查看更多>>摘要:In today's scenario, underwater wireless sensor network (UWSN) has raised as a most famous research areas for the researchers due to its advancement in the real world. In UWSNs, the sensor nodes sense the environment, and then this sensed information is conveyed to one of the sink node and finally to the base station for processing. It is a known fact that nearly about 70% of the total earth surface is filled with the water. It is difficult for the humans to get the valuable information from the seabed. Major applications of UWSN are marine surveillance, sea monitoring, deep sea archaeology, oil monitoring etc. Major goal of this work is to provide the broad survey of underwater sensor networks with its application, deployment techniques and routing algorithms. This study also provides a comparative analysis of the deployment techniques and routing algorithms that will aid the researchers to find the research gaps in the deployment and routing techniques. Moreover, some of the UWSN applications also reviewed, which provides varied and valuable information about the UWSN approach. This study presents an overview about the conventional technologies of UWSN and its major focus is to present the significant research approaches towards the UWSNs' applications, deployment techniques, and routing process.
查看更多>>摘要:Timing estimation is the most crucial part of the modulation classification and demodulation of burst signals. The traditional methods in classical cooperative communication fail to provide satisfying accuracy in non-cooperative communication. A novel timing estimation method was proposed in this study, which involves a carefully designed optimisation function constituted by piecewise over code period. Moreover, a closed-form analytical solution of the proposed optimisation problem has been provided, which significantly increases the estimation performance with affordable complexity. In detail, the proposed method demonstrates almost five times higher accuracy than the traditional methods in the low signal-to-noise ratio (SNR) scenario, while approaches the modified Cramer-Rao bound in the high SNR scenario.
查看更多>>摘要:Since the analysis of cell coverage faces complex environments in unmanned aerial vehicle base station (UAV-BS) systems, general coverage probability in a typical cell is derived to analyse a UAV-BS multi-tier network, and this coverage probability is closely related with power difference among UAV-BSs, two-dimension (2D) and three-dimension (3D) UAV-BS deployment, and general interference fading models. Especially, closed-form coverage probability expressions are also derived in the form of 2D scenario and 3D scenario, when the interference fading coefficient is assumed to follow a Gamma distribution and an exponential distribution, respectively. It shows that there exists maximum spectral efficiency density (SED) as the BS density increases, and such a BS density achieving the max-SED is independent of noise power, but is affected by various propagation parameters.
Forghani, PouyanKoochak Shooshtari, MasoumehAref, Mohammad Reza
2889-2897页
查看更多>>摘要:Code-based digital signatures suffer from two main drawbacks: large public key size and slow signature generation. Large public key size is inherent in almost all the code-based cryptosystems and other post-quantum alternatives; however, slow signature generation is due to their specific structure. Most of the current code-based signature schemes are constructed based on Courtois, Finiasz, and Sendrier (CFS) signature. CFS uses a counter to produce decodable syndromes or the complete decoding technique that imposes some extra computational cost to the signing algorithm for many choices of codes. In this study, the authors propose an efficient digital signature, PolarSig, which can reduce both public key size and signing time simultaneously. PolarSig uses some specific instances of polar codes that enable us to decode every random syndrome. Moreover, they apply puncturing and randomised omitting of frozen bits to protect the authors' scheme from commonplace attacks targeting former cryptosystems based on polar codes. Besides, they prove that their signature is existentially unforgeable under a chosen message attack secure in the random oracle model.
查看更多>>摘要:In this study, the authors propose a generalised switching protocol (GSP) for increasing the flexibility of energy harvesting (EH) protocol and enhancing the security of amplify-and-forward (AF) multi-antenna relaying system. The proposed GSP-based relaying [generalised switching relaying (GSR)] system is established with target node assisted interference and EH technologies. In phase I, while the source transmits certain signal to the relay, the destination transmits an artificial noise to interfere the passive eavesdropper. In this phase, the relay harvests energy from the two nodes. In phase II, the relay node processes the two different received signals, which are from the source and destination, then AF them by utilising the harvested energy. The authors also derive a new analytical formula for the proposed protocol on ergodic secrecy capacity. The effect of the number of relay antennas N, the source transmitted power P-s, the destination transmitted power P-d and EH efficiency factors eta(t) and eta(p) on ergodic secrecy capacity are investigated. The simulation results show that as N, P-s, P-d, eta(t) and eta(p) increase, the ergodic secrecy capacity of GSR system increases accordingly. Moreover, the GSR protocol can provide higher ergodic secrecy capacity than both time switching relaying and power splitting relaying protocols.
查看更多>>摘要:With the development of 5G network and big data and the popularity of mobile intelligent devices, the opportunistic social network has been further developed. At present, several existing routing algorithms based on node similarity use the context information of the node to select the best relay node. However, most opportunistic social algorithms only consider the social properties of nodes and ignore the importance of the similarity of the moving trajectories of the nodes. The transmission opportunity of messages in the opportunity social network is generated by the movement of the nodes, so this feature must betaken into account in the designing of the routing algorithm. Therefore, this study proposes a routing algorithm based on the triangular fuzzy layer model and multi-layer clustering for the opportunistic social network. In this study, the authors use the fuzzy analytic hierarchy process model to analyse the social similarity and trajectory similarity to determine the best message transmission node. This study compares the other four opportunistic social network routing algorithms in the simulation environment. In general, among the five routing algorithms, the transmission rate of the TFMC algorithm is the best. The average end-to-end delay and average network overhead are also the lowest.
查看更多>>摘要:Beacon-based indoor positioning is popular in recent years. In this work, the authors aim to enhance the positioning accuracy by proposing signal power ranking (SPR) and solving related optimisation-based deployment problem of beacons using wireless communication and Bluetooth 4.0 Bluetooth low-energy network technologies. The authors first adopt grid-based field to be the proposed deployment field. Second, they convert the received signal strength indicator (RSSI) to several levels called SPR. Third, an optimisation-based model for deployment problem of beacons in indoor positioning is proposed on the basis of the above two considerations. The proposed model is to minimise the number of beacons required under some fundamental conditions including full coverage and full discrimination, respectively. Finally, the algorithm of simulated annealing is applied to solve the linear programming problem in this model. By the optimal results, the user can obtain a vector table of RSSI for each location efficiently in the test field. On the other hand, the user in the test field can receive the beacon RSSI value at the same time. In order to determine the user's location, the received beacon RSSI value is compared with the values in the vector table.
查看更多>>摘要:In recent years, orthogonal frequency division multiplexing with index modulation (OFDM-IM) has been proposed due to its extra diversity gain. Specially, OFDM with all index modulation (OFDM-AIM) was proposed, which removed symbol bits and enhanced the diversity order compared to typical OFDM. However, the security issue of OFDM-AIM has not been given full attention. This paper proposes an encrypted subblock design aided OFDM with all index modulation (ESD-OFDMAIM) scheme to enhance physical layer security. Firstly, an encryption process of subblock design was put forward, which creates a random look-up table and thus the mapping rule of ESD-OFDM-AIM between information bits and subblock realisations becomes random and time varying. Moreover, the scrambling and rotation encryption based on chaotic sequences from channel state information is utilised to prevent the eavesdropper from stealing the information via wireless channel. For eavesdroppers, parameters of ESD-OFDM-AIM such as spectral efficiency (SE), constellation points and the length of look-up table are concealed by the encryption. Finally, analyses of attack models and the information entropy of constellations are also provided to measure the security of ESD-OFDM-AIM. Simulation results show that ESD-OFDM-AIM can effectively improve the system security without the affecting bit error rate performance.
查看更多>>摘要:This paper develops new suboptimal antenna selection (AS) schemes, majority based transmit antenna selection/maximal ratio combining (TAS-maj/MRC) and joint transmit and receive antenna selection (JTRAS-maj), in a multiple-input multiple-output non-orthogonal multiple access (MIMO-NOMA) network. The impact of the channel estimation errors (CEEs) and feedback delay (FD) on the performance of the network is studied in Nakagami-m fading channels. First, the outage behavior of the network is investigated in a unified manner for the proposed AS schemes by deriving the closed-form expression of the exact outage probability (OP). Next, in the presence of the CEEs and FD, the corresponding upper bound of the OP is obtained. The OP expression in high signal-to-noise ratio region is then provided to illustrate an error floor value in the presence of the CEEs and FD as well as diversity and array gains in the absence of the CEEs and FD. Finally, the analytical results in the presence and absence of the CEEs and FD are verified by the Monte Carlo simulations. The numerical results show that the proposed majority based AS schemes are superior to both max-max-max and max-min-max based AS schemes and the system performance is more sensitive to the CEE than FD.
查看更多>>摘要:To alleviate the spectrum scarcity, the unlicensed 60 GHz band has raised increasing concerns due to its continuous large bandwidth. Considering IEEE 802.11ad/ay has already been deployed in this millimetre-wave band, the coexistence issues with new radio-based access to unlicensed spectrum should be weighed when deploying fifth generation (5G) network. Fortunately, the directional transmission on beams is able to reduce interference significantly, so beam selection can be combined with power control. To maximise spectrum efficiency (SE) of the 5G network while ensuring a friendly coexistence, the authors formulate an optimisation problem by jointly considering beam selection and resource allocation. More specifically, they design a spectrum planning mechanism to reduce the interference between 5G and WiFi, and then a block coordinate descent method is used to determine the user association, beam selection and power control for 5G users, while limiting the interferences to WiFi devices. Simulation results verify the effectiveness of the proposed algorithm in terms of complexity, convergence and SE.