-
SNR-aware Semantic Image Transmission with Deep Learning-based Channel Estimation in Fading Channels
Authors:
Mahmoud M. Salim,
Mohamed S. Abdalzaher,
Ali H. Muqaibel,
Hussein A. Elsayed,
Inkyu Lee
Abstract:
Semantic communications (SCs) play a central role in shaping the future of the sixth generation (6G) wireless systems, which leverage rapid advances in deep learning (DL). In this regard, end-to-end optimized DL-based joint source-channel coding (JSCC) has been adopted to achieve SCs, particularly in image transmission. Utilizing vision transformers in the encoder/decoder design has enabled signif…
▽ More
Semantic communications (SCs) play a central role in shaping the future of the sixth generation (6G) wireless systems, which leverage rapid advances in deep learning (DL). In this regard, end-to-end optimized DL-based joint source-channel coding (JSCC) has been adopted to achieve SCs, particularly in image transmission. Utilizing vision transformers in the encoder/decoder design has enabled significant advancements in image semantic extraction, surpassing traditional convolutional neural networks (CNNs). In this paper, we propose a new JSCC paradigm for image transmission, namely Swin semantic image transmission (SwinSIT), based on the Swin transformer. The Swin transformer is employed to construct both the semantic encoder and decoder for efficient image semantic extraction and reconstruction. Inspired by the squeezing-and-excitation (SE) network, we introduce a signal-to-noise-ratio (SNR)-aware module that utilizes SNR feedback to adaptively perform a double-phase enhancement for the encoder-extracted semantic map and its noisy version at the decoder. Additionally, a CNN-based channel estimator and compensator (CEAC) module repurposes an image-denoising CNN to mitigate fading channel effects. To optimize deployment in resource-constrained IoT devices, a joint pruning and quantization scheme compresses the SwinSIT model. Simulations evaluate the SwinSIT performance against conventional benchmarks demonstrating its effectiveness. Moreover, the model's compressed version substantially reduces its size while maintaining favorable PSNR performance.
△ Less
Submitted 1 May, 2025; v1 submitted 29 April, 2025;
originally announced April 2025.
-
A Game-Theoretic Approach for Enhancing Security and Data Trustworthiness in IoT Applications
Authors:
Mohamed S. Abdalzaher,
Osamu Muta
Abstract:
Wireless sensor networks (WSNs)-based internet of things (IoT) are among the fast booming technologies that drastically contribute to different systems management and resilience data accessibility. Designing a robust IoT network imposes some challenges such as data trustworthiness (DT) and power management. This paper presents a repeated game model to enhance clustered WSNs-based IoT security and…
▽ More
Wireless sensor networks (WSNs)-based internet of things (IoT) are among the fast booming technologies that drastically contribute to different systems management and resilience data accessibility. Designing a robust IoT network imposes some challenges such as data trustworthiness (DT) and power management. This paper presents a repeated game model to enhance clustered WSNs-based IoT security and DT against the selective forwarding (SF) attack. Besides, the model is capable of detecting the hardware (HW) failure of the cluster members (CMs) and conserve the power consumption due to packet retransmission. The model relies on TDMA protocol to facilitate the detection process and to avoid collision between the delivered packets at the cluster head (CH). The proposed model aims to keep packets transmitting, isotropic or non-isotropic transmission, from the CMs to the CH for maximizing the DT and aims to distinguish between the malicious CM and the one suffering from HW failure. Accordingly, it can manage the consequently lost power due to the malicious attack effect or HW malfunction. Simulation results indicate the proposed mechanism improved performance with TDMA over six different environments against the SF attack that achieves the Pareto optimal DT as compared to a non-cooperative defense mechanism.
△ Less
Submitted 19 November, 2019;
originally announced November 2019.
-
Employing Game Theory and TDMA Protocol to Enhance Security and Manage Power Consumption in WSNs-based Cognitive Radio
Authors:
Mohamed S. Abdalzaher,
Osamu Muta
Abstract:
The rapid development of wireless sensor networks (WSNs) is the significant incentive to contribute in the vulnerable applications such as cognitive radio (CR). This paper proposes a Stackelberg game approach to enhance the WSN-based CR security against the spectrum sensing data falsification (SSDF) attack and conserve the consequent lost power consumption. The attack aims to corrupt the spectrum…
▽ More
The rapid development of wireless sensor networks (WSNs) is the significant incentive to contribute in the vulnerable applications such as cognitive radio (CR). This paper proposes a Stackelberg game approach to enhance the WSN-based CR security against the spectrum sensing data falsification (SSDF) attack and conserve the consequent lost power consumption. The attack aims to corrupt the spectrum decision by imposing interference power to the delivered reports from the sensor nodes (SNs) to the fusion center (FC) to make a protection level below a specific threshold. The proposed model utilizes the intelligent Stackelberg game features along with the matched filter (MF) to maximize the number of protected reports sent by the SNs to the FC leading to accurate decision of the spectrum status. Furthermore, the TDMA protocol is utilized to resolve the complexity of employing MF for the spectrum detection to avoid the collision between the delivered reports. The proposed model aims to enhance the number of correctly received reports at the FC, and hence manage the lost energy of reports retransmission due to the malicious attack effect. Moreover, the model can conserve the lost power of the failure communication attempts due to the SSDF attack impact. Simulation results indicate the improved performance of the proposed protection model along with the MF over the six different environments against the SSDF attack as compared to two defense schemes, namely, random and equal weight defense strategies.
△ Less
Submitted 12 August, 2019;
originally announced August 2019.