Zhilin Li, Lei Lei, Gaoqing Shen, Xiaochang Liu, Xiaojiao Liu
{"title":"Digital Twin-Enabled Deep Reinforcement Learning for Safety-Guaranteed Flocking Motion of UAV Swarm","authors":"Zhilin Li, Lei Lei, Gaoqing Shen, Xiaochang Liu, Xiaojiao Liu","doi":"10.1002/ett.70011","DOIUrl":"https://doi.org/10.1002/ett.70011","url":null,"abstract":"<div>\u0000 \u0000 <p>Multi-agent deep reinforcement learning (MADRL) has become a typical paradigm for the flocking motion of UAV swarm in dynamic, stochastic environments. However, sim-to-real problems, such as reality gap, training efficiency, and safety issues, restrict the application of MADRL in flocking motion scenarios. To address these problems, we first propose a digital twin (DT)-enabled training framework. With the assistance of high-fidelity digital twin simulation, effective policies can be efficiently trained. Based on the multi-agent proximal policy optimization (MAPPO) algorithm, we then design the learning approach for flocking motion with matching observation space, action space, and reward function. Afterward, we employ a distributed flocking center estimation algorithm based on position consensus. The estimated center is used as a policy input to improve the aggregation behavior. Moreover, we introduce a repulsion scheme, which applies an additional repulsion force to the action to prevent UAVs from colliding with neighbors and obstacles. Simulation results show that our method performs well in maintaining flocking formation and avoiding collisions, and has better decision-making ability in near-realistic environments.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142641363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic Prevention and Security Enhancement in VANET Using Deep Learning With Trusted Routing Aided Blockchain Technology","authors":"Cloudin Swamynathan, Revathy Shanmugam, Kanagasabapathy Pradeep Mohan Kumar, Balasubramani Subbiyan","doi":"10.1002/ett.70004","DOIUrl":"https://doi.org/10.1002/ett.70004","url":null,"abstract":"<div>\u0000 \u0000 <p>Vehicular ad hoc networks (VANETs) in portable broadband networks are a revolutionary concept with enormous potential for developing safe and efficient transportation systems. Because VANETs are open networks that require regular information sharing, it might be difficult to ensure the security of data delivered through VANETs as well as driver privacy. This paper proposes a blockchain technology that supports trusted routing and deep learning for traffic prevention and security enhancement in VANETs. Initially, the proposed Feature Attention-based Extended Convolutional Capsule Network (FA_ECCN) model predicts the driver's behaviors such as normal, drowsy, distracted, fatigued, aggressive, and impaired. Next, the Binary Fire Hawks-based Optimized Link State Routing Protocol (BFH_OLSRP) is used to route traffic after trust values have been assessed. Furthermore, Binary Fire Hawks Optimization (BFHO) determines the best routing path based on criteria such as link stability and node stability degree. Finally, blockchain storage is supported by the Interplanetary File System (IPFS) technology to improve the security of VANET data. Additionally, the validation process is established by using Delegated Practical Byzantine Fault Tolerance (DPBFT). As a result, the proposed study employs the blockchain system to securely send data to neighboring vehicles via trust-based routing, thereby accurately predicting the driver's behavior. The proposed method achieves a better outcome in terms of latency, packet delivery ratio (PDR), overhead packets, throughputs, end-to-end delay, transmission overhead, and computational cost. According to simulation results and efficiency evaluation, the proposed approach outperforms existing approaches and enhances vehicle communication security in an effective manner.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142641365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DSDOS Cloud: A Decentralized Secure Data Outsourcing System With Hybrid Encryption, Blockchain Smart Contract-Based Access Control, and Hash Authentication Codes for Cloud Security","authors":"K. L. Neela","doi":"10.1002/ett.70016","DOIUrl":"https://doi.org/10.1002/ett.70016","url":null,"abstract":"<div>\u0000 \u0000 <p>With the increasing trend of outsourcing data to cloud services, ensuring data security and privacy has become crucial. Typically, data are stored on cloud servers in encrypted form to mitigate risks. However, accessing the encrypted data requires an access key distributed by a third party. If this third party is untrustworthy, it poses a significant security threat to the system. To address this challenge, we propose a Decentralized Secure Data Outsourcing System (DSDOS) that uses blockchain technology to ensure data security and privacy. The DSDOS system comprises three modules: data security and privacy, access control and authorization, and data integrity and availability. The data security and privacy module uses a hybrid encryption scheme that combines Advanced Encryption Standard (AES), partially homomorphic encryption (PHE), and Diffie–Hellman (DH) to ensure secure data storage and access. The access control and authorization module uses a blockchain-based smart contract system to manage access to the encrypted data. The data integrity and availability module uses hash-based message authentication code (HMAC) to ensure that the data are not tampered with and is always available. We conducted a security and performance analysis of the DSDOS system and found that it outperforms previous schemes in terms of security and performance. The DSDOS system is a secure and privacy-preserving data outsourcing system that can be used to mitigate the security risks associated with traditional cloud storage systems.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142641158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qingqing Tu, Zheng Dong, Chenfei Xie, Xianbing Zou, Ning Wei, Ya Li, Fei Xu
{"title":"A Deep Reinforcement Learning-Based Physical Layer Security Enhancement Design for RIS-Aided mmWave Communications With Practical Constraints","authors":"Qingqing Tu, Zheng Dong, Chenfei Xie, Xianbing Zou, Ning Wei, Ya Li, Fei Xu","doi":"10.1002/ett.70007","DOIUrl":"https://doi.org/10.1002/ett.70007","url":null,"abstract":"<div>\u0000 \u0000 <p>Reconfigurable intelligent surfaces (RIS) offer new opportunities for enhancing security in millimeter-wave (mmWave) communications. However, some significant practical challenges still need to be addressed before their extensive implementation in future wireless networks. This article considers the practical constraints in a secure mmWave system aided by distributed RISs, including imperfect channel state information (CSI) in dynamic channel conditions and high complexity of non-convex optimization in complex environments. To address these challenges, we propose a robust and efficient physical layer security (PLS) enhancement algorithm based on the deep reinforcement learning (DRL) framework to effectively tackle the issues of limited dynamic adaptation and high computational complexity encountered with conventional optimization methods. This algorithm, utilizing an actor-critic architecture, can dynamically track channel variations and optimize strategies for improved system secrecy rate. Numerical simulations demonstrate that the proposed DRL-based PLS enhancement algorithm outperforms non-convex optimization benchmarks in robustness and efficiency for secure mmWave communication systems aided by distributed RISs and affected by imperfect CSI.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142596416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bhupendra Sharma, Anirudh Agarwal, Deepak Mishra, Soumitra Debnath, Santosh Shah
{"title":"Optimal Capacitance Design for IRS Aided Wireless Power Transfer for Sustainable IoT Communication","authors":"Bhupendra Sharma, Anirudh Agarwal, Deepak Mishra, Soumitra Debnath, Santosh Shah","doi":"10.1002/ett.70010","DOIUrl":"https://doi.org/10.1002/ett.70010","url":null,"abstract":"<div>\u0000 \u0000 <p>Intelligent reflecting surface (IRS) is a cutting-edge technique that can significantly improve wireless propagation. It can efficiently utilize wireless power transfer to enable sustainable Internet-of-Things (IoT) transmission by reconfiguring the incident signal from the active transmitter. However, the flexibility of capacitance tuning in the IRS system, which controls underlying reflections, is often overlooked. The effective capacitance design in the IRS system can provide a new degree of freedom in the IoT communication system, which can enable additional performance gain in the received power. To achieve this, a novel IRS circuital optimization model is proposed in this work. It incorporates various electrical parameters of the meta-surface unit cell for improved IoT-enabled communication. The proposed optimization model provides an optimal capacitance as a function of phase shift (PS), which is controlled by IRS, incident frequency, and other IRS electrical parameters. This optimal capacitance is then used to define the received power. The convexity of the optimization problem is proved, and the global optimal capacitance is obtained for received power maximization. Our simulations show that the proposed optimization model outperforms the existing constructive interference-based optimal PS method, for which the capacitance is first calculated. Finally, the analytical results are numerically validated with several optimal design insights.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142561666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Artificial Immune System With Malicious Node Detection and Secure Routing Protocol in MANET","authors":"S. Syed Jamaesha, M. S. Gowtham, M. Ramkumar","doi":"10.1002/ett.70008","DOIUrl":"https://doi.org/10.1002/ett.70008","url":null,"abstract":"<div>\u0000 \u0000 <p>In the context of Mobile Ad Hoc Networks (MANETs), the dynamic and decentralized topology poses significant challenges like unreliable connectivity, limited bandwidth, node mobility, and vulnerability to security threats from malicious nodes. Ensuring secure and energy-efficient data transmission in such environments is crucial for mission-critical applications. This research addresses these pressing challenges by introducing a robust routing protocol capable of detecting and mitigating malicious nodes, thereby enhancing MANET's Quality of Service (QoS). The proposed approach, the Dendritic Cell with Adaptive Trust Q-learning Protocol (dDC-ATQP), integrates several innovative techniques to tackle these issues. Firstly, the trust evaluation mechanism assesses the behavior of nodes to identify potential malicious actors, mitigating the effect of malicious nodes on system execution. Secondly, the adaptive routing strategy optimizes data transmission paths based on real-time network conditions, reducing latency and packet loss. To evaluate the effectiveness of this approach, extensive simulations are conducted using a range of performance metrics. The results demonstrate significant improvements over existing methods, including a throughput increase of (79.2% in 50 s), lower end-to-end-delay (0.075 s for 20 nodes), energy consumption of (38.55/J), higher packet delivery ratio (98% for 20 nodes), reduced packet loss ratio (5% for 100 nodes), enhanced security (80% for 70 nodes).</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142525270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jixian Zhang, Hao Sun, Zhemin Wang, Qian Su, Weidong Li
{"title":"A Novel Clinching Auction Mechanism for Edge Computing Resource Allocation With Budget Limits","authors":"Jixian Zhang, Hao Sun, Zhemin Wang, Qian Su, Weidong Li","doi":"10.1002/ett.70005","DOIUrl":"https://doi.org/10.1002/ett.70005","url":null,"abstract":"<div>\u0000 \u0000 <p>An auction mechanism is an effective resource allocation method that can increase the revenue of resource providers in the field of edge computing. Existing auction mechanism designs mostly aim to maximize social welfare when allocating resources, but these schemes lead to low revenue. In contrast, clinching auctions have achieved good results in spectrum allocation and advertising due to their high revenue. Therefore, a clinching auction mechanism is a promising tool for allocating edge computing resources. However, clinching auctions have the drawback that they can only allocate homogeneous finitely divisible goods, meaning that they cannot be directly applied for resource allocation in edge computing. This article presents two new auction mechanisms that improve on the clinching auction. Specifically, based on the principle of increasing global prices and local competition, two mechanisms are designed, one from the perspective of resource providers (MDCAM-ECS) and the other from the perspective of users (MDCAM-User), to solve the problem of edge computing resource allocation and pricing with deployment constraints and user budget constraints. The mechanisms proposed in this article have the properties of individual rationality, truthfulness, and computational efficiency. In the experiments, in terms of social welfare and revenue, our algorithms can achieve a 20% improvement over existing algorithms, such as fixed-price, Vickery–Clarke–Groves (VCG), and monotonic critical-price mechanisms. Additionally, in most experiments, our algorithm can ensure resource utilization greater than 80%.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142525288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Latency-Sensitive Service Function Chains Intelligent Migration in Satellite Communication Driven by Deep Reinforcement Learning","authors":"Peiying Zhang, Yilin Li, Lizhuang Tan, Kai Liu, Miao Wen, Hao Hao","doi":"10.1002/ett.70006","DOIUrl":"https://doi.org/10.1002/ett.70006","url":null,"abstract":"<div>\u0000 \u0000 <p>Satellite communication technology solves the problem that the traditional wired network infrastructure is difficult to achieve global communication coverage. However, factors such as satellite orbits introduce frequent changes to the network topology, and challenges like satellite failures and communication link interruptions are prevalent. In the face of these issues, service function chain (SFC) migration becomes a crucial method for swiftly adjusting SFCs during faults, maintaining service continuity and availability. This article proposes a latency-sensitive SFC migration algorithm tailored to satellite networks. The algorithm first models the satellite network as a multi-domain virtual network, capturing the constraints faced during SFC migration. Subsequently, a deep reinforcement learning algorithm integrated attention mechanism is designed to more accurately capture and understand the complex network environment and dynamic satellite network topology and derive optimal SFC migration strategies for superior performance. Finally, through experimentation and evaluation of the deep reinforcement learning-driven latency-sensitive service function chain intelligent migration algorithm (LS-SFCM) in satellite communication, this study validates the effectiveness and superior performance of the algorithm in latency-sensitive scenarios. It provides a new avenue for enhancing the service quality and efficiency of satellite communication networks.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142524964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An extensive multivocal literature review of blockchain technology: Evolution, challenges, platforms, security, and interoperability","authors":"Monika, Rajesh Bhatia, Manish Kumar","doi":"10.1002/ett.5037","DOIUrl":"https://doi.org/10.1002/ett.5037","url":null,"abstract":"<p>Blockchain technology has gained enormous interest from industry and academia recently. Technology enthusiasts are exploring its use case beyond cryptocurrencies and claim that blockchain technology can overcome the inefficiencies of centralized systems. In this study, we continue the work of previous authors, aiming to provide a more comprehensive understanding of the technical aspects of blockchain. This study is the first of its kind to review and analyze the current status of different technical aspects of blockchain technology influencing its adoption. We performed an extensive multivocal review to (i) demonstrate the progress of blockchain, (ii) discuss the challenges related to the wide-scale adoption of the technology, (iii) present a detailed analysis of blockchain platforms, (iv) highlight security and interoperability issues followed by the solutions proposed in the literature. We have considered 259 peer-reviewed research papers and the gray literature related to 40 blockchain platforms to provide an in-depth analysis of blockchain technology. In conclusion, this comprehensive survey provides a holistic view of blockchain technology's progress. It identifies challenges, trends, and future research directions, serving as a valuable resource for researchers and practitioners seeking to navigate the dynamic blockchain landscape.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142524942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Analysis of Sierpinski Fractal Antennas for Millimeter-Wave 5G and Ground-Based Radio Navigation Applications","authors":"Arun Raj, Durbadal Mandal","doi":"10.1002/ett.70001","DOIUrl":"https://doi.org/10.1002/ett.70001","url":null,"abstract":"<div>\u0000 \u0000 <p>The paper describes compact fractal antennae combined with ground defected structures (DGS) and substrate integrated waveguide (SIW) techniques for enhancing resonate and multiband behavior concerning bandwidth, gain, and radiation in the desired mm-wave region. Based on the proposed antennae, multiple good notches over wide bands depict a good radiation pattern. The antennae's ultra wide bandwidths (UWB) are 16, 16, and 11.4 GHz concerning resonant frequencies 26.34, 30.35, 34.5, 36.65 GHz; 25.8, 32.2, 35.3 GHz; 30.22, 37.68 GHz, of concerning antennae ant 1 (FA1), 4 (FA2), and 6 (FA3), respectively. The proposed antenna (FA3) with the SIW technique has a peak gain of 5.9 dBi and a peak front-to-back ratio of 20 dB, respectively. The proposed antennas are targeted to cover the practical contribution aspect, including advanced 5G bands support (24–40 GHz), broadband spectrum, frequency agility, low 3 dB beamwidth, interference reduction, and medical application suitability, respectively. The proposed antennae also cover the desired mm wave 5G region with different resonating notches over ultra-wide bandwidth, such as n257, n258, n259, n260, and n261, and ground-based radio navigation applications. Results are validated with vector network analyzer, spectrum analyzer, and power sensor in the presence of absorber, respectively.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142524795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}