{"title":"Improved Soft-k-Means Clustering Charging Based on Node Collaborative Scheduling in Wireless Sensor Networks","authors":"Minghua Wang, Hengshun Chen, Yan Wang, Wenbo Chen","doi":"10.1007/s11277-024-11511-7","DOIUrl":"https://doi.org/10.1007/s11277-024-11511-7","url":null,"abstract":"<p>Energy is still one of the most important problems in wireless sensor network (WSN). With the application of wireless charging vehicle (WCV), wireless charging technology can be used to solve the energy problem of WSN. In the wireless rechargeable sensor network (WRSN), how to reasonably deploy the WCV has become a problem in planning. The existing studies only consider the impact of independent coverage contribution of a single node on the charging path planning, but do not consider the redundant coverage area that may occur when a single node works independently, resulting in a small or even zero coverage contribution of some nodes. This paper propose Improved Soft-k-Means Clustering Charging Based on Node Collaborative Scheduling (ISKCC-NCS) to keep the coverage quality of WSN. At first, this algorithm uses Improved Soft-k-Means to cluster WRSN, and realizes confident information coverage through collaborative sensing between adjacent nodes. The second, we evaluate the coverage contribution of each node to be charged and calculate the priority of the node. The third, we form new charging path by inserting and deleting tasks. At last, a carrier charging vehicle (CCV) is used to carry several micro charging vehicle (MCV) to each cluster to charge the sensor node. Through a large number of simulation experiments, it is found that compared with other algorithms, ISKCC-NCS can significantly enhance the coverage rate and monitoring stability of the WSN.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"216 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohd Anas Khan, Shalu, Quadri Noorulhasan Naveed, Ayodele Lasisi, Sheetal Kaushik, Sunil Kumar
{"title":"A Multi-Layered Assessment System for Trustworthiness Enhancement and Reliability for Industrial Wireless Sensor Networks","authors":"Mohd Anas Khan, Shalu, Quadri Noorulhasan Naveed, Ayodele Lasisi, Sheetal Kaushik, Sunil Kumar","doi":"10.1007/s11277-024-11391-x","DOIUrl":"https://doi.org/10.1007/s11277-024-11391-x","url":null,"abstract":"<p>The decision-making process in Industrial Wireless Sensor Networks heavily relies on the information provided by smart sensors. Ensuring the trustworthiness of these sensors is essential to prolong the lifetime of the network. Additionally, dependable data transmission by sensor nodes is crucial for effective decision-making. Trust management approaches play a vital role in safeguarding industrial sensor networks from internal threats, enhancing security, dependability, and network resilience. However, existing trust management schemes often focus solely on communication behaviour to calculate trust values, potentially leading to incorrect decisions amidst prevalent malicious attacks. Moreover, these schemes often fail to meet the resource and dependability requirements of IWSNs. To address these limitations, this paper proposes a novel hybrid Trust Management Scheme called the Multi-layered Assessment System for Trustworthiness Enhancement and Reliability (MASTER). The MASTER scheme employs a clustering approach within a hybrid architecture to reduce communication overhead, effectively detecting and mitigating various adversarial attacks such as Sybil, Blackhole, Ballot stuffing, and On–off attacks with minimal overheads. This multifactor trust scheme integrates both communication-based trust and data-based trust during trust estimation, aiming to improve the lifetime of industrial sensor networks. Furthermore, the proposed MASTER scheme utilizes a flexible weighting scheme that assigns more weight to recent interactions during both direct and recommendation (indirect) trust evaluation. This approach ensures robust and precise trust values tailored to the specific network scenario. To efficiently process and glean insights from dispersed data, machine learning algorithms are employed, offering a suitable solution. Experimental results demonstrate the superior performance of the MASTER scheme in several key metrics compared to recent trust models. For instance, when 30% of malicious Sensor Nodes (SNs) exist in a network comprising 500 sensor nodes, the MASTER scheme achieves a malicious behaviour detection rate of 97%, surpassing the rates of other models. Even after the occurrence of malicious SNs exceeding 30%, the False Negative Rate (FNR) in the MASTER scheme remains lower than other models due to adaptive trust functions employed at each level. With 50% malicious SNs in the network, the MASTER scheme achieves a malicious behaviour detection accuracy of 91%, outperforming alternative models. Moreover, the average energy consumption of SNs in the MASTER scheme is significantly lower compared to other schemes, owing to its elimination of unnecessary transactions through clustered topology utilization. Specifically, with 30% and 50% malicious SNs in the network, the MASTER scheme achieves throughput rates of 150 kbps and 108 kbps, respectively, demonstrating its efficiency in challenging network scenarios. Overall, the proposed MASTER scheme ","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"35 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141864867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secrecy Performance Analysis of Cooperative NOMA with AF and DF Protocol over Rayleigh Channel","authors":"K. Ashwini, V. K. Jagadeesh","doi":"10.1007/s11277-024-11507-3","DOIUrl":"https://doi.org/10.1007/s11277-024-11507-3","url":null,"abstract":"<p>The article examined the physical layer security of cooperative non-orthogonal multiple access (NOMA) network over Rayleigh fading channels by considering one eavesdropper. Relaying techniques like decode-and-forward (DF) and amplify–and–forward (AF) protocols are analyzed. The secrecy rate and secrecy outage probability of the system considering NOMA-AF and NOMA-DF systems were derived. Two cases were considered for the analysis, one system model where a near user operates as relay, forwarding the signal to far user; another where a relay is used in forwarding the signal to both users. Simulation results were obtained for different values of power allocation coefficients. These results show that the system model proposed in case 2 provides a better secrecy performance result than NOMA based models proposed in case 1 under both relaying techniques.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"23 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141864869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Analysis of Multiband Microstrip Antenna Using Multiple Notches for Wireless Communication in L and S-Band Applications","authors":"Ramesh Kumar Verma, Akhilesh Kumar, Prabina Pattanayak, Vivek Rajpoot, Vikram Bali, Sonali Mathur","doi":"10.1007/s11277-024-11482-9","DOIUrl":"https://doi.org/10.1007/s11277-024-11482-9","url":null,"abstract":"<p>In this paper, a multiband microstrip antenna of compact size (0.2 × 0.25<span>(:{lambda:}_{0}^{2}=0.05{lambda:}_{0}^{2})</span><span>(:text{a}text{t}:text{l}text{o}text{w}text{e}text{r}:text{r}text{e}text{s}text{o}text{n}text{a}text{n}text{t}:text{f}text{r}text{e}text{q}text{u}text{e}text{n}text{c}text{y}:1.63:text{G}text{H}text{z})</span>) is designed by loading multiple notches in the patch of antenna. The patch of antenna consist two L-shaped and two rectangular shaped notches. The modified patch of antenna provides triple resonating bands from 1.58 to 1.71 GHz, 1.89 to 2.06 GHz and 2.81 to 2.93 GHz under the − 10 dB scale resonating at frequency 1.63 GHz, 2 GHz and 2.87 GHz respectively. The bandwidth of triple band antenna is obtained 7.9% (130 MHz), 8.61% (170 MHz) and 4.18% (120 MHz) with − 16.6 dB, − 26.99 dB and − 31.88 dB reflection coefficient at resonating frequency. The lower and middle resonances are due to L-shape notches while higher resonance is due to rectangular shape notches. The presented antenna is fed by microstrip line feed of 50 Ω and the simulation is performed by IE3D software. It shows 2.6−3.1 dB, 2.9−3.5 dB and 4.2−5 dB simulated gain and 85−93%, 87−95% and 88−96% antenna efficiency in three resonating bands. The three resonating bands of proposed antenna can be used for the application of different wireless communications in L and S-bands. The proposed work is also compared with the previous published articles to find out the improvement.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"197 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141864728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Analysis of Two Z Shape Dielectric Resonator Antenna for Wireless Applications","authors":"Ashok Kumar, Rajveer Singh Yaduvanshi","doi":"10.1007/s11277-024-11472-x","DOIUrl":"https://doi.org/10.1007/s11277-024-11472-x","url":null,"abstract":"<p>This research examines the performance of two Z-shaped dielectric resonator antenna designs that employ silicon substrate material and operate at a frequency of 10 terahertz. CST software was used to simulate and create a two-Z shape DRA. Results of enhanced gain are analyzed and compared with earlier research. The suggested Two Z shape DRA has a gain of 7.31 dB and a return loss of -15.9 dB.The two Z-shaped dielectric resonator antennas have an impedance bandwidth of 66.66%.The VSWR of two Z-shaped dielectric resonator antennas is around 2 dB, which is acceptable. This proposed approach may be suitable for a wide range of communication applications, including wireless and terahertz applications.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"23 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141864736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vivek Rajpoot, Vijay Shanker Tripathi, Ajay Kumar, R. V. V. Krishna
{"title":"Cross-layer Design Based Common Data Channel Selection Scheme in Cognitive Radio Ad-hoc Network","authors":"Vivek Rajpoot, Vijay Shanker Tripathi, Ajay Kumar, R. V. V. Krishna","doi":"10.1007/s11277-024-11417-4","DOIUrl":"https://doi.org/10.1007/s11277-024-11417-4","url":null,"abstract":"<p>A minimal interrupted communication link set-up is the primary objective of the medium access control (MAC) layer. The MAC layer is responsible for accessing the communication channel. At MAC, the control information is shared through the control channel to select a collision-free data channel. Therefore, the sharing of control information prior to data channel selection plays a pivotal role in achieving desired QoS in cognitive radio (CR) technology. Random data channel selection is used in conventional CR scenarios. The random selection lacks in performance due to the unpredictability of primary user (PU) appearances in the data channels. This unpredictability in PU appearances will increase the number of handoffs in the scenario and sometimes may cause communication link failure. These adverse effects can be avoided if a common data channel selection scheme is implemented. The common data channel selection scheme selects a channel that has fewer chances of PU appearance. In the reported research paper, the work has been carried out in two parts. In the first part, a primary user free channel list (PCL) is formed at each node. Each node shares its PCL with all neighbour nodes. The sharing of PCL helps in implementing a common data channel selection scheme among nodes. The selected common channel is used for data transmission. The conventional OSI layered structure is used to observe the performances. In the second part, a cross-layer framework is proposed to improve the performance. The cross-layering has been done between the network and MAC layer. The proposed cross-layer framework helps in sharing PCL in an efficient manner. The need for an extra beacon to transfer PCL is avoided in the proposed cross-layer design. The performance of control overhead and average delay becomes better. The simulation results show that the proposed cross-layer design approach performs satisfactorily in terms of packet delivery ratio, average throughput, average delay, average energy consumption and control overhead. The observed results are also tested in the worst scenarios. The proposed scheme has applications in small throughput scenarios like cognitive radio aided sensor networks.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"7 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141864729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VLSI Architecture for Implementing OTFS","authors":"Ashish Ranjan Shadangi, Suvra Sekhar Das, Indrajit Chakrabarti","doi":"10.1007/s11277-024-11488-3","DOIUrl":"https://doi.org/10.1007/s11277-024-11488-3","url":null,"abstract":"<p>Orthogonal Time Frequency Space (OTFS) modulation is proposed to support high-speed and reliable vehicular communication scenarios, which is a novel two-dimensional (2D) delay-Doppler domain modulation technique. Compared with traditional modulation schemes such as orthogonal frequency division multiplexing (OFDM), OTFS has displayed better performance in very high-mobility wireless channels. In this work, we have proposed the novel VLSI architecture for OTFS in the Additive White Gaussian Noise (AWGN) channel condition and shown the resource utilization report of our proposed architecture to implement on Field Programmable Gate Array (FPGA) board, along with the relationship between inputs and outputs of the OTFS signal in the delay-Doppler domain.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"52 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141864733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Realization of Capacity Effects on Polar Codes and Simplified Successive Cancellation Decoding with GA Approach","authors":"Suma, M. R. Yashas","doi":"10.1007/s11277-024-11390-y","DOIUrl":"https://doi.org/10.1007/s11277-024-11390-y","url":null,"abstract":"<p>Polar code (PC) innovation has drawn attention from businesses and academics over the decade, especially in the communication sector. The fifth-generation wireless standard (5G) uses polar codes as a coding technique. Concerning short- to intermediate or long-length codes, the polar decoding fails to repair errors in successive cancellation (SC) decoding sufficiently. Still, by employing successive cancellation list (SCL) decoding, SC decoding can more effectively rectify errors. The main disadvantage of SCL is its increased cost driven by throughput and computational complexity. Building polar codes over an AWGN channel with little computational cost remains an ongoing research issue. Therefore, to address the shortcomings of the SC/SCL decoders, the Simplified successive cancellation (SSC) decoder of polar codes with an improved Gaussian Approximation (GA) technique over an additive white Gaussian noise (AWGN) channel is proposed in this work. Compared to the density evolution technique, the SSC decoder with GA will more easily trace the mean log-likelihood ratio (LLR). The SSC decoder is examined using a GA technique at high and low code rates and lengths. The capacity effects of PCs concerning performance metrics like bit error rate (BER) and block error rate (BLER) are realized in detail at various code lengths. The proposed work is compared with conventional Huawei approximation (HA) and other decoding with better improvement in BER and BLER.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"107 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141864730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensemble Diabetic Retinopathy Detection in 2-D Color Fundus Retina Scan","authors":"Himanshu Jindal, Shruti Jain, Akshit Aggarwal","doi":"10.1007/s11277-024-11363-1","DOIUrl":"https://doi.org/10.1007/s11277-024-11363-1","url":null,"abstract":"<p>Diabetic Retinopathy (<i>DR</i>) is a burgeoning malady in Asian territories. <i>DR</i> causes 5–7% of the total blindness throughout the region. The main aim of this research is to determine whether a patient is suffering from <i>DR</i> or not by the dint of 2-D color fundus retina scans. In this paper, authors have proposed a <i>GUI-</i>based technique an Ensemble Diabetic Retinopathy Detection (<i>EDRD</i>). This method helps in detecting 2D color fundus scans with an efficient approach for finding <i>DR-</i>affected persons within a few seconds using ensemble techniques of CNN and RLU. The visual geometry group (<i>VGG-19</i>) model and adaptive moment estimation optimizer are used for training and reducing error for the developed technique. A maximum accuracy of 92% was obtained for an 80% training set with a 0.001 learning rate and 25 batch size. The proposed research contribution definitively detects whether the given <i>OCT</i> scan with an efficient approach for finding <i>DR</i>-affected persons within a few seconds.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"11 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141864738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Intrusion Detection System Using the Artificial Neural Network-based Approach and Firefly Algorithm","authors":"Samira Rajabi, Samane Asgari, Shahram Jamali, Reza Fotohi","doi":"10.1007/s11277-024-11505-5","DOIUrl":"https://doi.org/10.1007/s11277-024-11505-5","url":null,"abstract":"<p>Due to the dynamic nature and limited resources in wireless networks, attack occurrence is inevitable. These attacks can damage or weaken the transmitted packets and threaten the entire system’s efficiency. As a result, in such a situation, great and sometimes irreparable damage will be done to the business. Thus, security and attack prevention in wireless networks become a necessity and are very important. Essence intrusion detection systems determine whether a user’s performance and behavior under the control or activity of a network traffic load is malicious. Since the characteristics of user behavior and network traffic are diverse and numerous, Selecting some features is necessary to improve the classification accuracy. Therefore, in this idea, a new model for estimating the penetration of wireless network-based networks is proposed based on a combination of feature subset selection based on firewall algorithm and fast neural learning networks. In this paper, the proposed idea will use the training set from the data set collected to test intrusion detection systems called KDD Cup to determine network intrusion detection methods and evaluate the proposed model. The proposed idea, based on the results obtained from the simulation and its performance in various experiments, has shown that it has improved significantly in terms of multiple criteria such as accuracy, F-criterion rate, and efficiency compared to the neural network pattern. In other words, the proposed idea performs better than the neural network method in identifying healthy nodes and new malicious intrusions in the target network. The simulation outputs also indicate that the proposed idea has a better classification rate and F-criteria than the FLN methods based on HSO, ATLBO, GA, and PSO. Vector backup machine, multilayer perceptron network, DBN, and S-NDAE have less time.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"129 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141864731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}