vital role in the fifth generation (5G) and beyond-5G (B5G) cellular networks, which is also attractive for wireless power transfer (WPT) since the mmWave base stations (BSs) are usually equipped with large antenna arrays. This paper studies a wireless-powered mmWave communication system with non-orthogonal multiple access (NOMA) cooperative transmission. In this
-
Clustered jamming in U-V2X communications with 3D antenna beam-width fluctuations Comput. Commun. (IF 6.0) Pub Date : 2024-01-18 Mohammad Arif, Wooseong Kim
Jamming is the disruption of wireless communication signals, rendering them unreadable or degraded, typically caused by jamming devices. Clustered jamming in vehicular communications is a highly sophisticated attack technique characterized by the coordinated deployment of multiple jammers with the strategic intent to deliberately disrupt and incapacitate communication links, thereby presenting a formidable
-
Transient analysis of energy-saving strategy for cognitive radio networks using G-queue with heterogeneity Comput. Commun. (IF 6.0) Pub Date : 2024-01-22 Rakhee Kulshrestha, Ajay Singh
Energy efficiency, high data speeds, and effective spectrum utilization stand as the primary factors governing 5G and beyond networks. A base station (BS) in a cognitive radio network (CRN) that conserves energy during sleep periods is a promising contender for achieving more effective spectrum allocation. An efficient energy-saving strategy is offered in this study to achieve greener communication
-
LAMP: A latency-aware MAC protocol for joint scheduling of CAM and DENM traffic over 5G-NR sidelink Comput. Commun. (IF 6.0) Pub Date : 2024-01-22 Suranjan Daw, Anwesha Kar, Venkatarami Reddy Chintapalli, Bheemarjuna Reddy Tamma, Siva Ram Murthy C.
Cooperative Awareness Messages (CAMs) and Decentralized Environmental Notification Messages (DENMs) are two types of messages used in Intelligent Transport Systems (ITS) for Vehicle-to-Everything (V2X) communication. CAMs are used to periodically exchange the current state of a vehicle with its nearby vehicles and the DENMs are used to aperiodically provide critical and time-sensitive information about
-
Activate or sleep? An optimal two-threshold policy for transmission service Comput. Commun. (IF 6.0) Pub Date : 2024-01-18 Jiaqi Fan, Jiankui Yang, Dacheng Yao
In wireless communication networks (WCNs), activating the removable base station (BS) is an effective way to reduce the bursty congestion, while it will inevitably incur some extra costs for occupying more resources. In order to achieve a tradeoff between the costs and quality of service (QoS), the manager need to decide when to activate and when to sleep the removable BS. In this paper, a system with
-
COCKTAIL: Video streaming QoE optimization with chunk replacement and guided learning Comput. Commun. (IF 6.0) Pub Date : 2024-01-18 A-Hyun Lee, Hyeongho Bae, Chong-Kwon Kim
Adaptive bitrate (ABR) algorithms, the de facto standard for video streaming, aim to provide the best user quality of experience (QoE) under fluctuating operating environments. Prior ABR algorithms addressed the QoE maximization problem with a plethora of approximate optimization techniques including model predictive control (MPC), Lyapunov optimization, and deep reinforcement learning (DRL). Even
-
Securing IIoT applications in 6G and beyond using adaptive ensemble learning and zero-touch multi-resource provisioning Comput. Commun. (IF 6.0) Pub Date : 2024-01-19 Zakaria Abou El Houda, Bouziane Brik, Adlen Ksentini
The advent of Industry 5.0, driven by cutting-edge 6G technologies such as immersive cloud eXtended Reality (XR), Autonomous vehicles, holographic communication, and Digital Twin (DT), is set to trigger a substantial upswing in the deployment of the Industrial Internet of Things (IIoT) devices interconnected within networks. This expansion of IIoT devices will create a wider attack surface and increase
-
Secrecy outage performance of NOMA relay networks using partial relay selection in the presence of multiple colluding eavesdroppers Comput. Commun. (IF 6.0) Pub Date : 2024-01-18 Tran Manh Hoang, Ba Cao Nguyen, Huu Minh Nguyen, Phuong T. Tran
Nowadays, security becomes one of the utmost important issues in designing mobile communication networks, especially for non-orthogonal multiple access (NOMA), in which the users share the same bandwidth and time resource. Here, we rigorously derive the closed-form formulas of secrecy outage probability (SOP) for each user as well as the overall SOP of a NOMA relay networks consisting of two users
-
A distinguished-bit tracking knowledge-based query tree for RFID tag identification Comput. Commun. (IF 6.0) Pub Date : 2024-01-18 Chih-Chung Lin, Yuan-Cheng Lai, Zelalem Legese Hailemariam
—Many RFID systems own the information of RFID tags in the database, so the reader knows how many tags will be identified and which tags’ IDs might appear. How the RFID anti-collision protocols take advantage of this knowledge is a challenge. Some previous anti-collision protocols, including Query Tree with Shortcutting and Couple Resolution (QTSC) and Bit-tracking Knowledge-based Query Tree (BKQT)
-
Modulating LiFi for dual operation in the visible and infrared spectra Comput. Commun. (IF 6.0) Pub Date : 2024-01-17 Dayrene Frometa Fonseca, Muhammad Sarmad Mir, Sergio Iglesias de Frutos, Borja Genoves Guzman, Domenico Giustiniano
Light-Fidelity (LiFi) has emerged in the last few years as a promising technology for alleviating the stringent demand for wireless data services. Prior works have considered LiFi operating either in the visible light or infrared spectrum. Each spectrum band has its own advantages: visible light allows leveraging existing infrastructure for communication, while infrared is not affected by light dimming