Founded in September 2020,the International SparkLink Alliance(iSLA)now has approximately 1,200 members in diverse sectors including terminals,homes,vehicles,manufacturing,transportation,finance and healthcare.The iSL...Founded in September 2020,the International SparkLink Alliance(iSLA)now has approximately 1,200 members in diverse sectors including terminals,homes,vehicles,manufacturing,transportation,finance and healthcare.The iSLA has established a technical standards system for wireless short-range communication covering full-stack standards such as the end-to-end protocol system.展开更多
This paper proposes a hybrid wireless communication framework that integrates an active intelligent reflecting surface(IRS)with a decode-andforward(DF)relay to enhance spectral efficiency in extended-range scenarios.B...This paper proposes a hybrid wireless communication framework that integrates an active intelligent reflecting surface(IRS)with a decode-andforward(DF)relay to enhance spectral efficiency in extended-range scenarios.By combining the amplification capability of the active IRS and the signal regeneration function of the DF relay,the proposed system effectively mitigates path loss and fading.We derive closed-form upper bounds on the achievable rate and develop an optimal power allocation strategy under a total power constraint.Numerical results demonstrate that the hybrid scheme significantly outperforms conventional passive IRS-assisted or active IRS-only configurations,particularly under conditions of limited reflecting elements or moderate signal-to-noise ratios.展开更多
Reconfigurable Intelligent Surfaces(RISs)enable programmable wireless environments and thus have great potential for enhancing physical layer security.However,the security gain of conventional passive RISs is often li...Reconfigurable Intelligent Surfaces(RISs)enable programmable wireless environments and thus have great potential for enhancing physical layer security.However,the security gain of conventional passive RISs is often limited by the“multiplicative fading”effect through reflection links,which becomes severe in the case of double reflections and significantly degrades the security performance.In this paper,we consider a wireless system that consists of a fixed passive RIS and an Unmanned Aerial Vehicle(UAV)-mounted active RIS,where the UAV-enabled aerial amplification and reflection are exploited to compensate for the multiplicative fading effect.We formulate the problem to maximize the secrecy rate by jointly considering the optimal deployment of the UAV-based active RIS and the reflection coefficients at both the passive and active RISs.To enable efficient algorithm design,we decompose the problem into two layers:the outer layer optimizes the UAV deployment through deep reinforcement learning,while the inner layer solves the beamforming and reflection design using a block coordinate descent framework.Simulation results demonstrate the convergence of the proposed learning procedure,and indicate that the active RIS with learned deployment can effectively enhance the reflection and significantly improve the secrecy rate.展开更多
Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed th...Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed that the global channel state information(CSI)of the eavesdroppers(Eves)was known beforehand,then the optimal relaying and jamming relays were determined.More importantly,the time complexity of selecting optimal jamming relay is O(N^(2)),where N is the maximum number of relays/Eves.In this paper,for the scenario where the source wants to exchange the message with the destination,via relaying scheme due to longer communication distance and limited transmission power,in the presence of multiple Eves,with the assumption of Eves'perfect CSI and average CSI,we propose two kinds of JRJS methods.In particular,the time complexity of finding the optimal jammer can be reduced to O(N).Furthermore,we present a novel JRJS scheme for no CSI of Eves by minimizing the difference between expected signal and interfering signal at the destination.Finally,simulations show that the designed methods are more effective than JRJS and other existing strategies in terms of security performance.展开更多
As an Industrial Wireless Sensor Network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of data aggregation is facing more and more challenges.Currently,the data aggregation protoco...As an Industrial Wireless Sensor Network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of data aggregation is facing more and more challenges.Currently,the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating,alternately,the aim at enhancing the security of data.The performances of the secure data aggregation protocols are the trade-off of several metrics,which involves the transmission/fusion,the energy efficiency and the security in Wireless Sensor Network(WSN).Unfortunately,there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether in IWSN or in WSN.In consideration of IWSN,we firstly review the security requirements and techniques in WSN data aggregation in this paper.Then,we give a holistic overview of the classical secure data aggregation protocols,which are divided into three categories:hop-by-hop encrypted data aggregation,end-to-end encrypted data aggregation and unencrypted secure data aggregation.Along this way,combining with the characteristics of industrial applications,we analyze the pros and cons of the existing security schemes in each category qualitatively,and realize that the security and the energy efficiency are suitable for IWSN.Finally,we make the conclusion about the techniques and approach in these categories,and highlight the future research directions of privacy preserving data aggregation in IWSN.展开更多
Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice techn...Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy.展开更多
The fifth generation (5G) wireless communication is currently a hot research topic and wireless communication systems on high speed railways (HSR) are important applications of 5G technologies. Existing stud- ies ...The fifth generation (5G) wireless communication is currently a hot research topic and wireless communication systems on high speed railways (HSR) are important applications of 5G technologies. Existing stud- ies about 5G wireless systems on high speed railways (HSR) often utilize ideal channel parameters and are usually based on simple scenarios. In this paper, we evaluate the down- link throughput of 5G HSR communication systems on three typical scenarios including urban, cutting and viaduct with three different channel estimators. The channel parameters of each scenario are generated with tapped delay line (TDL) models through ray-tracing sim- ulations, which can be considered as a good match to practical situations. The channel estimators including least square (LS), linear minimum mean square error (LMMSE), and our proposed historical information based ba- sis expansion model (HiBEM). We analyze the performance of the HiBEM estimator in terms of mean square error (MSE) and evaluate the system throughputs with different channel estimates over each scenario. Simulation results are then provided to corroborate our proposed studies. It is shown that our HiBEM estimator outperforms other estimators and that the sys-tem throughput can reach the highest point in the viaduct scenario.展开更多
The unmanned aerial vehicle(UAV)-enabled mobile edge computing(MEC) architecture is expected to be a powerful technique to facilitate 5 G and beyond ubiquitous wireless connectivity and diverse vertical applications a...The unmanned aerial vehicle(UAV)-enabled mobile edge computing(MEC) architecture is expected to be a powerful technique to facilitate 5 G and beyond ubiquitous wireless connectivity and diverse vertical applications and services, anytime and anywhere. Wireless power transfer(WPT) is another promising technology to prolong the operation time of low-power wireless devices in the era of Internet of Things(IoT). However, the integration of WPT and UAV-enabled MEC systems is far from being well studied, especially in dynamic environments. In order to tackle this issue, this paper aims to investigate the stochastic computation offloading and trajectory scheduling for the UAV-enabled wireless powered MEC system. A UAV offers both RF wireless power transmission and computation services for IoT devices. Considering the stochastic task arrivals and random channel conditions, a long-term average energyefficiency(EE) minimization problem is formulated.Due to non-convexity and the time domain coupling of the variables in the formulated problem, a lowcomplexity online computation offloading and trajectory scheduling algorithm(OCOTSA) is proposed by exploiting Lyapunov optimization. Simulation results verify that there exists a balance between EE and the service delay, and demonstrate that the system EE performance obtained by the proposed scheme outperforms other benchmark schemes.展开更多
The traffic with tidal phenomenon in Heterogeneous Wireless Networks(HWNs)has radically increased the complexity of radio resource management and its performance analysis.In this paper,a Simplified Dynamic Hierarchy R...The traffic with tidal phenomenon in Heterogeneous Wireless Networks(HWNs)has radically increased the complexity of radio resource management and its performance analysis.In this paper,a Simplified Dynamic Hierarchy Resource Management(SDHRM)algorithm exploiting the resources dynamically and intelligently is proposed with the consideration of tidal traffic.In network-level resource allocation,the proposed algorithm first adopts wavelet neural network to forecast the traffic of each sub-area and then allocates the resources to those sub-areas to maximise the network utility.In connection-level network selection,based on the above resource allocation and the pre-defined QoS requirement,three typical network selection policies are provided to assign traffic flow to the most appropriate network.Furthermore,based on multidimensional Markov model,we analyse the performance of SDHRM in HWNs with heavy tailed traffic.Numerical results show that our theoretical values coincide with the simulation results and the SDHRM can improve the resource utilization.展开更多
Internet of Things(IoT) is one of the targeted application scenarios of fifth generation(5 G) wireless communication.IoT brings a large amount of data transported on the network.Considering those data,machine learning...Internet of Things(IoT) is one of the targeted application scenarios of fifth generation(5 G) wireless communication.IoT brings a large amount of data transported on the network.Considering those data,machine learning(ML) algorithms can be naturally utilized to make network efficiently and reliably.However,how to fully apply ML to IoT driven wireless network is still open.The fundamental reason is that wireless communication pursuits the high capacity and quality facing the challenges from the varying and fading wireless channel.So in this paper,we explore feasible combination for ML and IoT driven wireless network from wireless channel perspective.Firstly,a three-level structure of wireless channel fading features is defined in order to classify the versatile propagation environments.This three-layer structure includes scenario,meter and wavelength levels.Based on this structure,there are different tasks like service prediction and pushing,self-organization networking,self adapting largescale fading modeling and so on,which can be abstracted into problems like regression,classification,clustering,etc.Then,we introduce corresponding ML methods to different levelsfrom channel perspective,which makes their interdisciplinary research promisingly.展开更多
The sparse nature of location finding in the spatial domain makes it possible to exploit the Compressive Sensing (CS) theory for wireless location.CS-based location algorithm can largely reduce the number of online me...The sparse nature of location finding in the spatial domain makes it possible to exploit the Compressive Sensing (CS) theory for wireless location.CS-based location algorithm can largely reduce the number of online measurements while achieving a high level of localization accuracy,which makes the CS-based solution very attractive for indoor positioning.However,CS theory offers exact deterministic recovery of the sparse or compressible signals under two basic restriction conditions of sparsity and incoherence.In order to achieve a good recovery performance of sparse signals,CS-based solution needs to construct an efficient CS model.The model must satisfy the practical application requirements as well as following theoretical restrictions.In this paper,we propose two novel CS-based location solutions based on two different points of view:the CS-based algorithm with raising-dimension pre-processing and the CS-based algorithm with Minor Component Analysis (MCA).Analytical studies and simulations indicate that the proposed novel schemes achieve much higher localization accuracy.展开更多
Based on the sequence entropy of Shannon information theory, we work on the network coding technology in Wireless Sensor Network (WSN). In this paper, we take into account the similarity of the transmission sequences ...Based on the sequence entropy of Shannon information theory, we work on the network coding technology in Wireless Sensor Network (WSN). In this paper, we take into account the similarity of the transmission sequences at the network coding node in the multi-sources and multi-receivers network in order to compress the data redundancy. Theoretical analysis and computer simulation results show that this proposed scheme not only further improves the efficiency of network transmission and enhances the throughput of the network, but also reduces the energy consumption of sensor nodes and extends the network life cycle.展开更多
The directional neighbor discovery problem,i.e,spatial rendezvous,is a fundamental problem in millimeter wave(mmWave)wireless networks,where directional transmissions are used to overcome the high attenuation.The chal...The directional neighbor discovery problem,i.e,spatial rendezvous,is a fundamental problem in millimeter wave(mmWave)wireless networks,where directional transmissions are used to overcome the high attenuation.The challenge is how to let the transmitter and the receiver beams meet in space under deafness caused by directional transmission and reception,where no control channel,prior information,and coordination are available.In this paper,we present a Hunting based Directional Neighbor Discovery(HDND)scheme for ad hoc mmWave networks,where a node follows a unique sequence to determine its transmission or reception mode,and continuously r0-tates its directional beam to scan the neighborhood for other mmWave nodes.Through a rigorous analysis,we derive the conditions for ensured neighbor discovery,as well as a bound for the worst-case discovery time and the impact of sidelobes.We validate the analysis with extensive simulations and demonstrate the superior perfor-mance of the proposed scheme over several baseline schemes.展开更多
This paper proposes an approach called PC-CORP (Power Control based Cooperative Opportunistic Routing Protocol) for WSN (Wireless Sensor Networks), providing robustness to the random variations in network connectivity...This paper proposes an approach called PC-CORP (Power Control based Cooperative Opportunistic Routing Protocol) for WSN (Wireless Sensor Networks), providing robustness to the random variations in network connectivity while ensuring better data forwarding efficiency in an energy efficient manner. Based on the realistic radio model, we combine the region-based routing, rendezvous scheme, sleep discipline and cooperative communication together to model data forwarding by cross layer design in WSN. At the same time, a lightweight transmission power control algorithm called PC-AIMD (Power Control Additive Increase Multiplicative Decrease) is introduced to utilize the co- operation of relay nodes to improve the forwarding efficiency performance and increase the robustness of the routing protocol. In the simulation, the performance of PC-COPR is investigated in terms of the adaptation of variations in network connectivity and satisfying the QoS requirements of application.展开更多
Wireless sensor network is becoming more and more popular in recent years, but energy- constrained characteristic of sensor nodes is one of the critical issues that we must consider in system design. In this paper, a ...Wireless sensor network is becoming more and more popular in recent years, but energy- constrained characteristic of sensor nodes is one of the critical issues that we must consider in system design. In this paper, a cluster-based virtual VBLAST transmission scheme is proposed to achieve energy savings for energy-constrained wireless sensor networks. In the proposed scheme, instead of using cluster member as cooperative nodes, multiple cluster heads cooperate to form virtual antenna array so that V-BLAST based virtual MIMO transmission can be implemented. Based on the communication energy consumption model, a way to optimize the parameters for the scheme is given. In addition, detailed simulation is performed to evaluate the performance of the proposed scheme for both densely and sparsely deployed sensor networks. Theoretical analysis and simulation results verify the energy efficiency of the proposed scheme.展开更多
This paper investigates on the base stations(BSs) sleeping control and energy saving in wireless network. The objective is to find the sleeping control and energy saving configuration between total power consumption a...This paper investigates on the base stations(BSs) sleeping control and energy saving in wireless network. The objective is to find the sleeping control and energy saving configuration between total power consumption and average video's quality. On the Software Defined Network(SDN) access network architecture, a type of sleeping control and active BSs' optimal transmitting time strategy is considered, the BS sleeps when there is no active users, and wakes up after a period of vacation time. In this paper, we study the active users grouping strategy, In order to spare more BSs into sleeping mode. Then this paper proposes an active BS transmitting time optimal strategy according to the users' Qo S. In the proposed strategy, the active BSs' transmitting time is minimized in order to save energy. This paper employs the mixed integer-programming model to present this optimization problem. Then we utilized a novel algorithm to save the energy in access networks and also meet the Qo S requirements. Both the analytical and simulation results show that the algorithm can effectively save energy in the access network BSs.展开更多
Since the features of low energy consumption and limited power supply are very impor- tant for wireless sensor networks (WSNs), the problems of distributed state estimation with quan- tized innovations are investiga...Since the features of low energy consumption and limited power supply are very impor- tant for wireless sensor networks (WSNs), the problems of distributed state estimation with quan- tized innovations are investigated in this paper. In the first place, the assumptions of prior and posterior probability density function (PDF) with quantized innovations in the previous papers are analyzed. After that, an innovative Gaussian mixture estimator is proposed. On this basis, this paper presents a Gaussian mixture state estimation algorithm based on quantized innovations for WSNs. In order to evaluate and compare the performance of this kind of state estimation algo- rithms for WSNs, the posterior Cram6r-Rao lower bound (CRLB) with quantized innovations is put forward. Performance analysis and simulations show that the proposed Gaussian mixture state estimation algorithm is efficient than the others under the same number of quantization levels and the performance of these algorithms can be benchmarked by the theoretical lower bound.展开更多
In this paper, we propose two novel efficient scheduling schemes with network coding in multi-relay wireless network to maximize the transmission efficiency. The first one uses adaptive forwarding with network coding(...In this paper, we propose two novel efficient scheduling schemes with network coding in multi-relay wireless network to maximize the transmission efficiency. The first one uses adaptive forwarding with network coding(AF-NC), in which each relay adaptively calculates the number of packets having innovative information according to the feedback from the sink. With AF-NC, duplicate packets are not sent, and the total number of time slots needed to complete transmission can be significantly reduced. The second scheme, named adaptive forwarding with network coding and retransmission(AFR-NC), combines AF-NC with automatic repeat request(ARQ) to guarantee reliable end-to-end communication with limited resource occupation. Numerical results show that compared with simple forwarding with network coding(F-NC), AF-NC has close successful delivery rate with dramatically less time slots, while AFR-NC achieves strict reliability with limited resource cost.展开更多
A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, give...A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously.展开更多
To cope with the arbitrariness of the network delays,a novel method,referred to as the composite particle filter approach based on variational Bayesian(VB-CPF),is proposed herein to estimate the clock skew and clock o...To cope with the arbitrariness of the network delays,a novel method,referred to as the composite particle filter approach based on variational Bayesian(VB-CPF),is proposed herein to estimate the clock skew and clock offset in wireless sensor networks.VB-CPF is an improvement of the Gaussian mixture kalman particle filter(GMKPF)algorithm.In GMKPF,Expectation-Maximization(EM)algorithm needs to determine the number of mixture components in advance,and it is easy to generate overfitting and underfitting.Variational Bayesian EM(VB-EM)algorithm is introduced in this paper to determine the number of mixture components adaptively according to the observations.Moreover,to solve the problem of data packet loss caused by unreliable links,we propose a robust time synchronization(RTS)method in this paper.RTS establishes an autoregressive model for clock skew,and calculates the clock parameters based on the established autoregressive model in case of packet loss.The final simulation results illustrate that VB-CPF yields much more accurate results relative to GMKPF when the network delays are modeled in terms of an asymmetric Gaussian distribution.Moreover,RTS shows good robustness to the continuous and random dropout of time messages.展开更多
文摘Founded in September 2020,the International SparkLink Alliance(iSLA)now has approximately 1,200 members in diverse sectors including terminals,homes,vehicles,manufacturing,transportation,finance and healthcare.The iSLA has established a technical standards system for wireless short-range communication covering full-stack standards such as the end-to-end protocol system.
基金supported in part by National Key R&D Program of China(2022YFB2903500)NSFC Grant 62331022,Grant 62371289+4 种基金Grant 624B2094in part by the Shanghai Jiao Tong University 2030 Initiative,and the Guangdong Science and Technology program under grant 2022A0505050011in part by the Outstanding Doctoral Graduates Development Scholarship of Shanghai Jiao Tong Universityin part by Shanghai Kewei under Grant 22JC1404000Grant 24DP1500500.
文摘This paper proposes a hybrid wireless communication framework that integrates an active intelligent reflecting surface(IRS)with a decode-andforward(DF)relay to enhance spectral efficiency in extended-range scenarios.By combining the amplification capability of the active IRS and the signal regeneration function of the DF relay,the proposed system effectively mitigates path loss and fading.We derive closed-form upper bounds on the achievable rate and develop an optimal power allocation strategy under a total power constraint.Numerical results demonstrate that the hybrid scheme significantly outperforms conventional passive IRS-assisted or active IRS-only configurations,particularly under conditions of limited reflecting elements or moderate signal-to-noise ratios.
基金co-supported by the National Natural Science Foundation of China(Nos.62301431 and U22B2013)the Guangdong Basic and Applied Basic Research Foundation,China(No.2024A1515030215)+3 种基金the Key Research and Development Program of Shaanxi Province,China(No.2023-GHZD-05)the Innovation Capability Support Program of Shaanxi Province,China(No.2021TD-08)the National Key Laboratory of Wireless Communications Foundation,China(No.IFN20230111)the Open Research Subject of State Key Laboratory of Intelligent Game,China(No.ZBKF-24-04).
文摘Reconfigurable Intelligent Surfaces(RISs)enable programmable wireless environments and thus have great potential for enhancing physical layer security.However,the security gain of conventional passive RISs is often limited by the“multiplicative fading”effect through reflection links,which becomes severe in the case of double reflections and significantly degrades the security performance.In this paper,we consider a wireless system that consists of a fixed passive RIS and an Unmanned Aerial Vehicle(UAV)-mounted active RIS,where the UAV-enabled aerial amplification and reflection are exploited to compensate for the multiplicative fading effect.We formulate the problem to maximize the secrecy rate by jointly considering the optimal deployment of the UAV-based active RIS and the reflection coefficients at both the passive and active RISs.To enable efficient algorithm design,we decompose the problem into two layers:the outer layer optimizes the UAV deployment through deep reinforcement learning,while the inner layer solves the beamforming and reflection design using a block coordinate descent framework.Simulation results demonstrate the convergence of the proposed learning procedure,and indicate that the active RIS with learned deployment can effectively enhance the reflection and significantly improve the secrecy rate.
基金supported by the National Natural Science Foundation of China with Grants 62301076 and 62321001。
文摘Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed that the global channel state information(CSI)of the eavesdroppers(Eves)was known beforehand,then the optimal relaying and jamming relays were determined.More importantly,the time complexity of selecting optimal jamming relay is O(N^(2)),where N is the maximum number of relays/Eves.In this paper,for the scenario where the source wants to exchange the message with the destination,via relaying scheme due to longer communication distance and limited transmission power,in the presence of multiple Eves,with the assumption of Eves'perfect CSI and average CSI,we propose two kinds of JRJS methods.In particular,the time complexity of finding the optimal jammer can be reduced to O(N).Furthermore,we present a novel JRJS scheme for no CSI of Eves by minimizing the difference between expected signal and interfering signal at the destination.Finally,simulations show that the designed methods are more effective than JRJS and other existing strategies in terms of security performance.
基金partially supported by the National Natural Science Foundation of China(61571004)the Shanghai Natural Science Foundation(No.17ZR1429100)+1 种基金the National Science and Technology Major Project of China(No.2018ZX03001017-004)the Scientific Instrument Developing Project of the Chinese Academy of Sciences(No.YJKYYQ20170074).
文摘As an Industrial Wireless Sensor Network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of data aggregation is facing more and more challenges.Currently,the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating,alternately,the aim at enhancing the security of data.The performances of the secure data aggregation protocols are the trade-off of several metrics,which involves the transmission/fusion,the energy efficiency and the security in Wireless Sensor Network(WSN).Unfortunately,there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether in IWSN or in WSN.In consideration of IWSN,we firstly review the security requirements and techniques in WSN data aggregation in this paper.Then,we give a holistic overview of the classical secure data aggregation protocols,which are divided into three categories:hop-by-hop encrypted data aggregation,end-to-end encrypted data aggregation and unencrypted secure data aggregation.Along this way,combining with the characteristics of industrial applications,we analyze the pros and cons of the existing security schemes in each category qualitatively,and realize that the security and the energy efficiency are suitable for IWSN.Finally,we make the conclusion about the techniques and approach in these categories,and highlight the future research directions of privacy preserving data aggregation in IWSN.
基金sponsored by the National Key R&D Program of China(No.2018YFB1003201)the National Natural Science Foundation of China(No.61672296,No.61602261)Major Natural Science Research Projects in Colleges and Universities of Jiangsu Province(No.18KJA520008)
文摘Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy.
基金supported by the National Natural Science Foundation of China(Grant Nos.61522109,61671253,61571037and 91738201)the Fundamental Research Funds for the Central Universities(No.2016JBZ006)+1 种基金the Natural Science Foundation of Jiangsu Province(Grant Nos.BK20150040and BK20171446)the Key Project of Natural Science Research of Higher Education Institutions of Jiangsu Province(No.15KJA510003)
文摘The fifth generation (5G) wireless communication is currently a hot research topic and wireless communication systems on high speed railways (HSR) are important applications of 5G technologies. Existing stud- ies about 5G wireless systems on high speed railways (HSR) often utilize ideal channel parameters and are usually based on simple scenarios. In this paper, we evaluate the down- link throughput of 5G HSR communication systems on three typical scenarios including urban, cutting and viaduct with three different channel estimators. The channel parameters of each scenario are generated with tapped delay line (TDL) models through ray-tracing sim- ulations, which can be considered as a good match to practical situations. The channel estimators including least square (LS), linear minimum mean square error (LMMSE), and our proposed historical information based ba- sis expansion model (HiBEM). We analyze the performance of the HiBEM estimator in terms of mean square error (MSE) and evaluate the system throughputs with different channel estimates over each scenario. Simulation results are then provided to corroborate our proposed studies. It is shown that our HiBEM estimator outperforms other estimators and that the sys-tem throughput can reach the highest point in the viaduct scenario.
基金supported in part by the U.S. National Science Foundation under Grant CNS-2007995in part by the National Natural Science Foundation of China under Grant 92067201,62171231in part by Jiangsu Provincial Key Research and Development Program under Grant BE2020084-1。
文摘The unmanned aerial vehicle(UAV)-enabled mobile edge computing(MEC) architecture is expected to be a powerful technique to facilitate 5 G and beyond ubiquitous wireless connectivity and diverse vertical applications and services, anytime and anywhere. Wireless power transfer(WPT) is another promising technology to prolong the operation time of low-power wireless devices in the era of Internet of Things(IoT). However, the integration of WPT and UAV-enabled MEC systems is far from being well studied, especially in dynamic environments. In order to tackle this issue, this paper aims to investigate the stochastic computation offloading and trajectory scheduling for the UAV-enabled wireless powered MEC system. A UAV offers both RF wireless power transmission and computation services for IoT devices. Considering the stochastic task arrivals and random channel conditions, a long-term average energyefficiency(EE) minimization problem is formulated.Due to non-convexity and the time domain coupling of the variables in the formulated problem, a lowcomplexity online computation offloading and trajectory scheduling algorithm(OCOTSA) is proposed by exploiting Lyapunov optimization. Simulation results verify that there exists a balance between EE and the service delay, and demonstrate that the system EE performance obtained by the proposed scheme outperforms other benchmark schemes.
基金ACKNOWLEDGEMENT This work was supported by the National Na-tural Science Foundation of China under Gra-nts No.61172079,61231008,No.61201141,No.61301176the National Basic Research Program of China(973 Program)under Grant No.2009CB320404+2 种基金the 111 Project under Gr-ant No.B08038the National Science and Tec-hnology Major Project under Grant No.2012-ZX03002009-003,No.2012ZX03004002-003and the Shaanxi Province Science and Techno-logy Research and Development Program un-der Grant No.2011KJXX-40.
文摘The traffic with tidal phenomenon in Heterogeneous Wireless Networks(HWNs)has radically increased the complexity of radio resource management and its performance analysis.In this paper,a Simplified Dynamic Hierarchy Resource Management(SDHRM)algorithm exploiting the resources dynamically and intelligently is proposed with the consideration of tidal traffic.In network-level resource allocation,the proposed algorithm first adopts wavelet neural network to forecast the traffic of each sub-area and then allocates the resources to those sub-areas to maximise the network utility.In connection-level network selection,based on the above resource allocation and the pre-defined QoS requirement,three typical network selection policies are provided to assign traffic flow to the most appropriate network.Furthermore,based on multidimensional Markov model,we analyse the performance of SDHRM in HWNs with heavy tailed traffic.Numerical results show that our theoretical values coincide with the simulation results and the SDHRM can improve the resource utilization.
基金supported by National Science and Technology Major Program of the Ministry of Science and Technology(No.2018ZX03001031)Key program of Beijing Municipal Natural Science Foundation(No.L172030)+1 种基金Beijing unicipal Science and Technology Commission Project(No.Z181100003218007)National Key Technology Research and Development Program of the Ministry of Science and Technology of China(NO.2012BAF14B01)
文摘Internet of Things(IoT) is one of the targeted application scenarios of fifth generation(5 G) wireless communication.IoT brings a large amount of data transported on the network.Considering those data,machine learning(ML) algorithms can be naturally utilized to make network efficiently and reliably.However,how to fully apply ML to IoT driven wireless network is still open.The fundamental reason is that wireless communication pursuits the high capacity and quality facing the challenges from the varying and fading wireless channel.So in this paper,we explore feasible combination for ML and IoT driven wireless network from wireless channel perspective.Firstly,a three-level structure of wireless channel fading features is defined in order to classify the versatile propagation environments.This three-layer structure includes scenario,meter and wavelength levels.Based on this structure,there are different tasks like service prediction and pushing,self-organization networking,self adapting largescale fading modeling and so on,which can be abstracted into problems like regression,classification,clustering,etc.Then,we introduce corresponding ML methods to different levelsfrom channel perspective,which makes their interdisciplinary research promisingly.
基金supported by the National Natural Science Foundation of China under Grant No.61001119the Fund for Creative Research Groups of China under Grant No.61121001
文摘The sparse nature of location finding in the spatial domain makes it possible to exploit the Compressive Sensing (CS) theory for wireless location.CS-based location algorithm can largely reduce the number of online measurements while achieving a high level of localization accuracy,which makes the CS-based solution very attractive for indoor positioning.However,CS theory offers exact deterministic recovery of the sparse or compressible signals under two basic restriction conditions of sparsity and incoherence.In order to achieve a good recovery performance of sparse signals,CS-based solution needs to construct an efficient CS model.The model must satisfy the practical application requirements as well as following theoretical restrictions.In this paper,we propose two novel CS-based location solutions based on two different points of view:the CS-based algorithm with raising-dimension pre-processing and the CS-based algorithm with Minor Component Analysis (MCA).Analytical studies and simulations indicate that the proposed novel schemes achieve much higher localization accuracy.
基金Supported by Major Projects of the National Science and Technology (2010ZX03003-003-02) National 973 Key Project (2011CB302903)
文摘Based on the sequence entropy of Shannon information theory, we work on the network coding technology in Wireless Sensor Network (WSN). In this paper, we take into account the similarity of the transmission sequences at the network coding node in the multi-sources and multi-receivers network in order to compress the data redundancy. Theoretical analysis and computer simulation results show that this proposed scheme not only further improves the efficiency of network transmission and enhances the throughput of the network, but also reduces the energy consumption of sensor nodes and extends the network life cycle.
基金supported in part by the NSF under Grants ECCS-1923717 and CNS-1320472the Wireless Engineering Research and Education Center,Auburn University,Auburn,AL,USA.
文摘The directional neighbor discovery problem,i.e,spatial rendezvous,is a fundamental problem in millimeter wave(mmWave)wireless networks,where directional transmissions are used to overcome the high attenuation.The challenge is how to let the transmitter and the receiver beams meet in space under deafness caused by directional transmission and reception,where no control channel,prior information,and coordination are available.In this paper,we present a Hunting based Directional Neighbor Discovery(HDND)scheme for ad hoc mmWave networks,where a node follows a unique sequence to determine its transmission or reception mode,and continuously r0-tates its directional beam to scan the neighborhood for other mmWave nodes.Through a rigorous analysis,we derive the conditions for ensured neighbor discovery,as well as a bound for the worst-case discovery time and the impact of sidelobes.We validate the analysis with extensive simulations and demonstrate the superior perfor-mance of the proposed scheme over several baseline schemes.
基金Supported by 973 Program (2007CB310607)National Natural Science Foundation of China (60772062)the Open Research Fund of National Mobile Communications Research Laboratory, Southeast University (N200813)
文摘This paper proposes an approach called PC-CORP (Power Control based Cooperative Opportunistic Routing Protocol) for WSN (Wireless Sensor Networks), providing robustness to the random variations in network connectivity while ensuring better data forwarding efficiency in an energy efficient manner. Based on the realistic radio model, we combine the region-based routing, rendezvous scheme, sleep discipline and cooperative communication together to model data forwarding by cross layer design in WSN. At the same time, a lightweight transmission power control algorithm called PC-AIMD (Power Control Additive Increase Multiplicative Decrease) is introduced to utilize the co- operation of relay nodes to improve the forwarding efficiency performance and increase the robustness of the routing protocol. In the simulation, the performance of PC-COPR is investigated in terms of the adaptation of variations in network connectivity and satisfying the QoS requirements of application.
文摘Wireless sensor network is becoming more and more popular in recent years, but energy- constrained characteristic of sensor nodes is one of the critical issues that we must consider in system design. In this paper, a cluster-based virtual VBLAST transmission scheme is proposed to achieve energy savings for energy-constrained wireless sensor networks. In the proposed scheme, instead of using cluster member as cooperative nodes, multiple cluster heads cooperate to form virtual antenna array so that V-BLAST based virtual MIMO transmission can be implemented. Based on the communication energy consumption model, a way to optimize the parameters for the scheme is given. In addition, detailed simulation is performed to evaluate the performance of the proposed scheme for both densely and sparsely deployed sensor networks. Theoretical analysis and simulation results verify the energy efficiency of the proposed scheme.
基金supported by the National High-Tech R&D Program (863 Program2015AA01A705)in part by Beijing Municipal Commission of Education (The City's Vehicle Sensing Grid Construction Based on Public Transportation Network)
文摘This paper investigates on the base stations(BSs) sleeping control and energy saving in wireless network. The objective is to find the sleeping control and energy saving configuration between total power consumption and average video's quality. On the Software Defined Network(SDN) access network architecture, a type of sleeping control and active BSs' optimal transmitting time strategy is considered, the BS sleeps when there is no active users, and wakes up after a period of vacation time. In this paper, we study the active users grouping strategy, In order to spare more BSs into sleeping mode. Then this paper proposes an active BS transmitting time optimal strategy according to the users' Qo S. In the proposed strategy, the active BSs' transmitting time is minimized in order to save energy. This paper employs the mixed integer-programming model to present this optimization problem. Then we utilized a novel algorithm to save the energy in access networks and also meet the Qo S requirements. Both the analytical and simulation results show that the algorithm can effectively save energy in the access network BSs.
基金jointly supported by the National Natural Science Foundation of China(No.61175008)State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System of China(No.CEMEE2014K0301A)the Natural Science Foundation of Jiangsu Province of China(No.BK20140896)
文摘Since the features of low energy consumption and limited power supply are very impor- tant for wireless sensor networks (WSNs), the problems of distributed state estimation with quan- tized innovations are investigated in this paper. In the first place, the assumptions of prior and posterior probability density function (PDF) with quantized innovations in the previous papers are analyzed. After that, an innovative Gaussian mixture estimator is proposed. On this basis, this paper presents a Gaussian mixture state estimation algorithm based on quantized innovations for WSNs. In order to evaluate and compare the performance of this kind of state estimation algo- rithms for WSNs, the posterior Cram6r-Rao lower bound (CRLB) with quantized innovations is put forward. Performance analysis and simulations show that the proposed Gaussian mixture state estimation algorithm is efficient than the others under the same number of quantization levels and the performance of these algorithms can be benchmarked by the theoretical lower bound.
基金the National Natural Science Foundation of China(Nos.61102051,61221001 and 61301117)the National High Technology Research and Development Program(863)of China(Nos.2012AA011701 and 2012AA121601)+1 种基金the Shanghai Jiao Tong University Science and Technology Innovation Foundation(No.AF0300021)the Shanghai Key Laboratory Funding(No.12DZ2272600)
文摘In this paper, we propose two novel efficient scheduling schemes with network coding in multi-relay wireless network to maximize the transmission efficiency. The first one uses adaptive forwarding with network coding(AF-NC), in which each relay adaptively calculates the number of packets having innovative information according to the feedback from the sink. With AF-NC, duplicate packets are not sent, and the total number of time slots needed to complete transmission can be significantly reduced. The second scheme, named adaptive forwarding with network coding and retransmission(AFR-NC), combines AF-NC with automatic repeat request(ARQ) to guarantee reliable end-to-end communication with limited resource occupation. Numerical results show that compared with simple forwarding with network coding(F-NC), AF-NC has close successful delivery rate with dramatically less time slots, while AFR-NC achieves strict reliability with limited resource cost.
基金Sponsored by the National Natural Science Foundation of China (No. 60973139, 61170065, 61171053, 61003039,61003236)the Natural Science Foundation of Jiangsu Province (BK2011755, BK2012436)+3 种基金Scientific & Technological Support Project of Jiangsu Province (BE2011844,BE2011189)Jiangsu Provincial Research Scheme of Natural Science for Higher Education Institutions(12KJB520009)Science & Technology Innovation Fundfor Higher Education Institutions of Jiangsu Province(CXZZ11-0405)the Peak of Six Major Talent inJiangsu Province (2010DZXX026)
文摘A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously.
基金This work was supported by the National Natural Science Foundation of China(No.61672299)the Natural Science Foundation of the Higher Education Institutions of Jiangsu Province of China(No.18KJB520035)+2 种基金the Youth Foundation of Nanjing University of Finance and Economics(No.L-JXL18002)the Youth Foundation of Nanjing University of Posts and Telecommunications(No.NY218142)the Natural Science Foundation of Jiangsu Province(No.BK20160913).
文摘To cope with the arbitrariness of the network delays,a novel method,referred to as the composite particle filter approach based on variational Bayesian(VB-CPF),is proposed herein to estimate the clock skew and clock offset in wireless sensor networks.VB-CPF is an improvement of the Gaussian mixture kalman particle filter(GMKPF)algorithm.In GMKPF,Expectation-Maximization(EM)algorithm needs to determine the number of mixture components in advance,and it is easy to generate overfitting and underfitting.Variational Bayesian EM(VB-EM)algorithm is introduced in this paper to determine the number of mixture components adaptively according to the observations.Moreover,to solve the problem of data packet loss caused by unreliable links,we propose a robust time synchronization(RTS)method in this paper.RTS establishes an autoregressive model for clock skew,and calculates the clock parameters based on the established autoregressive model in case of packet loss.The final simulation results illustrate that VB-CPF yields much more accurate results relative to GMKPF when the network delays are modeled in terms of an asymmetric Gaussian distribution.Moreover,RTS shows good robustness to the continuous and random dropout of time messages.