4.7 Article

Energy-Efficient Distributed Data Storage for Wireless Sensor Networks Based on Compressed Sensing and Network Coding

期刊

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
卷 12, 期 10, 页码 5087-5099

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TWC.2013.090313.121804

关键词

Compressed sensing; distributed data storage; network coding; random geometric graph; wireless sensor network

资金

  1. National Nature Science Foundation of China [61001119]
  2. National Natural Science Foundation of China [61027003]
  3. Program for New Century Excellent Talents in University [NCET 12-0795]
  4. Beijing Nova program [Z12111000250000]

向作者/读者索取更多资源

Recently, distributed data storage (DDS) for Wireless Sensor Networks (WSNs) has attracted great attention, especially in catastrophic scenarios. Since power consumption is one of the most critical factors that affect the lifetime of WSNs, the energy efficiency of DDS in WSNs is investigated in this paper. Based on Compressed Sensing (CS) and network coding theories, we propose a Compressed Network Coding based Distributed data Storage (CNCDS) scheme by exploiting the correlation of sensor readings. The CNCDS scheme achieves high energy efficiency by reducing the total number of transmissions Nt(tot) and receptions Nr(tot) during the data dissemination process. Theoretical analysis proves that the CNCDS scheme guarantees good CS recovery performance. In order to theoretically verify the efficiency of the CNCDS scheme, the expressions for Nt(tot) and Nr(tot) are derived based on random geometric graphs (RGG) theory. Furthermore, based on the derived expressions, an adaptive CNCDS scheme is proposed to further reduce Nt(tot) and Nr(tot). Simulation results validate that, compared with the conventional ICStorage scheme, the proposed CNCDS scheme reduces Nt(tot), Nr(tot), and the CS recovery mean squared error (MSE) by up to 55%, 74%, and 76% respectively. In addition, compared with the CNCDS scheme, the adaptive CNCDS scheme further reduces Nt(tot) and Nr(tot) by up to 63% and 32% respectively.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Engineering, Electrical & Electronic

When Virtual Reality Meets Rate Splitting Multiple Access: A Joint Communication and Computation Approach

Nguyen Quang Hieu, Diep N. Nguyen, Dinh Thai Hoang, Eryk Dutkiewicz

Summary: RSMA-based multicast approach can address the computational demands and dynamic user needs in virtual reality streaming applications, achieving millisecond-latency requirement.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2023)

Article Computer Science, Information Systems

FedChain: Secure Proof-of-Stake-Based Framework for Federated-Blockchain Systems

Cong T. T. Nguyen, Dinh Thai Hoang, Diep N. N. Nguyen, Yong Xiao, Hoang-Anh Pham, Eryk Dutkiewicz, Nguyen Huynh Tuong

Summary: In this article, the authors propose FedChain, a novel framework for effective token transfer between different blockchain networks. They introduce a federated-blockchain system and a cross-chain transfer protocol to facilitate secure and decentralized transfer of tokens. They also develop a PoS-based consensus mechanism for FedChain that satisfies strict security requirements and achieves better performance. Furthermore, they address the problem of centralization in the FedChain system with a Stackelberg game model, proving the uniqueness of the equilibrium and finding the exact formula. The results are important for stakeholders to determine investment strategies and for chain operators to maximize benefits and security protection. Simulation results demonstrate the effectiveness of the FedChain framework in maximizing profits and enhancing security and performance.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)

Article Automation & Control Systems

Deep Generative Learning Models for Cloud Intrusion Detection Systems

Ly Vu, Quang Uy Nguyen, N. Diep Nguyen, Dinh Thai Hoang, Eryk Dutkiewicz

Summary: This article proposes a novel solution to enable robust cloud IDSs using deep neural networks. By developing two deep generative models to synthesize malicious samples on the cloud systems, the accuracy of cloud IDSs is significantly improved. The experiments also show that this method enhances the accuracy of detecting DDoS attacks.

IEEE TRANSACTIONS ON CYBERNETICS (2023)

Article Chemistry, Analytical

Transceiver Optimization for mmWave Line-of-Sight MIMO Systems Using Hybrid Arrays

Junwen Deng, Hang Li, Jian Andrew Zhang, Xiaojing Huang, Zhiqun Cheng

Summary: The performance of mmWave LOS MIMO systems using hybrid arrays of planar subarrays was studied. The achievable maximum spatial multiplexing gain was characterized by spectral efficiency and EDoF. Analytical expressions for optimal design parameters in the analog domain were derived, and eigenvalue expressions for the equivalent LOS MIMO channel matrix were provided. Numerical and simulation results showed the superiority of planar subarrays over traditional arrays in terms of spectral efficiency and EDoF in Ricean fading channels.

MICROMACHINES (2023)

Article Computer Science, Information Systems

OTFS-Based Joint Communication and Sensing for Future Industrial IoT

Kai Wu, J. Andrew Zhang, Xiaojing Huang, Y. Jay Guo

Summary: This article proposes a joint communication and radio sensing scheme based on orthogonal time-frequency space (OTFS) waveform (JCAS). By designing a series of echo preprocessing methods and optimizing key parameters, effective sensing on OTFS is achieved. The extensive simulations show that the proposed sensing method performs well in estimation accuracy of target parameters and adapts to a wide range of system parameters, with low complexity dominated by a 2-D Fourier transform.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Engineering, Electrical & Electronic

Elastic Resource Allocation for Coded Distributed Computing Over Heterogeneous Wireless Edge Networks

Cong T. Nguyen, Diep N. Nguyen, Dinh Thai Hoang, Khoa Tran Phan, Dusit Niyato, Hoang-Anh Pham, Eryk Dutkiewicz

Summary: Coded distributed computing (CDC) is a promising solution to address the straggling effects in conventional distributed computing systems, by assigning redundant workloads to computing nodes to enhance system performance. However, CDC may lead to wasteful energy consumption at edge nodes. In this work, we propose a framework called CERA, which includes two stages: a linearization approach and hybrid algorithm to minimize processing time, and an online approach based on Lyapunov optimization to reduce energy consumption without affecting processing time.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2023)

Article Computer Science, Information Systems

Novel Graph Topology Learning for Spatio-Temporal Analysis of COVID-19 Spread

Baoling Shan, Xin Yuan, Wei Ni, Xin Wang, Ren Ping Liu, Eryk Dutkiewicz

Summary: This article introduces a new graph-learning technique for accurately inferring the graph structure of COVID-19 data. By estimating the graph Laplacian and using centrality measures, the method identifies influential countries for pandemic response analysis. The accuracy of the technique is validated and it outperforms existing techniques in terms of root mean squared error and correlation of determination. The identified influential countries are expected to contribute to the study of COVID-19 spread.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2023)

Article Computer Science, Information Systems

Deep Transfer Learning: A Novel Collaborative Learning Model for Cyberattack Detection Systems in IoT Networks

Tran Viet Khoa, Dinh Thai Hoang, Nguyen Linh Trung, Cong T. Nguyen, Tran Thi Thuy Quynh, Diep N. Nguyen, Nguyen Viet Ha, Eryk Dutkiewicz

Summary: Federated learning is an effective approach for cyberattack detection systems in IoT networks, which can improve learning efficiency, reduce overheads, and enhance privacy. However, the challenge lies in the unavailability of labeled data and dissimilarity in data features. This article proposes a collaborative learning framework that leverages transfer learning to overcome these challenges.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

AI-Enabled mm-Waveform Configuration for Autonomous Vehicles With Integrated Communication and Sensing

Nam Hoai Chu, Diep N. Nguyen, Dinh Thai Hoang, Quoc-Viet Pham, Khoa Tran Phan, Won-Joo Hwang, Eryk Dutkiewicz

Summary: Integrated communications and sensing is an important technology for IoT applications. This article proposes a novel framework for autonomous vehicles, which optimizes the waveform structure using deep reinforcement learning and Markov decision process. The proposed approach can adaptively optimize the waveform structure to improve sensing and data communication performance.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Engineering, Electrical & Electronic

Complexity Reduction for Hybrid TOA/AOA Localization in UAV-Assisted WSNs

Le Chung Tran, Anh Tuyen Le, Xiaojing Huang, Eryk Dutkiewicz, Duy Ngo, Attaphongse Taparugssanagorn

Summary: This paper introduces a new hybrid TOA/AOA localization algorithm called T1Aa, which reduces power consumption by reducing agent complexity, and demonstrates that the algorithm performs similarly to conventional methods in experiments.

IEEE SENSORS LETTERS (2023)

Article Engineering, Electrical & Electronic

Compact Multiservice Antenna for Sensing and Communication Using Reconfigurable Complementary Spiral Resonator

Ali Raza, Rasool Keshavarz, Eryk Dutkiewicz, Negin Shariati

Summary: This article presents a compact multiservice antenna (MSA) that uses a reconfigurable complementary spiral resonator for sensing and communication. The proposed structure operates in three modes and can switch between dual-band joint communication and sensing, dual-band, and single-band operation. The antenna's sensing ability is utilized to measure soil moisture using frequency-domain reflectometry (FDR).

IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT (2023)

Article Computer Science, Theory & Methods

Preserving the Privacy of Latent Information for Graph-Structured Data

Baoling Shan, Xin Yuan, Wei Ni, Xin Wang, Ren Ping Liu, Eryk Dutkiewicz

Summary: This paper presents a novel approach to obfuscating latent graph structure and stimuli, aiming to balance privacy protection and data utility. By analyzing the graph Fourier transform basis and latent stimuli, the authors successfully perturb the latent information. Experimental results demonstrate the superiority of their approach over differential privacy-based methods in graph inference attacks.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Information Systems

Federated Learning Framework With Straggling Mitigation and Privacy-Awareness for AI-Based Mobile Application Services

Yuris Mulya Saputra, Diep N. Nguyen, Dinh Thai Hoang, Quoc-Viet Pham, Eryk Dutkiewicz, Won-Joo Hwang

Summary: This article proposes a novel framework to address straggling and privacy issues in federated learning-based mobile application services. It takes into account limited computing/communications resources, privacy cost, rationality, and incentive competition among participating entities. The framework utilizes information provided by mobile users to determine the best participants and includes methods to mitigate straggling problems and protect privacy. Experimental results show significant improvements in training time, prediction accuracy, and network welfare compared to baseline methods.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Computer Science, Theory & Methods

Quantized RIS-Aided Multi-User Secure Beamforming Against Multiple Eavesdroppers

H. D. Tuan, Ali A. A. Nasir, Y. Chen, E. Dutkiewicz, H. V. Poor

Summary: This paper focuses on a network scenario where a multi-antenna access point serves multiple single-antenna users in the presence of multiple eavesdroppers, with the aid of a reconfigurable intelligent surface (RIS). The RIS employs low-resolution programmable reflecting elements (PREs) for cost-effective implementation. In order to establish secure links for all users, we consider the joint design of the transmit beamformers and PREs to maximize either the geometric mean of secrecy rates or the worst user's secrecy rate. Novel computational algorithms of low computational complexity are developed for the solution of these mixed discrete continuous optimization problems. Simulations show the merit of the proposed designs in achieving fair secrecy rate distributions and ensuring secure links for all users.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Proceedings Paper Computer Science, Hardware & Architecture

Defeating Eavesdroppers with Ambient Backscatter Communications

Nguyen Van Huynh, Nguyen Quang Hieu, Nam H. Chu, Diep N. Nguyen, Dinh Thai Hoang, Eryk Dutkiewicz

Summary: This work proposes a novel anti-eavesdropping solution that utilizes ambient backscatter technology to transmit secret information without requiring extra power or computing resources.

2023 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC (2023)

暂无数据