44 research outputs found

    IRS-assisted UAV Communications: A Comprehensive Review

    Full text link
    Intelligent reflecting surface (IRS) can smartly adjust the wavefronts in terms of phase, frequency, amplitude and polarization via passive reflections and without any need of radio frequency (RF) chains. It is envisaged as an emerging technology which can change wireless communication to improve both energy and spectrum efficiencies with low energy consumption and low cost. It can intelligently configure the wireless channels through a massive number of cost effective passive reflecting elements to improve the system performance. Similarly, unmanned aerial vehicle (UAV) communication has gained a viable attention due to flexible deployment, high mobility and ease of integration with several technologies. However, UAV communication is prone to security issues and obstructions in real-time applications. Recently, it is foreseen that UAV and IRS both can integrate together to attain unparalleled capabilities in difficult scenarios. Both technologies can ensure improved performance through proactively altering the wireless propagation using smart signal reflections and maneuver control in three dimensional (3D) space. IRS can be integrated in both aerial and terrene environments to reap the benefits of smart reflections. This study briefly discusses UAV communication, IRS and focuses on IRS-assisted UAC communications. It surveys the existing literature on this emerging research topic and highlights several promising technologies which can be implemented in IRS-assisted UAV communication. This study also presents several application scenarios and open research challenges. This study goes one step further to elaborate research opportunities to design and optimize wireless systems with low energy footprint and at low cost. Finally, we shed some light on future research aspects for IRS-assisted UAV communication

    Swarm of UAVs for Network Management in 6G: A Technical Review

    Full text link
    Fifth-generation (5G) cellular networks have led to the implementation of beyond 5G (B5G) networks, which are capable of incorporating autonomous services to swarm of unmanned aerial vehicles (UAVs). They provide capacity expansion strategies to address massive connectivity issues and guarantee ultra-high throughput and low latency, especially in extreme or emergency situations where network density, bandwidth, and traffic patterns fluctuate. On the one hand, 6G technology integrates AI/ML, IoT, and blockchain to establish ultra-reliable, intelligent, secure, and ubiquitous UAV networks. 6G networks, on the other hand, rely on new enabling technologies such as air interface and transmission technologies, as well as a unique network design, posing new challenges for the swarm of UAVs. Keeping these challenges in mind, this article focuses on the security and privacy, intelligence, and energy-efficiency issues faced by swarms of UAVs operating in 6G mobile networks. In this state-of-the-art review, we integrated blockchain and AI/ML with UAV networks utilizing the 6G ecosystem. The key findings are then presented, and potential research challenges are identified. We conclude the review by shedding light on future research in this emerging field of research.Comment: 19,

    The Role of Machine Learning and Deep Learning Approaches for the Detection of Skin Cancer

    Get PDF
    Machine learning (ML) can enhance a dermatologist’s work, from diagnosis to customized care. The development of ML algorithms in dermatology has been supported lately regarding links to digital data processing (e.g., electronic medical records, Image Archives, omics), quicker computing and cheaper data storage. This article describes the fundamentals of ML-based implementations, as well as future limits and concerns for the production of skin cancer detection and classification systems. We also explored five fields of dermatology using deep learning applications: (1) the classification of diseases by clinical photos, (2) der moto pathology visual classification of cancer, and (3) the measurement of skin diseases by smartphone applications and personal tracking systems. This analysis aims to provide dermatologists with a guide that helps demystify the basics of ML and its different applications to identify their possible challenges correctly. This paper surveyed studies on skin cancer detection using deep learning to assess the features and advantages of other techniques. Moreover, this paper also defined the basic requirements for creating a skin cancer detection application, which revolves around two main issues: the full segmentation image and the tracking of the lesion on the skin using deep learning. Most of the techniques found in this survey address these two problems. Some of the methods also categorize the type of cancer too

    A Machine Learning-Based Interest Flooding Attack Detection System in Vehicular Named Data Networking

    No full text
    A vehicular ad hoc network (VANET) has significantly improved transportation efficiency with efficient traffic management, driving safety, and delivering emergency messages. However, existing IP-based VANETs encounter numerous challenges, like security, mobility, caching, and routing. To cope with these limitations, named data networking (NDN) has gained significant attention as an alternative solution to TCP/IP in VANET. NDN offers promising features, like intermittent connectivity support, named-based routing, and in-network content caching. Nevertheless, NDN in VANET is vulnerable to a variety of attacks. On top of attacks, an interest flooding attack (IFA) is one of the most critical attacks. The IFA targets intermediate nodes with a storm of unsatisfying interest requests and saturates network resources such as the Pending Interest Table (PIT). Unlike traditional rule-based statistical approaches, this study detects and prevents attacker vehicles by exploiting a machine learning (ML) binary classification system at roadside units (RSUs). In this connection, we employed and compared the accuracy of five (5) ML classifiers: logistic regression (LR), decision tree (DT), K-nearest neighbor (KNN), random forest (RF), and Gaussian naĂŻve Bayes (GNB) on a publicly available dataset implemented on the ndnSIM simulator. The experimental results demonstrate that the RF classifier achieved the highest accuracy (94%) in detecting IFA vehicles. On the other hand, we evaluated an attack prevention system on Python that enables intermediate vehicles to accept or reject interest requests based on the legitimacy of vehicles. Thus, our proposed IFA detection technique contributes to detecting and preventing attacker vehicles from compromising the network resources

    Architectural Framework for Underwater IoT: Forecasting System for Analyzing Oceanographic Data and Observing the Environment

    No full text
    With the passage of time, the exploitation of Internet of Things (IoT) sensors and devices has become more complicated. The Internet of Underwater Things (IoUT) is a subset of the IoT in which underwater sensors are used to continually collect data about ocean ecosystems. Predictive analytics can offer useful insights to the stakeholders associated with environmentalists, marine explorers, and oceanographers for decision-making and intelligence about the ocean, when applied to context-sensitive information, gathered from marine data. This study presents an architectural framework along with algorithms as a realistic solution to design and develop an IoUT system to excel in the data state of the practice. It also includes recommendations and forecasting for potential partners in the smart ocean, which assist in monitoring and environmental protection. A case study is implemented which addresses the solution’s usability and agility to efficiently exploit sensor data, executes the algorithms, and queries the output to assess performance. The number of trails is performed for data insights for the 60-day collection of sensor data. In the context of the smart ocean, the architectural design innovative ideas and viable approaches can be taken into consideration to develop and validate present and next-generation IoUTs and are simplified in this solution

    Recent Advances, Future Trends, Applications and Challenges of Internet of Underwater Things (IoUT): A Comprehensive Review

    No full text
    Oceans cover more than 70% of the Earth’s surface. For various reasons, almost 95% of these areas remain unexplored. Underwater wireless communication (UWC) has widespread applications, including real-time aquatic data collection, naval surveillance, natural disaster prevention, archaeological expeditions, oil and gas exploration, shipwreck exploration, maritime security, and the monitoring of aquatic species and water contamination. The promising concept of the Internet of Underwater Things (IoUT) is having a great influence in several areas, for example, in small research facilities and average-sized harbors, as well as in huge unexplored areas of ocean. The IoUT has emerged as an innovative technology with the potential to develop a smart ocean. The IoUT framework integrates different underwater communication techniques such as optical, magnetic induction, and acoustic signals. It is capable of revolutionizing industrial projects, scientific research, and business. The key enabler technology for the IoUT is the underwater wireless sensor network (UWSN); however, at present, this is characterized by limitations in reliability, long propagation delays, high energy consumption, a dynamic topology, and limited bandwidth. This study examines the literature to identify potential challenges and risks, as well as mitigating solutions, associated with the IoUT. Our findings reveal that the key contributing elements to the challenges facing the IoUT are underwater communications, energy storage, latency, mobility, a lack of standardization, transmission media, transmission range, and energy constraints. Furthermore, we discuss several IoUT applications while highlighting potential future research directions

    Towards the Unmanned Aerial Vehicles (UAVs): A Comprehensive Review

    No full text
    Recently, unmanned aerial vehicles (UAVs), also known as drones, have come in a great diversity of several applications such as military, construction, image and video mapping, medical, search and rescue, parcel delivery, hidden area exploration, oil rigs and power line monitoring, precision farming, wireless communication and aerial surveillance. The drone industry has been getting significant attention as a model of manufacturing, service and delivery convergence, introducing synergy with the coexistence of different emerging domains. UAVs offer implicit peculiarities such as increased airborne time and payload capabilities, swift mobility, and access to remote and disaster areas. Despite these potential features, including extensive variety of usage, high maneuverability, and cost-efficiency, drones are still limited in terms of battery endurance, flight autonomy and constrained flight time to perform persistent missions. Other critical concerns are battery endurance and the weight of drones, which must be kept low. Intuitively it is not suggested to load them with heavy batteries. This study highlights the importance of drones, goals and functionality problems. In this review, a comprehensive study on UAVs, swarms, types, classification, charging, and standardization is presented. In particular, UAV applications, challenges, and security issues are explored in the light of recent research studies and development. Finally, this review identifies the research gap and presents future research directions regarding UAVs

    An Efficient and Conditional Privacy-Preserving Heterogeneous Signcryption Scheme for the Internet of Drones

    No full text
    The Internet of Drones (IoD) is a network for drones that utilizes the existing Internet of Things (IoT) infrastructure to facilitate mission fulfilment through real-time data transfer and navigation services. IoD deployments, on the other hand, are often conducted in public wireless settings, which raises serious security and privacy concerns. A key source of these security and privacy concerns is the fact that drones often connect with one another through an unprotected wireless channel. Second, limits on the central processing unit (CPU), sensor, storage, and battery capacity make the execution of complicated cryptographic methods onboard a drone impossible. Signcryption is a promising method for overcoming these computational and security limitations. Additionally, in an IoD setting, drones and the ground station (GS) may employ various cryptosystems in a particular region. In this article, we offer a heterogeneous signcryption scheme with a conditional privacy-preservation option. In the proposed scheme, identity-based cryptography (IBC) was used by drones, while the public key infrastructure (PKI) belonged to the GS. The proposed scheme was constructed by using the hyperelliptic curve cryptosystem (HECC), and its security robustness was evaluated using the random oracle model (ROM). In addition, the proposed scheme was compared to the relevant existing schemes in terms of computation and communication costs. The results indicated that the proposed scheme was both efficient and secure, thereby proving its feasibility

    Research on Power Allocation in Multiple-Beam Space Division Access Based on NOMA for Underwater Optical Communication

    No full text
    To meet the transmission requirements of different users in a multiple-beam access system for underwater optical communication (UWOC), this paper proposes a novel multiple-beam space division multiple access (MB-SDMA) system by utilizing a directional radiation communication beam of the hemispherical LED arrays. The system’s access users in the different beams are divided into two categories: the users with a single beam and the users with multiple beams. We also propose a power allocation algorithm that guarantees the quality of service (QoS) for single beam and multiple beam access, especially the QoS for edge users, and fairness for all users. An optimization model of power distribution under the constraints of specific light-emitting diode (LED) emission power is established for two scenarios, which ensure the user QoS for edge users and the max–min fairness for fair users. Using the Karush–Kuhn–Tucker (KKT) condition and the bisection method, we obtain the optimal power allocation expression for the two types of users in the optimization model. Through simulation, we verify that the proposed user classification and power allocation method can ensure the fairness of fair users on the premise of ensuring the QoS of edge users. At the same time, we know that the number of users will affect the improvement of the minimum rate, and the throughput of the non-orthogonal multiple access (NOMA) system is greatly improved compared with the traditional orthogonal multiple access (OMA) systems

    Research on Power Allocation in Multiple-Beam Space Division Access Based on NOMA for Underwater Optical Communication

    No full text
    To meet the transmission requirements of different users in a multiple-beam access system for underwater optical communication (UWOC), this paper proposes a novel multiple-beam space division multiple access (MB-SDMA) system by utilizing a directional radiation communication beam of the hemispherical LED arrays. The system’s access users in the different beams are divided into two categories: the users with a single beam and the users with multiple beams. We also propose a power allocation algorithm that guarantees the quality of service (QoS) for single beam and multiple beam access, especially the QoS for edge users, and fairness for all users. An optimization model of power distribution under the constraints of specific light-emitting diode (LED) emission power is established for two scenarios, which ensure the user QoS for edge users and the max–min fairness for fair users. Using the Karush–Kuhn–Tucker (KKT) condition and the bisection method, we obtain the optimal power allocation expression for the two types of users in the optimization model. Through simulation, we verify that the proposed user classification and power allocation method can ensure the fairness of fair users on the premise of ensuring the QoS of edge users. At the same time, we know that the number of users will affect the improvement of the minimum rate, and the throughput of the non-orthogonal multiple access (NOMA) system is greatly improved compared with the traditional orthogonal multiple access (OMA) systems
    corecore