Ad Hoc NetworksPub Date : 2024-07-31DOI: 10.1016/j.adhoc.2024.103611
{"title":"RTTV-TCP: Adaptive congestion control algorithm based on RTT variations for mmWave networks","authors":"","doi":"10.1016/j.adhoc.2024.103611","DOIUrl":"10.1016/j.adhoc.2024.103611","url":null,"abstract":"<div><p>Internet applications such as video gaming virtual/ augmented reality necessitate efficient fifth-generation (5G) millimeter-wave (mmWave) cellular networks. The Transmission Control Protocol (TCP) is an essential protocol for network connectivity. However, TCP faces challenges in efficiently utilizing the available bandwidth of 5G mmWave cellular networks while maintaining low latency, mainly due to constraints like Non-Line of Sight (NLoS) conditions. This paper introduces Round-Trip-Time Variations-TCP (RTTV-TCP), enhancing TCP performance in 5G mmWave cellular networks. Simulation scenarios for a 5G mmWave cellular network have been conducted to evaluate RTTV-TCP’s performance, comparing it to legacy TCP variants such as NewReno, HighSpeed, CUBIC, Bottleneck Bandwidth and Round-trip propagation time (BBR), FB-TCP (Fuzzy Based-TCP). The results demonstrate that RTTV-TCP achieves higher average throughput than these TCP variants while maintaining the same level of delay in 5G mmWave cellular networks. RTTV-TCP outperforms NewReno and CUBIC by a very significant margin, demonstrating a 208% improvement compared to HighSpeed and a 6% increase compared to BBR protocol in the worst Packet Error Rate (PER) scenario and when the buffer size matches the Bandwidth Delay Product (BDP).</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141881787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2024-07-26DOI: 10.1016/j.adhoc.2024.103604
{"title":"CV POp-CoRN: The (smart) city-vehicle participatory-opportunistic cooperative route navigation system","authors":"","doi":"10.1016/j.adhoc.2024.103604","DOIUrl":"10.1016/j.adhoc.2024.103604","url":null,"abstract":"<div><p>The phenomenon of urbanization, characterized by the migration of people from rural to urban areas, has led to an expansion of existing urban challenges while introducing new ones. Among these, mobility is a primary concern due to its far-reaching impacts on personal health, safety, social, economic, and environmental aspects. Information and communication technologies (ICT) have been identified as effective solutions to address these issues, leveraging the Internet of Things (IoT) and smart city infrastructure. However, the mainstream approach in smart cities is characterized by a vertical-siloed pattern, addressing individual problems (mobility, pollution, energy management, healthcare, safety, and security) in isolation, without actively engaging citizens, people, and communities as stakeholders.</p><p>This paper proposes a paradigm shift towards a holistic, multilateral approach to address mobility, incorporating diverse perspectives, stakeholder needs, and problem-solving strategies. By integrating smart city infrastructure, smart vehicles, and personal devices, an all-encompassing solution is implemented through direct interaction and cooperation between these entities. The resulting City-Vehicle Participatory-Opportunistic Cooperative Route Navigation system (CV POp-CoRN) enables the enforcement of mobility policy trade-offs, reconciling city, vehicle, and people requirements across various domains, including safety, emergency response, traffic management, travel time optimization, vehicle maintenance, pollution mitigation, and special event management. The paper presents the CV POp-CoRN framework, comprising route navigation policies, a heuristics for trading them off, the system design and architecture, and a model for assessing and demonstrating the effectiveness of the proposed approach and the feasibility of the solution.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141843464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2024-07-26DOI: 10.1016/j.adhoc.2024.103609
{"title":"An in-depth assessment of the physical layer performance in the proposed B5G framework","authors":"","doi":"10.1016/j.adhoc.2024.103609","DOIUrl":"10.1016/j.adhoc.2024.103609","url":null,"abstract":"<div><p>The introduction of fifth-generation (5G) technology marks a significant milestone in next-generation networks, offering higher data rates and new services. Achieving optimal performance in 5G and beyond 5G (B5G) systems requires addressing key requirements like increased capacity, high efficiency, improved performance, low latency, support for many connections, and quality of service. It is well-known that suboptimal network configuration, hardware impairments, or malfunctioning components can degrade system performance. The physical layer of the radio access network, particularly channel estimation and synchronization, plays a crucial role. Hence, this paper offers an in-depth evaluation of the 5G Physical Downlink Shared Channel (PDSCH), along with its related channel models such as the Clustered Delay Line (CDL) and the Tapped Delay Line (TDL). This work assesses 5G network performance through practical and IA-based channel estimation and synchronization techniques, and anticipates numerologies for B5G networks. Extensive simulations leveraging the Matlab 5G New Radio (NR) toolbox assess standardized channel scenarios in both macro-urban and indoor environments, following configurations set by the 3rd Generation Partnership Project (3GPP). The numerical results offer valuable insights into achieving the maximum achievable throughput across various channel environments, including both line-of-sight (LoS) and non-line-of-sight (NLoS) conditions. The throughput comparisons are performed under assumptions of ideal, realistic, and convolutional neural networks (CNN)-based channel estimation with both perfect and realistic synchronization conditions. Importantly, the study pinpoints certain physical layer elements that have a pronounced impact on system performance, providing essential insights for devising effective strategies or refining CNN-based methods for forthcoming mobile B5G networks.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141849220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2024-07-25DOI: 10.1016/j.adhoc.2024.103608
{"title":"Resource and trajectory optimization for UAV-assisted MEC communication systems over unlicensed spectrum band","authors":"","doi":"10.1016/j.adhoc.2024.103608","DOIUrl":"10.1016/j.adhoc.2024.103608","url":null,"abstract":"<div><p>The <em>new radio unlicensed</em> (NR-U) technology is proposed by 3GPP to extend NR to the unlicensed spectrum because of the shortage of the licensed spectrum. Different from the ground and fixed communication equipment-based unlicensed spectrum access scheme, the <em>unmanned aerial vehicle</em> (UAV) mobile platform-based unlicensed spectrum access scheme is not only related to incumbent users but also its trajectory and resource allocation. Therefore, this paper proposes a hybrid unlicensed spectrum access scheme for the UAV-assisted unlicensed <em>mobile edge computing</em> (MEC) communication (UAUM) system, where each flight time slot of the UAV is divided into two parts: <em>power free</em> (PF) and <em>power controlled</em> (PC) stages. In the PF stage, the transmit power is only restrained by the unlicensed spectrum regulations, and thus the UAV can provide high-rate services for <em>real-time downlink users</em> (RDUs) and <em>uplink computing users</em> (UCUs). In the PC stage, the transmit power of the UAV is mainly restrained by the interference to WiFi devices, and thus UAV can be allowed to provide low-rate services for <em>non-realtime downlink users</em> (NDUs) without affecting WiFi users. Based on the proposed scheme, a multi-variable optimization problem regarding trajectory, bandwidth, transmit power, and duty cycle is formulated to maximize the total offloaded computing bits on the premise of ensuring the quality of experience of RDUs, NDUs, and WiFi users under the maximum energy budget. To solve this problem efficiently, we propose an iterative algorithm based on the block coordinate descent method and successive convex approximation technique to decompose the original problem into four optimization subproblems of trajectory, bandwidth, transmit power and duty cycle, which are then solved alternatively in an iterative manner. A large number of simulation results demonstrate that in terms of spectrum efficiency and total offloaded computing bits, the proposed algorithm outperforms other unlicensed spectrum access schemes and optimization algorithms. The other performances of the proposed algorithm are deeply evaluated to prove its effectiveness and feasibility.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141844128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2024-07-24DOI: 10.1016/j.adhoc.2024.103602
{"title":"Joint optimization of communication and mission performance for multi-UAV collaboration network: A multi-agent reinforcement learning method","authors":"","doi":"10.1016/j.adhoc.2024.103602","DOIUrl":"10.1016/j.adhoc.2024.103602","url":null,"abstract":"<div><p>In emergency rescue, target search and other mission scenarios with Unmanned Aerial Vehicles (UAVs), the Relay UAVs (RUs) and Mission UAVs (MUs) can collaborate to accomplish tasks in unknown environments. In this paper, we investigate the problem of trajectory planning and power control for the MU and RU collaboration. Firstly, considering the characteristics of multi-hop data transmission between the MU and Ground Control Station, a multi-UAV collaborative coverage model is designed. Meanwhile, a UAV control algorithm named MUTTO is proposed based on multi-agent reinforcement learning. In order to solve the problem of the unknown information about the number and locations of targets, the geographic coverage rate is used to replace the target coverage rate for decision making. Then, the reward functions of two types of UAVs are designed separately for the purpose of better cooperation. By simultaneously planning the trajectory and transmission power of the RU and MU, the mission target coverage rate and network transmission rate are maximized while the energy consumption of the UAV is minimized. Finally, numerical simulations results show that MUTTO can solve the UAV network control problem in an efficient way and has better performance than the benchmark method.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141840299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2024-07-23DOI: 10.1016/j.adhoc.2024.103606
{"title":"A smart contract-based 6G-enabled authentication scheme for securing Internet of Nano Medical Things network","authors":"","doi":"10.1016/j.adhoc.2024.103606","DOIUrl":"10.1016/j.adhoc.2024.103606","url":null,"abstract":"<div><p>Nanotechnology has recently emerged as a pivotal field with wide-ranging implications. Its integration into the 6G-enabled Internet of Things (IoT) has given rise to the 6G-enabled IoNT (Internet of Nano Things) paradigm, impacting sectors such as healthcare, industries, smart homes, aerospace, and defense. This technology offers opportunities to revolutionize existing methodologies and enhance efficiency. Research efforts are now focusing on developing secure, scalable network infrastructures tailored for the healthcare sector at the nanoscale, leading to the concept of the Internet of Nano Medical Things (IoNMT). However, the unique characteristics of nanotechnology pose security challenges, particularly concerning privacy, confidentiality, dependability, latency, and the expensive consequences of blockchain-based storage. Authentication and transparency are vital for ensuring secure data handling in IoNMT networks, necessitating a secure access mechanism resistant to unauthorized interference. To tackle these challenges, this study proposes a smart contract-based authentication protocol developed specifically for 6G-IoNMT networks. The framework aims to manage real-time information with minimal latency through decentralized peer-to-peer cloud servers while addressing security and privacy concerns. Thorough security and privacy assessments, including ROR model evaluations, Scyther tool analysis, and informal security evaluations, validate the protocol’s effectiveness. Moreover, the simulation highlights that this protocol offers superior security and efficiency as well as energy consumption compared to existing protocols.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141853704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2024-07-23DOI: 10.1016/j.adhoc.2024.103605
{"title":"Reinforcement learning-based charging cluster determination algorithm for optimal charger placement in wireless rechargeable sensor networks","authors":"","doi":"10.1016/j.adhoc.2024.103605","DOIUrl":"10.1016/j.adhoc.2024.103605","url":null,"abstract":"<div><p>Wireless power transfer (WPT) provides a promising technology for energy replenishment of wireless rechargeable sensor networks (WRSNs), where wireless chargers can be deployed at fixed locations for charging nodes simultaneously within their effective charging range. Optimal charger placement (OCP) for sustainable operations of WRSN with cheaper charging cost is a challenging and difficult problem due to its NP-completeness in nature. This paper proposes a novel reinforcement learning (RL) based approach for OCP, where the problem is firstly formulated as a charging cluster determination problem with a fixed clustering radius and then tackled by the reinforcement learning-based charging cluster determination (RL-CCD) algorithm. Specifically, nodes are coarsely clustered by the K-Means++ algorithm, with chargers placed at the cluster center. Meanwhile, RL is applied to explore the potential locations of the cluster centers to adjust the center locations and reduce the number of clusters, using the number of nodes in the cluster and the summation of distances between the cluster center and nodes as the reward. Moreover, an experience-strengthening mechanism is introduced to learn the current optimal charging experience. Extensive simulations show that RL-CCD significantly outperforms existing algorithms.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141842640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2024-07-22DOI: 10.1016/j.adhoc.2024.103607
{"title":"A novel integrated quantum-resistant cryptography for secure scientific data exchange in ad hoc networks","authors":"","doi":"10.1016/j.adhoc.2024.103607","DOIUrl":"10.1016/j.adhoc.2024.103607","url":null,"abstract":"<div><p>The fast advancement of quantum computing poses a substantial challenge to the privacy and security of critical scientific research data. This is because the standard cryptography methods, which have been proven effective in classical computers, are rendered less secure in the face of quantum computing approaches. Previously, numerous endeavors have been made to safeguard confidential information through the utilization of different standards and quantum cryptographic methods. However, there remains a research void with several challenges and limitations, including excessive computational burden, vulnerability to various attacks, and limited hardware compatibility for implementation. We propose a modern hybrid cryptographical approach to secure sensitive data from various attacks and vulnerabilities to address the existing limitations. The suggested standard integrates traditional cryptographic standards with quantum-resistant standards to boost sensitive scientific data privacy and security and address various classical cyber-attacks and critical quantum attacks. For the context of scientific data privacy and security, our work depicts a hybrid standard structure by performing a systematic exploration of current encipherment model challenges and issues such as the investigation of various susceptibilities of mathematical cryptographic models. In this work, we apply lattice-based coding as the outer layer and Advanced Encryption Standard (AES) as the inner layer to improve security and efficacy. The proposed security theorem launches the operational veracity of lattice-based coding in the face of quantum attacks, while a complete investigation of the proposed algorithm efficacy vitrines the enhanced security and scalability of the anticipated hybrid standard transversely diverse input sensitive data volumes. Furthermore, this proposed work offers the security confidence score of the hybrid model by the amalgamation of AES and lattice-based cryptography (LBC), hence guaranteeing strength next to both quantum and traditional computing weaknesses. The investigational results prove the improved efficiency of the proposed hybrid model in contrast to traditional and past quantum-resistant models.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141848909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2024-07-20DOI: 10.1016/j.adhoc.2024.103603
{"title":"Enabling Ultra Reliable Low Latency Communications in rural areas using UAV swarms","authors":"","doi":"10.1016/j.adhoc.2024.103603","DOIUrl":"10.1016/j.adhoc.2024.103603","url":null,"abstract":"<div><p>Latency is a critical aspect for a broad spectrum of applications that relies on the internet, such as, voice over IP (VoIP) or teleconferencing, and the lack of ultra-fast and highly reliable communications is prominent in rural areas even in mature economies. Our proposal focuses on optimizing the deployment of microservice-oriented architectures (MSA) in computing and routing enabled unmanned aerial vehicles (UAVs). For that matter, an information system which gathers all the information of the flying ad hoc network (FANET) is developed. From there, we propose multiple approaches, based on integer linear programming (ILP) and heuristics, to tackle the minimization of end-to-end latency by deploying multiple instances of microservices in the UAVs that are close to the users that make use of them. Extensive experiments based on network emulation prove the performance of our ILP formulation of the problem and address the optimality gap between the ILP-based approach and the heuristics ones, which are highly scalable and usable in real-time for large-scale scenarios.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1570870524002142/pdfft?md5=954d5bdc1eb5189baec918aa54fbcb74&pid=1-s2.0-S1570870524002142-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141849786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2024-07-19DOI: 10.1016/j.adhoc.2024.103601
{"title":"Inferring mobile applications usage from DNS traffic","authors":"","doi":"10.1016/j.adhoc.2024.103601","DOIUrl":"10.1016/j.adhoc.2024.103601","url":null,"abstract":"<div><p>In the digital era, our lives are intrinsically linked to the daily use of mobile applications. As a consequence, we generate and transmit a large amount of personal data that puts our privacy in danger. Despite having encrypted communications, the DNS traffic is usually not encrypted, and it is possible to extract valuable information from the traffic generated by mobile applications. This study focuses on the analysis of the DNS traffic behavior found in mobile application traces, developing a methodology capable of identifying mobile applications based on the domains they query. With this methodology, we were able to identify apps with 98% accuracy. Furthermore, we have validated the effectiveness of the characterization obtained with one dataset by identifying traces from other independent datasets. The evaluation showed that the methodology provides successful results in identifying mobile applications.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1570870524002129/pdfft?md5=b9892553e1c370ae53ebbd8a9ac2a96c&pid=1-s2.0-S1570870524002129-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141849779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}