Hao Liu, Yan Zhen, Libin Zheng, Chao Huo, Yu Zhang
{"title":"Cache-Assisted Offloading Optimization for Edge Computing Tasks","authors":"Hao Liu, Yan Zhen, Libin Zheng, Chao Huo, Yu Zhang","doi":"10.1049/cmu2.70089","DOIUrl":"10.1049/cmu2.70089","url":null,"abstract":"<p>Mobile edge computing (MEC) serves as a feasible architecture that brings computation closer to the edge, enabling rapid response to user demands. However, most research on task offloading (TO) overlooks the scenario of repetitive requests for the same computing tasks during long time slots, and the spatiotemporal disparities in user demands. To address this gap, in this paper, we first introduce edge caching into TO and then divide base stations (BSs) into different communities based on the regional characteristics of user demands and activity areas, enabling collaborative caching among BSs within the same community. Subsequently, we design a dual timescale to update task popularity within both short and long-term time slots. To maximize cache benefits, we construct a model that transforms the caching issue into a 0–1 knapsack problem, and employ dynamic programming to obtain offloading strategies. Simulation results confirm the efficiency of the proposed task caching policy algorithm, and it effectively reduces the offloading cost and improves cache resource utilization compared to the other three baseline algorithms.In this paper, we first introduce edge caching into TO and then divide BSs into different communities based on the regional characteristics of user demands and activity areas, enabling collaborative caching among BSs within the same community. Subsequently, we design a dual timescale to update task popularity within both short and long-term time slots. To maximize cache benefits, we construct a model that transforms the caching issue into a 0–1 knapsack problem and employ dynamic programming to obtain offloading strategies.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70089","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145111350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lei Hang, Chun Chen, Yifei Zhang, Jun Yang, Linchao Zhang
{"title":"A Learning to Prediction Based Transaction Traffic Management Approach to Enhance Healthcare Blockchain Performance","authors":"Lei Hang, Chun Chen, Yifei Zhang, Jun Yang, Linchao Zhang","doi":"10.1049/cmu2.70076","DOIUrl":"10.1049/cmu2.70076","url":null,"abstract":"<p>The transaction processing capacity of blockchain systems remains a critical barrier to adoption in real-time applications. Recent studies have explored different optimization techniques, including sharding, off-chain processing, and hybrid consensus algorithms. However, most of those techniques change the original architecture or process of the blockchain and may raise compatibility issues. Resolving these challenges calls for creative methods that can effectively balance transaction throughput with latency without compromising blockchains' core infrastructures. This paper proposes a learning to prediction framework combining a Kalman filter and artificial neural network for transaction throughput forecasting, integrated with a fuzzy logic controller embedded in smart contracts. The approach can dynamically optimize transaction traffic flow based on the predicted throughput and the observed transaction latency, thus improving blockchain performance in real-time. Deployed on a hyperledger fabric healthcare testbed and evaluated through a series of ablation experiments, the results demonstrate a significant improvement over the baseline and therefore illustrate the potential of the proposed approach in improving blockchain performance for practical applications.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70076","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145102300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sangeetha, T. Aruldoss Albert Victoire, C. Kumar, Sourav Barua
{"title":"Segment Routing for WSN Using Hybrid Optimisation With Energy Efficient Game Theory Based Clustering Technique","authors":"S. Sangeetha, T. Aruldoss Albert Victoire, C. Kumar, Sourav Barua","doi":"10.1049/cmu2.70088","DOIUrl":"10.1049/cmu2.70088","url":null,"abstract":"<p>This research focuses on wireless sensor networks (WSNs) and proposes a three-phase approach to achieve energy-efficient routing. The approach consists of node deployment using Voronoi diagrams, clustering, cluster head (CH) selection using energy-efficient game theory, and a routing strategy based on improved pelican Optimisation (ImPe) segment routing. Random deployment of sensor nodes in WSNs can lead to coverage issues, and hence, in order to address this, Voronoi-based node deployment is employed to ensure uniform and balanced coverage of the monitoring area. An energy-efficient game theory-based approach is used for CH selection, which considers factors such as network conditions and energy levels to select CHs, preventing specific nodes from becoming overburdened and ensuring smoother data collection. The proposed routing mechanism utilises segment routing, which provides deterministic routing paths from CHs to the sink. Segment routing eliminates the need for route discovery and maintenance, making it energy-efficient. The ImPe algorithm that works on the characteristics of pelican search agents is employed to choose the optimal segment path for information sharing. The assessment based on delay, network lifetime, packet delivery ratio, residual energy and throughput by the proposed ImPe segment routing acquired the values of 2.1494, 98.9685, 99.1109, 0.9856, and 250.7044, respectively.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70088","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145062380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huizhu Han, Can Li, Wei Liu, Ziliang Zuo, JinKun Zhu, Jing Lei
{"title":"Pulse-Based Clock Synchronization and Physical Layer Communication in Wireless Sensor Networks","authors":"Huizhu Han, Can Li, Wei Liu, Ziliang Zuo, JinKun Zhu, Jing Lei","doi":"10.1049/cmu2.70065","DOIUrl":"10.1049/cmu2.70065","url":null,"abstract":"<p>Clock synchronization is a critical technology in wireless sensor networks (WSNs), providing an essential foundation for data fusion, event scheduling, and collaborative operations among network nodes. However, existing clock synchronization methods face challenge of random delay in practical applications. To address these issues, this paper first proposes a pulse-based physical layer clock synchronization method, which can achieve the synchronization directly at the physical layer, thereby avoiding the random delays introduced by the upper-layer network. Specifically, the high-precision phase offset estimation between the reference node and the slave nodes is first accomplished under the one-way dissemination mechanism by leveraging the correlation property of pulse sequences. On this basis, the estimated clock information is quantized and encoded into pulse signals for transmission using pulse position modulation (PPM) technology, thereby enabling synchronization and communication between any two slave nodes at the physical layer. Simulation results demonstrate that our proposed pulse-based method significantly improves estimation accuracy, achieving the mean square error (MSE) of approximately −45 dB in synchronization precision. Compared to the benchmark schemes, the proposed pulse-based physical layer scheme exhibits notable advantages in system performance: it can reduce the MSE by approximately 16 dB compared to Benchmark Scheme 1 and by approximately 10 dB compared to Benchmark Scheme 2.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70065","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145038345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christian Fragoas F. Rodrigues, Lisandro Lovisolo, Luiz Alencar Reis da Silva Mello
{"title":"Simulation and Analysis of Mobile Access (SAMA): Cellular Radio Access Network Simulator and Performance Evaluator Applied to 5G","authors":"Christian Fragoas F. Rodrigues, Lisandro Lovisolo, Luiz Alencar Reis da Silva Mello","doi":"10.1049/cmu2.70077","DOIUrl":"10.1049/cmu2.70077","url":null,"abstract":"<p>The different use-case scenarios for mobile networks make radio access network (RAN) assessment using only coverage (radio link) prediction inadequate since channel capacity and latency play vital roles in some scenarios. To correctly evaluate the RAN performance, the flexible assignment of the spatial (beamforming) and time-frequency resources of the physical layer frame must be accounted for. This paper presents a RAN simulator for 5G mobile networks that can evaluate different performance indicators of the base stations (BS) arrangement supporting a user equipment (UE) distribution in the region where the mobile network operates. The BS may have multiple sectors and antenna arrays for beamforming in the simulator. The simulator supports both uplink and downlink. Each simulation round considers a physical layer frame when the UEs' positions are assumed static for the assignment between BS beams and UEs. The tool also encompasses some standard schedulers for the radio resources. Besides the UEs–BSs assignment and scheduling, which depend on the BS arrangement and the distribution of UEs and the scheduler, the simulator returns performance indicators as the capacity, throughput, and latency for each UE. The performance accounts for the interference in the radio environment. Consequently, the presented simulation tool helps with system design and evaluation. The many resources encompassed in the simulator can be configured for many different scenarios. We exemplify the simulator usage by comparing the RAN's performance for different network usages under various network configurations and resource schedulers.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70077","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145012742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Prudence Munyaradzi Mavhemwa, Marco Zennaro, Philibert Nsengiyumva, Frederic Nzanywayingoma
{"title":"Naïve Bayes Based Android Adaptive User Authentication Prototype for Young Internet of Medical Things Users","authors":"Prudence Munyaradzi Mavhemwa, Marco Zennaro, Philibert Nsengiyumva, Frederic Nzanywayingoma","doi":"10.1049/cmu2.70082","DOIUrl":"10.1049/cmu2.70082","url":null,"abstract":"<p>The increasing use of the Internet of Medical Things (IoMT) in healthcare highlights privacy and security concerns surrounding sensitive health data. This research focuses on enhancing the security and usability of IoMT for young users through a robust, adaptive continuous authentication model using physiological biometrics on Android devices and heart rate data from smartwatches. By integrating user behavior, environmental context, and health conditions, the model dynamically determines risk, trust, and authorization decisions. Machine learning techniques analyse data related to devices, networks, locations, and user habits while considering demographics like age and medical conditions to assign suitable authenticators. The model balances accuracy and usability, favouring correct positive predictions, but faces limitations such as class imbalance, feature selection, and overfitting, with a false rejection rate (FRR) of 19%. Behavioral biometrics, personalized authentication, and continuous authentication enhance security and accessibility. However, moderate sensitivity affects its ability to capture all positive cases. Age-group analysis reveals varying engagement with technology, emphasising tailored authentication flows. Future work will explore explainable AI, context-aware analytics, and advanced risk assessments, integrating complementary smartwatch data like step count for improved accuracy. This research demonstrates the potential of risk-based adaptive authentication to deliver secure, user-friendly solutions in complex healthcare environments.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70082","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145012882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RETRACTION: Resource Allocation for Integrated Satellite-Terrestrial Networks Based on RSMA","authors":"","doi":"10.1049/cmu2.70084","DOIUrl":"10.1049/cmu2.70084","url":null,"abstract":"<div>\u0000 \u0000 <p>J. Shi, H. Yang, X. Chen, and Z. Yang, “Resource Allocation for Integrated Satellite-Terrestrial Networks Based on RSMA,” <i>IET Communications</i> 19, no. 1 (2024): e12745, https://doi.org/10.1049/cmu2.12745</p>\u0000 <p>The above article, published online on 5 March 2024 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal's Editor-in-Chief, Jian Ren; the Institution of Engineering and Technology; and John Wiley & Sons Ltd.</p>\u0000 <p>This article was published as part of a guest-edited special issue. Following an investigation, the IET, John Wiley & Sons Ltd, and the journal have determined that the peer review process of the special issue underwent systematic manipulation and did not adhere to the journal's peer review standards. Consequently, we cannot vouch for the integrity or reliability of the content and have decided to retract the article. The authors have been informed of the decision, and they agree with the retraction.</p>\u0000 </div>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70084","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145012741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RETRACTION: Three-Dimensional Geometry-Based Channel Modeling and Simulations for Reconfigurable Intelligent Surface-Assisted UAV-to-Ground MIMO Communications","authors":"","doi":"10.1049/cmu2.70085","DOIUrl":"10.1049/cmu2.70085","url":null,"abstract":"<div>\u0000 \u0000 <p>M. Wang, X. Chen, S. Wang, and W. Shi, “Three-Dimensional Geometry-Based Channel Modeling and Simulations for Reconfigurable Intelligent Surface-Assisted UAV-to-Ground MIMO Communications,” <i>IET Communications</i> (Early View): https://doi.org/10.1049/cmu2.12724.</p>\u0000 <p>The above article, published online on 11 January 2024 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal's Editor-in-Chief, Jian Ren; the Institution of Engineering and Technology; and John Wiley & Sons Ltd.</p>\u0000 <p>This article was published as part of a guest-edited special issue. Following an investigation, the IET, John Wiley & Sons Ltd, and the journal have determined that the peer review process of the special issue underwent systematic manipulation and did not adhere to the journal's peer review standards. Consequently, we cannot vouch for the integrity or reliability of the content and have decided to retract the article. The authors have been informed of the decision.</p>\u0000 </div>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70085","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145012743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inter-Domain Multi-Controller Data Interaction Scheme Based on Blockchain in 6G Networks: A Novel Approach","authors":"Hao She, Qing Lan, Haotong Cao, Yongan Guo","doi":"10.1049/cmu2.70072","DOIUrl":"10.1049/cmu2.70072","url":null,"abstract":"<p>Software-defined networking (SDN) is an essential trend in the future development of networks. Due to hardware limitations, its progress undoubtedly counts on distributed management with multiple controllers to oversee the global network. The multiple network controllers heavily rely on each other to provide network services. However, concerns regarding issues like commercial privacy leakage have given rise to a conflict between the imperative of privacy protection and the necessity of data sharing. This paper focuses on studying the conflict between privacy protection and collaborative sharing. By mapping blockchain nodes to corresponding controllers and deploying them independently, the trusted sharing of domain information is achieved. Leveraging 6G technologies, significant latency issues introduced by uplink and download transmissions are addressed. Abstract network data is encrypted using attribute-based encryption, ensuring sensitive information protection while reducing blockchain overhead. Furthermore, we have incorporated the Provenance Data model and established an alliance blockchain system for cross-SDN network operator management. Finally, a prototype system is implemented, and through rigorous testing, the system's functional effectiveness and high efficiency are demonstrated.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70072","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145012471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaomin Liao, Yulai Wang, Xuan Zhu, Chushan Lin, Yang Han, You Li
{"title":"Graph Neural Network Assisted Spectrum Resource Optimisation for UAV Swarm","authors":"Xiaomin Liao, Yulai Wang, Xuan Zhu, Chushan Lin, Yang Han, You Li","doi":"10.1049/cmu2.70078","DOIUrl":"10.1049/cmu2.70078","url":null,"abstract":"<p>Unmanned aerial vehicles (UAVs) serving as aerial base stations have attracted enormous attention in dense cellular network, disaster relief, sixth generation mobile networks, etc. However, the efficiency is obstructed by scarce spectrum resources, especially in massive UAV swarms. This paper investigates a graph neural network-based spectrum resource optimisation algorithm to formulate the channel access and transmit power of UAVs with the consideration of both spectrum efficiency (SE) and energy efficiency (EE). We first construct a domain knowledge graph of UAV swarm (KG-UAVs) to manage the multi-source heterogeneous information and transform the multi-objective optimisation problem into a knowledge graph completion problem. Then a novel attribute fusion graph attention transformer network (AFGATrN) is proposed to complete the missing part in KG-UAVS, which consists of an attribute aware relational graph attention network encoder and a transformer based channel and power prediction decoder. Extensive simulation on both public and domain datasets demonstrates that, the proposed AFGATrN with a rapid convergence speed not only attains more practical spectrum resource allocation scheme with partial channel distribution information (CDI), but also significantly outperforms the other five existing algorithms in terms of the computation time and the trade-off between the SE and EE performance of the UAVs.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70078","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}