4,143 research outputs found
Device-to-device based path selection for post disaster communication using hybrid intelligence
Public safety network communication methods are concurrence with emerging networks to provide enhanced strategies and services for catastrophe management. If the cellular network is damaged after a calamity, a new-generation network like the internet of things (IoT) is ready to assure network access. In this paper, we suggested a framework of hybrid intelligence to find and re-connect the isolated nodes to the functional area to save life. We look at a situation in which the devices in the hazard region can constantly monitor the radio environment to self-detect the occurrence of a disaster, switch to the device-to-device (D2D) communication mode, and establish a vital connection. The oscillating spider monkey optimization (OSMO) approach forms clusters of the devices in the disaster area to improve network efficiency. The devices in the secluded area use the cluster heads as relay nodes to the operational site. An oscillating particle swarm optimization (OPSO) with a priority-based path encoding technique is used for path discovery. The suggested approach improves the energy efficiency of the network by selecting a routing path based on the remaining energy of the device, channel quality, and hop count, thus increasing network stability and packet delivery
Performance Analytical Modelling of Mobile Edge Computing for Mobile Vehicular Applications: A Worst-Case Perspective
Quantitative performance analysis plays a pivotal
role in theoretically investigating the performance of Vehicular
Edge Computing (VEC) systems. Although considerable research
efforts have been devoted to VEC performance analysis, all
of the existing analytical models were designed to derive the
average system performance, paying insufficient attention to the
worst-case performance analysis, which hinders the practical
deployment of VEC systems to support mission-critical vehicular
applications, such as collision avoidance. To bridge this gap, we
develop an original performance analytical model by virtue of
Stochastic Network Calculus (SNC) to investigate the worst-case
end-to-end performance of VEC systems. Specifically, to capture
the bursty feature of task generation, an innovative bivariate
Markov Chain is firstly established and rigorously analysed to
derive the stochastic task envelope. Then, an effective service
curve is created to investigate the severe resource competition
among vehicular applications. Driven by the stochastic task
envelope and effective service curve, a closed-form end-to-end
analytical model is derived to obtain the latency bound for
VEC systems. Extensive simulation experiments are conducted
to validate the accuracy of the proposed analytical model under
different system configurations. Furthermore, we exploit the
proposed analytical model as a cost-effective tool to investigate
the resource allocation strategies in VEC systems
Securing NextG networks with physical-layer key generation: A survey
As the development of next-generation (NextG) communication networks continues, tremendous devices are accessing the network and the amount of information is exploding. However, with the increase of sensitive data that requires confidentiality to be transmitted and stored in the network, wireless network security risks are further amplified. Physical-layer key generation (PKG) has received extensive attention in security research due to its solid information-theoretic security proof, ease of implementation, and low cost. Nevertheless, the applications of PKG in the NextG networks are still in the preliminary exploration stage. Therefore, we survey existing research and discuss (1) the performance advantages of PKG compared to cryptography schemes, (2) the principles and processes of PKG, as well as research progresses in previous network environments, and (3) new application scenarios and development potential for PKG in NextG communication networks, particularly analyzing the effect and prospects of PKG in massive multiple-input multiple-output (MIMO), reconfigurable intelligent surfaces (RISs), artificial intelligence (AI) enabled networks, integrated space-air-ground network, and quantum communication. Moreover, we summarize open issues and provide new insights into the development trends of PKG in NextG networks
TPAAD: two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network.
Software-defined networking (SDN) has received considerable attention and adoption owing to its inherent advantages, such as enhanced scalability, increased adaptability, and the ability to exercise centralized control. However, the control plane of the system is vulnerable to denial-of-service (DoS) attacks, which are a primary focus for attackers. These attacks have the potential to result in substantial delays and packet loss. In this study, we present a novel system called Two-Phase Authentication for Attack Detection that aims to enhance the security of SDN by mitigating DoS attacks. The methodology utilized in our study involves the implementation of packet filtration and machine learning classification techniques, which are subsequently followed by the targeted restriction of malevolent network traffic. Instead of completely deactivating the host, the emphasis lies on preventing harmful communication. Support vector machine and K-nearest neighbours algorithms were utilized for efficient detection on the CICDoS 2017 dataset. The deployed model was utilized within an environment designed for the identification of threats in SDN. Based on the observations of the banned queue, our system allows a host to reconnect when it is no longer contributing to malicious traffic. The experiments were run on a VMware Ubuntu, and an SDN environment was created using Mininet and the RYU controller. The results of the tests demonstrated enhanced performance in various aspects, including the reduction of false positives, the minimization of central processing unit utilization and control channel bandwidth consumption, the improvement of packet delivery ratio, and the decrease in the number of flow requests submitted to the controller. These results confirm that our Two-Phase Authentication for Attack Detection architecture identifies and mitigates SDN DoS attacks with low overhead
A Trust Management Framework for Vehicular Ad Hoc Networks
The inception of Vehicular Ad Hoc Networks (VANETs) provides an opportunity for road users and public infrastructure to share information that improves the operation of roads and the driver experience. However, such systems can be vulnerable to malicious external entities and legitimate users. Trust management is used to address attacks from legitimate users in accordance with a user’s trust score. Trust models evaluate messages to assign rewards or punishments. This can be used to influence a driver’s future behaviour or, in extremis, block the driver. With receiver-side schemes, various methods are used to evaluate trust including, reputation computation, neighbour recommendations, and storing historical information. However, they incur overhead and add a delay when deciding whether to accept or reject messages. In this thesis, we propose a novel Tamper-Proof Device (TPD) based trust framework for managing trust of multiple drivers at the sender side vehicle that updates trust, stores, and protects information from malicious tampering. The TPD also regulates, rewards, and punishes each specific driver, as required. Furthermore, the trust score determines the classes of message that a driver can access. Dissemination of feedback is only required when there is an attack (conflicting information). A Road-Side Unit (RSU) rules on a dispute, using either the sum of products of trust and feedback or official vehicle data if available. These “untrue attacks” are resolved by an RSU using collaboration, and then providing a fixed amount of reward and punishment, as appropriate. Repeated attacks are addressed by incremental punishments and potentially driver access-blocking when conditions are met. The lack of sophistication in this fixed RSU assessment scheme is then addressed by a novel fuzzy logic-based RSU approach. This determines a fairer level of reward and punishment based on the severity of incident, driver past behaviour, and RSU confidence. The fuzzy RSU controller assesses judgements in such a way as to encourage drivers to improve their behaviour. Although any driver can lie in any situation, we believe that trustworthy drivers are more likely to remain so, and vice versa. We capture this behaviour in a Markov chain model for the sender and reporter driver behaviours where a driver’s truthfulness is influenced by their trust score and trust state. For each trust state, the driver’s likelihood of lying or honesty is set by a probability distribution which is different for each state. This framework is analysed in Veins using various classes of vehicles under different traffic conditions. Results confirm that the framework operates effectively in the presence of untrue and inconsistent attacks. The correct functioning is confirmed with the system appropriately classifying incidents when clarifier vehicles send truthful feedback. The framework is also evaluated against a centralized reputation scheme and the results demonstrate that it outperforms the reputation approach in terms of reduced communication overhead and shorter response time. Next, we perform a set of experiments to evaluate the performance of the fuzzy assessment in Veins. The fuzzy and fixed RSU assessment schemes are compared, and the results show that the fuzzy scheme provides better overall driver behaviour. The Markov chain driver behaviour model is also examined when changing the initial trust score of all drivers
Distributed energy efficient channel allocation in underlay multicast D2D communications
In this paper, we address the optimization of the energy efficiency of underlay multicast device-to-device (D2MD) communications on cellular networks. In particular, we maximize the energy efficiency of both the global network and the individual users considering various fairness factors such as maximum power and minimum rate constraints. For this, we employ a canonical mixed-integer non-linear formulation of the joint power control and resource allocation problem. To cope with its NP-hard nature, we propose a two-stage semi-distributed solution. In the first stage, we find a stable, yet sub-optimal, channel allocation for D2MD groups
using a cooperative coalitional game framework that allows co-channel transmission over a set of shared resource blocks and/or transmission over several different channels per D2MD group. In the second stage, a central entity determines the optimal transmission power for each user in the system via fractional programming. We performed extensive simulations to analyze the resulting energy efficiency and attainable transmission rates. The results show that the performance of our semi-distributed approach is very close to that
obtained with a pure optimal centralized one.Ministerio de Ciencia, Innovación y Universidades | Ref. GO2EDGERED2018-102563-TAgencia Estatal de Investigación | Ref. TEC2017-85587-RAgencia Estatal de Investigación | Ref. RED2018-102563-
Towards Robust and Efficient Communications for Urban Air Mobility
For the realization of the future urban air mobility, reliable information
exchange based on robust and efficient communication between all airspace
participants will be one of the key factors to ensure safe operations.
Especially in dense urban scenarios, the direct and fast information exchange
between drones based on Drone-to-Drone communications is a promising technology
for enabling reliable collision avoidance systems. However, to mitigate
collisions and to increase overall reliability, unmanned aircraft still lack a
redundant, higher-level safety net to coordinate and monitor traffic, as is
common in today's civil aviation. In addition, direct and fast information
exchange based on ad hoc communication is needed to cope with the very short
reaction times required to avoid collisions and to cope with the the high
traffic densities. Therefore, we are developing a \ac{d2d} communication and
surveillance system, called DroneCAST, which is specifically tailored to the
requirements of a future urban airspace and will be part of a multi-link
approach. In this work we discuss challenges and expected safety-critical
applications that will have to rely on communications for \ac{uam} and present
our communication concept and necessary steps towards DroneCAST. As a first
step towards an implementation, we equipped two drones with hardware prototypes
of the experimental communication system and performed several flights around
the model city to evaluate the performance of the hardware and to demonstrate
different applications that will rely on robust and efficient communications
Outage analysis of millimeter wave RSMA systems
Millimeter-wave (mmWave) communication has attracted considerable attention from academia and industry, providing multi-gigabits per second rates due to the substantial bandwidth. Rate splitting multiple access (RSMA) is an effective technology that provides a generalized multiple access framework. Regarding the new propagation characteristics of the mmWave, we investigate the outage performance of the mmWave RSMA multiple-input-single-output system with a fixed-located user and a randomly-located user. Based on the spatial correlation of the paired users, the user’s paths are divided into overlapped and non-overlapped paths. Two beamforming schemes are proposed to improve the reliability of the mmWave RSMA system. The common stream is transmitted on the overlapped paths or all the paths. By utilizing stochastic geometry theory, the closed-form expressions of the outage probability (OP) with proposed schemes are derived. To obtain more insights, the expressions for the asymptotic OP are derived. Monte Carlo simulation results are presented to validate the analysis and the effects of the system parameters, such as power allocation coefficients and the number of resolvable paths, on the outage performance are investigated
Robust and Listening-Efficient Contention Resolution
This paper shows how to achieve contention resolution on a shared
communication channel using only a small number of channel accesses -- both for
listening and sending -- and the resulting algorithm is resistant to
adversarial noise.
The shared channel operates over a sequence of synchronized time slots, and
in any slot agents may attempt to broadcast a packet. An agent's broadcast
succeeds if no other agent broadcasts during that slot. If two or more agents
broadcast in the same slot, then the broadcasts collide and both broadcasts
fail. An agent listening on the channel during a slot receives ternary
feedback, learning whether that slot had silence, a successful broadcast, or a
collision. Agents are (adversarially) injected into the system over time. The
goal is to coordinate the agents so that each is able to successfully broadcast
its packet.
A contention-resolution protocol is measured both in terms of its throughput
and the number of slots during which an agent broadcasts or listens. Most prior
work assumes that listening is free and only tries to minimize the number of
broadcasts.
This paper answers two foundational questions. First, is constant throughput
achievable when using polylogarithmic channel accesses per agent, both for
listening and broadcasting? Second, is constant throughput still achievable
when an adversary jams some slots by broadcasting noise in them? Specifically,
for packets arriving over time and jammed slots, we give an algorithm
that with high probability in guarantees throughput and
achieves on average channel accesses against an
adaptive adversary. We also have per-agent high-probability guarantees on the
number of channel accesses -- either or , depending on how quickly the adversary can react to what
is being broadcast
- …