Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed th...Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed that the global channel state information(CSI)of the eavesdroppers(Eves)was known beforehand,then the optimal relaying and jamming relays were determined.More importantly,the time complexity of selecting optimal jamming relay is O(N^(2)),where N is the maximum number of relays/Eves.In this paper,for the scenario where the source wants to exchange the message with the destination,via relaying scheme due to longer communication distance and limited transmission power,in the presence of multiple Eves,with the assumption of Eves'perfect CSI and average CSI,we propose two kinds of JRJS methods.In particular,the time complexity of finding the optimal jammer can be reduced to O(N).Furthermore,we present a novel JRJS scheme for no CSI of Eves by minimizing the difference between expected signal and interfering signal at the destination.Finally,simulations show that the designed methods are more effective than JRJS and other existing strategies in terms of security performance.展开更多
This paper investigates a wireless powered and backscattering enabled sensor network based on the non-linear energy harvesting model, where the power beacon(PB) delivers energy signals to wireless sensors to enable th...This paper investigates a wireless powered and backscattering enabled sensor network based on the non-linear energy harvesting model, where the power beacon(PB) delivers energy signals to wireless sensors to enable their passive backscattering and active transmission to the access point(AP). We propose an efficient time scheduling scheme for network performance enhancement, based on which each sensor can always harvest energy from the PB over the entire block except its time slots allocated for passive and active information delivery. Considering the PB and wireless sensors are from two selfish service providers, we use the Stackelberg game to model the energy interaction among them. To address the non-convexity of the leader-level problem, we propose to decompose the original problem into two subproblems and solve them iteratively in an alternating manner. Specifically, the successive convex approximation, semi-definite relaxation(SDR) and variable substitution techniques are applied to find a nearoptimal solution. To evaluate the performance loss caused by the interaction between two providers, we further investigate the social welfare maximization problem. Numerical results demonstrate that compared to the benchmark schemes, the proposed scheme can achieve up to 35.4% and 38.7% utility gain for the leader and the follower, respectively.展开更多
To solve the problems of pulse broadening and channel fading caused by atmospheric scattering and turbulence,multiple-input multiple-output(MIMO)technology is a valid way.A wireless ultraviolet(UV)MIMO channel estimat...To solve the problems of pulse broadening and channel fading caused by atmospheric scattering and turbulence,multiple-input multiple-output(MIMO)technology is a valid way.A wireless ultraviolet(UV)MIMO channel estimation approach based on deep learning is provided in this paper.The deep learning is used to convert the channel estimation into the image processing.By combining convolutional neural network(CNN)and attention mechanism(AM),the learning model is designed to extract the depth features of channel state information(CSI).The simulation results show that the approach proposed in this paper can perform channel estimation effectively for UV MIMO communication and can better suppress the fading caused by scattering and turbulence in the MIMO scattering channel.展开更多
As the wireless communication network undergoes continuous expansion,the challenges associated with network management and optimization are becoming increasingly complex.To address these challenges,the emerging artifi...As the wireless communication network undergoes continuous expansion,the challenges associated with network management and optimization are becoming increasingly complex.To address these challenges,the emerging artificial intelligence(AI)and machine learning(ML)technologies have been introduced as a powerful solution.They empower wireless networks to operate autonomously,predictively,ondemand,and with smart functionality,offering a promising resolution to intricate optimization problems.This paper aims to delve into the prevalent applications of AI/ML technologies in the optimization of wireless networks.The paper not only provides insights into the current landscape but also outlines our vision for the future and considerations regarding the development of an intelligent 6G network.展开更多
In this paper,we present a novel and robust nonlinear precoding(NLP)design and detection structure specifically tailored for multiple-input multipleoutput space division multiple access(MIMO-SDMA)systems toward 6G wir...In this paper,we present a novel and robust nonlinear precoding(NLP)design and detection structure specifically tailored for multiple-input multipleoutput space division multiple access(MIMO-SDMA)systems toward 6G wireless.Our approach aims to effectively mitigate the impact of imperfect channel estimation by leveraging the channel fluctuation mean square error(MSE)for reconstructing a highly accurate precoding matrix at the transmitter.Furthermore,we introduce a simplified receiver structure that eliminates the need for equalization,resulting in reduced interference and notable enhancements in overall system performance.We conduct both computer simulations and experimental tests to validate the efficacy of our proposed approach.The results reveals that the proposed NLP scheme offers significant performance improvements,making it particularly well-suited for the forthcoming 6G wireless.展开更多
As an Industrial Wireless Sensor Network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of data aggregation is facing more and more challenges.Currently,the data aggregation protoco...As an Industrial Wireless Sensor Network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of data aggregation is facing more and more challenges.Currently,the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating,alternately,the aim at enhancing the security of data.The performances of the secure data aggregation protocols are the trade-off of several metrics,which involves the transmission/fusion,the energy efficiency and the security in Wireless Sensor Network(WSN).Unfortunately,there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether in IWSN or in WSN.In consideration of IWSN,we firstly review the security requirements and techniques in WSN data aggregation in this paper.Then,we give a holistic overview of the classical secure data aggregation protocols,which are divided into three categories:hop-by-hop encrypted data aggregation,end-to-end encrypted data aggregation and unencrypted secure data aggregation.Along this way,combining with the characteristics of industrial applications,we analyze the pros and cons of the existing security schemes in each category qualitatively,and realize that the security and the energy efficiency are suitable for IWSN.Finally,we make the conclusion about the techniques and approach in these categories,and highlight the future research directions of privacy preserving data aggregation in IWSN.展开更多
Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice techn...Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy.展开更多
The fifth generation (5G) wireless communication is currently a hot research topic and wireless communication systems on high speed railways (HSR) are important applications of 5G technologies. Existing stud- ies ...The fifth generation (5G) wireless communication is currently a hot research topic and wireless communication systems on high speed railways (HSR) are important applications of 5G technologies. Existing stud- ies about 5G wireless systems on high speed railways (HSR) often utilize ideal channel parameters and are usually based on simple scenarios. In this paper, we evaluate the down- link throughput of 5G HSR communication systems on three typical scenarios including urban, cutting and viaduct with three different channel estimators. The channel parameters of each scenario are generated with tapped delay line (TDL) models through ray-tracing sim- ulations, which can be considered as a good match to practical situations. The channel estimators including least square (LS), linear minimum mean square error (LMMSE), and our proposed historical information based ba- sis expansion model (HiBEM). We analyze the performance of the HiBEM estimator in terms of mean square error (MSE) and evaluate the system throughputs with different channel estimates over each scenario. Simulation results are then provided to corroborate our proposed studies. It is shown that our HiBEM estimator outperforms other estimators and that the sys-tem throughput can reach the highest point in the viaduct scenario.展开更多
The unmanned aerial vehicle(UAV)-enabled mobile edge computing(MEC) architecture is expected to be a powerful technique to facilitate 5 G and beyond ubiquitous wireless connectivity and diverse vertical applications a...The unmanned aerial vehicle(UAV)-enabled mobile edge computing(MEC) architecture is expected to be a powerful technique to facilitate 5 G and beyond ubiquitous wireless connectivity and diverse vertical applications and services, anytime and anywhere. Wireless power transfer(WPT) is another promising technology to prolong the operation time of low-power wireless devices in the era of Internet of Things(IoT). However, the integration of WPT and UAV-enabled MEC systems is far from being well studied, especially in dynamic environments. In order to tackle this issue, this paper aims to investigate the stochastic computation offloading and trajectory scheduling for the UAV-enabled wireless powered MEC system. A UAV offers both RF wireless power transmission and computation services for IoT devices. Considering the stochastic task arrivals and random channel conditions, a long-term average energyefficiency(EE) minimization problem is formulated.Due to non-convexity and the time domain coupling of the variables in the formulated problem, a lowcomplexity online computation offloading and trajectory scheduling algorithm(OCOTSA) is proposed by exploiting Lyapunov optimization. Simulation results verify that there exists a balance between EE and the service delay, and demonstrate that the system EE performance obtained by the proposed scheme outperforms other benchmark schemes.展开更多
The traffic with tidal phenomenon in Heterogeneous Wireless Networks(HWNs)has radically increased the complexity of radio resource management and its performance analysis.In this paper,a Simplified Dynamic Hierarchy R...The traffic with tidal phenomenon in Heterogeneous Wireless Networks(HWNs)has radically increased the complexity of radio resource management and its performance analysis.In this paper,a Simplified Dynamic Hierarchy Resource Management(SDHRM)algorithm exploiting the resources dynamically and intelligently is proposed with the consideration of tidal traffic.In network-level resource allocation,the proposed algorithm first adopts wavelet neural network to forecast the traffic of each sub-area and then allocates the resources to those sub-areas to maximise the network utility.In connection-level network selection,based on the above resource allocation and the pre-defined QoS requirement,three typical network selection policies are provided to assign traffic flow to the most appropriate network.Furthermore,based on multidimensional Markov model,we analyse the performance of SDHRM in HWNs with heavy tailed traffic.Numerical results show that our theoretical values coincide with the simulation results and the SDHRM can improve the resource utilization.展开更多
Internet of Things(IoT) is one of the targeted application scenarios of fifth generation(5 G) wireless communication.IoT brings a large amount of data transported on the network.Considering those data,machine learning...Internet of Things(IoT) is one of the targeted application scenarios of fifth generation(5 G) wireless communication.IoT brings a large amount of data transported on the network.Considering those data,machine learning(ML) algorithms can be naturally utilized to make network efficiently and reliably.However,how to fully apply ML to IoT driven wireless network is still open.The fundamental reason is that wireless communication pursuits the high capacity and quality facing the challenges from the varying and fading wireless channel.So in this paper,we explore feasible combination for ML and IoT driven wireless network from wireless channel perspective.Firstly,a three-level structure of wireless channel fading features is defined in order to classify the versatile propagation environments.This three-layer structure includes scenario,meter and wavelength levels.Based on this structure,there are different tasks like service prediction and pushing,self-organization networking,self adapting largescale fading modeling and so on,which can be abstracted into problems like regression,classification,clustering,etc.Then,we introduce corresponding ML methods to different levelsfrom channel perspective,which makes their interdisciplinary research promisingly.展开更多
The sparse nature of location finding in the spatial domain makes it possible to exploit the Compressive Sensing (CS) theory for wireless location.CS-based location algorithm can largely reduce the number of online me...The sparse nature of location finding in the spatial domain makes it possible to exploit the Compressive Sensing (CS) theory for wireless location.CS-based location algorithm can largely reduce the number of online measurements while achieving a high level of localization accuracy,which makes the CS-based solution very attractive for indoor positioning.However,CS theory offers exact deterministic recovery of the sparse or compressible signals under two basic restriction conditions of sparsity and incoherence.In order to achieve a good recovery performance of sparse signals,CS-based solution needs to construct an efficient CS model.The model must satisfy the practical application requirements as well as following theoretical restrictions.In this paper,we propose two novel CS-based location solutions based on two different points of view:the CS-based algorithm with raising-dimension pre-processing and the CS-based algorithm with Minor Component Analysis (MCA).Analytical studies and simulations indicate that the proposed novel schemes achieve much higher localization accuracy.展开更多
Based on the sequence entropy of Shannon information theory, we work on the network coding technology in Wireless Sensor Network (WSN). In this paper, we take into account the similarity of the transmission sequences ...Based on the sequence entropy of Shannon information theory, we work on the network coding technology in Wireless Sensor Network (WSN). In this paper, we take into account the similarity of the transmission sequences at the network coding node in the multi-sources and multi-receivers network in order to compress the data redundancy. Theoretical analysis and computer simulation results show that this proposed scheme not only further improves the efficiency of network transmission and enhances the throughput of the network, but also reduces the energy consumption of sensor nodes and extends the network life cycle.展开更多
The directional neighbor discovery problem,i.e,spatial rendezvous,is a fundamental problem in millimeter wave(mmWave)wireless networks,where directional transmissions are used to overcome the high attenuation.The chal...The directional neighbor discovery problem,i.e,spatial rendezvous,is a fundamental problem in millimeter wave(mmWave)wireless networks,where directional transmissions are used to overcome the high attenuation.The challenge is how to let the transmitter and the receiver beams meet in space under deafness caused by directional transmission and reception,where no control channel,prior information,and coordination are available.In this paper,we present a Hunting based Directional Neighbor Discovery(HDND)scheme for ad hoc mmWave networks,where a node follows a unique sequence to determine its transmission or reception mode,and continuously r0-tates its directional beam to scan the neighborhood for other mmWave nodes.Through a rigorous analysis,we derive the conditions for ensured neighbor discovery,as well as a bound for the worst-case discovery time and the impact of sidelobes.We validate the analysis with extensive simulations and demonstrate the superior perfor-mance of the proposed scheme over several baseline schemes.展开更多
This paper proposes an approach called PC-CORP (Power Control based Cooperative Opportunistic Routing Protocol) for WSN (Wireless Sensor Networks), providing robustness to the random variations in network connectivity...This paper proposes an approach called PC-CORP (Power Control based Cooperative Opportunistic Routing Protocol) for WSN (Wireless Sensor Networks), providing robustness to the random variations in network connectivity while ensuring better data forwarding efficiency in an energy efficient manner. Based on the realistic radio model, we combine the region-based routing, rendezvous scheme, sleep discipline and cooperative communication together to model data forwarding by cross layer design in WSN. At the same time, a lightweight transmission power control algorithm called PC-AIMD (Power Control Additive Increase Multiplicative Decrease) is introduced to utilize the co- operation of relay nodes to improve the forwarding efficiency performance and increase the robustness of the routing protocol. In the simulation, the performance of PC-COPR is investigated in terms of the adaptation of variations in network connectivity and satisfying the QoS requirements of application.展开更多
Wireless sensor network is becoming more and more popular in recent years, but energy- constrained characteristic of sensor nodes is one of the critical issues that we must consider in system design. In this paper, a ...Wireless sensor network is becoming more and more popular in recent years, but energy- constrained characteristic of sensor nodes is one of the critical issues that we must consider in system design. In this paper, a cluster-based virtual VBLAST transmission scheme is proposed to achieve energy savings for energy-constrained wireless sensor networks. In the proposed scheme, instead of using cluster member as cooperative nodes, multiple cluster heads cooperate to form virtual antenna array so that V-BLAST based virtual MIMO transmission can be implemented. Based on the communication energy consumption model, a way to optimize the parameters for the scheme is given. In addition, detailed simulation is performed to evaluate the performance of the proposed scheme for both densely and sparsely deployed sensor networks. Theoretical analysis and simulation results verify the energy efficiency of the proposed scheme.展开更多
This paper investigates on the base stations(BSs) sleeping control and energy saving in wireless network. The objective is to find the sleeping control and energy saving configuration between total power consumption a...This paper investigates on the base stations(BSs) sleeping control and energy saving in wireless network. The objective is to find the sleeping control and energy saving configuration between total power consumption and average video's quality. On the Software Defined Network(SDN) access network architecture, a type of sleeping control and active BSs' optimal transmitting time strategy is considered, the BS sleeps when there is no active users, and wakes up after a period of vacation time. In this paper, we study the active users grouping strategy, In order to spare more BSs into sleeping mode. Then this paper proposes an active BS transmitting time optimal strategy according to the users' Qo S. In the proposed strategy, the active BSs' transmitting time is minimized in order to save energy. This paper employs the mixed integer-programming model to present this optimization problem. Then we utilized a novel algorithm to save the energy in access networks and also meet the Qo S requirements. Both the analytical and simulation results show that the algorithm can effectively save energy in the access network BSs.展开更多
Since the features of low energy consumption and limited power supply are very impor- tant for wireless sensor networks (WSNs), the problems of distributed state estimation with quan- tized innovations are investiga...Since the features of low energy consumption and limited power supply are very impor- tant for wireless sensor networks (WSNs), the problems of distributed state estimation with quan- tized innovations are investigated in this paper. In the first place, the assumptions of prior and posterior probability density function (PDF) with quantized innovations in the previous papers are analyzed. After that, an innovative Gaussian mixture estimator is proposed. On this basis, this paper presents a Gaussian mixture state estimation algorithm based on quantized innovations for WSNs. In order to evaluate and compare the performance of this kind of state estimation algo- rithms for WSNs, the posterior Cram6r-Rao lower bound (CRLB) with quantized innovations is put forward. Performance analysis and simulations show that the proposed Gaussian mixture state estimation algorithm is efficient than the others under the same number of quantization levels and the performance of these algorithms can be benchmarked by the theoretical lower bound.展开更多
In this paper, we propose two novel efficient scheduling schemes with network coding in multi-relay wireless network to maximize the transmission efficiency. The first one uses adaptive forwarding with network coding(...In this paper, we propose two novel efficient scheduling schemes with network coding in multi-relay wireless network to maximize the transmission efficiency. The first one uses adaptive forwarding with network coding(AF-NC), in which each relay adaptively calculates the number of packets having innovative information according to the feedback from the sink. With AF-NC, duplicate packets are not sent, and the total number of time slots needed to complete transmission can be significantly reduced. The second scheme, named adaptive forwarding with network coding and retransmission(AFR-NC), combines AF-NC with automatic repeat request(ARQ) to guarantee reliable end-to-end communication with limited resource occupation. Numerical results show that compared with simple forwarding with network coding(F-NC), AF-NC has close successful delivery rate with dramatically less time slots, while AFR-NC achieves strict reliability with limited resource cost.展开更多
A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, give...A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously.展开更多
基金supported by the National Natural Science Foundation of China with Grants 62301076 and 62321001。
文摘Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed that the global channel state information(CSI)of the eavesdroppers(Eves)was known beforehand,then the optimal relaying and jamming relays were determined.More importantly,the time complexity of selecting optimal jamming relay is O(N^(2)),where N is the maximum number of relays/Eves.In this paper,for the scenario where the source wants to exchange the message with the destination,via relaying scheme due to longer communication distance and limited transmission power,in the presence of multiple Eves,with the assumption of Eves'perfect CSI and average CSI,we propose two kinds of JRJS methods.In particular,the time complexity of finding the optimal jammer can be reduced to O(N).Furthermore,we present a novel JRJS scheme for no CSI of Eves by minimizing the difference between expected signal and interfering signal at the destination.Finally,simulations show that the designed methods are more effective than JRJS and other existing strategies in terms of security performance.
基金supported by National Natural Science Foundation of China(No.61901229 and No.62071242)the Project of Jiangsu Engineering Research Center of Novel Optical Fiber Technology and Communication Network(No.SDGC2234)+1 种基金the Open Research Project of Jiangsu Provincial Key Laboratory of Photonic and Electronic Materials Sciences and Technology(No.NJUZDS2022-008)the Post-Doctoral Research Supporting Program of Jiangsu Province(No.SBH20).
文摘This paper investigates a wireless powered and backscattering enabled sensor network based on the non-linear energy harvesting model, where the power beacon(PB) delivers energy signals to wireless sensors to enable their passive backscattering and active transmission to the access point(AP). We propose an efficient time scheduling scheme for network performance enhancement, based on which each sensor can always harvest energy from the PB over the entire block except its time slots allocated for passive and active information delivery. Considering the PB and wireless sensors are from two selfish service providers, we use the Stackelberg game to model the energy interaction among them. To address the non-convexity of the leader-level problem, we propose to decompose the original problem into two subproblems and solve them iteratively in an alternating manner. Specifically, the successive convex approximation, semi-definite relaxation(SDR) and variable substitution techniques are applied to find a nearoptimal solution. To evaluate the performance loss caused by the interaction between two providers, we further investigate the social welfare maximization problem. Numerical results demonstrate that compared to the benchmark schemes, the proposed scheme can achieve up to 35.4% and 38.7% utility gain for the leader and the follower, respectively.
基金supported by the National Natural Science Foundation of China(No.61971345)the Shaanxi Province Key R&D Program General Project(No.2021GY-044)+1 种基金the Technology Program of Yulin City(No.2019-145)the Artificial Intelligence Key Laboratory of Sichuan Province(No.2022RYY01)。
文摘To solve the problems of pulse broadening and channel fading caused by atmospheric scattering and turbulence,multiple-input multiple-output(MIMO)technology is a valid way.A wireless ultraviolet(UV)MIMO channel estimation approach based on deep learning is provided in this paper.The deep learning is used to convert the channel estimation into the image processing.By combining convolutional neural network(CNN)and attention mechanism(AM),the learning model is designed to extract the depth features of channel state information(CSI).The simulation results show that the approach proposed in this paper can perform channel estimation effectively for UV MIMO communication and can better suppress the fading caused by scattering and turbulence in the MIMO scattering channel.
基金supported in part by the National Natural Science Foundation of China under Grant No.62201266in part by the Natural Science Foundation of Jiangsu Province under Grant No.BK20210335.
文摘As the wireless communication network undergoes continuous expansion,the challenges associated with network management and optimization are becoming increasingly complex.To address these challenges,the emerging artificial intelligence(AI)and machine learning(ML)technologies have been introduced as a powerful solution.They empower wireless networks to operate autonomously,predictively,ondemand,and with smart functionality,offering a promising resolution to intricate optimization problems.This paper aims to delve into the prevalent applications of AI/ML technologies in the optimization of wireless networks.The paper not only provides insights into the current landscape but also outlines our vision for the future and considerations regarding the development of an intelligent 6G network.
基金supported in part by National Key R&D Program of China(2020YFB1807203)National Science Foundation of China under Grant number 62071111+2 种基金the Fundamental Research Funds for the Central Universities under Grant 2242022k60006Natural Science Foundation of Sichuan Province under Grant number 2022NSFSC0487the National Key Laboratory of Wireless Communications Foundation under Grant IFN20230104。
文摘In this paper,we present a novel and robust nonlinear precoding(NLP)design and detection structure specifically tailored for multiple-input multipleoutput space division multiple access(MIMO-SDMA)systems toward 6G wireless.Our approach aims to effectively mitigate the impact of imperfect channel estimation by leveraging the channel fluctuation mean square error(MSE)for reconstructing a highly accurate precoding matrix at the transmitter.Furthermore,we introduce a simplified receiver structure that eliminates the need for equalization,resulting in reduced interference and notable enhancements in overall system performance.We conduct both computer simulations and experimental tests to validate the efficacy of our proposed approach.The results reveals that the proposed NLP scheme offers significant performance improvements,making it particularly well-suited for the forthcoming 6G wireless.
基金partially supported by the National Natural Science Foundation of China(61571004)the Shanghai Natural Science Foundation(No.17ZR1429100)+1 种基金the National Science and Technology Major Project of China(No.2018ZX03001017-004)the Scientific Instrument Developing Project of the Chinese Academy of Sciences(No.YJKYYQ20170074).
文摘As an Industrial Wireless Sensor Network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of data aggregation is facing more and more challenges.Currently,the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating,alternately,the aim at enhancing the security of data.The performances of the secure data aggregation protocols are the trade-off of several metrics,which involves the transmission/fusion,the energy efficiency and the security in Wireless Sensor Network(WSN).Unfortunately,there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether in IWSN or in WSN.In consideration of IWSN,we firstly review the security requirements and techniques in WSN data aggregation in this paper.Then,we give a holistic overview of the classical secure data aggregation protocols,which are divided into three categories:hop-by-hop encrypted data aggregation,end-to-end encrypted data aggregation and unencrypted secure data aggregation.Along this way,combining with the characteristics of industrial applications,we analyze the pros and cons of the existing security schemes in each category qualitatively,and realize that the security and the energy efficiency are suitable for IWSN.Finally,we make the conclusion about the techniques and approach in these categories,and highlight the future research directions of privacy preserving data aggregation in IWSN.
基金sponsored by the National Key R&D Program of China(No.2018YFB1003201)the National Natural Science Foundation of China(No.61672296,No.61602261)Major Natural Science Research Projects in Colleges and Universities of Jiangsu Province(No.18KJA520008)
文摘Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy.
基金supported by the National Natural Science Foundation of China(Grant Nos.61522109,61671253,61571037and 91738201)the Fundamental Research Funds for the Central Universities(No.2016JBZ006)+1 种基金the Natural Science Foundation of Jiangsu Province(Grant Nos.BK20150040and BK20171446)the Key Project of Natural Science Research of Higher Education Institutions of Jiangsu Province(No.15KJA510003)
文摘The fifth generation (5G) wireless communication is currently a hot research topic and wireless communication systems on high speed railways (HSR) are important applications of 5G technologies. Existing stud- ies about 5G wireless systems on high speed railways (HSR) often utilize ideal channel parameters and are usually based on simple scenarios. In this paper, we evaluate the down- link throughput of 5G HSR communication systems on three typical scenarios including urban, cutting and viaduct with three different channel estimators. The channel parameters of each scenario are generated with tapped delay line (TDL) models through ray-tracing sim- ulations, which can be considered as a good match to practical situations. The channel estimators including least square (LS), linear minimum mean square error (LMMSE), and our proposed historical information based ba- sis expansion model (HiBEM). We analyze the performance of the HiBEM estimator in terms of mean square error (MSE) and evaluate the system throughputs with different channel estimates over each scenario. Simulation results are then provided to corroborate our proposed studies. It is shown that our HiBEM estimator outperforms other estimators and that the sys-tem throughput can reach the highest point in the viaduct scenario.
基金supported in part by the U.S. National Science Foundation under Grant CNS-2007995in part by the National Natural Science Foundation of China under Grant 92067201,62171231in part by Jiangsu Provincial Key Research and Development Program under Grant BE2020084-1。
文摘The unmanned aerial vehicle(UAV)-enabled mobile edge computing(MEC) architecture is expected to be a powerful technique to facilitate 5 G and beyond ubiquitous wireless connectivity and diverse vertical applications and services, anytime and anywhere. Wireless power transfer(WPT) is another promising technology to prolong the operation time of low-power wireless devices in the era of Internet of Things(IoT). However, the integration of WPT and UAV-enabled MEC systems is far from being well studied, especially in dynamic environments. In order to tackle this issue, this paper aims to investigate the stochastic computation offloading and trajectory scheduling for the UAV-enabled wireless powered MEC system. A UAV offers both RF wireless power transmission and computation services for IoT devices. Considering the stochastic task arrivals and random channel conditions, a long-term average energyefficiency(EE) minimization problem is formulated.Due to non-convexity and the time domain coupling of the variables in the formulated problem, a lowcomplexity online computation offloading and trajectory scheduling algorithm(OCOTSA) is proposed by exploiting Lyapunov optimization. Simulation results verify that there exists a balance between EE and the service delay, and demonstrate that the system EE performance obtained by the proposed scheme outperforms other benchmark schemes.
基金ACKNOWLEDGEMENT This work was supported by the National Na- tural Science Foundation of China under Gra- nts No. 61172079, 61231008, No. 61201141, No. 61301176 the National Basic Research Program of China (973 Program) under Grant No. 2009CB320404+2 种基金 the 111 Project under Gr- ant No. B08038 the National Science and Tec- hnology Major Project under Grant No. 2012- ZX03002009-003, No. 2012ZX03004002-003 and the Shaanxi Province Science and Techno- logy Research and Development Program un- der Grant No. 2011KJXX-40.
文摘The traffic with tidal phenomenon in Heterogeneous Wireless Networks(HWNs)has radically increased the complexity of radio resource management and its performance analysis.In this paper,a Simplified Dynamic Hierarchy Resource Management(SDHRM)algorithm exploiting the resources dynamically and intelligently is proposed with the consideration of tidal traffic.In network-level resource allocation,the proposed algorithm first adopts wavelet neural network to forecast the traffic of each sub-area and then allocates the resources to those sub-areas to maximise the network utility.In connection-level network selection,based on the above resource allocation and the pre-defined QoS requirement,three typical network selection policies are provided to assign traffic flow to the most appropriate network.Furthermore,based on multidimensional Markov model,we analyse the performance of SDHRM in HWNs with heavy tailed traffic.Numerical results show that our theoretical values coincide with the simulation results and the SDHRM can improve the resource utilization.
基金supported by National Science and Technology Major Program of the Ministry of Science and Technology(No.2018ZX03001031)Key program of Beijing Municipal Natural Science Foundation(No.L172030)+1 种基金Beijing unicipal Science and Technology Commission Project(No.Z181100003218007)National Key Technology Research and Development Program of the Ministry of Science and Technology of China(NO.2012BAF14B01)
文摘Internet of Things(IoT) is one of the targeted application scenarios of fifth generation(5 G) wireless communication.IoT brings a large amount of data transported on the network.Considering those data,machine learning(ML) algorithms can be naturally utilized to make network efficiently and reliably.However,how to fully apply ML to IoT driven wireless network is still open.The fundamental reason is that wireless communication pursuits the high capacity and quality facing the challenges from the varying and fading wireless channel.So in this paper,we explore feasible combination for ML and IoT driven wireless network from wireless channel perspective.Firstly,a three-level structure of wireless channel fading features is defined in order to classify the versatile propagation environments.This three-layer structure includes scenario,meter and wavelength levels.Based on this structure,there are different tasks like service prediction and pushing,self-organization networking,self adapting largescale fading modeling and so on,which can be abstracted into problems like regression,classification,clustering,etc.Then,we introduce corresponding ML methods to different levelsfrom channel perspective,which makes their interdisciplinary research promisingly.
基金supported by the National Natural Science Foundation of China under Grant No.61001119the Fund for Creative Research Groups of China under Grant No.61121001
文摘The sparse nature of location finding in the spatial domain makes it possible to exploit the Compressive Sensing (CS) theory for wireless location.CS-based location algorithm can largely reduce the number of online measurements while achieving a high level of localization accuracy,which makes the CS-based solution very attractive for indoor positioning.However,CS theory offers exact deterministic recovery of the sparse or compressible signals under two basic restriction conditions of sparsity and incoherence.In order to achieve a good recovery performance of sparse signals,CS-based solution needs to construct an efficient CS model.The model must satisfy the practical application requirements as well as following theoretical restrictions.In this paper,we propose two novel CS-based location solutions based on two different points of view:the CS-based algorithm with raising-dimension pre-processing and the CS-based algorithm with Minor Component Analysis (MCA).Analytical studies and simulations indicate that the proposed novel schemes achieve much higher localization accuracy.
基金Supported by Major Projects of the National Science and Technology (2010ZX03003-003-02) National 973 Key Project (2011CB302903)
文摘Based on the sequence entropy of Shannon information theory, we work on the network coding technology in Wireless Sensor Network (WSN). In this paper, we take into account the similarity of the transmission sequences at the network coding node in the multi-sources and multi-receivers network in order to compress the data redundancy. Theoretical analysis and computer simulation results show that this proposed scheme not only further improves the efficiency of network transmission and enhances the throughput of the network, but also reduces the energy consumption of sensor nodes and extends the network life cycle.
基金This work was supported in part by the NSF under Grants ECCS-1923717 and CNS-1320472the Wireless Engineering Research and Education Center,Auburn University,Auburn,AL,USA.
文摘The directional neighbor discovery problem,i.e,spatial rendezvous,is a fundamental problem in millimeter wave(mmWave)wireless networks,where directional transmissions are used to overcome the high attenuation.The challenge is how to let the transmitter and the receiver beams meet in space under deafness caused by directional transmission and reception,where no control channel,prior information,and coordination are available.In this paper,we present a Hunting based Directional Neighbor Discovery(HDND)scheme for ad hoc mmWave networks,where a node follows a unique sequence to determine its transmission or reception mode,and continuously r0-tates its directional beam to scan the neighborhood for other mmWave nodes.Through a rigorous analysis,we derive the conditions for ensured neighbor discovery,as well as a bound for the worst-case discovery time and the impact of sidelobes.We validate the analysis with extensive simulations and demonstrate the superior perfor-mance of the proposed scheme over several baseline schemes.
基金Supported by 973 Program (2007CB310607)National Natural Science Foundation of China (60772062)the Open Research Fund of National Mobile Communications Research Laboratory, Southeast University (N200813)
文摘This paper proposes an approach called PC-CORP (Power Control based Cooperative Opportunistic Routing Protocol) for WSN (Wireless Sensor Networks), providing robustness to the random variations in network connectivity while ensuring better data forwarding efficiency in an energy efficient manner. Based on the realistic radio model, we combine the region-based routing, rendezvous scheme, sleep discipline and cooperative communication together to model data forwarding by cross layer design in WSN. At the same time, a lightweight transmission power control algorithm called PC-AIMD (Power Control Additive Increase Multiplicative Decrease) is introduced to utilize the co- operation of relay nodes to improve the forwarding efficiency performance and increase the robustness of the routing protocol. In the simulation, the performance of PC-COPR is investigated in terms of the adaptation of variations in network connectivity and satisfying the QoS requirements of application.
文摘Wireless sensor network is becoming more and more popular in recent years, but energy- constrained characteristic of sensor nodes is one of the critical issues that we must consider in system design. In this paper, a cluster-based virtual VBLAST transmission scheme is proposed to achieve energy savings for energy-constrained wireless sensor networks. In the proposed scheme, instead of using cluster member as cooperative nodes, multiple cluster heads cooperate to form virtual antenna array so that V-BLAST based virtual MIMO transmission can be implemented. Based on the communication energy consumption model, a way to optimize the parameters for the scheme is given. In addition, detailed simulation is performed to evaluate the performance of the proposed scheme for both densely and sparsely deployed sensor networks. Theoretical analysis and simulation results verify the energy efficiency of the proposed scheme.
基金supported by the National High-Tech R&D Program (863 Program2015AA01A705)in part by Beijing Municipal Commission of Education (The City's Vehicle Sensing Grid Construction Based on Public Transportation Network)
文摘This paper investigates on the base stations(BSs) sleeping control and energy saving in wireless network. The objective is to find the sleeping control and energy saving configuration between total power consumption and average video's quality. On the Software Defined Network(SDN) access network architecture, a type of sleeping control and active BSs' optimal transmitting time strategy is considered, the BS sleeps when there is no active users, and wakes up after a period of vacation time. In this paper, we study the active users grouping strategy, In order to spare more BSs into sleeping mode. Then this paper proposes an active BS transmitting time optimal strategy according to the users' Qo S. In the proposed strategy, the active BSs' transmitting time is minimized in order to save energy. This paper employs the mixed integer-programming model to present this optimization problem. Then we utilized a novel algorithm to save the energy in access networks and also meet the Qo S requirements. Both the analytical and simulation results show that the algorithm can effectively save energy in the access network BSs.
基金jointly supported by the National Natural Science Foundation of China(No.61175008)State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System of China(No.CEMEE2014K0301A)the Natural Science Foundation of Jiangsu Province of China(No.BK20140896)
文摘Since the features of low energy consumption and limited power supply are very impor- tant for wireless sensor networks (WSNs), the problems of distributed state estimation with quan- tized innovations are investigated in this paper. In the first place, the assumptions of prior and posterior probability density function (PDF) with quantized innovations in the previous papers are analyzed. After that, an innovative Gaussian mixture estimator is proposed. On this basis, this paper presents a Gaussian mixture state estimation algorithm based on quantized innovations for WSNs. In order to evaluate and compare the performance of this kind of state estimation algo- rithms for WSNs, the posterior Cram6r-Rao lower bound (CRLB) with quantized innovations is put forward. Performance analysis and simulations show that the proposed Gaussian mixture state estimation algorithm is efficient than the others under the same number of quantization levels and the performance of these algorithms can be benchmarked by the theoretical lower bound.
基金the National Natural Science Foundation of China(Nos.61102051,61221001 and 61301117)the National High Technology Research and Development Program(863)of China(Nos.2012AA011701 and 2012AA121601)+1 种基金the Shanghai Jiao Tong University Science and Technology Innovation Foundation(No.AF0300021)the Shanghai Key Laboratory Funding(No.12DZ2272600)
文摘In this paper, we propose two novel efficient scheduling schemes with network coding in multi-relay wireless network to maximize the transmission efficiency. The first one uses adaptive forwarding with network coding(AF-NC), in which each relay adaptively calculates the number of packets having innovative information according to the feedback from the sink. With AF-NC, duplicate packets are not sent, and the total number of time slots needed to complete transmission can be significantly reduced. The second scheme, named adaptive forwarding with network coding and retransmission(AFR-NC), combines AF-NC with automatic repeat request(ARQ) to guarantee reliable end-to-end communication with limited resource occupation. Numerical results show that compared with simple forwarding with network coding(F-NC), AF-NC has close successful delivery rate with dramatically less time slots, while AFR-NC achieves strict reliability with limited resource cost.
基金Sponsored by the National Natural Science Foundation of China (No. 60973139, 61170065, 61171053, 61003039,61003236)the Natural Science Foundation of Jiangsu Province (BK2011755, BK2012436)+3 种基金Scientific & Technological Support Project of Jiangsu Province (BE2011844,BE2011189)Jiangsu Provincial Research Scheme of Natural Science for Higher Education Institutions(12KJB520009)Science & Technology Innovation Fundfor Higher Education Institutions of Jiangsu Province(CXZZ11-0405)the Peak of Six Major Talent inJiangsu Province (2010DZXX026)
文摘A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously.