scispace - formally typeset
Search or ask a question

Showing papers in "Wireless networks in 2023"


BookDOI
TL;DR: In this paper , the authors systematically introduce Cellular Vehicle-to-everything (C-V2X), addressing principles, technologies, standards and industrial practice, and present a comprehensive review of the literature.
Abstract: The book systematically introduces Cellular Vehicle-to-Everything (C-V2X), addressing principles, technologies, standards and industrial practice.

11 citations


Journal ArticleDOI
TL;DR: In this article , the authors proposed a network intrusion detection system (NIDS) architecture based on a deep autoencoder trained on network flow data, which has the advantage of not requiring prior knowledge of the network topology or its underlying architecture.
Abstract: Abstract Anomaly detection in industrial control and cyber-physical systems has gained much attention over the past years due to the increasing modernisation and exposure of industrial environments. Current dangers to the connected industry include the theft of industrial intellectual property, denial of service, or the compromise of cloud components; all of which might result in a cyber-attack across the operational network. However, most scientific work employs device logs, which necessitate substantial understanding and preprocessing before they can be used in anomaly detection. In this paper, we propose a network intrusion detection system (NIDS) architecture based on a deep autoencoder trained on network flow data, which has the advantage of not requiring prior knowledge of the network topology or its underlying architecture. Experimental results show that the proposed model can detect anomalies, caused by distributed denial of service attacks, providing a high detection rate and low false alarms, outperforming the state-of-the-art and a baseline model in an unsupervised learning environment. Furthermore, the deep autoencoder model can detect abnormal behaviour in legitimate devices after an attack. We also demonstrate the suitability of the proposed NIDS in a real industrial plant from the alimentary sector, analysing the false positive rate and the viability of the data generation, filtering and preprocessing procedure for a near real time scenario. The suggested NIDS architecture is a low-cost solution that uses only fifteen network-based features, requires minimal processing, operates in unsupervised mode, and is straightforward to deploy in real-world scenarios.

5 citations





Journal ArticleDOI
TL;DR: In this article , an iterative bounding box algorithm enhanced by a Kalman filter is proposed to refine the unknown node's estimated position, which can fulfill the joint goals of algorithm transparency and accuracy for various scenarios.
Abstract: Abstract As localization represents the main core of various wireless sensor network applications, several localization algorithms have been suggested in wireless sensor network research. In this article, we put forward an iterative bounding box algorithm enhanced by a Kalman filter to refine the unknown node’s estimated position. In fact, several research efforts are currently in progress to extend the 2D positioning algorithm in WSNs to 3D that reflects reality and the most practical applications. Subsequently, we replace a large number of GPS-equipped anchors with a single mobile anchor. In our studies, we consider the type of range-free sensor network exploiting the wireless sensors connectivity. We assess the performance of our algorithm using exhaustive experiments on several isotropic and anisotropic topologies. Our proposed algorithm can fulfill the joint goals of algorithm transparency and accuracy for various scenarios by evaluating parameters such as localization accuracy whilst changing other simulation parameters such as the effect of communication range, mobile anchor node position and sensor node deployment topology. It has been proven by the results of the experiments that the proposed algorithm effectively reduces the location error without requiring more equipment or increasing the communication cost.

2 citations




BookDOI
TL;DR: In this paper , the authors present a study of wireless localization techniques, providing design approaches for improving performance of localization systems, and present a design approach for improving the performance of the localization system.
Abstract: This book presents a study of wireless localization techniques, providing design approaches for improving performance of localization systems

1 citations











Journal ArticleDOI
TL;DR: In this article , the authors proposed an architecture capable of generating complex event processing (CEP) rules for real-time attack detection in an automatic and completely unsupervised manner, which can be integrated with principal component analysis (PCA), Gaussian mixture models (GMM) and the Mahalanobis distance.
Abstract: Abstract In recent years, the Internet of Things (IoT) has grown rapidly, as has the number of attacks against it. Certain limitations of the paradigm, such as reduced processing capacity and limited main and secondary memory, make it necessary to develop new methods for detecting attacks in real time as it is difficulty to adapt as has the techniques used in other paradigms. In this paper, we propose an architecture capable of generating complex event processing (CEP) rules for real-time attack detection in an automatic and completely unsupervised manner. To this end, CEP technology, which makes it possible to analyze and correlate a large amount of data in real time and can be deployed in IoT environments, is integrated with principal component analysis (PCA), Gaussian mixture models (GMM) and the Mahalanobis distance. This architecture has been tested in two different experiments that simulate real attack scenarios in an IoT network. The results show that the rules generated achieved an F1 score of .9890 in detecting six different IoT attacks in real time.




Journal ArticleDOI
TL;DR: In this paper , a knapsack-inspired punctured resource allocation algorithm is proposed where the users' channel qualities of both services are considered at each time slot leading to the most suitable Resource Block (RB) selection for puncturing in a way that minimizes the negative impact on eMBB performance.
Abstract: Abstract 5G technology is intended to support three promising services with heterogeneous requirements: Ultra-Reliable and Low Latency Communication (uRLLC), enhanced Mobile Broadband (eMBB), and massive Machine Type Communication (mMTC). 6G is required to support even more challenging scenarios, including the presence of a large number of uRLLC devices, under the massive uRLLC (mURLLC) use case scenario. The presence of these services on the same network creates a challenging task of resource allocation to meet their diverse requirements. Given the critical nature of uRLLC applications, uRLLC traffic will always have the highest priority which causes a negative impact on the performance of other services. In this paper, the problem of uRLLC/eMBB resource allocation is investigated. An optimal resource allocation scheme is proposed with two scenarios including a guaranteed fairness level and minimum data rate among eMBB users. In addition, a knapsack-inspired punctured resource allocation algorithm is proposed where the users’ channel qualities of both services are considered at each time slot leading to the most suitable Resource Block (RB) selection for puncturing in a way that minimizes the negative impact on eMBB performance. The proposed solution was compared with three puncturing baseline reference algorithms and the performance was evaluated in terms of eMBB Sum throughput and Fairness level. The simulation results show that the proposed algorithm outperforms the above-mentioned reference algorithms in all evaluation metrics and is proved to be comparable to the optimal solution given its low complexity.

Journal ArticleDOI
TL;DR: In this article , the authors developed a method for abnormal node sensing in regional wireless networks based on convolutional neural network (CNN) and analyzed the structure of regional wireless network nodes and determined the distribution mode of nodes.
Abstract: Abstract There are some problems in abnormal node sensing in regional wireless networks, such as low sensing accuracy and poor judgment results of abnormal states of sensing nodes. Therefore, this paper develops a method for abnormal node sensing in regional wireless networks based on convolutional neural network. In addition, we will analyze the structure of regional wireless network nodes and determine the distribution mode of wireless network nodes. The regional wireless network node data are extracted and the pivot quantity and two-dimensional Gaussian distribution state are constructed using the median to build the regional wireless network node deployment model according to the confidence interval of the data characteristics; analyze the basic principle of convolution neural network, determine the operation mode of convolution kernel, classify the regional wireless network node data using Bayesian network, set a safety distance to determine the abnormal node of the regional wireless network, train the determined abnormal data as the input data of convolutional neural network and input it into the constructed perception model of the abnormal node of the regional wireless network, the loss function is set to continuously update the iterative results to realize the perception of abnormal node in the regional wireless network. The simulation results show that the sensing range of this method is relatively consistent with the range set by the sample, and the sensing accuracy reaches more than 95%, and the abnormal state error of abnormal nodes in the evaluation sample area is always less than 2%, which verifies that this method improves the sensing accuracy, reduces the error, and has higher application value.