{"title":"A Novel Hybrid Approach for Intrusion Detection Using Neuro-Fuzzy, SVM, and PSO","authors":"Soodeh Hosseini, Fahime Lotfi, Hossein Seilani","doi":"10.1049/cmu2.70071","DOIUrl":"https://doi.org/10.1049/cmu2.70071","url":null,"abstract":"<p>This paper presents a novel method for optimising intrusion detection systems (IDS) by using two powerful techniques, namely ‘Principal component analysis (PCA)’ and ‘Particle swarm optimisation (PSO).’ Furthermore, the proposed approach is implemented on two categories of classifiers, Neuro-Fuzzy and support vector machines (SVM), which function on four widely used intrusion detection system datasets: CAIDA, DARPA, NSLKDD, and ISCX2012. Performance results are analysed individually based on a set of established evaluation criteria. Furthermore, the PSO algorithm is applied in search of the best combination of the outputs from the Neuro-Fuzzy and the SVM models, resulting in better attack detection accuracy with reduced false alarm rates. Another benefit of using PCA in the proposed method is that it considerably reduces the dimensions of the data by computing the principal components. This offers several advantages, such as reduced model complexity, training and execution time, memory usage, and model overfitting prevention. By focusing on the major components, PCA reduces noise in data to a certain extent, leading to increased classification accuracy and robustness. It also improves model interpretability by highlighting the key components. The application of PSO to find the most optimal parameters leads to the optimisation of the Neuro-Fuzzy and SVM models' parameters. The results achieved support that the proposed method for output combination in both Neuro-Fuzzy and SVM categories significantly enhances the accuracy of attack detection while reducing the false alarm rate.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70071","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144782625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fatima Al-Quayed, Sana Rauf Awan, Noshina Tariq, Mamoona Humayun, Thanaa S Alnusairi, Tayyab Rehman
{"title":"CID-RPL: Clone ID Attack Detection Using Deep Neural Network for RPL-Based IoT Networks","authors":"Fatima Al-Quayed, Sana Rauf Awan, Noshina Tariq, Mamoona Humayun, Thanaa S Alnusairi, Tayyab Rehman","doi":"10.1049/cmu2.70067","DOIUrl":"https://doi.org/10.1049/cmu2.70067","url":null,"abstract":"<p>The proliferation of the Internet of Things (IoT) has reshaped industries based on seamless connectivity. However, it has also brought about immense security challenges, especially in the communication protocol of routing protocol for low-power and lossy networks (RPL). One of these security threats vital to the RPL-based IoT networks includes the Clone ID attack on malicious nodes when they clone the identity of legitimate nodes to access their sensitive data without authorization. Detecting Clone ID attacks in RPL-based IoT networks is complex because network traffic data has high dimensions and substantial data imbalances while facing limited resources in these environments. The unmanaged control message system and insufficient identity authentication methods within the RPL protocol directly expose networks to state-of-the-art cyber security threats. This paper proposes a new edge layer-based deep neural network (DNN) approach to detect Clone ID attacks from IoT sensor networks by network traffic pattern analysis. The proposed method is based on deep data features to distinguish legitimate nodes from cloned nodes and improve the overall security, resilience, and operational efficiency of RPL-based IoT networks. To check the efficiency of our proposed method, we designed a synthetic dataset called CID-RPL. The CID-RPL dataset consists of 25 attributes and 2,131,328 samples. The experimental results are best to describe that our proposed approach outperformed the previously designed methods by offering an accuracy improvement of 5.06%, precision improvement of 7.60%, recall increment of 7.0%, and F1 score enhancement of 11.0%. Similarly, residual energy at the network level increased by 32.84%, which infers that the lifetime of the network will be extended and its energy efficiency increased under attack situations. Thus, the results testify to the effectiveness of the DL-based solution proposed herein to detect Clone ID attacks in dynamic and evolving network environments.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70067","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144782626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongliang Zou, Lidan Fang, Lu Qi, Lina Guo, Hongyan Chen
{"title":"Noncoherent Reflecting Modulation for Reconfigurable Intelligent Surface-Based Communications","authors":"Hongliang Zou, Lidan Fang, Lu Qi, Lina Guo, Hongyan Chen","doi":"10.1049/cmu2.70068","DOIUrl":"https://doi.org/10.1049/cmu2.70068","url":null,"abstract":"<p>Reconfigurable intelligent surface (RIS)-based communication has emerged as a novel concept that can transform signal in a cost-effective and energy-efficient manner. However, the RIS system is confronted with the following several problems. First, the substantial number of reflecting elements complicates the estimating of channel state information (CSI). Second, passive RIS systems merely reflect signals to the receiver. The enhancements in bit error rate (BER) performance are insufficient. Third, the existing RIS systems only consider the influence of noise at the receiver. Nevertheless, in reality, the signal is affected by noise on both RIS and receiver. To address these limitations, a noncoherent reflecting modulation (NRM) system is designed in this paper. In the NRM system, the active RIS is adopted. It modifies not only the phase but also the amplitude, which significantly enhances the BER performance. Energy signals and differential techniques are employed, allowing the system to function without any CSI at the transmitter, RIS, or receiver. The simulation results demonstrate that NRM exhibits a 9 dB improvement in BER performance and exhibits superior noise resistance compared to the existing differential RIS system. The upper bound of the average symbol error probability is derived. Extensive simulations validate the superiority of the NRM scheme in scenarios such as 6G.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70068","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144773740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UAVs-Assisted Low-Bit Quantized CF-mMIMO Systems With MmWave Communications Under MRC Detection","authors":"Sogol Moshirvaziri, Jamshid Abouei","doi":"10.1049/cmu2.70069","DOIUrl":"https://doi.org/10.1049/cmu2.70069","url":null,"abstract":"<p>The cell-free massive multiple input multiple output (CF-mMIMO) approach, due to its high coverage and the ability to attenuate the large-scale fading impacts in wireless communications, has drawn a lot of attention. Additionally, because of their movement ability, low power, and low-cost employed infrastructures, unmanned aerial vehicles (UAVs) are considered a promising technology to provide service on demand in various applications, deployed as either base stations (BSs) or user equipment (UEs). This paper considers a UAV-equipped CF-mMIMO wireless network, assuming millimetre-wave (mmWave) connections between UAV-BSs and ground users. Leveraging the additive quantisation noise model (AQNM), closed-form expressions for the uplink data rate and energy efficiency (EE) under maximum ratio combining (MRC) detection are obtained. The impacts of effective parameters, including the UAV's altitude, the number of antennas, and the resolution of analogue-to-digital converters (ADCs), on system performance are investigated. Simulation results demonstrate that EE can be optimised for these factors to achieve the maximum value. In addition, the optimal number of quantisation bits to maximise EE is based on the number of antennas and the height of the UAVs. Comparing analytical results with accurate ones shows the accuracy of our approximations due to the same trend of variations.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70069","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144767816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Instantaneous Extraction of Frequency Components of the FM Signals by Time Domain Processing and Its Applications","authors":"Roza Banitalebi Dehkordi, Mohsen Mivehchy","doi":"10.1049/cmu2.70070","DOIUrl":"https://doi.org/10.1049/cmu2.70070","url":null,"abstract":"<p>This paper investigates the momentary extraction of a part of the frequency components of the signal resulting from the frequency modulation process. Based on this analysis, a new method for extracting frequency information is proposed. The changes of the instantaneous periods of the FM signal are investigated, and a simple method to determine the instantaneous frequency of the signal in the time domain is proposed. The proposed method was evaluated through simulations and compared against conventional FM demodulation techniques. In similar SNR, the relative error power of the proposed method is approximately 2 dB less than other conventional types of FM demodulators.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70070","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144725397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Stream Signal Separation Based on Asynchronous Control Meta-Surface Antenna","authors":"Yuze Guo, Liang Jin, Yangming Lou, Xiaoming Xu, Qinlong Li, Boming Li, Shuaiyin Wang","doi":"10.1049/cmu2.70062","DOIUrl":"https://doi.org/10.1049/cmu2.70062","url":null,"abstract":"<p>The real-time reconfigurable characteristics of meta-surface antennas can be used to separate multi-stream signals under the condition of single radio frequency (RF). However, with the increase of the symbol rate and the number of antenna arrays in the future, it will face the problem that the state switch rate of the electromagnetic unit is not enough to reach the upper limit of array effective degrees of freedom (DOF) of the meta-surface antenna. To solve this problem, a theory of asynchronous control meta-surface antenna is proposed in this paper. By designing the starting time of different element state switching, different electromagnetic element states are staggered to improve the array effective DOF of the meta-surface antenna. Then, an electromagnetic unit state design algorithm of asynchronous control meta-surface antenna based on the minimum condition number of equivalent channel matrix is proposed. We improve the sparrow search algorithm to solve the condition number minimization problem in order to obtain the better multi-stream signal separation performance. The simulation results show that compared with the synchronous control meta-surface antenna, theory proposed in this paper can improve the effective DOF of array under the condition of limited switch rate, and can effectively reduce the receiving bit error rate and improve spectral efficiency when separating multi-stream signals.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70062","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144695814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Graph Neural Network-Based Task Offloading and Resource Allocation for Scalable Vehicular Networks","authors":"Menghan Shao, Rongqing Zhang, Liuqing Yang","doi":"10.1049/cmu2.70064","DOIUrl":"https://doi.org/10.1049/cmu2.70064","url":null,"abstract":"<p>Intelligent vehicles require extensive data processing to enhance safety and improve driver comfort. With limited onboard computing resources, these vehicles often offload tasks to nearby vehicles or servers for auxiliary processing to meet real-time response requirements. However, the complexity and highly dynamic nature of the vehicular environment render the design of effective offloading strategies. While existing approaches can adapt to changes in environmental parameters within vehicular networks, they are fundamentally limited by their inability to process variable-dimensional environmental information and make decisions that scale with network size. Traditional methods typically rely on fixed-size input representations and static computational frameworks, which are inherently unsuitable for the dynamic and scalable nature of real-world vehicular networks that require adaptive responses to varying network sizes. As a result, existing alternatives lack feasibility to highly dynamic real-world vehicle networks that require adaptive responses to varying network sizes. To alleviate this limitation, we develop an original approach to address the task offloading and resource allocation problem with a scalable size, via a framework based on a graph neural network (GNN). Leveraging its neighbour aggregation mechanism, GNN effectively adapts to varying-scale topologies in dynamic vehicular networks, ensuring robust performance regardless of network size. To evaluate our proposed approach, we conducted extensive simulations to analyse its performance. The experimental results demonstrate that our method provides a more scalable and real-time capable solution, surpassing existing approaches by seamlessly handling dynamic network size variations.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70064","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144681589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal DBS Placement in IoT Networks to Minimize Power Consumption Using Grasshopper Optimization Algorithm","authors":"Ahmed Qabel Fahem, Javad Musevi Niya","doi":"10.1049/cmu2.70059","DOIUrl":"https://doi.org/10.1049/cmu2.70059","url":null,"abstract":"<p>One of the basic challenges that the sixth-generation (6G) telecommunication is facing is the possibility of wide coverage to users in diverse geographical environments. Due to environmental events and unforeseen events such as problems with ground base stations, sometimes the services of these ground stations are disrupted, and as a result, to serve users and cover them, a drone base station (DBS) must be used. But the cost of creating the infrastructure for DBS is very high, and it should be possible to provide the maximum coverage for users with the least number of DBS. Therefore, the location of DBS is very important. Also, in order to provide services to users with the best quality, DBSs should be placed optimally in such a way that power consumption is minimized. In this research, we have presented a scheme based on the grasshopper optimization algorithm (GOA) for the optimal location of DBSs in IoT networks. Specifically, we conducted a performance analysis of one distinct scenario. Employing various intelligence strategies, the proposed method has been very successful in the optimal location of DBSs compared to other methods, and it has performed better in terms of power consumption.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70059","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144647302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multilevel Optimised Algorithm for UWB Positioning in Indoor Environment","authors":"Deshu Guo, Aihua Zhang, Haowen Xia","doi":"10.1049/cmu2.70061","DOIUrl":"https://doi.org/10.1049/cmu2.70061","url":null,"abstract":"<p>The proliferation of the Internet of Things has precipitated an escalating demand for indoor positioning and navigation systems that exhibit a confluence of heightened precision and economic viability. However, non-line-of-sight has an impact on the accuracy of ultra-wideband indoor location. To address this issue, we proposed a multilevel optimised algorithm based on particle filter and Bayesian unscented Kalman filter (PF-BUKF) to approach the nonlinear state and then achieve accurate three-dimensional position estimation. This approach comprises two stages. Firstly, the PF is utilised to determine the tag's coordinate's state vector and covariance as the initial optimised values. Then, the results are employed as the prior information for BUKF in order to anticipate the state of tag. The process of two steps utilises discrete points to approach the true state, which enhances the robustness and accuracy of the positioning system. Furthermore, we investigated the effect of time step size on the precision of positioning. Experimental results reveal a substantial improvement over traditional positioning methods, with mean absolute error and root mean square error values of 8.84 and 2.70 cm, respectively, as opposed to 19.02 and 8.45 cm using conventional algorithms in a nonlinear system.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70061","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144589906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distance-Based Unsupervised Local Outlier Detection: Based Values Analysis to Improve Outlier Detection Using Machine Learning","authors":"Atul Kumar Gupta, Rahul Kumar, Jhankar Moolchandani, Vikas Thada, Mohd Asif Shah, Anoop Kumar Tiwari","doi":"10.1049/cmu2.70060","DOIUrl":"https://doi.org/10.1049/cmu2.70060","url":null,"abstract":"<p>Machine learning faces challenges in detecting outliers, especially in high-dimensional datasets. Effective data quality is crucial for better results, and many algorithms identify outliers by analysing outlying aspects of data objects and objects within the dataset. The proposed Advanced Distance-Based Unsupervised Local Outlier Detection (DU-LOD) method improves this process by continuously evaluating and identifying outliers using unsupervised learning and distance-based calculations. DU-LOD identifies outliers by comparing differences between data objects and their neighbours, making it the first method to combine unsupervised local outlier detection with nearest cluster point identification. Experimental analysis through accuracy performance of 96.12%, detection rate performance of 41.89%, precision of 56.12%, and recall of 1.79% proves that our model performs best over the various parameters compared with other existing algorithms. Therefore, measures such as area under the ROC curve (AUC), precision and recall are more appropriate in such a scenario.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70060","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144551005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}