This article focuses on the parameter estimation problem in wireless sensor networks (WSNs) under adversarial attacks, considering the complexities of sensing and communication in challenging environments. In order to mitigate the impact of these attacks on the network, we propose a novel AP-DLMS algorithm with adaptive threshold attack detection and malicious punishment mechanism. The adaptive threshold is constructed using the observation matrix and network topology to detect the location of malicious attacks, while the standard reference estimation is designed to obtain the estimated deviation of each node. To mitigate the impact of data tampering on network performance, we introduce the honesty factor and punishment factor to combine the weights of normal nodes and malicious nodes respectively. Additionally, we propose a new probabilistic random attack model. Simulations are conducted to investigate the influence of key parameters in the adaptive threshold on the performance of the proposed AP-DLMS algorithm, and the mean square performance of the algorithm is analyzed under various attack models. The results demonstrate that the proposed algorithm exhibits strong robustness in adversarial networks, and the proposed attack model effectively demonstrates the impact of attacks.
Limited edge server resources and uneven distribution of traffic density in vehicular networks result in problems such as unbalanced network load and high task processing latency. To address these issues, we proposed an efficient caching and offloading resource allocation (ECORA) strategy in vehicular social networks. First, to improve the utilization of vehicular idle resources, a collaborative computation and storage resource allocation mechanism was designed using mobile social similarity. Next, with the optimization objective of minimizing the average task processing delay, we studied the combined resource allocation optimization problem and decoupled it into two sub-problems. For the service caching subproblem, we designed a stable matching algorithm by mobile social connections to dynamically update the cache resource allocation scheme for improving the task unloading efficiency. For the task offloading subproblem, a discrete cuckoo search algorithm based on differential evolution was designed to adaptively select the best task offloading scheme, which minimized the average task processing delay. Simulation results revealed that the ECORA strategy outperformed the resource allocation strategy based on particle swarm optimization and genetic algorithm, and reduced the average task processing delay by at least 7.59%. Meanwhile, the ECORA strategy can achieve superior network load balancing.
This article proposes a new framework of aerial reconfigurable intelligent surface (ARIS) enhancing the nonorthogonal multiple access (NOMA) system. The base station (BS) transmits superimposed signals to multiple users with different channel gains through ARIS which can flexibly change channel conditions and perform intelligent NOMA operations. It ensures that our system can perform well in providing services to multiple users simultaneously. In this system, the placement of the unmanned aerial vehicle (UAV) is jointly optimized along with the AIRS passive beam and the multiuser power allocation in order to maximize the communication sum rate. Since the joint optimization problem is nonconvex and coupled, it is hence disintegrated into three subproblems and it is solved alternately through the successive convex approximation (SCA). Moreover, semi definite programming (SDP) is used to deal with the rank one constraint of RIS reflection matrix and comparisons are made using particle swarm optimization (PSO). The numerical results show that the proposed ARIS-NOMA framework can achieve better sum rate performance than traditional NOMA with fixed RIS and OMA-ARIS.
To provide seamless wireless coverage, the air-to-ground (A2G) heterogeneous wireless network is considered as one of the most promising solutions. In this article, we develop a novel A2G communication-caching-charging (3C) integrated network based on non-orthogonal multiple access (NOMA). As a significant participant of A2G network, unmanned aerial vehicle (UAV), which harvests energy from the base station (BS) with the aid of wireless power transfer (WPT), is utilized as content server to cache files and serve users. To be specific, we first propose a resource allocation strategy to enhance the quality of service (QoS) of ground users. The goal is to minimize the transmission latency of ground users, which is decomposed into sub-problems, such as user pairing, files' power allocation and users' power allocation. Firstly, we propose a NOMA user pairing algorithm based on K-means to deploy UAVs and pair users. Then, the closed-form solution for files' power allocation with the goal of maximizing the duration for energy harvesting is formulated. Finally, we apply the genetic algorithm (GA) to obtain power allocation factors to increase users' rate and the reminder time of content delivery phase is utilized for energy harvesting. Simulation results validate the advantage of the proposed strategy in reducing user delay than benchmark schemes.
In this article, we propose a few-shot indoor position method based on Triplet Matchnet, which transforms coordinate positioning into channel state information (CSI) similarity matching problem. Triplet loss is designed to train and learn hidden correspondence between CSI features and physical space positions, with emphasis on minimizing distance or angle-based triplet loss. Then, according to pre-trained network with best similarity match, a similarity score map of CSI with unknown coordinates is constructed to predict position precisely. Experimental results show that angle-based triplet loss can obtain more accurate CSI fingerprint similarity matching accuracy. Compared with existing methods, experiment results confirm that our proposed method can achieve excellent positioning performance with few-shot datasets.
Specific emitter identification (SEI) is a potential physical layer authentication technology, which is one of the most critical complements of upper layer authentication. Radio frequency fingerprint (RFF)-based SEI is to distinguish one emitter from each other by immutable RF characteristics from electronic components. Due to the powerful ability of deep learning (DL) to extract hidden features and perform classification, it can extract highly separative features from massive signal samples, thus enabling SEI. Considering the condition of limited training samples, we propose a novel few-shot SEI (FS-SEI) method based on interpolative metric learning (InterML) which gets rid of the dependence on auxiliary dataset. Specifically, InterML is designed to mine more implicit samples in the sample space to improve generalization, and constrain the feature distance in the feature space to improve discriminability. The proposed InterML-based FS-SEI method is evaluated on a real-world Wi-Fi dataset. The simulation results show that the proposed method achieves better identification performance, higher feature discriminability and more stable performance than five latest FS-SEI methods. In the 10 shot scenario, the identification accuracy of InterML is 91.48%, compared to the comparison methods, the accuracy is improved by 0.62%–31.29%.
To establish more intelligent cellular networks for future ubiquitous access and heterogeneous devices, we need to obtain channel state information (CSI) in a more agile and economical manner, especially for frequency division duplexing (FDD) massive multiple-input multiple-output (MIMO) architectures. Unlike conventional CSI feedback or limited feedback methods, we can predict downlink CSI by leveraging channel reciprocity between uplink and downlink. The downlink CSI prediction can be formulated as a data-driven deep learning task, however, there exist isolated data silos and online adaptation problem for the offline trained neural network-based models. In this article, we propose an interacting federated and transfer learning (IFTL) based framework for downlink CSI prediction and online update, where several factors including asynchrony of different clients are considered, and light heterogeneity of diverse cells can be tolerated. Both model-level and link-level simulations are conducted under standardized FDD massive MIMO scenarios. The results outline promising prospect and potential of the utilization of federated learning and transfer learning in physical layer of wireless communications.
The communications between vehicle-to-vehicle (V2V) with high frequency, group sending, group receiving and periodic lead to serious collision of wireless resources and limited system capacity, and the rapid channel changes in high mobility vehicular environments preclude the possibility of collecting accurate instantaneous channel state information at the base station for centralized resource management. For the Internet of Vehicles (IoV), it is a fundamental challenge to achieve low latency and high reliability communication for real-time data interaction over short distances in a complex wireless propagation environment, as well as to attenuate and avoid inter-vehicle interference in the region through a reasonable spectrum allocation. To solve the above problems, this paper proposes a resource allocation (RA) method using dueling double deep Q-network reinforcement learning (RL) with low-dimensional fingerprints and soft-update architecture (D3QN-LS) while constructing a multi-agent model based on a Manhattan grid layout urban virtual environment, with communication links between V2V links acting as agents to reuse vehicle-to-infrastructure (V2I) spectrum resources. In addition, we extend the amount of transmitted data in our work, while adding scenarios where spectrum resources are relatively scarce, i.e. the number of V2V links is significantly larger than the amount of spectrum, to compensate for some of the shortcomings in existing literature studies. We demonstrate that the proposed D3QN-LS algorithm leads to a further improvement in the total capacity of V2I links and the success rate of periodic secure message transmission in V2V links.
Wi-Fi-based passive sensing is considered as one of the promising sensing techniques in advanced wireless communication systems due to its wide applications and low deployment cost. However, existing methods are faced with the challenges of low sensing accuracy, high computational complexity, and weak model robustness. To solve these problems, we first propose a robust channel state information (CSI)-based Wi-Fi passive sensing method using attention mechanism deep learning (DL). The proposed method is called as convolutional neural network (CNN)-ABLSTM, a combination of CNNs and attention-based bi-directional long short-term memory (LSTM). Specifically, CSI-based Wi-Fi passive sensing is devised to achieve the high precision of human activity recognition (HAR) due to the fine-grained characteristics of CSI. Second, CNN is adopted to solve the problems of computational redundancy and high algorithm complexity which are often occurred by machine learning (ML) algorithms. Third, we introduce an attention mechanism to deal with the weak robustness of CNN models. Finally, simulation results are provided to confirm the proposed method in three aspects, high recognition performance, computational complexity, and robustness. Compared with CNN, LSTM, and other networks, the proposed CNN-ABLSTM method improves the recognition accuracy by up to 4%, and significantly reduces the calculation rate. Moreover, it still retains 97% accuracy under the different scenes, reflecting a certain robustness.
Radio-frequency fingerprint (RFF), which comes from the imperfect hardware, is a potential feature to ensure the security of communication. With the development of deep learning (DL), DL-based RFF identification methods have made excellent and promising achievements. However, on one hand, existing DL-based methods require a large amount of samples for model training. On the other hand, the RFF identification method is generally less effective with limited amount of samples, while the auxiliary data set and the target data set often needs to have similar data distribution. To address the data-hungry problems in the absence of auxiliary data sets, in this article, we propose a supervised contrastive learning (SCL)-based RFF identification method using data augmentation and virtual adversarial training (VAT), which is called “SCACNN.” First, we analyze the causes of RFF, and model the RFF identification problem with augmented data set. A nonauxiliary data augmentation method is proposed to acquire an extended data set, which consists of rotation, flipping, adding Gaussian noise, and shifting. Second, a novel similarity radio-frequency fingerprinting encoder (SimRFE) is used to map the RFF signal to the feature coding space, which is based on the convolution, long short-term-memory, and a fully connected deep neural network (CLDNN). Finally, several secondary classifiers are employed to identify the RFF feature coding. The simulation results show that the proposed SCACNN has a greater identification ratio than the other classical RFF identification methods. Moreover, the identification ratio of the proposed SCACNN achieves an accuracy of 92.68% with only 5% samples.
Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo
Saznaj više