{"title":"Energy-Efficient and Robust Communication in Multi-Connectivity Enabled mmWave Ultra-Dense Networks","authors":"Jungjun Kim;Jihwan Lee;Saewoong Bahk","doi":"10.1109/TGCN.2024.3450524","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3450524","url":null,"abstract":"The ultra-dense network (UDN) concept with multi-connectivity (MC) has emerged as a promising scenario for millimeter-wave (mmWave) communications due to its synergistic effect. However, mmWave UDNs with MC face challenges such as escalated energy consumption and computational complexity for traffic splitting decisions. To save energy and reduce the need for frequent traffic splitting decisions in the considered scenario, we formulate the problem as a mixed integer programming (MIP). Our objective is to determine which base stations (BSs) to enable for energy saving and how to split user traffic to maintain robust communication in MC enabled UDNs. To this end, this paper proposes <italic>energy-efficient and robust communication</i> (<italic>EERC</i>), an ensemble of heuristic methods and convex optimization, to achieve our goal without directly solving the computationally expensive MIP. In addition, we consider greedy algorithm that potentially offers enhanced optimality. We analyze the complexity of each scheme and demonstrate that <italic>EERC</i> is the most viable option considering both performance and complexity. Through extensive simulations, we demonstrate that <italic>EERC</i> achieves over 98% optimality for small-sized networks. More importantly, we evaluate <italic>EERC</i> in realistic scenarios using a 3-D ray-tracing simulator and confirm that <italic>EERC</i> performs very well even in urban terrain environments with buildings.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"9 2","pages":"621-634"},"PeriodicalIF":5.3,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Energy Efficient Access and Handover Authentication Scheme for 6G Satellite-Terrestrial Integrated Network","authors":"Zisang Xu;Hao Peng;Ke Gu;Xiong Li;Peng Huang","doi":"10.1109/TGCN.2024.3450515","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3450515","url":null,"abstract":"6G Satellite-Terrestrial Integrated Network (STIN) extends connectivity services globally, attracting an increasing number of users to access the Internet with its advantages of wide coverage, high speed, and large capacity. However, the complex communication environments, such as link exposure and high dynamics of satellites in the network, pose challenges to designing authentication schemes that are applicable to 6G STIN. Although researchers have proposed many authentication schemes for 6G STIN, most of them have only focused on access authentication, which cannot guarantee the stability of subsequent communications. A few schemes have considered providing seamless services through handover authentication, but they still face issues such as security vulnerabilities and high energy consumption. To tackle these issues, this paper proposes an energy efficient authentication scheme for 6G STIN, capable of achieving mutual authentication between entities and negotiating a secure session key. Additionally, it designs a handover mechanism that is more suitable for 6G STIN and supports handover authentication for multiple users. Through security analysis, our scheme is proven to withstand various attacks, and its security is further verified using the ProVerif tool. Performance analysis shows that our scheme has lower authentication latency and communication overhead, while reducing energy consumption and ensuring security.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"9 2","pages":"684-697"},"PeriodicalIF":5.3,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Is Fiber-to-the-Room (FTTR) Green? – Modeling and Analysis of Power and Energy Consumption","authors":"Jinhan Cai;Gangxiang Shen;Jun Li;Sanjay Kumar Bose;Xiaolong Zhang;Hui Liu;Xiang Wang;Tianhai Chang","doi":"10.1109/TGCN.2024.3447874","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3447874","url":null,"abstract":"With the rapid growth of Internet traffic and new services, demands on access network bandwidth and latency have intensified. Fiber-to-the-Room (FTTR) has emerged as a new architecture for indoor networks, extending fiber directly to users via optical edge gateways. Despite FTTR’s performance benefits, concerns about its equipment’s power consumption have been overlooked. This study investigates FTTR-based home networks, developing models for device power consumption and energy use over time. Results indicate higher power consumption required by FTTR-based networks compared to traditional Wi-Fi networks. To mitigate this, we propose leveraging FTTR’s centralized control for an innovative energy-saving mechanism, enhancing network efficiency and reducing overall energy consumption. Additionally, we explore integrating millimeter-wave technology to further boost energy efficiency through increased transmission capacity.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"9 2","pages":"522-535"},"PeriodicalIF":5.3,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Relay Selection and Power Control for Mobile Underwater Acoustic Communication Networks: A Dual-Thread Reinforcement Learning Approach","authors":"Jun Dai;Xinbin Li;Song Han;Junzhi Yu;Zhixin Liu","doi":"10.1109/TGCN.2024.3445142","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3445142","url":null,"abstract":"This paper deals with a cooperation communication problem (relay selection and power control) for mobile underwater acoustic communication networks. To achieve satisfactory transmission capacity, we propose a reinforcement-learning-based cooperation communication scheme to efficiently resist the highly dynamic communication links and strongly unknown time-varying channel states caused by the mobility of Autonomous Underwater Vehicles (AUVs). Firstly, a particular Markov decision process is developed to model the dynamic relay selection process of mobile AUV in the unknown scenario. In the developed model, an experimental statistical-based partition mechanism is proposed to cope with the greatly increasing dimension of the state space caused by the mobility of AUV, reducing the search optimization difficulty. Secondly, a dual-thread reinforcement learning structure with actual and virtual learning threads is proposed to efficiently track the superior relay action. In the actual learning thread, the proposed improved probability greedy policy enables the AUV to strengthen the exploration for the reward information of potential superior relays on the current state. Meanwhile, in the virtual learning thread, the proposed upper-confidence-bound-index-based uncertainty estimation method can estimate the action-reward level of historical states. Consequently, the combination of actual and virtual learning threads can efficiently obtain satisfactory Q value information, thereby making superior relay decision-making in a short time. Thirdly, a power control mechanism is proposed to reuse the current observed action-reward information and transform the multiple unknown parameter nonlinear joint power optimization problem into a convex optimization problem, thereby enhancing network transmission capacity. Finally, simulation results verify the effectiveness of the proposed scheme.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"9 2","pages":"698-710"},"PeriodicalIF":5.3,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information-Theoretic Study of Time-Domain Energy-Saving Techniques in Radio Access","authors":"François Rottenberg","doi":"10.1109/TGCN.2024.3443649","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3443649","url":null,"abstract":"Reduction of wireless network energy consumption is becoming increasingly important to reduce environmental footprint and operational costs. A key concept to achieve it is the use of lean transmission techniques that dynamically (de)activate hardware resources as a function of the load. In this paper, we propose a pioneering information-theoretic study of time-domain energy-saving techniques, relying on a practical hardware power consumption model of sleep and active modes. By minimizing the power consumption under a quality of service constraint (rate, latency), we propose simple yet powerful techniques to allocate power and choose which resources to activate or to put in sleep mode. Power consumption scaling regimes are identified. We show that a “rush-to-sleep” approach (maximal power in fewest symbols followed by sleep) is optimal in a low-signal-to-noise ratio (SNR) regime. It is shown how consumption can be made linear with the load and achieve massive energy reduction (factor of 10) at low-to-medium load. The trade-off between energy efficiency (EE) and spectral efficiency (SE) is also characterized, followed by a multi-user study based on time division multiple access (TDMA).","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"9 2","pages":"605-620"},"PeriodicalIF":5.3,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yadong Zhang;Peng Wang;Qubeijian Wang;Haibin Zhang;Lexi Xu;Wen Sun;Bin Wang
{"title":"Evolutionary Game-Based Adaptive DT Association and Transfer for Wireless Computing Power Networks","authors":"Yadong Zhang;Peng Wang;Qubeijian Wang;Haibin Zhang;Lexi Xu;Wen Sun;Bin Wang","doi":"10.1109/TGCN.2024.3442910","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3442910","url":null,"abstract":"Wireless Computing Power Networks (WCPN), guided by green principles, aim to provide efficient, flexible, and environmentally friendly computing services for Internet of Things (IoT) applications by seamlessly coordinating computational and networking resources across diverse nodes. The integration of Digital Twin (DT) technology is crucial for achieving these objectives. However, different DT association strategies play a crucial role in enhancing the capabilities of WCPN. In this paper, recognizing the long-term and dynamic nature of DT deployment in real-world scenarios, we utilize evolutionary game theory to model the association and transfer of DTs, aiming for continuous adaptive adjustments and optimizations in their deployment. Specifically, we propose an evolutionary game-based algorithm for DT association as a complement to the independent decision-making process in DT deployment. Moreover, in light of the inherent limitations of the evolutionary game selection mechanism and the lack of self-learning ability, we introduce a deep Q-network (DQN) based evolutionary game approach that ensures adaptive DT association and transfer by considering factors such as DT synchronization delay, model consistency, and migration costs. Numerical results demonstrate that our proposed algorithms outperform the benchmarks in terms of average user utility and convergence speed.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"9 2","pages":"670-683"},"PeriodicalIF":5.3,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nuo Huang;Feng Chen;Changyuan Liu;Yan-Yu Zhang;Yi-Jun Zhu;Chen Gong
{"title":"Robust Design and Experimental Demonstration of RSS-Based Visible Light Positioning Under Limited Receiving FOV","authors":"Nuo Huang;Feng Chen;Changyuan Liu;Yan-Yu Zhang;Yi-Jun Zhu;Chen Gong","doi":"10.1109/TGCN.2024.3443086","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3443086","url":null,"abstract":"In this paper, we propose a robust received signal strength (RSS)-based indoor visible light positioning (VLP) scheme under limited receiving field-of-view (FOV). The position estimation in the time domain is complicated, and the time-frequency transform is first performed on the received time-domain signal to establish an equivalent frequency-domain RSS model, which simplifies the signal representation and problem solving. To realize robust VLP under limited receiving FOV, we consider the joint estimation of the receiver coordinate, light emitting diode (LED) validity indicator vector, signal phase vector and receiving coefficient based on the frequency-domain RSS vector. The original estimation problem is equivalently transformed into the optimization problem that maximizes the angle between the valid RSS modulus vector and the valid RSS feature vector. Experimental and simulation results verify the effectiveness of the proposed scheme under limited receiving FOV. Specifically, experimental results show that the proposed VLP scheme achieves a stable positioning accuracy below 5 cm under limited receiving FOV in a 60 cm <inline-formula> <tex-math>$times $ </tex-math></inline-formula> 60 cm positioning region with transceiver height 150 cm.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"9 1","pages":"392-403"},"PeriodicalIF":5.3,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143403789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fan Wu;Xiong Li;Jingwei Li;Pandi Vijayakumar;Brij B. Gupta;Varsha Arya
{"title":"HSADR: A New Highly Secure Aggregation and Dropout-Resilient Federated Learning Scheme for Radio Access Networks With Edge Computing Systems","authors":"Fan Wu;Xiong Li;Jingwei Li;Pandi Vijayakumar;Brij B. Gupta;Varsha Arya","doi":"10.1109/TGCN.2024.3441532","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3441532","url":null,"abstract":"Open radio access network (ORAN) plays a critical role in modern communication process. The structure that individual devices connect each other via ORAN turns to be a part of smart city. Incorporating with the concept Internet of Things (IoT), cloud-edge-client architecture has been accepted to discuss artificial intelligence (AI) coordinating functions in ORAN. Considering the security for ORAN in critical infrastructure, federated learning (FL) is an effective way to protect the original data on individual devices. However, recent schemes failed to support enough security features. To tackle the problem, we present a new highly secure aggregation and dropout-resilient FL scheme called HSADR which incorporates consortium blockchain and differential privacy to maintain the security environment. Second, we prove that the aggregation process reaches the IND-CCA2 security level, which is the first scheme to complete this goal. Last, experiments show that HSADR withstands common test aspects.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"8 3","pages":"1141-1155"},"PeriodicalIF":5.3,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physical Layer Authentication via Conditional Variational Auto-Encoder for AIS","authors":"Qi Jiang;Jin Sha","doi":"10.1109/TGCN.2024.3439536","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3439536","url":null,"abstract":"Automatic identification system (AIS) with satellite components is exposed to increasing external attackers due to its high degree of openness. Radio frequency fingerprint identification (RFFI) offers a new perspective on AIS security solutions as a physical layer authentication scheme. However, existing RFFI methods are constrained by sensitivity to noise or interference, and these methods are cumbersome to tune when directly applied to satellite AIS (SAT-AIS). To this end, this paper proposes an RFFI method based on a conditional variational auto-encoder (CVAE). Specifically, the fractional lower-order cyclic spectrum as an extension of the conventional cyclic spectrum is used as a feature transformation to highlight the RFF features in the time-frequency domain. In addition, CVAE with multiple attention mechanisms is used to adaptively compress and extract discriminative RFF features to improve the RFFI accuracy. Experimental results show that the proposed method can yield 98.28% accuracy at <inline-formula> <tex-math>$E_{b}/N_{0}$ </tex-math></inline-formula> of 10 dB, with high reliability and robustness under noise environment.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"9 2","pages":"513-521"},"PeriodicalIF":5.3,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Tree-Based Avoidance Multicast Routing for Wireless Sensor Networks","authors":"Kazuya Sakai;Min-Te Sun;Wei-Shinn Ku","doi":"10.1109/TGCN.2024.3436011","DOIUrl":"https://doi.org/10.1109/TGCN.2024.3436011","url":null,"abstract":"Multi-path avoidance routing for wireless sensor networks (WSNs) is a secure routing paradigm against adversaries with unbounded computational power. The key idea of avoidance routing is to encode a message into several pieces by the XOR coding, and each piece is routed via different paths. Then, an adversary cannot obtain the original message unless she eavesdrops on all message pieces from all the paths. In this paper, we extend such an approach into secure multicast routing, which is a one-to-many communication primitive. To this end, we propose the multi-tree-based avoidance multicast routing protocol (AMRP) for WSNs, in which a set of adversary disjoint trees is discovered, i.e., a set of multicast trees with no common adversaries. When a set of multicast trees is adversary disjoint, no adversary can eavesdrop on all message pieces to recover the original message. In addition, optimized AMRP (OAMRP) is proposed in order to reduce the control overhead of AMRP, where additional multicast trees are used for only a subset of destination nodes with no single safe tree. The simulation results demonstrate that the proposed protocols achieve higher secure delivery rates than a simple extension of the existing unicast avoidance routing protocol.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"9 2","pages":"484-497"},"PeriodicalIF":5.3,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}