Beam management,including initial access(IA)and beam tracking,is essential to the millimeter-wave Unmanned Aerial Vehicle(UAV)***,the conventional communicationonly and feedback-based schemes suffer a high delay and l...
详细信息
Beam management,including initial access(IA)and beam tracking,is essential to the millimeter-wave Unmanned Aerial Vehicle(UAV)***,the conventional communicationonly and feedback-based schemes suffer a high delay and low accuracy of beam alignment,since they only enable the receiver to passively“hear”the information of the transmitter from the radio *** paper presents a novel sensing-assisted beam management approach,the first solution that fully utilizes the information from the visual domain to improve communication *** employ both integrated sensing and communication and computer vision techniques and design an extended Kalman filtering method for beam tracking and ***,we also propose a novel dual identity association solution to distinguish multiple UAVs in dynamic ***-world experiments and numerical results show that the proposed solution outperforms the conventional methods in IA delay,association accuracy,tracking error,and communication performance.
6G Satellite-Terrestrial Integrated Network (STIN) extends connectivity services globally, attracting an increasing number of users to access the Internet with its advantages of wide coverage, high speed, and large ca...
详细信息
6G Satellite-Terrestrial Integrated Network (STIN) extends connectivity services globally, attracting an increasing number of users to access the Internet with its advantages of wide coverage, high speed, and large capacity. However, the complex communication environments, such as link exposure and high dynamics of satellites in the network, pose challenges to designing authentication schemes that are applicable to 6G STIN. Although researchers have proposed many authentication schemes for 6G STIN, most of them have only focused on access authentication, which cannot guarantee the stability of subsequent communications. A few schemes have considered providing seamless services through handover authentication, but they still face issues such as security vulnerabilities and high energy consumption. To tackle these issues, this paper proposes an energy efficient authentication scheme for 6G STIN, capable of achieving mutual authentication between entities and negotiating a secure session key. Additionally, it designs a handover mechanism that is more suitable for 6G STIN and supports handover authentication for multiple users. Through security analysis, our scheme is proven to withstand various attacks, and its security is further verified using the ProVerif tool. Performance analysis shows that our scheme has lower authentication latency and communication overhead, while reducing energy consumption and ensuring security. IEEE
In recent years,the demand for real-time data processing has been increasing,and various stream processing systems have *** the amount of data input to the stream processing system fluctuates,the computing resources r...
详细信息
In recent years,the demand for real-time data processing has been increasing,and various stream processing systems have *** the amount of data input to the stream processing system fluctuates,the computing resources required by the stream processing job will also *** resources used by stream processing jobs need to be adjusted according to load changes,avoiding the waste of computing *** present,existing works adjust stream processing jobs based on the assumption that there is a linear relationship between the operator parallelism and operator resource consumption(e.g.,throughput),which makes a significant deviation when the operator parallelism *** paper proposes a nonlinear model to represent operator *** divide the operator performance into three stages,the Non-competition stage,the Non-full competition stage,and the Full competition *** our proposed performance model,given the parallelism of the operator,we can accurately predict the CPU utilization and operator *** with actual experiments,the prediction error of our model is below 5%.We also propose a quick accurate auto-scaling(QAAS)method that uses the operator performance model to implement the auto-scaling of the operator parallelism of the Flink *** to previous work,QAAS is able to maintain stable job performance under load changes,minimizing the number of job adjustments and reducing data backlogs by 50%.
5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large nu...
详细信息
5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large number of devices,thus realizing richer application scenarios and constructing 5G-enabled vehicular ***,due to the vulnerability of wireless communication,vehicle privacy and communication security have become the key problems to be solved in vehicular ***,the large-scale communication in the vehicular networks also makes the higher communication efficiency an inevitable *** order to achieve efficient and secure communication while protecting vehicle privacy,this paper proposes a lightweight key agreement and key update scheme for 5G vehicular networks based on ***,the key agreement is accomplished using certificateless public key cryptography,and based on the aggregate signature and the cooperation between the vehicle and the trusted authority,an efficient key updating method is proposed,which reduces the overhead and protects the privacy of the vehicle while ensuring the communication ***,by introducing blockchain and using smart contracts to load the vehicle public key table for key management,this meets the requirements of vehicle traceability and can dynamically track and revoke misbehaving ***,the formal security proof under the eck security model and the informal security analysis is conducted,it turns out that our scheme is more secure than other authentication schemes in the vehicular *** analysis shows that our scheme has lower overhead than existing schemes in terms of communication and computation.
Noise is a critical factor that impacts speech quality. Speech signals are often disturbed by noise during acquisition and transmission. Speech enhancement technology represents an important method to eliminate noise ...
详细信息
This paper investigates an unmanned aerial vehicle(UAV)-assisted multi-object offloading scheme for blockchain-enabled Vehicle-to-Everything(V2X)*** to the presence of an eavesdropper(Eve),the system’s com-munication...
详细信息
This paper investigates an unmanned aerial vehicle(UAV)-assisted multi-object offloading scheme for blockchain-enabled Vehicle-to-Everything(V2X)*** to the presence of an eavesdropper(Eve),the system’s com-munication links may be *** paper proposes deploying an intelligent reflecting surface(IRS)on the UAV to enhance the communication performance of mobile vehicles,improve system flexibility,and alleviate eavesdropping on communication *** links for uploading task data from vehicles to a base station(BS)are protected by IRS-assisted physical layer security(PLS).Upon receiving task data,the computing resources provided by the edge computing servers(MEC)are allocated to vehicles for task *** blockchain-based computation offloading schemes typically focus on improving network performance,such as minimizing energy consumption or latency,while neglecting the Gas fees for computation offloading and the costs required for MEC computation,leading to an imbalance between service fees and resource *** paper uses a utility-oriented computation offloading scheme to balance costs and *** paper proposes alternating phase optimization and power optimization to optimize the energy consumption,latency,and communication secrecy rate,thereby maximizing the weighted total utility of the *** results demonstrate a notable enhancement in the weighted total system utility and resource utilization,thereby corroborating the viability of our approach for practical applications.
In blockchain-based unmanned aerial vehicle(UAV)communication systems,the length of a block affects the performance of the *** transmission performance of blocks in the form of finite character segments is also affect...
详细信息
In blockchain-based unmanned aerial vehicle(UAV)communication systems,the length of a block affects the performance of the *** transmission performance of blocks in the form of finite character segments is also affected by the block ***,it is crucial to balance the transmission performance and blockchain performance of blockchain communication systems,especially in wireless environments involving *** paper investigates a secure transmission scheme for blocks in blockchain-based UAV communication systems to prevent the information contained in blocks from being completely eavesdropped during *** our scheme,using a friendly jamming UAV to emit jamming signals diminishes the quality of the eavesdropping channel,thus enhancing the communication security performance of the source *** the constraints of maneuverability and transmission power of the UAV,the joint design of UAV trajectories,transmission power,and block length are proposed to maximize the average minimum secrecy rate(AMSR).Since the optimization problem is non-convex and difficult to solve directly,we first decompose the optimization problem into subproblems of trajectory optimization,transmission power optimization,and block length ***,based on firstorder approximation techniques,these subproblems are reformulated as convex optimization ***,we utilize an alternating iteration algorithm based on the successive convex approximation(SCA)technique to solve these subproblems *** simulation results demonstrate that our proposed scheme can achieve secure transmission for blocks while maintaining the performance of the blockchain.
To improve the error correction performance, an innovative encoding structure with tail-biting for spinal codes is designed. Furthermore, an adaptive forward stack decoding(A-FSD) algorithm with lower complexity for s...
详细信息
To improve the error correction performance, an innovative encoding structure with tail-biting for spinal codes is designed. Furthermore, an adaptive forward stack decoding(A-FSD) algorithm with lower complexity for spinal codes is proposed. In the A-FSD algorithm, a flexible threshold parameter is set by a variable channel state to narrow the scale of nodes accessed. On this basis, a new decoding method of AFSD with early termination(AFSD-ET) is further proposed. The AFSD-ET decoder not only has the ability of dynamically modifying the number of stored nodes, but also adopts the early termination criterion to curtail complexity. The complexity and related parameters are verified through a series of simulations. The simulation results show that the proposed spinal codes with tail-biting and the AFSD-ET decoding algorithms can reduce the complexity and improve the decoding rate without sacrificing correct decoding performance.
The prevalence of social media and mobile computing has led to intensive user engagement in the emergent Cyber-Physical-Social-Thinking(CPST)***,the easy access,the lack of governance,and excessive use has generated a...
详细信息
The prevalence of social media and mobile computing has led to intensive user engagement in the emergent Cyber-Physical-Social-Thinking(CPST)***,the easy access,the lack of governance,and excessive use has generated a raft of new behaviors within CPST,which affects users’physical,social,and mental *** this paper,we conceive the Cyber-Syndrome concept to denote the collection of cyber disorders due to excessive or problematic Cyberspace interactions based on CPST *** we characterize the Cyber-Syndrome concept in terms of Maslow’s theory of Needs,from which we establish an in-depth theoretical understanding of Cyber-Syndrome from its etiology,formation,symptoms,and ***,we propose an entropy-based Cyber-Syndrome control mechanism for its computation and *** goal of this study is to give new insights into this rising phenomenon and offer guidance for further research and development.
In the 6G era,Space-Air-Ground Integrated Network(SAGIN)are anticipated to deliver global coverage,necessitating support for a diverse array of emerging applications in high-mobility,hostile *** such conditions,conven...
详细信息
In the 6G era,Space-Air-Ground Integrated Network(SAGIN)are anticipated to deliver global coverage,necessitating support for a diverse array of emerging applications in high-mobility,hostile *** such conditions,conventional orthogonal frequency division multiplexing(OFDM)modulation,widely employed in cellular and Wi-Fi communication systems,experiences performance degradation due to significant Doppler *** overcome this obstacle,a novel twodimensional(2D)modulation approach,namely orthogonal time frequency space(OTFS),has emerged as a key enabler for future high-mobility use ***,OTFS modulates information within the delay-Doppler(DD)domain,as opposed to the timefrequency(TF)domain utilized by *** offers advantages such as Doppler and delay resilience,reduced signaling latency,a lower peak-to-average ratio(PAPR),and a reduced-complexity *** studies further indicate that the direct interplay between information and the physical world in the DD domain positions OTFS as a promising waveform for achieving integrated sensing and communications(ISAC).In this article,we present an in-depth review of OTFS technology in the context of the 6G era,encompassing fundamentals,recent advancements,and future *** objective is to provide a helpful resource for researchers engaged in the field of OTFS.
暂无评论