{"title":"Game theory attack pricing for mining pools in blockchain-based IoT","authors":"","doi":"10.1016/j.dcan.2022.11.014","DOIUrl":"10.1016/j.dcan.2022.11.014","url":null,"abstract":"<div><p>The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network. The employed computing power carries out the pool mining attacks on the attacked mining pool. To realize the win-win game between the malicious mining pool and the employee, the paper proposes an Employment Attack Pricing Algorithm (EAPA) of mining pools in blockchain based on game theory. In the EAPA, the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack, the revenue increment of malicious mining pools, and the revenue of the employee. It establishes a game model between the malicious mining pool and the employee under the employment attack. Then, the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation. In the strategy, the malicious mining pool analyzes the conditions for the employment attack, and uses the derivative method to find the optimal utilization value of computing power, employees analyze the conditions for accepting employment, and use the derivative method to find the optimal reward value of computing power. Finally, the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation. The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee. The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time. The EAPA outperforms the state-of-the-art methods such as SPSUCP, DPSACP, and FPSUCP.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822002553/pdfft?md5=26d0202549bef1c7dbcc7244a08559ea&pid=1-s2.0-S2352864822002553-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44821926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Downlink network-coded multiple access with diverse power","authors":"","doi":"10.1016/j.dcan.2022.10.027","DOIUrl":"10.1016/j.dcan.2022.10.027","url":null,"abstract":"<div><p>Normally, in the downlink Network-Coded Multiple Access (NCMA) system, the same power is allocated to different users. However, equal power allocation is unsuitable for some scenarios, such as when user devices have different Quality of Service (QoS) requirements. Hence, we study the power allocation in the downlink NCMA system in this paper, and propose a downlink Network-Coded Multiple Access with Diverse Power (NCMA-DP), wherein different amounts of power are allocated to different users. In terms of the Bit Error Rate (BER) of the multi-user decoder, and the number of packets required to correctly decode the message, the performance of the user with more allocated power is greatly improved compared to the Conventional NCMA (NCMA-C). Meanwhile, the performance of the user with less allocated power is still much better than NCMA-C. Furthermore, the overall throughput of NCMA-DP is greatly improved compared to that of NCMA-C. The simulation results demonstrate the remarkable performance of the proposed NCMA-DP.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S235286482200236X/pdfft?md5=9a8868063353e0d03e969a256e61f770&pid=1-s2.0-S235286482200236X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47509564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jinxiang Liu , Xiaotao Zhang , Jun Yang , Huiping Yang
{"title":"Digital cancellation of multi-band passive inter-modulation based on Wiener-Hammerstein model","authors":"Jinxiang Liu , Xiaotao Zhang , Jun Yang , Huiping Yang","doi":"10.1016/j.dcan.2024.06.002","DOIUrl":"10.1016/j.dcan.2024.06.002","url":null,"abstract":"<div><p>Utilizing multi-band and multi-carrier techniques enhances throughput and capacity in Long-Term Evolution (LTE)-Advanced and 5G New Radio (NR) mobile networks. However, these techniques introduce Passive Inter-Modulation (PIM) interference in Frequency-Division Duplexing (FDD) systems. In this paper, a novel multi-band Wiener-Hammerstein model is presented to digitally reconstruct PIM interference signals, thereby achieving effective PIM Cancellation (PIMC) in multi-band scenarios. In the model, transmitted signals are independently processed to simulate Inter-Modulation Distortions (IMDs) and Cross-Modulation Distortions (CMDs). Furthermore, the Finite Impulse Response (FIR) filter, basis function generation, and B-spline function are applied for precise PIM product estimation and generation in multi-band scenarios. Simulations involving 4 carrier components from diverse NR frequency bands at varying transmitting powers validate the feasibility of the model for multi-band PIMC, achieving up to 19 dB in PIMC performance. Compared to other models, this approach offers superior PIMC performance, exceeding them by more than 5 dB in high transmitting power scenarios. Additionally, its lower sampling rate requirement reduces the hardware complexity associated with implementing multi-band PIMC.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864824000695/pdfft?md5=2a6267187794fafdb2d9a61eec6727df&pid=1-s2.0-S2352864824000695-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142148977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy efficiency aware dynamic rate and power adaptation in carrier sensing based WLANs under Rayleigh fading and shadowing","authors":"Md. Forkan Uddin","doi":"10.1016/j.dcan.2022.10.023","DOIUrl":"10.1016/j.dcan.2022.10.023","url":null,"abstract":"<div><p>We consider the problem of energy efficiency aware dynamic adaptation of data transmission rate and transmission power of the users in carrier sensing based Wireless Local Area Networks (WLANs) in the presence of path loss, Rayleigh fading and log-normal shadowing. For a data packet transmission, we formulate an optimization problem, solve the problem, and propose a rate and transmission power adaptation scheme with a restriction methodology of data packet transmission for achieving the optimal energy efficiency. In the restriction methodology of data packet transmission, a user does not transmit a data packet if the instantaneous channel gain of the user is lower than a threshold. To evaluate the performance of the proposed scheme, we develop analytical models for computing the throughput and energy efficiency of WLANs under the proposed scheme considering a saturation traffic condition. We then validate the analytical models via simulation. We find that the proposed scheme provides better throughput and energy efficiency with acceptable throughput fairness if the restriction methodology of data packet transmission is included. By means of the analytical models and simulations, we demonstrate that the proposed scheme provides significantly higher throughput, energy efficiency and fairness index than a traditional non-adaptive scheme and an existing most relevant adaptive scheme. Throughput and energy efficiency gains obtained by the proposed scheme with respect to the existing adapting scheme are about 75% and 103%, respectively, for a fairness index of 0.8. We also study the effect of various system parameters on throughput and energy efficiency and provide various engineering insights.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822002322/pdfft?md5=88dd677b739ec634fe4b8f3902ed5480&pid=1-s2.0-S2352864822002322-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142149117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Game theory in network security for digital twins in industry","authors":"","doi":"10.1016/j.dcan.2023.01.004","DOIUrl":"10.1016/j.dcan.2023.01.004","url":null,"abstract":"<div><p>To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion, a series of discussions on network security issues are carried out based on game theory. From the perspective of the life cycle of network vulnerabilities, mining and repairing vulnerabilities are analyzed by applying evolutionary game theory. The evolution process of knowledge sharing among white hats under various conditions is simulated, and a game model of the vulnerability patch cooperative development strategy among manufacturers is constructed. On this basis, the differential evolution is introduced into the update mechanism of the Wolf Colony Algorithm (WCA) to produce better replacement individuals with greater probability from the perspective of both attack and defense. Through the simulation experiment, it is found that the convergence speed of the probability (<em>X</em>) of white Hat 1 choosing the knowledge sharing policy is related to the probability (<em>x</em><sub>0</sub>) of white Hat 2 choosing the knowledge sharing policy initially, and the probability (<em>y</em><sub>0</sub>) of white hat 2 choosing the knowledge sharing policy initially. When <em>y</em><sub>0</sub> = 0.9, <em>X</em> converges rapidly in a relatively short time. When <em>y</em><sub>0</sub> is constant and <em>x</em><sub>0</sub> is small, the probability curve of the “cooperative development” strategy converges to 0. It is concluded that the higher the trust among the white hat members in the temporary team, the stronger their willingness to share knowledge, which is conducive to the mining of loopholes in the system. The greater the probability of a hacker attacking the vulnerability before it is fully disclosed, the lower the willingness of manufacturers to choose the \"cooperative development\" of vulnerability patches. Applying the improved wolf colony-co-evolution algorithm can obtain the equilibrium solution of the \"attack and defense game model\", and allocate the security protection resources according to the importance of nodes. This study can provide an effective solution to protect the network security for digital twins in the industry.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864823000172/pdfft?md5=e4bd0604e0a430227120098d1040c077&pid=1-s2.0-S2352864823000172-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48849586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid millimeter wave heterogeneous networks with spatially correlated user equipment","authors":"","doi":"10.1016/j.dcan.2022.10.022","DOIUrl":"10.1016/j.dcan.2022.10.022","url":null,"abstract":"<div><p>In this paper, we analyze a hybrid Heterogeneous Cellular Network (HCNet) framework by deploying millimeter Wave (mmWave) small cells with coexisting traditional sub-6GHz macro cells to achieve improved coverage and high data rate. We consider randomly-deployed macro base stations throughout the network whereas mmWave Small Base Stations (SBSs) are deployed in the areas with high User Equipment (UE) density. Such user centric deployment of mmWave SBSs inevitably incurs correlation between UE and SBSs. For a realistic scenario where the UEs are distributed according to Poisson cluster process and directional beamforming with line-of-sight and non-line-of-sight transmissions is adopted for mmWave communication. By using tools from stochastic geometry, we develop an analytical framework to analyze various performance metrics in the downlink hybrid HCNets under biased received power association. For UE clustering we considered Thomas cluster process and derive expressions for the association probability, coverage probability, area spectral efficiency, and energy efficiency. We also provide Monte Carlo simulation results to validate the accuracy of the derived expressions. Furthermore, we analyze the impact of mmWave operating frequency, antenna gain, small cell biasing, and BSs density to get useful engineering insights into the performance of hybrid mmWave HCNets. Our results show that network performance is significantly improved by deploying millimeter wave SBS instead of microwave BS in hot spots.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822002310/pdfft?md5=973cc82a3f5ad2909702271a161a3652&pid=1-s2.0-S2352864822002310-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42234446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data-driven human and bot recognition from web activity logs based on hybrid learning techniques","authors":"","doi":"10.1016/j.dcan.2023.01.020","DOIUrl":"10.1016/j.dcan.2023.01.020","url":null,"abstract":"<div><p>Distinguishing between web traffic generated by bots and humans is an important task in the evaluation of online marketing campaigns. One of the main challenges is related to only partial availability of the performance metrics: although some users can be unambiguously classified as bots, the correct label is uncertain in many cases. This calls for the use of classifiers capable of explaining their decisions. This paper demonstrates two such mechanisms based on features carefully engineered from web logs. The first is a man-made rule-based system. The second is a hierarchical model that first performs clustering and next classification using human-centred, interpretable methods. The stability of the proposed methods is analyzed and a minimal set of features that convey the class-discriminating information is selected. The proposed data processing and analysis methodology are successfully applied to real-world data sets from online publishers.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864823000330/pdfft?md5=7b3f54c3278291b4e66a9f8a51c80437&pid=1-s2.0-S2352864823000330-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42752038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Position-aware packet loss optimization on service function chain placement","authors":"","doi":"10.1016/j.dcan.2023.01.002","DOIUrl":"10.1016/j.dcan.2023.01.002","url":null,"abstract":"<div><p>The advent of Network Function Virtualization (NFV) and Service Function Chains (SFCs) unleashes the power of dynamic creation of network services using Virtual Network Functions (VNFs). This is of great interest to network operators since poor service quality and resource wastage can potentially hurt their revenue in the long term. However, the study shows with a set of test-bed experiments that packet loss at certain positions (i.e., different VNFs) in an SFC can cause various degrees of resource wastage and performance degradation because of repeated upstream processing and transmission of retransmitted packets.</p><p>To overcome this challenge, this study focuses on resource scheduling and deployment of SFCs while considering packet loss positions. This study developed a novel SFC packet dropping cost model and formulated an SFC scheduling problem that aims to minimize overall packet dropping cost as a Mixed-Integer Linear Programming (MILP) and proved that it is NP-hard. In this study, <em>Palos</em> is proposed as an efficient scheme in exploiting the functional characteristics of VNFs and their positions in SFCs for scheduling resources and deployment to optimize packet dropping cost. Extensive experiment results show that <em>Palos</em> can achieve up to 42.73% improvement on packet dropping cost and up to 33.03% reduction on average SFC latency when compared with two other state-of-the-art schemes.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864823000160/pdfft?md5=f29887ba5852bc0c526d0fa622929345&pid=1-s2.0-S2352864823000160-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48388018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semi-supervised learning based hybrid beamforming under time-varying propagation environments","authors":"","doi":"10.1016/j.dcan.2023.01.018","DOIUrl":"10.1016/j.dcan.2023.01.018","url":null,"abstract":"<div><p>Hybrid precoding is considered as a promising low-cost technique for millimeter wave (mm-wave) massive Multi-Input Multi-Output (MIMO) systems. In this work, referring to the time-varying propagation circumstances, with semi-supervised Incremental Learning (IL), we propose an online hybrid beamforming scheme. Firstly, given the constraint of constant modulus on analog beamformer and combiner, we propose a new broad-network-based structure for the design model of hybrid beamforming. Compared with the existing network structure, the proposed network structure can achieve better transmission performance and lower complexity. Moreover, to enhance the efficiency of IL further, by combining the semi-supervised graph with IL, we propose a hybrid beamforming scheme based on chunk-by-chunk semi-supervised learning, where only few transmissions are required to calculate the label and all other unlabelled transmissions would also be put into a training data chunk. Unlike the existing single-by-single approach where transmissions during the model update are not taken into the consideration of model update, all transmissions, even the ones during the model update, would make contributions to model update in the proposed method. During the model update, the amount of unlabelled transmissions is very large and they also carry some information, the prediction performance can be enhanced to some extent by these unlabelled channel data. Simulation results demonstrate the spectral efficiency of the proposed method outperforms that of the existing single-by-single approach. Besides, we prove the general complexity of the proposed method is lower than that of the existing approach and give the condition under which its absolute complexity outperforms that of the existing approach.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864823000317/pdfft?md5=15e51103139c8d2d6b5c8e5d6603104c&pid=1-s2.0-S2352864823000317-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47745189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nan Jia , Shaojing Fu , Guangquan Xu , Kai Huang , Ming Xu
{"title":"Towards privacy-preserving and efficient word vector learning for lightweight IoT devices","authors":"Nan Jia , Shaojing Fu , Guangquan Xu , Kai Huang , Ming Xu","doi":"10.1016/j.dcan.2022.10.019","DOIUrl":"10.1016/j.dcan.2022.10.019","url":null,"abstract":"<div><p>Nowadays, Internet of Things (IoT) is widely deployed and brings great opportunities to change people's daily life. To realize more effective human-computer interaction in the IoT applications, the Question Answering (QA) systems implanted in the IoT services are supposed to improve the ability to understand natural language. Therefore, the distributed representation of words, which contains more semantic or syntactic information, has been playing a more and more important role in the QA systems. However, learning high-quality distributed word vectors requires lots of storage and computing resources, hence it cannot be deployed on the resource-constrained IoT devices. It is a good choice to outsource the data and computation to the cloud servers. Nevertheless, it could cause privacy risks to directly upload private data to the untrusted cloud. Therefore, realizing the word vector learning process over untrusted cloud servers without privacy leakage is an urgent and challenging task. In this paper, we present a novel efficient word vector learning scheme over encrypted data. We first design a series of arithmetic computation protocols. Then we use two non-colluding cloud servers to implement high-quality word vectors learning over encrypted data. The proposed scheme allows us to perform training word vectors on the remote cloud servers while protecting privacy. Security analysis and experiments over real data sets demonstrate that our scheme is more secure and efficient than existing privacy-preserving word vector learning schemes.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822002280/pdfft?md5=69163c8cc8c0fd1dd38ce15845d9e704&pid=1-s2.0-S2352864822002280-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142149095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}