Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31)
  • Open Access

    ARTICLE

    Physical Layer Security of 6G Vehicular Networks with UAV Systems: First Order Secrecy Metrics, Optimization, and Bounds

    Sagar Kavaiya1, Hiren Mewada2,*, Sagarkumar Patel3, Dharmendra Chauhan3, Faris A. Almalki4, Hana Mohammed Mujlid4

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3685-3711, 2024, DOI:10.32604/cmc.2024.053587 - 12 September 2024

    Abstract The mobility and connective capabilities of unmanned aerial vehicles (UAVs) are becoming more and more important in defense, commercial, and research domains. However, their open communication makes UAVs susceptible to undesirable passive attacks such as eavesdropping or jamming. Recently, the inefficiency of traditional cryptography-based techniques has led to the addition of Physical Layer Security (PLS). This study focuses on the advanced PLS method for passive eavesdropping in UAV-aided vehicular environments, proposing a solution to complement the conventional cryptography approach. Initially, we present a performance analysis of first-order secrecy metrics in 6G-enabled UAV systems, namely hybrid… More >

  • Open Access

    ARTICLE

    Human Intelligent-Things Interaction Application Using 6G and Deep Edge Learning

    Ftoon H. Kedwan*, Mohammed Abdur Rahman

    Journal on Internet of Things, Vol.6, pp. 43-73, 2024, DOI:10.32604/jiot.2024.052325 - 10 September 2024

    Abstract Impressive advancements and novel techniques have been witnessed in AI-based Human Intelligent-Things Interaction (HITI) systems. Several technological breakthroughs have contributed to HITI, such as Internet of Things (IoT), deep and edge learning for deducing intelligence, and 6G for ultra-fast and ultralow-latency communication between cyber-physical HITI systems. However, human-AI teaming presents several challenges that are yet to be addressed, despite the many advancements that have been made towards human-AI teaming. Allowing human stakeholders to understand AI’s decision-making process is a novel challenge. Artificial Intelligence (AI) needs to adopt diversified human understandable features, such as ethics, non-biases,… More >

  • Open Access

    ARTICLE

    Mean Field-Based Dynamic Backoff Optimization for MIMO-Enabled Grant-Free NOMA in Massive IoT Networks

    Haibo Wang1, Hongwei Gao1,*, Pai Jiang1, Matthieu De Mari2, Panzer Gu3, Yinsheng Liu1

    Journal on Internet of Things, Vol.6, pp. 17-41, 2024, DOI:10.32604/jiot.2024.054791 - 26 August 2024

    Abstract In the 6G Internet of Things (IoT) paradigm, unprecedented challenges will be raised to provide massive connectivity, ultra-low latency, and energy efficiency for ultra-dense IoT devices. To address these challenges, we explore the non-orthogonal multiple access (NOMA) based grant-free random access (GFRA) schemes in the cellular uplink to support massive IoT devices with high spectrum efficiency and low access latency. In particular, we focus on optimizing the backoff strategy of each device when transmitting time-sensitive data samples to a multiple-input multiple-output (MIMO)-enabled base station subject to energy constraints. To cope with the dynamic varied channel… More >

  • Open Access

    ARTICLE

    A Probabilistic Trust Model and Control Algorithm to Protect 6G Networks against Malicious Data Injection Attacks in Edge Computing Environments

    Borja Bordel Sánchez1,*, Ramón Alcarria2, Tomás Robles1

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 631-654, 2024, DOI:10.32604/cmes.2024.050349 - 20 August 2024

    Abstract Future 6G communications are envisioned to enable a large catalogue of pioneering applications. These will range from networked Cyber-Physical Systems to edge computing devices, establishing real-time feedback control loops critical for managing Industry 5.0 deployments, digital agriculture systems, and essential infrastructures. The provision of extensive machine-type communications through 6G will render many of these innovative systems autonomous and unsupervised. While full automation will enhance industrial efficiency significantly, it concurrently introduces new cyber risks and vulnerabilities. In particular, unattended systems are highly susceptible to trust issues: malicious nodes and false information can be easily introduced into… More >

  • Open Access

    ARTICLE

    Federated Network Intelligence Orchestration for Scalable and Automated FL-Based Anomaly Detection in B5G Networks

    Pablo Fernández Saura1,*, José M. Bernabé Murcia1, Emilio García de la Calera Molina1, Alejandro Molina Zarca2, Jorge Bernal Bernabé1, Antonio F. Skarmeta Gómez1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 163-193, 2024, DOI:10.32604/cmc.2024.051307 - 18 July 2024

    Abstract The management of network intelligence in Beyond 5G (B5G) networks encompasses the complex challenges of scalability, dynamicity, interoperability, privacy, and security. These are essential steps towards achieving the realization of truly ubiquitous Artificial Intelligence (AI)-based analytics, empowering seamless integration across the entire Continuum (Edge, Fog, Core, Cloud). This paper introduces a Federated Network Intelligence Orchestration approach aimed at scalable and automated Federated Learning (FL)-based anomaly detection in B5G networks. By leveraging a horizontal Federated learning approach based on the FedAvg aggregation algorithm, which employs a deep autoencoder model trained on non-anomalous traffic samples to recognize… More >

  • Open Access

    ARTICLE

    CoopAI-Route: DRL Empowered Multi-Agent Cooperative System for Efficient QoS-Aware Routing for Network Slicing in Multi-Domain SDN

    Meignanamoorthi Dhandapani*, V. Vetriselvi, R. Aishwarya

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2449-2486, 2024, DOI:10.32604/cmes.2024.050986 - 08 July 2024

    Abstract The emergence of beyond 5G networks has the potential for seamless and intelligent connectivity on a global scale. Network slicing is crucial in delivering services for different, demanding vertical applications in this context. Next-generation applications have time-sensitive requirements and depend on the most efficient routing path to ensure packets reach their intended destinations. However, the existing IP (Internet Protocol) over a multi-domain network faces challenges in enforcing network slicing due to minimal collaboration and information sharing among network operators. Conventional inter-domain routing methods, like Border Gateway Protocol (BGP), cannot make routing decisions based on performance,… More >

  • Open Access

    REVIEW

    A Review and Bibliometric Analysis of the Current Studies for the 6G Networks

    Qusay M. Salih1,2,*, Md. Arafatur Rahman3, Ahmad Firdaus1, Mohammed Rajih Jassim4, Hasan Kahtan5, Jasni Mohamad Zain6, Ahmed Hussein Ali7

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2165-2206, 2024, DOI:10.32604/cmes.2024.028132 - 08 July 2024

    Abstract The race to develop the next generation of wireless networks, known as Sixth Generation (6G) wireless, which will be operational in 2030, has already begun. To realize its full potential over the next decade, 6G will undoubtedly necessitate additional improvements that integrate existing solutions with cutting-edge ones. However, the studies about 6G are mainly limited and scattered, whereas no bibliometric study covers the 6G field. Thus, this study aims to review, examine, and summarize existing studies and research activities in 6G. This study has examined the Scopus database through a bibliometric analysis of more than More > Graphic Abstract

    A Review and Bibliometric Analysis of the Current Studies for the 6G Networks

  • Open Access

    ARTICLE

    A Novel 6G Scalable Blockchain Clustering-Based Computer Vision Character Detection for Mobile Images

    Yuejie Li1,2,*, Shijun Li3

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3041-3070, 2024, DOI:10.32604/cmc.2023.045741 - 26 March 2024

    Abstract 6G is envisioned as the next generation of wireless communication technology, promising unprecedented data speeds, ultra-low Latency, and ubiquitous Connectivity. In tandem with these advancements, blockchain technology is leveraged to enhance computer vision applications’ security, trustworthiness, and transparency. With the widespread use of mobile devices equipped with cameras, the ability to capture and recognize Chinese characters in natural scenes has become increasingly important. Blockchain can facilitate privacy-preserving mechanisms in applications where privacy is paramount, such as facial recognition or personal healthcare monitoring. Users can control their visual data and grant or revoke access as needed.… More >

  • Open Access

    ARTICLE

    Enhancing the Trustworthiness of 6G Based on Trusted Multi-Cloud Infrastructure: A Practice of Cryptography Approach

    Mingxing Zhou1,2, Peng Xiao3, Qixu Wang1,2,*, Shuhua Ruan1,2, Xingshu Chen1,2, Menglong Yang4

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 957-979, 2024, DOI:10.32604/cmes.2023.028612 - 22 September 2023

    Abstract Due to the need for massive device connectivity, low communication latency, and various customizations in 6G architecture, a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integrated network scenario. However, the openness and heterogeneity of the 6G network cause the problems of network security. To improve the trustworthiness of 6G networks, we propose a trusted computing-based approach for establishing trust relationships in multi-cloud scenarios. The proposed method shows the relationship of trust based on dual-level verification. It separates the trustworthy states of multiple complex cloud units in 6G architecture into the state… More >

  • Open Access

    REVIEW

    A Survey on the Role of Complex Networks in IoT and Brain Communication

    Vijey Thayananthan1, Aiiad Albeshri2, Hassan A. Alamri3, Muhammad Bilal Qureshi4, Muhammad Shuaib Qureshi5,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2573-2595, 2023, DOI:10.32604/cmc.2023.040184 - 08 October 2023

    Abstract Complex networks on the Internet of Things (IoT) and brain communication are the main focus of this paper. The benefits of complex networks may be applicable in the future research directions of 6G, photonic, IoT, brain, etc., communication technologies. Heavy data traffic, huge capacity, minimal level of dynamic latency, etc. are some of the future requirements in 5G+ and 6G communication systems. In emerging communication, technologies such as 5G+/6G-based photonic sensor communication and complex networks play an important role in improving future requirements of IoT and brain communication. In this paper, the state of the… More >

Displaying 1-10 on page 1 of 31. Per Page