-
Delay-sensitive energy-efficient routing scheme for the Wireless Sensor Network with path-constrained mobile sink Ad Hoc Netw. (IF 4.8) Pub Date : 2024-03-12 Wanguo Jiao, Rui Tang, Wen Zhou
The use of mobile sinks (MSs) can address several challenges for traditional wireless sensor networks (WSNs), such as energy holes, meanwhile it also introduces some new issues. Especially, for the path constraint MS, the fixed trajectory and uncontrollable moving speed results in significant delay and even buffer overflows. Existing research mainly focused on delay-tolerant applications which are
-
Securely sharing outsourced IoT data: A secure access and privacy preserving keyword search scheme Ad Hoc Netw. (IF 4.8) Pub Date : 2024-03-12 Nazatul H. Sultan, Shabnam K. Kermanshahi, Hong Y. Tran, Shangqi Lai, Vijay Varadharajan, Surya Nepal, Xun Yi
The rapid progress in the field of IoT and its wide-ranging applications emphasize the criticality of robust security measures for effectively sharing, storing, and managing sensitive data generated by IoT devices. Regulations such as the Consumer Data Rights (CDR) highlight the need for the seamless sharing of sensitive data with authorized third parties while ensuring confidentiality and privacy
-
A trustworthy data collection scheme based on active spot-checking in UAV-Assisted WSNs Ad Hoc Netw. (IF 4.8) Pub Date : 2024-03-12 Runfeng Duan, An He, Guangwei Wu, Guangrong Yang, Jinhuan Zhang
The UAV-WSN systems integrates the flexibility of UAVs with the communication and sensing capabilities of WSNs, making them important means of information monitoring, collection, and analysis in various fields that has received widespread attention. However, various malicious attacks pose threats to the security of UAV-WSN systems, resulting in serious vulnerabilities in trustworthy data collection
-
A scalable, dynamic, and secure traffic management system for vehicular named data networking applications Ad Hoc Netw. (IF 4.8) Pub Date : 2024-03-12 Guilherme Araujo, Leobino Sampaio
Several intelligent transport systems in vehicular networks (VANETs) rely on IP-based models for inter-vehicle communication. However, many approaches for Cooperative Intelligent Transport Systems and distributed systems are not secure and appropriate for VANETs, using specific technologies, centralized network architectures, or limited communication models. In addition, many applications are forced
-
DBlock-RLB: An Energy Efficient Framework for Intelligent Routing and Trading based Load Balancing in SDWSN Environment Ad Hoc Netw. (IF 4.8) Pub Date : 2024-03-11 Nagesh Mallaiah Vaggu, Ravi Sankar Barpanda
Wireless Sensor Networks (WSNs) is an emerging field that enables them to work in complex scenarios with enough flexibility. The WSN systems are improved in terms of network flexibility by integrating Software Defined Network (SDN) to obtain SDWSN environment. However, security and energy efficiency are the major issues in the SDWSN environment which leads to low network lifetime. To resolve the existing
-
Energy efficient cluster routing protocol for wireless sensor networks using hybrid metaheuristic approache’s Ad Hoc Netw. (IF 4.8) Pub Date : 2024-03-11 Salim El Khediri, Afef Selmi, Rehan Ullah Khan, Tarek Moulahi, Pascal Lorenz
The development of wireless sensor networks (WSNs) has been particularly notable in the context of smart computing, where various application areas have been identified. These networks consist of self-configured, small sensor nodes with battery power. However, sensors have limited energy and resources at their disposal. When unbalanced nodes exist within the network, it adversely affects the network’s
-
vCubeChain: A scalable permissioned blockchain Ad Hoc Netw. (IF 4.8) Pub Date : 2024-03-11 Allan Edgard Silva Freitas, Luiz Antonio Rodrigues, Elias Procópio Duarte Jr.
This work presents vCubeChain, a scalable permissioned blockchain based on the vCube virtual topology. vCube is a virtual hierarchical topology that presents several logarithmic properties. vCubeChain employs a leader election algorithm that relies on the failure detection information that vCube provides. The leader employs a vCube-based autonomic reliable broadcast algorithm to disseminate blocks
-
Mobility-aware and energy-efficient offloading for mobile edge computing in cellular networks Ad Hoc Netw. (IF 4.8) Pub Date : 2024-03-08 Linyu Huang, Quan Yu
Mobile edge computing (MEC) is a promising paradigm that helps mobile terminals save energy and increase battery life by offloading tasks to MEC servers. To obtain full benefit from MEC, the joint optimization of offloading decision-making and resource allocation, while considering user mobility, is crucial and challenging. The objective of this paper was to propose mobility-aware and energy-efficient
-
Location privacy protection method based on differential privacy in crowdsensing task allocation Ad Hoc Netw. (IF 4.8) Pub Date : 2024-03-04 Qiong Zhang, Taochun Wang, Yuan Tao, Nuo Xu, Fulong Chen, Dong Xie
With the widespread popularity of smart phones, watches and other devices, mobile crowdsensing (MCS) has gradually entered the public’s field of vision. However, the widespread use of MCS technology is accompanied by an increasing risk of workers’ personal privacy being violated. Typically, workers are required to submit location information in order to participate in task assignments, and the privacy
-
Energy efficient deployment of aerial base stations for mobile users in multi-hop UAV networks Ad Hoc Netw. (IF 4.8) Pub Date : 2024-03-02 Kyungho Ryu, Wooseong Kim
Unmanned aerial vehicles (UAVs) are popularly considered as aerial base stations in a Low-Altitude Platform (LAP) to provide wireless connections to ground users in disaster and digital divide situation. Most of previous studies have investigated energy efficient UAV deployment only for the stationary ground users. Contrarily, we propose an on-line deployment algorithm for ground mobile users (GMUs)
-
Enhancing multi-cloud service deployment with [formula omitted]: A loss-aware coordinator in sky computing Ad Hoc Netw. (IF 4.8) Pub Date : 2024-03-01 Zhiheng Zhang, Kaiwen Ning, Guowei Wu
Internet of Things (IoT) services deployed across different Cloud Service Providers (CSPs) require seamless migration across heterogeneous clouds. Sky Computing (SC) facilitates the requirement by implementing a coordinator with communication APIs among clouds. However, security concerns of CSPs prevent the coordinator from accessing detailed cloud hardware information, thereby hindering the assessment
-
Adaptive client selection with personalization for communication efficient Federated Learning Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-29 Allan M. de Souza, Filipe Maciel, Joahannes B.D. da Costa, Luiz F. Bittencourt, Eduardo Cerqueira, Antonio A.F. Loureiro, Leandro A. Villas
Federated Learning (FL) is a distributed approach to collaboratively training machine learning models. FL requires a high level of communication between the devices and a central server, thus imposing several challenges, including communication bottlenecks and network scalability. This article introduces ACSP-FL, a solution to reduce the overall communication and computation costs for training a model
-
Joint resource allocation and UAV placement in UAV-assisted Wireless Powered Sensor Networks using TDMA and NOMA Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-28 Hosein Azarhava, Mehran Pourmohammad Abdollahi, Javad Musevi Niya, Mohammad Ali Tinati
Widely employment of UAV-assisted communications along with the energy harvesting technology in the next generation of telecommunication networks, is one of the promising solutions to provide improved metrics whereas it brings new challenges. In this paper, we consider UAV-assisted Wireless Powered Sensor Network (WPSN) in which the sensors are distributed in the area and harvest their energy from
-
An energy recovery routing algorithm for opportunistic networks based on connection stability and node encounter type Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-24 Yanhe Fu, Bo Zhou, Gang Xu, Yuqi Wang, Baoqi Huang, Feng Zhang
Routing algorithms have been the focus of research on opportunistic networks to effectively deal with the connectivity problem of intermittent communication in opportunistic networks. Due to the frequent forwarding of messages by active nodes in the opportunistic networks leading to excessive energy consumption, opportunistic networks suffer from communication susceptibility to interruption and unstable
-
An improved deep Q-network approach for charging sequence scheduling with optimal mobile charging cost and charging efficiency in wireless rechargeable sensor networks Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-23 Chengpeng Jiang, Wencong Chen, Jing Wang, Ziyang Wang, Wendong Xiao
Mobile charging is a practical solution to overcome energy constraints in wireless rechargeable sensor networks (WRSNs). It utilizes a mobile charger (MC) to charge sensors based on the wireless power transfer technique via a charging scheduling scheme. However, how to schedule MC to achieve higher charging efficiency with less mobile charging cost, while ensuring network functionality remains a challenge
-
-
Privacy computing meets metaverse: Necessity, taxonomy and challenges Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-22 Chuan Chen, Yuecheng Li, Zhenpeng Wu, Chengyuan Mai, Youming Liu, Yanming Hu, Jiawen Kang, Zibin Zheng
Metaverse, the core of the next-generation Internet, is a computer-generated holographic digital environment that simultaneously combines spatio-temporal, immersive, real-time, sustainable, interoperable, and data-sensitive characteristics. It cleverly blends the virtual and real worlds, allowing users to create, communicate, and transact in virtual form. With the rapid development of emerging technologies
-
HWMP-based secure communication of multi-agent systems Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-20 Shanyao Ren, Jianwei Liu, Shuzhi Sam Ge, Dongyu Li
Multi-agent systems (MAS), known for their autonomy, fault tolerance, and flexible collaboration capabilities, are widely used in various fields. Communication security is one of the most critical problems of MAS tasks. Once a malicious attacker invades agents in the system, it brings massive threats to the entire system. It tampers with routing messages, discards packets, and paralyzes the communication
-
Handover algorithm based on Bayesian-optimized LSTM and multi-attribute decision making for heterogeneous networks Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-17 Yi Luo, Yinghui Zhang, Chaoyang Du, Huimin Zhang, Yang Liu
Heterogeneous networks (HetNets) which can satisfy the diverse requirements of future terminal tasks through providing different network access services for terminals, have emerged as a vital technology for the development of next-generation networks. However, frequent access to different networks often leads to high handover delay and handover failure, resulting in a degradation of user experience
-
Improving collision resolution of superposed LoRa signals using a Slot-Free Decoding Scheme Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-15 Weixuan Xiao, Nancy El Rachkidy, Alexandre Guitton
Long Range (LoRa) communications are largely used in low-power wide-area networks for monitoring applications, as they enable devices to communicate over long distances. However, as the number of devices increases, collisions of LoRa frames occur frequently, which degrades both LoRa system performance and its scalability. In this paper, we propose the SF-DS scheme that decodes collided LoRa signals
-
Optimized IEEE 802.11ax for smart warehouses Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-13 Lorenzo Fanari, Dreyelian Morejón, Iñigo Bilbao, Eneko Iradier, Jon Montalban, Pablo Angueira
Industry 4.0 aspires to digitize factories processes wholly. Wireless technologies represent one of the elements of this goal. However, the current standards and proprietary solutions need to meet the industry’s tight requirements for various use cases, such as smart warehouses, where robots manage and control entire tasks. One of the key research challenges toward replacing wired fieldbuses with wireless
-
Mobile association scheme based on auction algorithm in heterogeneous wireless networks Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-13 Junhui Zhao, Xuehan Bao, Hongyi Bian, Qingmiao Zhang, Dongming Wang, Lisheng Fan
With the rapid development of mobile communications, the dense deployment of small base stations (SBSs) in heterogeneous wireless networks (HW-Nets) has met the explosive growth in demand from terminals. However, due to the irregular deployment of SBSs, users frequently handover base stations in pursuit of high-quality services, which inevitably leads to load imbalance among SBSs. To alleviate load
-
Design and implementation for a UAV-based streaming media system Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-12 Zhichao Liu, Yi Jiang
The Unmanned Aerial Vehicle (UAV)-based video streaming transmission is critical for real-time communication (RTC) applications in flying ad-hoc networks (FANET). The communication links between the nodes, however, are often unstable, especially in harsh network environments. This article first presents an architecture of a UAV-based streaming media system (USMS) for more reliable transmission, where
-
Time-based UWB localization architectures analysis for UAVs positioning in industry Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-10 Javier Díez-González, Rubén Ferrero-Guillén, Paula Verde, Alberto Martínez-Gutiérrez, Rubén Álvarez, Joaquín Torres-Sospedra
Ultra-Wide-Band (UWB) technology allows for partially mitigating the NLOS and multipath effects of time-based localization in low-range applications. Thus, it has been widely proposed for indoor navigation, reaching very promising results with mature technology already available. However, an analysis of the suitability of different synchronous and asynchronous time-based architectures can provide valid
-
Indoor tracking using auxiliary particle filter and deep learning in wireless sensor networks Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-10 Hassan Razavi, Hamidreza Amindavar, Hassan Aghaeinia
The low-cost received signal strength indicators (RSSIs) are commonly employed in indoor tracking using various state estimation methods, including particle filters (PFs). In the context of target tracking, PFs often employ the constant velocity (CV) and the constant acceleration (CA) models as transition models. This paper proposes an alternative model that replaces the CV with a stacked long short-term
-
Non-Terrestrial UAV Clients for Beyond 5G Networks: A Comprehensive Survey Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-09 Mohammed M.H. Qazzaz, Syed A.R. Zaidi, Desmond C. McLernon, Ali M. Hayajneh, Abdelaziz Salama, Sami A. Aldalahmeh
The rapid proliferation of consumer UAVs, or drones, is reshaping the wireless communication landscape. These agile, autonomous devices find new life as UE in cellular networks. This paper explores their integration, emphasizing the myriad applications, standardization efforts, challenges, and research community solutions. Key areas of investigation include the complexities of 3D deployment, channel
-
SAC-based UAV mobile edge computing for energy minimization and secure data transmission Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-09 Xu Zhao, Tianhao Zhao, Feiyu Wang, Yichuan Wu, Maozhen Li
In recent years, the use of UAVs to carry mobile edge computing servers has become an emerging solution to the problem of collaborative ground-to-air communication. However, due to the limited energy consumption of UAVs and the open nature of wireless communication, UAV-based mobile edge computing faces issues such as limited operation time and the potential for insecure connections during data transmission
-
Clustering at the Edge: Load balancing and energy efficiency for the IoT Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-09 Shesha Sreenivasamurthy, Katia Obraczka
This paper explores clustering as a technique to improve energy efficiency for a variety of current and emerging IoT application scenarios. We introduce a novel load balancing clustering algorithm based on Simulated Annealing whose main goal is to increase network lifetime while maintaining adequate sensing coverage in scenarios where sensor nodes produce non-uniform data traffic. Through simulations
-
Multi-content time-series popularity prediction with Multiple-model Transformers in MEC networks Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-08 Zohreh Hajiakhondi Meybodi, Arash Mohammadi, Ming Hou, Elahe Rahimian, Shahin Heidarian, Jamshid Abouei, Konstantinos N. Plataniotis
Coded/uncoded content placement in Mobile Edge Caching (MEC) has evolved as an efficient solution to meet the significant growth of global mobile data traffic by boosting the content diversity in the storage of caching nodes. To meet the dynamic nature of the historical request pattern of multimedia contents, the main focus of recent researches has been shifted to develop data-driven and real-time
-
Flexible zero trust architecture for the cybersecurity of industrial IoT infrastructures Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-08 Claudio Zanasi, Silvio Russo, Michele Colajanni
The growing digitalization of industrial systems and the increasing adoption of cloud technologies pose significant challenges to the secure management of modern industrial infrastructures integrating different Industrial Internet of Things (IIoT). Existing cybersecurity solutions can manage uniform and centralized software systems but are not designed to accommodate the requirements of heterogeneous
-
Analyzing the suitability of IEEE 802.11ah for next generation Internet of Things: A comparative study Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-07 Mehbub Alam, Nurzaman Ahmed, Rakesh Matam, Ferdous Ahmed Barbhuiya
Hyperconnectivity, real-time processing, and interoperable communication facilities are key to the Next Generation (NG) Internet of Things (IoT). However, existing IoT architectures employ a diverse range of communication technologies to support desired data rates and coverage range, making them more complex to manage. The emerging IEEE 802.11ah standard, marketed as WiFi HaLow™, enables seamless communication
-
Cost-effective task partial offloading and resource allocation for multi-vehicle and multi-MEC on B5G/6G edge networks Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-07 Dun Cao, Ning Gu, Meihua Wu, Jin Wang
The Beyond 5th Generation/6th Generation (B5G/6G) wireless communication technology, characterized by ultra-low latency and ultra-multiple connections, and B5G/6G edge networks provide a new approach to solve delay-sensitive and computation-intensive vehicle applications in Intelligent Transportation Systems (ITS). However, due to the high mobility of vehicles, it becomes challenging to provide mobility-enabled
-
Fuzzy cluster-based multi-node charging strategy in mobile sensor networks Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-07 Fang Zhu, Xvmeng Lv, Guoshuai Li, Hao Tang, Feng Guo
Energy is crucial for the continuous operation of rechargeable sensor networks, and efficient energy replenishment strategies are vital for improving network performance. However, existing solutions primarily focus on stationary sensor networks, and there are fewer strategies for energy replenishment in mobile networks. Typically, a Mobile Car (MC) charges individual mobile nodes one to one. To address
-
Asymmetric Autoencoders: An NN alternative for resource-constrained devices in IoT networks Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-07 Mateus S. Gilbert, Marcello L.R. de Campos, Miguel Elias M. Campista
Local computation and communication are known challenges for energy-constrained devices that can become even more complex if we consider data acquisition with noise. Thus, developing systems that address these problems is fundamental when implementing sensing nodes in IoT networks. Fortunately, sensed data has intrinsic redundancies that allow compression with little or no information loss, which can
-
On the performance of the free-access tree algorithm with MPR, SIC, and single-slot memory Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-06 Čedomir Stefanović, Marko Beko, Dejan Vukobratović
In this paper, we investigate performance of a random access scheme that exploits binary-tree algorithm (BTA) with the free access. We assume a scenario where the receiver is capable to perform both multi-packet reception (MPR) and successive interference cancellation (SIC), where for the purpose of the latter only the last received and undecoded signal can be stored. We distinguish between two variants
-
UAV-assisted task offloading system using dung beetle optimization algorithm & deep reinforcement learning Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-05 Degan Zhang, Zhihao Zhang, Jie Zhang, Ting Zhang, Lei Zhang, Hongtao Chen
The current technologies such as computer vision and artificial intelligence are continuously being applied to disaster rescue robots, enabling their adaptability to different environments. However, the challenge arising from this is that these robots will generate computationally intensive tasks, constrained by the size and energy supply of the robots. This limitation leads to a reduction in device
-
Energy efficient clustering for dense wireless sensor network by applying Graph Neural Networks with coverage metrics Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-05 Morteza Saadati, Sayyed Majid Mazinani, Ali Akbar Khazaei, Seyyed Javad Seyyed Mahdavi Chabok
Wireless sensor networks (WSNs) have become increasingly important in recent years due to their ability to monitor and collect data in various environments. However, WSNs often face limitations in terms of their energy resources, making energy efficiency a critical concern when designing WSNs. Clustering and multihop routing are effective methods for maximizing the lifetime of WSNs. The Graph Neural
-
A deep reinforcement learning approach for online mobile charging scheduling with optimal quality of sensing coverage in wireless rechargeable sensor networks Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-03 Jinglin Li, Haoran Wang, Chengpeng Jiang, Wendong Xiao
Mobile charging provides a new energy replenishment technology for Wireless Rechargeable Sensor Network (WRSN), where the Mobile Charger (MC) is employed for charging nodes sequentially according to the mobile charging scheduling result, using node charging timeliness and quality of sensing coverage as the scheduling criteria. Sensing coverage is a critical network property and has received more interest
-
Enhancing quality of service through federated learning in edge-cloud architecture Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-02 Jingwen Zhou, Shantanu Pal, Chengzu Dong, Kaibin Wang
The traditional cloud computing paradigm faces challenges with the increasing number of Artificial Intelligence of Things (AIoT) devices generated at the network edge. Edge computing provides a novel approach to overcoming the limitations of cloud computing by delivering lower service latency and higher quality of service (QoS) to AIoT devices. However, edge computing encounters constraints due to
-
CACHE-IT: A distributed architecture for proactive edge caching in heterogeneous IoT scenarios Ad Hoc Netw. (IF 4.8) Pub Date : 2024-02-02 Ivan Zyrianoff, Lorenzo Gigli, Federico Montori, Luca Sciullo, Carlos Kamienski, Marco Di Felice
The Cloud-to-Things (C2T) continuum combines the proximity of edge infrastructure to the devices with cloud resources to optimize data processing and response time in the Internet of Things (IoT). Proactive edge caching is a potential solution for meeting latency constraints in C2T environments, enabling efficient data processing and storage while reducing redundant computation and cost. However, while
-
-
User security authentication protocol in multi gateway scenarios of the Internet of Things Ad Hoc Netw. (IF 4.8) Pub Date : 2024-01-29 Junhui Zhao, Fanwei Huang, Huanhuan Hu, Longxia Liao, Dongming Wang, Lisheng Fan
5G technology has been applied and popularized, leading to the widespread usage of the Internet of Things (IoT) in various areas such as intelligent transportation, home security, fire protection, industrial monitoring, healthcare, and data collection intelligence. Data sharing is one of the key factors for successful application in these fields. However, real-time data sharing through open channels
-
A Survey on Multi-Dimensional Path Planning Method for Mobile Anchor Node Localization in Wireless Sensor Networks Ad Hoc Netw. (IF 4.8) Pub Date : 2024-01-26 Wenyan Liu, Guo Wei, Ma Zhu
Node localization is one of the key technologies in wireless sensor networks, which provides technical support for many location-based applications. In the process of node localization, due to the limitation of cost and energy consumption of wireless sensor networks, mobile anchor nodes more suitable for localization as a way to reduce costs. However, to the best of our knowledge, there has been no
-
An Ontological Approach to the Detection of Anomalies in Vehicular Ad Hoc Networks Ad Hoc Netw. (IF 4.8) Pub Date : 2024-01-24 Bechir ALAYA, Lamaa SELLAMI, Pascal Lorenz
In a vehicular environment, by becoming connected, vehicles are subject to more threats in comparison to traditional information systems, with the difference that, as a cyber-physical system, anomalies and intrusions could have repercussions in the physical world. In this work, we have developed an ontological anomaly-detection approach (OADA). The anomalies studied in this work mainly concern: network
-
Mobility-aware task offloading in MEC with task migration and result caching Ad Hoc Netw. (IF 4.8) Pub Date : 2024-01-20 Suling Lai, Linyu Huang, Qian Ning, Chengping Zhao
Numerous computation-intensive applications have emerged, demanding lower delay and energy consumption. Multi-access Edge Computing (MEC) provides task offloading services for mobile users (MUs) through proximate MUs, effectively minimizing service delay and energy consumption. However, the challenges of supporting MUs’ mobility persist, and ensuring uninterrupted task offloading services from MEC
-
How does Wi-Fi 6 fare? An industrial outdoor robotic scenario Ad Hoc Netw. (IF 4.8) Pub Date : 2024-01-23 Mina Rady, Oana Iova, Hervé Rivano, Angeliki Deligianni, Leonidas Drikos
Wi-Fi is a standard off-the-shelf solution for industrial robotics. The IEEE 802.11ax amendment extends it to support the 6 GHz band, 160 MHz bandwidth and bit-rates up to 9.6 Gbps. In this article, we evaluate the performance of Wi-Fi 6 compared to Wi-Fi 5 and Wi-Fi 4. We select 9 physical layers (PHYs) representing different Wi-Fi generations and we evaluate their performance in an industrial shipyard
-
Performance of STAR-RIS-aided cooperative NOMA networks under Nakagami-m fading Ad Hoc Netw. (IF 4.8) Pub Date : 2024-01-23 Torebek Toregozhin, Mohd Hamza Naim Shaikh, Akhan Almagambetov, Galymzhan Nauryzbayev
In this work, we investigate the performance of the cooperative non-orthogonal multiple access (CNOMA) downlink wireless communication system assisted by the newly emerged technology of simultaneously transmitting and reflecting reconfigurable intelligent surfaces (STAR-RISs) over Nakagami-m fading channels. Specifically, outage probability (OP), spectral efficiency (SE), and energy efficiency (EE)
-
Secure and privacy-preserving intrusion detection in wireless sensor networks: Federated learning with SCNN-Bi-LSTM for enhanced reliability Ad Hoc Netw. (IF 4.8) Pub Date : 2024-01-20 Syed Muhammad Salman Bukhari, Muhammad Hamza Zafar, Mohamad Abou Houran, Syed Kumayl Raza Moosavi, Majad Mansoor, Muhammad Muaaz, Filippo Sanfilippo
As the digital landscape expands rapidly due to technological advancements, cybersecurity concerns have become more prevalent. Intrusion Detection Systems (IDSs), which are crucial for identifying unusual network traffic indicative of malicious activity, have become a necessity. These systems can be either hardware or software-based. However, traditional IDS models often fail to adequately protect
-
Charging non-deterministic mobile nodes in a transfer learning approach Ad Hoc Netw. (IF 4.8) Pub Date : 2024-01-18 Bohan Wu, Shuqi Tang, Feng Lin
Wireless rechargeable sensor networks (WRSNs) provide a solution to the energy problem in wireless sensor networks by introducing chargers to recharge the sensor nodes with rechargeable batteries. Most of the existing studies on WRSN focus on charging static nodes or nodes with certain mobility, while a few works investigate charging non-deterministic mobile nodes, where the movement pattern of nodes
-
SecureFlow: Knowledge and data-driven ensemble for intrusion detection and dynamic rule configuration in software-defined IoT environment Ad Hoc Netw. (IF 4.8) Pub Date : 2024-01-20 Amritpal Singh, Pushpinder Kaur Chouhan, Gagangeet Singh Aujla
There is a massive growth in the rate of heterogeneous devices configured in the Internet of Things (IoT) environment for efficient communication. The IoT devices are limited in resources, and there are no defined protocols in terms of security during communication in the IoT-based platforms. Several solutions are framed to make communication secure in the IoT ecosystem. However, the existing schemes
-
An efficient energy saving scheme using reinforcement learning for 5G and beyond in H-CRAN Ad Hoc Netw. (IF 4.8) Pub Date : 2024-01-13 Hasna Fourati, Rihab Maaloul, Nessrine Trabelsi, Lamia Chaari, Mohamed Jmaiel
Maximizing the energy saving is one of the most important metrics in 5G and Beyond (B5G) cellular mobile networks. In order to satisfy the diverse requirements of 5G/B5G in dynamic environments, Reinforcement Learning (RL) is proven as a viable approach for solving resource management problems, especially for 5G energy resources. In this paper, we propose to apply the Q-Learning (QL) Reinforcement
-
Adaptive double-loop coverage optimization of underwater wireless directional restricted sensor networks Ad Hoc Netw. (IF 4.8) Pub Date : 2024-01-18 Yongxiang Kuang, Bin Jiang, Xuerong Cui, Shibao Li, Jian Wang, Houbing Song
Underwater Wireless Sensor Networks (UWSNs) play a crucial role in underwater communication system, in which node deployment is a complex problem. Most of the previous researches are based on all-direction underwater acoustic sensors. However, most of the sensors are in limited direction in practical systems. The deployment of directional sensors not only needs to consider its position adjustment,
-
Link characteristics study of ultra-wideband radios Ad Hoc Netw. (IF 4.8) Pub Date : 2024-01-18 Alireza Ansaripour, Milad Heydariaan, Omprakash Gnawali
Comprehending the quality of links in diverse temporal and spatial environments is one of the critical steps in enhancing the performance of wireless applications. The increasing prevalence of ultra-wideband (UWB) radios in Internet of Things (IoT) applications for their precise ranging and localization capabilities, emphasizes the need to investigate the link quality (LQ) of UWB radios across different
-
Eventually-consistent federated scheduling for data center workloads Ad Hoc Netw. (IF 4.8) Pub Date : 2024-01-18 Meghana Thiyyakat, Rishit Chaudhary, Saurav G. Nayak, Adarsh Shetty, Subramaniam Kalambur, Dinkar Sitaram
Data center schedulers operate at unprecedented scales today to accommodate the growing demand for computing and storage power. The challenge that schedulers face is meeting the requirements of scheduling speeds despite the scale. To do so, most scheduler architectures use parallelism. However, these architectures consist of multiple parallel scheduling entities that can only utilize partial knowledge
-
HDS: Heterogeneity-aware dual-interface scheduling for energy-efficient delay-constrained data collection in IoT Ad Hoc Netw. (IF 4.8) Pub Date : 2024-01-15 Hao Chen, Hua Qin, Gelan Yang, Yang Peng
With the advancements in low-power and miniature electronics, various smart devices are deployed and interconnected as the Internet of Things (IoT), collecting a massive amount of data from surrounding environments. Despite the popularity of ZigBee for low-power communications in IoT, WiFi has recently been recommended for data collection in IoT for its high data rate, high reliability, native IP compatibility
-
Exploiting FAS for Cooperative NOMA-based Full-duplex mmWave Networks with Imperfections Ad Hoc Netw. (IF 4.8) Pub Date : 2024-01-10 Leila Tlebaldiyeva, Sultangali Arzykulov, Theodoros A. Tsiftsis, Galymzhan Nauryzbayev
The primary constraints inherent in the millimeter wave (mmWave) technology manifest as high path loss and limited range. As a result, a line-of-sight environment is necessary for a seamless connection between source and destination nodes. At the same time, the prevalence of intervening obstacles becomes increasingly pronounced, owing to the escalating densification of contemporary wireless networks
-
RPRA: Reputation-based prioritization and resource allocation leveraging predictive analytics and vehicular fog computing Ad Hoc Netw. (IF 4.8) Pub Date : 2024-01-11 Muhammad Ilyas Khattak, Yuan Hui, Ayaz Ahmad, Ajmal Khan
Predictive analytics and vehicle fog computing (VFC) have emerged as important methodologies for enabling seamless and instantaneous access to storage and information in real-time and facilitating the execution of resource-hungry smart applications. VFC-enabled IoT devices that use predictive analytics efficiently can process data in a timely manner. However, besides time sensitivity, better security
-
-
SDN-LB: A novel server workload balancing algorithm for IoT video analytics Ad Hoc Netw. (IF 4.8) Pub Date : 2024-01-06 Pouria Pourrashidi Shahrbabaki, Rodolfo W.L. Coutinho, Yousef R. Shayan
The wide deployment of Internet of Things (IoT) cameras combined with powerful deep learning models for object detection and recognition will usher in a new generation of IoT video analytics applications. However, IoT video analytics require intensive computing resources, which often are not present in IoT devices and are provided by edge and/or cloud servers. This paper proposes a hierarchical edge/cloud-based
-
Traffic rate agnostic end-to-end delay optimization using receiver-based adaptive link scheduling in 6TiSCH networks Ad Hoc Netw. (IF 4.8) Pub Date : 2024-01-04 Karnish N.A. Tapadar, Manas Khatua, Venkatesh Tamarapalli
Link scheduling is a key component in 6TiSCH networks. It mainly specifies a node is allowed to transmit packets through which link at what time and in which channel. There exist many link scheduling schemes in the literature for 6TiSCH networks. Among the distributed schemes, the Self-healing distributed scheduling for end-to-end delay optimization (Stratum) was specifically devised to minimize end-to-end