Abstract

With the rapid development of internet-of-things (IoT) and communication technologies, the quality of our daily life has improved with the applications of smart communications and networking, such as intelligent transportation, mobile computing, and edge computing. How to enable such a smart life has become a popular research topic. 5G-powered communication supports massive data transmission ensuring mobile users to have high-quality experiences, which bridges the gap between IoT and cloud computing. For example, connected 4K cameras can handle object tracking using functions in the cloud computing platform via the support of smart communications. Moreover, in smart communications and networking, we can collect, measure and analyse vast volumes of data using the technologies of artificial intelligence and big data. Such an advantage will bring tremendous opportunities for smart cities, such as unmanned vehicles and smart transportation. However, there are also many issues to resolve as we need to study architecture, applications, and future challenges within smart communications and networking. We accepted 19 papers for publication in this special issue after peer review. These selected papers are categorised into three topics: Topic A (Optimisation in smart communications), Topic B (Networks security and optimisation) and Topic C (Smart technology in IoT). The summary of each topic is given below. Wu et al., in their paper ‘Completion time minimisation for UAV enabled data collection with communication link constrained’, study the completion time minimisation problem under the communication link contained for data collection via designing the safe flight trajectory of the UAV in a complex environment. The authors first transform the original problem to a TSP-like problem based on the hover point, which can satisfy the link constraints of data collection. Then A* algorithm and SCA algorithm are used to construct the adjacency matrix and, respectively, the classical DP is used to solve the TSP-like problem. Besides, the slack variables are introduced and the successive convex approximation is leveraged to reformulate the communication link constraint, obstacle avoidance constraints, and discrete region threat avoidance constraints. Compared with the TSP-like problem with hovering, a continuously flying UAV usually has less time to perform a mission. The simulation results are presented to verify the proposed two-path planning algorithms under various parameter configurations. Zhou et al., in their paper ‘User-centric data communication service strategy for 5G vehicular networks’, develop a UCDCS strategy and the ARSUGs are updated in real-time according to predictions of vehicle mobility. Then, after the vehicle sends out a data communication request, the network comprehensively considers the RSU load cost, throughput cost, and vehicle income to flexibly allocate vehicle service resources via ARSUGs. Finally, in the allocated ARSUG, the network sorts and scores the ARSU in the ARSUG according to the communication service preferences of different vehicles and assists the vehicles to select the best ARSU for data transmission. The simulation results show that, compared with the traditional IMM, NCNS, and THOM strategies, the downlink transmission rate, link reliability, and network delay of the UCDCS strategy are 47.74%, 0.21%, and 5.96% higher, respectively. The experimental results verify that the strategy proposed in this paper can achieve better network load balancing than previous strategies. Hu et al., in their paper ‘Orthogonal frequency division multiplexing with cascade index modulation’, propose a novel orthogonal frequency division multiplexing with cascade index modulation (OFDM-CIM), which combines the conventional IM with the multiple-mode IM together, to increase the proportion of the index bits in the transmission. Subcarrier-wise and sub-block-wise cascade IM schemes are proposed to achieve different spectral efficiency and diversity order for diverse scenarios in the next-generation wireless communications. The optimal maximum likelihood (ML) detector is proposed for OFDM-CIM. To reduce the demodulation complexity, a novel tree search-based detector and a log-likelihood ratio (LLR) based low complexity detector, which can avoid the illegal indices patterns in the searching process, are proposed for OFDM-CIM. Monte Carlo simulations show that the proposed scheme achieves better BER performance than OFDM-IM. Tong et al., in their paper ‘Low pilot overhead channel estimation for CP-OFDM-based massive MIMO OTFS system’, first analyse the CP-OFDM-based massive MIMO OTFS system channel with antenna directivity pattern and transform the burst sparsity in the angle domain into block sparsity by using non-uniform Fourier Transform (NUFT). Furthermore, according to the general sparsity in the delay domain, the block sparsity in the Doppler domain, and the angle domain, a three-dimensional dynamic support search (DSD) algorithm is proposed. Compared with the traditional OMP algorithm and the 3DSOMP algorithm, simulation results demonstrate the proposed DSD algorithm has higher channel estimation accuracy and lower pilot overhead. Gao et al., in their paper ‘Low drift visual inertial odometry with UWB aided for indoor localisation’, propose a low drift visual inertial odometry with ultra-wideband (UWB) aided for indoor localisation. First, a single UWB anchor was dropped in an unknown position, and a cost function was formed by the position information and the UWB ranging information to obtain the position of the anchor. Then, the single anchor position and the UWB ranging constraints were added to the tightly coupled visual inertial fusion algorithm framework, thereby improving the robustness of motion tracking and reducing the drift of the odometry. Finally, the effectiveness of the proposed method was verified in the actual indoor environment, and the experiment results demonstrated that, compared with state-of-the-art localisation methods, the positioning accuracy and robustness were improved significantly. Wang et al., in their paper ‘An approach to adaptive filtering with variable step size based on geometric algebra’, propose the novel approach to adaptive filtering with variable step size based on Sigmoid function and geometric algebra (GA). First, the proposed approach to adaptive filtering with variable step size based on geometric algebra represents the multi-dimensional signal as a GA multi-vector for the vectorisation process. Second, the proposed approach to adaptive filtering with variable step size based on geometric algebra solves the contradiction between the steady-state error and the convergence rate by establishing a nonlinear function relationship between the step size and the error signal. Finally, the experimental results demonstrate that the proposed approach to adaptive filtering with variable step size based on geometric algebra achieves better performance than that of the existing adaptive filtering algorithms. Zheng, et al., in their paper ‘Unequal Error Protection Transmission for Federated Learning’, design an unequal error protection (UEP) scheme based on multi-rate channel coding and multi-layer modulation. The numerical simulation verifies that the proposed UEP transmission schemes have significant benefits in accuracy, robustness and efficiency, especially when the channel condition is poor. Zhang et al., in their paper ‘Secrecy outage probability analysis of energy-aware relay selection for energy-harvesting cooperative systems’, employ relay selection to improve the physical-layer security for a CCR-EH system consisting of a CS, multiple CRs and a CD in the face of an E. To prevent confidential information leaking to E, an optimal relay selection (ORS) scheme and a suboptimal relay selection (SRS) scheme are proposed. In the ORS scheme, the whole channels state information (CSI) of wireless links is available to CRs while SRS only needs to know the CSI of main channels from CRs to CD. Moreover, the closed-form expressions of secrecy outage probabilities for both ORS and SRS schemes are derived. The classical round-robin relay selection (RRRS) is also analysed in terms of secrecy outage probability. Finally, the numerical results show that ORS achieves the best performance and RRRS performs the worst in terms of secrecy outage probability. Wang et al., in their paper ‘Applying an auction optimisation algorithm to mobile edge computing for security’, study the mobile blockchain network based on edge computing and propose a new assumption regarding the mobile communication blockchain based on the traditional blockchain. By analysing attacks on the mobile blockchain, a security model based on edge computing is designed, and the smart contract in the blockchain is combined with a court trial. In the algorithm optimisation process, a price utility function is constructed based on maximising social welfare, and both models are used as joint optimisation indexes. The profit of the provider is guaranteed, which is conducive to the development of the blockchain. Simulation results verify that system security increases with the blocked funds and duration, and the forking attack success rate approaches zero as the number of validators increases. Zhang et al., in their paper ‘A PUF-based lightweight authentication and key agreement protocol for smart UAV networks’, propose a two-stage lightweight identity authentication and key agreement protocol for UAV. The entire process only uses hash and XOR operations, which significantly improves the authentication efficiency. Simultaneously, the physical unclonable function (PUF) is introduced and embedded into the UAV hardware to ensure UAV network communication security when a UAV suffers a physically capture attack. Moreover, the security of the proposed protocol is proved with Burrows–Abadi–Needham (BAN) logic, real-or-random (ROR) model, and AVISPA simulation tools. An informal security analysis is also provided to illustrate that the protocol satisfies the security requirements of UAV networks. Finally, the protocol is compared with other existing protocols regarding function properties, computation cost, and communication cost. The results show that the protocol has effectiveness and practicality. Akhunzada et al., in their paper ‘MalDroid: Secure DL-enabled intelligent malware detection framework’, present a secure by design efficient and intelligent Android detection framework against prevalent, sophisticated and persistent malware threats and attacks. A novel and highly proficient CUDA-enabled multi-class malware threat detection and identification deep learning (DL)-driven mechanism that leverages ConvLSTM2D and CNN is proposed. The devised approach is extensively evaluated on publicly available state-of-the-art datasets of Android applications (i.e., Android Malware Dataset (AMD), Androzoo). Standard and extended assessment metrics are employed to thoroughly evaluate the proposed technique. Moreover, the performance of the proposed algorithm is verified both with the constructed hybrid DL-driven algorithms and current benchmarks. Additionally, to explicitly show unbiased results, the proposed scheme is validated. Shang et al., in their paper ‘An efficient MAC protocol design for adaptive compressed sensing based underwater WSNs’, design an adaptive compressive sensing-based MAC protocol to optimise energy efficiency and bandwidth utilisation. In the feedback UWSN structure, based on the adaptive compressive sensing method, a TDMA mechanism is designed to collect data from both the compressive sensor nodes and non-compressive sensing nodes in the UWSN. Super-frame-based MAC protocol is designed to minimise the energy consumption per bit according to the designed UWSN. An optimisation problem is to solve the parameters of the super-frame to satisfy both data latency and recovery quality requests. Considering the compression sensing method and packets loss, the slot allocation algorithm is designed to maximise bandwidth utilisation. Simulations show that the proposed method performs better than most of the state-of-art protocols and also a testbed is built up to show that the battery life can be prolonged by 11%. Liu, et al., in their paper ‘Reliability Modelling and Optimization for Microservicebased Cloud Application Using Multi-agent System’, proposes a scheduling scheme of Multi-agent system to optimize the reliability of cloud applications through flexible resource combination. The reliability optimization (PCPRO) algorithm based on partial critical path is introduced. Experiments on scientific workflow verify the effectiveness of the proposed algorithm. Ai et al., in their paper ‘Anti-collision algorithm based on slotted random regressive-style binary search tree in RFID technology’, propose an anti-collision algorithm based on slotted random regressive-style binary search tree (SR-RBST). Based on slotted ALOHA (SA), the method proposed in this paper uses the regressive-style binary search tree (RBST) to process the RFID labels in the collision time slot. With the same size of tags, the SR-RBST algorithm needs less total time slot and has higher efficiency and shorter identification time, while with the increase of the number of tags, the SR-RBST anti-collision algorithm has more obvious advantages. The SR-RBST algorithm effectively improves the time slot utilisation efficiency of the system. Siddiqi et al., in their paper ‘FANET: Smart city mobility off to a flying start with self-organised drone-based networks’, propose a reliable RTA monitoring scheme using enhanced ant colony optimisation (eACO) technique based on self-organised drone FANETs. The proposed scheme addressed several challenges including coverage of larger geographical areas and data communication links between FANETs nodes. The experiment results are presented to compare the proposed technique against different network lifetimes and the number of received packets. The presented results show that the proposed techniques perform better compared to other state-of-the-art techniques. Guo et al., in their paper ‘Payoff-maximisation-based adaptive hierarchical wireless charging algorithm for the mobile charger in IoT’, propose a payoff-maximisation-based adaptive hierarchical wireless charging algorithm for the mobile charger. According to energy allocation, anchor point deployment, and time allocation, decomposing it into three layers by the hierarchical decomposition method to obtain optimal solution quickly. The process of energy allocation and anchor point deployment in each mesh is optimised in the first two layers based on Karush–Kuhn–Trucker (KKT) condition and greedy strategy respectively. Based on the feedback of the first two layers, the most complex problem of time allocation in the last layer is solved by the innovative gain recall mechanism. The trade-off between the number of recharged devices and recharging time in each cycle can be achieved by only charging the devices in the meshes which are without recall gains. The simulation results prove our algorithm can adaptively adjust the ratio of moving time to recharge time in a fixed cycle, and mobile chargers can always work in efficient recharging positions, whose effect is exploited at the utmost. Wang et al., in their paper ‘Improving the performance of tasks offloading for internet of vehicles via deep reinforcement learning methods’, propose an offloading scheme combining mobile edge computing (MEC) and deep reinforcement learning (DRL). First, a realistic map is simulated, while initialising the tasks queue, and building a task offloading environment with the base station (BS), roadside units (RSUs), and idle vehicles. Then, an algorithm that combines deep learning with reinforcement learning, i.e., the deep Q-learning network (DQN) algorithm, is developed to optimise the offloading scheme, to further reduce the offload latency. Finally, given that the complete information cannot be observed effectively in the environment, the long short term memory (LSTM) model is applied to train neural networks within DQN to improve its learning efficiency, in consideration of the satisfactory performance of LSTM in processing time-series data. The simulation results show that the MEC-based vehicle task offloading can effectively reduce the latency of vehicle offloading. Hou et al., in their paper ‘A data-driven method to predict service level for call centers’, investigate how to use the data-driven method to solve the service level prediction problem. To solve this problem, the relationship between service level and other factors, such as number of calls, number of agents, and time is explored. To model the relationship between service level and input features, some features based on empirical analyses are extracted and proposed to use decision tree-based ensemble methods, like random forest and GBDT. The experiment results show that the proposed method outperforms other baselines significantly. Wang, et al., in their paper ‘Short-term Passenger Flow Forecasting Using CEEMDAN meshed CNN-LSTM-Attention Model Under Wireless Sensor Network’, propose a complete ensemble empirical mode decomposition with adaptive noise algorithm (CEEMDAN) and attention-based CNN-LSTM network to extract both temporal and spatial characteristics of passenger flow data. By adding the attention mechanism, the problem of insufficient peak value prediction can be solved effectively. The experiment result shows that the CEEMDAN-ConvLSTM-Attention model has a significant performance improvement than the existing network models. All of the papers selected for this special issue show the development of different emerging technologies and creative strategies in various fields. However, there are still many challenges in all of those fields that require future research attention. The authors have no conflict of interest to disclose. Honghao Gao is currently with the School of Computer Engineering and Science, Shanghai University, China. He is also a Professor at Gachon University, South Korea. Prior to that, he was a research fellow with the Software Engineering Information Technology Institute at Central Michigan University, USA, and was an adjunct professor at Hangzhou Dianzi University, China. His research interests include software formal verification, industrial IoT networks, vehicle communication, and intelligent medical image processing. He has publications in IEEE TII, IEEE T-ITS, IEEE TNNLS, IEEE TSC, IEEE TNSE, IEEE TNSM, IEEE TCCN, IEEETGCN, IEEE TCSS, IEEE TETCI, IEEE/ACM TCBB, IEEE IoT-J, IEEE JBHI, IEEE Network, ACM TOIT, ACM TOMM, ACM TOSN, ACM TMIS. He is the recipient of the Best Paper Award at IEEE TII 2020 and EAI CollaborateCom 2020. Xiong Luo currently works at the Department of Computer Science and Technology, University of Science and Technology Beijing. His main research interests include data mining and machine learning, complex system modelling and computational intelligence, cognitive neural networks, intelligent optimal control, Internet of Things applications. He is a senior member of IEEE, a senior member of The Chinese Computer Society, a member of the Intelligent Automation Committee of the Chinese Association of Automation, a deputy secretary general of the Intelligent Medical Committee of the Chinese Association for Artificial Intelligence, and a member of the Cognitive System and Information Processing Committee of the Chinese Association for Artificial Intelligence. Ramón J. Durán Barroso received ‘a telecommunication’ engineer degree in 2002 and obtained his PhD in 2008, both from Universidad de Valladolid (UVa), Spain. From 2002 to 2010, he was an Assistant Professor at Universidad de Valladolid, Spain. From 2010 to the present, he was an associate professor at Universidad de Valladolid, Spain. From 2004, he focused on communication networks, in particular in the following topics: design and optimisation of wavelength routed optical networks, hybrid optical networks (proposing polymorphic networks), cognitive heterogeneous optical networks (proposing CHRON networks) and access optical networks. He has also actively researched the use of ICT technologies in education. Moreover, he has actively collaborated with the other line of his research group devoted to research about wireless communications and location techniques using some methodologies previously used in his research in network optimisation. Walayat Hussain received a PhD from the University of Technology Sydney, Australia. Currently, he is serving as a lecturer (assistant professor) at Victoria University, Melbourne, Australia. Before joining Victoria University, he worked for six years as a lecturer and research ‘fellow’ at the FEIT, University of Technology Sydney, Australia. He has served as an assistant professor at BUITEMS University for many years. He has published in various top-ranked ERA-A*, JCR/SJR Q1 journals such as The Computer Journal, Info. Systems, Info. Sciences, IJIS, FGCS, IEEE Access, Comput & Ind Eng, MONET, Journal of AIHC, IEEE TETCI, IEEE TSC, IEEE TGCN, IJCS and WCMC. He has served as a guest editor in various Q1 journals. He has won multiple national and international research awards and recognitions. He is the recipient of the Best Paper Award at 3PGCIC 2015, 2016 Poland, South Korea, Ministry of Higher Education Govt. of Oman and FEIT HDR Publication Award by the UTS Australia. Guest Editorial.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call