Ad Hoc NetworksPub Date : 2025-01-26DOI: 10.1016/j.adhoc.2025.103783
Yang Zhang , Lei Sun , Zhangchao Ma , Jianquan Wang , Meixia Fu , Jinoo Joung
{"title":"A 5G-TSN joint resource scheduling algorithm based on optimized deep reinforcement learning model for industrial networks","authors":"Yang Zhang , Lei Sun , Zhangchao Ma , Jianquan Wang , Meixia Fu , Jinoo Joung","doi":"10.1016/j.adhoc.2025.103783","DOIUrl":"10.1016/j.adhoc.2025.103783","url":null,"abstract":"<div><div>As the Industrial Internet of Things (IIoT) evolves, the rapid growth of connected devices in industrial networks generates massive amounts of data. These transmissions impose stringent requirements on network communications, including reliable bounded latency and high throughput. To address these challenges, the integration of the fifth-generation (5G) mobile cellular networks and Time-Sensitive Networking (TSN) has emerged as a prominent solution for scheduling diverse traffic flows. While Deep Reinforcement Learning (DRL) algorithms have been widely employed to tackle scheduling issues within the 5G-TSN architecture, existing approaches often neglect throughput optimization in multi-user scenarios and the impact of Channel Quality Indicators (CQI) on resource allocation. To overcome these limitations, this study introduces ME-DDPG, a novel joint resource scheduling algorithm. ME-DDPG extends the Deep Deterministic Policy Gradient (DDPG) model by embedding a Modulation and Coding Scheme (MCS)-based priority scheme. This improvement in computational efficiency is critical for real-time scheduling in IIoT environments. Specifically, ME-DDPG provides latency guarantees for time-triggered applications, ensures throughput for video applications, and maximizes overall system throughput across 5 G and TSN domains. Simulation results demonstrate that the proposed ME-DDPG achieves 100 % latency reliability for time-triggered flows and improves system throughput by 10.84 % over existing algorithms under varying Gate Control List (GCL) configurations and user ratios. Furthermore, due to the combination of MCS-based resource allocation scheme with DDPG model, the proposed ME-DDPG achieves faster convergence speed of the reward function compared to the original DDPG method.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"170 ","pages":"Article 103783"},"PeriodicalIF":4.4,"publicationDate":"2025-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143133747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2025-01-26DOI: 10.1016/j.adhoc.2025.103765
Jaspreet Kaur, Kang Tan, Arslan Shafique, Olaoluwa R. Popoola, Muhammad A. Imran, Qammer H. Abbasi, Hasan T. Abbas
{"title":"Location estimation for supporting adaptive beamforming","authors":"Jaspreet Kaur, Kang Tan, Arslan Shafique, Olaoluwa R. Popoola, Muhammad A. Imran, Qammer H. Abbasi, Hasan T. Abbas","doi":"10.1016/j.adhoc.2025.103765","DOIUrl":"10.1016/j.adhoc.2025.103765","url":null,"abstract":"<div><div>This study presents a machine learning (ML)-based localization method for improving location estimation accuracy in wireless networks, especially in challenging environments where traditional techniques often fall short. Conventional methods rely on a limited number of multipath components (MPCs), leading to inaccurate localization in complex environments. By leveraging a novel dataset generated from ray-tracing simulations in urban and campus environments, we propose a deep neural network (DNN)-based method that incorporates rich channel metrics such as angle of arrival (AoA), time of arrival (ToA), and received signal strength (RSS). The DNN is trained on diverse scenarios, including both line-of-sight (LoS) and non-line-of-sight (NLoS) conditions, and outperforms traditional MPC-based methods, reducing localization error by up to 20%. Our approach challenges the conventional use of only 3 MPCs for localization and demonstrates that a larger number of MPCs enhances accuracy, particularly in urban and obstructed environments. This research provides important insights into the potential of ML-driven solutions for improving localization accuracy in next-generation wireless systems, such as 5G and beyond.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"170 ","pages":"Article 103765"},"PeriodicalIF":4.4,"publicationDate":"2025-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143133749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicting diverse QoS metrics in IoT: An adaptive deep learning cross-layer approach for performance balancing","authors":"Yassin Eljakani , Abdellah Boulouz , Craig Thomson","doi":"10.1016/j.adhoc.2025.103769","DOIUrl":"10.1016/j.adhoc.2025.103769","url":null,"abstract":"<div><div>Wireless sensor networks (WSNs) present dynamic challenges in various environments, often requiring careful balance between conflicting Quality of Service (QoS) metrics to optimize stack parameters and enhance network performance. This paper introduces a novel approach that incorporates proposed trade-off parameters at the application layer to model the interplay between multiple QoS metrics, including Packet Delivery Ratio (PDR), signal-to-noise ratio (SNR), Maximum Goodput (MGP), and Energy Consumption (EC). Our approach utilizes a multi-layer perceptron (MLP) model optimized using a custom Bayesian algorithm. The model employs a dynamic loss function called Weighted Error Squared (WES). It adapts dynamically to QoS statistical distributions through a scaling hyperparameter, enabling it to uncover intricate patterns specific to IEEE 802.15.4 networks. Empirical results from testing our model against a public dataset are compelling; we significantly improved prediction accuracy compared to baseline models, with R-squared values of 97%, 99%, 98%, and 93% for SNR, PDR, MGP, and EC, respectively. These results demonstrate the effectiveness of our model in predicting network behavior. Additionally, this paper presents a conceptual operational design for implementing the model in diverse real-world scenarios, suggesting avenues for future practical applications. To the best of our knowledge, this is the first design of such an integrated approach in WSNs, making our model an adaptable solution for network designers aiming to achieve optimal configurations.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"170 ","pages":"Article 103769"},"PeriodicalIF":4.4,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143133745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2025-01-23DOI: 10.1016/j.adhoc.2025.103782
Mónica Aguilar Igartua, Luis J. de la Cruz Llopis, Thomas Begin
{"title":"Preface of Special Issue on Performance Evaluation of Wireless Ad-Hoc and Ubiquitous Networks","authors":"Mónica Aguilar Igartua, Luis J. de la Cruz Llopis, Thomas Begin","doi":"10.1016/j.adhoc.2025.103782","DOIUrl":"10.1016/j.adhoc.2025.103782","url":null,"abstract":"","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"173 ","pages":"Article 103782"},"PeriodicalIF":4.4,"publicationDate":"2025-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143748466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2025-01-20DOI: 10.1016/j.adhoc.2025.103768
Feng Qiu, Dongsheng Guo
{"title":"Regularized constrained total least squares localization for underwater acoustic sensor networks using angle-delay-doppler measurements","authors":"Feng Qiu, Dongsheng Guo","doi":"10.1016/j.adhoc.2025.103768","DOIUrl":"10.1016/j.adhoc.2025.103768","url":null,"abstract":"<div><div>This paper addresses the challenge of underwater acoustic localization using measurements of angle, time delay and Doppler shift. Poor sensor placement can cause numerical instability in the coefficient matrix, which diminishes localization accuracy. To tackle this, we propose a two-stage localization approach based on the regularized constrained total least squares (RCTLS) method. First, we linearize the time delay and Doppler shift equations using azimuth and elevation angles, and apply a weighted least squares (WLS) method for an initial position estimation. Second, to mitigate the impact of ill-conditioned equations and measurement errors, we employ the RCTLS method for a more robust estimation, thus reducing localization error. Due to the unique characteristics of the underwater communications, the presence of errors in the sound speed and sensor position and velocity, as well as the sensor motion effect during the observation period are considered. We also derive the hybrid Cramer Rao lower bound (CRLB) as a benchmark to evaluate estimation performance. Simulations demonstrate that our method significantly improves localization accuracy compared to conventional approaches.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"170 ","pages":"Article 103768"},"PeriodicalIF":4.4,"publicationDate":"2025-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143133751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection and Mitigation of Clock Deviation in the Verification & Validation of Drone-aided Lifting Operations","authors":"Abdelhakim Baouya , Brahim Hamid , Otmane Ait Mohamed , Saddek Bensalem","doi":"10.1016/j.adhoc.2024.103745","DOIUrl":"10.1016/j.adhoc.2024.103745","url":null,"abstract":"<div><div>Modern Cyber–Physical systems rely on diverse computation logic, communication protocols, and technologies and are susceptible to environmental phenomena and production errors that can significantly impact system behavior. The resilience of these systems necessitates considering factors during the high-level design stages to enable accurate functional forecasting and correctness. This paper presents an approach that models clock deviation’s effects within physical and environmental conditions to perform verification & validation in the context of Unmanned Aerial Vehicle domain (UAV). We employ the OMNeT++ simulation framework to define the system’s behavior in a components–port–connectors fashion. The approach leverages Probabilistic Decision Tree rules derived from the OMNeT++ simulation chart. The resulting rule-based model is then interpreted in the PRISM language for automated model verification. To validate our approach, we investigate how clock deviations influence the correctness of drone-aided lifting operations which is our primary focus, serving as a representative application scenario. The research examines clock deviations from multiple sources, including conformance to standard specifications, product manufacturing variations, operational failures, humidity, and operating temperature changes. Our examination explores the potential of validation through simulation and model checking while also studying the approach’s effectiveness through a sensitive analysis. Furthermore, the approach is demonstrated in the context of robot orchestration and water dam infrastructure for generalization purposes in Cyber–Physical Systems modeling. The research highlights the approach’s effectiveness by demonstrating its applicability, including those that incorporate degradation factors.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"170 ","pages":"Article 103745"},"PeriodicalIF":4.4,"publicationDate":"2025-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143133746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2025-01-18DOI: 10.1016/j.adhoc.2024.103751
Guneet Kaur Walia, Mohit Kumar
{"title":"Computational Offloading and Resource Allocation for IoT applications using Decision Tree based Reinforcement Learning","authors":"Guneet Kaur Walia, Mohit Kumar","doi":"10.1016/j.adhoc.2024.103751","DOIUrl":"10.1016/j.adhoc.2024.103751","url":null,"abstract":"<div><div>The pervasive penetration of IoT devices in various domains such as autonomous vehicles, supply chain management, video surveillance, healthcare, industrial automation etc. necessitates for advanced computing paradigms to achieve real time response delivery. Edge computing offers prompt service response via its competent decentralized platform for catering disseminate workload, hence serving as front-runner for competently handling a wide spectrum of IoT applications. However, optimal distribution of workload in the form of incoming tasks to appropriate destinations remains a challenging issue due to multiple factors such as dynamic offloading decision, optimal resource allocation, heterogeneity of devices, unbalanced workload etc in collaborative Cloud-Edge layered architecture. Employing advanced Artificial Intelligence (AI)-based techniques, provides promising solutions to address the complex task assignment problem. However, existing solutions encounter significant challenges, including prolonged convergence time, extended learning periods for agents and inability to adapt to a stochastic environment. Hence, our work aims to design a unified framework for performing computational offloading and resource allocation in diverse IoT applications using Decision Tree Empowered Reinforcement Learning (DTRL) technique. The proposed work formulates the optimization problem for offloading decisions at runtime and allocates the optimal resources for incoming tasks to improve the Quality-of-Service parameters (QoS). The computational results conducted over a simulation environment proved that the proposed approach has the high convergence ability, exploration and exploitation capability and outperforms the existing state-of-the-art approaches in terms of delay, energy consumption, waiting time, task acceptance ratio and service cost.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"170 ","pages":"Article 103751"},"PeriodicalIF":4.4,"publicationDate":"2025-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143133752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2025-01-18DOI: 10.1016/j.adhoc.2025.103766
Xiaobo Gu , Jiale Liu , Yuan Liu , Yuan Chi
{"title":"Anchor nodes selection and placement strategy for node positioning in wireless sensor networks","authors":"Xiaobo Gu , Jiale Liu , Yuan Liu , Yuan Chi","doi":"10.1016/j.adhoc.2025.103766","DOIUrl":"10.1016/j.adhoc.2025.103766","url":null,"abstract":"<div><div>The positions of anchor nodes in wireless sensor networks (WSNs) significantly impacts positioning accuracy. This paper derives the Cramér–Rao lower bound (CRLB) under rigid roto-translation transformations and demonstrates that a larger equilateral triangle formed by anchor nodes minimizes positioning errors. Based on this theoretical insight, a graph theory and geometry-based anchor node selection (ANS) method is proposed. The method is further extended to solve the anchor node placement (ANP) problem, and the particle swarm optimization (PSO) is employed to determine optimal placement positions. Simulation results confirm that the proposed ANS and ANP methods outperform existing approaches in positioning accuracy.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"170 ","pages":"Article 103766"},"PeriodicalIF":4.4,"publicationDate":"2025-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143133750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid and efficient Federated Learning for privacy preservation in IoT devices","authors":"Shaohua Cao, Shangru Liu, Yansheng Yang, Wenjie Du, Zijun Zhan, Danxin Wang, Weishan Zhang","doi":"10.1016/j.adhoc.2025.103761","DOIUrl":"10.1016/j.adhoc.2025.103761","url":null,"abstract":"<div><div>Federated learning (FL) allows multiple participants to collaborate to train a machine learning model while ensuring that the data remain local. This approach has seen extensive application in the Internet of Things (IoT). Compared to traditional centralized training methods, FL indeed protects the raw data, but it is difficult to defend against inference attacks and other data reconstruction methods. To address this issue, existing research has introduced a variety of cryptographic techniques, mainly encompassing secure multi-party Computation (SMC), homomorphic encryption (HE), and differential privacy (DP). However, approaches reliant on HE and SMC do not provide sufficient protection for the model data itself and often lead to significant communication and computation overhead; exclusively employing DP necessitates the incorporation of substantial noise, which harms model performance. In this paper, we propose an efficient and privacy-preserving dual-key black-box aggregation method that uses Paillier threshold homomorphic encryption (TPHE), which ensures the protection of the model parameters during the transmission and aggregation phases via a two-step decryption process. To defend various data reconstruction attacks, we also achieve a node-level DP to effectively eliminate the possibility of recovering raw data from the aggregated parameters. Through experiments on MNIST, CIFAR-10, and SVHN, we have shown that our method has up to a 11% smaller reduction in model accuracy compared to other schemes. Furthermore, compared to SMC-based FL schemes, our scheme significantly reduces communication overhead from 60% to 80%, depending on the number of participating nodes. We also conduct comparative experiments on the defense against GAN attacks and membership inference attacks, proving that our method provides effective protection for data privacy.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"170 ","pages":"Article 103761"},"PeriodicalIF":4.4,"publicationDate":"2025-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143133753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2025-01-14DOI: 10.1016/j.adhoc.2025.103760
Sara Salim, Nour Moustafa, Benjamin Turnbull
{"title":"BFL-SC: A blockchain-enabled federated learning framework, with smart contracts, for securing social media-integrated internet of things systems","authors":"Sara Salim, Nour Moustafa, Benjamin Turnbull","doi":"10.1016/j.adhoc.2025.103760","DOIUrl":"10.1016/j.adhoc.2025.103760","url":null,"abstract":"<div><div>The integration of Social Media (SM) and the Internet of Things (IoT) is gradually transforming the activities of SM users into valuable data streams that can be analyzed using Machine Learning (ML) algorithms. Federated Learning (FL) has been widely employed to predict user and anomaly behaviors from distributed systems. However, FL encounters substantial security challenges, particularly within the context of SM-integrated IoT systems, known as SM 3.0 systems. These challenges encompass issues of accountability and vulnerabilities that render them susceptible to various cyberattacks, including single-point-of-failure, free-riding, model inversion, and poisoning attacks. We propose a Blockchain-enabled FL with Smart Contracts (SC) (BFL-SC) framework. To coordinate the learning process, track participants’ contributions and reward the participants transparently, an SC-based FL is constructed as an incentive mechanism that combats free-riding attacks and enables automated and auditable rewarding of the participants. Also, to conceal the original data points and mitigate the impact of model inversion attacks, a Differentially Privacy-based Perturbation (DPP) mechanism is proposed. To address potential poisoning attacks, a thorough verification protocol is suggested. The experimental results obtained from two datasets, namely SM 3.0 and Human Activity Recognition (HAR), show that the BFL-SC framework can achieve high utility with a precision of 96.95% over the SM 3.0 dataset and 90.14% over the HAR dataset while adhering to privacy and efficiency standards, compared with compelling techniques.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"169 ","pages":"Article 103760"},"PeriodicalIF":4.4,"publicationDate":"2025-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143137696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}