首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 187 毫秒
1.
王娇  邱恭安  张士兵 《电信科学》2022,38(1):95-101
在高密度蜂窝车联网(cellular vehicle-to-everything,C-V2X)中,群集通信终端的有效阵列接入方法是多业务性能保障和有限频谱效率提升的前提。利用蜂窝车联网中终端计算能力,提出了信道自适应的业务接入机制。该机制由基站估计当前区域通信密度,生成通信密度关联的接入类别限制(access class barring,ACB)因子,并在通信区域内广播;随后,车载通信终端根据接收基站广播信号的信干噪比(signal to interference plus noise ratio,SINR)和ACB因子计算自适应信道状态的接入概率,并比较接入概率和ACB因子。当接入概率大于ACB因子时,通信终端以最小接入概率从前导码池中随机选择一个前导码上传到基站,以获得与信道状态匹配的接入机会。仿真结果表明,在高密度通信状态下,与S-ALOHA协议和M2M-OSA方案相比,所提方案平均接入碰撞概率降低了约5%~20%,有效地减小了平均接入时延。  相似文献   

2.
摘 要:为满足认知无线网络中宽带业务实时传输的需求,提出低延迟的MAC层频谱接入方案,包括频谱感知调度与信道接入竞争两部分。在频谱感知阶段,认知用户选取最佳可用信道数实现感知与传输的延迟最小化;在信道接入竞争阶段,协议考虑频谱资源动态变化的特点,通过设计数据帧格式以及邻居节点协同侦听机制,减小信道冲突与“聋终端”的影响。理论与实验结果表明,与传统的认知无线网络MAC层协议相比,提出的接入方案数据传输延迟更短,同时在授权信道空闲率较大时吞吐量性能略优。  相似文献   

3.
为了满足车联网中不同应用的服务质量(Quality of Service, QoS)要求,提出了一种基于网络切片技术的车联网频谱资源分配方案。该方案考虑数据接入控制,通过联合优化频谱资源块(Resource Block, RB)分配和车辆信号发射功率控制,在安全服务切片低时延高可靠性的约束下,最大化信息娱乐服务切片的平均和吞吐量。将车联网资源管理建模为一个混合整数随机优化问题,利用李雅普诺夫(Lyapunov)优化理论将该优化问题分解为接入控制和RB分配与功率控制两个子问题,并分别对其进行求解,得到每个时隙的接入控制和资源分配方案。仿真结果表明,所提出的资源分配方案能够有效提高信息娱乐服务切片的平均和吞吐量,并且可以通过调整引入的控制参数值来实现吞吐量和时延的动态平衡。同时,与已有方案相比,该方案具有更好的时延性能。  相似文献   

4.
针对卫星认知无线网络频谱感知不确定性较大导致传统频谱接入机制效率降低的问题,该文提出一种基于动态多频谱感知的信道接入优化策略。认知LEO卫星根据频谱检测概率与授权用户干扰门限之间的关系,实时调整不同频谱感知结果下的信道接入概率。在此基础上以系统吞吐量最大化为目标,设计了一种基于频谱检测概率和虚警概率联合优化的判决门限选取策略,并推导了最佳感知频谱数量。仿真结果表明,认知用户能够在不大于授权用户最大干扰门限的前提下,根据授权信道空闲状态动态选择最佳频谱感知策略,且在检测信号信噪比较低时以更加积极的方式接入授权频谱,降低了频谱感知不确定性对信道接入效率的影响,提高了认知系统吞吐量。  相似文献   

5.
赵佳颖  洪涛  张更新 《信号处理》2023,39(3):482-495
针对传统卫星重叠通信中单个掩护信号带宽以及功率容限不够的问题,利用卫星转发器频谱环境中多个掩护信号提出了一种频域分割-子谱功率控制联合优化的多掩护信号重叠通信方法,建立了隐蔽通信信号传输性能和隐蔽性能的双目标优化问题,信关站侧采用感知的历史频谱数据训练生成支持向量机回归预测模型,用来预测不同转发器频谱环境下隐蔽信号的通信性能和隐蔽性能,并将训练好的预测模型下载到通信终端;终端侧利用双目标背包算法将支持向量机回归预测模型预测的隐蔽信号的通信性能和隐蔽性能作为价值因素、掩护信号个数作为背包重量来选择转发器频谱环境中的掩护信号,并且求解出隐蔽信号的频域分割和子频谱的功率控制参数,从而实现终端通信信号隐藏在卫星转发器的频谱环境中的目的。  相似文献   

6.
该文针对移动Ad Hoc网络(MANET),提出了支持定向天线应用的忙音和功率控制多址接入协议(BT-DMACP)。协议充分考虑到定向天线应用中存在的特殊隐藏终端问题和旁瓣干扰,利用RTS/CTS短分组对话机制、定向忙音信号和基于信噪比门限的功率控制策略,对数据分组的定向发送功率进行实时调整。同时为准确估计接收节点处的最大干扰功率,设计了自适应干扰功率估计算法。仿真结果证明,BT-DMACP协议能有效支持定向天线在MANET中的应用,在降低了系统功耗同时,具有很高的信道利用率。  相似文献   

7.
曾召华 《电视技术》2012,36(11):90-92
随机接入技术作为LTE系统中的关键技术之一,接入成功率关系到传输时延,LTE系统下的随机接入所采用的传统冲突解决算法主要是基于网络层的重传机制。提出了一种MIMO下的随机接入实现方案,基站端可以利用多天线接收和先进的MIMO信号处理技术的结合,进而联合高层解决冲突,仿真结果表明了该方案可以显著地提高系统的吞吐量。  相似文献   

8.
随机接入技术作为LTE系统中的关键技术之一,接入成功率关系到传输时廷,LTE系统下的随机接入所采用的传统冲突解决算法主要是基于网络层的重传机制.提出了一种MIMO下的随机接入实现方案,基站端可以利用多天线接收和先进的MIMO信号处理技术的结合,进而联合高层解决冲突,仿真结果表明了该方案可以显著地提高系统的吞吐量.  相似文献   

9.
梁燕  洪文超  邵凯 《电讯技术》2023,63(10):1464-1471
针对目前频谱稀缺的困境,一个经济有效的解决方案是将未充分利用的授权频谱以机会的方式分配给未授权用户。然而,实现大规模频谱共享面临激励缺失、隐私泄露、安全威胁和时延过大等挑战。利用区块联盟链技术的安全机制,设计了由频谱接入层、区块链网络层、区块链共识层构成的区块链动态频谱接入系统。该系统采用异步实时拜占庭容错(Practical Byzantine Fault Tolerance,PBFT)改善共识延时,设计基于最优匹配算法的匹配方案,提高频谱复用率。经仿真验证,该方案频谱复用率提升近6%。相比于实时拜占庭机制,所提方案减少了系统延时,提升吞吐量近129%。  相似文献   

10.
韩蕙竹  黄仰超  胡航  潘钰  安琪  赵森豪 《信号处理》2022,38(12):2582-2593
针对物联网(IoT)通信的低延时需求,为了保证数据传输的灵活性,本文构建一种基于短包传输的无人机(UAV)通信网络。由于非正交多址接入(NOMA)技术能够增加可服务的地面用户数量,故将该技术应用到无人机短包通信(UAV-SPC)系统中可以解决多用户的安全传输问题。与正交多址(OMA)技术相比,NOMA可有效提高用户接入公平性和频谱利用率,因此被广泛用于下行链路的通信传输。为解决复杂的安全传输问题,首先证明在功率和译码错误率约束的条件下,分别存在最优的功率分配,数据传输包长和系统传输比特数使目标用户的平均安全吞吐量最大。在此基础上,通过本文所提算法得到安全传输问题的优化解。实验结果验证了该算法的稳定性和可行性。此外,与基准方案相比,本文所提方案可有效降低短包传输的通信时延,提高系统中目标用户的平均安全吞吐量。   相似文献   

11.
物联网中无线传输的安全难题是制约其发展的重要瓶颈,物联网终端受限的计算能力与硬件配置以及配备大规模天线阵列的窃听者给物理层安全技术带来了新的挑战。针对该问题,该文提出一种可对抗大规模天线阵列窃听者的轻量级噪声注入策略。首先,对所提出的噪声注入策略进行介绍,并分析了该策略的安全性;然后,基于该策略得到了系统吞吐量的闭式表达式,并对时隙分配系数和功率分配系数进行优化设计。理论和仿真结果表明,通过对物联网系统参数进行设计,所提出的噪声注入策略能够实现私密信息的安全传输。  相似文献   

12.
In this paper, we introduce the first fully implemented two-way authentication security scheme for the Internet of Things (IoT) based on existing Internet standards, specifically the Datagram Transport Layer Security (DTLS) protocol. By relying on an established standard, existing implementations, engineering techniques and security infrastructure can be reused, which enables easy security uptake. Our proposed security scheme is therefore based on RSA, the most widely used public key cryptography algorithm. It is designed to work over standard communication stacks that offer UDP/IPv6 networking for Low power Wireless Personal Area Networks (6LoWPANs). Our implementation of DTLS is presented in the context of a system architecture and the scheme’s feasibility (low overheads and high interoperability) is further demonstrated through extensive evaluation on a hardware platform suitable for the Internet of Things.  相似文献   

13.
Because of the exponential growth of Internet of Things (IoT), several services are being developed. These services can be accessed through smart gadgets by the user at any place, every time and anywhere. This makes security and privacy central to IoT environments. In this paper, we propose a lightweight, robust, and multi‐factor remote user authentication and key agreement scheme for IoT environments. Using this protocol, any authorized user can access and gather real‐time sensor data from the IoT nodes. Before gaining access to any IoT node, the user must first get authenticated by the gateway node as well as the IoT node. The proposed protocol is based on XOR and hash operations, and includes: (i) a 3‐factor authentication (ie, password, biometrics, and smart device); (ii) mutual authentication ; (iii) shared session key ; and (iv) key freshness . It satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for resource constrained IoT environment. Further, the informal and formal security analysis using AVISPA proves security strength of the protocol and its robustness against all possible security threats. Simulation results also prove that the scheme is secure against attacks.  相似文献   

14.
Internet of Things (IoT) is a newly emerged paradigm where multiple embedded devices, known as things, are connected via the Internet to collect, share, and analyze data from the environment. In order to overcome the limited storage and processing capacity constraint of IoT devices, it is now possible to integrate them with cloud servers as large resource pools. Such integration, though bringing applicability of IoT in many domains, raises concerns regarding the authentication of these devices while establishing secure communications to cloud servers. Recently, Kumari et al proposed an authentication scheme based on elliptic curve cryptography (ECC) for IoT and cloud servers and claimed that it satisfies all security requirements and is secure against various attacks. In this paper, we first prove that the scheme of Kumari et al is susceptible to various attacks, including the replay attack and stolen-verifier attack. We then propose a lightweight authentication protocol for secure communication of IoT embedded devices and cloud servers. The proposed scheme is proved to provide essential security requirements such as mutual authentication, device anonymity, and perfect forward secrecy and is robust against security attacks. We also formally verify the security of the proposed protocol using BAN logic and also the Scyther tool. We also evaluate the computation and communication costs of the proposed scheme and demonstrate that the proposed scheme incurs minimum computation and communication overhead, compared to related schemes, making it suitable for IoT environments with low processing and storage capacity.  相似文献   

15.
随着物联网(IoT)规模的不断发展,其业务需求呈现出多样化、全球化的趋势。针对地面物联网无法覆盖全球的缺点,卫星物联网尤其是低轨卫星星座(LEOSC)物联网可以有效地为地面物联网提供覆盖性能上的补充和延伸。由于低轨卫星星座物联网系统广覆盖、高动态的特点,其业务量统计特性需要考虑到环境因素造成的影响,这导致其业务量分布与地面物联网存在显著差异。从合理高效利用星上有限资源角度出发,该文研究基于低轨卫星星座的全球物联网业务模型。结合多样化的业务特点以及卫星通信系统特性,采用统计建模理论,得出了全球物联网业务模型框架。并且初步提出了一种基于最高优先级的接入策略,以供设备节点实时选择接入的卫星。仿真结果表明:泊松过程可以用于近似模拟低轨卫星物联网中大量存在的异步流量的叠加过程;由于低轨卫星具有高动态性,其业务源高速变化,导致了卫星业务忙闲不均,峰均比(PAR)较高。  相似文献   

16.
The Sixth-Generation (6G) standard for wireless communications is expected to realize ubiquitous coverage for massive Internet of Things (IoT) networks by 2030. Satellite-based communications are recognized as a highly promising technical enabler to satisfy IoT service requirements in the 6G era. This study analyzes multiple access technologies, which are essential for the effective deployment of satellite-based IoT. First, we thoroughly investigate the existing research related to massive access, including information-theory considerations as well as Non-Orthogonal Multiple Access (NOMA) and Random Access (RA) technologies.Then, we explore the influence of the satellite transmission environment on multiple access technologies. Based on this study, a Non-orthogonal Massive Grant-Free Access (NoMaGFA) scheme, which reaps the joint benefits of RA and NOMA, is proposed for asynchronous transmissions in satellite-based IoT to achieve improved system throughput and enhance the system robustness under varying traffics. Finally, we identify some important and interesting future developments for satellite-based IoT, including waveform design, transceiver design, resource allocation, and artificial intelligence-enhanced design.  相似文献   

17.
Internet of Things (IoT) devices facilitate intelligent service delivery in a broad range of settings, such as smart offices, homes and cities. However, the existing IoT access control solutions are mainly based on conventional identity management schemes and use centralized architectures. There are known security and privacy limitations with such schemes and architectures, such as the single-point failure or surveillance (e.g., device tracking). Hence, in this paper, we present an architecture for capability-based IoT access control utilizing the blockchain and decentralized identifiers to manage the identity and access control for IoT devices. Then, we propose a protocol to provide a systematic view of system interactions, to improve security. We also implement a proof-of-concept prototype of the proposed approach and evaluate the prototype using a real-world use case. Our evaluation results show that the proposed solution is feasible, secure, and scalable.  相似文献   

18.
Decision making plays a vital role in the selection of resources so that they actively participate for communication and computation on the Internet‐of‐Things platform. For the same, they require the elimination of the challenges related to knowledge representation, discovery, trust, and security due to continuously changing mobility patterns, heterogeneity, interoperability, and scalability on the network. To address the challenges, a novel three‐layered approach, namely, middleware approach for reliable resource selection on Internet‐of‐Things (MARRS‐IoT), is proposed. It performs a search through neighbor discovery algorithm and evaluates trust score of the discovered resources, both locally and globally using fuzzy‐decision algorithm and performs efficient communication among resources via hybrid M‐gear protocol. The approach is simulated and compared against algorithms, namely, particle swarm optimization, ants colony optimization, and binary genetic to evaluate its performance. The obtained results support the efficacy of the MARRS‐IoT with respect to throughput and execution time.  相似文献   

19.
杜书  马玫  赵波  曾琦  刘星 《电信科学》2023,39(1):117-125
通信网络是电力物联网数据采集和信息传输的必要组成部分。为了适应未来多种电力业务爆发式发展,接入灵活和扩展性强的无线通信技术是电力物联网发展方向之一。面向电力物联网节点大规模接入、接入时刻随机、信息传输安全可靠性高等特点,提出一种随机接入下具有低碰撞概率的电力跳频通信方式,采用移位跳频序列组合方法给出了该跳频图案的产生方法。并通过理论计算和仿真给出了这类跳频序列特性和电力跳频通信系统传输误码率性能。通过分析验证了所提新型低碰撞跳频序列及其通信系统可以满足电力物联网大规模接入、高可靠通信需求,具有较好的应用前景。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号