22 research outputs found

    Optimizing performance and energy efficiency of group communication and internet of things in cognitive radio networks

    Get PDF
    Data traffic in the wireless networks has grown at an unprecedented rate. While traditional wireless networks follow fixed spectrum assignment, spectrum scarcity problem becomes a major challenge in the next generations of wireless networks. Cognitive radio is a promising candidate technology that can mitigate this critical challenge by allowing dynamic spectrum access and increasing the spectrum utilization. As users and data traffic demands increases, more efficient communication methods to support communication in general, and group communication in particular, are needed. On the other hand, limited battery for the wireless network device in general makes it a bottleneck for enhancing the performance of wireless networks. In this thesis, the problem of optimizing the performance of group communication in CRNs is studied. Moreover, energy efficient and wireless-powered group communication in CRNs are considered. Additionally, a cognitive mobile base station and a cognitive UAV are proposed for the purpose of optimizing energy transfer and data dissemination, respectively. First, a multi-objective optimization for many-to-many communication in CRNs is considered. Given a many-to-many communication request, the goal is to support message routing from each user in the many-to-many group to each other. The objectives are minimizing the delay and the number of used links and maximizing data rate. The network is modeled using a multi-layer hyper graph, and the secondary users\u27 transmission is scheduled after establishing the conflict graph. Due to the difficulty of solving the problem optimally, a modified version of an Ant Colony meta-heuristic algorithm is employed to solve the problem. Additionally, energy efficient multicast communication in CRNs is introduced while considering directional and omnidirectional antennas. The multicast service is supported such that the total energy consumption of data transmission and channel switching is minimized. The optimization problem is formulated as a Mixed Integer Linear Program (MILP), and a heuristic algorithm is proposed to solve the problem in polynomial time. Second, wireless-powered machine-to-machine multicast communication in cellular networks is studied. To incentivize Internet of Things (IoT) devices to participate in forwarding the multicast messages, each IoT device participates in messages forwarding receives Radio Frequency (RF) energy form Energy Transmitters (ET) not less than the amount of energy used for messages forwarding. The objective is to minimize total transferred energy by the ETs. The problem is formulated mathematically as a Mixed Integer Nonlinear Program (MINLP), and a Generalized Bender Decomposition with Successive Convex Programming (GBD-SCP) algorithm is introduced to get an approximate solution since there is no efficient way in general to solve the problem optimally. Moreover, another algorithm, Constraints Decomposition with SCP and Binary Variable Relaxation (CDR), is proposed to get an approximate solution in a more efficient way. On the other hand, a cognitive mobile station base is proposed to transfer data and energy to a group of IoT devices underlying a primary network. Total energy consumed by the cognitive base station in its mobility, data transmission and energy transfer is minimized. Moreover, the cognitive base station adjusts its location and transmission power and transmission schedule such that data and energy demands are supported within a certain tolerable time and the primary users are protected from harmful interference. Finally, we consider a cognitive Unmanned Aerial Vehicle (UAV) to disseminate data to IoT devices. The UAV senses the spectrum and finds an idle channel, then it predicts when the corresponding primary user of the selected channel becomes active based on the elapsed time of the off period. Accordingly, it starts its transmission at the beginning of the next frame right after finding the channel is idle. Moreover, it decides the number of the consecutive transmission slots that it will use such that the number of interfering slots to the corresponding primary user does not exceed a certain threshold. A mathematical problem is formulated to maximize the minimum number of bits received by the IoT devices. A successive convex programming-based algorithm is used to get a solution for the problem in an efficiency way. It is shown that the used algorithm converges to a Kuhn Tucker point

    A blockchain-based deep-learning-driven architecture for quality routing in wireless sensor networks

    Get PDF
    Over the past few years, great importance has been given to wireless sensor networks (WSNs) as they play a significant role in facilitating the world with daily life services like healthcare, military, social products, etc. However, heterogeneous nature of WSNs makes them prone to various attacks, which results in low throughput, and high network delay and high energy consumption. In the WSNs, routing is performed using different routing protocols like low-energy adaptive clustering hierarchy (LEACH), heterogeneous gateway-based energy-aware multi-hop routing (HMGEAR), etc. In such protocols, some nodes in the network may perform malicious activities. Therefore, four deep learning (DL) techniques and a real-time message content validation (RMCV) scheme based on blockchain are used in the proposed network for the detection of malicious nodes (MNs). Moreover, to analyse the routing data in the WSN, DL models are trained on a state-of-the-art dataset generated from LEACH, known as WSN-DS 2016. The WSN contains three types of nodes: sensor nodes, cluster heads (CHs) and the base station (BS). The CHs after aggregating the data received from the sensor nodes, send it towards the BS. Furthermore, to overcome the single point of failure issue, a decentralized blockchain is deployed on CHs and BS. Additionally, MNs are removed from the network using RMCV and DL techniques. Moreover, legitimate nodes (LNs) are registered in the blockchain network using proof-of-authority consensus protocol. The protocol outperforms proof-of-work in terms of computational cost. Later, routing is performed between the LNs using different routing protocols and the results are compared with original LEACH and HMGEAR protocols. The results show that the accuracy of GRU is 97%, LSTM is 96%, CNN is 92% and ANN is 90%. Throughput, delay and the death of the first node are computed for LEACH, LEACH with DL, LEACH with RMCV, HMGEAR, HMGEAR with DL and HMGEAR with RMCV. Moreover, Oyente is used to perform the formal security analysis of the designed smart contract. The analysis shows that blockchain network is resilient against vulnerabilities. © 2013 IEEE

    Malicious node detection using machine learning and distributed data storage using blockchain in WSNs

    Get PDF
    In the proposed work, blockchain is implemented on the Base Stations (BSs) and Cluster Heads (CHs) to register the nodes using their credentials and also to tackle various security issues. Moreover, a Machine Learning (ML) classifier, termed as Histogram Gradient Boost (HGB), is employed on the BSs to classify the nodes as malicious or legitimate. In case, the node is found to be malicious, its registration is revoked from the network. Whereas, if a node is found to be legitimate, then its data is stored in an Interplanetary File System (IPFS). IPFS stores the data in the form of chunks and generates hash for the data, which is then stored in blockchain. In addition, Verifiable Byzantine Fault Tolerance (VBFT) is used instead of Proof of Work (PoW) to perform consensus and validate transactions. Also, extensive simulations are performed using the Wireless Sensor Network (WSN) dataset, referred as WSN-DS. The proposed model is evaluated both on the original dataset and the balanced dataset. Furthermore, HGB is compared with other existing classifiers, Adaptive Boost (AdaBoost), Gradient Boost (GB), Linear Discriminant Analysis (LDA), Extreme Gradient Boost (XGB) and ridge, using different performance metrics like accuracy, precision, recall, micro-F1 score and macro-F1 score. The performance evaluation of HGB shows that it outperforms GB, AdaBoost, LDA, XGB and Ridge by 2-4%, 8-10%, 12-14%, 3-5% and 14-16%, respectively. Moreover, the results with balanced dataset are better than those with original dataset. Also, VBFT performs 20-30% better than PoW. Overall, the proposed model performs efficiently in terms of malicious node detection and secure data storage. © 2013 IEEE

    Improvement of Bi-directional Communications using Solar Powered Reconfigurable Intelligent Surfaces

    Get PDF
    Recently, there has been a flurry of research on the use of Reconfigurable Intelligent Surfaces (RIS) in wireless networks to create dynamic radio environments. In this paper, we investigate the use of an RIS panel to improve bi-directional communications. Assuming that the RIS will be located on the facade of a building, we propose to connect it to a solar panel that harvests energy to be used to power the RIS panel’s smart controller and reflecting elements. Therefore, we present a novel framework to optimally decide the transmit power of each user and the number of elements that will be used to reflect the signal of any two communicating pair in the system (user-user or base station-user). An optimization problem is formulated to jointly minimize a scalarized function of the energy of the communicating pair and the RIS panel and to find the optimal number of reflecting elements used by each user. Although the formulated problem is a mixed-integer nonlinear problem, the optimal solution is found by linearizing the non-linear constraints. Besides, a more efficient close to the optimal solution is found using Bender decomposition. Simulation results show that the proposed model is capable of delivering the minimum rate of each user even if line-of-sight communication is not achievable

    Energy Efficient Data Forwarding in Disconnected Networks Using Cooperative UAVs

    Get PDF
    Data forwarding from a source to a sink node when they are not within the communication range is a challenging problem in wireless networking. With the increasing demand of wireless networks, several applications have emerged where a group of users are disconnected from their targeted destinations. Therefore, we consider in this paper a multi-Unmanned Aerial Vehicles (UAVs) system to convey collected data from isolated fields to the base station. In each field, a group of sensors or Internet of Things devices are distributed and send their data to one UAV. The UAVs collaborate in forwarding the collected data to the base station in order to maximize the minimum battery level for all UAVs by the end of the service time. Hence, a group of UAVs can meet at a waypoint along their path to the base station such that one UAV collects the data from all other UAVs and moves forward to another meeting point or the base station. All other UAVs that relayed their messages return back to their initial locations. All collected data from all fields reach to the base station within a certain maximum time to guarantee a certain quality of service. We formulate the problem as a Mixed Integer Nonlinear Program (MINLP), then we reformulated the problem as Mixed Integer Linear Program (MILP) after we linearize the mathematical model. Simulations results show the advantages of adopting the proposed model in using the UAVs\u27 energy more efficiently

    SafeSpace MFNet: Precise and Efficient MultiFeature Drone Detection Network

    Full text link
    The increasing prevalence of unmanned aerial vehicles (UAVs), commonly known as drones, has generated a demand for reliable detection systems. The inappropriate use of drones presents potential security and privacy hazards, particularly concerning sensitive facilities. To overcome those obstacles, we proposed the concept of MultiFeatureNet (MFNet), a solution that enhances feature representation by capturing the most concentrated feature maps. Additionally, we present MultiFeatureNet-Feature Attention (MFNet-FA), a technique that adaptively weights different channels of the input feature maps. To meet the requirements of multi-scale detection, we presented the versions of MFNet and MFNet-FA, namely the small (S), medium (M), and large (L). The outcomes reveal notable performance enhancements. For optimal bird detection, MFNet-M (Ablation study 2) achieves an impressive precision of 99.8\%, while for UAV detection, MFNet-L (Ablation study 2) achieves a precision score of 97.2\%. Among the options, MFNet-FA-S (Ablation study 3) emerges as the most resource-efficient alternative, considering its small feature map size, computational demands (GFLOPs), and operational efficiency (in frame per second). This makes it particularly suitable for deployment on hardware with limited capabilities. Additionally, MFNet-FA-S (Ablation study 3) stands out for its swift real-time inference and multiple-object detection due to the incorporation of the FA module. The proposed MFNet-L with the focus module (Ablation study 2) demonstrates the most remarkable classification outcomes, boasting an average precision of 98.4\%, average recall of 96.6\%, average mean average precision (mAP) of 98.3\%, and average intersection over union (IoU) of 72.8\%. To encourage reproducible research, the dataset, and code for MFNet are freely available as an open-source project: github.com/ZeeshanKaleem/MultiFeatureNet.Comment: Paper accepted in IEEE TV

    Seroprevalence of SARS-CoV-2 (COVID-19) among Healthcare Workers in Saudi Arabia: Comparing Case and Control Hospitals

    Get PDF
    Healthcare workers (HCWs) stand at the frontline for fighting coronavirus disease 2019 (COVID-19) pandemic. This puts them at higher risk of acquiring the infection than other individuals in the community. Defining immunity status among health care workers is therefore of interest since it helps to mitigate the exposure risk. This study was conducted between May 20th and 30th, 2020. Eighty-five hospitals across Kingdom of Saudi Arabia were divided into 2 groups: COVID-19 referral hospitals are those to which RT-PCR-confirmed COVID-19 patients were admitted or referred for management (Case-hospitals). COVID-19 nonaffected hospitals where no COVID-19 patients had been admitted or managed and no HCW outbreak (Control hospitals). Next, seroprevalence of severe acute respiratory syndrome coronavirus 2 among HCWs was evaluated; there were 12,621 HCWs from the 85 hospitals. There were 61 case-hospitals with 9379 (74.3%) observations, and 24 control-hospitals with 3242 (25.7%) observations. The overall positivity rate by the immunoassay was 299 (2.36%) with a significant difference between the case-hospital (2.9%) and the control-group (0.8%) (P value <0.001). There was a wide variation in the positivity rate between regions and/or cities in Saudi Arabia, ranging from 0% to 6.31%. Of the serology positive samples, 100 samples were further tested using the SAS2pp neutralization assay; 92 (92%) samples showed neutralization activity. The seropositivity rate in Kingdom of Saudi Arabia is low and varies across different regions with higher positivity in case-hospitals than control-hospitals. The lack of neutralizing antibodies (NAb) in 8% of the tested samples could mean that assay is a more sensitive assay or that neutralization assay has a lower detection limits; or possibly that some samples had cross-reaction to spike protein of other coronaviruses in the assay, but these were not specific to neutralize severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2)
    corecore