Ad Hoc Networks最新文献

筛选
英文 中文
Meta-enhanced hierarchical multi-agent reinforcement learning for dynamic spectrum management and trust-based routing in cognitive vehicular networks 认知车辆网络中动态频谱管理和基于信任路由的元增强分层多智能体强化学习
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-04-24 DOI: 10.1016/j.adhoc.2025.103874
Ankur Nahar , Debasis Das , Ramnarayan Yadav , Khujamatov Halimjon , Ernazar Reypnazarov
{"title":"Meta-enhanced hierarchical multi-agent reinforcement learning for dynamic spectrum management and trust-based routing in cognitive vehicular networks","authors":"Ankur Nahar ,&nbsp;Debasis Das ,&nbsp;Ramnarayan Yadav ,&nbsp;Khujamatov Halimjon ,&nbsp;Ernazar Reypnazarov","doi":"10.1016/j.adhoc.2025.103874","DOIUrl":"10.1016/j.adhoc.2025.103874","url":null,"abstract":"<div><div>This research introduces the Meta-Enhanced Recurrent Multi-Agent Reinforcement Learning (M-RMARL) framework, designed to tackle the challenges of reliable routing and dynamic spectrum management in Cognitive Vehicular Ad Hoc Networks (CR-VANETs). The framework is built on Meta-Agnostic Meta-Learning (MAML), utilizing Meta-Learned Deep Recurrent Q-Networks (DRQNs) to significantly reduce training time, enabling vehicles to quickly identify optimal routes and enhance spectrum sensing with minimal adjustments. M-RMARL also features a dynamic spectrum management system that employs Long Short-Term Memory (LSTM)-based meta-predictive models to forecast future spectrum availability and network conditions. These predictions allow DRQNs to make proactive, intelligent decisions, improving spectrum efficiency. To ensure secure communication, the framework incorporates a Trust-Based Meta-Coordination mechanism, which dynamically evaluates agent trustworthiness and integrates these assessments into the decision-making process. Additionally, the framework leverages a Hierarchical Meta-Agent Coordination architecture, where Roadside Units (RSUs) manage global coordination and meta-learning updates, while vehicle agents implement the derived policies. This structure enhances scalability and resource management, making M-RMARL particularly effective in complex decision-making environments. Extensive simulations demonstrate the framework’s effectiveness, showing improvements of 18% in spectrum utilization, 25% in training convergence, 20% in spectrum prediction accuracy, 30% in training efficiency, and 17% in trust evaluation reliability.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"175 ","pages":"Article 103874"},"PeriodicalIF":4.4,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143873396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An integrated routing and data fragmentation strategy for optimizing end-to-end delay in LEO satellite networks 一种优化低轨道卫星网络端到端时延的集成路由和数据碎片策略
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-04-24 DOI: 10.1016/j.adhoc.2025.103870
Zhuotong Feng , Bo Li , Hongwei Ding , Fen Hou
{"title":"An integrated routing and data fragmentation strategy for optimizing end-to-end delay in LEO satellite networks","authors":"Zhuotong Feng ,&nbsp;Bo Li ,&nbsp;Hongwei Ding ,&nbsp;Fen Hou","doi":"10.1016/j.adhoc.2025.103870","DOIUrl":"10.1016/j.adhoc.2025.103870","url":null,"abstract":"<div><div>With the advent of the digital era, Low Earth Orbit (LEO) satellite networks, as a critical communication infrastructure, have gradually become a key component of global communication networks due to their extensive coverage and high reliability. However, the dynamic topological nature and frequent link disruptions inherent in LEO satellite networks pose significant challenges to traditional routing algorithms. To address this issue, this paper proposes an innovative satellite network routing strategy that integrates time slicing and contact graph models. This strategy divides time into multiple segments, dynamically acquiring topological information for each segment and selecting the optimal set of routing paths based on the topology at each given moment. Furthermore, this paper introduces a strategy that combines routing selection with data fragmentation, optimizing data transmission paths through an efficient data allocation mechanism, which significantly reduces end-to-end delay and improves data transmission efficiency. Simulation results show that the proposed strategy not only optimizes routing but also enhances load balancing and routing utilization, while achieving a substantial reduction in end-to-end delay. The contributions of this work provide novel insights into routing and traffic management in LEO satellite networks and offer valuable support for the optimization of future satellite communication systems.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"175 ","pages":"Article 103870"},"PeriodicalIF":4.4,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143873397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing cell scheduling function in TSCH-based industrial IoT networks 在基于tsch的工业物联网网络中保护小区调度功能
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-04-21 DOI: 10.1016/j.adhoc.2025.103864
Karnish N.A. Tapadar, Manas Khatua, Tamarapalli Venkatesh
{"title":"Securing cell scheduling function in TSCH-based industrial IoT networks","authors":"Karnish N.A. Tapadar,&nbsp;Manas Khatua,&nbsp;Tamarapalli Venkatesh","doi":"10.1016/j.adhoc.2025.103864","DOIUrl":"10.1016/j.adhoc.2025.103864","url":null,"abstract":"<div><div>6TiSCH is a widely adopted low-power networking standard for Industrial IoT applications that provides highly reliable communication with low latency. Cell scheduling is one of the crucial components in 6TiSCH networks, as it determines packet transmission schedules based on time and channel allocation policy. The IETF published the Minimal Scheduling Function (MSF) and associated 6top (6P) protocol to manage cell schedules dynamically. However, security of the 6TiSCH architecture, particularly the vulnerabilities within the MSF and its associated 6P, has not been fully explored in the literature. This paper identifies vulnerabilities present in the MSF and 6P protocol, and demonstrates the feasibility of two different types of attack called <em>cell depletion attack</em> and <em>schedule instability attack</em>. In both attacks, the main objective of adversary is to consume scheduling resources and make the schedule unstable by performing unnecessary and incorrect 6P transactions. These attacks disrupt the communication schedule of victim nodes as well as victims’ successors, thus causing schedule instability, reduced reliability and increased energy consumption. The Minimal Security Framework standardized by IETF cannot handle such attacks on the MSF. Therefore, this paper proposes a comprehensive strategy (SCSF-WELA) that combines rule-based approach and Weak Estimation Learning Automata (WELA) to detect and prevent malicious behaviour by an attacker. The proposed solution integrates into the standard MSF without additional communication overhead. Through extensive simulations using the 6TiSCH simulator, we verify that the impact of these attacks is significant as they can increase schedule instability by four times and the 6P messaging overhead by 42% in a 60-node network. Furthermore, the proposed <em>SCSF-WELA</em> contermeasure shows substantial improvements in network stability, energy efficiency, and overall performance under those attacks.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"175 ","pages":"Article 103864"},"PeriodicalIF":4.4,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143877601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Are D2D and RIS in the same league? Cooperative RSSI-based localization model and performance comparison D2D和RIS是同一级别的吗?基于协作rssi的定位模型及性能比较
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-04-21 DOI: 10.1016/j.adhoc.2025.103862
Nadezhda Chukhno , Tomas Bravenec , Javier Díez-González , Sergio Trilles , Joaquín Torres-Sospedra , Antonio Iera , Giuseppe Araniti
{"title":"Are D2D and RIS in the same league? Cooperative RSSI-based localization model and performance comparison","authors":"Nadezhda Chukhno ,&nbsp;Tomas Bravenec ,&nbsp;Javier Díez-González ,&nbsp;Sergio Trilles ,&nbsp;Joaquín Torres-Sospedra ,&nbsp;Antonio Iera ,&nbsp;Giuseppe Araniti","doi":"10.1016/j.adhoc.2025.103862","DOIUrl":"10.1016/j.adhoc.2025.103862","url":null,"abstract":"<div><div>The next generation of high-accuracy positioning services is required to satisfy the sub-meter accuracy level for more than 95% of the network area, including indoor, outdoor, and urban deployments. In this vein, inter-agent measurements appear to provide additional position information and, hence, have the capacity to boost localization accuracy. This paper researches cooperative positioning techniques by means of device-to-device (D2D) and reconfigurable intelligent surfaces (RIS) technologies leveraging received signal strength (RSS) based ranging. We estimate the maximum capacities of the positioning systems in terms of accuracy through the Gaussian noise model, proposed universal theoretical distance-dependent noise model, and empirical noise model. We also evaluate the positioning error achieved by combining two or more technologies. Numerical results reveal the use cases advantageous for RIS- and D2D-aided localization. Then, based on the results, valuable guidelines are derived on the optimal sensor fusion metric – median – that minimizes the mean error of the cooperative localization.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"175 ","pages":"Article 103862"},"PeriodicalIF":4.4,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143877597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-organized task offloading and resource allocation in cognitive air-ground collaborative edge computing networks 认知地空协同边缘计算网络中的自组织任务卸载与资源分配
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-04-21 DOI: 10.1016/j.adhoc.2025.103863
Weihao Sun , Hai Wang , Zhen Qin
{"title":"Self-organized task offloading and resource allocation in cognitive air-ground collaborative edge computing networks","authors":"Weihao Sun ,&nbsp;Hai Wang ,&nbsp;Zhen Qin","doi":"10.1016/j.adhoc.2025.103863","DOIUrl":"10.1016/j.adhoc.2025.103863","url":null,"abstract":"<div><div>The integration of drone base stations (DBSs), mobile edge computing (MEC), and cognitive radio into the terrestrial network has the potential to address the ever-growing computing demands. Such networks are regarded as cognitive air-ground collaborative mobile computing (CAGC-MEC) networks. However, considering the large-scale and dynamic features of the Internet of Things (IoT) network, the traditional centralized method possesses prohibitive complexity, and the scalability may be compromised. This paper investigates the self-organized task offloading and resource allocation methods to maximize the quality of experience (QoE) of IoTs, which is evaluated by mean opinion score (MOS). We formulate a joint optimization problem of DBS deployment, resource allocation, task offloading, and channel selection schemes. Following the coverage then optimization methodology, a local Voronoi partition-based deployment method is proposed to improve the coverage rate. On this basis, we derive the closed-form expression of the resource allocation scheme. Subsequently, the task offloading and channel selection sub-problems are solved by Lagrange dual decomposition and best response methods, respectively. The proposed algorithm can be executed under the conditions that the positions of IoTs are previously unknown and without a central controller. Extensive simulations verify that the proposed algorithm is superior to other benchmark algorithms.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"175 ","pages":"Article 103863"},"PeriodicalIF":4.4,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143860137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interval type 2 fuzzy unequal clustering and sleep scheduling for IoT-based WSNs 基于物联网的wsn区间2型模糊不均匀聚类与睡眠调度
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-04-21 DOI: 10.1016/j.adhoc.2025.103867
Aida Zaier , Ines Lahmar , Mohamed Yahia , Jaime Lloret
{"title":"Interval type 2 fuzzy unequal clustering and sleep scheduling for IoT-based WSNs","authors":"Aida Zaier ,&nbsp;Ines Lahmar ,&nbsp;Mohamed Yahia ,&nbsp;Jaime Lloret","doi":"10.1016/j.adhoc.2025.103867","DOIUrl":"10.1016/j.adhoc.2025.103867","url":null,"abstract":"<div><div>Wireless Sensor Networks (WSNs) are a primary means of collecting data in Internet of Things (IoT) systems. Clustering is a highly effective strategy to reduce energy consumption in IoT-based WSNs. In multi-hop clustering, individual sensor nodes transmit their data to designated cluster heads (CHs), which aggregate the data from their member nodes and forward it to the base station (BS) via other CHs. However, a significant challenge in such networks is the hot-spot problem, where CHs located closer to the BS handle increased traffic, leading to faster energy depletion. To address this, the present paper proposes the Interval Type-2 Fuzzy Unequal Clustering and Sleep Scheduling (IT2FUSS) method, which uniquely integrates Interval Type-2 Fuzzy Sets (IT2FS) to model uncertainties in residual energy (RE), node density (ND), and relative distance to the BS (RDBS), dynamic unequal clustering that adjusts cluster sizes in real time to balance CH workloads, and adaptive sleep scheduling to minimize idle energy consumption. Unlike Type-1 fuzzy systems, IT2FUSS leverages the Footprint of Uncertainty (FOU) to more robustly handle sensor data variability, while the co-design of unequal clustering and sleep scheduling helps mitigate hot-spot effects. A fuzzy inference system generates outputs to optimize CH selection, determine cluster sizes, and improve energy efficiency. Simulation results demonstrate that IT2FUSS achieves superior performance in balancing energy consumption and enhancing overall network longevity compared to existing clustering algorithms.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"175 ","pages":"Article 103867"},"PeriodicalIF":4.4,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143877599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ATPSO: Adaptive Task Priority Scheduling and Offloading Optimization Scheme for vehicles in harsh environments 恶劣环境下车辆自适应任务优先级调度与卸载优化方案
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-04-19 DOI: 10.1016/j.adhoc.2025.103861
Xiguang Li , Yuchen Zhao , Yunhe Sun , Ammar Muthanna , Ammar Hawbani , Liang Zhao
{"title":"ATPSO: Adaptive Task Priority Scheduling and Offloading Optimization Scheme for vehicles in harsh environments","authors":"Xiguang Li ,&nbsp;Yuchen Zhao ,&nbsp;Yunhe Sun ,&nbsp;Ammar Muthanna ,&nbsp;Ammar Hawbani ,&nbsp;Liang Zhao","doi":"10.1016/j.adhoc.2025.103861","DOIUrl":"10.1016/j.adhoc.2025.103861","url":null,"abstract":"<div><div>In harsh environments, vehicle driving risks significantly increase. Safety enhancing applications can mitigate these risks, but can also introduce delay-sensitive and computationally intensive tasks that challenge vehicle data processing and communication. This paper proposes an Adaptive Task Priority Scheduling and Offloading Optimization Scheme (ATPSO) based on the Vehicular Edge Computing (VEC) paradigm to improve Quality of Service (QoS) for safety tasks. Firstly, a multifactor prioritization mechanism using environment awareness is developed, leveraging SHapley Additive ExPlanations (SHAP) and XGBoost models to quantify safety priorities from real-time data and assess vehicle risks. A Transformer model dynamically adjusts priority weights to minimize risk. Secondly, the local queue stability problem is addressed as a Lyapunov optimization problem, proposing a multi-queue priority scheduling and distributed resource allocation scheme. Lastly, a Markov Decision Process (MDP) model is constructed to handle dynamic computational offloading, and the Entropy-Enhanced Multi-Agent Soft Actor–Critic (EE-MASAC) algorithm is introduced to optimize offloading strategies and resource allocation. Simulation results demonstrate that ATPSO effectively reduces safety task delays, improves task completion rates, and lowers vehicle risk scores, outperforming existing methods in adaptability and performance, offering a solid foundation for practical deployment of vehicle safety applications.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"175 ","pages":"Article 103861"},"PeriodicalIF":4.4,"publicationDate":"2025-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143877598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MeshChain: A comprehensive blockchain-based framework for mesh networks MeshChain:一个全面的基于区块链的网状网络框架
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-04-17 DOI: 10.1016/j.adhoc.2025.103860
Huda Abualola, Rabeb Mizouni, Shakti Singh, Hadi Otrok
{"title":"MeshChain: A comprehensive blockchain-based framework for mesh networks","authors":"Huda Abualola,&nbsp;Rabeb Mizouni,&nbsp;Shakti Singh,&nbsp;Hadi Otrok","doi":"10.1016/j.adhoc.2025.103860","DOIUrl":"10.1016/j.adhoc.2025.103860","url":null,"abstract":"<div><div>This paper tackles the problem of guaranteed, fair, trusted, and transparent payments to mesh routers to incentivize participation in commercialized mesh networks. Mesh networks are popularly deployed in various domains, including within home and private companies to increase coverage with high throughput and provide security. Extending the mesh networks to commercial use requires the public to actively participate in them. Monetary incentives through cryptocurrency have been discussed in the literature, however, payment management, cost consideration during the selection of mesh routers, and validation of routing actions for fair payment are still open challenges. To tackle the problem of routing validation, other related works are considering monitoring nodes, however, the quality of monitoring decisions is affected by direct communication, mobility direction, and speed. To tackle the mentioned challenges, this paper proposes a comprehensive blockchain-based framework for commercialized mesh networks to incentivize participation. The framework manages the routing requests, routing validation, consensus, and payments on-chain while selecting high-quality, low-cost routers to fulfill the routing requests off-chain. Once a requester raises a routing request, the mesh routers are selected based on quality, reputation, and routing cost. Routing data is stored securely in tamper-proof files, which are shared with a set of trusted validators. The validators submit their decisions and a Proof of Routing (PoR) consensus is achieved on-chain offering transparent routing validation. Accordingly, the payment is calculated and issued based on the performance and contribution of the mesh routers. The presented simulations validate the feasibility of the proposed framework.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"175 ","pages":"Article 103860"},"PeriodicalIF":4.4,"publicationDate":"2025-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143854506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gauss-AUKF based UWB/IMU fusion localization approach 基于Gauss-AUKF的UWB/IMU融合定位方法
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-04-13 DOI: 10.1016/j.adhoc.2025.103855
Mingsheng Wei , Lide Liu , Shidang Li , Di Wang , Wenshuai Li
{"title":"Gauss-AUKF based UWB/IMU fusion localization approach","authors":"Mingsheng Wei ,&nbsp;Lide Liu ,&nbsp;Shidang Li ,&nbsp;Di Wang ,&nbsp;Wenshuai Li","doi":"10.1016/j.adhoc.2025.103855","DOIUrl":"10.1016/j.adhoc.2025.103855","url":null,"abstract":"<div><div>To address the challenge of accurate positioning for ultra-wideband (UWB) systems in complex environments, this paper proposes a multi-sensor fusion localization method based on Gaussian-Adaptive Unscented Kalman Filtering (Gauss-AUKF) for UWB/IMU integration. The method rejects extreme values by performing Gaussian filtering optimization processing on the UWB range information to suppress the range error. And the UWB ranging information is fused with the data acquired by the inertial measurement unit (IMU) using an adaptive Unscented Kalman filter.An adaptive factor is introduced in the fusion process to minimize systematic errors and filter divergence by updating the measure noise covariance matrix in a real-time manner. The proposed method is validated through numerical simulations and experimental tests on a mobile robot equipped with a UWB hardware platform. The performance is evaluated in line-of-sight (LOS) and non-line-of-sight (NLOS) UWB scenarios, and compared with the traditional Extended Kalman Filter (EKF) , the Unscented Kalman Filter (UKF). The results demonstrate that the proposed approach significantly enhances localization accuracy in both LOS and NLOS conditions. The algorithm proposed in this paper has good performance in all three different NLOS environments.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"175 ","pages":"Article 103855"},"PeriodicalIF":4.4,"publicationDate":"2025-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143838534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Double DQN-based Efficient Quality of Service Routing protocol in Internet of Underwater Things with mobile nodes 基于双dqn的水下物联网移动节点高效服务质量路由协议
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-04-12 DOI: 10.1016/j.adhoc.2025.103856
Meiyan Zhang , Yibo Liu , Hao Chen , Wenyu Cai
{"title":"Double DQN-based Efficient Quality of Service Routing protocol in Internet of Underwater Things with mobile nodes","authors":"Meiyan Zhang ,&nbsp;Yibo Liu ,&nbsp;Hao Chen ,&nbsp;Wenyu Cai","doi":"10.1016/j.adhoc.2025.103856","DOIUrl":"10.1016/j.adhoc.2025.103856","url":null,"abstract":"<div><div>Internet of Underwater Things (IoUT) refers to a self-organizing network comprised of energy limited sensor nodes to collect underwater sensory information, which has become a popular research topic due to its both military and commercial applications. How to transmit sensory data to sink nodes with wireless acoustic communication is a great challenge to Internet of Underwater Things. This paper proposes a Double deep <span><math><mi>Q</mi></math></span> Network-based Efficient Quality of Service Routing protocol (DQN-EQSR in short) as the routing strategy of IoUT, which can improve transmission performance of wireless data delivery in IoUT. First of all, this paper establishes a wireless routing system for IoUT, where the applied Quality of Service (QoS) metric consists of packet delivery ratio, network life cycle, and end-to-end delay. Then, this paper establishes multi-dimensional state, multi-dimensional action, and multi-factor reward function for each sensor node. The multi-dimensional state includes node information and packet information, multi-dimensional action includes relay nodes selection and acoustic communication mode, and multi-factor reward function includes many factors such as energy cost, link quality cost, delay cost and packet priority. Moreover, a double Deep <span><math><mi>Q</mi></math></span> Network (DQN) is provided to evaluate the action value of nodes, where DQN1 is used to determine relay nodes, and DQN2 is used to determine acoustic communication controls. In addition, this paper conducts many simulations to prove the effectiveness of DQN-EQSR algorithm. Extensive simulation results show that the proposed DQN-EQSR algorithm outperforms other protocols in terms of packet forwarding hops, alive nodes ratio, residual energy ratio, average end-to-end delay and packet delivery ratio.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"175 ","pages":"Article 103856"},"PeriodicalIF":4.4,"publicationDate":"2025-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143838533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信