AN ACTIVE-ROUTING AUTHENTICATION SCHEME IN MANET

 Mobile ad-hoc networks (MANET) is a network mode that does not depend on network infrastructure and central access. The fast and flexible networking mode of MANET renders its wide applications in specific scenarios. However, rapidly changing topology and open channels bring potential security problems. In this paper, we proposed an active-routing a...

Performance Analysis and Optimal Cooperative Cluster Size for Randomly Distributed Small Cells Under Cloud RAN

 One major advantage of cloud/centralized radio access network (C-RAN) is the ease of implementation of multicell coordination mechanisms to improve the system spectrum efficiency (SE). Theoretically, large number of cooperative cells lead to a higher SE, however, it may also cause significant delay due to extra channel state information (CSI) feedb...

AFFINITY PROPAGATION BASED SMART DATA ANALYTICS IN 5G NETWORK

 Network embedding assigns nodes in a network to low dimensional representations and effectively preserves the network structure. Recently, a significant amount of progresses have been made toward this emerging network analysis paradigm. In this survey, we focus on categorizing and then reviewing the current development on network embedding methods,...

WNOS Enabling Principled Software-Defined Wireless Networking

 This article investigates the basic design principles for a new Wireless Network Operating System (WNOS), a radically different approach to software-defined networking (SDN) for infrastructure-less wireless networks. Departing from well understood approaches inspired by Open Flow, WNOS provides the network designer with an abstraction hiding (i) th...

An Intelligent Transaction Migration Scheme for RAFT-based Private Blockchain in Internet of Things Applications

 The integration of multi-access edge computing (MEC) and RAFT consensus makes it feasible to deploy blockchain on trustful base stations and gateways to provide efficient and tamper-proof edge data services for Internet of Things (IoT) applications. However, reducing the latency of storing data on blockchain remains a challenge, especially when an ...

Structure-Free Broadcast Scheduling for Duty-Cycled Multihop Wireless Sensor Networks

 Broadcasting is an essential operation for the source node to disseminate the message to all other nodes in the network. Unfortunately, the problem of Minimum Latency Broadcast Scheduling (MLBS) in duty-cycled wireless networks is not well studied. In existing works, the construction of broadcast tree and the scheduling of transmissions are conduct...

Robust Linear Transceiver Designs for Vector Parameter Estimation in MIMO Wireless Sensor Networks under CSI Uncertainty

 This work conceives the robust linear transceivers for the estimation of an unknown vector parameter in a coherent multiple access channel (MAC)-based multiple-input multiple-output (MIMO) multi-sensor network under imperfect channel state information (CSI) at the fusion center (FC). Both the popular stochastic (S-) and norm ball CSI uncertainty (N...

Link Schedulers for Green Wireless Networks with Energy Sharing

 This paper considers wireless link scheduling in a new setting: nodes with Energy Harvesting (EH) as well as energy sharing capabilities. We propose a Mixed Integer Linear Program (MILP) to determine 1) the shortest link schedule, whereby active links in the same slot adhere to the physical interference model; 2) the optimal transmission power of a...

Exploiting an Optimal Delay-Collision Tradeoff in CSMA-Based High-Dense Wireless Systems

 A novel carrier sense multiple access strategy with collision avoidance (CSMA/CA) balancing contention probability and channel access time is proposed. The approach can be applied to any context where the computational simplicity of the MAC must be preferred to the complexity of the channel access strategy. Our MAC, called Delay-Collision CSMA (DC-...

An Incentive Mechanism for Federated Learning in Wireless Cellular network An Auction Approach

 Federated Learning (FL) is a distributed learning framework that can deal with the distributed issue in machine learning and still guarantee high learning performance. However, it is impractical that all users will sacrifice their resources to join the FL algorithm. This motivates us to study the incentive mechanism design for FL. In this paper, we...

A Multi-Cluster-based Distributed CDD Scheme for Asynchronous Joint Transmissions in Local and Private Wireless Networks

 In this paper, a multiple cluster-based transmission diversity scheme is proposed for asynchronous joint transmissions (JT) in private networks. The use of multiple clusters or small cells is adopted to reduce the transmission distance to users thereby increasing data-rates and reducing latency. To further increase the spectral efficiency and achie...

Wireless Shaded Pole Induction Motor with Half-bridge Inverter and Dual-Frequency Resonant Network

 This article presented a single-phase shaded-pole induction motor (SPIM) system, which aims to work in an isolated environment. Compared with the previous wireless SPIM, this system employs less controlled switches and can work at full-resonant condition, while retaining the merit of secondary controllerless. The key is to employ a half-bridge inve...

WiDir A Wireless-Enabled Directory Cache Coherence Protocol

 As the core count in shared-memory manycores keeps increasing, it is becoming increasingly harder to design cache-coherence protocols that deliver high performance without an inordinate increase in complexity and cost. In particular, sharing patterns where a group of cores frequently reads and writes a shared variable are hard to support efficientl...

Time Scheduling and Energy Trading for Heterogeneous Wireless-Powered and Backscattering-based IoT Networks

 This article studies the strategic interactions between an IoT service provider (IoTSP) which consists of heterogeneous IoT devices and its energy service provider (ESP). To that end, we propose an economic framework using the Stackelberg game to maximize the network throughput and energy efficiency of both the IoTSP and ESP. To obtain the Stackelb...

Robust Decentralized and Distributed Estimation of a Correlated Parameter Vector in MIMO-OFDM Wireless Sensor Networks

 An optimal precoder design is conceived for the decentralized estimation of an unknown spatially as well as temporally correlated parameter vector in a multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) based wireless sensor network (WSN). Furthermore, exploiting the temporal correlation present in the parameter...

Indirect Direct Learning Coverage Control for Wireless Sensor and Mobile Robot Networks

 This article proposes indirect/direct learning control schemes for wireless sensor and mobile robot networks to cover an environment according to the density function, which is the distribution of an important quantity within the environment. When stationary sensors cooperate with mobile robots, the density estimation can be enhanced by using nonst...

Deep Reinforcement Learning Based Resource Allocation in Cooperative UAV-Assisted Wireless Networks

 We consider the downlink of an unmanned aerial vehicle (UAV) assisted cellular network consisting of multiple cooperative UAVs, whose operations are coordinated by a central ground controller using wireless fronthaul links, to serve multiple ground user equipments (UEs). A problem of jointly designing UAVs’ positions, transmit beamforming, as well ...

Throughput Maximization of Wireless-Powered Communication Networks An Energy Threshold Approach

 In this paper, we consider a wireless-powered communication network (WPCN) where one mobile hybrid access point (HAP) coordinates the wireless energy transfer to sensor nodes and receives data from sensor nodes, which are powered exclusively by the harvested wireless energy. As the harvest-then-transmit protocol is employed by sensor nodes, a major...

Multihop Trust Evaluation using Memory integrity in Wireless Sensor Networks

 Research efforts in trust evaluation has evolved to provide security in Wireless Sensor Networks (WSNs), while being dependent on external parameters and network topology. Existing node level trust evaluation in WSNs evaluate trust over 1-hop assuring trustworthiness of an immediate node. This paper proposes trust evaluation using the intrinsic pro...

Lightweight Secure Localization Approach in Wireless Sensor Networks

 This paper is concerned with the security problem of Time of Arrival (ToA) based localization schemes in a wireless sensor network (WSN) with multiple attackers and this paper focuses on defending against external attacks, especially under cooperative external attackers. The prior scheme for defending against the attacks in the localization scheme ...

Hybrid Active Passive Wireless Network Aided by Intelligent Reflecting Surface System Modeling and Performance Analysis

 Intelligent reflecting surface (IRS) is a new and promising paradigm to substantially improve the spectral and energy efficiency of wireless networks, by constructing favorable communication channels via tuning massive low-cost passive reflecting elements. Despite recent advances in the link-level performance optimization for various IRS-aided wire...

Data-Driven Beam Management with Angular Domain Information for mmWave UAV Networks

 Unmanned aerial vehicles (UAVs) have extensive civilian and military applications, but establishing a UAV network providing high data rate communications with low delay is a challenge. Millimeter wave (mmWave), with its high bandwidth nature, can be adopted in the UAV network to achieve high speed data transfer. However, it is difficult to establis...

Actor-Critic Learning Based QoS-Aware Scheduler for Reconfigurable Wireless Networks

 The flexibility offered by reconfigurable wireless networks, provide new opportunities for various applications such as online AR/VR gaming, high-quality video streaming and autonomous vehicles, that desire high-bandwidth, reliable and low-latency communications. These applications come with very stringent Quality of Service (QoS) requirements and ...

Sustainable Wireless Sensor Networks with UAV-Enabled Wireless Power Transfer

 In this paper, we consider an unmanned aerial vehicle (UAV)-enabled wireless power transfer (WPT) network, where the UAV is responsible for sustaining the network with all devices on the ground. The sustainable charge process operates periodically, i.e., in each working period, the UAV flies from and back to a landing position. The initial remainin...

Rate-Adapted Decentralized Learning Over Wireless Networks

 This paper proposes a communication strategy for decentralized learning in wireless systems that employs adaptive modulation and coding capability. The main objective of this work is to address a critical issue in decentralized learning based on the cooperative stochastic gradient descent (C-SGD) over wireless systems: the relationship between the ...

Performance Evaluation of Symmetric Cryptographic Algorithms in resource constrained hardware for Wireless Sensor Networks

 Wireless sensor networks (WSN) allow to exchange information and to take immediate and remote actions in natural, industrial, military or domestic environment systems. These networks are vulnerable to cyber-attacks, hence, they are vulnerable to being intercepted, interrupted or modified. However, for the last twenty years, the amount of informatio...

Incorporating Wireless Communication Parameters Into the E-Model Algorithm

 Telecommunication service providers have to guarantee acceptable speech quality during a phone call to avoid a negative impact on the users' quality of experience. Currently, there are different speech quality assessment methods. ITU-T Recommendation G.107 describes the E-model algorithm, which is a computational model developed for network plannin...

Dynamic Computation Offloading in Ultra-Dense Networks based on Mean Field Games

 In ultra-dense networks, the increasing popularity of computation intensive applications imposes challenges to the resource-constrained smart mobile devices (SMDs), which may be solved by offloading these computation tasks to the nearby mobile edge computing centers. However, when massive SMDs offload computation tasks in a dynamic wireless environ...

Adaptive Streaming of 360 Videos with Perfect, Imperfect, and Unknown FoV Viewing Probabilities in Wireless Networks

 This paper investigates adaptive streaming of one or multiple tiled 360 videos from a multi-antenna base station (BS) to one or multiple single-antenna users, respectively, in a multi-carrier wireless system. We aim to maximize the video quality while keeping rebuffering time small via encoding rate adaptation at each group of pictures (GOP) and tr...

Multi-Agent Deep Reinforcement Learning Multiple Access for Heterogeneous Wireless Networks with Imperfect Channels

 This paper investigates a futuristic spectrum sharing paradigm for heterogeneous wireless networks with imperfect channels. In the heterogeneous networks, multiple wireless networks adopt different medium access control (MAC) protocols to share a common wireless spectrum and each network is unaware of the MACs of others. This paper aims to design a...

Wireless Energy Transfer in Extra-Large Massive MIMO Rician Channels

 In application scenarios such as Internet of Things, a large number of energy receivers (ERs) exist and line-of-sight (LOS) propagation could be common. Considering this, we investigate wireless energy transfer (WET) in extra-large massive MIMO Rician channels. We derive analytical expressions of the received net energy for different schemes, inclu...

Modeling and Detection of Flooding based Denial of Service Attacks in Wireless Ad Hoc Networks using Uncertain Reasoning

 Wireless Ad Hoc Networks are self-organizing networks deployed without any centralized infrastructure. Flooding based Denial-of-Service (DoS) attacks were targeting the constrained resources of mobile nodes as well as the network. Route Request (RREQ) flooding attack is one of the prominent DoS attacks launched from the network layer in which the a...

Distributed Resource Allocation for SWIPT-based Cognitive Ad-Hoc Networks

 Energy supplies, spectrum resources, and transmission overheads of wireless nodes are the bottlenecks in decentralized networks (e.g., device-to-device communication networks). In this paper, we study the total power minimization problem of secondary users (SUs) for a multiuser simultaneous wireless information and power transfer-based cognitive ad...

Covert Wireless Communication With Noise Uncertainty in Space-Air-Ground Integrated Vehicular Networks

 In this paper, we propose a covert wireless uplink transmission strategy in space-air-ground integrated vehicular networks, where the source vehicle transmits its own message over the channel that being used by the host communication system, to avoid being detected by the warden. It is obvious that the data transmission efficiency of the covert com...

Average Peak Age of Information Analysis for Wireless Powered Cooperative Networks

 Future of massive Internet-of-things (IoT) and low latency applications hinges on delivering fresh information on time. Thus, to analyse data freshness for time critical use cases in future networks, the age of information (AoI) measure is introduced. Besides, energy harvesting is also essential to improve energy sustainability and lifetime of a po...

UAV-Enabled Wireless Power Transfer A Tutorial Overview

 Unmanned aerial vehicle (UAV)-enabled wireless power transfer (WPT) has recently emerged as a promising technique to provide sustainable energy supply for widely distributed low-power ground devices (GDs) in large-scale wireless networks. Compared with the energy transmitters (ETs) in conventional WPT systems which are deployed at fixed locations, ...

Throughput-Delay Tradeoff in Coupled Queues in Wireless Networks Priority and Concurrent Transmissions Regimes

 This paper investigates the performance of a wireless network that consists of two pairs of transmitter-receiver sharing the same channel, modeled using two coupled queues. In this analysis, we use the power metric P , defined as the ratio of throughput and mean delay, to understand the compromise between these two metrics. We show that, when the u...

On the Power of Randomization for Scheduling Real-Time Traffic in Wireless Networks

 In this paper, we consider the problem of scheduling real-time traffic in wireless networks under a conflict-graph interference model and single-hop traffic. The objective is to guarantee that at least a certain fraction of packets of each link are delivered within their deadlines, which is referred to as delivery ratio . This problem has been stud...

Interference Prediction in Wireless Networks Stochastic Geometry Meets Recursive Filtering

 This article proposes and evaluates a technique to predict the level of interference in wireless networks. We design a recursive predictor that estimates future interference values by filtering measured interference at a given location. The predictor’s parameterization is done offline by translating the autocorrelation of interference into an autor...

Energy-Efficient Wireless Communications with Distributed Reconfigurable Intelligent Surfaces

 This paper investigates the problem of resource allocation for a wireless communication network with distributed reconfigurable intelligent surfaces (RISs). In this network, multiple RISs are spatially distributed to serve wireless users and the energy efficiency of the network is maximized by dynamically controlling the on-off status of each RIS a...

Association and Caching in Relay-Assisted mm Wave Networks From A Stochastic Geometry Perspective

 Limited backhaul bandwidth and blockage effects are two main factors limiting the practical deployment of millimeter wave (mmWave) networks. To tackle these issues, we study the feasibility of relaying as well as caching in mmWave networks. A user association and relaying (UAR) criterion dependent on both caching status and maximum biased received ...

Distributed Adaptive Signal Estimation in Wireless Sensor Networks with Partial Prior Knowledge of the Desired Sources Steering Matrix

 In the past two decades, wireless sensor networks (WSNs) and their applications have been the topic of many studies. Different multi-sensor nodes are used to collect, process and distribute data over wireless links to perform different tasks such as smart detection, target tracking, node localization, etc. In this article, the problem of distribute...

Performance Analysis of Clustered Wireless-Powered Ad Hoc Networks via ß-Ginibre Point Processes

 We consider a wireless-powered ad hoc network with clustered Power Beacons (PBs). The wireless-powered transmitters (WP-Txs) only activate stochastically deployed PBs within the circles centered at their locations. The PBs transmit radio frequency (RF) signals, which are harvested by the WP-Txs to transmit information to their target receivers. The...

On-Request Wireless Charging and Partial Computation Offloading In Multi-Access Edge Computing Systems

 Wireless charging coupled with computation offloading in edge networks offers a promising solution for realizing power-hungry and computation intensive applications on user-devices. We consider a multi-access edge computing (MEC) system with collocated MEC server and base-station/access point (AP), each equipped with a massive MIMO antenna array, s...

Joint Resource Allocation and Trajectory Optimization with QoS in UAV-based NOMA Wireless Networks

 Replacing base stations with unmanned aerial vehicles (UAVs) to serve the communication of ground users has attracted a lot of attention recently. In this paper, we study the joint resource allocation and UAV trajectory optimization for maximizing the total energy efficiency in UAV-based non-orthogonal multiple access (NOMA) downlink wireless netwo...

Design and Analysis of Coded Caching Schemes in Stochastic Wireless Networks

 Coded caching is a technique that promises significant reductions in network traffic by exploiting the multicast opportunities among multiple cache-enabled users. Most works in this area investigate the fundamental performance limits of coded caching from an information-theoretic perspective. In this paper, from a practical perspective, we focus on...

A 193-nW Wake-Up Receiver Achieving -84.5-dBm Sensitivity For Green Wireless Communications

 This paper presents a cost-effective, ultra-low-power and highly sensitive wake-up receiver (WuRX) to reduce overall power consumption of Wireless Sensor Networks (WSN). The proposed tuned radio frequency (TRF) receiver (RX) analogue front-end (AFE) incorporates a 400-MHz, low-power, low-noise amplifier (LNA) with a high voltage gain of 50 dB as we...

Space-Air-Ground Integrated Multi-Domain Network Resource Orchestration Based on Virtual Network Architecture A DRL Method

 Traditional ground wireless communication networks cannot provide high-quality services for artificial intelligence (AI) applications such as intelligent transportation systems (ITS) due to deployment, coverage and capacity issues. The space-air-ground integrated network (SAGIN) has become a research focus in the industry. Compared with traditional...

Quantum Neural Networks for Resource Allocation in Wireless Communications

 This study exploits a quantum neural network (QNN) for resource allocation in wireless communications. A QNN is presented to reduce time complexity while still maintaining performance. Moreover, a reinforcement-learning-inspired QNN (RL-QNN) is presented to improve the performance. Quantum circuit design of the QNN is presented to ensure the practi...

Interference-Aware NFV-enabled Multicast Service in Resource-Constrained Wireless Mesh Networks

 Network Function Virtualization is a key technology that enables network operators to provide diverse communication services flexibly over a common infrastructure, resulting in a significantly reduced cost. This paper addresses the problem of optimal network function virtualization for providing multicast services in wireless mesh networks with min...

Experimental Evaluations of Malicious Node Detection on Wireless Sensor Network Environment

 In this modern era, each and every individual needs to utilize the communication medium for sending and receiving the respective data between source and destination entities. A Wireless Sensor Network (WSN) environments provide such facility to clients to perform a successful and range free communication between source and destination. This paper u...

Coordinated 5G Network Slicing How Constructive Interference Can Boost Network Throughput

 Radio access network (RAN) slicing is a virtualization technology that partitions radio resources into multiple autonomous virtual networks. Since RAN slicing can be tailored to provide diverse performance requirements, it will be pivotal to achieve the high-throughput and low-latency communications that next-generation (5G) systems have long yearn...

AI-Assisted Energy-Efficient and Intelligent Routing for Reconfigurable Wireless Networks

 Intelligent network management for reconfigurable wireless networks such as 5G and beyond applications is crucial for many industrial applications, and has been the subject of ongoing research. This paper proposes an Artificial Intelligence(AI)-Assisted energy-efficient and intelligent routing, based on both energy efficiency prioritization and AI ...

Timestamp-Free Clock Parameters Tracking Using Extended Kalman Filtering in Wireless Sensor Networks

 Clock synchronization is crucial for applications in wireless sensor networks, such as event scheduling and data fusion. In practical wireless networks, environmental changes cause the oscillator to be imperfect. Thus, it is necessary to track the nonlinear varying clock dynamically. In this paper, we propose a timestamp-free clock skew (frequency ...

ReNEW A Practical Module For Reliable Routing in Networks of Energy-harvesting Wireless Sensors

 Many Internet of Things smart-* applications are being powered solely through ambient energy-harvested energy. These applications require periodic data collection with low latency and high reliability. Since the energy is harvested in small amounts from ambient sources and is stochastic in nature, it is extremely challenging to achieve low latency ...

Mega Satellite Constellation System Optimization From Network Control Structure Perspective

 The network control plays a vital role in the mega satellite constellation (MSC) to coordinate massive network nodes to ensure the effectiveness and reliability of operations and services for future space wireless communications networks. One of the critical issues in satellite network control is how to design an optimal network control structure (...

Improved Deep Convolutional Neural Network based Malicious Node Detection and Energy-Efficient Data Transmission in Wireless Sensor Networks

 Wireless Sensors Networks (WSN) is the self-configured wireless network which consists of a huge measure of resource-restrained Sensor Nodes (SN). In WSN, the key parameters are effectual energy utilization and security. The adversary could send false information because of the Malicious Nodes' (MNs') presence. Thus, to shun security threats, it is...

Energy-Efficient Secure Video Streaming in UAV-Enabled Wireless Networks A Safe-DQN Approach

 Unmanned aerial vehicles (UAVs) are anticipated to be integrated into the next generation wireless networks as new aerial mobile nodes, which can provide various live streaming applications such as surveillance, reconnaissance, etc. For such applications, due to the dynamic characteristics of traffic and wireless channels, how to guarantee the qual...

Block Access Control in Wireless Blockchain Network Design, Modeling and Analysis

 Wireless blockchain network is proposed to enable a decentralized and safe wireless networks for various blockchain applications. To achieve blockchain consensus in wireless network, one of the important steps is to broadcast new block using wireless channel. Under wireless network protocols, the block transmitting will be affected significantly. I...

wChain A Fast Fault-Tolerant Blockchain Protocol for Multihop Wireless Networks

 This paper presents wChain, a blockchain protocol specifically designed for multihop wireless networks that deeply integrates wireless communication properties and blockchain technologies under the realistic SINR model. We adopt a hierarchical spanner as the communication backbone to address medium contention and achieve fast data aggregation withi...

Throughput-Optimal Broadcast for Time-Varying Directed Acyclic Wireless Multi-hop Networks with Energy Harvesting Constraints

 In wireless multi-hop networks, a fundamental problem is to disseminate continuous data traffic from a source node to all other network nodes, which is known as the broadcast problem. Such a problem becomes even more complicated in wireless multi-hop networks with energy-harvesting capabilities at nodes when facing the interaction between stochasti...

Learning Autonomy in Management of Wireless Random Networks

 This paper presents a machine learning strategy that tackles a distributed optimization task in a wireless network with an arbitrary number of randomly interconnected nodes. Individual nodes decide their optimal states with distributed coordination among other nodes through randomly varying backhaul links. This poses a technical challenge in distri...

Integrated Inter-Tower Wireless Communications Network for Terrestrial Broadcasting and Multicasting Systems

 This paper describes systems, devices, and methods to implement a bi-directional integrated inter-tower wireless communications network (IITWCN). The described technology can be implemented in combination with the Broadcast Core Network (BCN) in next generation broadcast eco-system and, therefore, support new business cases for broadcast operators ...

Performance Analysis of Millimeter Wave Wireless Power Transfer With Imperfect Beam Alignment

 In this paper, the impact of imperfect beam alignment (IBA) on millimeter wave (mmWave) wireless power transfer (WPT) is investigated. We consider a mmWave WPT network, where the location of the energy transmitters follows a Poisson point process. Instead of the mostly used flat-top antenna model, we adopt the Gaussian antenna model suggested by th...

Beyond RSS A PRR and SNR Aided Localization System for Transceiver-free Target in Sparse Wireless Networks

 Nowadays transceiver-free (also referred to as device-free) localization using Received Signal Strength (RSS) is a hot topic for researchers due to its widespread applicability. However, RSS is easily affected by the indoor environment, resulting in a dense deployment of reference nodes. Some hybrid systems have already been proposed to help RSS lo...

Automated Alignment with Respect to a Moving Inductive Wireless Charger

 Wireless charging is an attractive technology that often promises increased mobility for electrical devices. However, commonly-available wireless charging systems are generally intolerant to misalignment between the charger and the receiving device due to the need for inductive coupling between the two, defeating the promise of mobility. Many techn...

Joint Design of Communication, Wireless Energy Transfer, and Control for Swarm Autonomous Underwater Vehicles

 A swarm of Autonomous Underwater Vehicles (AUVs) can provide richer spatial-temporal information than the traditional single-robot system, which can be used for underwater mapping, exploration, target tracking, among others. However, the limitation of AUVs’ battery cannot support persistent services, which restricts AUVs’ operating range and missio...

Transfer Learning Promotes 6G Wireless Communications Recent Advances and Future Challenges

 In the coming 6G communications, network densification, high throughput, positioning accuracy, energy efficiency, and many other key performance indicator requirements are becoming increasingly strict. In the future, how to improve work efficiency while saving costs is one of the foremost research directions in wireless communications. Being able t...

Friend-as-Learner Socially-Driven Trustworthy and Efficient Wireless Federated Edge Learning

 Recently, wireless edge networks have realized intelligent operation and management with edge artificial intelligence (AI) techniques (i.e., federated edge learning). However, the trustworthiness and effective incentive mechanisms of federated edge learning (FEL) have not been fully studied. Thus, the current FEL framework will still suffer untrust...

Convergence of Update Aware Device Scheduling for Federated Learning at the Wireless Edge

 We study federated learning (FL) at the wireless edge, where power-limited devices with local datasets collaboratively train a joint model with the help of a remote parameter server (PS). We assume that the devices are connected to the PS through a bandwidth-limited shared wireless channel. At each iteration of FL, a subset of the devices are sched...

Compressed Sensing based Low-Power Multi-view Video Coding and Transmission in Wireless Multi-path Multi-hop Networks

 Wireless Multimedia Sensor Network (WMSN) is increasingly being deployed for surveillance, monitoring and Internet-of-Things (IoT) sensing applications where a set of cameras capture and compress local images and then transmit the data to a remote controller. Such captured local images may also be compressed in a multi-view fashion to reduce the re...

A 197.1-µW Wireless Sensor SoC With an Energy-Efficient Analog Front-End and a Harmonic Injection-Locked OOK TX

 This paper presents an integrated ultra-low-power (ULP) wireless sensor system-on-chip (SoC) that can be used for voltage sensing in both Internet of Things applications and bio-potential monitoring. In order to increase the energy efficiency of the analog front-end (AFE), we propose a noise and power efficient push-pull low noise instrumentation a...

Sum-Rate Maximization of Wireless Powered Primary Users for Cooperative CRNs NOMA or TDMA at Cognitive Users

 Recently, wireless powered cooperative cognitive radio networks (CRNs), which combine the technologies of radio frequency (RF) energy harvesting and CR, have drawn great attention. In such networks, energy cooperation between the cognitive users (CUs) and the wireless powered primary users (PUs) can be performed, where the CUs can charge the PUs wi...

Strategic Topological Formation for Wireless Control Systems

 The excessive use of nodes and communication links in a wireless control system (WCS) causes unnecessary utilization of resources. In this article, a strategic topological formation is studied for a WCS, where a previously proposed topology consisting of a plant system, a controller system, and an intermediate network system is further developed. M...

Quantum Learning Enabled Green Communication for Next Generation Wireless Systems

 Next generation wireless systems have witnessed significant R&D attention from academia and industries to enable wide range of applications for connected environment around us. The technical design of next generation wireless systems in terms of relay and transmit power control is very critical due to the ever-reducing size of these sensor enabled ...

Max-Consensus Over Fading Wireless Channels

 This paper deals with the problem of achieving finite-time max-consensus in a multi-agent system that communicates over a fading wireless channel. A key feature of the wireless channel is the superposition (or broadcast) property. In traditional wireless communication systems, the superposition property is usually undesired since it might cause int...

Intelligent Reflecting Surface Aided Wireless Communications A Tutorial

 Intelligent reflecting surface (IRS) is an enabling technology to engineer the radio signal propagation in wireless networks. By smartly tuning the signal reflection via a large number of low-cost passive reflecting elements, IRS is capable of dynamically altering wireless channels to enhance the communication performance. It is thus expected that ...

Charge-Then-Cooperate Secure Resource Allocation for Wireless-Powered Relay Networks with Wireless Energy Transfer

 This correspondence studies resource allocation for a wireless-powered relay network, where a hybrid relay with constant energy supply assists an energy-constrained source to send confidential information to a destination in the presence of an eavesdropper. We propose a novel transmission protocol termed charge-then-cooperate to support secure comm...

OMUS Efficient Opportunistic Routing in Multi-Modal Underwater Sensor Networks

 Underwater wireless sensor networks (UWSNs) have emerged as an enabling technology for aquatic monitoring. However, data delivery in UWSNs is challenging, due to the harsh aquatic environment and characteristics of the underwater acoustic channel. In recent years, underwater nodes with multi-modal communication capabilities have been proposed to cr...

Hybrid Optimization Model for Multi-Hop Protocol of Linear Railway Disaster Wireless Monitoring Networks

 The multi-hop protocols are proved effective in the railway disaster wireless monitoring system. However, farther transmission distance with the larger data will decline the valid lifetime and reliability of the system. Most existing studies focused primarily on the communication protocols optimization, and some works tried to utilize the limited c...

Geometric Algorithm for Finding Time-Sensitive Data Gathering Path in Energy Harvesting Sensor Networks

 To perform large-scale monitoring of sensitive events, energy harvesting wireless sensor network is considered where a mobile data sink MS collects data while travelling on a fixed path Pms. The sensor nodes sense environmental data continuously at a pre-specified rate. The sensors close to Pms are referred as gateways. Sensors forward their data t...

Distributed Detection of Minimum Cuts in Wireless Multi-hop Networks

 Communicating over multi-hop connections simplifies the establishment of wireless multi-hop networks but brings new challenges such as limited reliability, bottlenecks, and weak connections. The minimum cut of a graph is the smallest subset of edges whose removal disconnects some nodes from the others. Finding minimum cuts of a wireless multi-hop n...

Continuous Maneuver Control and Data Capture Scheduling of Autonomous Drone in Wireless Sensor Networks

 Thanks to flexible deployment and excellent maneuverability, autonomous drones are regarded as an effective means to enable aerial data capture in large-scale wireless sensor networks with limited to no cellular infrastructure, e.g., smart farming in a remote area. A key challenge in drone-assisted sensor networks is that the autonomous drone's man...

Adaptive Configuration of Service-Based Smart Sensors in Edge Networks

 Edge computing promises to facilitate the collaboration of smart sensors at the network edge, in order to satisfying the delay constraints of certain requests, and decreasing the transmission of large-volume sensory data from the edge to the cloud. Generally, the functionalities provided by smart sensors are encapsulated as services, and the satisf...

Tuatara Location-driven Power-adaptive Communication for Wireless Body Area Networks

 Radio links in Wireless Body Area Networks (WBANs) suffer from both short-term and long-term variations due to the dynamic network topology and frequent blockage caused by body movements, making it challenging to achieve reliable, energy-efficient and real-time data communication. Through experiments with TelosB motes, we observe a strong positive ...

Structure-Free General Data Aggregation Scheduling for Multihop Battery-Free Wireless Networks

 With advances in wireless power transfer techniques, Battery-Free Wireless Sensor Networks (BF-WSNs) which can support long-term applications, has been attracting increasing interests in recent years. Unfortunately, the problem of Minimum Latency Aggregation Scheduling (MLAS) is not well studied in BF-WSNs. Existing works always have a rigid assump...

Intelligent Reflecting Surface Assisted Wireless Powered Sensor Networks for Internet of Things

 This paper studies an intelligent reflecting surface (IRS) aided wireless powered sensor network (WPSN). Specifically, a power station (PS) provides wireless energy to multiple internet of thing (IoT) devices which supports them to deliver their own messages to an access point (AP). Moreover, we deploy an IRS to enhance the performance of the WPSN ...

Distributed Byzantine-Resilient Multiple-Message Dissemination in Wireless Networks

 The byzantine model is widely used to depict a variety of node faults in networks. Previous studies on byzantine-resilient protocols in wireless networks assume reliable communications and do not consider the jamming behavior of byzantine nodes. Such jamming, however, is a very critical and realistic behavior to be considered in modern wireless net...

Data-driven sensor scheduling for remote estimation in wireless networks

 Sensor scheduling is a well studied problem in signal processing and control with numerous applications. Despite its successful history, most of the related literature assumes the knowledge of the underlying probabilistic model of the sensor measurements such as the correlation structure or the entire joint probability density function. Herein, a f...

A Load-Balanced Re-embedding Scheme for Wireless Network Virtualization

 In wireless network virtualization processes, load imbalance in substrate nodes and substrate links may significantly reduce the number of virtual network requests served by a substrate network. In addition, load imbalance also impairs resource utilization and increases embedding cost of the virtual networks. To tackle these issues, this work propo...

Wireless Performance Evaluation of Building Layouts Closed-Form Computation of Figures of Merit

 This paper presents a part of our ground-breaking work on evaluation of buildings in terms of wireless friendliness at the building-design stage. The main goal is to devise building design practices that provide for a good performance of wireless networks deployed in buildings. In this paper, the interference gain (IG) and power gain (PG) are defin...

Scalable Service-Driven Database-Enabled Wireless Network Virtualization for Robust RF Sharing

 Wireless virtualization has emerged as one of the efficient ways to overcome numerous wireless networking challenges such as RF resource sharing. RF spectrum sharing in wireless networks focuses on increasing the usage efficiency of radio frequency (RF) spectrum with its increasing demand. To reduce uncertainties that accompany the spectrum sharing...

Quality of Service Based Minimal Latency Routing for Wireless Networks

 Minimized and nearly deterministic end-to-end latency facilitates real-time data acquisition and actuator control. In addition, defined latency is an integral part of quality oriented service in order to get closer to the reliability of wired networks and at the same time take advantage of wireless networking. This paper introduces a QoS routing pr...

Predictive Boundary Tracking based on Motion Behavior Learning for Continuous Objects in Industrial Wireless Sensor Networks

 The diffusion of toxic gas, biochemical material, and radio-active contamination, known as continuous objects, endangers the safe production of petrochemical and nuclear industry. Industrial wireless sensor networks are a new paradigm, which shows great potential in monitoring evolving hazardous phenomena in unfriendly industrial field. To prolong ...

ARES: Reliable and Sustainable Edge Provisioning for Wireless Sensor Networks

 Wireless sensor networks have wide applications in monitoring applications. However, sensors' energy and processing power constraints, as well as the limited network bandwidth, constitute significant obstacles to near-real-time requirements of modern IoT applications. Offloading sensor data on an edge computing infrastructure instead of in-cloud or...

A Robust Tracking Algorithm Based on Modified Generalized Probability Data As-sociation for Wireless Sensor Network

 Wireless sensor network (WSN) is composed of many micro sensor nodes, and the localization technology is one of the most important applications of WSN technology. At present, many positioning algorithms have high position-ing accuracy in line-of-sight (LOS) environment, but poor positioning accuracy in non-line-of-sight (NLOS) environ-ment. In this...

Indirect Direct Learning Coverage Control for Wireless Sensor and Mobile Robot Networks

 This article proposes indirect/direct learning control schemes for wireless sensor and mobile robot networks to cover an environment according to the density function, which is the distribution of an important quantity within the environment. When stationary sensors cooperate with mobile robots, the density estimation can be enhanced by using nonst...

NISA Node Identification and Spoofing Attack Detection Based on Clock Features and Radio Information for Wireless Sensor Networks

 Node identification based on unique hardware features like clock skews has been considered an efficient technique in wireless sensors networks (WSNs). Spoofing attacks imitating unique hardware features, however, could significantly impair or break down conventional clock-skew-based node identification due to exposed clock information through broad...

Indirect Direct Learning Coverage Control for Wireless Sensor and Mobile Robot Networks

 This article proposes indirect/direct learning control schemes for wireless sensor and mobile robot networks to cover an environment according to the density function, which is the distribution of an important quantity within the environment. When stationary sensors cooperate with mobile robots, the density estimation can be enhanced by using nonst...

Fuzzy Rule Generation using Modified PSO for Clustering in Wireless Sensor Networks

 Clustering is one of the popular methods for improving energy efficiency in wireless sensor networks. In most of the existing fuzzy approaches, the CHs are selected first, and then clusters are generated, but this may lead to uneven distribution of the sensor nodes in the clusters. In this article, the clusters are generated using the famous Fuzzy ...

Frobenius Norm-based Unbiased FIR Fusion Filtering for Wireless Sensor Networks

 This article presents a new approach to designing the Frobenius norm-based weighted unbiased finite impulse response (FIR) fusion filter for wireless sensor networks. The weighted Frobenius norm is employed as a cost function to design a local unbiased FIR filter. The design problem is converted into a constrained optimization problem subject to an...

Early Wake-up Ahead Node for Fast Code Dissemination in Wireless Sensor Networks

 With the development of sensor-clouds, the traditional WSN is expanded and the computing capacity is greatly improved. However, there are still challenges to be solved in sensor-clouds, such as how to disseminate codes to all nodes in a fast and energy-saving way. In this paper, an early wake-up ahead (EWA) code dissemination scheme is proposed to ...

Cooperative Wireless Power Transfer for Lifetime Maximization in Wireless Multihop Networks

 To extend the lifetime of wireless multihop networks suffering from energy scarcity of constituent nodes, we apply a wireless power transfer (WPT) technology to multihop transmission and allow the nodes with substantial energy to perform WPT to energy-deprived nodes in a cooperative way. We construct a system model for this cooperative WPT (CoWPT)-...

Multicarrier Approaches for High-baudrate Optical-Fiber Transmission Systems with a Single Coherent Receiver

 In this paper, we show the remarkable timing error (TE) and residual chromatic dispersion (CD) tolerance improvements of the filter bank multicarrier (FBMC) over orthogonal frequency division multiplexing (OFDM) for high-baudrate spectral slicing transmitter and single coherent receiver transmissions. For a 512 Gb/s 16 quadrature amplitude modulate...

Phishing Web Sites Features Classification Based on Extreme Learning Machine

  Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trust worth entity in an electronic communication there are several different techniques to control phishing, including legislation and technology created specifically to protect against phishing. This project provide...

A Fiber-Wireless Sensor Networks QoS Mechanism for Smart Grid Applications

 Smart grid applications, such as teleportation, synchrophasors, remote condition monitoring, and control of assets, require timely and reliable data communication systems. Many communication architectures and solutions have been proposed to provide support for these smart grid applications, including ber networks, wireless mobile networks, wireless...

The concept of 2 layer routing for wireless 5g networks and beyond

 In this paper, the concept o 2-Layer routing for wireless 5G networks is presented. New fifth generations of the network along with the platform known asthe Internet of Things (IoT) are an upcoming trend not only in the commercial market but also in the research area. The 5G networks and IoT will be part of smart homes, smart cities and every aspec...

Unified and Automated Fault Management Platform for Optical Networks

 A united and automated fault management platform for heterogeneous optical networks is quite important for telecom operators to monitor and respond to various levels of network events. In this demo, we are demonstrating the details of the design, implementation and evaluation of the proposed Optical router platform while targeting to manage the und...

Reliable Data Transmission Model for Mobile Ad Hoc Network Using Sign cryption Technique

 In recent years, the need for high security with reliability in the wireless network has tremendously been increased. To provide high security in reliable networks, mobile ad hoc net-works (MANETs) play a top role, like open network boundary, distributed network, and fast and quick implementation. By expanding the technology, the MANET faces a numb...

Intelligent Cache Pollution Attacks Detection for Edge Computing Enabled Mobile Social Networks

 With the rapid advances of wireless technologies and popularization of smart mobile devices, edge-enabled mobile social networks (MSNs) have emerged as a promising network paradigm for mobile users to deliver, share, and exchange contents with each other. By leveraging edge caching technology, various content services can be provided to mobile user...

A Survey of Millimeter Wave (mmWave) Communications for 5G: Opportunities and Challenges

 With the explosive growth of mobile data demand, the fifth generation (5G) mobile network would exploit the enormous amount of spectrum in the millimeter wave (mmWave) bands to greatly increase communication capacity. There are fundamental differences between mmWave communications and existing other communication systems, in terms of high propagati...

A fuzzy C means and hierarchical voting based RSSII quantity localization method for wireless sensor network

 With the rapid development of communication technology in recent years, Wireless Sensor Network (WSN) has become a promising research project. WSN is widely applied in a number of fields such as military, environmental monitoring, space exploration and so on. The non-line-of-sight (NLOS) localization is one of the most essential techniques for WSN....

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Mail us : info@nibode.com