Current Issue : October-December Volume : 2023 Issue Number : 4 Articles : 5 Articles
With the flourishing development of wireless communication, further challenges will be introduced by the future demands of emerging applications. However, in the face of more complex communication scenarios, favorable decoding results may not be yielded by conventional channel decoding schemes based on mathematical models. The remarkable contributions of deep neural networks (DNNs) in various fields have garnered widespread recognition, which has ignited our enthusiasm for their application in wireless communication systems. Therefore, a reliable DNN-based decoding scheme designed for wireless communication systems is proposed. This scheme comprises efficient local decoding using linear and nonlinear operations. To be specific, linear operations are carried out on the edges connecting neurons, while nonlinear operations are performed on each neuron. After forward propagation through the DNN, the loss value is estimated based on the output, and backward propagation is employed to update the weights and biases. This process is performed iteratively until a near-optimal message sequence is recovered. Various factors within the DNN are considered in the simulation and the potential impacts of each factor are analyzed. Simulation results indicate that our proposed DNN-based decoding scheme is superior to the conventional hard decision....
With the widespread adoption of wireless sensor networks (WSN), the security of the WSN has been a wide concern. Certificateless signature eliminates the certificate management problem and key escrow problem and is considered a feasible solution to solve the data integrity and authentication of WSN. Recently, Thumbur et al. proposed an efficient pairing-free certificateless signature scheme, and Xu et al. pointed out that their scheme is not resistant to signature forgery attacks and proposed an improved scheme. Based on the trust hierarchy defined by Girault, we find that Xu et al.’s scheme is still only able to achieve security under KGC trust level 2. Moreover, Thumbur et al.’s scheme uses the Schnorr signature algorithm form, which makes it favorable for scaling, while Xu et al.’s scheme breaks this advantage. Therefore, we propose a pairing-free certificateless scheme capable of reaching KGC trust level 3, still using the Schnorr signature algorithm form, and prove the security of the new scheme under the random oracle model. The final efficiency analysis shows that the new scheme has shorter public key length and higher computational efficiency....
A software-defined network (SDN) brings a lot of advantages to the world of networking through flexibility and centralized management; however, this centralized control makes it susceptible to different types of attacks. Distributed denial of service (DDoS) is one of the most dangerous attacks that are frequently launched against the controller to put it out of service. This work takes the special ability of SDN to propose a solution that is an implementation run at the multicontroller to detect a DDoS attack at the early stage. This method not only detects the attacks but also identifies the attacking paths and starts a mitigation process to provide protection for the network devices. This method is based on the entropy variation of the destination host targeted with its IP address and can detect the attack within the first 250 packets of malicious traffic attacking a particular host. Then, fine-grained packet-based detection is performed using a deep-learning model to classify the attack into different types of attack categories. Lastly, the controller sends the updated traffic information to neighbor controllers. The chi-squared (x2) test feature selection algorithm was also employed to reveal the most relevant features that scored the highest in the provided data set. The experiment result demonstrated that the proposed Long Short-Term Memory (LSTM) model achieved an accuracy of up to 99.42% using the data set CICDDoS2019, which has the potential to detect and classify the DDoS attack traffic effectively in the multicontroller SDN environment. In this regard, it has an enhanced accuracy level to 0.42% compared with the RNN-AE model with data set CICDDoS2019, while it has improved up to 0.44% in comparison with the CNN model with the different data set ICICDDoS2017....
In this study, a distributed fashion of space shift keying as an efficient cooperative framework is proposed and studied to address the main challenges in future cellular networks by providing high energy efficiency and meeting the demand growth with the lowest complexity and the highest performance. A comprehensive mathematical analysis has been performed to find a closed form for the channel capacity of distributed space shift keying and to depict the influence of the number of distributed antennas on the achievable channel capacity. In addition, a simulation study of the error performance is presented using two detection methods: maximum-likelihood detection based on channel state information and blind detection. It was shown that as the number of cooperating relays increases, the error performance of the detectors converges, although they incur different costs and computational complexities. A comparison study in terms of error performance and capacity is applied with other cooperative spatial modulation to portray the outperformance of the system presented in this work....
Focusing on the layout of the 5G mobile communication base station in the city center, we design a 5G city network slicing strategy for the three typical application scenarios with enhanced mobile broadband (eMBB), ultrareliable low-latency communications (URLLC), and massive machine type communications (mMTC). The strategy considers multiple important network performance indicators, including user guaranteed bandwidth, maximum bandwidth limit, QoS (quality of service), link delay tolerance, and slicing throughput. The slicing strategy can greatly increase the connections of base station clients and the utilization of network resources, and effectively reduce block radio and handover radio. The simulation experiments adopt the 5G base station dataset of a coastal city layout in Zhejiang province. Our tests show that the 5G network slicing strategy has certain advantages in network transmission performance in urban complex environment. The research can provide an effective reference for 5G infrastructure construction in other cities....
Loading....