IET Communications最新文献

筛选
英文 中文
Specific emitter identification by wavelet residual network based on attention mechanism 基于注意力机制的小波残差网络识别特定发射器
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-06-24 DOI: 10.1049/cmu2.12799
Wenqiang Shi, Yingke Lei, Hu Jin, Fei Teng, Caiyi Lou
{"title":"Specific emitter identification by wavelet residual network based on attention mechanism","authors":"Wenqiang Shi,&nbsp;Yingke Lei,&nbsp;Hu Jin,&nbsp;Fei Teng,&nbsp;Caiyi Lou","doi":"10.1049/cmu2.12799","DOIUrl":"https://doi.org/10.1049/cmu2.12799","url":null,"abstract":"<p>Specific emitter identification technology plays a very important role in spectrum resource management, wireless network security, cognitive radio etc. However, in complex electromagnetic environments, the variability and uncertainty of signals make it very difficult to extract representative feature representations of the signals. At the same time, the feature extraction capability of the recognition model is also a factor that needs to be considered. To address these issues, a wavelet residual neural network model based on attention mechanism is proposed for specific emitter identification. First, multi-level wavelet decomposition is performed on all received signals to obtain their wavelet detail coefficients at different scales. Next, all the wavelet detail coefficients are used as the feature input for the attention-based residual network, and perform parallel feature extraction at multi scales. Finally, the feature representation capability of all coefficients are compared, and the model's recognition results based on it are obtained. The recognition rates on the three datasets are 94.7%, 93.21%, and 86.1%, respectively, all of which are superior to recent state-of-the-art algorithms. In addition, through ablation experiment, the validity of each component of the model has been verified.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12799","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142123390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward designing a lightweight RFID authentication protocol for constrained environments 为受限环境设计轻量级 RFID 验证协议
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-06-22 DOI: 10.1049/cmu2.12794
Nasser Zarbi, Ali Zaeembashi, Nasour Bagheri, Morteza Adeli
{"title":"Toward designing a lightweight RFID authentication protocol for constrained environments","authors":"Nasser Zarbi,&nbsp;Ali Zaeembashi,&nbsp;Nasour Bagheri,&nbsp;Morteza Adeli","doi":"10.1049/cmu2.12794","DOIUrl":"https://doi.org/10.1049/cmu2.12794","url":null,"abstract":"<p>In present times, Radio-Frequency Identification (RFID) systems have seen a significant rise in their usage. There has been an increasing interest in developing even lighter RFID protocols suitable for resource-constrained environments. Ensuring security and privacy remain critical challenges in RFID-based systems. Recently proposed lightweight authentication schemes, namely LRSAS+ and LRARP+, are ideally suited for constrained devices. However, this article investigates these schemes and reveals certain vulnerabilities: LRSAS+ is susceptible to tag impersonation, desynchronization, and traceability attacks, while LRARP+ can fall prey to traceability and secret disclosure attacks. An enhanced version of these authentication systems is proposed that tackles their inherent weaknesses by leveraging the <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>χ</mi>\u0000 <mi>p</mi>\u0000 <mi>e</mi>\u0000 <mi>r</mi>\u0000 </mrow>\u0000 <annotation>$chi per$</annotation>\u0000 </semantics></math> function. To verify the security of the proposed scheme, a formal analysis is conducted using Gong–Needham–Yahalom logic (GNY logic) and an automated security protocol verification tool, ProVerif. The improved scheme's effectiveness is also compared with multiple contemporary lightweight systems. The results indicate that the enhanced scheme not only meets the security requirements for lightweight authentication schemes but also achieves this with minimal computational overhead.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12794","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141967412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved 5G network slicing for enhanced QoS against attack in SDN environment using deep learning 利用深度学习改进 5G 网络切片,增强 SDN 环境中的 QoS 抗攻击能力
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-06-17 DOI: 10.1049/cmu2.12735
Mohammed Salah Abood, Hua Wang, Bal S. Virdee, Dongxuan He, Maha Fathy, Abdulganiyu Abdu Yusuf, Omar Jamal, Taha A. Elwi, Mohammad Alibakhshikenari, Lida Kouhalvandi, Ashfaq Ahmad
{"title":"Improved 5G network slicing for enhanced QoS against attack in SDN environment using deep learning","authors":"Mohammed Salah Abood,&nbsp;Hua Wang,&nbsp;Bal S. Virdee,&nbsp;Dongxuan He,&nbsp;Maha Fathy,&nbsp;Abdulganiyu Abdu Yusuf,&nbsp;Omar Jamal,&nbsp;Taha A. Elwi,&nbsp;Mohammad Alibakhshikenari,&nbsp;Lida Kouhalvandi,&nbsp;Ashfaq Ahmad","doi":"10.1049/cmu2.12735","DOIUrl":"https://doi.org/10.1049/cmu2.12735","url":null,"abstract":"<p>Within the evolving landscape of fifth-generation (5G) wireless networks, the introduction of network-slicing protocols has become pivotal, enabling the accommodation of diverse application needs while fortifying defences against potential security breaches. This study endeavours to construct a comprehensive network-slicing model integrated with an attack detection system within the 5G framework. Leveraging software-defined networking (SDN) along with deep learning techniques, this approach seeks to fortify security measures while optimizing network performance. This undertaking introduces network slicing predicated on SDN with the OpenFlow protocol and Ryu control technology, complemented by a neural network model for attack detection using deep learning methodologies. Additionally, the proposed convolutional neural networks-long short-term memory approach demonstrates superiority over conventional ML algorithms, signifying its potential for real-time attack detection. Evaluation of the proposed system using a 5G dataset showcases an impressive accuracy of 99%, surpassing previous studies, and affirming the efficacy of the approach. Moreover, network slicing significantly enhances quality of service by segmenting services based on bandwidth. Future research will concentrate on real-world implementation, encompassing diverse dataset evaluations, and assessing the model's adaptability across varied scenarios.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12735","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141967292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
KDGAN: Knowledge distillation-based model copyright protection for secure and communication-efficient model publishing KDGAN:基于知识提炼的模型版权保护,实现安全、通信高效的模型发布
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-06-17 DOI: 10.1049/cmu2.12795
Bingyi Xie, Honghui Xu, Daehee Seo, DongMyung Shin, Zhipeng Cai
{"title":"KDGAN: Knowledge distillation-based model copyright protection for secure and communication-efficient model publishing","authors":"Bingyi Xie,&nbsp;Honghui Xu,&nbsp;Daehee Seo,&nbsp;DongMyung Shin,&nbsp;Zhipeng Cai","doi":"10.1049/cmu2.12795","DOIUrl":"https://doi.org/10.1049/cmu2.12795","url":null,"abstract":"<p>Deep learning-based models have become ubiquitous across a wide range of applications, including computer vision, natural language processing, and robotics. Despite their efficacy, one of the significant challenges associated with deep neural network (DNN) models is the potential risk of copyright leakage due to the inherent vulnerability of the entire model architecture and the communication burden of the large models during publishing. So far, it is still challenging for us to safeguard the intellectual property rights of these DNN models while reducing the communication time during model publishing. To this end, this paper introduces a novel approach using knowledge distillation techniques aimed at training a surrogate model to stand in for the original DNN model. To be specific, a knowledge distillation generative adversarial network (KDGAN) model is proposed to train a student model capable of achieving remarkable performance levels while simultaneously safeguarding the copyright integrity of the original large teacher model and improving communication efficiency during model publishing. Herein, comprehensive experiments are conducted to showcase the efficacy of model copyright protection, communication-efficient model publishing, and the superiority of the proposed KDGAN model over other copyright protection mechanisms.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12795","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141967286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable communication based on energy spreading transform and iterative detection in MIMO-OFDM systems 基于 MIMO-OFDM 系统中能量传播变换和迭代检测的可靠通信
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-06-16 DOI: 10.1049/cmu2.12792
Bo He, Hongji Xu, Wei Ji, Yan Du, Hailiang Xiong, Jun Li
{"title":"Reliable communication based on energy spreading transform and iterative detection in MIMO-OFDM systems","authors":"Bo He,&nbsp;Hongji Xu,&nbsp;Wei Ji,&nbsp;Yan Du,&nbsp;Hailiang Xiong,&nbsp;Jun Li","doi":"10.1049/cmu2.12792","DOIUrl":"https://doi.org/10.1049/cmu2.12792","url":null,"abstract":"<p>The challenge of ensuring reliability for high-efficiency technology, multiple-input-multiple-output orthogonal-frequency-division-multiplexing (MIMO-OFDM), in wireless frequency-selective fading environments persists. In this article, the concept of spreading a symbol's energy is proposed as a viable solution to enhance transmission reliability for MIMO-OFDM systems. And an energy-spreading-transform (EST)-based MIMO-OFDM transceiver is developed. Following the Inverse Fast Fourier Transform (IFFT) performed by the conventional MIMO-OFDM transmitter, an orthogonal transformation called the EST is introduced. This transform spreads the energy of a symbol across the entire frequency domain and all time slots. The EST is coupled with the improved iterative detection algorithm named EST-partial decision (PD)-iterative-interference-cancellation (EST-PD-IIC) to maximize and leverage the potential diversity gain. Numerical simulation results demonstrate that the proposed scheme approaches the performance bound when signal-to-noise ratio (SNR) is about 21dB for 16-ary quadrature amplitude modulation (16-QAM). Complexity analysis illustrates that the computational complexity of the evolved EST-PD-IIC algorithm is lower than that of the famous vertically Bell laboratory layered space-time detector (V-BLAST) when the antenna array size is greater than <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mn>3</mn>\u0000 <mo>×</mo>\u0000 <mn>3</mn>\u0000 </mrow>\u0000 <annotation>$3times 3$</annotation>\u0000 </semantics></math>. In summary, the proposed scheme is practical for providing high-quality communication in multi-path fading environments and can even enable a reliable communication without channel encoding when Eb/N0 exceeds a threshold in 5G-Advanced.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12792","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141967198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A literature review on V2X communications security: Foundation, solutions, status, and future 关于 V2X 通信安全的文献综述:基础、解决方案、现状和未来
IF 1.6 4区 计算机科学
IET Communications Pub Date : 2024-06-14 DOI: 10.1049/cmu2.12778
Zuobin Ying, Kaichao Wang, Jinbo Xiong, Maode Ma
{"title":"A literature review on V2X communications security: Foundation, solutions, status, and future","authors":"Zuobin Ying, Kaichao Wang, Jinbo Xiong, Maode Ma","doi":"10.1049/cmu2.12778","DOIUrl":"https://doi.org/10.1049/cmu2.12778","url":null,"abstract":"With the refinement and development of the Vehicle to Everything (V2X) concept, its security issues have gradually come to the fore, revealing many security risks and increasing security requirements for V2X, and many protective measures have likewise emerged. The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, surveys the security technologies used for V2X communication, and outlines the development of each technology and the proposed security protocols in the last 3 years. Due to the different advantages and disadvantages of previous protection schemes, the idea of using National Cryptography to supplement the security scheme or designing a new security scheme article based on the National Cryptography Algorithms((AKA SM algorithms) is proposed. The survey then introduces the SM2, SM3, SM9, and ZUC algorithms, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV regarding the SM algorithms and gives some application prospects.","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141338787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparative analysis of two-stage approaches for embedding network function virtualization enabled multicast services 嵌入网络功能虚拟化组播服务的两阶段方法比较分析
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-06-14 DOI: 10.1049/cmu2.12787
Mina Asgarian, Ghasem Mirjalily
{"title":"A comparative analysis of two-stage approaches for embedding network function virtualization enabled multicast services","authors":"Mina Asgarian,&nbsp;Ghasem Mirjalily","doi":"10.1049/cmu2.12787","DOIUrl":"10.1049/cmu2.12787","url":null,"abstract":"<p>The Network Function Virtualization (NFV) technology has emerged to turn hardware-based network functions into software-based virtual entities. In NFV-enabled multicast services, the data flow should be passed through a series of Virtual Network Functions (VNFs) before reaching destinations. In the problem of NFV-enabled multicast service embedding, not only the VNFs must be deployed, but also the traffic forwarding topology must be constructed. As the exact solution of this problem suffers from high computational complexity, the heuristic or approximation approaches are used in practice. However, as a way to control the trade off between complexity and efficiency, using multistage solutions is offered in literature. In this article, some two-stage approaches for embedding NFV-enabled multicast services are introduced, and they are compared through analysis and simulation. Specifically, a new low-complexity approach based on the Auxiliary VNF Graph (AVG) is proposed to determine the sub-optimal locations for VNF placement and to construct the NFV-based multicast routing tree. The comparative analysis shows that the proposal has acceptable performance while reducing the computational complexity significantly.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12787","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141337901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A knowledge distillation strategy for enhancing the adversarial robustness of lightweight automatic modulation classification models 增强轻量级自动调制分类模型对抗鲁棒性的知识提炼策略
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-06-13 DOI: 10.1049/cmu2.12793
Fanghao Xu, Chao Wang, Jiakai Liang, Chenyang Zuo, Keqiang Yue, Wenjun Li
{"title":"A knowledge distillation strategy for enhancing the adversarial robustness of lightweight automatic modulation classification models","authors":"Fanghao Xu,&nbsp;Chao Wang,&nbsp;Jiakai Liang,&nbsp;Chenyang Zuo,&nbsp;Keqiang Yue,&nbsp;Wenjun Li","doi":"10.1049/cmu2.12793","DOIUrl":"10.1049/cmu2.12793","url":null,"abstract":"<p>Automatic modulation classification models based on deep learning models are at risk of being interfered by adversarial attacks. In an adversarial attack, the attacker causes the classification model to misclassify the received signal by adding carefully crafted adversarial interference to the transmitted signal. Based on the requirements of efficient computing and edge deployment, a lightweight automatic modulation classification model is proposed. Considering that the lightweight automatic modulation classification model is more susceptible to interference from adversarial attacks and that adversarial training of the lightweight auto-modulation classification model fails to achieve the desired results, an adversarial attack defense system for the lightweight automatic modulation classification model is further proposed, which can enhance the robustness when subjected to adversarial attacks. The defense method aims to transfer the adversarial robustness from a trained large automatic modulation classification model to a lightweight model through the technique of adversarial robust distillation. The proposed method exhibits better adversarial robustness than current defense techniques in feature fusion based automatic modulation classification models in white box attack scenarios.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12793","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141346119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Noise modelling and mitigation for broadband in-door power line communication systems 宽带室内电力线通信系统的噪声建模与缓解
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-06-10 DOI: 10.1049/cmu2.12797
Ogunlade M. Adegoke, Saheed Lekan Gbadamosi, Babatunde S. Adejumobi, Israel E. Owolabi, Wasiu Adeyemi Oke, Nnamdi I. Nwulu
{"title":"Noise modelling and mitigation for broadband in-door power line communication systems","authors":"Ogunlade M. Adegoke,&nbsp;Saheed Lekan Gbadamosi,&nbsp;Babatunde S. Adejumobi,&nbsp;Israel E. Owolabi,&nbsp;Wasiu Adeyemi Oke,&nbsp;Nnamdi I. Nwulu","doi":"10.1049/cmu2.12797","DOIUrl":"10.1049/cmu2.12797","url":null,"abstract":"<p>Communication systems are greatly hampered by many disruptive noises in powerline communication systems (PLC), which come with strong interference, resulting in the malfunction of PLC systems. Hence, there is a need to model noise and its effect on communication systems. This paper presents noise modelling and mitigation techniques for indoor broadband powerline communication systems. To model the PLC noise, frequency domain measurements employing the GSP-930 spectrum analyser were carried out to determine the noise frequency response in the frequency range of 1–30 MHz. The results obtained were plotted. While the analytical model for the noise model is presented, furthermore, noise mitigation techniques for multiple input multiple output PLC (MIMO-PLC) systems in the form of spatial modulation PLC systems have been proposed. The SM-PLC system employs the indices of the individual transmit lines to increase the data rate, as opposed to the traditional MIMO-PLC systems, where the symbol to be transmitted is transmitted by duplicating the symbol across all lines. The proposed system uses the maximum likelihood (ML) detector at the receiver to obtain estimates of the transmitted symbols. The simulation results of the SM-PLC system are compared with the already existing MIMO-PLC system and show a significant improvement of ≈6 dB and 5.2 dB in signal-to-noise ratio (SNR) at a bit error rate of 10(−5) for spectral efficiencies of 4 bits per channel use (bpcu) and 6 bpcu, respectively. On comparison of the SM-PLC system having a combination of additive white Gaussian noise and impulse noise at the receiver, the SM-PLC system outperformed the traditional MIMO-PLC by 3.5 and 3.8 dB in SNR for 4 and 6 bpcu, respectively.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12797","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141364955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sum-rate maximization for downlink multiuser MISO URLLC system aided by IRS with discrete phase shifters 利用带离散移相器的 IRS 辅助下行多用户 MISO URLLC 系统的总和速率最大化
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-06-09 DOI: 10.1049/cmu2.12790
Chang-Qing Ye, Hong Jiang, Chen-Ping Zeng, Hao-Xin Shi, Zhan-Peng Tang
{"title":"Sum-rate maximization for downlink multiuser MISO URLLC system aided by IRS with discrete phase shifters","authors":"Chang-Qing Ye,&nbsp;Hong Jiang,&nbsp;Chen-Ping Zeng,&nbsp;Hao-Xin Shi,&nbsp;Zhan-Peng Tang","doi":"10.1049/cmu2.12790","DOIUrl":"10.1049/cmu2.12790","url":null,"abstract":"<p>Intelligent reflecting surface (IRS) has recently been considered as a potential technology for realizing ultra-reliable and low-latency (URLLC) in wireless networks. This paper proposes a resource optimization scheme to maximize the sum-rate for an IRS-assisted downlink multiuser multi-input single-output (MISO) URLLC system. For the perfect CSI scenario, we jointly optimize each user's block-length and packet-error probability, the precoding vectors at the base station (BS), and the passive beamforming with discrete phase shifts at the IRS. Given the problem's complexity, we design a computationally efficient iterative algorithm using successive convex approximation (SCA) and semidefinite relaxation (SDR) techniques to obtain a locally optimal solution. Specifically, for the imperfect CSI scenario, we construct a robust resource optimization problem model and incorporate the S-procedure to address the impact of channel uncertainty, proposing an iterative algorithm based on the alternating optimization (AO) method to achieve a locally optimal solution. Simulation results demonstrate that: 1) An IRS equipped with a 2-bit quantized resolution phase shifter is sufficient to achieve a system sum-rate comparable to that of an ideal phase shifter; 2) Compared to other Baseline schemes, Algorithm 2 exhibits better robustness and superior performance gains under imperfect CSI.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12790","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141367074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信