Telecommunication Systems最新文献

筛选
英文 中文
Detecting malicious pilot contamination in multiuser massive MIMO using decision trees 利用决策树检测多用户大规模多输入多输出(MIMO)中的恶意先导污染
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-06-03 DOI: 10.1007/s11235-024-01163-0
Pedro Ivo da Cruz, Dimitri Leandro, Tito Spadini, Ricardo Suyama, Murilo Bellezoni Loiola
{"title":"Detecting malicious pilot contamination in multiuser massive MIMO using decision trees","authors":"Pedro Ivo da Cruz, Dimitri Leandro, Tito Spadini, Ricardo Suyama, Murilo Bellezoni Loiola","doi":"10.1007/s11235-024-01163-0","DOIUrl":"https://doi.org/10.1007/s11235-024-01163-0","url":null,"abstract":"<p>Massive multiple-input multiple-output (MMIMO) is essential to modern wireless communication systems, like 5G and 6G, but it is vulnerable to active eavesdropping attacks. One type of such attack is the pilot contamination attack (PCA), where a malicious user copies pilot signals from an authentic user during uplink, intentionally interfering with the base station’s (BS) channel estimation accuracy. In this work, we propose to use a Decision Tree (DT) algorithm for PCA detection at the BS in a multi-user system. We present a methodology to generate training data for the DT classifier and select the best DT according to their depth. Then, we simulate different scenarios that could be encountered in practice and compare the DT to a classical technique based on likelihood ratio testing (LRT) submitted to the same scenarios. The results revealed that a DT with only one level of depth is sufficient to outperform the LRT. The DT shows a good performance regarding the probability of detection in noisy scenarios and when the malicious user transmits with low power, in which case the LRT fails to detect the PCA. We also show that the reason for the good performance of the DT is its ability to compute a threshold that separates PCA data from non-PCA data better than the LRT’s threshold. Moreover, the DT does not necessitate prior knowledge of noise power or assumptions regarding the signal power of malicious users, prerequisites typically essential for LRT and other hypothesis testing methodologies.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141259616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance enhancement of an inter-satellite optical wireless communication link carrying 16 channels 卫星间光学无线通信链路 16 个信道的性能提升
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-06-01 DOI: 10.1007/s11235-024-01160-3
Nawroz Ibrahim Hamadamen
{"title":"Performance enhancement of an inter-satellite optical wireless communication link carrying 16 channels","authors":"Nawroz Ibrahim Hamadamen","doi":"10.1007/s11235-024-01160-3","DOIUrl":"https://doi.org/10.1007/s11235-024-01160-3","url":null,"abstract":"<p>Inter-satellite optical wireless communication (IsOWC) is frequently utilized for fast data transmission between various far away satellites in free space. Thousands of users are connected via broad-area applications that use network topologies with many frequencies per optical fiber and a range of transmission rates and capacities. Multiple frequencies being transmitted simultaneously on a fiber having a nanometer range (1300–1600) that is a powerful feature of an optical communications link. When coupled with optical amplifiers, the WDM idea creates communication lines that provide rapid user-to-user communication throughout national borders. A well-known drawback of free space optics (FSO) or Inter-Satellite Link (ISL) is degradation in optical signal power, in addition to its appealing advantages. The traditional system is improved in order to solve this issue. Using the optisystem-15 simulator, we analyzed the IsOWC link's capability for fast data transfer based on subjective factors including received power, Q-factor and BER. 16-channels multiplexed with modulation technique transmitters to the system are explained by the projected model. The link has been used at various data rates, distances, and external Match-Zehnder modulation. Applied a series hybrid optical amplifier of erbium-doped fiber amplifier (EDFA) and a laser amplifier that exists prior to and after the OWC line with the given parameters. Different OWC ranges with a loop control of 3 loops that made total link length 1600 km, and searching different data rates to show their impact on system efficiency, which showed a great enhancement in results that are crucial to the current inter-satellite OWC link.</p><h3 data-test=\"abstract-sub-heading\">Graphical abstract</h3>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141198008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel algorithm for the development of a multipath protocol for routing and energy efficient in IoT with varying density 在密度不同的物联网中开发路由和节能多径协议的新型算法
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-06-01 DOI: 10.1007/s11235-024-01170-1
Radwan S. Abujassar
{"title":"A novel algorithm for the development of a multipath protocol for routing and energy efficient in IoT with varying density","authors":"Radwan S. Abujassar","doi":"10.1007/s11235-024-01170-1","DOIUrl":"https://doi.org/10.1007/s11235-024-01170-1","url":null,"abstract":"<p>Data transmission from sensor nodes is the biggest problem for IoT networks. Overusing communication power shortens node lifespans. Thus, network issues including QoS, security, network heterogeneity, congestion avoidance, reliable routing, and energy savings must be addressed. Routing protocols are essential for delivering data between organizations. Information gathering and consolidation require data aggregation to minimize traffic congestion, operating expenses, energy usage, and network lifespan. IoT data aggregation makes route planning dependable, energy-efficient, and difficult. Disjoint &amp; Scalable Multipath Routing (D &amp;SMR) is a new routing system developed using NS2 simulation. The method estimates delivery success using decision trees and neural networks. We evaluate characteristics such as (D &amp;SMR) routing scheme predictability, node popularity, power consumption, speed, and location while training the model. Simulation results show that (D &amp;SMR) outperforms a reliable routing system in terms of delivery success, lost messages, overhead, and hop count. The proposed hybrid routing method involves cluster construction and intra- and inter-cluster routing. The study found that (D &amp;SMR) beats previous research in network resilience, packet transmission efficiency, end-to-end latency, and energy usage.\u0000</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141198010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deployment algorithms of multi-UAV-BS networks with frequency reuse and power optimization 具有频率重用和功率优化功能的多无人机-BS 网络的部署算法
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-05-28 DOI: 10.1007/s11235-024-01164-z
Yanzhi Hu, Chunyuan Tian, Dawei Ma, Zhiyong Shi, Fengbin Zhang
{"title":"Deployment algorithms of multi-UAV-BS networks with frequency reuse and power optimization","authors":"Yanzhi Hu, Chunyuan Tian, Dawei Ma, Zhiyong Shi, Fengbin Zhang","doi":"10.1007/s11235-024-01164-z","DOIUrl":"https://doi.org/10.1007/s11235-024-01164-z","url":null,"abstract":"<p>Deploying unmanned aerial vehicle base stations (UAV-BSs) to provide wireless access for terrestrial users is an alternative solution in emergency scenarios. Due to the dynamic nature of UAV-BSs and strong line-of-sight (LoS) transmission, co-frequency networking worsens the interference suffered by edge users, while the use of fully orthogonal channels for all UAV-BSs also faces the problem of frequency resource constraints. This paper develops a new deployment scheme by combining multiple UAV-BS locations, limited frequency reuse and power optimization. Thus, the nonlinear constrained optimization model is proposed to maximize user coverage. To reduce the computational complexity, the basic multi-UAV-BS network layout is first determined by polycentric clustering and connectivity adjustment based on user location distribution. Then, a genetic algorithm is used to optimize the multi-UAV-BS frequency arrangement and power adjustment to obtain the model solution. Simulations verify the effectiveness of the proposed scheme and evaluate the impact of co-channel interference.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141168122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VPIR: an efficient verifiable private information retrieval scheme resisting malicious cloud server VPIR:抵御恶意云服务器的高效可验证私人信息检索方案
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-05-28 DOI: 10.1007/s11235-024-01162-1
Wenqi Zhang, Shuai Shang, Haolin Wang, Ziwen Cai, Yun Zhao, Xiong Li
{"title":"VPIR: an efficient verifiable private information retrieval scheme resisting malicious cloud server","authors":"Wenqi Zhang, Shuai Shang, Haolin Wang, Ziwen Cai, Yun Zhao, Xiong Li","doi":"10.1007/s11235-024-01162-1","DOIUrl":"https://doi.org/10.1007/s11235-024-01162-1","url":null,"abstract":"<p>Private information retrieval, which allows users to securely retrieve information stored in a single server or multiple servers without disclosing any query content to the server, has attracted much attention in recent years. However, most of the existing private information retrieval schemes cannot achieve data retrieval and data integrity authentication simultaneously. To address the above challenges, this paper proposes a verifiable private information retrieval scheme based on parity in a single-server architecture. Specifically, the data owner generates parity information for each data and extends the original database. Then the data owner generates hint information for the query client, and according to the inverse of the hint information, the matrix confusion and permutation of the extensible database are carried out on the database and the hint information is sent to the client. The client selects the corresponding element in the hint to generate the query vector and executes the reconstruction and verification phase after receiving the answer to accomplish the retrieval process. A series of security games prove that this scheme meets the privacy requirements defined by the PIR scheme, and experimental analysis shows that compared with related schemes, our scheme has certain advantages in time cost. The time of verification information generation is 0.3% of APIR and FMAPIR, the reconstruction time is 1.6% of APIR and 1.1% of FMAPIR and the query time is much less than them.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141168158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threshold ALOHA with sensing data lookup in low-duty-cycle wireless networks 低占空比无线网络中带有感知数据查找功能的阈值 ALOHA
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-05-28 DOI: 10.1007/s11235-024-01145-2
Show-Shiow Tzeng, Ying-Jen Lin, Yun-Ti Lin
{"title":"Threshold ALOHA with sensing data lookup in low-duty-cycle wireless networks","authors":"Show-Shiow Tzeng, Ying-Jen Lin, Yun-Ti Lin","doi":"10.1007/s11235-024-01145-2","DOIUrl":"https://doi.org/10.1007/s11235-024-01145-2","url":null,"abstract":"<p>Slotted ALOHA is a well-known multiple access control protocol that devices use to access a radio channel in wireless networks. Age of information (AoI) is a key network performance indicator that represents the elapsed time between the time data is generated and the time data is received. Threshold-based ALOHA, a variant of the slotted ALOHA, uses a threshold and a transmission probability to send data and meet its requirement of average AoI (AAoI), in which however energy consumption is not discussed. It is crucial that a device operates energy-efficiently to reduce energy consumption, which is conducive to extending the life of the device and reducing greenhouse gas emissions. Therefore, this paper proposes a modified threshold ALOHA in low-duty-cycle wireless networks, called LBG-threshold-ALOHA, in which a device looks up whether sensing data is generated in prior <i>N</i> slots before its data generation/transmission. Instead of generating data in each transmission, the LBG-threshold ALOHA uses data generated in prior <i>N</i> slots to send, which reduces the activity of data generation and thus yields lower energy consumption. The characteristic of lower energy consumption is beneficial to produce a lower AAoI on a network constrained by low energy consumption. Simulation results show that, under an upper limit on the mean energy consumption, the LBG-threshold-ALOHA yields a lower minimum AAoI compared to the original threshold ALOHA.\u0000</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141167865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transmission scheduling of P2P real-time communication based on restless multi-armed bandit 基于不安分多臂匪徒的 P2P 实时通信传输调度
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-05-23 DOI: 10.1007/s11235-024-01147-0
Ting Wu, Shikun Tian, Shengda Tang
{"title":"Transmission scheduling of P2P real-time communication based on restless multi-armed bandit","authors":"Ting Wu, Shikun Tian, Shengda Tang","doi":"10.1007/s11235-024-01147-0","DOIUrl":"https://doi.org/10.1007/s11235-024-01147-0","url":null,"abstract":"","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141105996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning-based methods for MCS prediction in 5G networks 基于机器学习的 5G 网络 MCS 预测方法
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-05-22 DOI: 10.1007/s11235-024-01158-x
Lefteris Tsipi, Michail Karavolos, Grigorios Papaioannou, Maria-Garyfallio Volakaki, Demosthenes Vouyioukas
{"title":"Machine learning-based methods for MCS prediction in 5G networks","authors":"Lefteris Tsipi, Michail Karavolos, Grigorios Papaioannou, Maria-Garyfallio Volakaki, Demosthenes Vouyioukas","doi":"10.1007/s11235-024-01158-x","DOIUrl":"https://doi.org/10.1007/s11235-024-01158-x","url":null,"abstract":"","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141112361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security, information, and structure characterization of Tor: a survey Tor 的安全、信息和结构特征:一项调查
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-05-20 DOI: 10.1007/s11235-024-01149-y
Mahdieh Zabihimayvan, Reza Sadeghi, Derek Doran
{"title":"Security, information, and structure characterization of Tor: a survey","authors":"Mahdieh Zabihimayvan, Reza Sadeghi, Derek Doran","doi":"10.1007/s11235-024-01149-y","DOIUrl":"https://doi.org/10.1007/s11235-024-01149-y","url":null,"abstract":"","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141119518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Communication coverage maximization in stadium environments using UAVs 利用无人飞行器实现体育场环境中的通信覆盖最大化
IF 2.5 4区 计算机科学
Telecommunication Systems Pub Date : 2024-05-18 DOI: 10.1007/s11235-024-01153-2
Hamid Jafaripour, Mohammad Fathi, Ali Shariatpanah
{"title":"Communication coverage maximization in stadium environments using UAVs","authors":"Hamid Jafaripour, Mohammad Fathi, Ali Shariatpanah","doi":"10.1007/s11235-024-01153-2","DOIUrl":"https://doi.org/10.1007/s11235-024-01153-2","url":null,"abstract":"<p>Maximizing the communication coverage with the minimum number of unmanned aerial vehicles (UAVs) in a telecommunication system is investigated in this paper. In particular, the problem of maximizing the coverage area in stadium environments using UAVs is modeled mathematically as a multi-objective optimization problem. While the problem is solved using state-of-the-art solvers, to address the problem complexity and achieve the results for real-time applications, we propose a heuristic algorithm. The performance evaluation done in three crowding levels demonstrates that the performance with the heuristic algorithm is comparable to the mathematical model in terms of the number of coverage users. Moreover, the running time is significantly smaller in the proposed heuristic algorithm. This shows the efficiency of the model and solution. Moreover, we compare the heuristic algorithm with the non-dominated sorting genetic algorithm (NSGAII). The results of the paper show that the use of the heuristic algorithm speeds up the processing and decision making, and at the same time maximizes the communication coverage in stadium environments.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141062692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信