Ki-Hwan Kim, Dae-Hee Seo, Im-Yeong Lee, Su-Hyun Kim
{"title":"A Study on New EPC-MPSI for an Inputless External Party to Compute the Intersection of Multiple Private Datasets","authors":"Ki-Hwan Kim, Dae-Hee Seo, Im-Yeong Lee, Su-Hyun Kim","doi":"10.1049/cmu2.70038","DOIUrl":"https://doi.org/10.1049/cmu2.70038","url":null,"abstract":"<p>Private set intersection (PSI) is a privacy-preserving scheme that computes the intersection of two datasets without leaking any other information. Additionally, there is multiparty private set intersection (MPSI) to extend the number of parties for computing the intersection of multiple private datasets. In the traditional PSI and MPSI studies, protocol parties input their private datasets, and one or all of them can compute the intersection. However, there are some scenarios where an inputless external party requires the intersection between private datasets of other parties. Thus, the external party PSI protocols have been recently studied for applications such as pandemic contact tracing, computing human genome information and evaluating policy effects. However, they are limited in applications because the external party can compute the intersection of two datasets. In this paper, we propose a new external party compute-MPSI (EPC-MPSI) protocols that allow an external party to compute the intersection of multiple datasets. We provide the extension of the number of parties and solve the limitation of prior external party PSI protocols. In addition, we analyze the correctness, security and the efficiency in terms of communication and computation costs compared to the prior traditional MPSI protocols.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70038","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143861795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transmit Antenna Selection and Power Allocation Optimization for Non-Orthogonal Multiple Access Systems with Statistical Channel State Information","authors":"Zhuo Han, Wanming Hao, Shouyi Yang, Zhiqing Tang","doi":"10.1049/cmu2.70018","DOIUrl":"https://doi.org/10.1049/cmu2.70018","url":null,"abstract":"<p>This paper considers a downlink multiple input single output (MISO) non-orthogonal multiple access (NOMA) system over Nakagami-m fading channels, where a multi-antenna base station (BS) serves several single-antenna users with the statistical channel state information (CSI) of each user. We propose a novel low-complexity transmit antenna selection by head user (TAS-head) strategy for the first time to exploit the spatial diversity of multiple antennas. Based on our proposed TAS-head strategy, we derive a closed-form expression of the exact outage probability (OP). We further analyse the asymptotic OP and diversity order in high signal-to-noise ratio (SNR) regime. Finally, we formulate a power allocation optimization problem to maximize sum throughput under outage constraints. We also design an Adam algorithm in combination with numerical differentiation method to obtain a suboptimal solution. Monte Carlo (MC) simulations verify the accuracy of our derived exact OP. Results show that our proposed TAS-head strategy is more effective than its benchmarks (TAS-near/far and TAS-maj). Furthermore, we prove that PA-TDR criterion achieves better performance than PA-ACG in scenarios where the descending order of target data rate is the same with that of channel condition. Our designed Adam algorithm turns out to be more effective in comparison with genetic algorithm (GA) in multi-user case. Results indicate that our proposed TAS-head strategy is an efficient method to meet users' QoS requirements, especially in low SNR (or transmit power) regime.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70018","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143857176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bioinspired Adaptive Resource Scheduling for QoS in Mobile Edge Deployments","authors":"Gagandeep Kaur, Balraj Singh, Muhammad Faheem","doi":"10.1049/cmu2.70017","DOIUrl":"https://doi.org/10.1049/cmu2.70017","url":null,"abstract":"<p>As mobile edge computing (MEC) expands, efficient resource allocation and job scheduling become increasingly important. Existing techniques are frequently unable to offer acceptable quality of service (QoS), owing to inflexible scheduling algorithms and insufficient consideration of complex task and resource metrics. To overcome these constraints, this work proposes a novel adaptive vector autoregressive moving average with exogenous variables (VARMAx)-based bioinspired resource scheduling model designed specifically for mobile edge deployment. The proposed approach applies the resilient concepts of flower pollination optimisation (FPO) to map tasks to virtual machines (VMs), a technique that is sensitive to a wide variety of task variables such as makespan, deadline and CPU needs. Simultaneously, VM characteristics such as million instructions per second (MIPS), amount of cores, random access memory (RAM), availability and bandwidth are all taken into account, resulting in a more nuanced and adaptive scheduling process. Furthermore, a VARMAx model is included for task pre-emption, which assists in the recalibration of future VM capabilities, hence improving overall scheduling efficiency, particularly in real-time deployments. The suggested model outperforms existing techniques. Our results show an 8.3% reduction in makespan, a 4.5% improvement in deadline hit ratio, an 8.5% increase in energy efficiency, and a 10.4% increase in throughput. The huge improvements highlight the model's adaptability and efficacy, resulting in important advances in the field of QoS-aware task scheduling for MEC. This work represents a significant advancement in the field of effective resource scheduling, with the potential to guide future research and development efforts in mobile edge deployments.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70017","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143846015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lightweight Authentication Scheme for Resource-Constrained Devices in IIoT","authors":"Zhong Cao, Xudong Wen, Shan Ai, Haitao Cao, Wenli Shang","doi":"10.1049/cmu2.70039","DOIUrl":"https://doi.org/10.1049/cmu2.70039","url":null,"abstract":"<p>The industrial Internet of Things (IIoT) involves interconnected devices and sensors that exchange data in resource-constrained industrial environments. As the number of IIoT devices grows, ensuring secure communication becomes increasingly important. This paper proposes a lightweight authentication scheme leveraging elliptic curve cryptography (ECC) and other lightweight cryptographic techniques to facilitate secure communication among IIoT devices while minimizing computational, communication, and storage overheads. We conduct thorough security evaluations using a stochastic Oracle model and the automated validation of Internet security protocols and applications (AVISPA) tool, as well as informal security analyses based on the Dolev–Yao channel model to validate the correctness of our approach. Simulation results demonstrate that the proposed scheme offers superior security and computational efficiency compared to existing authentication methods in similar contexts.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70039","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143846014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization mechanism of energy efficiency in coexisting wireless body area networks","authors":"Yuting Qian, Kunqi Guo","doi":"10.1049/cmu2.12712","DOIUrl":"https://doi.org/10.1049/cmu2.12712","url":null,"abstract":"<p>This paper studies the optimization of energy efficiency in coexisting wireless body area networks (WBANs). A solution based on combining a naive Bayesian classifier with the Hungarian algorithm is proposed to improve link transmission energy efficiency. The solution is implemented in the following three steps: Firstly, the interference from surrounding WBANs is identified based on a naive Bayesian classifier considering the distance among WBANs, the residual energy of the sensor nodes, and the transmission power of the sensor nodes. Secondly, the signal-to-interference plus noise ratio is determined according to the results of the naive Bayesian classifier. Thirdly, the time slots are allocated adaptively by using the Hungarian algorithm to maximize the overall energy efficiency. The simulation results show that the scheme can improve the overall energy efficiency of the WBAN significantly while ensuring quality of service. In comparison with the iterative algorithm and the PONF algorithm, the proposed scheme has obvious advantages in improving energy efficiency.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12712","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143846016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Positioning Method for Underground Pipe Gallery Inspection Based on UWB Adaptive Fusion","authors":"Haoyue Lin, Zehua Yin, Chunwu Wang, Yifan Lin, Muhammad Suhail Shaikh, Chang Wang, Xiaoqing Dong","doi":"10.1049/cmu2.70037","DOIUrl":"https://doi.org/10.1049/cmu2.70037","url":null,"abstract":"<p>To address the challenges of slow positioning speed and inaccurate localisation of underground pipeline corridors in complex environments using ultra-wideband (UWB) absolute positioning, this paper proposes a Hybrid UWB-IMU Adaptive Localisation Algorithm (HUIALA) for precise underground pipeline corridor positioning. The positioning method uses UWB as absolute positioning, IMU and odometer trajectory calculation as relative positioning (predictive positioning), and updates the observation noise by calculating the fuzzy distance to the triangle centroid to adaptively allocate weights. At the same time, dynamically adjust the intervention and exit of predicted positioning based on system operation, and filter out interference such as UWB positioning drift and absolute positioning failure. The proposed method is based on the simulation and experiment of a wheeled inspection vehicle system using UWB and inertial navigation. The experimental result shows that the proposed method maintains better response speed and high positioning accuracy during dynamic testing in simulated interference environments. The positioning speed is improved by 98.9% compared to single UWB positioning, and the positioning accuracy is improved by about 45.84% and 27.96% compared to single UWB positioning and KF fusion positioning, respectively.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70037","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143826766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pseudo-Label Selection-Based Federated Semi-Supervised Learning Framework for Vehicular Networks","authors":"Jiachen Liu, Haoren Ke, Jianfeng Yang, Tianqi Yu","doi":"10.1049/cmu2.70035","DOIUrl":"https://doi.org/10.1049/cmu2.70035","url":null,"abstract":"<p>In vehicular networks, federated learning (FL) has been used for secure and distributed edge intelligence to support deep neural network (DNN) model training. In the FL, the roadside units (RSUs) and vehicles act as the parameter servers and clients, respectively. However, the raw data collected by the vehicles are normally unlabeled, which can hardly meet the requirements of the supervised learning tasks. To resolve the related issues, a federated semi-supervised learning (FSSL) framework is proposed in this paper. By leveraging semi-supervised learning (SSL), the framework can implement the model training with unlabeled data in vehicles and a small set of manually annotated data in the RSU. Furthermore, a pseudo-label selection method is developed for the vehicles to improve the local pseudo-label prediction accuracy and the convergence of global model training. Simulation experiments have been conducted to evaluate the performance of the proposed FSSL framework. The experimental results show that the proposed framework can effectively utilize unlabeled data in vehicular networks and complete the task of DNN model training.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70035","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143818411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HybridDep: An elastic hybrid resources allocation strategy for I/O-intensive applications","authors":"Pengmiao Li, Yuchao Zhang, Shaoxuan Yun, Fucai Yu, Aizhi Wu","doi":"10.1049/cmu2.70007","DOIUrl":"https://doi.org/10.1049/cmu2.70007","url":null,"abstract":"<p>Along with the rapid development of B5G/6G, the number of applications grows rapidly and the data amount explodes exponentially, putting a massive burden on the resource-limited edge servers. To fully utilize the limited resources, virtualization technology is introduced to provide elastic deployment for applications in edge servers. But for I/O-intensive applications, allocating elastic resources is not as easy as for compute-intensive ones, because the amount of required I/O resources is unknown due to the request uncertainty. Many existing researches try to solve this multi-application deployment problem by peaks clipping and valleys filling, to resource utilization. However, in fact, the times of peaks and valleys of most hybrid deployed applications are similar to each other, which invalidates those traditional solutions. To address this challenge, the actual data is analysed and complementary peak and valley periods in time and space dimensions are found. Based on this finding, an elastic hybrid deployment strategy <i>HybridDep</i> is proposed, for multiple I/O-intensive applications. Validated by simulation experiments using real datasets and traces, this algorithm can reduce about 3.2% deployment cost than the compared algorithm.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70007","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143801555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Context-Weighted Embeddings: A Novel Approach to Predictive Modelling","authors":"Zhai Yue, Mohd Ridwan Abd Razak, Lufeng Li","doi":"10.1049/cmu2.70036","DOIUrl":"https://doi.org/10.1049/cmu2.70036","url":null,"abstract":"<p>Employee satisfaction prediction models often struggle to capture the complex, non-linear relationships between compensation and job satisfaction, particularly in heterogeneous organisational contexts. This paper introduces a novel deep learning framework incorporating multiple technical innovations to address these challenges. The proposed approach employs a dual-pathway neural architecture with compensation-specific processing modules to explicitly model the non-linear interactions between compensation factors and other job attributes across diverse organisational settings. A differentiated embedding strategy transforms raw features into rich, context-aware representations, enabling the capture of subtle patterns in employee satisfaction dynamics. The framework integrates a context-sensitive attention mechanism that automatically identifies and weighs relevant features based on organisational characteristics and temporal patterns, alongside a specialised loss function that adaptively emphasises difficult-to-predict cases, improving performance on complex satisfaction patterns. This model demonstrates robust performance across diverse industry settings, handling missing data and class imbalance effectively. Extensive comparative experiments against state-of-the-art methods (LSTM-Attention, GNN-based approaches and traditional ML models) across multiple datasets show significant improvements, with prediction accuracy increasing by 5.2%–8.5%, mean squared error decreasing by 10.3%–15.2% and AUC-ROC metrics improving by 7.8%. Further analysis reveals superior performance in handling temporal dependencies and organisational context variations, with particular strength in predicting satisfaction levels during significant organisational changes.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70036","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143801409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint Active User Detection, Timing Offset and Channel Estimation for FBMC-Based Uplink Massive Access Systems","authors":"Yuhao Qi, Jian Dang, Zaichen Zhang, Liang Wu, Bingcheng Zhu","doi":"10.1049/cmu2.70034","DOIUrl":"https://doi.org/10.1049/cmu2.70034","url":null,"abstract":"<p>The robustness against timing offsets of filter bank multi-carrier (FBMC) is appealing for grant-free massive access scenarios that mainly adopt asynchronous transmissions. In this work, we propose a compressed sensing based algorithm for joint active user detection as well as timing offset and channel estimation in uplink communication under the combination of FBMC and grant-free massive access systems, which is critical for subsequent decoding or other processes at receiver. The channel estimation part is based on generalized approximate massage passing (GAMP). The active user detection and timing offset estimation are based on loopy belief propagation (LBP) rules, where the expressions of message passing and belief distributions are derived. Besides, since the receiver may have no prior knowledge about some parameters such as noise variance and activity probability, we introduce the expectation maximization (EM) approach into the proposed algorithm. Moreover, we develop a preamble design method to improve the detection and estimation performance. Simulation results show that the proposed EM-LBP-GAMP algorithm can achieve satisfying performance in terms of missed activity detection probability, timing offset estimation error and normalized mean square error of channel estimation.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70034","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143801293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}