Arwin Gansekoele;Alexios Balatsoukas-Stimming;Tom Brusse;Mark Hoogendoorn;Sandjai Bhulai;Rob Van Der Mei
{"title":"Joint Demapping of QAM and APSK Constellations Using Machine Learning","authors":"Arwin Gansekoele;Alexios Balatsoukas-Stimming;Tom Brusse;Mark Hoogendoorn;Sandjai Bhulai;Rob Van Der Mei","doi":"10.1109/OJCOMS.2025.3547261","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3547261","url":null,"abstract":"As telecommunication systems evolve to meet increasing demands, integrating deep neural networks (DNNs) has shown promise in enhancing performance. However, the trade-off between accuracy and flexibility remains challenging when replacing traditional receivers with DNNs. This paper introduces a novel probabilistic framework that allows a single DNN demapper to demap multiple QAM and APSK constellations simultaneously. It is demonstrated that the framework can exploit hierarchical relationships in families of constellations. The consequence is that we need fewer neural network outputs to encode the same function without an increase in Bit Error Rate (BER). The simulation results confirm that the framework approaches the optimal demodulation error bound under an Additive White Gaussian Noise (AWGN) channel for multiple constellations. Under 3GPP-compliant OFDM fading channels, it is as accurate as a neural receiver operating on just one modulation type. Thereby, the framework addresses multiple important issues in practical neural receiver design. These include improvements in computational efficiency, a reduction in memory overhead, and an improved adaptability in dynamic environments.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1695-1709"},"PeriodicalIF":6.3,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908647","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kavin Kumar Thangadorai;Krishna M. Sivalingam;Anshul Pandey;Kumar Murugesan;Madhan Raj Kanagarathinam
{"title":"WiLongH: A Custom Hand-Held Platform for Long-Range HaLow Mesh Networks in Human-to-Human Communication","authors":"Kavin Kumar Thangadorai;Krishna M. Sivalingam;Anshul Pandey;Kumar Murugesan;Madhan Raj Kanagarathinam","doi":"10.1109/OJCOMS.2025.3547615","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3547615","url":null,"abstract":"Over the past 25 years, IEEE 802.11 (Wi-Fi) has played a vital role in last-mile Internet connectivity. The Wi-Fi HaLow (802.11ah) standard marks a significant leap, offering long-range, low-power connectivity, particularly suited for Internet of Things (IoT) applications. Operating in sub-1 GHz frequencies, Wi-Fi HaLow extends coverage up to 1 km. However, deploying multi-hop HaLow mesh networks for ground-level Human-to-Human (H2H) communication presents unique challenges, as the standard primarily supports star and tree topologies. This paper introduces the WiLongH hand-held platform, designed for long-range Wi-Fi HaLow mesh networks aimed at H2H communication at ground level. Utilizing commercial hardware, open-source software, IEEE 802.11s mesh, and the B.A.T.M.A.N. Advanced Routing Protocol (batman-adv) with custom radio profiles, the platform was tested across various environments, including indoor, outdoor, urban, and multi-level parking settings. Results demonstrate that the platform supports voice call ranges exceeding 1 km and video call ranges up to 800 m in line-of-sight conditions, with throughputs of 420 Kbps and 700 Kbps, respectively. In complex urban environments (300-700 m), it achieved up to 64% success for voice calls and 30% for video calls using a 1 MHz channel bandwidth with two nodes. Connectivity across 3-4 floors in basement parking revealed the need for additional mesh nodes. The platform’s multicast audio performance showed near-optimal forwarding, outperforming traditional flooding techniques, with 4-node multi-hop performance tested in outdoor and indoor settings. A dense mesh network setup of 14 nodes in an indoor arena further validated the scalability of the platform. Moreover, the use of a SAW filter in the US band (902-928 MHz) significantly reduced cellular interference, enhancing voice and video call performance by 15-20% and 7-10%, respectively. Additionally, the WiLongH platform demonstrated a 33% improvement in battery life compared to conventional long-range Wi-Fi mesh systems.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1873-1894"},"PeriodicalIF":6.3,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10909177","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143676032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Gap to Channel Capacity of Generalized Low-Density Parity-Check Codes","authors":"Dongxu Chang;Qingqing Peng;Guanghui Wang;Guiying Yan;Dawei Yin","doi":"10.1109/OJCOMS.2025.3547391","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3547391","url":null,"abstract":"In this study, the gap to channel capacity of generalized low-density parity-check (GLDPC) codes under the a posteriori probability (APP) decoder on the binary input additive white Gaussian noise (BI-AWGN) channel is analyzed. Building on the density evolution for LDPC codes, we extend this to GLDPC codes by generalizing the properties of concentration, symmetry, and monotonicity to accommodate the characteristics of GLDPC codes. Specifically, we propose a methodology to simplify the computation of density evolution for GLDPC codes under APP decoding over BI-AWGN channels. Firstly, we identify a class of subcodes that can greatly simplify the performance analysis and practical decoding of GLDPC codes, which we refer to as message-invariant subcodes. Secondly, based on the characteristics of GLDPC codes, we develop a Gaussian mixture approximation algorithm to approximate the message distributions in density evolution. Compared to Gaussian approximation, the proposed Gaussian mixture approximation approach can greatly enhance accuracy while maintaining low computational complexity. Based on the above techniques, we demonstrate that with an appropriate proportion of generalized constraint (GC) nodes, despite the rate loss when single parity-check (SPC) nodes are replaced by GC nodes, GLDPC codes can reduce the original gap to capacity compared to their original LDPC counterparts. Our simulation experiments validate the performance analysis.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1780-1793"},"PeriodicalIF":6.3,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10909182","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143676055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Satzhan S. Askarov;Refik C. Kizilirmak;Behrouz Maham;Ikechi Augustine Ukaegbu
{"title":"60-GHz Propagation Measurement and Modeling: Indoor and Outdoor With Extreme Winter Environments","authors":"Satzhan S. Askarov;Refik C. Kizilirmak;Behrouz Maham;Ikechi Augustine Ukaegbu","doi":"10.1109/OJCOMS.2025.3546566","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3546566","url":null,"abstract":"A thorough understanding of how 60 GHz millimeter-wave communication systems behave in severe weather conditions is essential due to the growing use of these technologies in outdoor settings. However, there has been limited research on how snowstorms affect millimeter-wave power propagation, which makes designing and relying on such systems difficult. Motivated by the need to create robust communication solutions for harsh climates, this work investigates the behavior of 60 GHz millimeter-wave power transmission under outdoor snowstorm settings, therefore addressing this gap. The research examines the impact of different transmitter-receiver (T-R) distances on received power under snowstorm conditions, characterized by an 18 m/s wind speed, 86% humidity, <inline-formula> <tex-math>$0.2~mathit {mm/h}$ </tex-math></inline-formula> snowfall rate, 1009.8 mbar atmospheric pressure, and <inline-formula> <tex-math>$-7^{circ }C$ </tex-math></inline-formula> temperature, and compares the received power with that in indoor room conditions. Our findings reveal a significant reduction in received power in snowstorm environments compared to indoor settings. Specifically, at T-R distances of approximately 1 meter, the received power in a snowstorm was observed to be approximately 15 dBm lower than indoors. Furthermore, as the T-R distance is extended to 7 meters, this contrast is nearly halved, with the outdoor received power registering approximately 7 dBm less than the indoor conditions. These results underscore the considerable influence of snowstorm conditions on 60 GHz millimeter-wave power propagation and emphasize the necessity of comprehending these effects for outdoor communication systems operating in such environments. The study also provides insights into how the path-loss equation can be modified for snowstorm scenarios.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1670-1681"},"PeriodicalIF":6.3,"publicationDate":"2025-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10906433","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Transmit Signal and Beamforming Design for Integrated Sensing and Power Transfer Systems","authors":"Kenneth Macsporran Mayer;Sebastian Lotter;Nikita Shanin;Stefan Brückner;Martin Vossiek;Laura Cottatellucci;Robert Schober","doi":"10.1109/OJCOMS.2025.3546806","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3546806","url":null,"abstract":"Integrating different functionalities, conventionally implemented as dedicated systems, into a single platform allows utilising the available resources more efficiently. We consider a frame-based integrated sensing and power transfer (ISAPT) system and propose the joint optimisation of the transmit beamforming vectors, the pulse duration, and the subframe durations to combine sensing and wireless power transfer (WPT) functionalities efficiently. In contrast to prior works, we adopt an accurate non-linear circuit-based energy harvesting (EH) model. We formulate and solve a non-convex optimisation problem for an arbitrary number of EH receivers and sensing targets (STs). The objective is to maximise the weighted sum of the average harvested powers at the EH receivers while ensuring the echo signals reflected by the ST targeted in the corresponding subframe are received with sufficient power for estimating the range to the ST with a prescribed accuracy within the considered coverage region. A method to determine the optimal solution to the problem is derived and two efficient suboptimal schemes are proposed. The performance gap between the upper-bound and the suboptimal schemes is shown to be small. The co-design of the sensing and WPT functionalities and the resulting optimised beampatterns are studied in detail. For high sensing accuracy requirements, the joint transmit signal and beamforming design is found to differ significantly from the optimal transmit signals dedicated to either sensing or WPT. A dedicated transmit signal for WPT is shown to enhance ISAPT system performance when the sensing requirements are less stringent.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1821-1837"},"PeriodicalIF":6.3,"publicationDate":"2025-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10907926","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143688152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomaly Detection for Mitigating xApp and E2 Interface Threats in O-RAN Near-RT RIC","authors":"Cheng-Feng Hung;Chi-Heng Tseng;Shin-Ming Cheng","doi":"10.1109/OJCOMS.2025.3546760","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3546760","url":null,"abstract":"As 5G networks advance, the Open Radio Access Network (O-RAN) is crucial in enabling openness and fostering collaboration across the telecom industry. O-RAN enhances flexibility, scalability, and interoperability through open interfaces, reducing dependence on a single vendor and promoting interoperability among vendors and solutions. The Near-Real-Time Radio Intelligent Controller (Near-RT RIC) is crucial for optimizing network resources and improving user experience. However, the openness of O-RAN also introduces security challenges, particularly from third-party developed xApps and E2 nodes that may exploit vulnerabilities to launch attacks. This paper proposes an anomaly traffic detector to protect the Near-RT RIC from threats on the E2 interface. The anomaly traffic detector verifies the legality of signaling through an internal state machine analysis module and checks packet fields through a conformance check module while monitoring network traffic in real time to detect and mitigate Denial of Service attacks. Additionally, we designed a fuzzer to simulate random attacks, testing the capability of the anomaly traffic detector. The anomaly traffic detector not only successfully passes the test cases highlighted in the O-RAN Security Test Specifications, effectively detecting unauthorized traffic and signaling, but also identifies real-world vulnerability exploits, including CVE-2023-40997, CVE-2023-40998, CVE-2023-41627, and CVE-2023-41628, thereby significantly enhancing the security of the Near-RT RIC.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1682-1694"},"PeriodicalIF":6.3,"publicationDate":"2025-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10907911","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity Challenges in Smart Grid Systems: Current and Emerging Attacks, Opportunities, and Recommendations","authors":"Sanaz Amanlou;Mohammad Kamrul Hasan;Umi Asma’ Mokhtar;Khalid Mahmood Malik;Shayla Islam;Sheroz Khan;Muhammad Attique Khan;Muhammad Asghar Khan","doi":"10.1109/OJCOMS.2025.3545153","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3545153","url":null,"abstract":"Traditional power grids are transforming into Smart Grids (SGs) to address challenges such as unidirectional information flow, increasing energy demand, energy waste, and issues related to availability and security. This evolution is facilitated by the Internet of Things (IoT), and its integration with existing power grids is expected to yield future SGs that are more efficient and reliable. However, the reliable and continuous operation of SGs is threatened by cyberattacks due to the added advancements and IoT technologies. These threats pose a significant risk to the entire grid, making security a paramount concern in adopting SG technology. This paper provides a comprehensive survey of the cybersecurity challenges IoT devices face in SGs. It begins by outlining the architecture of SGs and the applications of IoT in the SGS. Then, the security challenges, objectives, and requirements of the SGs are discussed. Subsequently, the paper classifies and evaluates cyber-attacks based on the principles of Confidentiality, Integrity, and Availability (CIA) and the emerging sophisticated attacks. The paper then presents current security solutions, secure protocols and standards that counter each type of cyber-attack. It also discusses emerging solutions and modern technologies, such as artificial intelligence, blockchain, and Software-Defined Networking (SDN), that can tackle emerging cyber-attacks and enhance the robustness of SGs. Finally, the paper provides recommendations for further research based on the current literature and the findings of this research.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1965-1997"},"PeriodicalIF":6.3,"publicationDate":"2025-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10902093","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143706793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hien Quang Ta;Anh Dong Vuong;Trang Tien Nguyen;Hoon Oh
{"title":"Maximizing Mutual Information of Radar via Optimal Training-Based On–Off Transmissions","authors":"Hien Quang Ta;Anh Dong Vuong;Trang Tien Nguyen;Hoon Oh","doi":"10.1109/OJCOMS.2025.3544767","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3544767","url":null,"abstract":"The paper considers the joint radar and training-based on-off communication system, where the on-off threshold and training is optimized to maximize the mutual information of radar while ensuring communication quality. The closed-form expressions of communication throughput under finite blocklength and radar’s mutual information are derived. The results show that the training and on-off transmission help improve the radar’s mutual information remarkably. The results also show that the improvement of radar’s mutual information is particularly pronounced at low communication power regimes, where a high on-off threshold can maximize average throughput while allowing ample time for radar transmissions.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1794-1803"},"PeriodicalIF":6.3,"publicationDate":"2025-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10904189","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143676034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Naveed Khan;Ayaz Ahmad;Abdulmalik Alwarafy;Munam Ali Shah;Abderrahmane Lakas;Muhammad Moazam Azeem
{"title":"Efficient Resource Allocation and UAV Deployment in STAR-RIS and UAV-Relay Assisted Public Safety Networks for Video Transmission","authors":"Naveed Khan;Ayaz Ahmad;Abdulmalik Alwarafy;Munam Ali Shah;Abderrahmane Lakas;Muhammad Moazam Azeem","doi":"10.1109/OJCOMS.2025.3544440","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3544440","url":null,"abstract":"Reliable and flexible emergency communication presents significant challenges for search and rescue operations during disasters, particularly when base stations become non-functional. This research explores the integration of Simultaneous Transmitting and Reflecting Reconfigurable Intelligent Surfaces (STAR-RIS), a novel technology that enhances signal propagation by simultaneously transmitting and reflecting wireless signals, with Unmanned Aerial Vehicles (UAV) to enhance public safety communication networks in such scenarios. STAR-RIS and UAVs offer versatile deployment options for establishing connections between affected users on the ground(AUGs) and uploading video services from the emergency-affected area to near by two emergency ground base stations. In this research, our focus is on UAV and STAR-RIS relay based video streaming Safety Communication Network(VS-PSCN). This network consists of AUGs, an observation UAV(O-UAV), STAR-RIS equipped relay UAV, and two emergency ground base stations represented by EBS-R and EBS-T. The O-UAV collects video streaming data from the AUGs, while STAR-RIS-UAV independently and simultaneously reflects and transmits the incident video streaming signal to the nearby emergency and rescue ground base stations over a fading channel. The primary aim of our suggested research is to augment the average video streaming utility(AVSU) of the AUGs efficiently. We achieve this by optimizing the locations of the O-UAV and STAR-RIS relay UAV, alongside distributing transmit power and bandwidth among the AUGs. This optimization is subject to several constraints. The formulated optimization problem is non-convex, posing a challenge in solving it. To tackle this obstacle, we introduce an iterative algorithm that effectively utilizes successive convex approximation techniques (SCA) and block coordinate descent (BCD) method. Simulation outcomes are presented, demonstrating that our proposed method offers promising improvements in terms of maximum AVSU for all AUGs compared to the benchmark schemes. Specifically, the average percentage improvement across all benchmarks is approximately 45%, underscoring the effectiveness of our approach.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1804-1820"},"PeriodicalIF":6.3,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10897812","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143676066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secured Wireless Communications Using Multiple Active and Passive Intelligent Reflecting Surfaces","authors":"Apichart Nutchanat;Kampol Woradit;Paskorn Champrasert","doi":"10.1109/OJCOMS.2025.3544870","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3544870","url":null,"abstract":"This paper presents a novel approach to secure wireless communications by integrating multiple Active and Passive Intelligent Reflecting Surfaces (MAMP-IRSs). We propose a multi-hop beam routing mechanism that leverages active and passive IRSs to establish a secure communication link between a base station and a user to minimize the risk of eavesdropping. Our methodology involves optimizing the beamforming vectors at the base station and the reflection coefficients of the IRSs to maximize the secrecy rate against potential eavesdroppers. This optimization problem exhibits non-convexity, necessitating a computationally Full Search of the solution space. Therefore, we propose two heuristic algorithms: i) Skewed Dijkstra’s Algorithm and ii) Myopic Algorithm. Skewed Dijkstra’s Algorithm utilizes path decomposition and graph theory to identify optimal multi-reflection paths. The Myopic Algorithm looks up only adjacent nodes with a single hop. Numerical simulations demonstrate that Skewed Dijkstra’s Algorithm typically gives a secrecy rate close to the Full Search algorithm, and the Myopic Algorithm gives a narrower performance gap when the number of elements at each passive IRS becomes large.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1763-1779"},"PeriodicalIF":6.3,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10899850","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143676033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}