Early access articles
Infocommunications Journal provides early access publications for articles that have been reviewed and accepted. This practice allows the scientific community to find and read the latest proceedings in the infocommunications domain. Papers appearing in the early access section are under completion for upcoming journal issues.
|A Novel Strategic Caching and Availability Optimization for Wireless Unmanned Aerial Vehicle Communication Networks||Wireless Communications, UAV, Beaconing Duration, Service fee, Quality of Service, Game Theory, Nash Equilibrium|
Distributed Edge Computing Aided Environmental Severity Monitoring for Power Grid Equipment in Nakagami-m Fading Channels
|Edge computing, offloading optimization, outage probability, Nakagami-m fading|
|Holistic attack methods against power systems using the IEC 60870-5-104 protocol||IEC 60870-5-104, Attack, Security, Power system|
EARLY ACCESS ARTICLES
Mohamed El Amrani, Hamid Garmani, Driss Ait Omar, Mohamed Ouaskou, Abdelkarim Ait Temghart, and Mohamed Baslam
A Novel Strategic Caching and Availability Optimization for Wireless Unmanned Aerial Vehicle Communication Networks
The growing complexity in the 5G technology has created a neccessity for UAV(Unmanned Aerial Vechile)-assisted cellular networks as base stations. This helpful for a ide coverage with higher transmission rates as it adresses three critical issues i.e. location, performance, and bandwidthBesides the integration of caching into conventional UAV infrastructure has received significant attentions since it can bring contents and memory storage closer to a mobile device. In a dynamic resource caching for wireless mobile networks, drone’s settings contain important options for supporting a wide variety of applications and services, including the network access fee, quality of service (QoS) , number of cached contents, cache access fee and beaconing duration. A theoretic model based on game theory is developed to study the effect of competition among UAVs that have caching and sharing revenue model. Note that an optimal usage of UAV capabilities would thus lead to a cost-effective strategy for energy consumption and QoS requirements.
Cite: Mohamed El Amrani, Hamid Garmani, Driss Ait Omar, Mohamed Ouaskou, Abdelkarim Ait Temghart, and Mohamed Baslam , "A Novel Strategic Caching and Availability Optimization for Wireless Unmanned Aerial Vehicle Communication Networks", Infocommunications Journal
This study explores the concept of multiuser mobile edge computing (MEC) networks aided environmental severity monitoring for power grid equipment, where an MEC server facilitates the computation of tasks from N users via wireless transmission in the presence of Nakagami-m fading channels. To analyze the system performance, we first define the system outage probability based on energy consumption, where the outage event is triggered when the energy required to complete the users’ tasks exceeds a specified threshold. We then develop an analytical expression for the system outage probability in Nakagami-m fading channels and provide a high signal-to-noise ratio (SNR) asymptotic analysis. Additionally, we optimize the system performance by adjusting the task offloading ratios. Finally, simulation and numerical results in Nakagami-m fading channels validate the proposed methods. The results show that the performance of multiuser MEC networks can be improved by increasing the bandwidth or energy consumption threshold for environmental severity monitoring in power grid equipments.
Cite: Guangmao Li, Gang Du, Hongbin Wang, Hongling Zhou, Jie Yang, and Zhikai Pang, "Distributed Edge Computing Aided Environmental Severity Monitoring for Power Grid Equipment in Nakagami-m Fading Channels", Infocommunications Journal
IEC 60870-5-104 is a widely used protocol for telecontrol in European power systems. However, security was not a design goal when it was originally published: This protocol lacks built-in security features such as encryption, integrity protection, or authentication. In this paper, we describe novel types of attacks against the protocol in a holistic way. Therefore, we also enumerate the possible entry points of the threat actors and demonstrate a new technique, where the malicious actor can precisely target the attack. These methods are demonstrated both on simulated environment and actual devices and compared with already published methods.
Cite:János Csatár, Péter György, and Tamás Holczer, "Holistic attack methods against power systems using the IEC 60870-5-104 protocol", Infocommunications Journal