The rapid growth of the internet of Things (loT) has created significant opportunities for the future of telecommunications. Research on physical layer authentication with channel features holds promise to improve wir...
详细信息
ISBN:
(数字)9798350390643
ISBN:
(纸本)9798350390650
The rapid growth of the internet of Things (loT) has created significant opportunities for the future of telecommunications. Research on physical layer authentication with channel features holds promise to improve wireless network security for loT devices. In this paper, we exploit Channel State Information (CSI) phase extracted from the receiver with multiple antennas to enhance the channel spatial diversity. Then Convolutional Neural Network and Generative Adversarial Network (CNN-GAN) model is designed for physical layer authentication. Outlier score from model is introduced to authenticate device identity. Finally, we carry out extensive experimental evaluations about the authentication performance and robustness of the proposed scheme by data collected from Wi-Fi signalbased on IEEE 802.11n protocol. The results have successfully demonstrated that the proposed scheme exhibits outstanding performance.
In the rapid development of the internet of Things technology, image recognition and detection technology is used in all walks of life. In order to solve the limitations of traditional image detection methods in pract...
详细信息
In the wake of the accelerated advancement of internet of Things(IoT) technology, a significant volume of multimedia information is emerging as the dominant component of IoT applications. However, this information als...
详细信息
Human activity recognition(HAR) has received increasing attention and has been applied in multiple fields such as healthcare and human-computer interaction. Previous activity recognition methods have problems such as ...
详细信息
ISBN:
(纸本)9798350350920
Human activity recognition(HAR) has received increasing attention and has been applied in multiple fields such as healthcare and human-computer interaction. Previous activity recognition methods have problems such as privacy leakage, strong intrusion on users, and coarse detection granularity. Therefore, we propose a privacy protection, easy-to-use, identifiability, lightweight, and fine-grained human activity recognition method based on bound-RFID technology. Firstly, we utilize the fundamental physical characteristics of radio frequency signals, such as doppler frequency (DF), received signal strength indicator (RSSI), and phase, which reflect human activity. Analyze the correlation between these data and human activities, establish a graphical relationship between data changes and activities, and generate human postures through posture time windows. Secondly, we integrate tags information to model human activities by establishing spatio-temporal skeleton graphs with temporal and spatial information. Finally, we model the spatio-temporal skeleton graph convolutional neural network to classify these graphs. As far as we know, this is the most refined HAR based on bound-RFID tags.
With the rapid development of big data and internet of Things (IoT), more and more digital products are emerging. However, this has also brought about a growing problem of copyright violation. Digital image robust wat...
详细信息
The rapid growth in the number of vehicles and types of services such as video transmission improves the quality-of-service (QoS) requirements and increases the difficulty in resisting eavesdropping attacks on the Int...
详细信息
ISBN:
(纸本)9798350349405;9798350349399
The rapid growth in the number of vehicles and types of services such as video transmission improves the quality-of-service (QoS) requirements and increases the difficulty in resisting eavesdropping attacks on the internet of Vehicles (IoV). Existing video transmission schemes that either ignore the impact of eavesdropping attacks or have the full knowledge of the attack model have performance degradation in highly dynamic IoV systems. In this paper, we propose a reinforcement learning-based secure video transmission scheme for IoV systems, which jointly optimizes the access control policy for each vehicle (i.e., the selection of access nodes such as the base stations or unmanned aerial vehicles) and the corresponding transmit power level against active eavesdropping. This scheme uses the QoS and eavesdropping rate as the criteria to evaluate the long-term risk of each state-action pair, which is estimated by a designed deep Q-network to avoid the risky access control policies that cause severe data leakage or video transmission failure. Simulation results show that our scheme reduces the energy consumption, transmission latency, and eavesdropping rate compared with the benchmark.
A cluster-based crop recommendation system categorizes the crop candidates into several groups or classes (e.g., based on soil and environment parameters similarities). After receiving a request from a farmer, it reco...
详细信息
The internet of Things, or loT, is a rapidly expanding field that has been integrated into numerous different industries. Thanks to this technology, devices may send, receive, and analyze data without the assistance o...
详细信息
The emergence of the internet of Things (IoT) has led to the development of Unmanned Aerial Vehicle (UAV) trajectory planning, aiming to enhance service quality in remote areas. However, traditional trajectory plannin...
详细信息
ISBN:
(纸本)9798350350920
The emergence of the internet of Things (IoT) has led to the development of Unmanned Aerial Vehicle (UAV) trajectory planning, aiming to enhance service quality in remote areas. However, traditional trajectory planning algorithms heavily rely on accurate environmental models, which pose challenges in achieving strategy convergence and minimizing the age of information (AoI). To address this issue, we propose an AoI-oriented UAV trajectory planning algorithm based on multi-agent noise dueling double deep Q-Network (MAND3QN). Considering data freshness as a priority, we initially model the multi-UAV trajectory planning problem as a problem of minimizing the average AoI. Subsequently, the Dueling structure is introduced to decompose the Q value into the value function of states and the dominance function of state-action pairs, which improves the learning efficiency and allows for a more accurate estimation of Q-values. Additionally, by incorporating noise parameters through NoisyNet implementation in neural networks, we introduce randomness to network output values and improve exploration capabilities within the state space. Simulation results demonstrate that our algorithm achieves stable and rapid convergence while significantly reducing AoI for UAVs-assisted IoT systems.
Recently, drone detection has become a topic of interest due to the widespread usage of drones in various applications, particularly for recreational purposes. Such detection tasks are usually performed by deep learni...
详细信息
暂无评论