This paper investigated the multiple unmanned aerial vehicle (UAV) relays' assisted network in the Internet of Things (IoT) systems enhanced with energy harvesting in order to overcome the largescale fading between source and sink as well as achieve the green cooperative communications, where time switch (TS) and power splitting (PS) strategies were typically applied for UAV relays to implement energy harvesting transmission, which was also selected via signal to noise ratio (SNR) maximization criterion so that the terminal node can obtain the optimal signal. Meanwhile, it was worth noting that the terminal node may be disturbed by aggregated interference caused by dense network signaling interaction in the future 5G/B5G systems. Therefore, after TS and PS protocols designing and utilizing, the closed-form expressions of outage probability and bit error rate (BER) for UAV relay assisted IoT systems suffered from aggregated interference were derived in detail. In addition, the throughput and delay limited state of UAV relay assisted transmission were also analyzed thoroughly. The derivations and analysis results showed that the proposed multi-parameter joint optimization of transmitting power, scaling factor, and UAV relay selection could effectively improve the system throughput and reduce the system outage probability and BER. The simulation experiments verified the effectiveness of the proposed schemes and the correctness of theoretical analysis. INDEX TERMS Unmanned aerial vehicles (UAV), relay assisted, IoT, energy harvesting, protocol design, aggregate interference.
In this paper, an edge computing system for IoT-based (Internet of Things) smart grids is proposed to overcome the drawbacks in the current cloud computing paradigm in power systems, where many problems have yet to be addressed such as fully realizing the requirements of high bandwidth with low latency. The new system mainly introduces edge computing in the traditional cloud-based power system and establishes a new hardware and software architecture. Therefore, a considerable amount of data generated in the electrical grid will be analyzed, processed, and stored at the edge of the network. Aided with edge computing paradigm, the IoT-based smart grids will realize the connection and management of substantial terminals, provide the real-time analysis and processing of massive data, and foster the digitalization of smart grids. In addition, we propose a privacy protection strategy via edge computing, data prediction strategy, and preprocessing strategy of hierarchical decision-making based on task grading (HDTG) for the IoT-based smart girds. The effectiveness of our proposed approaches has been demonstrated via the numerical simulations.INDEX TERMS Edge computing, IoT-based smart grids, data prediction, artificial intelligence, data privacy protection, cloud computing.
In this paper, a deep learning (DL)-based physical (PHY) layer authentication framework is proposed to enhance the security of industrial wireless sensor networks (IWSNs). Three algorithms, the deep neural network (DNN)-based sensor nodes’ authentication method, the convolutional neural network (CNN)-based sensor nodes’ authentication method, and the convolution preprocessing neural network (CPNN)-based sensor nodes’ authentication method, have been adopted to implement the PHY-layer authentication in IWSNs. Among them, the improved CPNN-based algorithm requires few computing resources and has extremely low latency, which enable a lightweight multi-node PHY-layer authentication. The adaptive moment estimation (Adam) accelerated gradient algorithm and minibatch skill are used to accelerate the training of the neural networks. Simulations are performed to evaluate the performance of each algorithm and a brief analysis of the application scenarios for each algorithm is discussed. Moreover, the experiments have been performed with universal software radio peripherals (USRPs) to evaluate the authentication performance of the proposed algorithms. Due to the trainings being performed on the edge sides, the proposed method can implement a lightweight authentication for the sensor nodes under the edge computing (EC) system in IWSNs.
In this paper, we investigate the security threats in mobile edge computing (MEC) of Internet of things, and propose a deep-learning (DL)-based physical (PHY) layer authentication scheme which exploits channel state information (CSI) to enhance the security of MEC system via detecting spoofing attacks in wireless networks. Moreover, three gradient descent algorithms are adopted to accelerate the training of deep neural networks, which enables smaller computation overheads and lower energy consumptions. In addition, the maximum likelihood function of multi-user authentication method is derived, which explains why cross entropy is chosen as the loss function. The vectorization cost function is also derived. The mini batch scheme and 2 regularization are adopted to improve training accuracy and avoid over-fitting, respectively. Moreover, the simulation and experimental results show that the DL-based PHY-layer authentication approaches can distinguish multiple legitimate edge nodes from malicious nodes and attacker by CSIs, effectively. Our proposed method supports a better performance compared with the traditional hypothesis test based method.INDEX TERMS Mobile edge computing (MEC), the Internet of things (IoT), PHY-layer authentication, deep neural network (DNN), multi-user.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.